Working from Home May Become the New Normal. Are You Ready?

Richard Robinson

Richard Robinson

Principal Sales Engineer – Financial Services and Insurance

As the world navigates the COVID-19 pandemic, results from one of the many forced social experiments is starting to materialize: remote work is becoming a feasible option for traditionally-focused office cultures. Many companies have announced permanent work from home (WFH) policies and flexible work location programs after observing positive results in productivity and employee morale. Although remote work is not for everyone, companies are realizing the cost advantages of fewer office footprints and hiring remote employees in lower-cost locales, as well as increasing business resiliency effectiveness and flexibility that go beyond historically-assessed regional disruptions.

Successful remote work environments do not happen overnight. Culture, policies, data security, and technology are just a few considerations for fostering an efficient remote workforce. A dispersed employee base greatly increases the importance of centralized technology to foster high levels of collaboration, workflow efficiency, and data insights. For decades, sales departments have focused on deploying high availability solutions for salespeople constantly on the road. Conga uses this successful framework to enable remote work from finance, legal, operations, and other stakeholders involved in turning opportunities into cash. These are the principles Conga keeps top of mind as we build on our efficient, adoptable, and scalable solutions while protecting company intellectual property.

Secure Cloud-Based Solutions

High availability requirements have come in the form of cloud-based applications that can easily address load factors, server redundancy, and centralization of information. As the number of cloud providers have increased in the marketplace, so have concerns for data breaches, compromised access, and other events exposing companies to liability and loss of intellectual property. Cloud solutions have come a long way since their introduction, but companies continue to associate cloud with security concerns.

A truly secure solution addresses security head-on for both application and server-level concerns. From compliance certifications like SOC, ISO, and Department of Defense (DoD), to independent third-party penetration tests, companies should have comprehensive information security reviews to assess vendor risks. When done correctly, secure cloud-based solutions can foster centralized tools for a decentralized workforce, while minimizing information technology risks.

For Conga, we chose to build on the Force.com platform given its hyper-focus and success in securing crucial information. Some of the largest, most regulated companies, as well as government agencies, rely on the Force.com platform to protect critical data. To ensure the highest level of compliance, the platform has many industry-standard certifications, including SOC 1/SOC 2, ISO 27001/27017/27018, FedRAMP, and DoD IL2/IL4. Conga prides itself on reviewing and addressing annual independent third-party penetration test reviews as part of our effort to be the most reliable and secure Quote-to-Cash (QTC) solution for Document Generation, Configure Price Quote, Contract Lifecycle Management, Revenue Management, and eSignature.

Permissions and Access Controls

Translating traditional physical access to technological controls is not an easy feat. Without physical doors and keycards, companies need ways to control access to key assets while maintaining flexibility. Whether it is a physical firewall or administered permission sets, there will be trade-offs to selecting one versus the other.

Controlling authentication is not always a binary decision. A myriad of methods restrict access to resources: VPN, IP Ranges, Two-Factor Authentication, and Single Sign-On just to name a few. It is critical for companies to balance security versus accessibility. For example, requiring VPNs may hinder ease of use on mobile devices, but relaxed authentication policies may allow personal devices with compromised security on the company network. Although most of these policy decisions have already been made, they would need to be reviewed and hardened as a larger remote workforce increases access points.

Data access also goes beyond binary decisions. For example, contract records may require full access by attorneys, but a subset of data should be available for non-legal teams to provide certain data points, or simply as read-only, self-service to see current status. Instead of having functionality simply on or off, subsets of permissions may be better suited for collaboration when needed. Any solution should accommodate for access controls beyond a two-position switch.

Conga natively allows for business flexibility in solution authentication and data permissions. Support of VPN/IP Ranges, 2FA, and SAML are native to our solutions. For data access, Conga uses a field-based methodology approach to allow admins to apply permissions to each field or record for read/write, read-only, delete disabled, and other varieties of permissions to ensure access meets company policies. Permissions are handled at a profile level to allow fewer permission sets to be distributed amongst many users. The goal is to remain compliant across the company while allowing for flexibility to maximize employee efficiency.

Business Processes Guided Through Workflow and Automation

There is a theory that the further an employee is from headquarters, the less the training sticks. As a workforce of lone wolves, remote employees tend to rely on personal connections made within the company or try to “figure it out” when training and documentation is either insufficient or forgotten. Effective solutions address this deficiency by creating intuitive user interfaces for ease of navigation. However, the best solutions enable companies to configure workflows and automation to align with their business processes, as opposed to limiting processes due to technical constraints.

Intuitive workflows ultimately drive adoption and efficiency. When these workflows incorporate the nomenclature and language of the business, they lower learning curves by minimizing the need to translate business speak into technical diction. The ability to configure solutions to conform to the business makes it easier to find information, perform actions, ensure accurate data entry so employees can rely on tools to be complete sources of truth, rather than a frustrating piece of a complex puzzle.

Configuration is exactly where Conga thrives. The elastic data model promotes custom labels to align with company terminology. Workflows and approvals are developed in a “Clicks, not Code” environment to easily configure steps and rules based on business processes instead of a rigid system requiring business conformity. Automation further reinforces a positive user experience by minimizing repetitive clicks and unnecessary data entry.

Driving Success with a Remote Workforce

Conga itself has a sizable remote employee base that relies on best-in-class solutions to drive employee effectiveness through intuitive interfaces and business-purpose configured tools to drive user adoption. We understand first-hand the challenges of running an effective decentralized company on a centralized mission. Our experience, along with customer feedback, makes its way into our products, solution demonstrations, business transformation engagements, implementation designs, and multi-tiered customer support. We would be happy to share our experience and expertise as your company transforms to operate in a new normal. All you have to do is ask.

 

Please Talk To Us If You Are Interested In How Conga Can Help You

Trending Blogs