What’s Next For Enterprise Resource Planning (ERP)?

What’s Next For Enterprise Resource Planning (ERP)?

What’s Next For Enterprise Resource Planning (ERP)? 

consolidate-cloud

As a computer engineering student in the early 2000s in India, I remember when SAP was all the rage. In fact, such was the popularity of this ERP (Enterprise Resource Planning) product then, that it seemed it provided the sole option of making a career in the computer services industry. A lot of ERP’s popularity then can be attributed to the Y2K problem; companies used the disruption as an opportunity to adopt ERP like never before.

The ERP story had begun a decade before that, when Gartner coined the term as an extension of material requirements planning (MRP). Over the next two decades, ERP grew out of its manufacturing roots to encompass many other industries, and also disaggregated into tiers.

Tier 1 vendors sell ERP systems are typically those that are used by global corporations with annual revenues in excess of $1 billion. Such systems are more complex, provide greater functionality, need higher numbers of trained personnel and have higher cost of ownership. Tier 1 vendors are likely to offer global support to their clients. SAP, Oracle and Microsoft are considered Tier 1 vendors in the ERP space.

Tier 2 ERP vendors mainly serve mid-market businesses, with revenues from $50 million to $1 billion. Their products are of medium complexity and functionality, and have lower ownership costs than their Tier 1 counterparts. Often they are focused on individual industry verticals, whereas Tier 1 products are broad-based. Fujitsu, Epicor, Ramco and Sage Software are some Tier 2 ERP vendors.

Tier 3 vendors sell ERP systems that are designed for small companies that have annual revenues from $10 million to $50 million. Such systems have the least complexity and costs of ownership; at the same time, their broader functionality is also much lower. However, they often have greater focus on individual industry verticals. Expandable, NetSuite and Syspro are some examples of Tier 3 vendors.

 So, what’s next for ERP?

One obvious direction is to the Cloud. In this highly informative article, John Schlemmer makes an eloquent case for Cloud ERP, stating that 45% of companies are already implementing or investigating this option.

Another direction, which is not necessarily exclusive to Cloud ERP, is consolidation. Many organizations which had adopted ERP earlier had found it necessary to implement multiple systems to address diverse needs. While this may have been optimal some years back, improved functionality today can allow consolidation. Also, the boundaries between the ERP tiers that I mentioned earlier have become increasingly porous, with many vendors providing services that overlap multiple tiers.

This paper provides a convincing argument to consolidate ERP packages.

In a nutshell, it provides four reasons:

  • Rolling up cost and revenue
  • Risk management
  • Economies of scale
  • License and maintenance cost

Download it for free to get a detailed insight.

By Sourya Biswas

Sorry, comments are closed for this post.

Comic
How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…