Document the IT Service Portfolio Before Creating the IT Service Catalog

Size: px
Start display at page:

Download "Document the IT Service Portfolio Before Creating the IT Service Catalog"

Transcription

1 Research Publication Date: 8 January 2009 ID Number: G Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service catalogs are new constructs for IT organizations. They are essential to manage IT services, deliver better service experience to customers and run IT more like a business. It's imperative to first document the overall IT service portfolio with the business value and business outcome of each service as a prerequisite toward developing an IT service catalog. Key Findings An IT service portfolio describes services in business value terms that are articulated from the customer's perspective, specifying what the services are, how they're bundled or packaged, and what benefits they deliver. Most service portfolio and catalog initiatives by IT organizations tend not to engage the business in the development of the services, even though improving service and the IT organization's relationship with the business is the primary motivator. An IT service catalog project is most often pursued as a mechanism to receive service requests from customers and automatically channel service demands to the correct IT resources and service delivery processes. Most IT service delivery automation initiatives incorrectly focus first on tools instead of analyzing service groupings, service definitions and the processes used for service delivery. Recommendations Start your IT service portfolio project by working with your business unit customers to document and describe the business-oriented IT services that you offer. Don't go to business customers with a blank sheet of paper and ask them to define the services; they won't know where to start. Bundle related service components into whole service catalog offerings that make sense to customers, thus resisting the temptation to confuse your customers with a list of hundreds of technical subservices in the customer-facing IT service catalog. Actively educate customers on the mutual benefits of the IT service portfolio, and train them to use the IT service catalog request process for all types of IT service requests. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

2 WHAT YOU NEED TO KNOW Successful execution of an IT service portfolio and IT service catalog initiative is dependent on people and processes. Prior to publishing an IT service catalog, use relationship managers to work with business unit customers to document an IT service portfolio of value-based, businessoriented IT services aligned with customer requirements. When you move to the service catalog stage of the project, use caution and ensure that it is populated, first and foremost, with business services visible to the customer. Resist the tendency to focus only on technical services that are visible to the internal IT support team, even though these will be more familiar to the IT staff working on the project. STRATEGIC PLANNING ASSUMPTIONS Through 2011, 70% of IT organizations with an IT service portfolio management project will rush to develop the IT service catalog as a customer-ordering mechanism before documenting their IT service portfolios. By 2013, 80% of IT organizations that developed their IT service catalogs prior to their IT service portfolios will suffer the additional cost of overhauling the service catalog contents once the portfolio is defined. ANALYSIS Aligning IT to business value and company strategy has become a key CIO initiative. Defining and documenting a portfolio of IT services associated with business value, with a corresponding IT service catalog, are critical first steps to address this CIO initiative. When this requirement trickles down to the IT infrastructure and operations team, many IT operations groups develop an IT service catalog composed of a random list of technical services, processes, products and platforms that are generally representative of what the IT organization spends the most time or money on. Little to no attention is invested in the development of an IT service portfolio and the business assessment of value. As a result, the IT organization continues its self-focused behavior at the expense of the business. Gartner believes that an unbalanced focus on the IT service catalog without appropriate attention to IT service portfolio development will have negative consequences on IT operations and its supporting role of aligning IT to business value. What the Right Approach Is and Why That's Good Start from the top down by defining the customer-facing services in an IT service portfolio, along with their business outcomes and business value. Then move on to creating the IT service catalog, which is the operational manifestation of the portfolio used to capture service transaction requests and make it easier to do business with the IT organization. Ultimately, a service portfolio is the strategic manifestation of the IT organization's mission, role and capabilities. The catalog is a tactical, operational tool. Both are necessary, but they can't substitute for one another. With that said, definitions developed by Gartner are listed below: An IT service portfolio describes services in business value terms, specifying what the services are, how they're bundled or packaged and what benefits they deliver. It's articulated from the customer's perspective and answers the questions, "Why should I buy this service?" "How much do I need to budget for IT services?" and "Why should I buy it from my internal provider rather than an external service provider (ESP)?" A service portfolio is product-, process- and platform-neutral. Thus, it's an important communication and relationship management tool. When created correctly, it also Publication Date: 8 January 2009/ID Number: G Page 2 of 8

3 becomes a vital decision framework. A service portfolio that is stated in customer terms is also, by definition, stated in market terms, providing the means for assessing the IT organization's competitiveness relative to ESPs. Service-level agreements (SLAs) and chargebacks should be established at the portfolio, not the catalog, level. An IT service catalog is a service order and demand-channeling mechanism. It takes portfolio services and decomposes them into the standard offerings that a client can buy. Ensure that every catalog item rolls up to one and only one service, so you can report on SLAs and aggregate chargeback at the service portfolio level. A service catalog can be as simple as a Word document. It's not required to have a customerfacing portal for ordering services online, although that is the desirable goal of most service catalog projects. The IT service catalog should include pricing, service-level quality options and escalation commitments. Catalogs are derived from the service portfolio, providing the vehicle for stating the terms and conditions associated with service provisioning. They also document and provide the method for processing service requests, as well as authorizing exceptions. By documenting its portfolio of value-based, business-oriented IT services at different price points, the IT organization can present a well-defined IT service offering to its business unit customers, which raises its credibility with the business and helps establish a foundation for service quality and IT investment negotiations that are based on business value and results. Through standardization, along with better understanding of customer requirements and delivery costs (such as capital and labor requirements), the IT organization is in a position to conduct an accurate cost/profit analysis for its service portfolio and continually seek methods to reduce delivery costs while meeting customer service and quality requirements. Once services are decomposed into standardized, orderable IT service catalog offerings, repeatable process methodologies for service delivery can be documented and automated. This will reduce errors in service delivery, help identify process bottlenecks and uncover opportunities for efficiency improvements. Presenting a single "face" of IT to the customer for all kinds of IT interactions (incident logging, change requests, service requests, project requests and new portfolio requests) simplifies the customer experience and improves satisfaction. Understanding costs and communicating the price for standard services on supported architectures help develop a shared understanding of the increased costs of ordering custom services that are not in the catalog and reduce the volume of exception or ad hoc service requests. In addition, industry process frameworks have weighed in on the right approach. The Information Technology Infrastructure Library (ITIL) has significantly expanded its content on service portfolio and service catalog in its v.3 refresh, which introduces a new concept of a service life cycle with separate books covering the five phases of the life cycle: Service Strategies Service Design Service Transition Service Operation Continual Service Improvement The main tenet of the ITIL service design book is to provide guidance on IT service development, together with governing IT practices, processes and policies to facilitate the introduction of these services into the live environment (see Figure 1). Within this context, the book explores the interrelationship and interdependency of the IT service portfolio and IT service catalog. Guidance Publication Date: 8 January 2009/ID Number: G Page 3 of 8

4 from Gartner and the ITIL service design book places emphasis first on the strategic design of the service portfolio (see Note 1), whereas many IT organizations will rush to develop the IT service catalog as a customer service ordering mechanism before documenting their IT service portfolio. The portfolio is developed to describe the provider's IT services in business terms. From an ITIL service design perspective, an IT service, used in support of business processes, is constructed from a combination of internal IT assets and externally sourced underpinning services. Figure 1. ITIL Diagram of the Service Portfolio and Its Contents Service Knowledge Management System Service Portfolio Service Life Cycle Service Status: Requirements Defined Analyzed Approved Chartered Designed Developed Built Test Released Operational Retired Service Pipeline Service Catalogue Retired Services Customer/support team viewable section of the service portfolio (the service catalogue, with selected fields viewable) Crown copyright material reproduced with permission of the Controller of Her Majesty's Stationery Office (HMSO). Source: Office of Government Commerce (OGC) From ITIL v.3 Publications (2007) What Normally Happens and Why That's Bad Understanding the differences between an IT service portfolio and an IT service catalog is fundamental to an effective IT service management strategy. Many IT organizations confuse IT service portfolios with IT service catalogs. In addition, confusion arises from common mistakes associated with how to define a service. Marketing hype by tool vendors also fuels the confusion. Companies attempting to adopt a service-oriented IT delivery model sometimes skip the creation of a service portfolio, believing it will save time and avoid difficult internal debates. It's a mistake to rely on the service catalog for communication with the business, because the value-based distinction between portfolios and catalogs is the only thing standing between the IT organization and commoditization. If the IT organization only produces a catalog, then clients will fail to understand the value-added activities that go into provisioning a device and will assess its Publication Date: 8 January 2009/ID Number: G Page 4 of 8

