Discuss about the Strategic Information Security of IBM.
IBM (International Business Machines Corporation) is the manufacturer of computer hardware, software and also provides infrastructure service for other small companies. IBM is an international brand and serves more than 170 countries in the world. IBM has steadily evolved its business and has focused on the profitable areas on the market resulting in increasing the value of their products and service (Www-07.ibm.com. 2016). IBM Corporation's vision, main goal and worth proclamations have not changed on the basic subsequent level to the organizations. The values, vision and mission statement of IBM is "Dedication to every client's success. Innovation that matters, for our company and for the world. Trust and personal responsibility in all relationships."
The report discusses about the principle point of IBM business process and basically assesses the strategies utilized for arranging the business and sorting out it effectively. The issues are distinguished that go about as a boundary for the development of the business procedure and diverse techniques that can be connected to the business procedure are talked about in the report. In addition, the diverse contenders having the same business ranges additionally broke down and the distinctive focused techniques the organization can embrace to pick up favourable position are likewise talked about in the report.
The particular study is aimed to identify the current security state of IBM and the suggestions for the improvement of the IBM security levels. The researcher selected IBM from the case study to make the audience understand the security issues in a multinational IT company in a better way. A few operation procedures are incorporated into the report like operation technique definition, usage, observing and control of the operational systems.
With the assistance of examination goals, the sub-division of the exploration subject will be empowered that will permit legitimate categorisation of wide point into proper structures. Rundown of goals accommodating in fruitful accomplishment of the exploration point are as enrolled beneath:
- To critically analyse the present security state of IBM
- To propose strategies to improve the security levels in IBM
- To suggest some effective measures for improving the accuracy, efficiency and cost incurred by IBM
- To identify the basic strategies that can be implement for sorting out the business and systems administration
Current Security State of IBM
The common problem associated with every business or organization is the security. Whether small or large business and any type of business be it retail or finance they are all facing threats of security (Saaty and Kearns 2014). Every organization has a gap in their protection layer of the organization and the attacker finds the gap to intrude into the system and carry out their noxious activities. IBM is a multinational company and has adopted all the security programs to keep its organization highly secure from any external attacks (Fowler 2013). IBM has technical persons who identify the flaws in the system and address the problems and manage the system efficiently. IBM provides security solution to other business and it should highly secure its own organization or it would lose faith of its customer (Ulrich 2013). It has the need to maintain the confidentiality of the business, integrity of the solution to the targeted business and analysis of the business and identify the gaps. The key tool for identifying the current security state is assessment of the whole business process.
The main security issues associate with the IBM is the impact of the unspecified errors after the launch of a software product (Scott and Davis 2015). The software is incompatible with many of the platform for which it is designed. They also faces buffer overflow error in their launched software. Thus a huge amount of money is lossed by IBM during the recession period and the company have to think for new strategies in which they can invest to recover their business. A proper analysis is done on the emerging technologies such that they meet all the requirement and gain profit from the investment. The main focus is given on the following three entities which the emerging technology lacks.
- Data confidentiality is a certification that data is available just to the individuals who ought to have admittance to it.
- Data integrity manages that unapproved gatherings ought not to have the capacity to adjust or change the undertaking information (Benn et al. 2014).
- Data accessibility guarantees that basic data and administrations will be open to the general population who need it, when they require it.
- Evaluation of the current emerging technologies and risk on investment in the technologies.
IBM faces a decline in their natural business growth and experienced less demand for their software products. They also experiences less sales in their microelectronics, servers and customer care service. Thus there is a fall in the revenue of IBM and to overcome this problem IBM analysed its business process and started developing some strategic plans for the business growth and generating revenue (Www-07.ibm.com. 2016). They analysed their business process and searched new business which have demand in the market and they adopted the strategy of investing in cloud computing, Big data, mobile computing and providing security solution to other business (Senge 2014). They expect that the fields in which they invest would help them to grow its business in future. Risks are associated with this emerging technologies and IBM need to address the risk and mitigate them in order to grow their business.
