• Categories
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • Blog-WotFLast year, Konica Minolta launched a new portfolio called “Workplace of the Future,™” which integrates existing solutions with new technologies from Konica Minolta’s Business Innovation Center in Silicon Valley. As a founding member of this practice, I have had the opportunity to become fully immersed in the trends and opportunities in the connected office sector through conversations with 75+ startup leaders, extensive industry research, and an active presence at industry conferences. (more…)

    Cloud, Content Management, From the Experts, Solutions, Strategy, Technology

    , , , , , , ,

    How ECM Will Evolve in 2017

    , Director, Enterprise Content Management

    Blog-ECM1_resized

    As I sit here to write this post, I’ve pulled up my favorite Jazz station from the Amazon Prime App on my laptop and I hear Frank Sinatra’s, “The Best is Yet to Come” – a favorite.

    The best is yet to come, and won’t that be fine
    You think you’ve seen the sun, but you ain’t seen it shine

    These lyrics resonate with me as I formulate my predictions for Enterprise Content Management (ECM) for 2017. We’ve had a great year in 2016 providing ECM solutions and services to our customers.  But, in 2017, we expect to bring greater growth and expansion for customers, employees and the industry. (more…)

    Cloud, Content Management, From Our Experts, Solutions, Strategy, Technology

    , , , , , ,

    IP Theft and the Insider Threat

    , Managing Director, Computer Forensics

    PrecisionDiscovery_remarketingad_250x250_0831Your company has undoubtedly invested significant time, energy and money to develop intellectual property (IP) – unique ideas, methodologies and trade secrets – as well as other intangible assets – customer lists, plans for future products, non-public financial information, contracts with suppliers, software source code, and so on.

    These information assets are extremely valuable, and often what differentiate you from the competition. In the wrong hands – the hands of a competitor, for example – the damage could be catastrophic.

    IT professionals lie awake at night making sure their networks are protected from outside threats. And yet you don’t have to look too far to find high-profile examples of security breaches. The 2014 hacking of Sony Pictures and the release of thousands of private emails and documents was both costly and embarrassing for the company.

    Perhaps, it’s another headline-grabbing event that offers an indication of what may be a more common and pervasive threat to your information assets: the release of classified National Security Agency (NSA) documents by Edward Snowden. Snowden, you may recall, was a contractor working for the NSA when he copied and released classified information without authorization. This wasn’t a hack from the outside; it was the job of an “insider.” (more…)

    From the Experts, Security, Solutions

    , , , , , , , , ,

    10 Technologies Driving the Workplace of the Future™

    , Director of Integrated Marketing, All Covered

    WotF eBookWorking for a company that provides technology solutions means that it’s important for me to keep on top of technology trends. One clear way to do this is to look at current All Covered clients to see what challenges have been top of mind over the last year and to determine what services have been paramount to ongoing operations. The other valuable way is to look to industry leaders, such as Gartner.

    I recently wrote the eBook (along with some very talented people here in the Konica Minolta marketing department), 10 Technologies Driving the Workplace of the Future™, and I knew I had to streamline intelligence from these various sources in order to make this eBook both accurate and interesting. In writing it, here are some of the most interesting developments I noticed:

    Businesses want (and need) processes to be increasingly “smart.” From a simple profit standpoint, this makes total sense. Businesses want to assure that their resources – from employees to computers and servers – are being utilized efficiently. Companies also want to receive the best data they can on what is and isn’t working for them. That’s why I knew it was important to talk about both customer relationship management and business intelligence as well as digital ecosystems as technologies driving the Workplace of the Future. It’s clear that information gathering and sharing can empower a business if done properly – through solutions like robust, custom CRM solutions – as well as encouraging a connection between your products and services and your employees – allowing for smart decision-making. (more…)

    Cloud, From Our Experts, Solutions, Technology

    , , , , , , , ,

    Print

    Security should be a driving force and not an afterthought for senior executives and their boards.

