Skip to content

Posts from the ‘Louis Columbus’ blog’ Category

Cybersecurity CEOs Share How Businesses Can Protect Themselves In 2022

Cybersecurity CEOs Share How Businesses Can Protect Themselves In 2022

Bottom Line: Every business needs to resolve in 2022 to treat cybersecurity as a business decision first because the risk to operations and revenue are too great if they don’t.

Any cybersecurity prediction for 2022 will likely be on the low side, given how ingenious ransomware attackers are at mining long-standing common vulnerabilities and exposures (CVEs) and how intricate breach attempts are becoming.

Predictions don’t protect businesses, professional guidance does. Intending to provide every business, especially startups, with insights they can use to protect themselves in 2022, I’ve interviewed several cybersecurity CEOs. Their recommendations on what every business can do to improve their cybersecurity and avert a potential breach, ransomware attempt, or worse are provided below:

BOS Framework Founder and CEO Sashank Purighalla

Before BOS, Sashank founded and served as the CEO of 5Y Solutions, Inc., a DevOps company that provides SaaS and enterprise-class technology solutions based in the cloud, AR, VR, IoT, Media Streaming, and Big Data spaces. 5Y has offices in the US, Australia, and India. Much of Sashank’s 20+ years of experience has involved developing enterprise-class technology solutions, strong strategic and long-range planning, setting business and technology strategies in B2B and B2C environments, and leading and motivating diverse teams to build high-impact SaaS and PaaS products. Sashank has a bachelor’s degree in Mechanical Engineering and a master’s degree in Computer Science.

Advice from Sashank Purighalla Founder and CEO at BOS Framework

 “The biggest problem that enterprises are dealing with is with fractured technology architectures. The playbook for how technology systems are designed and maintained has fundamentally changed over the past 5 years with the advent of DevOps as a new disciple geared toward bringing efficiency to the PDLC process. To help meet this growing demand, there has been nearly a 570% increase in the number of known niche tools. Here’s the strange dichotomy: In the same timeframe, there has been an over 630% increase in the number of cyber breaches and over 600% increase in technology management and maintenance costs.

The fact is that you cannot patch disparate systems with non-standardized implementations using niche tools and expect to achieve security. Breach resilience and systemic integration can only result from sound systemic architectures that are based on best practices. 

Enterprises must shift their focus from thinking of the next tool for efficiency or patching gaps to consistent architectures for effective holistic outcomes. This is an ecosystem problem and can only be addressed at an organizational architecture level”.

Founder Shield Co-Founder & CEO Benji Markoff

Benji Markoff is the Co-Founder & CEO of Founder Shield. He has an obsession with culture and the science behind it. He wants his legacy to be the success and positivity that everyone who works at Founder Shield brings to the world, whether at Founder Shield or in any their future endeavors. He hopes that Founder Shield provides a platform for unlimited success and happiness for all that work there.

Advice from Benji Markoff, Co-Founder & CEO of Founder Shield

“It’s old news that cybercriminals have beefed up their attacks, with ransomware and phishing topping every bad actor’s to-do list, it seems. The pandemic spotlighted weak links in cybersecurity systems nationwide, and hackers didn’t waste one minute to attack — back door, front door, didn’t matter. Hybrid work schedules and burnt-out IT specialists make the waters even murkier. Naturally, cyber liability insurance is a hot commodity currently, and the insurance industry plays a significant role in helping companies stay protected. Unfortunately, the attacks keep coming. Flip the script, though, and all these negative headlines can serve as lessons learned. For starters, let’s remember that cross-functionality value also translates to cybersecurity training. The more employers raise awareness and implement in-depth training, the lower they’ll fall on a hacker’s checklist. Keep cybersecurity top-of-mind throughout your entire company. Also, don’t be shy about relying more heavily on your managed service provider (MSP). These companies are ever-broadening their scope of services. If eyes and ears are what you need, start negotiating new MSP contracts.”

Hexnode Founder and CEO Apu Pavithran

Apu Pavithran is the founder and CEO of Hexnode. Recognized in the IT management community as a consultant, speaker, and thought leader, Apu has been a strong advocate for IT governance and Information security management. In addition, he’s passionate about entrepreneurship and spends significant time working with startups and empowering young entrepreneurs.

Advice from Apu Pavithran, founder and CEO of Hexnode

“Enterprise customers in 2022 are looking for a seamless digital experience that they can adopt immediately. Unfortunately, while catering to this need businesses tend to overlook the cybersecurity risks involved in making this possible. 

In practice, cybersecurity decisions mostly take the backseat when associated with budgetary needs and business priorities, however, what comes with that is a successful ransomware attack that can completely turn the equation upside down.   So, while adopting a flexible working environment in a constantly changing IT landscape, I would strongly recommend having a device security policy and a UEM in place. This helps keep your sensitive information safe by making sure employee devices are always compliant. 

A patch management solution that comes along with the UEM solution will monitor your devices to make sure that there are no security vulnerabilities. The solution will also make sure that your device is running on the latest OS update and protected from threat actors. 

Endpoint security solutions like UEM’s will help secure businesses to an extent, But having the right tools can’t always ensure that your businesses are 100% secure. The biggest threat is always the human element in cyber security. So make sure that in your flexible work environment your employees are cyber aware with regular cyber awareness classes that cover updated cybersecurity best practices.”

Ivanti CEO Jeff Abbott

As CEO of Ivanti, Jeff Abbott oversees all aspects of the company’s growth strategy and direction. Before becoming CEO of Ivanti in October 2021, Jeff served as Ivanti’s President since January 2020. Jeff has over 25 years of experience working for enterprise software and services companies, including Accenture, Oracle, and Infor. Jeff holds degrees from the University of Tennessee and Georgia State University. He sits on the National Alumni Board at the University of Tennessee and has previously held board positions with the Georgia Leukemia and Lymphoma Society and the Posse Foundation.

Advice from Ivanti CEO Jeff Abbott:

The rapid shift to remote work has accelerated growth in new digital systems and workflows, leading to expanded enterprise attack surfaces. At the same time, threat actors have matured their tactics and targeted enterprise security gaps. For example, attackers have increasingly waged phishing attacks at mobile devices, which remote workers are using more than ever before, via text and SMS messages, instant messages, social media, and other modes of communication, beyond just corporate email. Ransomware has also continued to evolve, with attackers increasingly leveraging known vulnerabilities that have remote code execution and privilege escalation capabilities. Ransomware is a business, and threat actors are incentivized to find companies that are more likely to pay.

Organizations are struggling to proactively combat these growing cyber threats. A new study by Ivanti revealed that 71% of IT and security professionals found patching to be overly complex and time-consuming. 57% of respondents stated that the global transition towards a decentralized workspace has made patch management more complex to deal with. And 53% said that organizing and prioritizing vulnerabilities takes up most of their time. This is alarming because the longer vulnerabilities remain unpatched, the more exposed a business is at risk of an attack or ransomware. 

To effectively mitigate risk, companies should implement a Zero Trust security strategy. At its simplest, Zero Trust provides organizations continuous evaluation of their employee devices, endpoints, assets, and networks that business relies on. As part of an overall Zero Trust strategy, companies should invest in automated controls that proactively perform cyber hygiene tasks and reduce security risk across infrastructure and applications. This includes leveraging a combination of risk-based vulnerability prioritization and automated patch intelligence to identify and prioritize vulnerability weaknesses and then accelerate remediation. A proactive, end-to-end risk-based assessment strategy can drive business value and further reduce the mean time to detect, discover, remediate, and respond to cyber threats.

Orchestral Founder and EVP Dale Smith
As Orchestral’s Head of Revenue Technology & Operations, Dale leads the digital infrastructure team responsible for integrating customer-facing operations across marketing, sales, and customer success to deliver extraordinary customer experiences that accelerate revenue performance. Dale has over 30+ years of experience in the tech industry, including several roles that include engineering, marketing, business development, and product management. His current startup, Orchestral.ai, provides AI-enabled IT workflow automation & orchestration technologies that facilitate digital transformation for some of the world’s largest enterprises. 

Advice from Orchestral Founder and EVP Dale Smith

“Although there is an increasing amount of attention given to automation within the cybersecurity sector, there are still many gaps between the countless tools and SOAR/SIEM platforms found in a typical enterprise’s cybersecurity infrastructure.
To be sure, cybersecurity automation is a welcome and necessary focus for innovation in threat intelligence and response. But, as organization’s adopt cybersecurity automation, they are likely to discover that significant human intervention is still required to bridge the “silos of automation” that naturally develop around highly specialized security tools and platforms. It is at this point when the focus should shift to “cybersecurity orchestration”. Cybersecurity orchestration intelligently integrates all of the different and disparate tools, platforms and siloed automations so that information is shared across the entire cybersecurity infrastructure. In this context, cybersecurity automation and cybersecurity orchestration are complimentary stages of focus for developing security infrastructure capable of coordinating a truly “autonomous” threat response.”

Prometeo Co-Founder and CEO Rodrigo Tumaián

Rodrigo Tumaián is co-founder of Prometeo, a startup in the fintech area. He is also a co-founder of Truss, a company that provides information security services in the financial sector. His extensive experience working with national and international companies has enabled him to learn to adapt to any type of environment and help customers across a broad spectrum of business models, industries and revenue levels.

Advice from Prometeo Co-Founder and CEO Rodrigo Tumaián

“When we talk about Cybersecurity month to encourage awareness around the topic, we should keep in mind that it is something we must take action on every day.  The repercussions that are caused when we find ourselves in the middle of a problem or a serious cybersecurity issue, profoundly impact our digital ecosystem.  Constantly promote cybersecurity awareness – that’s what we’re focused on internally and with every customer – and we’re product of what we’re accomplishing with them and seeing them and we are very proud of what we have accomplished.”

