IT departments everywhere have a golden opportunity to look good by jumping on Google's decision to make SSL certification a part of rankings.
Earlier this month, Google made an announcement that went largely unnoticed. Given the implications for most businesses, ignoring this change could be a mistake of considerable magnitude.
"Google is taking a stance on security and has made SSL a piece of their ranking algorithm. As we are aware search engine ranking remains one of the single most important components of any organization's branding efforts and online presence." — HTTPS as a ranking signal, August 6, 2014
At first glance, this might appear as little more than an exercise in data center architecture. Certificates must be acquired, deployed, and enabled for apps. Architectural decisions on how to enable visibility of now-secured traffic must be made. It's purely an IT concern, certainly.
The business, marketing in particular, still pays a lot of attention to search rankings. According to a 2014 State of the Industry survey conducted by Moz, an SEO consulting firm that's tracked the impact of rankings since 2004, "Rankings were still considered 'Somewhat Important' or better by almost 92% of respondents. They were still considered 'Important' or 'Extremely Important' by 73% of respondents. Rankings are far from dead."
Need more? How about some measurable data? The online ad network Chitika confirmed in a 2013 study that search engine position translates directly into clicks, with 33% going to the No. 1 spot and 18% for second place. The click-through rate gets uglier from there. This is one game where placing in the top three matters, more than we might like to admit. In a digital, application-centric world where hits and visits are essential to making money, search engine ranking is a critical component of any business strategy.
That means Google's decision is a business concern that can be addressed only by technology. Unlike past algorithm tweaks that focused on keyword relevance and metadata optimization, this change requires IT to get the business ahead of the game or at least keep it playing. In the interim between now and when the full effects of the new algorithm begin to have an impact on organizations (Google doesn't give a firm timeline, but the writing is clearly on the wall) your business has an opportunity to gain a competitive advantage by ensuring it's SSL-enabled -- before the competition. Google's post gives seven specific steps to take.
This change puts the ball squarely in IT's court. It is only within the bowels of IT that SSL can be enabled, whether implicitly on every application server that might deliver an app that will be affected, or explicitly via an SSL-enabled reverse proxy architecture. In either case, IT can make or break this opportunity by having a direct and very significant impact on the business.
There are other examples of just how important a player IT will be in enabling businesses to either open the door or slam it shut when opportunity knocks, but rarely are they as clear-cut as this one.
Think apps are the only way IT can contribute to business success? Not so.
By now, most technologists have decided that when business colleagues say "IT innovation," they usually mean "new applications." There's good reason for that -- it's a mad-about-apps world, and the new economy is based on installs and subscribers. But there are cases where it's not just about the applications, but rather how these applications are delivered, that will make or break an opportunity.
Google's new view on SSL enablement is one of those cases. Operations and networking teams have the chance to shine and show that "the network" can, in fact, enable opportunity. Don't blow it.
It's not just data scientists and security ninjas in high demand. SDN, the Internet of Things, DevOps, data center convergence, and mobility are giving rise to entirely new job categories. In this InformationWeek survey, we want you to tell us about the hottest skills, how you're getting the expertise you need, staff training vs. making new hires, use of contractors, retention methods, and more. Take the the InformationWeek 2014 IT Skills Crunch Survey today and be eligible to win a prize. Survey ends Aug. 22.
Lori MacVittie is a subject matter expert on cloud computing, cloud and application security, and application delivery and is responsible for education and evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience ... View Full Bio
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.