Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

Instant Messaging Tough Enough for Business

2.695 Aufrufe

Veröffentlicht am

Slide deck on the subject of Enterprise Instant Messaging provided by Michael Osterman and commented extensively over here: http://blogs.ittoolbox.com/km/elsua/archives/instant-messaging-as-a-powerful-vehicle-for-instant-communications-with-the-enterprise-13106

Veröffentlicht in: Business, Technologie
  • Loggen Sie sich ein, um Kommentare anzuzeigen.

Instant Messaging Tough Enough for Business

  1. 1. Poll #1 - What is your current position on Instant Messaging in your organization? <ul><li>We allow each user to choose the Consumer IM client of their choice. </li></ul><ul><li>We have standardized on one Consumer IM client. </li></ul><ul><li>We are investigating standardizing on an Enterprise IM solution in order to gain control. </li></ul><ul><li>We have standardized on an Enterprise IM platform. </li></ul><ul><li>We currently block all IM usage. </li></ul>
  2. 2. Instant Messaging Tough Enough for Business: No Server Required Michael D. Osterman Osterman Research, Inc. September 26, 2006
  3. 3. About Osterman Research, Inc. <ul><li>A market research and consulting firm focused on the messaging industry </li></ul><ul><li>Practice areas include email, instant messaging, presence, collaboration, security, archiving, voice-over-IP, outsourcing and related markets and technologies </li></ul><ul><li>Clients include vendors and end-user organizations </li></ul><ul><li>Based near Seattle </li></ul>
  4. 4. IM Use is Growing Rapidly
  5. 5. The Current State of IM in the Workplace <ul><li>Most IM use consists of consumer-grade clients </li></ul><ul><li>AIM, MSN Messenger and Yahoo! Messenger are the ‘Big Three’ in the consumer IM space </li></ul><ul><li>AIM, MSN Messenger and Yahoo! Messenger are also the ‘Big Three’ in the workplace </li></ul>
  6. 6. Consumer IM Still Dominates
  7. 7. Why Use IM? <ul><li>There are a variety of business benefits associated with IM: </li></ul><ul><ul><li>More efficient communications </li></ul></ul><ul><ul><li>Faster decision making </li></ul></ul><ul><ul><li>Better and faster responses to customer inquiries </li></ul></ul><ul><ul><li>Acceleration of information flows </li></ul></ul><ul><ul><li>Presence is key </li></ul></ul>
  8. 8. Poll #2 - What is your largest concern with allowing IM into your organization? <ul><li>Loss of productivity due to personal usage. </li></ul><ul><li>Lack of security of information and intellectual property loss. </li></ul><ul><li>Lack of protection against viruses, worms and SpIM </li></ul><ul><li>Compliance concerns over logging and auditing IM conversations. </li></ul><ul><li>All of the above are concerns. </li></ul>
  9. 9. The Problems with IM <ul><li>Most IM started with individuals, not IT </li></ul><ul><li>This can lead to a variety of problems: </li></ul><ul><ul><li>Lack of encryption and local routing can lead to serious data security issues </li></ul></ul><ul><ul><li>Worms and related threats </li></ul></ul><ul><ul><li>Lack of namespace control </li></ul></ul><ul><ul><li>No auditing or logging of IM conversations </li></ul></ul><ul><ul><li>Loss of intellectual property </li></ul></ul><ul><ul><li>Lack of corporate governance </li></ul></ul>
  10. 10. What Are Your Options? <ul><li>IM is used in your organization whether you know it or not </li></ul><ul><li>So, what are your options? </li></ul><ul><ul><li>Block it </li></ul></ul><ul><ul><li>Establish a policy against the use of IM </li></ul></ul><ul><ul><li>Manage it </li></ul></ul>
  11. 11. What You Should Do <ul><li>If you’re going to allow the use of IM (which you should), you will need to do five things: </li></ul><ul><ul><li>Establish an IM system that will allow your employees to securely communicate internally AND externally </li></ul></ul><ul><ul><li>IT is busy enough already: implement a system that is easy to manage </li></ul></ul><ul><ul><li>Deploy a capability that can be compliant with internal and external policies </li></ul></ul><ul><ul><li>Manage threats extremely well </li></ul></ul><ul><ul><li>Minimize user disruption to the greatest possible extent </li></ul></ul>
  12. 12. Key Elements of an IM Solution <ul><li>The solution should minimize IT’s involvement in evaluating, deploying and managing an IM system </li></ul><ul><li>It should be inexpensive to deploy and operate </li></ul><ul><li>It should be extremely reliable </li></ul><ul><li>It should be scalable </li></ul>
  13. 13. For More Information <ul><li>Osterman Research, Inc. </li></ul><ul><li>Tel: +1 253 630 5839 </li></ul><ul><li>Fax: +1 866 842 3274 </li></ul><ul><li>[email_address] </li></ul><ul><li>www.ostermanresearch.com </li></ul>