Looking Deeper Into The Data: Analysis and Analytics

Share this story:Twitter0LinkedIn0Google+0Facebook0

It’s great to have a line that’s far above the rest. It’s great to see that in the Magic quadrant, it’s great to see that in a wave, it’s great to see that in any industry report. But what does it all mean? The technology provider I understand that corporate executives like dashboards, spreadsheets, charts and graphs. These are the tools that many of them used to run their businesses day-to-day. But what does it mean to see a spike in the line; or what does it mean to see a drop in the line? The key to any reporting capability is to have solid analysis and analytics. For instance a marketing executive needs to know why the dramatic spikes in news reference volume from some vendors and not others. That same executive would also want to consider why search trends don’t follow news volume.

The technologies that allow you to come to conclusions based on data is inherently more powerful than the technology that just gives you reports. Reporting is a capability that has been built into even the most basic of managed file transfer technologies. But true analysis and analytics is only available from a handful of suites. But think about this for a moment, if the differentiation between one vendor in the next is not in the breadth and depth of security; it is not in the breadth and depth of protocol and communications support and then where is the differentiation? I would argue that the differentiation exist on the ability to give corporate leaders the information that they need to make corporate decisions that drive shareholder value.

 Being able to track orders and shipments in relationship to external events and trends is inherently more powerful than just looking at green light that says all files sent were received. (Not to undermine that type of reporting is very necessary, but as companies projects mature analytics and analysis will take center stage.) Regardless of where you implement your file transfer technologies you should ensure that you are comparing the capabilities and functionality of that vendors analysis and analytics offering.

This entry was posted in Interactions, Managed File Transfer, Management, Security, Technology and Software, Visibility and tagged , , , , . Bookmark the permalink. Post a comment or leave a trackback: Trackback URL.

Leave a Reply