Rapid.Space Founder and CEO Jean Paul Smets

Jean Paul is an entrepreneur, with 20 year experience and success in enterprise open source software for B2B markets. As Founder and CEO At Rapid.Space, he leads product and business development . Before Rapid.Space, Jean Paul founded Nexedi S.A the largest FLOSS publisher in the EU (4 M€ income). He founded VIFIB which invented edge computing in 2009 and contributed its technology to Rapid.Space. He holds a PhD in computer science, graduated from ENS Ulm and joined “corps des mines”.

Advice from Jean Paul Smets, Founder and CEO at Rapid.Space

 “If you use a cloud service, make sure  your cloud provider does not have access to your passwords or credentials (most have access and password leaks happen in average every year, as we all experienced). If you use containers, make sure you understand that they do not provide strong isolation (containers from other users on the same host may be able to access your sensitive data through security escalation, such as the one which happened to Azure in 9/2021)”

ThycoticCentrify CEO Art Gilliland

Art Gilliland is CEO at Centrify and brings proven success in the global enterprise software industry-leading large organizations in product development, enterprise infrastructure, cybersecurity, go-to-market strategy, and SaaS operations. He most recently was SVP/GM of the Symantec Enterprise Division of Broadcom, reporting to the CEO, where he led the integration and business operations post-acquisition. Before Symantec, Art held executive positions at Skyport Systems, HP, Symantec, and IMlogic.

Advice from ThycoticCentrify CEO Art Gilliland:

“As organizations execute on their digital transformations to adopt cloud and SaaS infrastructure it will become more essential to adopt tighter control over who has access to what. Investments in tighter controls over privileged access by using multi-factor authentication, centralizing identities, and enforcing least privilege can go a long way to securing modern infrastructure. This investment can not only make the user experience more seamless for those who need and should have access, but can also simultaneously harden defenses to reduce risk of becoming the next hack or ransomware victim.”   — Art Gilliland, CEO, ThycoticCentrify

How Services CPQ Helps Close Revenue Gaps

How Services CPQ Helps Close Revenue Gaps

Bottom Line: Professional services (PS) organizations need to close the gaps in their CPQ selling strategies to win more deals, capture more revenue and protect margins from ongoing price pressure.

Why Services CPQ Is Too Slow Today

When PS organizations compete in sales cycles, the first competitor to have a complete quote with accurate pricing, schedules, and an engagement plan will often win. However, getting a complete quote out fast is a major challenge for most PS organizations today. Many PS organizations manually create their quotes by taking into account a broad base of factors that include the following: talent profiles of employees and the market value of their skills; utilization rates; direct and indirect engagement costs; typical gross margins by type of engagement; and, competitive pricing. The average PS organization takes six weeks to deliver a quote or proposal. John Ragsdale’s excellent recent article Automating Services Quote-to-Cash: Emergence of CPQ for Services provides useful insights into what needs to change for PS quoting and selling to increase its velocity.

Getting Services CPQ Right Is Hard

Gaps that drain revenue and margin grow wider when PS organizations attempt to use product-centric CPQ platforms to sell services. Too often, PS organizations attempt to wedge their quoting, pricing, and revenue management into a product-based CPQ system – and get mediocre results at best. Earlier in my career, I led a product management team that defined, created, and launched a quoting system for professional services inside a large IT organization. The most valuable lessons learned from that experience include the following:

  • PS bundles only work if they have simple, solid direct cost structures. Adding a synthetic SKU that represents a PS bundle only works for the most simple, automated PS engagements. Think of those PS engagements with long-standing direct cost structures that are simple, clear and easy to implement. Attempting to group PS bundles can easily lead to quoting mistakes that drain margin when a product-centric CPQ system is used for PS.
  • The greater the differences in PS revenue management, the more the need for a new CPQ platform. Many PS organizations are making a mistake by attempting to make product-centric CPQ platforms work for their unique costing, pricing, and selling needs. My team and I learned that the more a PS revenue model is unique and one-of-a-kind, the more it requires a unique CPQ platform.
  • Getting product-based CPQ rules and constraint logic right is hard in PS. Our teams’ biggest challenge in recycling IT’s CPQ app for PS was how difficult it was to get the rules-based engine to work for the wide variety of variables in a common service engagement. Rules created for transaction velocity needed to be reworked for greater variety. PS engagements didn’t follow a common logic structure like a product, making the constraint logic code only somewhat usable.
  • Only launch after CRM and Revenue Management integration is complete. Our team was handed a project that had languished in IT for nearly a year because PS selling teams wouldn’t use it. The problem was that the quoting module ran batch updates to a series of databases to get customer records and fetch the latest price tables off of a mainframe. In addition, CPQ wasn’t connected in real-time to CRM or Revenue Management.

Closing Long-Standing Services CPQ Gaps

The more a Services CPQ app can close the gaps between CRM, PSA, Revenue Management, and CPQ apps and their workflows, the more effective it will be stopping margin and revenue leakage. Having APIs that share data in real-time between CRM, PSA, and Revenue Management within each quote creation session has the potential to save thousands of hours a year. FinancialForce’s recently announced Services CPQ shows how a platform-based integration strategy works. The following graphic shows how revenue potential increases as a Services CPQ’s systems become more integrated.

How Services CPQ Helps Close Revenue Gaps

FinancialForce’s approach to taking on the challenge of providing an enterprise-grade Services CPQ is noteworthy for several reasons, including the following:

  • Real-time visibility and control of Services CPQ Effectiveness. Having Services CPQ, PSA and Revenue Management on the same Salesforce platform provides the visibility and control PS sales managers need to track quoting effectiveness by program, geography, customer segment, and rep. The more real-time the data integration across these systems the greater the potential for revenue growth in existing accounts and winning new ones.
  • Changing professional services quotes in real-time without impacting sales cycles is possible. Due to the integrated design of Services CPQ, one change made anywhere on a quote will replicate through the entire system and change all related factors immediately.
  • Getting in control of professional services engagement dates and utilization rates by associates helps reduce time-to-market and assures better time-to-customer performance. Keeping track of the myriad of factors that influence a services quote using a manually-based process is too slow for how quickly engagements are decided. Instead, having a single, unified data model that can track effectiveness and provide updates on how they impact engagement project plans is needed to excel at selling with Services CPQ. Adopting an agile CPQ strategy that relies on an integration thread to unify all systems is the secret to scaling and selling more with an agile approach to services CPQ.
  • Pricing needs to be one of the core strengths in an integrated Services CPQ platform. Realizing how a customers’ requested changes to a professional services engagement will impact costs and margins gives PS teams with an integrated system a formidable pricing advantage. FinancialForce’s approach to solving the Services CPQ challenge shows the potential to take on this challenge and provide its PS customers with the insights they need to upsell engagements – and not lose margin doing it.
  • A must-have for any Services CPQ platform is support for channel partner collaboration and team quoting. For any Services CPQ to scale up and deliver its full potential value, there needs to be support for customizing partner selling experiences while providing for team selling and quoting. FinancialForce solves this by relying on the Salesforce platform. By closing the gaps between the systems Services CPQ relies on, the channel selling teams and partners gain greater flexibility in defining customized products.

Conclusion

Services CPQ needs to scale out on a platform to achieve its full potential by providing the analytical insights to track engagement lifecycles and customer lifetime value by engagement. FinancialForce has proven they can do this in their Spring 2021 release. Taking on the most challenging aspects of a Services CPQ architecture starts by providing insights and guidance on how best to optimize the mix of associates and their utilization and billing rates, locations of each engagement, margin threshold levels, and the expected duration of each engagement. Additionally, the world’s leading professional services organizations could use an automated Services CPQ solution as many of them don’t rely on enough data, letting revenue leakage happen without knowing it.

 

2021 State Of The Machine Learning Market: Enterprise Adoption Is Strong

data science, machine learning, enterprise software, AI, artificial Intelligence
  • 59% of all large enterprises are deploying data science (DS) and machine learning (ML) today.
  • Nearly 50% of all organizations have up to 25 or more ML models in use today.
  • 29% of enterprises are refreshing their data science and machine learning models every day.
  • The higher the data literacy an enterprise can achieve before launching Data Science & Machine Learning initiatives, the higher the probability of success.

These and many other insights defining the state of the data science and machine learning market in 2021 are from Dresner Advisory Services’ 2021 Data Science and Machine Learning Market Study. The 7th annual report is noteworthy for its depth of analysis and insight into how data science and machine learning adoption is growing stronger in enterprises. In addition, the study explains which factors drive adoption and determine the key success factors that matter the most when deploying data science and machine learning techniques. The methodology uses crowdsourcing techniques to recruit respondents from over 6,000 organizations and vendors’ customer communities. As a result, 52% of respondents are from North America and 34% from EMEA, with the balance from Asia-Pacific and Latin America. 

“The perceived importance of data science and machine learning correlates with organizational success with BI, with users that self-report as completely successful with BI almost twice as likely to rate data science as critical,” said Jim Ericson, vice president, and research director at Dresner Advisory. “The perceived level of data literacy also correlates directly and positively with the current or likely future use of data science and machine learning in 2021.” 

