Baggit CIO Sandeep Kothari on IT investment plan

baggit-cio-sandeep-kothari-columnSandeep Kothari, chief information officer (CIO) of Baggit, a retail company, talks about the IT investment plans and how enterprises gain from technology deployments.

Baggit has its own stores and presence in large format stores. Baggit also follows franchise model. Baggit has its own e-commerce portal and is also present on e-commerce market place.

Baggit has already deployed Microsoft Dynamics AX ERP and achieved growth. Microsoft, IBM, HPE, Lenovo, D-Link and Fortinet are the main IT partners of Baggit.

Future technology investment plans

Hybrid Cloud: Examining the experiences of other businesses that have implemented the hybrid cloud can help plan implementation and migration better, while making the transition smoother. They can learn about:

Different price structures (including any hidden charges)

Actual uptime percentage

Service level agreements

Real-time support

Short-listing vendors based on skills and resources

The internal architecture needs to be converted into a sophisticated cloud platform that could easily incorporate cloud-computing technologies like:

On-demand scalability

Self-service solutions

Centrally managed system

Factoring Cloud environment capacity
baggit-chief-information-officer-sandeep-kothariEstimation of the capacity of the hybrid cloud environment would have to be done based on historical network growth information to understand when cloud bursting would be required–for the in-house private cloud to public cloud to deal with sudden spikes in workloads.

Availability of Comprehensive User Access Control

The hybrid cloud solution needs to have an effective User Access Control (UAC) system with the ability to set different permission levels for user access to the virtual data centers of an enterprise. Users with administrator roles should be able to view the complete audit trail of virtual data center activity.

Avoid Internal/External Data Theft: data theft is rampant in the business world.  The study found that 59 percent of employees who either quit or are asked to leave take confidential or sensitive business information upon their departure. Done without the employer’s permission, this confidential electronic information has the potential to be saved in multiple locations beyond the employer’s control and on devices unknown to the employer.

When the employee is in IT or security, the access to confidential data is even greater.  According to a 2008 study by Cyber-Ark Software, almost 90 percent of IT employees indicated they would take sensitive company data if they were laid off.  The types of data itemized in the report include passwords, customer information, intellectual property from Research and Development (R&D), financial and other strategic plans for the company.

Technology affords many methods for an employee to take data electronically from a company.  In the past, the most common method was to write the files to a CD or DVD, but a growing trend involves copying files to a portable USB storage device. USB devices are easily concealed, ready to use and can hold vast amounts of data. Other forms are: Smart Phones, Email, Messenger Services.

The goals of the Data Classification and Retention Policy are to identify all types of data created within a company and the amount of time it should be retained. While this may seem obvious, the process needed to develop an effective policy is arduous, demands participation from numerous departments throughout an organization and an attention to detail. After classifying the various data within a company, other policies can specifically address the data types and how to control and protect them.  Here IT Policy is instrumental in developing an effective e-discovery strategy.

Finally, companies should implement a centralized logging device. This device will receive all of a company’s log files for aggregation and allows a single view of what is happening throughout the organization.  In addition, it can provide critical information as to whether or not system was compromised by outside entities.

Tying up with all giant online traders and mobile wallets

Stock Management: From SKU-creep to smart manager of retail stock by reducing of SKU achievable with negligible impact on margin, but with positive impact on cash and cost of operation.

Supply Chain Management: The best policy could be maintaining an integrated, constructive relationship with other 3rd Party Logistics without surrendering control or oversight of warehouse and transport operations.

By Baggit CIO Sandeep Kothari

Related News

Latest News

Latest News