Suggestion for Improvement of Security level of IBM
Strategy adopted by IBM: It is a good strategy adopted by IBM to invest in the emerging technologies like cloud computing, big data, and providing solution to the business organization and other enterprise. As there is a less demand of the software and the hardware they manufacture IBM implemented new strategy for the evolution of their business.
Analysis on the emerging technology: A proper analysis on the emerging technology should be done by IBM in order to reduce the risk of loss in the business. The security solution provided by IBM should be up to the mark and defend any external attacks that may happen in the organization. IBM has specialization in producing software service and thus they can build programs to increase security in the cloud platform and the Big data environment efficiently. The cloud platform is increasingly used as a database server for most of the companies but there is lack of confidence for the companies storing their data in the cloud servers. They usually store the data that are not confidential and the confidential data are still stored in the local servers of the company.
Risk associated with the technology: There is a risk of data theft associated with cloud computing, the data stored in the cloud servers can be accessed by an external agent. IBM providing security solution must mitigate the problems and it is expected that it would take the technology to a new end and make the user of the cloud platform to store their data confidently.
Suggestions for the improvement of the accuracy, efficiency and cost incurred of “IBM”
Applying ECM (Enterprise Content Management) abilities to center business process it is possible to change the route in which an association conduct the key areas of the business, for example, client administration or supply chains (Dutta et al. 2013). By changing existing business exercises into more streamlined procedures, organizations can decrease expenditure, build profitability and proficiency, get marketplace knowledge, lessen hazard and turn out to be more receptive to persistently changing business atmospheres.
Numerous associations apply ECM to enhance a solitary movement, yet neglect to understand the extra advantage and degree of profitability that can be accomplished by applying ECM systems and advancements to extra business territories. Organizations can pick up huge quality by stretching out ECM to different exercises, as opposed to acquiring point answers for every business zone (Mavodza 2013). IBM ECM encourages the reconciliation of substance with different offices, procedures and applications. By consolidating content, process, data lifecycle administration and investigation and incorporating with existing IT situations and applications, IBM ECM empowers organizations to make exceedingly versatile procedures so they can foresee and react to occasions as they happen (Wermelinger et al. 2015).
The center business exercises examined in the accompanying areas are proportional ascribe as the way in which records are utilized. IBM ECM empowers an association to enhance the effectiveness of each of these procedures while bringing down IT costs:
1. Lifecycle management of customers (customer service, electronic statement and market analysis).
2. Management of the employees.
3. Management of the service and the products
4. Managing the assets
5. Management of the project
6. Commercially authorized and monitored
7. Supply chain management (ERP transaction, contacts and accounts payable)
8. IT administration and infrastructure management
Lifecycle management of the customer
IBM ECM encourages better client administration, self-administration and case taking care of effective administration of substance and forms connected with client data and exchanges. IBM ECM can be incorporated with CRM to empower a solitary perspective of the client (Zhu et al. 2015). This helps client administration delegates to rapidly resolve client demands started by telephone, web, email, composed correspondence and in individual by giving them access to all applicable data (Gwyer 2015). Administrators can utilize process measurements to assess client administration patterns and effectiveness, and can break down client correspondence and call logs to reveal patterns, needs or issues. Government and social organizations benefits that utilize a case administration procedure can use IBM ECM to encourage gathering and administration of all unstructured data all through the lifecycle of the case (Galliers and Leidner 2014). Organizations can offer their clients more precise, cutting-edge charging data, and can convey it over the web or to portable gadgets.
Management of the employees
IBM case administration capacities can help associations productively handle and hold all substance and records connected with workers—from contract through resign (Ulrich 2013). HR offices can apply robotized business procedures to oversee high-volume HR exchanges, for example, enlisting, changes in employment status and retirement, subsequently diminishing managerial overhead. IBM ECM can be incorporated with existing HR frameworks to make a solitary, far reaching perspective of worker data. It gives an archive to safely catch and hold worker reports. Business process administration (BPM) and electronic structures abilities further enhance proficiency by empowering representative self-administration (Saaty and Kearns 2014). With a predictable procedure set up, HR can make, redesign and distribute strategies, techniques, advantages data and that's only the tip of the iceberg, which likewise enhances general corporate effectiveness (Scott and Davis 2015). The move to electronic records powered by ECM advances and a propelled case administration procedure drastically decreases the requirement for HR to store representative data in file organizers and offsite storerooms.
