Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/15/2010
08:41 AM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: SAP Blows Huge Opportunity With Timid Support Changes

SAP is overblowing its new support plan, which gives customers only marginally more choice.

"--Sumptuously Supreme is 48 ounces and comes with a lid, a straw, free refills, your choice of flavors, your choice of ice or no ice, drink-holder, swizzle sticks, sweeteners, and a thank you from the order-taker. Its price is $2.00.

"—Not As Good is 40 ounces and comes with a lid, one ice cube, and a small napkin. Its price is $1.85."

I guess my main problem in all of this is SAP's apparent belief is that the world hasn't changed much in the past five or 10 years, and that the business model it rode to such phenomenal success in its first few decades existence will endure forever, regardless of changes in technology, competition, customer requirements, and global business climate. And that out-of-touch mentality is precisely what has caused SAP to miss this golden opportunity, and to miss it badly.

SAP could have positioned itself as the global enterprise-software company that has not only the widest range of superb technology but also the one with the most modern and customer-centric business models. But it didn't.

SAP could have positioned itself as the enterprise software company that is willing to share risks and rewards with its customers in everything from products to services to support to new-product development. But it didn't.

SAP could have buried Oracle as a serious contender for the top spot in global enterprise applications by clearly and unambiguously using a truly tiered support and maintenance structure—one with more than two barely separated price points—to differentiate itself unmistakably from Oracle's monolithic 22% for all. But it didn't.

SAP could have given its customers and prospects the incentive to throttle back on their evaluations of alternative vendors and approaches, including SaaS and other cloud models. But it didn't.

SAP had the chance to truly remake itself in the minds of its customers and prospects worldwide. But it didn't. And as a result, in today's tumultuous business-technology world, SAP might well learn that an opportunity is a terrible thing to waste.

RECOMMENDED READING:

Global CIO: Why SAP Won't Match Oracle's 22% Maintenance Fees

Global CIO: Where Do Oracle's Profits Come From?

Global CIO: Will SAP Move To Tiered Maintenance Fees?

Global CIO: SAP Is Testing Flat-Rate Pricing For Large Enterprises

Global CIO: An Open Letter To SAP CEO Leo Apotheker

Global CIO: Will Oracle Or SAP Blink First On 22% Maintenance Fees?

Global CIO: Oracle And SAP Race For Mid-Market Opportunities

Global CIO: SAP Eliminates All-Up-Front Payment Requirements

Global CIO: SAP Preps For Cloud Future Via New Intel Partnership

GlobalCIO Bob Evans is senior VP and director of InformationWeek's Global CIO unit.

To find out more about Bob Evans, please visit his page.

For more Global CIO perspectives, check out Global CIO,
or write to Bob at [email protected].

 

Recommended Reading:

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17364
PUBLISHED: 2020-08-05
USVN (aka User-friendly SVN) before 1.0.9 allows XSS via SVN logs.
CVE-2020-4481
PUBLISHED: 2020-08-05
IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181848.
CVE-2020-5608
PUBLISHED: 2020-08-05
CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered c...
CVE-2020-5609
PUBLISHED: 2020-08-05
Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to cre...
CVE-2020-8607
PUBLISHED: 2020-08-05
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentia...