IT Procurement Best Practice: Leverage Services to Buy Products More Competitively
|
|
|
- Christiana Russell
- 9 years ago
- Views:
Transcription
1 Research Publication Date: 23 June 2008 ID Number: G IT Procurement Best Practice: Leverage Services to Buy Products More Competitively Stewart Buchanan, Peter Wesche Use credible alternatives wherever available to create competition from adjacent markets, especially where product competition is scarce. Cost comparisons can improve a product's competitiveness, but they must be used in a disciplined way to achieve positive results. Key Findings IT departments are not the end customers for IT product vendors, which need to understand that sourcing decisions are often driven by business issues and technologyaware business stakeholders and budget holders. When an in-house service is preferred, this preference may not apply at any cost. IT departments and their product vendors are effectively in competition with external service providers (ESPs), even if few track their costs well enough to compete. "Apples-to-apples" comparisons are only possible between like-for-like equivalents. "Apples-to-apple-pie" comparisons are needed between products and services, which take into account all the costs of baking the apple pie and not just the cost of the apples. Successful IT procurement organizations engage product vendors as stakeholders in internal services, giving them the right financial incentives to compete with external services on value and effectiveness. Recommendations Leverage indirect competition to make your product vendors more competitive. Focusing solely on cost because it is easier to measure is a "zero-sum game." It is easier to eliminate value from services than cost. Harness business users to drive competition between product vendors and service providers. Use their demand as a positive force to help you manage vendor relationships on a business basis. Leverage competition to pay less for basic, lowest-common-denominator technologies or services, but reward vendors that improve the value and competitiveness of your own service delivery. Instead of driving down the value and effectiveness of IT by demanding ever-increasing product discounts, use cost/benefit analysis to provide meaningful vendor incentives that maximize the value of your IT. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
2 ANALYSIS A new investment race has started in IT, but it is not a technology investment race. It is a race between consumers and vendors to optimize the delivery of effective business services. Major vendors clearly see IT asset management as a strategic issue: BMC Software leveraged Remedy to develop asset management, HP bought Peregrine and Mercury, IBM acquired MRO, Microsoft acquired AssetMetrix and Symantec assimilated Altiris. Some customers have even suspected vendors of acquiring asset management tools to neutralize them as potential threats to their revenue. There is a growing convergence of IT asset management and IT service management. One lesson is clear: IT service delivery is an increasingly competitive business that goes beyond price competition. IT markets are changing and diversifying. Alternative ways of doing business are proliferating as fast as business requirements are evolving. Service providers often seem to have better vendor relationships, perhaps because IT is their core business so they better understand its value. Enterprise IT organizations need to invest more in sourcing, IT asset management and procurement to ensure fair cost comparison and to provide more business-like IT decision support. Otherwise, product vendors will understand enterprises' asset positions and sourcing decisions better than the enterprises do. Ignoring the cost or value of IT is not a sound IT strategy. The business analysis and management of IT is becoming the most important innovation. IT is funded by business activity. Without financial support from the business, there would be no IT operations. When IT and its procurement staff focus solely on cost, they miss the most important side of the balance sheet the added value of IT services that justify the funding to deliver them internally. Without any differentiating factors, the enterprise has little reason to fund the procurement and delivery of IT in-house. Understand the Alternatives IT procurement does not make important sourcing decisions. It executes these decisions in line with their business case, to which it may be asked to contribute market intelligence. To execute a sourcing decision, procurement must first understand the business case and all possible alternatives so it can leverage them as competition. The threat of competition is how IT procurement negotiates fair pricing and contract terms. If procurement fails to negotiate terms that satisfy the business case, then the original sourcing decision may need to be re-evaluated in light of changing market conditions. Alternatives are becoming more diverse, as demonstrated by the 14 alternate IT delivery and acquisition models in "Alternative Delivery Models: The First Taxonomy." Most involve the delivery of technology as a service, the best known being software as a service (SaaS). Like-forlike, apples-to-apples comparisons cannot be made between unlike IT delivery and acquisition models or IT products. Successful procurement organizations may still need to use these forms of indirect competition as leverage, especially in markets where direct competition is lacking. Adjacent IT services markets cannot offer competing products, but they can offer alternative solutions that meet some or most of the business requirements. This is not simply a matter of IT procurement tactics. Indirect forms of competition are increasingly real. A hosted server can now compete with an in-house server. SaaS can compete with licensed software on a hosted server. Shortsighted product vendors may still question the credibility of this competition. Publication Date: 23 June 2008/ID Number: G Page 2 of 7