Management o the service and the products
IBM ECM helps organizations oversee unstructured substance, and also the procedures connected with the advancement, creation, conveyance and utilization of items or administrations. IBM ECM additionally offers content examination abilities those utilization modern characteristic dialect calculations to create business knowledge from for all intents and purposes any sort of substance in any arrangement (Breiter et al. 2014). For instance, item directors can influence IBM ECM capacities to pinpoint an issue with item plan by investigating substance of approaching client bolster calls. Furthermore, IBM ECM arrangements give a focal store to deal with the creation, procurement, overhauling and distribution of item data, for example, information sheets, particulars, guarantee, specialized outlines, guarantees, value records and media resources (Paroutis et al. 2014). Extra efficiencies might be accomplished by incorporating IBM ECM with item lifecycle administration applications or other item data administration frameworks, for example, IBM InfoSphere™ Master Data Management Server for Product Information Management. Utilizing IBM ECM advancements, makers, makers, suppliers and administration associations can give and keep up precise item data, build up a standard procedure for redesigning item data and use item data over different channels and media.
Managing the assets
IBM ECM helps organizations oversee reports and substance connected with capital resources, from resource arranging through resource retirement. The advantage lifecycle can be dealt with as a "case," so different individuals can add to its administration after some time (Talley 2014). IBM ECM gives a solitary, secure store to oversee content, paying little heed to source or configuration, identified with the arranging, assessment, obtainment, operation, support and retirement of capital resources. A solitary, secure wellspring of benefit data makes it altogether less demanding for representatives to get to precise, current resource data to perform their occupations (Andrijcic and Haimes 2016). Organizations can consequently recognize, catch and oversee resource data as a corporate record, enhancing efficiencies while empowering vital business knowledge and administrative consistence (Kandiraju et al. 2014). By incorporating with other venture applications, for example, ERP and IBM Maximo®, IBM ECM permits different lines of business and remote representatives to get to resource documentation when required. Along these lines, effective substance administration can encourage better resource use and develop the life of key capital resources.
Management of the project
IBM ECM gives a community oriented environment that empowers representatives and additionally customers, suppliers, accomplices and temporary workers to add to venture achievement. Members can exhibit thoughts, create plans, offer data, settle on choices and oversee archives (counting email) connected with a task (Senge 2014). IBM ECM permits associations to compose the record sorts connected with every venture so that the members have simple yet secure access (based upon their task or authoritative part) to the data. IBM ECM empowers venture groups to set up repeatable business procedures to quicken venture finish (Fowler 2013). For associations that have broad undertaking administration exercises, IBM ECM empowers them to make layouts, repurpose already made work and keep up a library of venture related substance that backings different task exercises (Wermelinger et al. 2015). At the point when current task data is accessible through a solitary, secure purpose of access, organizations pick up venture administration efficiencies: workers can make speedier, more exact undertaking appraisals and choices, while supervisors can secure task data based upon member parts.
Commercially authorized and monitored
IBM ECM helps corporate legitimate staff discover, get to and oversee records and substance connected with lawful matters, cost effective discovery crosswise over big business content (both physical and computerized) and be significantly more successful in overseeing basic corporate substance connected with lawful issues (Mahindru et al. 2014). Key to viable substance administration inside the connection of corporate legitimate exercises is the capacity to execute an endeavor data lifecycle administration and administration system. IBM ECM content appraisal abilities empower an association to powerfully investigate endeavor data to recognize content key to the business and substance that can be decommissioned (Jablokov et al. 2014). Setting delicate and rules-based IBM arrangement and classification capacities can mechanize order and encourage more steady treatment of big business content. IBM records administration abilities give a unified arrangement to document arranges, maintenance plans, legitimate safeguarding holds and evaluating, all of which address quickly advancing orders and administrative, lawful and trustee necessities (Mahindru et al. 2014).. IBM eDiscovery enables corporate lawful groups with a faultless procedure for quickly finding, surveying, conveying and creating a streamlined gathering of applicable materials to decision bodies or outsider administration suppliers.
