DELMIAworks 2020X Shows Our Commitment To Keep Innovating For Our Customers

The most valuable conversations we have every day are with our customers. Their challenges, needs, and requirements continue to be an excellent source of innovation. Our latest release, DELMIAworks 2020X, reflects our commitment to keep innovating by collaborating with them. SHOPWORKS, an easily configurable series of Work Center dashboards designed to improve shop floor efficiency, is an example. We’re accomplishing this by integrating with RealTime™ data capture into the application, helping to reduce their reliance on paper-based reporting.

What’s New In DELMIAworks 2020X

Of the many new features in DELMIAworks 2020X, the majority are based on customer insights. Customer-driven new features in DELMIAworks 2020X include enhancements to Advanced Warehouse Management, Engineering Quote Workflows, Pallet Building, and more. Additional features include the following:

  • SHOPWORKS, a touchscreen-based shop floor interface to DELMIAworks 2020X that improves production efficiency with configurable Work Center dashboards.  Key benefits include streamlining data access and RealTime™ information collection and availability, improving quality, and reducing costs. SHOPWORKS also helps digitize manufacturing operations and improve production efficiency.
  • Significant new improvements to Advanced Warehouse Management, including Directed Task Drop Zones and Directed Task Monitoring.  Directed Task Drop Zones give DELMIAworks 2020X customers the flexibility of defining a specific drop zone in a warehouse as part of a broader WMS process. Directed Task Monitoring activates automated directed task generation for all inventory items and all work centers throughout the system.
  • Several new enhancements to Engineering Quote Workflows.  DELMIAworks 2020x includes several significant improvements to Engineering Quote Workflows. First, there are new improvements to the quote approval process. Streamlining Quote Workflows with user-defined Quote types is one of many new enhancements. Additional enhancements provide users with greater visibility across the entire quote workflow. There’s also support for new templates, team members, IQAlert evaluation, and workflow forms available.
  • More options and flexibility for customers relying on RealTime™ Process Monitoring Setup, Intelligent Reject Reporting, and RT Station. IoT solutions in use across shop floors frequently need an automated solution for reject reporting during production. Intelligent Reject Reporting is designed to capture reject data during production via sensors with little to no input from the user. Reject data captured during production is collected and processed by the system, then the rejects are assigned the default reject code set at the device level.

Conclusion

DELMIAworks 2020x exemplifies our commitment to excellence on behalf of our customers. We’re passionate about delivering a unified platform that can flex, change, and grow as our customers do. And with our industry-leading manufacturing expertise – many say the best in the ERP industry – we’ve got the team to help any customer achieve their operations, financial, and service goals. Our unified platform’s many strengths are amplified with our latest release, DELMIAworks 2020x. We’re providing customer-driven innovations that give you greater control, traceability, and visibility across every production process so you know the impact on your financials. We’re focused and working diligently to help our customers excel and gain new production efficiency while improving quality. SHOPWORKS is designed with that goal in mind. The bottom line is DELMIAworks is completely committed to unleashing our customers’ greatest strengths and opportunities to excel and grow. We measure our success by our contributions to your goals – and your innovative ideas are helping both of us excel every day. Thank you for your contributions.

The post DELMIAworks 2020X Shows Our Commitment To Keep Innovating For Our Customers appeared first on IQMS Manufacturing Blog.

How An AI Platform Is Matching Employees And Opportunities

How An AI Platform Is Matching Employees And Opportunities

Instead of relying on data-driven signals of past accomplishments, Eightfold.ai is using AI to discover the innate capabilities of people and matching them to new opportunities in their own companies.

Bottom Line: Eightfold.ai’s innovative approach of combining their own AI and virtual hackathons to create and launch new additions to their Project Marketplace rapidly is a model enterprises need to consider emulating.

Eightfold.ai was founded with the mission that there is a right career for everyone in the world. Since its founding in 2016, Eightfold.ai’s Talent Intelligence Platform continues to see rapid global growth, attracting customers across four continents and 25 countries, supporting 15 languages with users in 110 countries. Their Talent Intelligence Platform is built to assist enterprises with Talent Acquisition and Management holistically.

What’s noteworthy about Eightfold.ai’s approach is how they have successfully created a platform that aggregates all available data on people across an enterprise – from applicants to alumni – to create a comprehensive Talent Network. Instead of relying on data-driven signals of past accomplishments, Eightfold.ai is using AI to discover the innate capabilities of people and matching them to new opportunities in their own companies. Eightfold’s AI and machine learning algorithms are continuously learning from enterprise and individual performance to better predict role, performance and career options for employees based on capabilities.

