Comprehensive software reviews to make better IT decisions
Nemertes Research Supports the Need for a Rationalized Collaboration Toolset
At Enterprise Connect 2020, Irwin Lazar (Vice President and Service Director, Nemertes Research) outlined Nemertes’ latest study on the impact of team collaboration software on the enterprise. A big takeaway is that there is a definite need for enterprises to rationalize their collaboration toolset to optimize their employees’ workflows.
First, despite the problems highlighted below, collaboration tools are here to stay. Nemertes found that these tools are improving productivity by 24%, increasing annual revenue by an average of US$368K, and reducing email by 21%. The top five key capabilities sought after by organizations for their collaboration tools included:
- End-to-end encryption (41.1%).
- Video and audio conferencing (40.4%).
- Low cost (36.3%).
- On-premises option (32.6%).
- Message export (24.4%).
However, given the many different tools available, it’s no surprise that Nemertes found that 42% of employees have more than one collaboration tool. Interestingly, this figure is largely caused by organizations not specifying a primary collaboration tool of use: 40% of organizations cited “no primary app” as the biggest reason for having multiple apps. For those organizations that did have a primary tool, Microsoft Teams appeared in first place, with 40% of employees citing it as their primary tool. Webex Teams came second, with 27% of organizations citing it as their primary tool.
Source: SoftwareReviews Cisco Webex Teams Scorecard. Accessed September 11, 2020.
Key challenges raised by organizations with multiple collaboration tools include:
- Difficulty with tracking conversations across multiple apps.
- Notification overload.
- Integration frictions.
- Issues with permissions for external users.
- Regulatory requirements for data management.
- Minimizing the threat of data loss.
- Encryption and key management.
- Identity and access control.
Rationalizing your collaboration toolset will help reduce the friction of these challenges.
For further information, watch the session Survival Guide: Working with Multiple Team Collaboration Apps (available online through to December 31, 2020, at Enterprise Connect 2020).
An immediate takeaway from Nemertes’ research is that Microsoft Teams has surely won out against Slack to be enterprises’ primary collaboration tool. Indeed, that Slack does not even come second indicates how rapidly the collaboration marketspace is shifting and evolving. Given that Microsoft Teams and Webex Teams both offer capabilities that go far beyond team messaging, it’s difficult to see how Slack will keep up with these collaboration giants.
A high-level takeaway from Nemertes’ research is that Info-Tech’s Rationalize Your Collaboration Tools can help organizations overcome these frustrations by offering a series of methods to build a collaboration strategy. This research begins by taking a use case-driven approach to identify what capabilities your employees need for their workflows. Doing so creates a high-level overview for identifying not only which in-house tools best map onto these required capabilities, but also where tools have overlapping capabilities (perhaps indicating redundant tools) and where gaps in your collaboration toolset exist. The result is a collaboration strategy that meets end-user requirements with as rationalized a toolset as possible.
Want to Know More?
Spoofing Be Gone: Abnormal Security Says Hasta la Vista, Baby, to Business and Vendor Email Compromise Scams
The conversation around security awareness training and phishing simulations has changed in the past year. The training and tools of the past simply aren’t working against today’s more sophisticated attackers. Abnormal Security can mitigate an assortment of the most common types of business and vendor email compromise.
This analysis examines Zscaler's cloud-based security platform, with a focus on its Zero Trust Exchange (ZTE), Zero Trust Network Access (ZTNA), and broader suite of security solutions. It explores Zscaler's approach to overcoming the limitations of traditional VPN architectures, using artificial intelligence (AI) for threat detection, and integrating various security functionalities within a unified platform. Drawing insights from analyst demo notes, vendor information, and independent research, this analysis aims to provide a comprehensive and unbiased assessment of Zscaler's value proposition for security professionals.
In today's cybersecurity landscape, managing machine identities and digital certificates across complex, hybrid multi-cloud environments is a growing challenge. As the volume of digital certificates used to secure machines, applications, workloads, services, and devices continues to grow exponentially, organizations often struggle with a lack of visibility and manual processes, resulting in critical service outages and security vulnerabilities. AppViewX CERT+ is a next-generation automated certificate lifecycle management (CLM) solution that simplifies PKI and certificate management. It combines the best of automation, security, and insights to meet enterprise machine identity and digital trust requirements. AppViewX CERT+ features are purpose-built to address both the operational and security challenges of certificate management to, in turn, help organizations prevent application outages and security breaches. By enabling enterprise-wide crypto-agility, AppViewX CERT+ enhances machine identity trust, eliminates security gaps, promotes compliance, and supports post-quantum cryptography readiness.
In the digital realm, trust is currency. Without robust identity verification, online interactions become a breeding ground for fraud and exploitation.
In the ever-evolving landscape of SaaS Security, one company has quietly forged its path, becoming a beacon of protection for large enterprises grappling with the growing complexity of SaaS applications. This is the story of Adaptive Shield, a rising star in the SaaS Security space, whose journey from a nimble startup to a recognized industry leader is as remarkable as the solutions it offers. Founded in 2019 by cybersecurity veterans Maor Bin and Jony Shlomoff, Adaptive Shield entered the scene with a bold vision: to address the growing blind spot in the SaaS ecosystem regarding enterprise security – including the dangers deriving from misconfigured security controls, lack of management regarding human and non-human identities, interconnected apps, and the detection of threats within these business-critical apps. Recognizing the exponential adoption of SaaS and the inherent risks it posed, the company set out to build a comprehensive shield, not just for individual applications, but for the entire interconnected SaaS ecosystem.
LoginRadius started as a simple social login provider but pivoted to create a comprehensive CIAM platform that now reaches over a billion consumers worldwide. My analyst demo with LoginRadius confirmed what they pride themselves on: delivering a user-friendly platform that simplifies CIAM implementation and management.
Qwiet AI is a San Jose, California-based company that develops an AI-powered application security platform. The company's flagship product, preZero, uses machine learning to automate and accelerate application security testing, enabling developers to identify and remediate vulnerabilities early in the software development lifecycle (SDLC). Qwiet AI was founded in 2016 by a team of experienced cybersecurity professionals with a shared vision of empowering developers to build secure software. The company's mission is to "Prevent the Unpreventable" by providing a comprehensive and AI-driven solution that helps organizations of all sizes secure their applications from the very beginning.
We should start by defining what a secret is. It’s really any piece of confidential information used to authenticate access to sensitive resources. This includes passwords, API keys, encryption keys, SSH keys, and other digital credentials. Many of the organizations I talk to have an application security program with some OWASP checks in the pipeline, some SAST, but rarely SCA or DAST testing. GitGuardian believes secrets detection and remediation is crucial for maintaining security and preventing unauthorized individuals from accessing sensitive information or disrupting critical systems. I agree and believe the value it can bring to an application security program is significant.
Q headlines a bevy of announcements at AWS re:Invent 2023 in Las Vegas that shed more light on the cloud service provider’s AI strategy and where its differentiation from other vendors lies.