Why marketing goes rogue IT
- 08 June, 2012 15:11
Rogue or shadow IT--when business departments make their own arrangements with external vendors without consulting IT--is the bane of many CIOs. But from a marketing department's perspective, it's easy to understand the appeal.
"As marketers, we're used to asking: How can I get this done fast, and how can I spend less?" says Myra Rothfeld, CMO at Genworth Financial Wealth Management. "If you're working with your own large and complex IT organization, it doesn't feel fast or cheap."
To make matters worse, many technology vendors have discovered the marketing automation market, Rothfeld says. "I think it's particularly easy to do these days because there are so many IT vendors, consultants and specialists who find that market very desirable." In fact, she says, "You have to really decide not to do shadow IT."
It's a decision worth making. "As marketers, our objective is to build better, faster client experiences," Rothfeld says. "I personally have found that the best way to do that is within the structure of the leadership team, and with marketing staff who have a deep understanding of technology."
In the end, resisting the temptation to go rogue should pay off for marketing and the company as a whole. "It's really about competitive advantage," says Glen Hartman, global managing director of digital consulting at Accenture. "Rogue IT systems are usually siloed. Whichever companies can do the hard work of getting the CIO and CMO connected will be able to outpace their competitors."
Read more about it strategy in CIO's IT strategy Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
The Big Data Security Analytics Era is Here
Large organisations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.
Moving to a Private Cloud? Infrastructure Really Matters!
The Cloud isn’t about locality. It is about quality of service delivery, cost, and whether the services consumed satisfy our objectives. For the enterprise, you need to select the right QoS to mitigate the inherent risks or you face the problem of losing data and the ability to execute operationally. Read on.
Devising a Server Protection Strategy with Trend Micro
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s portfolio of solutions meets and exceeds Gartner’s recommendations on how to devise a server protection strategy. Precisely how Trend Micro does it is detailed in this whitepaper. Read now.