How Eightfold Sets A Quick Pace Innovating Their Marketplace

Recently Eightfold.ai announced Project Marketplace, an AI-based solution for enterprises that align employees seeking new opportunities and companies’ need to reskill and upskill their employees with capabilities that line up well with new business imperatives. Eightfold wanted to provide employees with opportunities to gain new skills through experiential learning, network with their colleagues, join project teams and also attain the satisfaction of helping flatten the unemployment curve outside. Project Marketplace helps employers find hidden talent, improve retention strategies and gain new knowledge of who has specific capabilities and skills. The following is a screen from the Marketplace that provides employees the flexibility of browsing all projects their unique capabilities qualify them for:

How An AI Platform Is Matching Employees And Opportunities

Employees select a project of interest and are immediately shown how strong of a match they are with the open position. Eightfold provides insights into relevant skills that an employee already has, why they are a strong match and the rest of the project team members – often a carrot in itself. Keeping focused on expanding employee’s capabilities, Eightfold also provides guidance of which skills an employee will learn. The following is an example of what an open project positions looks like:

How An AI Platform Is Matching Employees And Opportunities

How An AI Platform Is Matching Employees And Opportunities

Employee applicants can also view all the projects they currently have open from the My Projects view shown below:

How An AI Platform Is Matching Employees And Opportunities

Project Marketplace is the win/win every employee has yearned for as they start to feel less challenged in their current position and start looking for a new one, often outside their companies. I recently spoke with Ashutosh Garg, CEO and Co-Founder and Kamal Ahluwalia, Eightfold’s President, to see how they successfully ran a virtual hackathon across three continents to keep the Marketplace platform fresh with new features and responsive to the market.

How to Run A Virtual Hackathon

Starting with the hackathon, Eightfold relied on its own Talent Intelligence Platform to define the teams across all three continents, based on their employees’ combined mix of capabilities. Ashutosh, Kamal and the senior management team defined three goals of the hackathon:

  1. Solve problems customers are asking about with solutions that are not on the roadmap yet.
  2. Accelerate time to value for customers with new approaches no one has thought of before.
  3. Find new features and unique strengths that further strengthen the company’s mission of finding the right career for everyone in the world.

It’s fascinating to see how AI, cybersecurity and revenue management software companies continue to innovate at a fast pace delivering complex apps with everyone being remote. I asked Ashutosh how he and his management team approached the challenge of having a hackathon spanning three continents deliver results. Here’s what I learned from our discussion and these lessons are directly applicable to any virtual hackathon today:

  1. Define the hackathon’s purpose clearly and link it to the company mission, explaining what’s at stake for customers, employees and the millions of people looking for work today – all served by the Talent Intelligence Platform broadening its base of features.
  2. Realize that what you are building during the hackathon will help set some employees free from stagnating skills allowing them to be more employable with their new capabilities.
  3. The hackathon is a chance to master new skills through experiential learning, further strengthening their capabilities as well. And often learning from some of the experts in the company by joining their teams.
  4. Reward risk-taking and new innovative ideas that initially appear to be edge cases, but can potentially be game changers for customers.

I’ve been interviewing CEOs from startups to established enterprise software companies about how they kept innovation alive during the lockdown. CEOs have mentioned agile development, extensive use of Slack channels and daily virtual stand-ups. Ashutosh Garg is the only one to mention how putting intrinsic motivation into practice, along with these core techniques, binds hackathon teams together fast. Dan Pink’s classic TED Talk, The Puzzle of Motivation, explains intrinsic motivators briefly and it’s clear they have implications on a hackathon succeeding or not.

Measuring Results Of the Hackathon

Within a weekend, Project Marketplace revealed several new rock stars amongst the Eightfold hackathon teams. Instead of doing side projects for people who had time on their hands, this Hackathon was about making Eightfold’s everyday projects better and faster. Their best Engineers and Services team members took a step back, re-looked at the current approaches and competed with each other to find better and innovative ways. And they all voted for the most popular projects and solutions – ultimate reward in gaining the respect of your peers. As well as the most “prolific coder” for those who couldn’t resist working on multiple teams.

Conclusion

Remote work is creating daunting challenges for individuals at home as well as for companies. Business models need to change and innovation cannot take a back seat while most companies have employees working from home for the foreseeable future. Running a hackathon during a global lockdown and making it deliver valuable new insights and features that benefit customers now is achievable as Eightfold’s track record shows. Project marketplace may prove to be a useful ally for employees and companies looking to stay true to their mission and help each other grow – even in a pandemic. This will create better job security, a culture of continuous learning, loyalty and more jobs. AI will change how we look at our work – and this is a great example of inspiring innovation.

How An AI Platform Is Matching Employees And Opportunities is copyrighted by Louis Columbus. If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft.


Enterprise Irregulars is sponsored by Salesforce and Zoho.

What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020

What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020

  • Remote working’s rapid growth is making endpoint security an urgent priority for all organizations today.
  • Cloud-first deployment strategies dominate the innovations on this year’s Hype Cycle for Endpoint Security.
  • Zero Trust Security (ZTNA) is gaining adoption in enterprises who realize identities are the new security perimeter of their business.
  • By 2024, at least 40% of enterprises will have strategies for adopting Secure Access Service Edge (SASE) up from less than 1% at year-end 2018.

These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and the recent announcement, Gartner Says Bring Your Own PC Security Will Transform Businesses within the Next Five Years. Gartner’s definition of Hype Cycles includes five phases of a technology’s lifecycle and is explained here.  There are 20 technologies on this year’s Hype Cycle for Endpoint Security. The proliferation of endpoint attacks, the rapid surge in remote working, ransomware, fileless and phishing attacks are together, creating new opportunities for vendors to fast-track innovation. Cloud has become the platform of choice for organizations adopting endpoint security today, as evidenced by the Hype Cycle’s many references to cloud-first deployment strategies.  The Gartner Hype Cycle for Endpoint Security, 2020, is shown below:

What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020

Details Of What’s New In Gartner’s Hype Cycle for Endpoint Security, 2020

  • Five technologies are on the Hype Cycle for the first time reflecting remote working’s rapid growth and the growing severity and sophistication of endpoint attacks. Unified Endpoint Security, Extended Detection and Response, Business E-Mail Compromise Protection, BYOPC Security and Secure Access Service Edge (SASE) are the five technologies added this year. Many organizations are grappling with how to equip their remote workforces with systems, devices and smartphones, with many reverting to have employees use their own. Bring your PC (BYOPC) has become so dominant so fast that Gartner replaced BYOD on this year’s Hype Cycle with the new term. Gartner sees BYOPC as one of the most vulnerable threat surfaces every business has today. Employees’ devices accessing valuable data and applications continues to accelerate without safeguards in place across many organizations.
  • Extended detection and response (XDR) are on the Hype Cycle for the first time, reflecting the trend of vendor consolidation across cybersecurity spending today. Gartner defines XDR as a vendor-specific, threat detection and incident response tool that unifies multiple security products into a security operations system. XDR and its potential to reduce the total cost and complexity of cybersecurity infrastructures is a dominant theme throughout this year’s Hype Cycle. XDR vendors are claiming that their integrated portfolios of detection and response applications deliver greater accuracy and prevention than stand-alone systems, driving down Total Cost of Ownership (TCO) and increasing productivity. Key vendors in XDR include Cisco, FireEye, Fortinet, McAfee, Microsoft, Palo Alto Networks, Sophos, Symantec and Trend Micro.
  • Business email compromise (BEC) protection is on the Hype Cycle for the first time this year. Phishing attacks cost businesses $1.8B in 2019, according to the FBI, underscoring the need for better security in the area of business email. Gartner defines business email compromise (BEC) protection as a series of solutions that detect and filter malicious emails that fraudulently impersonate business associates to misdirect funds or data. There have been many instances of business email compromise attacks focused on C-level executives, hoping that a fraudulent directive from them to subordinates leads to thousands of dollars being transferred to outside accounts or being sent in gift cards. Gartner found that fraudulent invoices accounted for 39% of such attacks in 2018, posing an internal risk to organizations and reputation risk.
  • Unified Endpoint Security (UES) is being driven by IT organizations’ demand for having a single security console for all security events. Gartner notes that successful vendors in UES will be those that can demonstrate significant productivity gains from the integration of security and operations and those that can rapidly process large amounts of data to detect previously unknown threats. CIOs and CISOs are looking for a way to integrate UES and Unified Endpoint Management (UEM), so their teams can have a single, comprehensive real-time console of all devices that provides alerts of any security events. The goal is to adjust security policies across all devices. Absolute’s approach to leveraging their unique persistence, resilience and intelligence capabilities are worth watching. Their approach delivers unified endpoint security by relying on their Endpoint Resilience platform that includes a permanent digital tether to every endpoint in the enterprise. By having an undeletable digital thread to every device, Absolute is enabling self-healing, greater visibility and control. Based on conversations with their customers in Education and Healthcare, Absolute’s unique approach gives IT complete visibility into where every device is at all times and what each device configuration looks like in real-time.
  • Unified Endpoint Management (UEM) is expanding rapidly beyond managing PCs and mobile devices to provide greater insights from endpoint analytics and deeper integration Identity and Access Management. Gartner notes interest in UEM remains strong and use-case-driven across their client base. UEM’s many benefits, including streamlining continuous OS updates across multiple mobile platforms, enabling device management regardless of the connection and having an architecture capable of supporting a wide range of devices and operating systems are why enterprises are looking to expand their adoption of UEM. Another major benefit enterprises mention is automating Internet-based patching, policy, configuration management. UEM leaders include MobileIron, whose platform reflects industry leadership with its advanced unified endpoint management (UEM) capabilities. MobileIron provides customers with additional security solutions integrated to their UEM platform, including passwordless multi-factor authentication (Zero Sign-On) and mobile threat defense (MTD). MTD is noteworthy for its success at MobileIron customers who need to validate devices at scale, establish user context, verify network connections, then detect and remediate threats.
  •  Gartner says ten technologies were either removed or replaced in the Hype Cycle because they’ve evolved into features of broader technologies or have developed into tools that address more than security. The ten technologies include protected browsers, DLP for mobile devices, managed detection and response, user and entity behavior analytics, IoT security, content collaboration platforms, mobile identity, user authentication, trusted environments and BYOD being replaced by BYOPC.

What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020 is copyrighted by Louis Columbus. If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft.


Enterprise Irregulars is sponsored by Salesforce and Zoho.

Why Digital Transformation Always Needs To Start With Customers First

Why Digital Transformation Always Needs To Start With Customers First

Customers’ expectations, preferences, changing patterns in how and why they purchase need to be the core of any digital transformation effort. With it, digital transformation projects flourish and take on a life of their own. Without it, I’ve seen digital transformation projects become myopic, narrowly focused, substituting internal metric gains for measures that matter most to customers.

Digital Maturity Drives Revenue

Anyone who has worked on a digital transformation project quickly sees how the most digitally mature organizations can turn their investments in transformation into revenue by overwhelming customers with value. Initiatives that put customers first can serve to generate greater confidence among C-level executives and board members, leading to more funding. This is because business cases for customer-centric digital transformation projects are easier to create, more defensible and best of all, point to revenue gains and cost reductions.

Deloitte Insights’ recent survey uncovering the connection between digital maturity and financial performance accurately reflects the true state of customer-centric digital transformation. The article explains how the more digitally mature an organization is, the more achievable gains are in diversity and inclusion, Corporate Social Responsibility (CSR), customer satisfaction, product quality, gross margin and long-term financial performance. Deloitte’s latest study finds a strong correlation between the digital maturity of an enterprise and its net revenue and net profit margin. The following graphic makes clear how valuable pursuing digital maturity is, with customers being at the center of all transformation efforts. This contributes to greater net revenue and net profit margin growth:

Why Digital Transformation Always Needs To Start With Customers First

A fascinating point regarding Deloitte Insights’ research is the correlation it uncovered between an organization’s digital transformation maturity and the benefits they gain in efficiency, revenue growth, product/service quality, customer satisfaction and employee engagement. They found a hierarchy of pivots successful enterprises make to keep pursuing more agile, adaptive organizational structures combined with business model adaptability, all driven by customer-driven innovation. The most digitally mature organizations can adopt new frameworks that prioritize market responsiveness, customer-centricity and have analytics and data-driven culture with actionable insights embedded in their DNA.

Mastering Data & Removing Roadblocks Are Key To Driving Customer Value

The two highest-payoff areas for accelerating digital maturity and achieving its many benefits are mastering data and creating more intelligent workflows. Deloitte Insights’ research team looked at the seven most effective digital pivots enterprises can make to become more digitally mature. The pivots that paid off the best as measured by revenue, margin, customer satisfaction, product/service quality and employee engagement combined data mastery and improving intelligent workflows. The following graphic shows how 51% of revenue growth can be explained by these two factors alone and 49% of improved customer satisfaction.

Why Digital Transformation Always Needs To Start With Customers First

Data mastery and intelligent workflows are among the easiest areas to measure and include in a business case for digital transformation projects aimed at delivering a transcendent customer experience. Choosing to excel on the dimension of customer-centric data mastery gives enterprises the insights they need to create their unique omnichannel platforms. Adding in intelligent workflows that give customers the freedom to buy how, where and when they choose across any digital platform is the cornerstone of entirely new digital business models today. Capturing the voice of the customer and combining data mastery and intelligent workflows to gain an accurate, true 360-degree view of customers is invaluable for every aspect of go-to-market strategies.

Achieving Digital Maturity Requires A Framework

Enterprises that have customer centricity and a data-driven mindset are the most likely to succeed with a digital transformation initiative. As the Deloitte Insights study inferred, the most digitally mature organizations are continually adapting to customer and market dynamics. They’re prioritizing market responsiveness, striving to improve customer-centricity and have data-driven cultures with actionable insights as part of their DNA. Enterprises who see new digital business model opportunities and act on them capitalize on these three areas of organizational strength. They’re also able to combine their data mastery and intelligent workflows to identify areas of competitive opportunity to help them excel for their customers.

Consider how cybersecurity is now part of any customer experience, for good and bad. Multi-factor Authentication (MFA) and many other forms of identity verification secure customer transactions, yet they can also cause dissatisfaction. For any digitally mature enterprise, integrating cybersecurity into their existing framework is a challenge. The growth of new frameworks designed to empower greater customer-centricity, agility and actionable insights across every facet of a business is a fascinating area of watch.

One of the more interesting is BMC’s Autonomous Digital Enterprise (ADE) framework, which is shown below. Mapping Deloitte Insights’ top investment priorities for the next 12 months across all digital maturity levels to the ADE framework shows why frameworks like BMC’s are gaining adoption, particularly as organizations look to run and reinvent themselves with new digital business models built around AI/ML capabilities. The following graphic provides insights into how Deloitte’s top investment priorities are integral to BMC’s Autonomous Digital Enterprise Framework and its many contributions to the success of new digital business growth.

Why Digital Transformation Always Needs To Start With Customers First

Conclusion

Quantifying the impact of having a customer-centric digital transformation strategy has proved elusive until recently. Deloitte Insights’ research shows how digital maturity enables greater gains from customer-centric digital transformation efforts. What’s fascinating about their research is how the progression of digital pivots leads to improved margin, revenue, customer satisfaction, diversity and inclusion and product quality gains. Equally interesting is the growing utility of frameworks like BMC’s, which are designed to enable long-standing enterprises to seamlessly embrace new digital business models, so they can flex and change with the world around them.

Why Digital Transformation Always Needs To Start With Customers First is copyrighted by Louis Columbus. If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft.


Enterprise Irregulars is sponsored by Salesforce and Zoho.

Where AIOps Is Delivering Results Today

Where AIOps Is Delivering Results Today

Bottom Line: Capitalizing on AI and machine learning’s inherent strengths to create contextual intelligence in real-time, LogicMonitor’s early warning and failure prevention systems reflect where AIOps is delivering results today.

LogicMonitor’s track record of making solid contributions to their customers’ ability to bring greater accuracy, insight, and precision into monitoring all IT assets is emerging as a de facto industry standard. Recently I was speaking with a startup offering Hosted Managed Services of a variety of manufacturing applications, and the must-have in their services strategy is LogicMonitor LM Intelligence. LogicMonitor’s AIOps platform is powered by LM Intelligence, enabling customers’ businesses to gain early warning into potential trouble spots in IT operations stability and reliability. LogicMonitor does the hard work for you with automated alert thresholds, AI-powered early warning capabilities, customizable escalation chains, workflows, and more.