Key insights from the study include the following:

  • 59% of large enterprises are deploying data science and machine learning in production today.  Enterprises with 10K employees or more lead all others in adopting and using DS and ML techniques, most often in R&D and Business Intelligence Competency Center (BICC)-related work. Large-scale enterprises often rely on DS and ML to identify how internal processes and workflows can be streamlined and made more cost-efficient. For example, the CEO of a manufacturing company explained on a recent conference call that DS and ML pilots bring much-needed visibility and control across multiple plants and help troubleshoot inventory management and supply chain allocation problems.
machine learning
  • The importance of data science and ML to enterprises has doubled in eight years, jumping from 25% in 2014 to 70% in 2021. The Dresner study notes that a record level of enterprises sees data science and ML as critically important to their business in 2021. Furthermore, 90% of enterprises consider these technologies essential to their operations, rating them critically important or very important. Successful projects in Business Intelligence Competency Centers (BICC) and R&D helped data science and ML gain broad adoption across all organizations. Larger-scale enterprises with over 10K employees are successfully scaling data science and ML to improve visibility, control, and profitability in organizations today.
machine learning
  • Enterprises dominate the recruiting and retention of data science and machine learning talent. Large-scale enterprises with over 10K employees are the most likely to have BI experts and data scientists/statisticians on staff. In addition, large-scale enterprises lead hiring and retention in seven of the nine roles included in the survey. It’s understandable how the Business Intelligence (BI) expertise of professionals in these roles is helping remove the roadblocks to getting more business value from data science and machine learning. Enterprises are learning how to scale data science and ML models to take on problems that were too complex to solve with analytics or BI alone.    
machine learning
  • 80% of DS and ML respondents most want model lifecycle management, model performance monitoring, model version control, and model lineage and history at a minimum. Keeping track of the state of each model, including version control, is a challenge for nearly all organizations adopting ML today. Enterprises reach ML scale when they can manage ML models across their lifecycles using an automated system. The next four most popular features of model rollback, searchable model repository, collaborative, model co-creation tools, and model registration and certification are consistent with the feedback from Data Science teams on what they need most in an ML platform. 
machine learning
  • Financial Services prioritize model lifecycle management and model performance monitoring to achieve greater scale from the tens of thousands of models they’re using today. Consistent with other research that tracks ML adoption by industry, the Dresner study found that Financial Services leads all other industries in their need for the two most valuable features of ML platforms, model lifecycle management and model performance monitoring. Retail and Wholesale are reinventing their business models in real-time to become more virtual while also providing greater real-time visibility across supply chains. ML models in these two industries need automated model version control, model lineage and history, model rollback, collaborative, model co-creation tools, and model registration and certification. In addition, retailers and Wholesalers are doubling down on data science and machine learning to support new digital businesses, improve supply chain performance and increase productivity.
machine learning
  • Enterprises need support for their expanding range of regression models, text analytics functions, and ensemble learning. Over the last seven years, text analytics functions and sentiment analysis’ popularity has continually grown. Martech vendors and the marketing technologists driving the market are increasing sentiment analysis’ practicality and importance. Recommendation engines and geospatial analysis are also experiencing greater adoption due to martech changing the nature of customer- and market-driven analysis and predictive modeling. 
machine learning
  • R, TensorFlow, and PyTorch are considered the three most critical open-source statistical and machine learning frameworks in 2021. Nearly 70% of respondents consider R important to getting work done in data science and ML. The R language has established itself as an industry standard and is well-respected across DevOps, and IT teams in financial services, professional services, consulting, process, and discrete manufacturing. Tensorflow and Pytorch are considered important by the majority of organizations Dresner’s research team interviewed. They’re also among the most in-demand ML frameworks today, with new applicants having experience in all three being recruited actively today.   
machine learning
  • Data literacy predicts DS and ML program success rates. 64% of organizations say they have extremely high literacy rates, implying that DS and ML have reached mainstream adoption thanks partly to BI literacy rates in the past. Enterprises that prioritize data literacy by providing training, certification, and ongoing education increase success odds with ML. A bonus is that employees will have a chance to learn marketable skills they can use in their current and future positions. Investing in training to improve data literacy is a win/win.
machine learning
  • On-database analytics and in-memory analytics (both 91%), and multi-tenant cloud services (88%) are the three most popular technologies enterprises rely on for greater scalability. Dresner’s research team observes that the scalability of data science and machine learning often involves multiple, different requirements to address high data volumes, large numbers of users, data variety while supporting analytic throughput. Apache Spark support continues to grow in enterprises and is the fourth-most relied-on industry support for ML scalability.   
machine learning

The Most Innovative Companies of 2021 According to BCG

The Most Innovative Companies of 2021 According to BCG
Apple Headquarters, Apple Park in Cupertino, CA. 
  • Apple, Alphabet, Amazon, Microsoft, and Tesla are considered the five most innovative companies, according to BCG’s analysis of the 50 most innovative companies of 2021. 
  • Abbott Labs, AstraZeneca, Comcast, Mitsubishi, and Moderna join the top 50 most innovative companies for the first time this year.
  • The fastest movers include Toyota, who jumped from 41st to 21st; Salesforce, who jumped from 35th to 22nd; and Coca-Cola, who jumped from 48th to 28th.
  • 90% of companies that outperform on innovation outcomes demonstrate clear C-suite ownership of the innovation agenda.

These and many other insights are from the Boston Consulting Group’s (BCG) 15th annual report defining the world’s 50 most innovative companies in 2021. BCG surveyed 1,500 global innovation executives and found a 10% point increase, to 75%, in executives reporting that innovation is a top-three priority at their companies today. That’s the most significant year-over-year increase in the 15 global innovation surveys BCG has conducted since 2005. BCG’s Most Innovative Companies 2021: Overcoming the Innovation Readiness Gap is available for download free here (28 pp., PDF).  This years’ report methodology focuses on identifying the factors causing a large innovation readiness gap between the world’s most innovative companies and their peers across industries. Please see page 23 of the study for the methodology.

Key insights from BCGs’ most innovative companies of 2020 include the following:

  • Creating a new COVID-19 vaccine in less than a year, inventing test kits in weeks to protect public health, and redefining online shopping and safe home delivery reflect the versatility of the world’s most innovative companies in 2021. Pzifer, Moderna, and Merck & Company’s innate ability to innovate gave everyone a decade of their lives back. Delivering a vaccine in a year when the initial projection was a decade reflects the innovative efficiency of these companies. 2021 is the first year Abbott Labs, who invented and scaled the production of COVID-19 test kits, is included in the 50 most innovative companies worldwide. Amazon and Walmart’s logistics and e-commerce expertise helped ensure safe online shopping and fast home delivery was available to millions of people under stay-at-home orders.
The Most Innovative Companies of 2021 According to BCG
  • Five factors most differentiate the most and least innovative companies. The basis of BCG’s methodology to identify the 50 most innovative companies in 2021 centers on their innovation-to-impact (i2i) framework. The framework is designed to help companies measure the readiness of their innovation programs to operate at a consistently high level of efficiency and effectiveness. The BCG i2i scoring system identified five factors that most differentiate innovative company leaders and laggards. The five factors that best indicate how innovative a company has the potential to be are shown in the following graphic:  
The Most Innovative Companies of 2021 According to BCG

  • Lack of collaboration between sales, marketing & R&D is the major obstacle to innovation.    31% of all companies surveyed see poor collaboration between marketing and R&D as the most significant obstacle to improving the return on their innovation investments. According to BCG, the collaboration between marketing, sales, and R&D is the most challenging in the Pharmaceutical industry, where 42% of respondents say it’s the biggest hurdle to achieving more significant returns on innovation.
The Most Innovative Companies of 2021 According to BCG
  • Digital transformation of the core business is now a top priority for 75% of CEOs, and 65% of firms are doubling down on their plans for transformation with renewed urgency. BCG identified six success factors that together—and only together—flip the odds of digital transformation success from 30% to 80%. Those six success factors are close integration of digital strategy with the business strategy, commitment from the CEO through middle management, a talent core of digital superstars, business-led and flexible technology and data platforms, agile governance, and effective monitoring of progress toward defined outcomes.

Conclusion

Companies that know how to collaborate quickly between customer and R&D teams have an inside edge on being innovation leaders. The world’s most innovative companies also have senior management teams committed to the long-term success of nascent, unproven programs. There’s greater tolerance for risk, more of a focus on customers first and innovating around their needs, and an intuitive sense of how to close innovation gaps that hold other companies back.  

The Top 20 Machine Learning Startups To Watch In 2021

.
  • There are a record number of 9,977 machine learning startups and companies in Crunchbase today, an 8.2% increase over the 9,216 startups listed in 2020 and a 14.6% increase over the 8,705 listed in 2019.
  • Artificial Intelligence (A.I.) and machine learning (ML)-related companies received a record $27.6 billion in funding in 2020, according to Crunchbase. 
  • Of those A.I. and machine learning startups receiving funding since January 1, 2020, 62% are seed rounds, 31% early-stage venture rounds and 6.7% late-stage venture capital-funded rounds.
  • A.I. and machine learning startups’ median funding round was $4.4 million and the average was $29.8 million in 2020, according to Crunchbase.

Throughout 2020, venture capital firms continued expanding into new global markets, with London, New York, Tel Aviv, Toronto, Boston, Seattle and Singapore startups receiving increased funding. Out of the 79 most popular A.I. & ML startup locations, 15 are in the San Francisco Bay Area, making that region home to 19% of startups who received funding in the last year. Israel’s Tel Aviv region has 37 startups who received venture funding over the last year, including those launched in Herzliya, a region of the city known for its robust startup and entrepreneurial culture.  

The following graphic compares the top 10 most popular locations for A.I. & ML startups globally based on Crunchbase data as of today:

Top 20 Machine Learning Startups To Watch In 2021

Augury – Augury combines real-time monitoring data from production machinery with AI and machine learning algorithms to determine machine health, asset performance management (APM) and predictive maintenance (PdM) to provide manufacturing companies with new insights into their operations. The digital machine health technology that the company offers can listen to the machine, analyze the data and catch any malfunctions before they arise. This enables customers to adjust their maintenance and manufacturing processes based on actual machine conditions. The platform is in use with HVAC, industrial factories and commercial facilities.