    It is important that senior executives require that their organization formally establish a credible cyber security program. It starts with setting strategic security objectives that must be achieved by December 31, 2016, and December 31, 2017. Think near-term, and think far! The organization must address security and compliance as a life-cycle, as a process. It will lower business risk! (more…)

    Content Management, From the Experts, Security, Strategy, Technology

    , , , , , ,

    How ECM Keeps Data Secure

    , Director, Enterprise Content Management

    PrintThere’s no doubt about it. Every company, no matter what size or type, has massive amounts of data and sensitive information that must be kept secure and accessible only to those who need it. There are solutions and best practices you can have in place that will ensure all of your information remains safe. Having a lack of technology and protocols to organize and protect your data is a good way to set yourself up for data security issues.

    The challenge is huge.  The answer is clear: enterprise content management (ECM).

    Data security doesn’t only have to do with information being stolen or hacked; it involves knowing where your data is located and being able to access it when needed. This is especially true when information is stored and filed on paper. The frequency of documents being misfiled and lost are higher than most people want to believe — and very costly. On average, between 2 percent and 5 percent of an organization’s files are lost or misfiled on any given day.

    Now add to this compliance regulations and audits. With the increasing levels of compliance regulations and required audits, both internal and external, keeping track of necessary documents is more important than ever. This is difficult with a system heavy on hard-copy data. Paper-heavy businesses run the risk of being compromised or losing data that could result in lawsuits and other negative repercussions.

    To combat these concerns, business executives have begun to implement firewalls and disaster recovery plans to ward off outside attacks on their data.

    Having a strategy in place is the crucial key to your protection. The bloodline of your organization is your data and that is not something you can risk.

    (more…)

    Content Management, From Our Experts, Security, Solutions

    , , , , , , ,

    No Rest For The Treasure Trove

    , Vice President of Strategic Services, All Covered

    legal pic

    As high-profile breaches continue to increase and flood the news every week, so does attention to the growing concern of protecting all types of data. Hackers have discovered that one of the easiest routes to a corporation’s data is through third parties. (more…)

    Content Management, From Our Experts, Security, Solutions, Strategy

    , , , , , , , , ,

    Adapting to Maintain Our Innovation Edge

    , President and Chief Executive Officer

    Blog-Taylor

    This is both an exciting time and a challenging time to be in our industry.

    New revenue streams are developing: enterprise information and content management, mobility and cloud, managed IT services, production and industrial print. All of these avenues lead to new opportunities for both our direct and dealer channels. And all of these avenues put an even greater emphasis on providing an unparalleled customer experience.

    While we see great growth in many areas, we must also look to the changing landscape of modern business. Employees – and employers – want and need new technology that will enable them to work anytime, anywhere. We must adapt our business to support the workforce of the future.

    (more…)

    Leadership, Strategy, Thought Leaders

    , , , , , , , , , , , ,

    Mastering the Mobile Workplace

    , Vice President, Marketing, All Covered IT Services from Konica Minolta

    15-KON-0377_Mobility_eBook_F.inddHow much time do you spend on your smart phone each day? Probably a lot. And, for the majority of us, it’s increasing. A 2014 study from mobile measurement and advertising platform Flurry revealed that on average, Americans spend 162 minutes on mobile devices each day.

    With so much time spent on smart phones and tablets, it’s not surprising that employees use their mobile devices for work-related tasks. While this trend offers a number of benefits in terms of productivity and flexibility, it doesn’t come without risks. Allowing a host of unmonitored devices to connect to a company’s network can make it many times more vulnerable to security breaches, non-compliance issues, data loss or corruption.

    So how can organizations encourage a mobile-friendly work environment while addressing these risks? If you’re going to allow mobile devices to connect to your network, you need to manage them properly, which involves an enterprise mobility management (EMM) solution.

    (more…)

    Cloud, Leadership, Security, Solutions, Strategy, Technology, Thought Leaders

    , , , , ,

    How Vulnerable Is Your Business?

    , Vice President, Marketing, All Covered IT Services from Konica Minolta

    Customers, regardless of size or vertical industry, continuously tell us that security remains a top concern. It’s easy to see why when the news is filled with data breach stories regarding Kmart, Target, Dropbox, NATO, JP Morgan Chase, the Montana Department of Public Health and Human Services and St. Joseph Health System (just to name a few).

    No business or organization is immune. Cyber security has become such a big concern that the Department of Homeland Security has declared October National Cyber Security Awareness Month.

    (more…)

    Cloud, Leadership, Security, Solutions, Strategy, Thought Leaders

    , , , , , , , ,