Engineers who are working at the Hosted Managed Services provider I recently spoke with say LM Intelligence is the best use case of AI and machine learning to provide real-time alerts, contextual insights, discover new patterns in data, and make automation achievable. The following is an example of the LM Intelligence dashboard:

Where AIOps Is Delivering Results Today

How LogicMonitor’s Architecture Supports AIOps

One of the core strengths LogicMonitor continues to build on is integration, which they see as essential to their ability to excel at providing AIOps support for their customers. Their architecture is shown below. By providing real-time integration to public cloud platforms, combined with control over the entire IT infrastructure structure along with over 2,000 integrations from network to cloud, LogicMonitor excels at unifying diverse IT environments into a single, cohesive AIOps-based intelligence system.  The LogicMonitor platform collects cloud data through our cloud collectors. These collectors retrieve metrics such as the cloud provider health and billing information by making API calls to the cloud services. The collector is a Windows Service or background process that is installed in a virtual machine. This collector then pulls metrics from the different devices using a variety of different methods, including SNMP, WMI, perf Mon JMX, APIs, and scripts.

Where AIOps Is Delivering Results Today

Using AIOps To Monitor, Analyze, Automate

LogicMonitor has created an architecture that’s well-suited to support the three dominant dimensions of AIOps, including Monitoring, Analytics (AIOps), and Automating. Their product and services strategies in the past have reflected a strong focus on Monitoring. The logic of prioritizing Monitoring as a product strategy area was to provide the AI and machine learning models with enough data to train on so they could identify anomalies in data patterns faster. Their 2018/2019 major releases in the Monitor area reflect how the unique strength they have of capturing and making use of any IT asset that can deliver a signal is paying off. Key Monitor developers recently include the following:

  • Kubernetes Monitoring
  • Service Insight
  • Topology
  • Remote Sessions
  • Netflow
  • Configuration Monitoring
  • Public Cloud Monitoring
  • Applications Monitoring

LogicMonitor’s core strengths in AIOps are in the Anomaly Detection and Early Warning System areas of their product strategy. Their rapid advances in the Early Warning System development show where AIOps is delivering solid results today. Supporting the Early Warning System, there are Dynamic Thresholds and Root Cause Analysis based on Dependencies as well.

The Automate area of their product strategy shows strong potential for future growth, with the ServiceNow integration having upside potential. Today Alert Chaining and Workflow support integrations to Ansible, Terraform, Slack, Microsoft, Teama, Putter, Terraform, OpsGenie, and others.

Conclusion

LogicMonitor’s platform handles 300B metrics on any given day and up to 10B a month, with over 28K collectors deployed integrated with approximately 1.4M devices being monitored. Putting AI and machine learning to work, interpreting the massive amount of data the platform captures every day to fine-tune their Early Warning and Failure Prevention Systems, is one of the most innovative approaches to AIOps today. Their AIOps Early Warning System is using machine learning Algorithms to fine-tune Root Cause Analysis and Dynamic Thresholds continually. AIOps Log Intelligence is also accessing the data to complete Automatic Log Anomaly Detection, Infrastructure change detection, and Log Volume Reduction to Signal analysis.

Where AIOps Is Delivering Results Today is copyrighted by Louis Columbus. If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft.


Enterprise Irregulars is sponsored by Salesforce and Zoho.

5 Ways Machine Learning Can Thwart Phishing Attacks

5 Ways Machine Learning Can Thwart Phishing Attacks

Mobile devices are popular with hackers because they’re designed for quick responses based on minimal contextual information. Verizon’s 2020 Data Breach Investigations Report (DBIR) found that hackers are succeeding with integrated email, SMS and link-based attacks across social media aimed at stealing passwords and privileged access credentials. And with a growing number of breaches originating on mobile devices according to Verizon’s Mobile Security Index 2020, combined with 83% of all social media visits in the United States are on mobile devices according to Merkle’s Digital Marketing Report Q4 2019, applying machine learning to harden mobile threat defense deserves to be on any CISOs’ priority list today.

How Machine Learning Is Helping To Thwart Phishing Attacks

Google’s use of machine learning to thwart the skyrocketing number of phishing attacks occurring during the Covid-19 pandemic provides insights into the scale of these threats. On a typical day, G-Mail blocks 100 million phishing emails. During a typical week in April of this year, Google’s G-Mail Security team saw 18M daily malware and phishing emails related to Covid-19. Google’s machine learning models are evolving to understand and filter phishing threats, successfully blocking more than 99.9% of spam, phishing and malware from reaching G-Mail users. Microsoft thwarts billions of phishing attempts a year on Office365 alone by relying on heuristics, detonation and machine learning strengthened by Microsoft Threat Protection Services.

42% of the U.S. labor force is now working from home, according to a recent study by the Stanford Institute for Economic Policy Research (SIEPR). The majority of those working from home are in professional, technical and managerial roles who rely on multiple mobile devices to get their work done. The proliferating number of threat surfaces all businesses have to contend with today is the perfect use case for thwarting phishing attempts at scale.