Alation – Alation is credited with pioneering the data catalog market and is well-respected in the financial services community for its use of A.I. to interpret and present data for analysis. Alation has also set a quick pace to evolving its platform to include data search & discovery, data governance, data stewardship, analytics and digital transformation. With its Behavioral Analysis Engine, inbuilt collaboration capabilities and open interfaces, Alation combines machine learning with human insight to successfully tackle data and metadata management challenges. More than 200 enterprises are using Alation’s platform today, including AbbVie, American Family Insurance, Cisco, Exelon, Finnair, Munich Re, New Balance, Pfizer, Scandinavian Airlines and U.S. Foods. Headquartered in Silicon Valley, Alation is backed by leading venture capitalists including Costanoa, Data Collective, Icon, Sapphire and Salesforce Ventures.

Algorithmia – Algorithmia’s expertise is in machine learning operations (MLOps) and helping customers deliver ML models to production with enterprise-grade security and governance. Algorithmia automates ML deployment, provides tooling flexibility, enables collaboration between operations and development and leverages existing SDLC and CI/CD practices. Over 110,000 engineers and data scientists have used Algorithmia’s platform to date, including the United Nations, government intelligence agencies and Fortune 500 companies.

Avora – Avora is noteworthy for its augmented analytics platform, making in-depth data analysis intuitively as easy as performing web searches. The company’s unique technology hides complexity, empowering non-technical users to run and share their reports easily. By eliminating the limitations of existing analytics, reducing data preparation and discovery time by 50-80% and accelerating time to insight, Avora uses ML to streamline business decision-making. Headquartered in London with offices in New York and Romania, Avora helps accelerate decision making and productivity for customers across various industries and markets, including Retail, Financial Services, Advertising, Supply Chain and Media and Entertainment.

Boast.ai – Focused on helping companies in the U.S. and Canada recover their R&D costs from respective federal governments, Boast.ai enables engineers and accountants to gain tax credits using AI-based tools. Some of the tax programs Boast.ai works with include US R&D Tax Credits, Scientific Research and Experimental Development (SR&ED) and Interactive Digital Media Tax Credits (IDMTC). The startup has offices in San Francisco, Vancouver and Calgary.

ClosedLoop.ai – An Austin, Texas-based startup, ClosedLoop.ai has created one of the healthcare industry’s first data science platforms that streamline patient experiences while improving healthcare providers’ profitability.  Their machine learning automation platform and a catalog of pre-built predictive and prescriptive models can be customized and extended based on a healthcare provider’s unique population or client base needs. Examples of their technology applications include predicting admissions/readmissions, predicting total utilization & total risk, reducing out-of-network utilization, avoiding appointment no-shows, predicting chronic disease onset or progression and improving clinical documentation and reimbursement. The Harvard Business School, through its Kraft Precision Medicine Accelerator, recently named ClosedLoop.ai as one of the fastest accelerating companies in its Real World Data Analytics Landscapes report.

Databand – A Tel Aviv-based startup that provides a software platform for agile machine learning development, Databand was founded in 2018 by Evgeny Shulman, Joshua Benamram and Victor Shafran. Data engineering teams are responsible for managing a wide suite of powerful tools but lack the utilities they need to ensure their ops are running properly. Databand fills this gap with a solution that enables teams to gain a global view of their data flows, make sure pipelines complete successfully and monitor resource consumption and costs. Databand fits natively in the modern data stack, plugging seamlessly into tools like Apache Airflow, Spark, Kubernetes and various ML offerings from the major cloud providers.

DataVisor – DataVisor’s approach to using AI for increasing fraud detection accuracy on a platform level is noteworthy. Using proprietary unsupervised machine learning algorithms, DataVisor enables organizations to detect and act on fast-evolving fraud patterns and prevent future attacks before they happen. Combining advanced analytics and an intelligence network of more than 4.2B global user accounts, DataVisor protects against financial and reputational damage across various industries, including financial services, marketplaces, e-commerce and social platforms. They’re one of the more fascinating cybersecurity startups using AI today.

Exceed.ai – What makes Exceed.ai noteworthy is how their AI-powered sales assistant platform automatically communicates the lead’s context and enables sales and marketing teams to scale their lead engagement and qualification efforts accordingly. Exceed.ai follows up with every lead and qualifies them quickly through two-way, automated conversations with prospects using natural language over chat and email. Sales reps are freed from performing error-prone and repetitive tasks, allowing them to focus on revenue-generating activities such as phone calls and demos with potential customers.

Indico – Indico is a Boston-based startup specializing in solving the formidable challenge of how dependent businesses are on unstructured content yet lack the frameworks, systems and tools to manage it effectively. Indico provides an enterprise-ready A.I. platform that organizes unstructured content while streamlining and automating back-office tasks. Indico is noteworthy given its track record of helping organizations automate manual, labor-intensive, document-based workflows.  Its breakthrough in solving these challenges is an approach known as transfer learning, which allows users to train machine learning models with orders of magnitude fewer data than required by traditional rule-based techniques. Indico enables enterprises to deploy A.I. to unstructured content challenges more effectively while eliminating many common barriers to A.I. & ML adoption.

LeadGenius – LeadGenius is noteworthy for its use of AI to provide personalized and actionable B2B lead information that helps its clients attain their global revenue growth goals. LeadGenius’s worldwide team of researchers uses proprietary technologies, including AI and ML-based techniques, to deliver customized lead generation, lead enrichment and data hygiene services in the format, methods and frequency defined by the customer. Their mission is to enable B2B sales and marketing organizations to connect with their prospects via unique and personalized data sets.

Netra – Netra is a Boston-based startup that began as part of MIT CSAIL research and has multiple issued and pending patents on its technology today. Netra is noteworthy for how advanced its video imagery scanning and text metadata interpretation are, ensuring safety and contextual awareness. Netra’s patented A.I. technology analyzes videos in real-time for contextual references to unsafe content, including deepfakes and potential cybersecurity threats. 

Particle –  Particle is an end-to-end IoT platform that combines software including A.I., hardware and connectivity to provide a wide range of organizations, from startups to enterprises, with the framework they need to launch IoT systems and networks successfully.  Particle customers include Jacuzzi, Continental Tires, Watsco, Shifted Energy, Anderson EV, Opti and others. Particle is venture-backed and has offices in San Francisco, Shenzhen, Las Vegas, Minneapolis and Boston. Particle’s developer community includes over 200,000 developers and engineers in more than 170 countries today.

RideVision – RideVision was founded in 2018 by motorcycle enthusiasts Uri Lavi and Lior Cohen. The company is revolutionizing the motorcycle-safety industry by harnessing the strength of artificial intelligence and image-recognition technology, ultimately providing riders with a much broader awareness of their surroundings, preventing collisions and enabling bikers to ride with full confidence that they are safe. RideVision’s latest round was $7 million in November of last year, bringing their total funding to $10 million in addition to a partnership with Continental AG.

Savvie – Savvie is an Oslo-based startup specializing in translating large volumes of data into concrete actions that bakery and café owners can utilize to improve their bottom line every day.  In doing so, we help food businesses make the right decisions to optimize their operations and increase profitability while reducing waste at its source. What’s noteworthy about this startup is how adept they are at fine-tuning ML algorithms to provide their clients with customized recommendations and real-time insights about their food and catering businesses.  Their ML-driven insights are especially valuable given how bakery and café owners are pivoting their business models in response to the pandemic.

SECURITI.ai – One of the most innovative startups in cybersecurity, combining AI and ML to secure sensitive data in multi-cloud and mixed platform environments, SECURITI.ai is a machine learning company to watch in 2021, especially if you are interested in cybersecurity.  Their AI-powered platform and systems enable organizations to discover potential breach risk areas across multi-cloud, SaaS and on-premise environments, protect it and automate all private systems, networks and infrastructure functions.

SkyHive – SkyHive is an artificial intelligence-based SaaS platform that aims to reskill enterprise workforces and communities. It develops and commercializes a methodology, Quantum Labor Analysis, to deliver real-time, skill-level insights into internal workforces and external labor markets, identify future and emerging skills and facilitate individual-and company-level reskilling. SkyHive is industry-agnostic and supporting enterprise and government customers globally with a mission to reduce unemployment and underemployment. Sean Hinton founded the technology company in Vancouver, British Columbia, in 2017.

Stravito – Stravito is an A.I. startup that’s combining machine learning, Natural Language Processing (NLP) and Search to help organizations find and get more value out of the many market research reports, competitive, industry, market share, financial analysis and market projection analyses they have by making them searchable. Thor Olof Philogène and Sarah Lee founded the company in 2017, who identified an opportunity to help companies be more productive, getting greater value from their market research investments. Thor Olof Philogène and Andreas Lee were co-founders of NORM, a research agency where both worked for 15 years serving multinational brands, eventually selling the company to IPSOS. While at NORM, Anders and Andreas were receiving repeated calls from global clients that had bought research from them but could not find it internally and ended up calling them asking for a copy. Today the startup has Carlsberg, Comcast, Colruyt Group, Danone, Electrolux, Pepsi Lipton and others. Stravito has offices in Stockholm (H.Q.), Malmö and Amsterdam.

