Home
Business Guide
 
simplicable technology guide   »  enterprise software   »  business intelligence (bi)   »  mashups

Mashups for Business Intelligence Explained

        posted by , December 07, 2011

The business intelligence market has changed.

Business users (frustrated with the cost, time to market and constraints of traditional BI tools) are bypassing IT and making their own purchases. A new breed of BI vendor has emerged and taken a big chunk of the BI market: BI discovery tools.

BI discovery tool vendors directly target sales and marketing to business users. The key message coming from these vendors is clear — business users can deploy and manage BI tools without help from IT.

What about data?

BI discovery tools allow business users self-serve access to business intelligence, analytics and forecasting. The only catch — BI tools require access to data.

The solution: self-serve mashup tools that allow business users to map business data and create data services.

Such tools are very light touch for IT. In many cases the business just needs to know how to connect to existing data repositories.

The Enterprise Risks of Self-Service BI and Mashups

In many cases BI discovery tools represent a faster, cheaper way for users to access business intelligence and analytics. However, this is often at the expense of the architectural soundness of the solution.

Data discovery BI tools typically take copies of enterprise data. In some cases they may be installed on a desktop or a third party cloud.

The use of this data can proliferate with time. Business users may use self-serve mashups and BI tools for critical business processes. This can expose organizations to business risks that may include:

data leakage

intellectual property theft

fraud

security incidents

disruption of business operations

disaster recovery challenges

legal and regulatory penalties

damage to reputation

expensive future projects to address security, data quality and business process issues



3 Shares Google Twitter Facebook



Related Articles



Enterprise Architecture
How to architect an organization.




Think your website is safe from DDoS? Think again.

Your architecture toolkit

What is security trying to achieve?

Enterprise Architecture — solving the world's problems one big box at a time.


Recently on Simplicable


101 Principles of Enterprise Architecture

posted by Anna Mar
This is the way to prove to your stakeholders that your recommendations are not just whims.

20 Easy to Use ITIL Metrics

posted by John Spacey
The exciting world of ITIL metrics.

The Big List of Information Security Vulnerabilities

posted by John Spacey
Understanding your vulnerabilities is the first step to managing risk.

The Big List of Information Security Threats

posted by John Spacey
Understand the threats to your organization.

Sitemap













about     contact     sitemap     privacy     terms of service     copyright