5 business utility purely on the basis of cost. If, for example, the internal IT organization has to charge $1,000 per PC because of the associated administration, networking, security, disaster recovery, service desk support and technology refresh services, but the client has no insight into those services, then the client will ask why not go to a retail catalog and get one for $500. Business units that go factory-direct generally do so because all they see is the device or application, with the IT organization being just an expensive bottleneck. Associating PCs with a "workplace" or "desktop management" service creates a value-based context that corrects these perceptions and challenges. How the ITIL v.3 divides the service catalog into business services visible to the customer and technical services visible only to the IT support team causes Gartner some concern. IT organizations are more comfortable with the familiar technical services, and less-mature teams are likely to have a myopic focus on that portion of the service catalog alone. This defeats the purpose of the exercise and will not help create a well-defined portfolio of IT services with documented business value that align with customers' requirements. Starting with the IT service catalog, and especially the technical services, just continues the same behavior that's been ineffective in creating business alignment up until now. As with many projects, IT operations teams often start by selecting a tool, rather than first defining their own services and processes. The same holds true with IT service portfolio management tools (see Note 2) used to help manage your IT service portfolio and house your IT service catalog. Many IT operations groups go straight to purchasing a tool to publish an IT service catalog as a mechanism to receive online service requests from customers so they can gain efficiencies by using process workflow technologies to automatically channel service demands to the correct IT resources and service delivery processes. Alternatively, they rush to leverage the IT service desk's self-service portal, which lacks IT service portfolio functionality and has limited IT service catalog capability. We think these common actions are shortsighted and will cost the IT organization extra labor expenses in the long run. Through 2011, 70% of IT organizations with an IT service portfolio management project will rush to develop the IT service catalog as a customer-ordering mechanism before documenting their IT service portfolios. By 2013, 80% of IT organizations that developed their IT service catalogs prior to their IT service portfolios will suffer the additional cost of overhauling the service catalog contents once the portfolio is defined. What You Can Do to Avoid the Pitfalls To avoid these perils, start your IT service portfolio project by working with your business unit customers to document and describe the business-oriented IT services that you offer. Build the portfolio yourself, and do not copy it from someone else; their value propositions are not the same as yours. Ensure that your portfolio contains only services that are actions, not things (see "Know Your Services; Know Your Customers"), and limit your portfolio to less than 15 items. Don't go to business customers with a blank sheet of paper and ask them to define the services; they won't know where to start. Instead, prepare your first draft of the customer-facing IT services that you offer (not the laundry list of processes, tasks and IT components that you manage), and be ready for some give-and-take with your business unit customers before you reach the final list of IT services that make sense to them. Document the full breadth of IT services in your catalog from simple moves, adds and changes, to complex projects, such as new business applications. If the service catalog only contains mundane, repeatable, commodity services, then you risk diminishing the perceived value of IT, rather than improving IT's credibility. To make the IT organization's job easier, document subservice components so they can be combined and reused to support multiple, higher-level, customer-facing services, but don't publish the subservice components as service Publication Date: 8 January 2009/ID Number: G Page 5 of 8