Verta.ai – Verta is a startup dedicated to solving the complex problems of managing machine learning model versions and providing a platform to launch models into production. Founded by Dr. Manasi Vartak, Ph.D., a graduate of MIT, who led a team of graduate and undergraduate students at MIT CSAIL to build ModelDB, Verta is based on their work define the first open-source system for managing machine learning models. Her dissertation, Infrastructure for model management and model diagnosis, proposes ModelDB, a system to track ML-based workflows’ provenance and performance. In August of this year, Verta received a $10 million Series A round led by Intel Capital and General Catalyst, who also led its $1.7 million seed round. For additional details on Verta.ai, please see How Startup Verta Helps Enterprises Get Machine Learning Right. The Verta MLOps platform launch webinar provides a comprehensive overview of the platform and how it’s been designed to streamline machine learning models into production:

V7 – V7 allows vision-based A.I. systems to learn continuously from training data with minimal human supervision. The London-based startup emerged out of stealth in August 2018 to reveal V7 Darwin, an image labeling platform to create training data for computer vision projects with little or no human involvement necessary. V7 specializes in healthcare, life sciences, manufacturing, autonomous driving, agri-tech, sporting clients like Merck, GE Healthcare and Toyota. V7 Darwin launched at CVPR 2019 in Long Beach, CA. Within its first year, it has semi-automatically annotated over 1,000 image and video segmentation datasets. V7 Neurons is a series of pre-trained image recognition applications for industry use. The following video explains how V7 Darwin works:

The Top 20 Cybersecurity Startups To Watch In 2021

  • Cybersecurity, privacy and security startups have raised $1.9 billion in three months this year, on pace to reach $7.6 billion or more in 2021, over four times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query today.
  • 22,156 startups who either compete in or rely on cybersecurity, security and privacy technologies and solutions as a core part of their business models today, 122 have pre-seed or seed funding in the last twelve months based on a Crunchbase Pro query.
  • From network and data security to I.T. governance, risk measurement, and policy compliance, cybersecurity is a growing industry estimated to be worth over $300B by 2025, according to C.B. Insight’s Emerging Trends Cybersecurity Report downloadable here.

Today, 680 cybersecurity, privacy, and security startups have received $6.8 billion in funding over the last twelve months, with $4 million being the median funding round and $12.6 million the average funding round for a startup. The number of startups receiving funding this year, funding amounts and the methodology to find the top 20 cybersecurity startups are all based on Crunchbase Pro analysis done today. 

New startups and established vendors are attracting record levels of investment as all organizations look to thwart increasingly complex, costly and unpredictable cyberattacks. There is an arms race going on between cyber attackers using A.I. and machine learning and the many startups and existing vendors whose goal is to contain them. CBInsights and PwC recently published their latest quarterly joint study of the venture capital landscape, MoneyTree™ Report, Q4, 2020. The study finds that monitoring and security deals were the third fastest-growing vertical in 2020, with Q4 being exceptional for all verticals, as the heat map below shows:

The 20 Best Cybersecurity Startups To Watch In 2021

Based on a methodology that equally weighs a startup’s ability to attract new customers, current and projected revenue growth, ability to adapt their solutions to growing industries and position in their chosen markets, the following are the top 20 cybersecurity startups to watch in 2021:

Axis Security – Axis Security’s Application Access Cloud™ is a purpose-built cloud-based solution that makes application access across networks scalable and secure. Built on zero-trust, Application Access Cloud offers a new agentless model that connects users online to any application, private or public, without touching the network or the apps themselves. Axis Security is a privately held company backed by Canaan Partners, Ten Eleven Ventures, and Cyberstarts. Axis is headquartered in San Mateo, California, with research and development in Tel Aviv, Israel.

Bitglass – What makes Bitglass unique and worth watching is how they are evolving their Total Cloud Security Platform to combine cloud access security brokerage, on-device secure web gateways, and zero-trust network access to secure endpoints across all devices. Its Polyscale Architecture is delivering uptimes of 99.99% in customer deployments. Bitglass’s 2020 Insider Threat Report has several interesting insights based on their recent interviews with a leading cybersecurity community. One interesting takeaway is 61% of those surveyed experienced an insider attack in the last 12 months (22% reported at least six).

Cado Security – Cado Security’s cloud-native forensics and response platform helps organizations respond to security incidents in real-time, averting potential breaches and security incidents. The Cado Response platform is built on analytics components that perform thorough forensic analyses of compromised systems. Cado’s platform, Cado Response, is an agentless, cloud-native forensics solution that allows security professionals to quickly and comprehensively understand an incident’s impact across all environments, including cloud and containers as well as on-premise systems. “Finding the root cause of security incidents in cloud or container environments is incredibly difficult. Traditional tools don’t support these new environments, and there is a shortage of people who know both forensics and cloud security,” said CEO James Campbell, formerly Director, Cyber Threat Detection and Response at PricewaterhouseCoopers. “Our Cado Response platform completely changes how security professionals can respond to incidents in the cloud.”

Confluera – Originally mentioned as one of the 20 Best Cybersecurity Startups To Watch In 2020, Confluera’s sustained innovation pace in the middle of a pandemic deserves special mention. They are one of the most resilient startups to watch in 2021.Confluera is a cybersecurity startup helping organizations find sophisticated security attacks going on inside of corporate infrastructures. The startup delivers autonomous infrastructure-wide cyber kill chain tracking and response by leveraging the ‘Continuous Attack Graph’ to stop and remediate cyber threats in real-time deterministically. Confluera’s platform is designed to detect and prevent attackers from navigating infrastructure. Confluera technology combines machine comprehended threat detection with accurately tracked activity trails to stop cyberattacks in real-time, allowing companies to simplify security operations radically. It frees up human security personnel to focus on more important work instead of spending hours trying to join the dots between the thousands of alerts they receive daily, many of which are false positives. The following is a video that explains how Confluera XDR for Cloud Infrastructure works:

DataFleets – DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance. The platform provides data scientists and developers with a “data fleet”​ that allows them to create analytics, ML models, and applications on susceptible data sets without direct access to the data. Each data fleet has easy-to-use APIs, and under-the-hood, they ensure data protection using advances in federated computation, transfer learning, encryption, and differential privacy. DataFleets helps organizations overcome data privacy and innovation struggle by maintaining data protection standards for compliance while accelerating data science initiatives.

DefenseStorm – DefenseStorm’s unique approach to providing cybersecurity and cyber-compliance for the banking industry make them one of the top startups to watch in 2021.  Their DefenseStorm GRID is the only co-managed, cloud-based and compliance-automated solution of its kind for the banking industry. It monitors everything on a bank’s network. It matches it to defined policies for real-time, complete and proactive cyber exposure readiness, keeping security teams and executives updated on bank networks’ real-time security status. The company’s Threat Ready Active Compliance (TRAC) Team augments its bank customers’ internal teams to protect business continuity and skills availability while ensuring cost-effective coverage and management.

Enso Security –  Enso is an application security posture management (ASPM) platform startup known for the depth of its insights and expertise in cybersecurity. With Enso, software security groups can scale and gain control over application security programs to protect applications systematically. The Enso ASPM platform discovers application inventory, ownership, and risk to help security teams quickly build and enforce security policies and transform AppSec into an automated, systematic discipline.

Ethyca –  Ethyca is an infrastructure platform that provides developers and product teams with the ability to ensure consumer data privacy throughout applications and services design. It also provides your product, engineering, and privacy teams with unmatched ease of use and functionality to better care about your user’s data. The company helps companies discover sensitive data and then provides a mechanism for customers to delete, see, or edit their data from the system. Ethyca’s mission is to increase trust in data-driven business by building automated data privacy infrastructure. Ethyca’s founder and CEO Cillian Kiernan is a fascinating person to speak with on the topics of privacy, security, GDPR, and CCPA compliance. He continues to set a quick pace of innovation in Ethyca, making this startup one of the most interesting in data privacy today. Here’s an interview he did earlier this year with France 24 English:

Havoc Shield – Havoc Shield reduces the burden on small and medium businesses (SMBs) by giving them access to advanced security technology that protects against data breaches, phishing, dark web activity, and other threats. The Havoc Shield platform offers comprehensive security and compliance features that meet the standards of Fortune 100 companies, making it easier for businesses working to win deals with those companies. “For a long time, cybersecurity technology has been virtually inaccessible to small businesses, who largely can’t afford those resources,” said Brian Fritton, CEO and co-founder of Havoc Shield. “We created Havoc Shield because we believe in democratizing cybersecurity for the little guy. Small businesses deserve the ability to protect what they’ve built, just as much as larger companies that have dedicated cybersecurity staff.” Since the end of Q2 2020, Havoc Shield has quadrupled its client list. In the coming months, the company aims to grow its team to help more small businesses protect themselves from threats and achieve customer trust.

Illumio – Widely considered the leader in micro-segmentation that prevents the spread of breaches inside data centers and cloud environments, Illumio is one of the most interesting cybersecurity startups to watch in 2021. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. The Illumio Adaptive Security Platform® uniquely protects critical information with real-time application dependency and vulnerability mapping coupled with micro-segmentation that works across any data center, public cloud, or hybrid cloud deployment on bare-metal, virtual machines, and containers. The following video explains why Illumio Core is a better approach to segmentation.

Immuta – Immuta was founded in 2015 based on a mission within the U.S. Intelligence Community to build a platform that accelerates self-service access to and control sensitive data. The Immuta Automated Data Governance platform creates trust across data engineering, security, legal, compliance, and business teams to ensure timely access to critical data with minimal risk while adhering to global data privacy regulations GDPR, CCPA, and HIPAA. Immuta’s automated, scalable, no-code approach makes it easy for users to access the data they need when they need it while protecting sensitive information and ensuring customer privacy. Selected by Fast Company as one of the World’s 50 Most Innovative Companies, Immuta is headquartered in Boston, MA, with offices in College Park, MD, and Columbus, OH.

Isovalent – Isovalent makes software that helps enterprises connect, monitor and secure mission-critical workloads in modern, cloud-native ways. Its flagship technology, Cilium, is the choice of leading global organizations, including Adobe, Capital One, Datadog, GitLab, and many more. Isovalent is headquartered in Mountain View, CA, and is backed by Andreessen Horowitz, Google and Cisco Investments. Earlier this month, Isovalent announced that it had raised $29 million in Series A funding, led by Andreessen Horowitz and Google with participation from Cisco Investments. Google recently selected Cilium as the next-generation dataplane for its GKE offering calling Cilium “the most mature eBPF implementation for Kubernetes out there” in its “New GKE Dataplane V2 increases security and visibility for containers” blog: https://cloud.google.com/blog/products/containers-kubernetes/bringing-ebpf-and-cilium-to-google-kubernetes-engine.