What’s needed is a machine learning engine capable of analyzing and interpreting system data in real-time to identify malicious behavior. Using supervised machine learning algorithms that factor in device detection, location, user behavior patterns and more to anticipate and thwart phishing attacks is what’s needed today. It’s a given that any machine learning engine and its supporting platform needs to be cloud-based, capable of scaling to analyze millions of data points. Building the cloud platform on high-performing computing clusters is a must-have, as is the ability to iterative machine learning models on the fly, in milliseconds, to keep learning new patterns of potential phishing breaches. The resulting architecture would be able to learn over time and reside on the device recursively. Protecting every endpoint if it’s connected to WiFi or a network or not is a key design goal that needs to be accomplished as well. MobileIron recently launched one of the most forward-thinking approaches to solving this challenge and its architecture is shown below:

5 Ways Machine Learning Can Thwart Phishing Attacks

Five Ways Machine Learning Can Thwart Phishing Attacks 

The one point of failure machine learning-based anti-phishing apps continue to have is lack of adoption. CIOs and CISOs I’ve spoken with know there is a gap between endpoints secured and the total endpoint population. No one knows for sure how big that gap is because new mobile endpoints get added daily. The best solution to closing the gap is by enabling on-device machine learning protection. The following are five ways machine learning can thwart phishing attacks using an on-device approach:

1.    Have machine learning algorithms resident on every mobile device to detect threats in real-time even when a device is offline.  Creating mobile apps that include supervised machine learning algorithms that can assess a potential phishing risk in less than a second is what’s needed. Angular, Python, Java, native JavaScript and C++ are efficient programming languages to provide detection and remediation, so ongoing visibility into any malicious threat across all Android and iOS mobile devices can be tracked, providing detailed analyses of phishing patterns. The following is an example of how this could be accomplished:

5 Ways Machine Learning Can Thwart Phishing Attacks

2.    Using machine learning to glean new insights out of the massive amount of data and organizations’ entire population of mobile devices creates a must-have.  There are machine learning-based systems capable of scanning across an enterprise of connected endpoints today. What’s needed is an enterprise-level approach to seeing all devices, even those disconnected from the network.

3.    Machine learning algorithms can help strengthen the security on every mobile device, making them suitable as employees’ IDs, alleviating the need for easily-hackable passwords. According to Verizon, stolen passwords cause 81% of data breaches and 86% of security leaders would do away with passwords, if they could, according to a recent IDG Research survey. Hardening endpoint security to the mobile device level needs to be part of any organizations’ Zero Trust Security initiative today. The good news is machine learning algorithms can thwart hacking attempts that get in the way making mobile devise employees’ IDs, streamlining system access to the resources they need to get work done while staying secure.

4.    Keeping enterprise-wide cybersecurity efforts focused takes more than after-the-fact analytics and metrics; what’s needed is look-ahead predictive modeling based machine learning data captured at the device endpoint.  The future of endpoint resiliency and cybersecurity needs to start at the device level. Capturing data at the device level in real-time and using it to train algorithms, combined with phishing URL lookup, and Zero Sign-On (ZSO) and a designed-in Zero Trust approach to security are essential for thwarting the increasingly sophisticated breach attempts happening today.

5.    Cybersecurity strategies and the CISOs leading them will increasingly be evaluated on how well they anticipate and excel at compliance and threat deterrence, making machine learning indispensable to accomplishing these tasks. CISOs and their teams say compliance is another area of unknowns they need greater predictive, quantified insights into. No one wants to do a compliance or security audit manually today as the lack of staff due to stay-at-home orders makes it nearly impossible and no one wants to jeopardize employee’s health to get it done.  CISOs and teams of security architects also need to put as many impediments in front of threat actors as possible to deter them, because the threat actor only has to be successful one time, while the CISO/security architect have to be correct 100% of the time. The answer is to combine real-time endpoint monitoring and machine learning to thwart threat actors while achieving greater compliance.

Conclusion

For machine learning to reach its full potential at blocking phishing attempts today and more advanced threats tomorrow, every device needs to have the ability to know if an email, text or SMS message, instant message, or social media post is a phishing attempt or not. Achieving this at the device level is possible today, as MobileIron’s recently announced cloud-based Mobile Threat Defense architecture illustrates. What’s needed is a further build-out of machine learning-based platforms that can adapt fast to new threats while protecting devices that are sporadically connected to a company’s network.

Machine learning has long been able to provide threat assessment scores as well. What’s needed today is greater insights into how risk scores relate to compliance. Also, there needs to be a greater focus on how machine learning, risk scores, IT infrastructure and the always-growing base of mobile devices can be audited. A key goal that needs to be achieved is having compliance actions and threat notifications performed on the device to shorten the “kill chain” and improve data loss prevention.

5 Ways Machine Learning Can Thwart Phishing Attacks is copyrighted by Louis Columbus. If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft.


Enterprise Irregulars is sponsored by Salesforce and Zoho.

Growing Advertising Agency Improves Profitability by 6% and Reduces Accounts Payable Processing Time by 83% With Sage Intacct

As Red Door Interactive expanded over the past 18 years, tasks like time tracking, revenue recognition based on percent completion, and quarterly headcount budgeting became increasingly complex and cumbersome. Additionally, in the agency world, high turnover rates and new client contracts create constantly fluctuating headcount needs, so visibility into personnel forecasts is crucial. 

agency
agency

Red Door Interactive previously used a mix of Microsoft Dynamics SL, along with several other disjointed applications, causing the finance team to struggle with duplicate data entry and error-prone invoicing. After evaluating several financial management software options, including Oracle NetSuite, Red Door chose Sage Intacct for its flexibility and seamless connectivity.

By upgrading to a modern, cloud-based system, the agency improved profitability by 6%, sped up budgeting and planning by 85%, and saved over 55 hours on monthly workflows and reporting. 

