Louis Columbus

73% Are Using Internet Of Things Data To Improve Their Business

Internet Of Things Data

  • According to the Cisco Visual Networking Index, M2M connections will represent 46% of connected devices by 2020.
  • 95% of execs surveyed plan to launch an IoT business within three years.

These and many other insights are from the recently published Cisco Internet of Things (IoT) study, The Journey to IoT Value: Challenges, Breakthroughs, and Best Practices published on SlideShare last month. The study is based on a survey of 1,845 IT and business decision-makers in the United States, UK, and India. Industries included in the analysis include manufacturing, local government, retail/hospitality/sports, energy (utilities/oil & gas/mining), transportation, and health care. All respondents worked for organizations that are implementing or have completed IoT initiatives. 56% of all respondents are from enterprises.

Key takeaways from the study include the following:

  • 73% Are Using Internet Of Things Data To Improve Their Business. The data and insights gained from IoT are most often used for improving product quality or performance (47%), improving decision-making (46%) and lowering operational costs (45%). Improving or creating new customer relationships (44%) and reducing maintenance or downtime (42%) are also strategic areas where IoT is making a contribution today according to the Cisco study.

  • IT executives often see IoT initiatives as more successful (35%) than their line-of-business counterparts (15%). With IT concentrating on technologies and line-of-business users focused on strategy and business cases, the potential exists for differences of opinion regarding IoT initiatives’ value. The following graphic provides an overview of how stark these differences are.

  • Engaging with the IoT partner ecosystem in every phase of a project or initiative improves the probability of success. The most valuable phases to engage with ecosystem partners include strategic planning (60%), implementation and deployment (58%) and technical consulting or support (58%). The following graphic provides an overview of most and less successful organizations by their level of involvement in the IoT partner ecosystem.

  • Only 26% of all companies are successful with their IoT initiatives. The three best practices that lead to a successful IoT implementations include collaboration between IT and business, the availability of internal and external partnerships to gain IoT expertise; and a strong technology-focused culture.
  • 60% of companies believe IoT projects look good on paper but prove more complex that expected. This finding underscores how critical it is for IT and line-of-business executives to have the same goals and objectives going into an IoT project. Being selective about which integration, technology, and professional services partners are chosen needs to be a shared priority between both IT and line-of-business executives.

By Louis Columbus

Louis Columbus

I am currently serving as Director, Global Cloud Product Management at Ingram Cloud. Previous positions include product marketing at iBASEt, Plex Systems, senior analyst at AMR Research (now Gartner), marketing and business development at Cincom Systems, Ingram Micro, a SaaS start-up and at hardware companies. I am also a member of the Enterprise Irregulars. My background includes marketing, product management, sales and industry analyst roles in the enterprise software and IT industries. My academic background includes an MBA from Pepperdine University and completion of the Strategic Marketing Management Program at the Stanford University Graduate School of Business. I teach MBA courses in international business, global competitive strategies, international market research, and capstone courses in strategic planning and market research. I've taught at California State University, Fullerton: University of California, Irvine; Marymount University, and Webster University. You can reach me on Twitter at @LouisColumbus.

View Website

CONTRIBUTORS

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have ...
How Big Data Is Aiding Police And Security Officers

How Big Data Is Aiding Police And Security Officers

Big Data Is Aiding Police Officers Big data has become a trusted resource for people in industries ranging from health ...
Secure Business Agility

Why Information Security Need to be Empowered to Manage Data Breaches

Manage Data Breaches 2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to ...
GDPR Compliance: A Network Perspective

GDPR Compliance: A Network Perspective

GDPR Compliance Regulations can be a tricky thing. For the most part, they’re well thought out in terms of mandating ...
Cloud Computing In Education

Cybersecurity Policies Must Address Internal Threats

Cybersecurity Policies The contentious U.S. election campaign offered up many highlights, but the aftermath of election night – explosive cyberattack ...
Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies ...
Part 2 - Identity Assurance by Our Own Volition and Memory

Part 2 – Identity Assurance by Our Own Volition and Memory

Identity Assurance by Our Own Volition and Memory We believe that the reliable identity assurance (See part 1) must be ...
Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
Your Biggest Data Security Threat Could Be....

Your Biggest Data Security Threat Could Be….

Biggest Data Security Threat Your biggest data security threat could be sitting next to you… Data security is a big ...