JupiterOne – JupiterOne, Inc. reduces cloud security cost and complexity, replacing guesswork with granular data about cyber assets and configurations. The company’s software helps security operations teams shorten the path to security and compliance and improve their overall posture through continuous data aggregation and relationship modeling across all assets. JupiterOne customers include Reddit, Databricks, HashiCorp, Addepar, Auth0, LifeOmic, and OhMD. Earlier this year, JupiterOne received $19 million in venture funding. The Series A round was led by Bain Capital Ventures, with additional investment from Rain Capital, LifeOmic, and individual investors. “JupiterOne has developed a compelling product that integrates quickly, has applicability across enterprise segments, and is highly reviewed by current customers,” said Enrique Salem, partner at Bain Capital Ventures and former CEO at Symantec. Salem now joins the JupiterOne board. “We see a multibillion-dollar market opportunity for this technology across mid-market and enterprise customers. Asset management is the first step in building a successful security program, and it’s currently a tedious, imperfect process that’s well-suited for automation.”

Lightspin –  Lightspin is a pioneer in contextual cloud security protecting native, Kubernetes, and microservices from known and unknown risks and has recently announced a $4 million seed funding round on November 24th. They will use the proceeds of the round to finance continued R&D on how to secure cloud infrastructures. The financing round was led by Ibex Investors LLC, the firm’s first global investment from its new $100 million early-stage fund, and also included participation from private angel investors. Lightspin’s technology uses graph-based tools and algorithms to provide rapid, in-depth visualizations of cloud stacks, analyze potential attack paths and detect the root causes, all of which are the most critical vulnerabilities that attackers can exploit.

Orca Security – Orca Security is noteworthy for its innovative approach to providing instant-on, workload-deep security for AWS, Azure, and GCP without the gaps in agents’ coverage and operational costs.Orca integrates cloud platforms as an interconnected web of assets, prioritizing risk based on environmental context. Delivered as SaaS, Orca Security’s patent-pending SideScanning™ technology reads cloud configuration and workloads’ runtime block storage out-of-band, detecting vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and unsecured PII.

SECURITI.ai – SECURITI.ai is an AI-Powered PrivacyOps company that helps automate all significant functions needed for privacy compliance on a single platform. It enables enterprises to grant individual and group rights to data and comply with global privacy regulations like CCPA and bolster their brands. They collect and manage consent from multiple sources, including web properties, web forms, and SaaS applications. Their AI-Powered PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface. SECURITI.ai was founded in November 2018 and is headquartered in San Jose, California.

SecureStack – SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing them to become security experts. The results are faster time to business and a 60%-70% reduction in the app attack surface.

The SecureStack platform’s intelligent automation manages security controls across distributed infrastructures using rules and profiles customizable by customers. SecureStack is noteworthy for its analytics and logging expertise in helping enterprises scale applications across cloud infrastructures.

Stairwell – What makes Stairwell one of the top startups to watch in 2021 is its unique approach to cybersecurity built around a vision that all security teams should be able to determine what alerts are threat-related or not and why. Mike Wiacek, the founder of Google’s Threat Analysis Group and co-founder and former Chief Security Officer of Alphabet moonshot Chronicle, leads the company as its CEO and founder. Wiacek is joined by Jan Kang, former Chief Legal Officer at Chronicle, as COO and General Counsel. Stairwell is backed by Accel Venture Partners, Sequoia Capital, Gradient Ventures, and Allen & Company LLC.

Ubiq Security – What makes Ubiq Security one of the top cybersecurity startups to watch in 2021 is how rapidly their API-based developer platform is maturing while gaining traction in the market. Ubiq Security recently signed commercial agreements with the United States Army and the Department of Homeland Security. This month, the startup announced it had raised $6.4 million in a seed equity investment round. Okapi Venture Capital, an early investor in Crowdstrike, led the round with participation from TenOneTen Ventures, Cove Fund, DLA Piper Venture, Volta Global, and Alexandria Venture Investments. Ubiq will use the funds to accelerate platform development, developer relations, and customer acquisition.

Unit21 – Unit21 helps protect businesses against adversaries through a simple API and dashboard to detect and manage money laundering, fraud, and other sophisticated risks across multiple industries. Former Affirm and Shape Security employees Trisha Kothari and Clarence Chio founded Unit21 in 2018 and work with customers like Intuit, Coinbase, Gusto, and Line to create a powerful & customizable rules engine for risk and compliance teams. Unit21’s highly flexible, customizable, and intelligent cloud-based system provides a configurable engine for transaction monitoring, identity verification, case management, operations management, and analytics and reporting. On October 19th of this year, Unit21 announced a $13 million funding round led by A.Capital Ventures. Additional participation includes investors such as Gradient Ventures (Google’s A.I. venture fund), Core V.C., South Park Commons, Diane Greene (founder of VMWare), William Hockey (founder of Plaid), Chris Britt and Ryan King (founders of Chime), Sumit Agarwal (founder of Shape Security), and Michael Vaughan (former COO of Venmo). Unit21 will use the new capital to grow its product and distribution-focused management team, increase sales and marketing efforts, and sell into new industries.

What Enterprises Need To Plan For In 2021 When It Comes To Endpoint Security

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

Bottom Line: Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021– which includes closely managing every stage of the device lifecycle, from deployment to decommission, and ensuring all sensitive data remains protected.

There’s a looming paradox facing nearly every organization today of how they’ll secure thousands of remote endpoints without having physical access to devices, and without disrupting worker productivity. Whether there’s the need to retire hardware as part of down-sizing or cost-cutting measures, or the need to equip virtual teams with newer equipment more suitable for long term work-from-home scenarios, this is one of the most pressing issues facing CISOs and CIOs today.

Wanting to learn more about how their customers are tackling their endpoint security challenges and how their companies are helping to solve it, I sat down (virtually) with Absolute Software’s President and CEO Christy Wyatt and Matthew Zielinski, President of North America Intelligent Devices Group at Lenovo. The following is my interview with both of them:

Louis Columbus: Christy and Matt, thanks so much for your time today. To get started, I would like each of you to share what you’re hearing from your customers regarding their plans to refresh laptops and other endpoint devices in 2021.

Christy Wyatt: We’re seeing a strong desire from organizations to ensure that every individual is digitally enabled, and has access to a screen. In some cases, that means refreshing the hardware they already have in the field, and in other cases, that means buying or adding devices. From the endpoint security standpoint, there’s been a shift in focus around which tools matter the most. When laptops were primarily being used on campus, there was a certain set of solutions to monitor those devices and ensure they remained secure. Now that 90% of devices are out of the building, an entirely different set of capabilities is required – and delivering those has been our focus.

Matt Zielinski: We are seeing historic levels of demand from consumers, as many are transitioning from having maybe one or two devices per household to at least one device per person. We’re also seeing the same levels of demand on both the education and enterprise side. The new dynamic of work-from-anywhere, learn-from-anywhere, collaborate-from-anywhere underscores that the device hardware and software need to be current in order to support both the productivity and security needs of hugely distributed workforces. That’s our highest priority.

Louis:  Where are CISOs in their understanding, evaluation, and adoption of endpoint security technologies?

Christy: The journey has been different for the education market than for the enterprise market. Most enterprise organizations were already on the digital path, with some percentage of their population already working remotely. And because of this, they typically have a more complex security stack to manage; our data shows that the total number of unique applications and versions installed on enterprise devices is nearly 1.5 million. What they’ve seen is a trifecta of vulnerabilities: employees taking data home with them, accessing it on unsecured connections, and not being aware of how their devices are protected beyond the WiFi connection and the network traffic.

In the education space, the challenges – and the amount of complexity – are completely different; they’re managing just a small fraction of that total number of apps and versions. That said, as the pandemic unfolded, education was hit harder because they were not yet at a point where every individual was digitally connected. There was a lot of reliance on being on campus, or being in a classroom. So, schools had to tackle digital and mobile transformation at the same time – and to their credit, they made multiple years of progress in a matter of weeks or months. This rapid rate of change will have a profound effect on how schools approach technology deployments going forward.

Matt: Whether in enterprise or education, our customers are looking to protect three things: their assets, their data, and their users’ productivity. It’s a daunting mission. But, the simplest way to accomplish it is to recognize the main control point has changed. It’s no longer the server sitting behind the firewall of your company’s or school’s IT environment. The vulnerability of the endpoint is that the network is now in the user’s hands; the edge is now the primary attack surface. I think CISOs realize this, and they are asking the right questions… I just don’t know if everyone understands the magnitude or the scale of the challenge. Because the problem is so critical, though, people are taking the time to make the right decisions and identify all the various components needed to be successful.

Louis:   It seems like completing a laptop refresh during the conditions of a pandemic could be especially challenging, given how entire IT teams are remote. What do you anticipate will be the most challenging aspects of completing a hardware refresh this year (2021)?

Matt:  The PC has always been a critical device for productivity. But now, without access to that technology, you are completely paralyzed; you can’t collaborate, you can’t engage, you can’t connect. Lenovo has always been focused on pushing intelligent transformation as far as possible to get the best devices into the hands of our customers. Beyond designing and building the device, we have the ability to distribute asset tags and to provide a 24/7 help desk for our customers whether you’re a consumer, a school, or a large institution. We can also decommission those devices at the end, so we’re able to support the entire journey or lifecycle.

The question has really become, how do you deliver secure devices to the masses? And, we’re fully equipped to do that. For example, every Lenovo X1 Carbon laptop comes out of the box with Lenovo Security Assurance, which is actually powered by Absolute; it is in our hardware. Our customers can open a Lenovo PC, and know that it is completely secure, right out of the box. Every one of our laptops is fortified with Absolute’s Persistence technology and self-healing capabilities that live in the BIOS. It’s that unbreakable, secure connection that makes it possible for us to serve our customers throughout the entire lifecycle of device ownership.