3 Establish the Alternative Acquisition and Delivery Scenario The most-credible and regular source of competitive pressure comes from business users. IT consumers are often well-informed about lower-cost alternatives. Business stakeholders may also have considerable experience in managing business assets and external subcontractors. IT procurement should use these resources to make vendors aware of competition from alternative delivery and acquisition models. IT procurement does not make sourcing decisions and can use this fact to negotiate with limited authority. The business may have a pressing need to implement services fast and at low cost. This can be your starting point for managing the vendors that supply products on which your established and proven IT services are built. Vendors will inevitably question the viability and value of services they do not deliver themselves. Establish vendor competition as follows: Demonstrate the value for money and the rapid results offered by alternative sources. Challenge the vendor to help your IT organization compete on commercial and technical levels. Ask for a similar, lower-size alternative that keeps your services competitive. Make it clear that the enterprise will readjust its solutions architecture and will compromise established standards if necessary to meet immediate, pressing business objectives. In response to business demands, enterprise architects are increasingly interested in commercials and procurement. You also need to discuss important architectural issues with your enterprise architects, such as the management of interfaces. Familiarize yourself with architectural options, as well as the types of interfaces supported and required. Your credibility may depend on an understanding of architectural and risk implications. Compare the Options Fairly The basis for fair comparison among products is often known as a like-for-like or apples-to-apples comparison. It is impossible to compare products to services directly in this way. However an apples-to-apple-pie comparison is still possible: If you know the recipe and the cost of the ingredients, then you can calculate how much it costs to bake an apple pie or run an IT service. Take the simplistic example of a software application that costs 20% of the total cost of running a service during a five-year life cycle. If a SaaS offering costs $50,000 during the same period, then the software vendor would need to match a cost of $10,000 during that time to compete. Software can become uncompetitive because other service delivery costs are too high. If it costs $50,000 just to run and manage the hardware, then you cannot sensibly expect the software free of charge. Enlist the vendor's help in improving the efficiency of your IT operations. Understand Strategic Sourcing Decisions Organizations acquire products or services for complex business reasons, including quality and control. It is a question of quality and effort whether you bake your own apple pie, buy it handmade by a chef or buy it mass-produced from a supermarket. Fast-food businesses are under pressure to pay competitive prices for food, whereas restaurants trade on their reputation for quality and variety. Every business places a different value on the quality and cost of what they buy. This is a practical example of cost/benefit analysis. Publication Date: 23 June 2008/ID Number: G Page 3 of 7
4 If quality apples become unavailable, or if prices rise dramatically, then even the most-expensive restaurant may have to re-evaluate its sourcing strategy or take apple pie off the menu. In increasingly dynamic and competitive markets, enterprises must regularly re-evaluate their sourcing decisions. If the IT organization fails to do this, then business users could make up for that oversight by going directly to external providers. All IT providers need to ensure that their services remain competitive in terms of cost and value. Procurement and Vendor Management Take Teamwork Many organizations fall into the trap of focusing on price because it is easier to measure. Product prices are just one of your many costs. Price discounts are rarely the most valuable thing your vendor can do for you. It is more difficult to describe or measure quality and business value. Work with your vendor at a strategic level to drive better value and align with business strategy through vendor management. Cost containment can still be a business objective; however, instead of