Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Avoid User in Training
Often when I’m onsite with clients, gathering requirements for an identity and access management (IAM) solution implementation, I’m asked, “What are some key things that we should do to help this implementation be successful?”
Clients are rarely prepared for the answer because it has nothing to do with the implementation. Implementations are becoming highly standardized in the approach of development, testing, go-live and post-production phases. With adequate support of project management, infrastructure, system admins, and the like, migration to production goes smoothly, the new IAM solution starts working, and everyone high-fives!
While that is great and we can all appreciate the hours of work and stress that go into reaching that moment, there’s another moment that usually takes even more preparation and can delay the first from happening if it isn’t considered soon enough: If the solution starts working, will any of your end users know how to use it? Because that moment – solution is working and the end user is using it – is the one truly worth celebrating.
If training and change management are started too late, it can delay your ability to go live with your new solution. End users are too often not thought about until the testing phase. When that happens, user acceptance testing (UAT) becomes what I like to call “user in training” (UIT). I compare it to passing a car with that “Driver in Training” sticker on it – I immediately want to be in another lane or section of the road far, far away! Similarly, it’s best to avoid user training during the testing phase for two reasons.
All of this results in a defect log that resembles a whack-a-mole game, at which point your engineers beg for solution-trained testers.
When should you start your training and change management communication and strategy? ASAP!
Investing in your end users’ experience builds your brand. End users will believe in the steps you are taking in innovation, security and efficiency, which breeds champions of change and makes your next implementation a welcomed event.
February 22, 2016
Identifying vulnerabilities and creating a plan.
Let us know what you need, and we will have an Optiv professional contact you shortly.