Supply chain management
IBM ECM is as often as possible used to supplement ERP applications. By means of incorporation with ERP, content made outside of an ERP application can be caught and kept up in the IBM ECM storehouse for simple and secure access over the span of an exchange. IBM ECM empowers all important substance connected with suppliers and inventory network exchanges to be midway and safely overseen, yet be open to the ERP clients and different lines of business that use the data in their day by day exercises (Christopher 2016). Numerous archives created over the span of production network procedures are genuine corporate records. The IBM ECM records administration ability empowers an organization to naturally catch and hold production network archives and hold them electronically the length of legitimately required—which likewise lessens paper stockpiling costs (Monczka et al. 2015). IBM BPM capacities coordinate with ERP frameworks to give best-of-breed work process, empowering ideal store network preparing. Creation or catch of a report, for example, an email, fax or receipt, inside IBM ECM can naturally start a work process, further diminishing the quantity of manual strides required in the store network (Ross 2013). Associations that desire to enhance inventory network procedures can apply IBM business movement checking abilities to persistently examine process efficiency with the objective of disposing of bottlenecks and conveying assets ideally.
IT administration and infrastructure management
IBM ECM offers IT associations the capacities to address each of the issues referred to above. IBM ECM examination and grouping abilities permit an association to stock an accumulation of records and evaluate the quality and pertinence of everything with the objective of erasing unneeded substance, chronicling substance to more practical stockpiling media or relocating/solidifying content into a halfway oversaw vault (Sivasubramanian et al. 2015). Wiping out superfluous records and decommissioning out of date archives can altogether decrease stockpiling, permitting and IT regulatory expenses. Moreover, IBM ECM association abilities permit connection to keep up its interest in a current, legacy content vault while making a venture content metadata inventory that gives a main issue of access to the substance sources that are united under the IBM ECM framework (Mahindru et al. 2014). Reconciliation with IBM ECM can essentially upgrade the quality and profitability of utilizations that require continuous access to an extensive variety of reports as a major aspect of the business movement. Utilizing IBM ECM to oversee and file the archives and substance connected with ERM or CRM frameworks empowers an association to enhance framework execution, especially as for report recoveries; kill offsite capacity costs for paper records; and naturally oversee electronic report maintenance to keep things just the length of lawfully required (Gwyer 2015).
In a world that is progressively instrumented, interconnected and smart, organizations need more quick witted frameworks to comprehend their incomprehensible stores of information. Each association relies on upon substantial volumes of both organized and unstructured data to viably lead business exercises and guide basic choices. Every one of this information serves a critical capacity in its relationship with representatives, clients and suppliers, and key business procedures, for example, resource administration, arranging, venture administration, ERP, inventory network administration and consistence. IBM ECM can help an association to fundamentally enhance key business procedures, profitability and general productivity. Through the use of instruments intended to bolster ECM and propelled case administration, associations can turn out to be more productive and viable in overseeing contracts, representative data, supplier understandings, client connections, capital resources, bookkeeping forms, specialized archive distributions, ventures, change administration forms, consistence activities and significantly more. By consolidating the force of big business content, exceedingly effective business forms content lifecycle administration and investigation, organizations can streamline and advance their business exercises, and endeavour all types of substance for more profound business sector understanding, quicker, more precise choices and more prominent undertaking efficiency.
Andrijcic, E. and Haimes, Y.Y., 2016. Metamodeling of Interdependent Systems: Application to Bridge Infrastructure Management. Journal of Infrastructure Systems, p.04016028.