Louis: Why are the legacy approaches to decommissioning assets falling short / failing today? How would you redesign IT asset-decommissioning approaches to make them more automated, less dependent on centralized IT teams?

Christy: There have been a few very visible cases over the past year of highly regulated organizations, experiencing vulnerabilities because of how they decommissioned – or did not properly decommission – their assets. But, I don’t want anyone to believe that that this is a problem that is unique to regulated industries, like financial services. The move to the cloud has given many organizations a false sense of security, and it seems that the more data running in the cloud, the more pronounced this false sense of security becomes. It’s a mistaken assumption to think that when hardware goes missing, the security problem is solved by shutting down password access and that all the data is protected because it is stored in the cloud. That’s just not true. When devices aren’t calling in anymore, it’s a major vulnerability – and the longer the device sits without being properly wiped or decommissioned, the greater the opportunity for bad actors to take advantage of those assets.

The other piece that should be top of mind is that once a device is decommissioned, it’s often sold. We want to ensure that nothing on that device gets passed on to the next owner, especially if it’s going to a service or leasing program. So, we’ve concentrated on making asset decommissioning as precise as possible and something that can be done at scale, anytime and anywhere.

Matt:  Historically, reclaiming and decommissioning devices has required physical interaction. The pandemic has limited face-to-face encounters, so , we’re leveraging many different software solutions to give our customers the ability to wipe the device clean if they aren’t able to get the asset back in their possession, so that at least they know it is secure. Since we’re all now distributed, we’re looking at several different solutions that will help with decommissioning, several of which are promising and scale well given today’s constraints. Our goal is to provide our enterprise customers with decommissioning flexibility, from ten units to several thousand.

Louis:  Paradoxically, having everyone remote has made the business case for improving endpoint security more compelling too. What do you hear from enterprises about accelerating digital transformation initiatives that include the latest-generation endpoint devices?

Christy:  The same acceleration that I spoke about on the education side, we absolutely see on the enterprise side as well, and with rapid transformation comes increased complexity. There has been a lot of conversation about moving to Zero Trust, moving more services to the cloud and putting more controls on the endpoint – and not having these sort of layers in between. Our data tells us that the average enterprise device today has 96 unique applications, and at least 10 of them are security applications. That is a massive amount of complexity to manage. So, we don’t believe that adding more controls to the endpoint is the answer; we believe that what’s most important is knowing the security controls you have are actually working. And we need to help devices and applications become more intelligent, self-aware, and capable of fixing themselves. This concept of resiliency is the cornerstone of effective endpoint security, and a critical part of the shift to a more modern security architecture.

Matt: I think there are two major forcing functions: connection and security. Because we are all now remote, there’s a huge desire to feel connected to one another even though we aren’t sitting in the same room together. We’re modifying our products in real-time with the goal of removing shared pain points and optimizing for the new reality in which we’re all living and working. Things like microphone noise suppression and multiple far field microphones, so that if the dog barks or kids run into a room, the system will mute before you’ve even pressed the mute button. We’re improving camera technology from a processing standpoint to make things look better. Ultimately, our goal is to provide an immersive and connected experience.

Security, however, transcends specific features that deliver customer experiences – security is the experience. The features that make hardware more secure are those that lie beneath the operating system, in the firmware. That is why we have such a deep network of partners, including Absolute. Because you need to have a full ecosystem, and a program that takes advantage of all the best capabilities, in order to deliver the best security solution possible.

Louis: How is Absolute helping enterprise customers ensure greater endpoint security and resiliency in 2021 and beyond?

Christy: We spend a lot of time sitting with customers to understand their needs and how and where we can extend our endpoint security solutions to fit. We believe in taking a layered approach – which is the framework for defense in-depth, and an effective endpoint security strategy. The foundational piece, which we are able to deliver, is a permanent digital tether to every device; this is the lifeline. Not having an undeletable connection to every endpoint means you have a very large security gap, which must be closed fast. A layered, persistence-driven approach ensures our customers know their security controls are actually working and delivering business value. It enables our customers to pinpoint where a vulnerability is and take quick action to mitigate it.

Lenovo’s unique, high value-add approach to integrated security has both helped drive innovation at Absolute, while also providing Lenovo customers the strongest endpoint security possible. Their multilayer approach to their endpoint strategy capitalizes on Absolute’s many BIOS-level strengths to help their customers secure every endpoint they have. As our companies work together, we are both benefitting from a collaboration that seeks to strengthen and enrich all layers of endpoint security. Best of all, our shared customers are the benefactors of this collaboration and the results we are driving at the forefront of endpoint security.

Louis:  How has the heightened focus on enterprise cybersecurity in general, and endpoint security specifically, influenced Lenovo’s product strategy in 2021 and beyond?

Matt:  We have always been focused on our unique cybersecurity strengths from the device side and making sure we have all of the control points in manufacturing to ensure we build a secure platform. So, we’ve had to be open-minded about endpoint security, and diligent in envisioning how potential vulnerabilities and attack strategies can be thwarted before they impact our customers. Because of this mindset, we’re fortunate to have a very active partner community. We’re always scouring the earth for the next hot cybersecurity technology and potential partner with unique capabilities and the ability to scale with our model. This is a key reason we’ve standardized on Absolute for endpoint security, as it can accommodate a wide breadth of deployment scenarios. It’s a constant and very iterative process with a team of very smart people constantly looking at how we can excel at cybersecurity. It is this strategy that is driving us to fortify our Lenovo Security Assurance architecture over the long-term, while also seeking new ways of providing insights from existing and potentially new security applications.

Louis: What advice are you giving CISOs to strengthen endpoint security in 2021 and beyond?

Christy: One of our advisors is the former Global Head of Information Security at Citi Group, and former CISO of JP Morgan and Deutsche Bank. He talks a lot about his shared experiences of enabling business operations, while defending organizations from ever-evolving threats, and the question that more IT and security leaders need to be asking – which is, “Is it working?” Included in his expert opinion is that cybersecurity needs to be integral to business strategy – and endpoint security is essential for creating a broader secure ecosystem that can adapt as a company’s needs change.

I believe there needs to be more boardroom-level conversations around how compliance frameworks can be best used to achieve a balance between cybersecurity and business operations. A big part of that is identifying resiliency as a critical KPI for measuring the strength of endpoint controls.

 

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

  • 30% of US and UK remote workers say their organizations don’t require them to use a secure access tool, including VPN, to log into corporate databases and systems, according to Ivanti’s 2021 Secure Consumer Cyber Report.
  • Plus, 25% of remote workers in the US and UK aren’t required to have specific security software running on their devices to access certain applications while working remotely.
  • And one in four US remote workers use their work email and passwords to log in to consumer websites and apps.

Cybersecurity gaps have continued to widen during the pandemic. A noteworthy survey by Ivanti illustrates exactly how remote workers are putting organizations at risk and where enterprise security is falling short, making those cybersecurity gaps challenging for CISOs to close. Ivanti’s 2021 Secure Consumer Cyber Report outlines the challenges that cybersecurity and IT teams have faced when securing remote workers in what’s being described as the “Everywhere Workplace.” Based on interviews with more than 2,000 US and UK respondents working from home in November 2020, the survey shows that authentication and endpoint security needs to improve across all devices that employees use.

IT Organizations Need Help Closing Their Cybersecurity  Gaps

Of the many lessons learned from 2020, among the most valuable are how virtual workforces need self-diagnosing and self-remediating endpoints, while IT organizations need improved unified endpoint management (UEM) as part of a zero-trust strategy. Bad actors continue to target remote workers’ privileged access credentials to gain access and exfiltrate customer, financial and proprietary data, including intellectual property. Ivanti’s survey provides insights into where cybersecurity gaps need attention first:

  • The most challenging threat surface to protect is a person’s identity because it’s exposed across so many threat surfaces, including personal and work devices, consumer websites, and IoT devices in homes. The pandemic is proving identities are the new security perimeter. A person’s cell phone, personal tablet, and laptop is a real-time digital definition of a person’s identity. Nearly half (49%) of US remote workers use personal devices for their jobs, often without two-factor authentication enabled. The graphic below shows how organizations can close this cybersecurity gap by adopting UEM as part of their go-forward initiatives in 2021 and beyond:

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

  • Lack of consistent security software and password standards is a big contributor to US and UK organizations’ cybersecurity gaps today. One in four remote workers can access enterprise resources without any security software in place. An even more surprising finding is that 30% of remote workers in the US and UK can access corporate data without a secure access tool or VPN connection. If a remote worker’s identity is compromised, there’s a one in three chance that their organization will be breached, enabling cyberattackers to move laterally through the company’s systems:

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

  • Protecting remote workers’ identities & devices at scale requires Zero Trust. Automating as many tasks as possible while providing a continuous and seamless user experience is the surest way to close cybersecurity gaps. Getting rid of passwords and automating two-factor authentication using Zero Sign-On (ZSO), a core part of the Ivanti platform, is proving essential today. Zero Sign-On relies on proven biometrics, including Apple’s Face ID, as a secondary authentication factor to gain access to work email, unified communications and collaboration tools, and corporate-shared databases and resources. CISOs and their teams also need to consider how mobile threat defense can better secure personal devices against phishing, device, network, and malicious app threats. Late last year, MobileIron (now part of Ivanti) received its second mention in two years in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020. The Forrester Wave graphic is shown below:

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

  • In conclusion, enterprise cybersecurity gaps are widening due to a combination of risky consumer behavior and a lack of consistent security for mobile workforces. And these gaps will only increase as employees increasingly work from anywhere, using their personal devices to connect to corporate resources. To secure and enable the future of work, organizations need to start implementing and maturing an end-to-end zero trust security model today by leveraging new technologies and protecting their current security technology investments.

