The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
|
|
|
- Dorthy McLaughlin
- 10 years ago
- Views:
Transcription
1 Research Publication Date: 4 April 2008 ID Number: G Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives and decisions are defined without a link or even knowledge of enterprise architecture (EA), and vice versa. Integrating these efforts will have a significant impact on driving more-consistent behaviors and decisions in line with the chosen strategic direction, thus increasing business value. Key Findings "Enterprise architecture" is the process of translating business vision and strategy into effective plans for enterprise change. "IT governance" is how the enterprise will direct and control resources to get there. They are two aspects, or instruments, of the enterprise's strategic plan and actions toward its business objectives. The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Ideally, ITG builds on a highly effective EA initiative. However, we find many organizations supporting EA and ITG at different levels of maturity. Recommendations If you have an effective EA initiative and an effective ITG initiative, the first critical step is to ensure that the common inputs and artifacts (such as business context, principles and models) between each of these efforts are aligned. If you have an effective EA initiative but don't have an effective ITG initiative, a best practice is to leverage EA practices (such as requirements, principles and models) to create the ITG model and ensure that your organization's EA and ITG efforts are focused on the same business-driven goals and objectives. If you have an effective ITG initiative but don't have an effective EA initiative, leverage your governance model to help develop the business case for an EA program to create more actionable, prescriptive content with which to direct the organization and use in governance. If your organization does not have an effective ITG initiative or an effective EA initiative, it is critical that you determine the level of investment and costs associated with supporting EA and ITG. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
2 TABLE OF CONTENTS Analysis EA and Governance Are Different, but Highly Related IT Governance Enterprise Architecture The Intersection Between EA and ITG Integrating EA and ITG Organizations With an Effective EA and an Effective ITG Organizations With an Effective EA and an Ineffective ITG Organizations With an Effective ITG and an Ineffective EA Organizations With an Ineffective ITG and an Ineffective EA Bottom Line... 6 Recommended Reading... 7 Publication Date: 4 April 2008/ID Number: G Page 2 of 7
3 ANALYSIS In many organizations, we find that IT governance initiatives and decisions are defined without a link or even knowledge of EA, and vice versa. IT management is working on IT governance and on partnering with people in the business on IT projects supported by a governance model. Meanwhile, enterprise architects are somewhat separately focused on EA processes and practices, and engaging business leaders to ensure that the evolving enterprise architecture reflects and supports the business strategies and goals (see "Myth Busting: What EA Is Not"). Defining an enterprise architecture and an IT governance model should be closely linked, and both efforts should leverage the other's work and results. In addition, both enterprise architecture and an IT governance model should be used in the definition of an IT strategy plan. However, a lack of business and IT leadership vision, political issues (for example, "stovepiped" organizations, ownership and control of "turf" issues, and communication challenges), lack of a commitment to EA and/or governance, and the inability to execute well on either EA or governance cause a schism between EA and governance teams. The result is: 1. Duplication of many of the common and base practices 2. Disjointed and incongruent decisions 3. Overly complex allocation of roles and responsibilities These issues, in turn, can have a huge impact on business effectiveness and competitiveness and the perception of the value of IT, and cause a drain on limited IT budgets and resources. So, how can EA and governance teams work together to support their respective efforts, and leverage each other's work? There are two key interrelated initiatives. The first key initiative in starting to integrate EA and governance efforts is to understand how advanced (or limited) the EA and governance initiatives are today and to identify strategic areas where they can work together. The second key initiative is to identify possibly conflicting roles, responsibilities, and reporting channels between EA and ITG. In this research, we look at four scenarios and outline specific best practices for how these teams can work together to help the organization work through this process. 1.0 EA and Governance Are Different, but Highly Related 1.1 IT Governance Although there is broad interest in "IT governance," we find that there is also a lack of a wellaccepted definition (see "CIOs Reveal Their Issues With IT Governance"). Gartner defines ITG as "the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals." ITG is created in support of an IT strategic plan and is composed of processes with the inputs, outputs, roles and responsibilities that are inherent in a process definition that enable organizations to make decisions on how to allocate and prioritize the IT resources and spending (see "A Primer for Strategic IT Plans"). One of the models we use to represent ITG is the Gartner IT Governance Demand/Supply Model (see "Defining IT Governance: The Gartner IT Governance Demand/Supply Model"). The model illustrates the role of an IT governance strategy relative to demand governance (for example, what should the IT organization work on?) and supply governance (for example, how does the IT organization do what it does?). Publication Date: 4 April 2008/ID Number: G Page 3 of 7
4 When most organizations focus on implementing effective ITG, several key elements must be agreed on and put in place. First, the business strategy and initiatives are used to drive the definition of principles and policies that align IT to business initiatives and objectives and guide the usage of IT in the organization. Second, the domains of IT governance must be identified (that is, areas of activity and responsibility subject to ITG). Third, management must have clear and agreed-on goals for ITG. Fourth, the business organization's structure and style must be clearly identified and defined, including who has the responsibility and accountability to make the appropriate decisions consistent with the agreed-on principles for each domain. 1.2 Enterprise Architecture Not unlike ITG, there are varied definitions and understandings of what enterprise architecture means and its impact on the organization. Gartner's definition of EA is that it is "the process of translating business vision and strategy into effective enterprise change by creating, communicating and improving the key principles and models that describe the enterprise's future state and enable its evolution" (see "Gartner Defines the Term 'Enterprise Architecture'"). A holistic enterprise architecture has a minimum of three viewpoints consisting of the business, information and technology viewpoints. They intersect into the fourth EA dimension the enterprise solution architecture. The goal of EA is to provide actionable, prescriptive guidance for business-initiative-level decision making (programs or projects) that is consistent with executing a transition plan toward a described, future-state architecture that aligns to the business strategy. EA is a form of strategic planning, but it is often not seen as being the "IT strategic plan." The IT strategic plan often addresses content beyond the EA, such as the list of planned project initiatives. So, EA and ITG are complementary efforts that must be coordinated and integrated but they are not the same. 1.3 The Intersection Between EA and ITG Both EA and ITG provide respective frameworks for supporting better and more effective decision making (such as proposing trade-offs, building agreement and resolving conflicting priorities). In addition, neither practice proposes to "boil the ocean" by dictating all details; this is left to the different practice areas (for example, security, compliance, project management and application management). The critical point is that there are several key overlapping intersection points that both EA and ITG are driven by, including business strategy, principles and models. In fact, in the Gartner definition of EA, we describe that enterprise architects compose holistic solutions that address the business challenges of the enterprise and drive the governance needed to implement them. In addition, part of the overall EA process includes a subprocess for the EA assurance process. This is, in essence, a governance process the IT aspect of which must be integrated with the broader IT governance process so as not to create confusion and to minimize process redundancy. The EA assurance process is essential to the success of EA, because without it, EA material can go unused and simply sit on a virtual shelf. 2.0 Integrating EA and ITG In the best-case scenario, IT managers should use the artifacts of EA (such as business context, principles and models) to develop a business-driven IT governance strategy. However, the challenge is that ITG and EA efforts are often developed in parallel and/or independent of each other. Furthermore, in informal client discussions, we tend to find that approximately 20% of most Global 1000 organizations have and utilize a well-defined enterprise architecture. Publication Date: 4 April 2008/ID Number: G Page 4 of 7
5 So, given that organizations may be in different places with respect to EA and ITG, how can they integrate and link the two efforts to the benefit of both practices? We offer guidance to enterprises in the four categories discussed previously. 