Gartner Predicts Three Big Trends for Business Intelligence

Gartner-Identity-Management-Critical-for-the-Internet-of-Things-IoT.png

Big data has given businesses a window into valuable streams of information from customer purchasing habits to inventory status. However, internal data streams give only a limited picture, especially with the growth of digital business.

Three trends Gartner has identified describe information’s ability to transform business processes over the next few years.
Our predictions include:

No. 1: By 2020, information will be used to reinvent, digitalize or eliminate 80% of business processes and products from a decade earlier.
As the presence of the Internet of Things (IoT) — such as connected devices, sensors and smart machines — grows, the ability of things to generate new types of real-time information and to actively participate in an industry’s value stream will also grow.
Customers, employees and citizens will become engaged principally through digital means. With operational processes quickly becoming digitalized, traditional analog and manual processes will be automated, including both physical and human elements. Many, if not most, decisions will be algorithmic, based on automated judgment.
Essentially, things become agents for themselves, for people and for businesses. Think of the car that alerts emergency services and an insurance company or the smart thermostat that schedules service. The added connectivity, communications and intelligence of things will make many of them agents for services that are currently requested and delivered via human intervention.

No. 2: By 2017, more than 30% of enterprise access to broadly based big data will be via intermediary data broker services, serving context to business decisions.
Digital business demands real-time situation-awareness. This includes insights into what goes on both inside and outside the organization. How do weather patterns impact inventory? More so, how do this season’s customer preferences as expressed in social media suggest greater or lesser inventory?
The enterprise data available in organizations’ vaults is increasingly insufficient to provide the kind of context awareness able to support competitive digital business in marketing, transportation, financial, manufacturing, healthcare and other business decisions. However, the broad scope of externally accessible data is highly fragmented, voluminous, “noisy” and distributed. It is found in hundreds of thousands of Web and social sites, open government data, and premium data prepared by increasingly powerful data brokers.
Enter a new category of business-centric cloud services that delivers data to be used as context in business decisions, human or automated. These information services (or data/decision brokers) will become an essential part of intelligent business operations and smart business decisions.
Your company’s biggest database isn’t your transaction, CRM, ERP or other internal database. Rather it’s the Web itself and the world of exogenous data now available from syndicated and open data sources.

No. 3 By 2017, more than 20% of customer-facing analytic deployments will provide product tracking information leveraging the IoT.
Fueled by the Nexus of Forces (mobile, social, cloud and information), customers now demand a lot more information from their vendors. The rapid dissemination of the IoT will create a new style of customer-facing analytics — product tracking — where increasingly less expensive sensors will be embedded into all types of products.
These sensors not only provide geospatial information (where the product is right now) but also performance information (how well the product is functioning). This creates an opportunity to improve transparency and strengthen customer and partner relationships. It can become a key differentiator and a key part of your business model.
Access the Global Pool of Information

The ability to transform the business to compete in an emerging digital economy will be contingent on the organization’s ability to curate, manage and leverage big data, IoT content, social media, local and federal government data, data from partners, suppliers and customers, and other exogenous data sources that are materializing.

In 2015, business and IT leaders, especially information executives such as chief data officers, must make concerted efforts to transform from an inward focus on information management and value generation to participating in the growing global pool of information assets.
Forbes:  http://onforb.es/1zb4qTI

« Flaw in YouTube Allows Removal of Any Video
Russia's Greatest Weapon May Be Its Hackers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

ServerScan

ServerScan

ServerScan specializes in providing server scanning & compliance services to organizations of all types and sizes.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

Allot

Allot

Allot are a global provider of leading innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.