“Visibility is where we’ve recognized the biggest gains from switching to Sage Intacct—its drill-down capabilities are night and day compared with Dynamics, and we love Sage Intacct’s permissions-based dashboards,” said Natalie Bonczek, controller at Red Door Interactive. “I save days of report preparation each month because we’ve created helpful self-service dashboards where our executives, client services team, and department heads can find relevant, timely business insight on demand.”

After implementing Sage Intacct, Red Door Interactive realized significant organizational benefits, including:

  • 33% improvement in finance team productivity: Sage Intacctslashed tasks that used to take hours or days down to just minutes—including new project creation, expense report processing, invoicing, revenue recognition, A/P, and reporting. Intuitive workflows, such as improved timesheet entry and multi-level approvals, helped boost overall finance team productivity by 33% while increasing invoice accuracy for clients.
  • Reduced A/P processing time by 83%:  Utilizing Sage Intacct’s Marketplace Partner Stampli, the team was able to substantially reduce AP processing time, to include time and effort of non-finance team members responsible for reviewing & approving AP invoices. The seamless two-way communication between the two platforms enables a nearly effortless process.
  • Sped budgeting and planning by 85%: Sage Intacct Budgeting and Planning allowed the finance team to replace quarterly budget and re-forecasting cycles that previously involved entering data, making adjustments, and re-creating five different master Excel worksheets with tabs for each of the agency’s 20 departments and separate office locations. By automating this, the finance team gained powerful functionality that eased the budgeting workload 85%.

“Sage Intacct Budgeting and Planning changed our process from a headache that took at least two days every quarter, to a simple two-hour task every six months,” Bonczek remembers. “Now, my team can better monitor headcount dynamics and easily run complex calculations and models to understand the potential impact of changing salaries or start dates. Since we create forecasts for leadership in half the time, we’re able to run more scenarios, and can distribute final budgets a week before the period starts, rather than after the fact.”

For more information on how Red Door Interactive uses Sage Intacct, view the full case study.

The post Growing Advertising Agency Improves Profitability by 6% and Reduces Accounts Payable Processing Time by 83% With Sage Intacct appeared first on ERP News.

Kanban and Scrum Compared

Kanban and Scrum are both Agile project management frameworks that can be applied to various situations. While they do have some points in common, they are largely different and were born to serve different functions. This can be seen in every part of their DNA, which can either make them great complementary tools or simply unfit for your particular operation.

Let’s take a closer look at what each of these project management tools involves. We’ll also try to spot the major differences between Kanban and Scrum and how they can be used together in certain scenarios.

kanban

What
Is Kanban?

The Kanban system is about visualizing your workflow
and limiting work in progress. The system was introduced in 1940 by industrial
engineer Taiichi Ohno. It was first used by the Toyota company to keep track of
processes and for asset management purposes as well.

Another goal of Kanban is to maximize flow or system
efficiency. Kanban teams tend to focus on reducing choke points or cycle time.
The key metrics used in Kanban are work in progress or WIP, cycle time, and
lead time.

It’s a highly visual system that uses a series of note
cards assigned with tasks that move through various columns until they are
completed. This allows team members and outside stakeholders to see the
progress of tasks in real-time.

Kanban’s main workflow stages are to do, in progress, in review, blocked, and done. The goal is to move everything from doing to do. You don’t start anything new until the work in progress level is below a predetermined threshold.

What
Is Scrum?

Scrum is primarily a software development methodology
and is different from Kanban in many ways. With scrum, a given problem or
feature is usually identified first. The software development
team
works in intervals called sprints and the whole team
will need to go through daily briefings. If they don’t complete the work on
time or issues are found with the existing solution, they go back for another
sprint.

Scrum teams have specific roles in each spring, though
they may change roles with each iterative improvement of the design or software
application. The goal is to keep things moving forward. The key metric in scrum
is velocity.

The
Differences Between Scrum and Kanban

Kanban is a continuous process
improvement
methodology that is ideal for
manufacturing. It is made for teams who want to have more control on single
items instead of large overarching projects where whole teams need to be
involved.

Scrum was intended for software development and is
quite frankly perfect for it. In fact, scrum will ideally end with the release
of a software package. Kanban keeps going as they try to make the continually
flowing process better and better.

One of the major differences between Scrum and Kanban is how change is managed. Change in scrum is tightly controlled. No one should make changes to the production software application until after the new software is thoroughly tested and approved by the customer. In Kanban, change can happen at any time, so it’s much more fluid and a better option for teams who may need to pivot fast or drop tasks altogether. It also allows us to quickly identify bottlenecks and assign resources in real-time.

Another thing that separates the two is how roles are
assigned. Scrum assigns roles like product owner, scrum master, and development
team, though everyone is considered equal. Kanban doesn’t assign roles, and
also allows for much more independence. Kanban doesn’t have fixed delivery
dates either, while scrum sprints are supposed to have a fixed length interval
which is normally two weeks.

How
Do Scrum and Kanban Complement Each Other?

Kanban and Scrum can
be used with each other to fill the gaps either one of them has. For example, Scrum
teams may use Kanban to track the tasks they’re doing during a given sprint. It
provides greater visibility into the Scrum project,
but more importantly, makes teams even more Agile.