6 catalog items. Customers don't need to know how to build the car to drive it, and they don't need to know what makes up the IT service. For each customer-facing service defined in the IT service catalog, develop the service delivery process workflow steps and milestones for tracking success. This connection to the back-office service fulfillment processes supports automation and improves IT efficiency. Although technical services are important within IT, they should not be the starting point for a service catalog. Build a technical service catalog only if you have multiple IT organizations involved in a service value chain, and plan on putting formal operational-level agreements in place between departments. Otherwise, it's a waste of time and obscures the objectives of business alignment and customer satisfaction. Lastly, actively engage your customers in the development and continuous service improvement of the IT service portfolio and IT service catalog. An educated customer will gain an understanding of the mutual benefits of the IT service portfolio and the corresponding IT service catalog. Train them to use the IT service catalog request process for all types of IT service requests to gain the desired standardization and cost-benefits. RECOMMENDED READING "Toolkit Decision Framework: Top 10 Evaluation Criteria for IT Service Portfolio Management Products and Vendors" "Toolkit: A Sample List of IT Services for MSEs" "Mature Your IT Service Portfolio" "ITIL v.3 Services Guidelines Expand Audience Through Update" "Toolkit: Running IT Operations as a Business" "Toolkit Case Study: Insurance Provider Improves Service Delivery via a Service Catalog" "A Framework for Designing IT Service and Process Metrics" "Know Your Services; Know Your Customers" "The Six Myths of IT Service Management" Note 1 ITIL v.3 Glossary Definitions Service Portfolio: The complete set of services that are managed by a service provider. The service portfolio is used to manage the entire life cycle of all services, and includes three categories: service pipeline (proposed or in development), service catalog (live or available for deployment) and retired services. Service Catalog: A database or structured document with information about all live IT services, including those available for deployment. The service catalog is the only part of the service portfolio published to customers, and is used to support the sale and delivery of IT services. The service catalog includes information about deliverables, prices, contact points, and ordering and request processes. Publication Date: 8 January 2009/ID Number: G Page 6 of 8

7 Note 2 IT Service Portfolio Management Product Capabilities The emerging software product category coined "IT service portfolio management" (ITSPM) by Gartner is being investigated by the IT operations group to help manage its IT services, deliver better service experiences to customers and run IT operations more like a business. The ideal ITSPM product is intended to: Document the portfolio of standardized IT services, along with their standard, supported architectures and contracts with internal providers and ESPs. Decompose IT services into a service catalog of specific offerings that meet the majority of customer requirements and create the portal so that an end user or a business unit customer can purchase them, including order/request procedures, pricing, service-level commitments and escalation/exception-handling procedures. Automate, manage and track the process workflow from a service request (a customer order) that comes into the portal through to service delivery, including task definition, dissemination and approval. Report on service demand, service delivery and service-level performance. Manage IT service financials, such as tracking service costs, business unit funding, chargebacks and cost allocation; analyzing service profitability; and reviewing actual versus plan data. Publication Date: 8 January 2009/ID Number: G Page 7 of 8

8 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 8 January 2009/ID Number: G Page 8 of 8

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

The Seven Building Blocks of MDM: A Framework for Success

The Seven Building Blocks of MDM: A Framework for Success Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)

More information

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing

More information

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes. Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

Use These Guidelines for Making Better CRM Consulting Provider Selections

Use These Guidelines for Making Better CRM Consulting Provider Selections Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical

More information

Roundup of Business Intelligence and Information Management Research, 1Q08

Roundup of Business Intelligence and Information Management Research, 1Q08 Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Successful EA Change Management Requires Five Key Elements

Successful EA Change Management Requires Five Key Elements Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the

More information

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey. Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

How BPM Can Enhance the Eight Building Blocks of CRM

How BPM Can Enhance the Eight Building Blocks of CRM Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's

More information

Agenda for Supply Chain Strategy and Enablers, 2012

Agenda for Supply Chain Strategy and Enablers, 2012 G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling

More information

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Research Publication Date: 23 April 2008 ID Number: G00156910 XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Nigel Rayner, Neil Chandler Extensible Business Reporting Language

