Financial and Vendor Management

Financial and Vendor Management
ERP & Bank ConnectivityERP & Bank Connectivity

Connecting your ERP to global banks can be a headache. This Pulse survey of 100 IT leaders sheds light on how technology can simplify the process.

What are you most looking for from vendors that pitch you?

Top Answer : I want to understand your how your product / service works techncialy, what is your company strategy and most importantly skip the marketing terms/hot topics. At the end of the day I want to know if you are a fit within my technology roadmap and how specifically that can work.

16405 views
25 comments
5 upvotes
Related Tags
Security protocols for your SaaS vendorsSecurity protocols for your SaaS vendors

How many SaaS vendors meet their customers' security and compliance requirements today? 100 CIOs share their experience.

Does anyone have a favorite alternative to Tableau? Why?

Top Answer : PowerBI looks more modern, is included within our O365 licensing and appears to have all the same functionality we use/need within Tableau - without the licensing public/server limitations, overhead, hassle, needless complexity. It feels like a part of our ecosystem.

Corporate ApprovalsCorporate Approvals

This report was created to help over 200 IT Executives understand how corporate approvals were being carried out today and to highlight the key painpoints across IT departments.

What are your thoughts on SaaS management platforms (SMP)?

Top Answer :

11 views
0 comments
2 upvotes
Related Tags
Business Application Development
Architecture & Strategy
Maintenance
Requirements & Design
Testing, Deployment & QA
Mobile Development
Development
Selection & Implementation
Business Analysis
Applications Vendor Landscapes
Optimization
Backup
Data Center
Public and Hybrid Cloud
Telephony
Network
Compute
Storage
Business Applications
Cloud
Crisis Management
Data & Business Intelligence
Artificial Intelligence
Business Intelligence Strategy
Data Management
Enterprise Integration
Integrations
Machine Learning
Governance
Data Lake
Big Data
Data Warehouse
Disruptive & Emerging Technologies
5G
Blockchain
Cryptocurrencies
Virtual Reality
IoT
Reality
Digital Innovation
Bots
Augmented Reality
End-User Services & Collaboration
Collaboration solutions
End User Equipment
End-User Computing Devices
Endpoint management
Productivity tools
Document Management
End-User Computing Applications
End-User Computing Strategy
Mobile
Voice & Video Management
Continuous Integration
Technical Product Management
DevOps
Continuous Deployment
Development
Quality Assurance
Customer Relationship Management
Enterprise Content Management
Customer Success
Enterprise Information Management
Finance
Enterprise Resource Planning
HR
Legal
Marketing Solutions
Retail
Human Resource Systems
Marketing
Product Recommendation
Sales
Risk Management
GDPR
SOX Compliance
Governance, Risk & Compliance
Infrastructure & Operations
Cloud Strategy
I&O Finance & Budgeting
Operations Management
Network Management
DR and Business Continuity
Server Optimization
Leadership
Attract & Select
Cost & Budget Management
Engage
Culture
Manage Business Relationships
Innovation
Organizational Design
Program & Project Management
Train & Develop
Values
Talent management
Performance Measurement
Organization Structure
Manage & Coach
Availability Management
Financial and Vendor Management
Reporting
Service Desk
Management Tools
Enterprise Service Management
People & Process
Process Management
Asset Management
Project & Portfolio Management
Portfolio Management
Project Management Office
Pulse
Security
Confidentiality, Integrity, Availability
Secure Cloud & Network Architecture
Endpoint Security
Data Privacy
Identity and Access Management
Security Operations Center
Security Strategy & Budgeting
Security Vendor Landscapes
Threat Intelligence & Incident Response
Threat & Vulnerability Management
Vendor Management
Infrastructure Vendor Landscapes
Budgeting
Roadmap
Outsourcing
Strategy & Operating Model
Business Continuity
Architecture Domains
Strategy
Tool Recommendation
Is the current talent shortage in IT affecting your security posture?

Top Answer : I was actually having a conversation with someone who was talking about a recent database security issue and they said the problem is that the database creators didn't create a flag to keep your database off the internet, like a single widget. And I said, "No. That's not a problem. The real problem is that we've made it too simple and now everyone expects the SaaS or the product or the application to solve all of my ills." It is so hard to find network engineers today who I can sit down and say, "Explain classless inter-domain routing (CIDR) and subnetting to me." They're like, "I just have Amazon do that. I don't know how to do any of that." I've got a really good recruiting firm that's found needles in a stack of needles for me. But if I’m looking for a cloud security engineer because I want cloud, network, Linux systems, and security, my recruiters are like, "Pick 2. I can't do all 4 of those." But I'm not willing to pick two. I need all 4.

I'm building most on... share "why" in comments...

Top Answer : Virtually nose-to-nose here out the gate, would be great to hear some arguments for/against your choice...  thanks for participating in the poll - I recently joined Pulse so we can put that interview we were planning in my past life on permanent hold ;)  - any additional thoughts here? Thanks!

Is it dangerous to only quantify risk in dollars?

Top Answer : When you frame things in dollars and cents it makes it easier to accept the cost consequences and have insurance rather than framing it in terms of real harm that can hurt people. It’s like Ford shipping the Pinto for several years, when it quantified things financially rather than looking at the human impact of shipping that car. We need to start quantifying all cyber risks—not only the financial ones, which are risks to me as an organization, and risks to your customers. That has brand implications and potential financial implications. But if there is a human impact to a risk it should be framed in those terms. Think of JBS, the meat packing company. For a long time I've been saying that a meat industry cyber event was a risk where people are “asleep at the wheel”. The JBS attack wasn't ransomware. It was playing with the food safety data. Imagine if the attackers of that meat processing company, instead of just ransoming their systems, played with the integrity of that data. People could die.

Can vendor lock-in ever be valuable?

Top Answer : It can be positive in some cases if the organization is investing in a specific platform like AWS or Google Cloud. Utilizing the system services provided by that particular vendor helps because the interoperability is really high. And cost-wise, sometimes it's cheaper when you stick to one vendor ecosystem. That is the plus side of vendor lock-in. The downside is that you have to depend on it and pay for anything the vendor bills for you. We see a trend where initially the cost is low, but then it increases. But as long as you build things on top of open standards, you can take them to any Cloud provider or vendor. The best example of that is Java, which was an open standard. And things like open API specifications and even Kubernetes are good examples—I call Kubernetes the Linux of networking. So it's a choice and there are pros and cons to both approaches. The low-code cloud-native engineering platform we built for professional developer using open standards call “Choreo”, you can try for free from https://wso2.com/choreo.