2.1 Organizations With an Effective EA and an Effective ITG If the enterprise has an effective EA initiative and an effective ITG initiative, the first critical step is to ensure that the common inputs and artifacts between each of these efforts are aligned aligning EA and ITG artifact creation. The second critical step is to ensure that role assignment, responsibilities and reporting channels are aligned in the two initiatives. The enterprise should evaluate the efforts to ensure that the EA principles, common requirements vision (including business strategy and IT response), current state, future state, and business context are aligned. If these are not aligned, particularly the common requirements vision and principles, the organization risks a major divergence between the vision of the enterprise and the vision of the IT organization. The EA team should take the lead, but needs to work with the governance team to resolve these differences. The enterprise should leverage established EA models for the anchor model, the current state and future state, principles, and the business context as the basis for representing these common inputs and artifacts. If these common inputs, artifacts and people are aligned, the IT governance should use the wellestablished enterprise architecture to prioritize the supply-side and demand-side project and resources as part of the program and portfolio management process. Equally, the EA team should leverage the IT governance model when defining the EA organization and defining working groups with business leaders. The specific assignment of governance roles and responsibilities for each IT domain should orient the creation of those EA working groups for decisions in each of the domains. Enterprises should strive to eliminate any overlapping decision processes between the EA assurance subprocess and the IT governance process. 2.2 Organizations With an Effective EA and an Ineffective ITG If the enterprise has an effective EA initiative and doesn't have an effective ITG initiative, a best practice is to leverage EA practices and content (that is, requirements, principles, models, governance and measurement) to create an ITG model, because this will save time and investment, and ensure that the organization's EA and ITG efforts are both focused on the same business-driven goals and objectives. In many respects, this is an ideal model, as the enterprise moves from charting the map (EA) to steering the journey (ITG) toward a business objective. To accomplish this, the EA team (including IT architects, IT practitioners and business leaders) should have defined broadly agreed-on EA principles, common requirements vision, the current state and future state, and the business context. These common artifacts can be used to set the direction, define priorities and identify gaps. In addition, the different architecture viewpoints may have defined and represented their respective architectural components, domains, patterns and services. Furthermore, the different architecture viewpoints have represented their artifacts, which can be used as a starting point for both the efforts of business (that is, demand) and IT (that is, supply). Enterprises should take the EA assurance (that is, governance) subprocess and expand it to address the other IT areas where governance controls are needed (such as project management, budget and spending, and resource control). Publication Date: 4 April 2008/ID Number: G Page 5 of 7
6 2.3 Organizations With an Effective ITG and an Ineffective EA If the enterprise has an effective ITG initiative and doesn't have an effective EA initiative, it should leverage the governance model to help focus on the need for EA and/or create an EA assurance subprocess for the EA program. If this is the scenario, chances are the IT organization has tried its best to work with business leaders and senior executives to define IT governance goals and the strategies of stakeholders/customer groups, and to define the principles and policies to guide the usage of IT in the organization. However, this type of interaction is often "grassroots," defined by IT leaders with a vision for getting their IT organization off a "tactical treadmill"; this can be frustrating and exhausting for IT and business leaders. However, this effort can be used to highlight the need for a higher-level EA effort. Enterprises should use the defined business strategy and governance goals to go back to senior management and business leaders to begin an EA discussion, such as defining a functional model viewpoint and a business anchor model. The enterprise may find that the principles that were initially defined to drive the ITG effort are good candidates as some of the EA artifacts. Also, the enterprise should ensure to include the ITG team and to leverage the work done by the ITG team to define the business strategy and principles. Enterprises should understand that, when one EA effort gets started, ITG base definitions may need to evolve to align with the enterprise architecture. 2.4 Organizations With an Ineffective ITG and an Ineffective EA If the organization has neither an effective ITG initiative nor an effective EA initiative, then there is a good chance that the enterprise has little support (or awareness) at a senior executive level for a business-driven IT organization and for creating an enterprise architecture. The enterprise needs to make a decision as an organization as to its level of investment and focus what it wants to put into EA versus ITG. As mentioned above, ideally, the ITG initiative would result from a solid EA effort. However, many organizations are unwilling or unable to make an investment in EA, and need to just solve their IT organizational and governance issues; so enterprises should determine their immediate and longer-term goals. Enterprises should determine their readiness and ability