penalizing vendors through loss of revenue, reward vendors for reducing your service delivery costs. Look for winwin situations to maintain and improve your vendor relationships: Improved efficiency will help your business to grow and result in ordering more products from the vendor. More-advanced vendor offerings will win business against competitors. Your success as a reference can help your vendor win additional business. The challenge is to give proven vendors a stake in your business outcome, in partnership with IT service managers or "product managers" as they are sometimes called. Negotiations should focus on cost/benefits analysis, trading benefits against costs to strike the right balance and make fair comparisons with ready-made service alternatives. Customers should also factor in the cost of managing ESPs. Managing an alternate delivery model to corporate standards can carry significant costs. Tasks such as compliance cannot be delegated without verification. All tasks delegated to the service provider, such as product procurement and asset management, require management oversight at some level. Vendors continually conduct transactions in their own markets. This gives them greater knowledge of these markets, customers and competitors than any enterprise buyer hopes to achieve unaided. This advantage can be reduced by introducing indirect competition with externally provided services. Involving stakeholders and budget holders in negotiations helps to convince the vendor that these challenges to their business are real. Work with the vendor to reduce the total service delivery costs. Vendors no longer know where the tipping point is in their customers' business model the price point where cost/benefit goes against them. This reintroduces price sensitivity and market volatility that has been missing from some IT markets. However, this newfound leverage must be used carefully. With Great Power Comes Great Responsibility More is at stake than reducing software and hardware costs. Product vendors and internal IT organizations are in indirect competition with alternative acquisition and delivery models. It is not in your interest to bankrupt your product vendor, nor is it in the vendor's interest to bankrupt you. It is in both your interests to work together and compete with alternatives. You need to build vendor relationships that reward those trusted vendors that help achieve your business objectives by sharing in your success. IT vendor relationships need to be more results-driven. Publication Date: 23 June 2008/ID Number: G Page 4 of 7
5 To leverage indirect competition, the vendor must remain convinced that it can compete at a profit. For example, it might be unrealistic to expect an enterprise storage vendor to compete with Amazon S3 storage service pricing. If a product vendor cannot meet the price point of a utility service, then that inability is only the starting point for negotiations. If the vendor can help you deliver a more valuable service, then you should expect to pay more in return. The business value of IT depends on aligning IT with business objectives. In the public sector, where objectives are more long term, value-for-money frameworks can help to define value contributions to these objectives. Realign Vendor Incentives With Business Objectives The challenge is to provide vendors with financial incentives while still paying a fair price: Negotiate discounts down to the basics, and the vendor has no incentive to provide anything more valuable. Give a vendor back the difference if it meets your targets, and you will give it back its commercial incentive to perform. Take the example of storage and software licenses for enterprise backup and recovery. Business requirements are often expressed as a recovery point and a recovery time. An external service that meets these objectives could be compared with the cost of delivering the same service inhouse. Seek a discount down toward the cost of a basic service, and the vendor has no incentive to provide anything more valuable. However, enterprises need to improve backup and recovery success rates, and make more-efficient use of capacity. Vendors that deliver greater value deserve a greater reward. Hold vendors accountable for cost differences above the competitive service baseline, which is often the lowest common denominator in a market. Procurement and stakeholders can help validate the cost/benefit analysis of benefits over and above that baseline, rewarding the vendor for delivering greater value and for meeting evolving business objectives. The reward for meeting business objectives could be the difference between the cost of a baseline service and the vendor's final offer price. Improve Incentives Procurement and vendor managers should leverage indirect competition to pay a fair rate for basic requirements. Theoretical savings can then be used as a financial reward for vendors that meet or exceed requirements. The reward for exceeding objectives could be meeting the vendor's initial asking price: Baseline service costs at market rates using qualitative and quantitative comparisons. Cater for possible demand shifts whenever negotiating costs in contracts. Base financial incentives on the cost/benefit of meeting business objectives. Measure vendor performance against these objectives. Reward vendor performance at an agreed-on cost/benefit level. Alternative competition is credible and real, especially when competitive pressure comes from beyond the IT department. IT spending is increasingly aligned with business objectives, thanks to better IT asset and operational data. Use your realignment of spending with vendors to Publication Date: 23 June 2008/ID Number: G Page 5 of 7