Benn, S., Dunphy, D. and Griffiths, A., 2014. Organizational change for corporate sustainability. Routledge.
Breiter, G., Behrendt, M., Gupta, M., Moser, S.D., Schulze, R., Sippli, I. and Spatzier, T., 2014. Software defined environments based on TOSCA in IBM cloud implementations. IBM Journal of Research and Development, 58(2/3), pp.9-1.
Christopher, M., 2016. Logistics & supply chain management. Pearson Higher Ed.
Dutta, A., Peng, G.C.A. and Choudhary, A., 2013. Risks in enterprise cloud computing: the perspective of IT experts. Journal of Computer Information Systems, 53(4), pp.39-48.
Fowler, A., 2013. Striking a balance: A guide to enhancing the effectiveness of non-governmental organisations in international development. Routledge.
Galliers, R.D. and Leidner, D.E., 2014. Strategic information management: challenges and strategies in managing information systems. Routledge.
Gwyer, R., 2015. Identifying and Exploring Future Trends Impacting on Academic Libraries: A Mixed Methodology Using Journal Content Analysis, Focus Groups, and Trend Reports. New review of academic librarianship,21(3), pp.269-285.
Jablokov, V.R. and Pinchuk, T., Wallflowr, Inc., 2014. System and method of monitoring and controlling appliances and powered devices using radio-enabled proximity sensing. U.S. Patent Application 14/553,729.
Kandiraju, G., Franke, H., Williams, M.D., Steinder, M. and Black, S.M., 2014. Software defined infrastructures. IBM Journal of Research and Development, 58(2/3), pp.2-1.
Mahindru, R., Sarkar, R. and Viswanathan, M., 2014. Software defined unified monitoring and management of clouds. IBM Journal of Research and Development, 58(2/3), pp.12-1.
Mavodza, J., 2013. The impact of cloud computing on the future of academic library practices and services. New Library World, 114(3/4), pp.132-141.
Monczka, R.M., Handfield, R.B., Giunipero, L.C. and Patterson, J.L., 2015.Purchasing and supply chain management. Cengage Learning.
Paroutis, S., Bennett, M. and Heracleous, L., 2014. A strategic view on smart city technology: The case of IBM Smarter Cities during a recession.Technological Forecasting and Social Change, 89, pp.262-272.
Ross, D.F., 2013. Competing through supply chain management: creating market-winning strategies through supply chain partnerships. Springer Science & Business Media.
Saaty, T.L. and Kearns, K.P., 2014. Analytical planning: The organization of system (Vol. 7). Elsevier.
Scott, W.R. and Davis, G.F., 2015. Organizations and organizing: Rational, natural and open systems perspectives. Routledge.
Senge, P.M., 2014. The dance of change: The challenges to sustaining momentum in a learning organization. Crown Business.
Sivasubramanian, S., McAlister, G.A.M. and Milovanovic, M., Amazon Technologies, Inc., 2015. Monitoring and automatic scaling of data volumes. U.S. Patent 9,207,984.
Talley, N.B., 2014. Are You Doing It Backward-Improving Information Literacy Instruction Using the AALL Principles and Standards for Legal Research Competency, Taxonomies, and Backward Design. Law Libr. J.,106, p.47.
Ulrich, D., 2013. Human resource champions: The next agenda for adding value and delivering results. Harvard Business Press.
Wermelinger, M., Hall, J.G., Rapanotti, L., Barroca, L., Ramage, M. and Bandara, A., 2015, May. Teaching software systems thinking at The Open University. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (Vol. 2, pp. 307-310). IEEE.
Www-07.ibm.com. (2016). [online] Available at: https://www-07.ibm.com/sg/manufacturing/pdf/manufacturing/ECM.pdf [Accessed 12 Aug. 2016].
Zhu, W.D., Benoit, B., Jackson, B., Liu, J., Marin, M., Meena, S., Ospina, J.F. and Rios, G., 2015. Advanced Case Management with IBM Case Manager. IBM Redbooks.