to support EA (see "Enterprise Personality Profile: Defining and Interpreting Dimensions and Descriptors"). In addition, Gartner provides an interactive tool that can help enterprises assess their own EA program maturity (see ). Once the enterprise determines its primary-focus EA and/or ITG, it should leverage the tools and methodologies in EA (such as requirements, principles and models) and ITG (such as goals, principles and domains) to help define common artifacts, which can then be used to support both EA and ITG in the short term and the long term. 3.0 Bottom Line Regardless of where your organization is with respect to its EA and ITG efforts, you must ensure that your EA and ITG teams are closely aligned. EA and ITG are two different efforts that should be integrated and linked based on a common base business, process, people, and organizational goals and objectives. Best practices include: Involvement of EA and ITG people from respective teams Regular status updates and ongoing communication and collaboration sessions Publication Date: 4 April 2008/ID Number: G Page 6 of 7
7 Open publication of base common artifacts Even rotation of assignments between EA and ITG teams RECOMMENDED READING "Myth Busting: What EA Is Not" "CIOs Reveal Their Issues With IT Governance" "A Primer for Strategic IT Plans" "Defining IT Governance: The Gartner IT Governance Demand/Supply Model" "Gartner Defines the Term 'Enterprise Architecture'" "Enterprise Personality Profile: Defining and Interpreting Dimensions and Descriptors" This research is part of a set of related research pieces. See "Organize Your Enterprise Architecture Effort: Planning for EA Success" for an overview. REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 4 April 2008/ID Number: G Page 7 of 7
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
Successful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
Gartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
Gartner's Business Intelligence and Performance Management Framework
Research Publication Date: 9 October 2006 ID Number: G00142827 Gartner's Business Intelligence and Performance Management Framework Bill Hostmann, Nigel Rayner, Ted Friedman The use of business intelligence
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.
Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.
Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
Document the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
Risk Intelligence: Applying KM to Information Risk Management
Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
Organizational Structure: Business Intelligence and Information Management
Research Publication Date: 14 April 2006 ID Number: G00138940 Organizational Structure: Business Intelligence and Information Management Betsy Burton, Lee Geishecker, Bill Hostmann, Ted Friedman, David
Agenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
Governance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
How BPM Can Enhance the Eight Building Blocks of CRM
Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's
Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.
Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Consider Identity and Access Management as a Process, Not a Technology
Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game
Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s
Case Study: Australian Bank's IT-Business Alignment Leads to New Product and System Development Process
Industry Research Publication Date: 30 June 2008 ID Number: G00158005 Case Study: Australian Bank's IT-Business Alignment Leads to New Product and System Development Process David Schehr Redundant and
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Gartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary
GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS Executive Summary Gartner EXP is an exclusive, membership-based organization of more than 3,000 CIOs and senior IT leaders worldwide. Members benefits from the
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
Recognize the Importance of Digital Marketing
Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated
The Role of Enterprise Architecture in Technology Research
Research Publication Date: 26 December 2007 ID Number: G00153117 The Role of Enterprise Architecture in Technology Research Brian Burke Enterprise architects are often tasked with identifying disruptive
The Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
Global Talent Management Isn't Just Global
Research Publication Date: 22 July 2008 ID Number: G00159366 Global Talent Management Isn't Just Global Thomas Otter Global talent management projects must take into account local compliance issues or
What to Consider When Designing Next-Generation Data Centers
Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,
Mainframe Modernization: When Migration Is the Answer
Research Publication Date: 8 January 2010 ID Number: G00171622 Mainframe Modernization: When Migration Is the Answer Dale Vecchio Mainframe migrations can be executed in a number of ways. Which choice
Gartner Updates Its Definition of IT Infrastructure Utility
Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some
Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
Repurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
