Comprehensive software reviews to make better IT decisions
Running Critical Enterprise Applications Efforts During COVID-19
An enterprise application selection or implementation has most likely been heavily impacted by COVID-19. Do not hit the brakes; stopping and restarting projects increases the risk of failure. Slow down or speed up? Which is the right strategy for your organization?
Every organization is trying to adjust to impact of COVID-19. Like many others, your first thought will be to pause all projects until everyone returns to work. Pausing is the right approach for projects that require physical presence such as infrastructure changes and perhaps for low risk, low-value projects, but it is not the right approach for strategic projects such as ERP implementations.
Strategic projects are not like a Netflix film that can be paused and picked up where you left off. Strategic projects are more like a binge-worthy Netflix series. Each day, week, and month of delay results in the loss of knowledge, and if you wait too long it will be like restarting from the beginning. Also take into consideration the vendor you have engaged. There is no guarantee that the vendor’s resources will be available when you want to restart your project. Furthermore, your competitors may be (re)starting at the same time, putting pressure on consultant availability and potentially increasing your costs.
If you decide to slow down the implementation, here are several ways in which to keep the team engaged, particularly if key decision makers are not available:
- Focus on tasks such as the preparation of training materials and other documentation.
- Implement critical enterprise applications using best-practice workflows. When the key stakeholders are once again available, the workflows can be demonstrated and tailored to the needs of the organization.
- In general, review your project plan or requirements list for items that will move the project forward without the need for key stakeholders and will cause little rework when the stakeholders re-engage.
Our recommendation is to get a jump on your competitors by retaining your staff and assigning them to accelerate your project. One of the challenges of a strategic system is that your key stakeholders are forced to balance needs of the project with their “day” jobs. When the business is slow, the stakeholders can apply all their attention to the project, allowing you to accomplish more in a shorter amount of time and saving you time and money. When business starts to resume, you will be ramping up using the latest technology and a sole focus on building the business. Your competitors will be stuck on older systems or dividing their attention between rebuilding and restarting their implementation project. Either way you win.
Source: SoftwareReviews Enterprise Resource Planning, Report Published April 2019
Don’t put your business or critical enterprise applications efforts at risk by putting your strategic projects on hold. If your key stakeholders are being reassigned to meet the emergency, then find ways to continue the project at a slower pace. However, if you are facing laying off staff, repurpose them to accelerate your implementation and get out in front of your competitors.
My Firewall Is Smarter Than Your Firewall
Next-generation firewalls were smarter than previous firewalls, able to deeply analyze traffic and integrate with complementary security solutions. Today our needs are more complex, however, with a 742% increase in software supply chain attacks over the past three years. Sonatype Nexus Firewall has been paying attention and claims its firewall product is smarter about these attacks.
Your Internet Secret Service, Otherwise Known as External Attack Surface Management (EASM)
Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack surface management (EASM) was a popular managed service and topic of discussion at Rivest–Shamir–Adleman (RSA) Conference 2023, named after a popular public-key cryptosystem.
Can Hillstone Networks Position Its StoneOS to Take Firewalls Beyond the Next Generation?
Hillstone Networks has positioned itself as a robust and feature-rich provider of not only hardware but also security solutions. With its ZTNA 3.0 release and support for centralized management of IoT assets and incident response, the company embodies a next-generation firewall.
Acronis Offers a Unique Endpoint Protection and Data Recovery Package Tailored for the Small to Medium-Sized Business
Acronis hopes to overtake many competitors in the data recovery and endpoint protection solution space by forging partnerships with many MSSPs and appealing to the SMB market. The company has doubled down by hiring the former CEO of GoDaddy, who is committed to reinvesting in its technology and increasing and improving its product line.
Zoho Announces Trident to Power Workplace’s UCaaS Capabilities
Zoho, a multinational software and web-based business tool provider, has announced the launch of Trident – a hub that brings Zoho’s pre-existing and new unified communications capabilities into a single pane of glass. How will Trident’s addition to Workplace impact customer migrations from Microsoft and Google.
Next-Gen EDR/MDR/XDR – Field Effect Covalence
Field Effect Covalence is an EDR/MDR/XDR offering that translates chaos into order.
Will Avaya’s Five-Step Transformation Strategy Generate a Stronger Outlook for 2023?
To revitalize and strengthen business transformation, Avaya has outlined a five-step plan for restructuring its product lines, go-to-market strategy, and balance sheet. This tech note evaluates these five steps, highlighting the main contingencies for each step’s successful rollout.
Informatica World 2022 Highlights
On May 24-25, Informatica held its annual conference in Las Vegas – the first time “in-person” since the beginning of the COVID-19 pandemic.
Are You In or Out? How to Source Application Development
Custom application development is a strategic differentiator in the digital economy. Organizations need to make good decisions on how to insource or outsource that development or they risk bad software … and worse results.