The Growing Interest In Enterprise Resource Planning (ERP)

The Growing Interest In Enterprise Resource Planning (ERP)

Enterprise Resource Planning (ERP)

The fact that large enterprises today have the ability to seamlessly move data all the way from manufacturing to human resources, and everywhere in between, is largely due to one of the greatest success stories in linking/ integrating cross-functions within companies: Enterprise Resource Planning (ERP) Systems. But as with many effective systems, ERP is not without its share of weaknesses.Back in the 1970’s, before commercial Internet and web-based communications, ERP made its entrance into the business world. At that time, vendors were still laboriously hand-keying, sending and receiving information on paper via internal systems. When the 1980’s rolled around, outward communications between manufacturers and trading partners was done through electronic data interchange (EDI) systems, requiring extensive testing to ensure security and integration viability to avoid risks.

With the speed that the market changes today, this approach is not only extremely difficult, but virtually impossible, and so it became natural for companies to look to their trusty ERP systems for assistance with their outside communication requirements.

Sadly, ERP is unable to deliver in the area of outside communications between manufacturers and vendors. Simply put, ERP was designed to excel at integrating everyone internally but did not address the need to communicate with the outside world.

Regions of the World

Most enterprises have had to look beyond their ERP system and search elsewhere for a solution to their outside communication needs. Many enterprises have chosen to use cloud-based providers to provide that solution, and open up a whole new world full of trading partners from all regions of the world.

Getting on board of a cloud-based system can be achieved in as little as a couple of weeks and in some cases several days. An enterprise can move into a prime position to exchange invoices, bills of lading, purchase orders and the like on a daily basis in a very short time.

For companies still using EDI systems to exchange information and documents, there are very real security concerns, requiring each business to deny trading partners and suppliers access to their ERP systems, making it cumbersome and limiting.

Information and data flows in from cloud-based and EDI systems to ERP via a secure application programming interface (API) directly to ERP and is controlled and managed by corporate IT.

The process appears to work well. The large number of enterprises that are considering, and those that have already done so, enhancing their ERP system with external systems to communicate with the world is proof positive.

The upshot of all of this for IT is that enterprises have found a way to run effective systems like ERP without trying to convert these systems to do what they were never intended to do.

It wasn’t too long ago that someone would try and find a way to convert an ERP system into one that would handle the outside processes of a business. Fortunately the ERP systems have maintained their integrity so businesses can they can be integrated with solutions to handle the need for communication with the outside world.

By Sam Michaels,

Sam is the managing editor and creator of Cloud Accounting Today. He holds a MS in Accounting and has over 10 years of experience in the field. He currently resides in Northern Virginia.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…