Security and permissions are showstoppers to adopt search

Security and permissions are showstoppers to adopt search

search-top-secret

Search and information discovery is a big deal these days. Inspired by Google and other web search giants, we want information at our fingertips at the right time. I’ve been following topic of search long time. You can jump on few of my previous articles about search – Oslo & Grap – new trajectories in discovery and search; Why engineers need exploratory search? and Pintrest will teach CAD companies to search.

You may think cost and complexity are top problems of search technologies. Crunching lots of data and connecting relevant information requires application of right resources and skills. You will be surprised, but there is one more element that drives low adoption of search in manufacturing companies – security.

Information age articles Enterprise search adoption remains low – survey speaks about survey done among 300 Enterprise IT professionals conducted by Varonis Systems. According to this survey – enterprises are afraid good search solution will allow to people o find information with no permission. Here is the passage which explains that:

The respondents were surveyed at two major security-themed industry events, the RSA Conference in February and Infosecurity Europe in April. When asked to choose the biggest obstacle to enterprise search adoption, 68% cited the risk of employees locating and accessing files they should not have permission to view. Further, even if an enterprise search solution perfectly filters out results based on established permissions, the majority of respondents indicated they are not confident that their organisation’s existing permissions are accurate. Additional obstacles to enterprise search adoption most commonly cited were accuracy of the results (36%), end user adoption (29%) and the ability of solutions to scale enough to index all the data (24%).

It made me think about complexity of manufacturing companies and enterprise organization in general. Established permissions are part of the story. The search results permissions are as good as data that enterprise systems are supplying to search software. GIGO (Grabage in, Garbage out). For many IT organization, management of security and permissions is a big deal. Think about typical manufacturing company. Tomorrow, search system can find all CAD files that were occasionally copy/pasted in different locations and shared between organizations outside of existing PDM/PLM tools. What else, multiple “publishing solutions” created variety of published copies in different formats. Add SharePoint and similar technologies sometimes adopted by divisions against approvals of central IT. Good search solution can be a litmus test to many IT organizations.

What is my conclusion? Manufacturing enterprises are complex. As I described, it driven by strategic, political and cultural lines. Search is disruptive technology that has a possibility to cross these lines and expose many elements of corporate IT problems. So, once more, we learn that only mix of technological and people skills can solve the problem. Strategists and technologist of search vendors should take a note.  Just my thoughts…

Best, Oleg

Share

Share This Post