If you want to learn more about Kanban or advice on setting up Agile teams, Kanbanize has an informative piece on it. It teaches how to set up and manage Agile teams. It discusses using a Kanban tool and a network of interconnected Kanban boards to help everyone visualize and track their work. It also touches on the need to structure a team’s work in progress so that they can easily manage the flow of work from team to team.

Scrum and Kanban can both be managed with project
management tools. Some project management applications allow you to choose
either scrum or Kanban from their list of dedicated project types. You also
have hybrid project management models that combine Kanban and Scrum.

Kanban and
Scrum were originally set up as two very different approaches to
managing processes and projects. However, they can
complement each other or be combined if you have the right tools and understand
the strengths and weaknesses of each.

The post Kanban and Scrum Compared appeared first on ERP News.

Manage All Your Business Processes Effectively with Axelor

Digital transformation has been a critical journey for businesses over the past few years. This path, which every business that wants to move its business into the future has to go through, often contains difficult obstacles and question marks. In recent years, it has become extremely difficult for companies to choose among the increasing amount of alternatives in the software industry. Choosing the right software for your digital transformation journey is an intensely challenging process, but the advantages of using the right software for your company are countless.

business

Business Management is one of the most important areas where firms feel the lack of digital transformation. Every business that wants to be one step ahead of its competitors is looking for the right technological tool to get ahead by saving time, and money. If you’re on a similar quest right now, it’s time to meet Axelor Business Management!

Control Your Business with a 360° vision!

When the business processes of your company are not under control, you will not be able to make decisions about the future. You should monitor all of your business processes so that you can take more robust steps into the future. Especially, the digital monitoring of all business processes has become more critical than ever. Business Process Management, which you can only perform with the right technological tools, can negatively affect the future of your business if the wrong tool is selected.

With Axelor Business Management System, you can automate your business management processes and control all your projects. From sales to billing, you can track your business in real-time and save time. Axelor Business Management System, which gives your business a 360° vision, enables you to calculate your profitability, ensure the correct distribution of your resources and use time more effectively, which is the most valuable factor for every business today.

An Integrated Staffing module to ease your team’s workload

The Axelor staffing module can help you optimize the workload of your employees and predict
which profiles are available to work during peak periods. Using your workforce efficiently not
only gives your business an advantage in terms of cost but also contributes positively to your
business culture. The personnel module, which allows you to effectively manage your teams,
offers a complete vision for your business. With the personnel module;

* You can see details by month/week/day
* You can create your teams.
* You can assign the most accurate personnel to a project or individual job.

Invest in the Future with Axelor

Today, for most businesses, investing in the future means increasing the number of deals they
close. Any business that wants to make this investment today and wants to bring efficiency to
its sales processes should consider its digital transformation as the main agenda item. Taking
into changing customer expectations and the impact of customer experience, you can bring
efficiency to all your sales processes with Axelor, which makes a noticeable difference in your
business management.

Axelor’s CRM module is designed to give you an advantage at each step of the sales process. This process starts with creating prospective customers in CRM and allows you to assign tasks for your team so that you can control every stage of the entire sales process. During this process, which lasts until your agreements are closed, your sales team can work independently of time and space thanks to the system running in the cloud. After each deal you close, you can also perform the invoicing phase from within the module.

With the reports you receive after each sales process, you can measure the performance of both your employees and your business and take your next step cautiously.

For more information, if you want your business to save both times and cost with Axelor products, which have a design that takes care of the user experience; https://www.axelor.com/

Call for Local Partners

Axelor Open Suite is ready to help you as an integrated system for unique businesses, where
you can use unique applications together! If you are looking for an open-source, developable,
flexible, and reliable software, you can reach Axelor and start the digital transformation journey
of your customer, by becoming a partner with them.

If you are interested, you can contact them: contact form

The post Manage All Your Business Processes Effectively with Axelor appeared first on ERP News.

Oxford Economics and SAP Study Explores Businesses’ Use of Data to Manage During the Pandemic

 SAP announced a new research study, in partnership with Oxford Economics, designed to discover how businesses are incorporating a holistic management approach into everyday business strategy and operations.

Oxford

This approach, known as systems thinking, requires that every part of an organization, including its external partners and customers, uses real-time insights from high-quality data.

The survey was conducted with 3,000 global business executives across 10 industries* during the start of the coronavirus pandemic. Key findings include:

  • Among respondents, 25 percent of organizations said their communication, data-sharing, and process management were fully integrated, in contrast to 21 percent that said these functions are somewhat or completely siloed.
  • An integrated approach pays off, with organizations realizing an array of benefits as a result of business function integration:
    • 47 percent of organizations that have integrated business processes in at least some functions cite reduced cost and spend as a benefit.
    • 38 percent of organizations that have integrated talent and workforce strategies cite increased employee retention as a benefit.
    • 53 percent of organizations that have integrated data collection and analysis tactics cite improved ability to make informed decisions as a benefit.
  • Prioritizing the employee experience is a must, as 72 percent of executives say their corporate culture has a positive impact on their ability to provide best-in-class products or services.

“We found that a majority of respondents have taken some steps to integrate business processes in specific parts of their organizations, but they have more work to do enterprise-wide,” Oxford Economics Editorial Director Edward Cone said. “Taking that step toward complete interconnectivity will go a long way toward helping businesses respond quickly to evolving challenges and position for future growth.”

The post Oxford Economics and SAP Study Explores Businesses’ Use of Data to Manage During the Pandemic appeared first on ERP News.