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information

ERP, SCM and CRM: Suites Define the Packaged Application Market

ERP, SCM and CRM: Suites Define the Packaged Application Market Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users

More information

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial

More information

Gartner's Business Intelligence and Performance Management Framework

Gartner's Business Intelligence and Performance Management Framework Research Publication Date: 9 October 2006 ID Number: G00142827 Gartner's Business Intelligence and Performance Management Framework Bill Hostmann, Nigel Rayner, Ted Friedman The use of business intelligence

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

The Next Generation of Functionality for Marketing Resource Management

The Next Generation of Functionality for Marketing Resource Management G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management

More information

Data Center Consolidation Projects: Benefits and Pitfalls

Data Center Consolidation Projects: Benefits and Pitfalls Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation

More information

Key Issues for Consumer Goods Manufacturers, 2011

Key Issues for Consumer Goods Manufacturers, 2011 Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research

More information

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Enterprise Asset Management Migration Requires Detailed Planning

Enterprise Asset Management Migration Requires Detailed Planning Research Publication Date: 2 September 2005 ID Number: G00130205 Enterprise Asset Management Migration Requires Detailed Planning Kristian Steenstrup Neglecting to address key areas when migrating to packaged

More information

Repurposing Old PCs as Thin Clients as a Way to Save Money

Repurposing Old PCs as Thin Clients as a Way to Save Money Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers

More information

EHR Advantages and Disadvantages

EHR Advantages and Disadvantages Industry Research Publication Date: 3 February 2010 ID Number: G00174011 The Limits of Certification and Guarantees in Buying Electronic Health Records in the U.S. Wes Rishel It is important not to rely

More information

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Research Publication Date: 12 February 2008 ID Number: G00154811 Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Steve Blood Companies spend too much on IP-PBXs

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary. Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important

More information

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

Consider Identity and Access Management as a Process, Not a Technology

Consider Identity and Access Management as a Process, Not a Technology Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research

More information

Risk Intelligence: Applying KM to Information Risk Management

Risk Intelligence: Applying KM to Information Risk Management Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance

More information

Tips for Evaluators: Better Business Intelligence RFPs

Tips for Evaluators: Better Business Intelligence RFPs Research Publication Date: 11 May 2009 ID Number: G00167840 Tips for Evaluators: Better Business Intelligence RFPs James Richardson Many of the business intelligence (BI) RFP data-collection exercises

More information

Data Center Consolidation: Top 10 Best Practices for Project Success

Data Center Consolidation: Top 10 Best Practices for Project Success Research Publication Date: 2 May 2011 ID Number: G00212551 Data Center Consolidation: Top 10 Best Practices for Project Success David J. Cappuccio Many data center consolidation projects fail to meet overall

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

Five Business Drivers of Identity and Access Management

Five Business Drivers of Identity and Access Management Research Publication Date: 31 October 2003 ID Number: SPA-21-3673 Five Business Drivers of Identity and Access Management Roberta J. Witty The primary reasons to implement IAM solutions are business facilitation,

More information

Understanding Vulnerability Management Life Cycle Functions

Understanding Vulnerability Management Life Cycle Functions Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

Recognize the Importance of Digital Marketing

Recognize the Importance of Digital Marketing Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated

More information

Gartner Updates Its Definition of IT Infrastructure Utility

Gartner Updates Its Definition of IT Infrastructure Utility Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

What Is the Role of Quality Assurance in a SaaS Environment?

What Is the Role of Quality Assurance in a SaaS Environment? Research Publication Date: 15 September 2009 ID Number: G00170552 What Is the Role of Quality Assurance in a SaaS Environment? Thomas E. Murphy, Daniel Sholler, Christian Hestermann Software as a service

More information

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,

More information

The Role of Enterprise Architecture in Technology Research

The Role of Enterprise Architecture in Technology Research Research Publication Date: 26 December 2007 ID Number: G00153117 The Role of Enterprise Architecture in Technology Research Brian Burke Enterprise architects are often tasked with identifying disruptive

More information