How To Digitally Transform Talent Management For The Better

How To Digitally Transform Talent Management For The Better

Bottom Line:  CHROs and the HR teams they lead need to commit to keep learning and adopting digital technologies that help improve how they hire, engage and retain talent if they’re going to stay competitive.

Driven by the urgency to keep connected with employees, customers and suppliers, McKinsey’s recent Covid-19 survey finds global organizations are now seven years ahead of schedule on digital transformation initiatives. HR’s role is proving indispensable in enabling the fast pace of digital adoption today. By providing Business Continuity Planning (BCP), HR’s contributions to digital transformation separate the organizations that thrive despite crises versus those left behind, according to McLean & Company’s 2021 HR Trends Report. The graphic below from the report shows how effective HR has been in supporting the rapid changes needed to keep employees communicating and engaged.

The McLean and Company Trends Report also shows that talent management’s major gaps need attention now before they grow wider. These areas include analyzing the employee skills gap (24%), developing employees on new competencies (24%), and training new employees in specific new skills (21%). Improving talent acquisition, retention, diversity and inclusion, and employee experiences by digitally transforming them with greater personalization at scale and visibility is key.  CHROs and the HR teams they lead need to close these gaps now.

How To Digitally Transform Talent Management For The Better

 

How To Get Started Digitally Transforming Talent Management

Start with the gaps in talent management you see in your organization. The largest gaps are often in the following four areas: recruiting and talent acquisition; retention of top talent and diverse talent; lack of visibility into employee capabilities; and workforce strategies not aligned to business strategies. Key challenges that need to drive digital transformation in these four areas include the following:

  • Legacy recruiting and Applicant Tracking Systems prioritize HR’s needs to capture thousands of resumes instead of delivering an excellent candidate experience. Attracting and recruiting the most qualified candidates in a virtual-first world is a daunting task. Organizations who are leaders in digital transformation quickly realized this and relied on automating the applicant experience so much it began to resemble the Amazon 1-Click Ordering experience. McKinsey’s recent Covid survey found that 75% of organizations digitally transforming their operations, including HR, were able to fill tech talent gaps during the crisis:

How To Digitally Transform Talent Management For The Better

Source: McKinsey & Company, 2020, How Covid-19 has pushed companies over the technology tipping point—and transformed business forever

 

  • Top talent retention is more of a problem than many organizations realize, with top performers receiving between five and ten recruiter calls a month or more. The average tenure of employees at companies has been decreasing for nearly two decades. And a primary driver is not for lack of opportunity, but because employees can’t find a career path internally as easily as they can find a growth opportunity at another company. It’s possible to retain the top talent by guiding employees to what’s next in their careers. Of the many approaches to providing employees a self-service option for personalized coaching guidance at scale, Eightfold’s Talent Intelligence Platform is delivering results at such notable companies as Air Asia, Micron, NetApp, and others. Eightfold found that 47% of top talent leave within two years, but most would happily stay if given the right opportunity. The following video explains how Eightfold helps its customers retain talent:

 

 

  • Employees often lack visibility into new internal opportunities, and both HR and business leaders lack visibility into employees’ unique capabilities. There’s often a 360-degree lack of visibility into new internal career positions from the employee’s side and a lack of awareness on the employer’s side of their employee’s innate capabilities. The lack of visibility from the employer side limits their ability to benchmark talent, create programmatic, scalable, and flexible career development opportunities and ultimately redeploy talent in an agile way that serves business strategies that are evolving rapidly in response to the impacts of the global pandemic.
  • Workforce strategies that don’t align and support business strategies waste opportunities to improve morale, productivity, and employees’ professional growth. While organizations have invested heavily in valuable infrastructure, including Learning Management Systems (LMS) and other employee experience and development tools, they often lack a unified platform to help deliver the right growth opportunities to the right person at the right time.

Achieving Greater Automation, Visibility And Personalization At Scale

Talent management is core to any digital business and the competitive outcomes each can produce today and in the future. To make greater contributions, Talent Management needs to deliver the following by relying on a unified platform:

  • Talent Management platforms need to combine ongoing business insights based on operations data, technology management data, and business transformation apps and tools to create new digitally-driven employee experiences quickly.
  • A key design goal of any Talent Management platform has to be delivering personalized candidate or prospect experiences at scale through every communications channel an organization relies on, both digital and human.
  • The best Talent Management platforms provide the apps, data, and contextual intelligence to drive task and mission ownership deep into an organization and reinforce accountability. What’s noteworthy about Eightfold’s Talent Intelligence Platform is that it has designed-in empathy and the ability to deliver quick, effective decisions that further reinforce team inclusion. Eightfold’s many customer wins in Talent Management illustrate how combining empathy, inclusion, and accountability in a platform’s design pays off.

As McLean & Company’s 2021 HR Trends Report shows, taking a band-aid approach to solving Talent Management’s many challenges is effective in the short-term. Turning Talent Management into a solid contributor to business strategies for the long-term needs to start at the platform level, however. Eightfold’s approach to combining their Talent Management, Talent Insights and Talent Acquisition modules, all supported by their Talent Intelligence Platform, enables their customers to define their digital transformation goals and strategies and get results.

Source: McKinsey & Company, 2020, How Covid-19 has pushed companies over the technology tipping point—and transformed business forever

Conclusion

The Talent Management goal many organizations aspire to today is to digitally transform candidate or prospect experiences so well that people have an immediate affinity for the company they apply to, and the self-service options are so intuitive they rival Amazon’s 1-Click Ordering Experience. Across any industry, digital transformation succeeds when customers’ expectations are exceeded so far that a new category gets created. Uber’s contextual intelligence, rating system, and ability to optimize ride requests is an example. UberEats provides the same real-time visibility into every step of each order, creating greater trust. Domino’s Pizza Tracker app keeps customers informed of every phase of their orders. What’s common across all these examples is personalization at scale, real-time automation across service providers, and real-time visibility. Those same core values need to be at the center of any Talent Management digital transformation effort today.

How LogicMonitor Buying Airbrake Unleashes DevOps To Do What They Do Best

Bottom Line:  LogicMonitor knows first-hand how much pressure DevOps teams are under to produce high-quality code in record time during the pandemic. Acquiring Airbrake proves they get it: DevOps has a high need for speed right now.

LogicMonitor Aims To Solve Today’s DevOps Paradox

The pandemic is forcing every business to make DevOps a core part of their DNA faster than any of them expected. The competitive strengths many banked on in a pre-pandemic world aren’t as relevant as having a steady pipeline of new apps, platforms, and digital channels are. It’s creating a paradox for DevOps: on the one hand, they’re expected to deliver perfect code, and on the other, it needs to be delivered in record time. Pre-pandemic, a typical DevOps team in a $500M+ enterprise has over 200 concurrent projects in progress, with over 70% dedicated to safeguarding and improving customer experiences according to IDC. Today, there are up to 2X more projects, and up to 80% are focused on cybersecurity.

No organization is perfect at DevOps today. Everyone is at various stages of maturity and growth. The pandemic puts a lot of pressure on DevOps teams to get their code right quickly and into a released app in record time. LogicMonitor must see it in their customer base every day. The trade-offs DevOps teams have to make for speed versus quality – and even security – when pushing out a release are real and often tend to overlook diagnostics. That’s why the Airbrake acquisition makes so much sense today. LogicMonitor bought Airbrake to help DevOps teams do what they do best.

The often-quoted Boston Consulting Group (BCG) article, Going All In With DevOps, illustrates the typical pressure DevOps is under to perform, including catching bugs early, solving them, and getting code into test and deployment. According to Airbrake, 73% of their DevOps customers are pushing code multiple times per week – and many said they were deploying code “multiple times per day.”  What makes Airbrake a perfect fit for LogicMonitor is how their developer-centric application error and performance monitoring service provides detailed diagnostics beyond the first layer of a bug or problem. In the context of the BCG graphic below, LogicMonitor buying Airbrake gives DevOps teams the diagnostics they need to move faster through error detection and into the test, deploy and release phases.

How LogicMonitor Buying Airbrake Unleashes DevOps To Do What They Do Best

Competing In Real-Time Is DevOps’ New Reality

  • 46% of DevOps teams are expected to build and deploy software faster now than before the pandemic, according to a recent survey by Checkmarx.
  • 36% of DevOps team members are struggling to keep up with increased dev speeds and demands, according to Checkmarx’s survey.
  • 55% of DevOps team members have taken on more security responsibility during the pandemic, according to Checkmark’s survey.

DevOps teams are struggling to keep up with their workloads today. LogicMonitor believes that by automating more monitoring processes and providing deeper contextual data and insight, DevOps teams can improve their response times and quality.

Automation pays off with more efficient continuous integration and deployment (CI/CD) cycles across DevOps teams, speeding up time-to-market and improving software quality in the process. Buying Airbrake extends LogicMonitor into developer environments and enables their shared customers to gain visibility into CI/CD workflows while reducing risk and ensuring every code release meets customer expectations. The following graphic illustrates how the CI/CD pipelines support DevOps. The more efficient continuous integration, testing, delivery, and operations, the more code releases DevOps can deliver at a higher quality, on time, and to customers’ expectations.

How LogicMonitor Buying Airbrake Unleashes DevOps To Do What They Do Best

Source: Deloitte, DevOps Point of View, An Enterprise Architecture perspective, Amsterdam, 2020

Conclusion

The best aspect of LogicMonitor acquiring Airbrake is how practical, pragmatic, and immediately useful their vision of providing unified observability is in supporting DevOps teams under pressure to perform today. Airbrake is LogicMonitor’s second acquisition in just over a year, having also acquired Stockholm-based log analytics company Unomaly in January 2020. LogicMonitor’s Airbrake page provides additional information.

%d bloggers like this: