In Partnership With:



Riversand: Interview with CEO

RiversandUpen, it may seem like an obvious question, but it’s one that business execs often confuse. Can you clarify for our readers what the difference between Big Data and Master Data is?

Big Data can involve any kind of data that an enterprise stores or cares about. It is typically characterised by the 3 V’s, Volume, Velocity and Variety. Big Data includes both structured and unstructured information. Master Data refers to the key and most important reference information in an enterprise such as Customers, Products, Vendors, Locations etc. While Big Data volumes are in the petabyte order of magnitude, this would typically be very high by Master Data Management (MDM) standards. MDM records typically number a few million in an enterprise (with the exception of certain B2C customer instances of hundreds of millions). MDM systems could provide the reference information needed to make sense of Big Data Analytics. They could act as the dimensions that would drive the Big Data Analytics. We typically see MDM implementations precede a Big Data implementation.

When is Master Data Management an essential component to a business? Which particular markets and industries stand to benefit from MDM solutions the most?

Any enterprise could benefit from an MDM system. The key factors that might drive the need to implement an MDM system would be the volume and velocity of master data. If the volume is low or the information changes infrequently, an enterprise might not need a fully-fledged MDM system. We have seen a need for MDM across most industry verticals. Different domains (Product, Customer, GL etc.) could be considered important for a particular vertical but overall we see a need across most verticals.

What should organisations be considering when setting up an MDM network and how can organisations keep their data well-governed and secure in doing so?

You can think of an MDM system as one of the key backbones of your enterprise. Having said that, sometimes it can be very tough to quantify the ROI for implementing an MDM solution. So here are a few key tips we give our customers:
With the increasing adoption of mobility strategies in the way companies offer their services, is the MDM implementation process affected?

MDM systems are intended for all channels including mobile. MDM systems would feed systems that deal with mobile communications. We see this as an important trend. We have yet to see how this impacts the way an MDM system is implemented though.

Your company specializes in Product Information Management (PIM) as well as MDM. Can you explain why product data accuracy and consistency is such a necessity?

Many enterprises buy and sell products. Most transactions reference a product entity. When we think of B2B or B2C transactions, the most important entities referenced are product and customer. Given that it is natural that enterprises need accuracy and consistency while describing products; this ensures fewer errors in orders, better brand consistency across channels and better customer loyalty. Many enterprises are striving for a 360 degree view of the product. Some of the key benefits of establishing proper PIM practices are:

A term we are hearing quite frequently recently is of the ‘360˚ view of a customer’. What does this term mean to you and why are more and more companies are trying to achieve it?

Different functions in an enterprise care about customer data. The Customer Support folks care about what the customer bought, purchase history, address, support plans etc. Marketing and Sales care about demographics, profiles, loyalty programs. Multiple systems in an enterprise store different aspects of customer and related information. It is very important for an enterprise to get a 360 degree view as this gives them the best overall view of their target segment, their behaviours, trends/interests etc. This deep insight into their customers is critical in driving all kinds of corporate strategies for growth including product innovation and positioning, pricing, up-sells, cross-sells, bundles, loyalty programs, social media interactions etc.

Any final thoughts to add?

We are excited that MDM and PIM have entered the mainstream lexicon. The questions that you have asked are the questions that we hear from our customers and prospects and I hope that my answers have been helpful. Thanks for inviting me to answer these questions!


Publications from

Protect Sensitive Data with Enterprise Encryption Solutions

Bringing customer experience to the next level

Micro data centres: The perfect choice for Edge Computing

Met Office weather — Setting the precedent for predictive data and insight

How sport is taking a leap towards analytics

Crunching the data for maximised business insight

Videoconferencing: At your convenience

How data analytics today is becoming ‘Cool’ and relevant

Surfing the wave of flash storage

The keys to big data success

Data Governance & MDM – best practices

Info Security: A case of risk vs. reward?

The Insecurities of the Info Security Climate

The security agenda in telco

Have you checked your SSL health?

Optimising data centre efficiency with DCIM

DevWeek 2015: ‘Agility’ or ‘Agile’ – the discrepancies

DevWeek 2015: Build your own technology radar

DevWeek 2015: Cloud consciousness

Enterprise efficiency and achieving the best work capacity

Inside the anatomy of DDoS attack

The complete picture: Building a 360˚ view of the customer

Re-considering data, third-party policies and visualisation

GRC – Dealing with today’s Data Minefield

Ways to increase Flexibility in your Data Centre

A virtual reality: The rise of Data Virtualisation

Omni-channel as a ‘matter of survival’

Why cloud-based communications ‘Matters’

How the data landscape is changing for Finance

How to ensure your converged Infrastructure is not dependent of power outages

Data Deluge: Channelling the flow of our data management activities

Get your Data in a Flash

IAM – Shifting from Expensive Custom to Standard Cheaper Solutions

Data Loss Prevention – Not quite the cure

Achieving efficiencies within the cloud

Agile BI: Reshaping our view to how we see BI

Business Understanding & Collaboration: The missing pieces in MDM

Business Intelligence in the context of GRC

Key business principles before moving to the cloud

BPM in the Cloud – Providing a one-stop-shop for cloud services

Private vs. Public: Measuring cloud deployment’s benefits, risks and costs

How cloud is enabling Software-defined Networking

Perfect partners: How to get your data centre SDN-ready

Fast Moving B2B Market: Multicountry Payroll Outsourcing

Going on a journey of data discovery using Business Intelligence

Storing Data in the Cloud? Better Watch Your Back(up)

An Innovative Systems Approach to Studying Human Wellness: The Vital Role of Sample Management

Shotgun Results in the Cloud – Whilst Avoiding the Casualties

Diversifying the Data Centre to Optimise Efficient Usage

‘YPlan’ at all?

To BI or not to BI – That is the Question

Protecting the Lifeblood of Your Organisation: SSL

BI Can See Clearly Now…

Building foundations for DCIM and BMS infrastructure

The Rise of the Chief Data Officer

CWF 2014: Interviews – Eric Van Miltenberg

Leave a Positive ‘Mark’ On Your Database Performance

CWF 2014: Interviews – Dr. Will Venters

CWF 2014: Interviews – Andy Johnson

CWF 2014: Interviews – Joe Baguley

Expanding on BPM Scale: Physical, Organisational and Customer

Panasas ActiveStor – a parallel approach to data storage

Regaining control with Next-Generation NAC

Continuous Monitoring – Protecting your cyber assets 24/7

Prefabricated modular data centre: is it the future of data centres?

Broadening horizons with visual data discovery

Enabling agility: Application-centric Cloud

Cloud Expo interviews – Excel, London

Overcoming the perils of email overload

A world of cloud and collaboration

The view from Mt. Rainier: QLogic’s FabricCache 10000

The power of predictive analytics

Improving Self-Service Business Intelligence Tools for Company-Wide Engagement

Making data a small matter with ECM

Delivering on the full promise of Business Analytics

The Devil’s in the Detail: Investigative Analytics

Securing Big Data without a big ordeal

Taking next-generation analytics to the next level

Reaping the benefits of collaboration with Video Conferencing

Preparing for a Cloudy Tomorrow

Enabling collaboration to achieve faster results

Enrich and personalise your customer’s experience

Bringing next-generation BPM to your enterprise today

Managed Cloud Hosting: More than just blue-sky thinking

Preserve and protect your data: Authentication

Cloud security 101 – protecting your data in the cloud

Finding value in the three V’s of Big Data

Enhancing productivity with BYOD

Today’s enterprise analytics conditions

How to evaluate and implement DCIM software

Bookmark today’s important IT tools: in-page analytics

Managed Services in the Cloud — Part 1

Managed Services in the Cloud — Part 2

Managed Services in the Cloud — Part 3

Optical Circuit Switching in the Software-Defined Data Centre Network

Into recovery mode with DR and backup functions

The big deal about Big Data and analytics

Making enterprise mobility move in your direction

Harnessing the benefits of application management and big data

GRC — an unsung hero in IT strategy

Covering all bases of the cloud

Improving storage capabilities all in a Flash: Part 1

Improving storage capabilities all in a Flash: Part 2

Mobile security in the age of networking

The velocity of today’s big data

Sit back and let SIP and VoIP do the talking

The move towards Software-Defined Networking

Scale out architectures to meet today’s Big Data needs

Encapsulating the Trends In Encryption and Key Management

Connecting the Digital World – Next Generation Data Centres Supporting the Cloud

UC in the cloud panel: Part Three

UC in the cloud panel: Part Two

UC in the cloud panel: Part One

Staying one step ahead of the hacker

Taking data backup and protection to a wider scale

Making your move to the cloud — best practices

An analysis into analytics

New attack vectors: Cryptographic key and digital certificate threats

Is Big Data too ‘Big’ for our boots?

A ray of light: managing your cloud platform effectively

Integrating Hadoop within a Big Data analytics framework

IT infrastructure concept: converged storage

Professional Profile special with 451 Research’s John Abbott

The changing shapes of today’s data centre architectures

Citrix in the cloud

Possessing tomorrow’s Big Data analytics today

Efficiency excellence: Sustainable data centre operations

Adapting to different industries with Master Data Management

Go on a journey of consumer experience

Having the correct contingencies in place – Data management

Breaking down complexities with data analytics

Controlling your cloud management platform

How to combat Advanced Persistent Threat attacks

Extracting pure performance through real-time data in the Healthcare Industry

The boom of outsourced operations in China

Protect and conquer: The importance of data protection

Access Granted: Privileged Account Management

Professional Profile special with Zurich’s Ricardo Mariano Gonzalez

Make room for Flash storage

The developing trends in IT in 2013

How to successfully merge your IT and Business strategies

Customising your data centre infrastructure

Achieving performance and business success with Application Performance Monitoring

Powell Electronics – SAP Upgrade to ECC 6.0

Delivering applications to virtualised servers

Augmenting analytics into your enterprise

Are employees putting your company’s data at risk? – Person-to-Person File Transfer

Modular momentum — the future of our data centers

Take command and control of BYOD with IAM and authentication

Access Granted: The key to good access management practices

Avoid security chaos under a DDoS attack

The modular appeal of datacenter design

Mastering master data management

Is today’s desktop truly dead? Or is it simply morphing?

Big Data: A Big Problem or Big Opportunity?

BYOD and The Consumerisation of IT

Room to spare: enterprise storage

Improving cloud with an integrated infrastructure

Delivering connectivity and security with a mobile IT architecture

Improving BYOD integration and data security with Desktop-as-a-Service

The benefits of cloud infrastructure management

Blowing the clouds wide open — OpenStack

Assuring Service Quality and User Experience for Unified Communications Deployments

APM is not enough – Service Delivery Management is better

Why is Modular better than Traditional?

Secure information communication through Managed File Transfer

The appeal of optimized and efficient DCIM tools

Sharpening your tools ready for the evolving data center

Improving enterprise mobility with BYOD

Establish operational excellence through DCIM

The explosion of Virtual Desktop Infrastructure

Integrate your DCIM strategies with converged infrastructure

Using Big Data to enhance customer experience across multiple channels

Real-Time DCIM — exploring focus capabilities in the wide field of Data Center Infrastructure Management

A cloud that’s fit for the enterprise

Cloud — Going beyond the hype

Maximizing your Data Integration strategies to full effect

Establish insight and knowledge with Big Data and business analytics

Command and control the complexities of today’s data center

The components of a high-performance data center

Turning Big Data into an opportunity — not a concern

Maintaining high value and performance in running your data center

Producing Effective Data Governance Across the Enterprise

The Paradigm Shift in Finance and Accounting Outsourcing Capabilities

Building bridges with real-time Optimized Data Center Infrastructure Management

Bringing employee empowerment through Mobile Business Intelligence

Move to the Next Generation of BPM

‘Lock and key’ — Bringing secure encryption and key management processes to the enterprise

Tap the Power of Process Innovation in the Mobile and Social Age

If business is from Venus and IT is from Mars, BI Agility is a Pipedream

Finding meaning in the information deluge

Securing access in a mobile world

Use the MDM approach that’s right for your business

Taking WAAS [Wide Area Applications Services] over to the enterprise

Teaming up – The overall effect of IT strategic partnerships

A New Game-Changer in Data Replication

Ensuring security through Identity and Access Management

MDM: Success through integration, quality, and governance

Utilizing and leveraging your Unified Communications system effectively

The growing influence of IT consumerization on enterprise collaboration

How to extract data center performance and efficiency

Avoiding organizational headache with outsourcing

Are you ‘Future Ready’? Reengineering processes today for tomorrow’s business challenges

Taking it step-by-step — Business Process Management

An ‘Appy’ time for the enterprise? The challenges the applications market pose

‘Caught on computer’ – Identity and Access Management

Executing your Social Software strategies

A social revolution in doing business

The modern era of Enterprise Search

Enterprise search function and data capabilities

Enhancing SharePoint as an ECM platform

The speedy development of Wireless LAN

Taking brand communications to the next level – Brand Asset Management

Simplifying cloud confusion

Applying effective capacity management solutions

Strengthening your data structure using ETL 2.0

A Unified Content strategy

Avoiding organizational immobility with Mobile Device Management

Building your environment around Unified Communications

Controlling content chaos

Don’t let your backup slip through the cracks – protect and access remote data

A marriage between IT & marketing: Mobile Content Management

Maximizing Communication

Mitigating Risk and Securing Devices for the Mobile Employee

Delivering applications to the enterprise

The ever-changing environment of Enterprise Content Management

Cooling today’s data centers

Mastering a business process service

Managing cloud services

Minimizing Costs of Managing Microsoft Endpoints

Business Process Outsourcing – payroll solutions

Dealing with Advanced Persistent Threat attacks

The boom of e-discovery

Building the foundations: Infrastructure management

Integrated IP Address Management Solutions

Storage in the virtualized world

Practical insight from a cloud expert on cloud security, options and trends

Dr Cloud’s prescription description

Improving software communications – the cloud

The private cloud migration

Essential email management intelligence

The green room

Go with the flow

The IT evolution

Improving testing effectiveness

Increasing staff efficiency with professional communication and smart integration

Spear Phishing and the Modern Cyber Attack

Avoid being a target – secure applications

Exponential data volume and the IT cost explosion

Letting the right people in

Security check

The real-time link

More bang for your virtualization dollar

Crucial cloud connections

Realize the true potential of a multi-tenant cloud

Manage centrally, work anywhere

Ride the cloud with next generation mobile apps

Standing out in the crowd

The fundamental failings of end-point security

Making the Cloud Work

Exceptional work experiences in a social business

Head in the clouds

Doing more with less

Getting on the right path

Reaching end-to-end visibility

Signed, sealed and delivered – securely.

Racing against time

Staying in control with customer requirements in an increasingly agile world

Reinvent with cloud; Don’t be left behind

Top of the food chain

The Sky’s the limit for Enterprise Mobile Users

Be on your guard with Vulnerability Intelligence

Preservation and privacy

The source

The Capacity Quadrant

Follow the flight path

What’s on your network?

Lean, mean and perfect performance

20-year journey in process automation

Capturing control

The best of both worlds

The last automation frontier

Problem solved

Global networking

From inception to testing

Insight into SIEM

Outsourcing around the world

Your business blueprint

Look before you leap

Are you social media-proof?

Full support

Leaps and bounds: Aligning customer engagement from contact center to enterprise

The end of BI as we know it: A fresh look at business analytics

Want client virtualization? Time then to get your back-end infrastructure act together

The future is video

Harvard Medical School Use of Cloud Computing Provides Harbinger for New IT Business Value, Open Gro

Process automation elevates virtualization use while transforming IT’s function to app and cloud ser

How the hybris Multichannel Suite gets you Cross-channel Nirvana

Cloud Computing’s Ultimate Value Depends Open PaaS Models to Avoid Applications and Data Lock-In

Analysts Define Business Value and Imperatives for Cloud-Based B2B Ecommerce

Business process-driven ALM: Create your own app factory

Modern Data Centers Require Efficiency-Oriented Changes in Networking

Business and IT—side by side

Pure logic

SIEM satisfaction

Actionable intelligence

Archiving on demand

An innovative approach to business marketing and communication

One at a time

A question of semantics

The new procurement challenge for travel management

A marriage of sorts

Moving with the times

Smooth transition

Back on track

Purchasing software and procurement solutions

GRC—Step by step

Join the conversation

The back office means business

Immediate results

A new breed of players

Secure and social

No time? No staff? Problem solved!

Bridging the gap

Search—What’s in it for you?

Getting in gear

Under the Microscope

Working in Tandem

Doing IT like a pro

Communications-enabled business processes

Defining CEBP

Finding the way

We built this city

Pervasive BI

Expansion and contraction of BI with Netezza, SAS, Accenture and the Aberdeen Group

Software podcast discussion

The best ways to approach service level and IT management

Making BI responsive to business needs

Virtualization podcast with Dr. Mark Russinovich

Software as a service and its contribution to high performance

Trends in combining software

Enterprise business intelligence strategies and opportunities

The best way to incorporate social software into the enterprise

Move it or lose it

The challenges and benefits of IAM integration

Lawson – head to head


Simplify the information discovery process

The key issues in financial BI

Staying ahead of the hack

Secure Sensitive Data and Streamline Compliance

The Virtualization Explosion

No breaches – guaranteed

PCI DSS – How to walk the line

Best Practice Enterprise Risk Management

Finding the right balance

Deep dive into SIEM 2.0

It’s called business intelligence for a reason

Enabling business continuity by eradicating security threats

A parallel universe

Security at its best

Proactive information management

Future focus—ITSM and the service desk

Working hand in hand

Data intelligence

Spend less…and improve access control

Searching for agility

Shared purpose

The season for change

The unwired enterprise

SIEM—Spiralling out

Safety first

Omniture and – A success story

Simplifying IAM

Is your business performance at its best?


Stop looking in the rear-view mirror

Fighting back on cybercrime

BPM—Changing how you do business

Analytics—Fuel for growth

Fog clears on precautions for putting more enterprise data safety in clouds

Improving business-critical decisions

Sign up to receive the Enterprise Management 360˚ ‘Weekly Digest’ direct to your inbox every Thursday. This contains news on the latest industry trends, interviews with key thinkers, white papers and videos. Unsubscribe at any time

Email address