6 demonstrate that your internal services are market-competitive in terms of measurable value, not only price. RECOMMENDED READING "Don't Outsource Just to Save Money" "How to Manage Risk in Alternative Delivery Models" "Gartner Maturity Model for IT Procurement" "The Pros and Cons of Conducting Market-Based Comparisons for Internal IT Organizations" "Report Highlight for Market Trends: How Vendors Can Reduce the Cost of Infrastructure Support Services, 2008" "Business and Sourcing: Collaborating for More-Effective and Successful Services" "Build a Sourcing Governance Framework That Aligns With Your Organizational Style" "Alternative Delivery Models: The First Taxonomy" This research is part of a set of related research pieces. See "Spotlight: Optimize IT Asset Management and Procurement Costs" for an overview. Publication Date: 23 June 2008/ID Number: G Page 6 of 7
7 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 23 June 2008/ID Number: G Page 7 of 7
Risk Intelligence: Applying KM to Information Risk Management
Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance
2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
Gartner's Business Intelligence and Performance Management Framework
Research Publication Date: 9 October 2006 ID Number: G00142827 Gartner's Business Intelligence and Performance Management Framework Bill Hostmann, Nigel Rayner, Ted Friedman The use of business intelligence
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
Eight Criteria for Evaluating Software License Metrics
G00213489 Eight Criteria for Evaluating Software License Metrics Published: 1 June 2011 Analyst(s): Alexa Bona, Jane B. Disbrow, Peter Wesche Procurement executives and software asset managers are struggling
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
Successful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
Prepare for the Inevitable With an Effective Security Incident Response Plan
G00236455 Prepare for the Inevitable With an Effective Security Incident Response Plan Published: 19 July 2012 Analyst(s): Rob McMillan A serious security incident is a question of "when," not "if," for
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
Gartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.
Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
Ensure Emerging Trends and Technologies Advance Your Marketing Strategy
Ensure Emerging Trends and Technologies Advance Your Marketing Strategy Richard Fouts, Jackie Fenn and Gartner Fellow Lead Author Richard Fouts, Richard Fouts guides digital marketers on best practices
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
Tips for Evaluators: Better Business Intelligence RFPs
Research Publication Date: 11 May 2009 ID Number: G00167840 Tips for Evaluators: Better Business Intelligence RFPs James Richardson Many of the business intelligence (BI) RFP data-collection exercises
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Repurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.
Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
Essilor Increases Business-to-Business and Businessto-Consumer
Research Publication Date: 3 October 2006 ID Number: G00142208 Essilor Increases Business-to-Business and Businessto-Consumer Revenue With CRM Isher Kaila Essilor increased the loyalty of 1,150 independent
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise
Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
Governance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game
Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s
Agenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
Gartner Updates Its Definition of IT Infrastructure Utility
Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some
How BPM Can Enhance the Eight Building Blocks of CRM
Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's
Bankinter Differentiates Itself by Focusing on Innovation and CRM
Research Publication Date: 4 October 2005 ID Number: G00127276 Bankinter Differentiates Itself by Focusing on Innovation and CRM John Radcliffe Bankinter successfully competes in the Spanish banking market
Document the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
Assessing the Security Risks of Cloud Computing
Research Publication Date: 3 June 2008 ID Number: G00157782 Assessing the Security Risks of Cloud Computing Jay Heiser, Mark Nicolett Organizations considering cloud-based services must understand the
Understanding Vulnerability Management Life Cycle Functions
Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability
Global Talent Management Isn't Just Global
Research Publication Date: 22 July 2008 ID Number: G00159366 Global Talent Management Isn't Just Global Thomas Otter Global talent management projects must take into account local compliance issues or
