How To Consolidate A Service Desk

Size: px
Start display at page:

Download "How To Consolidate A Service Desk"

Transcription

1 June 2005 Service Desk: Consolidation, Relocation, Status Quo

2 Page 2 Contents Foreword So, you are going to consolidate or relocate your Service Desks 2 Foreword 3 Introduction 4 Select the transition date based on business cycles 5 Identify affected resources of all types 6 Plan for timely communications to all stakeholders 7 Measure success through the eyes of the customers 8 Identify any risks for tools, people, process, and data 8 Plan backup as if prepping for major disaster 9 Detail the project task plan and test it frequently 10 Satisfy the sponsor s objective for the project 10 Protect project schedule integrity by securing staffing resources that are dedicated to the project 11 Make mistakes early using tabletop drills 11 Summary how do you propose to perform such a feat without adversely impacting the current level of service? With all the demands on service quality and more effective use of resources, how do you reconfigure your airship while in flight? As issues begin to heat up surrounding Service Desk capabilities, on the list somewhere will be the issue of deciding if consolidation or relocation will provide a return on investment that provides improved customer satisfaction with IT services. It is not uncommon in mergers and acquisitions to meld together existing service desks to ensure there is appropriate balance of service support resources to primary business functions. Oftentimes, there can be heard inside IT the same directive that has affected the entire enterprise, to do more with less, or to improve customer satisfaction without adding to the cost. These mandates are not frivolous but are meant to ensure expenditures are validated for processes, people, tools, and information.

3 Page 3 Top decision criteria include: payback period and benefit cost ratio, agent skills distribution, and quality of service to the customer. Introduction As companies grow and acquisitions and mergers occur, it is common for an organization to take stock of their current expense profile for IT support and determine where it would be appropriate to implement cost reduction initiatives. When considering service desk consolidation or even just relocation, the enterprise must calculate the costs, benefits, and risks that accompany this type of activity. While there are other decision criteria that may also be addressed, clearly a few rise to the top: payback period and benefit cost ratio, agent skills distribution, and quality of service to the customer. As each of these is kept in focus, a project plan must be developed encompassing the six primitives of virtually any project: what needs to be done, how will it get done, where and when will the work be accomplished, who will do the project tasks, and, according to the sponsor, why is this project being initiated. Each of these has within it the need to address those processes, tools, data, and organizational implications that facilitate providing quality service to the customers of IT. 10 Tips for Service Desk Consolidation Select transition date based on the business Identify affected resources of all types Plan for timely stakeholder communications Measure success through the customers Identify risks for tools, people, process, data Plan backup as if prepping for major disaster Detail the task plan and test it frequently Satisfy each of the sponsor s objectives Protect schedule with dedicated resources Make mistakes early using tabletop drills

4 Page 4 there is no replacement for timing. Select the transition date based on business cycles Early in the cycle of events, there must be some options visited when selecting the timing of the actual consolidation. Much the same as would be done for a major release (Release Management) in terms of addressing business and personnel cycles. Dependent on your business, there are times when a major effort of this sort should not be scheduled if at all possible. There are, however, merger and acquisition implications that sometimes dictate the date irrespective of what is going on in the business at the time. When faced with the requirement to engage in this type of activity and the date has been dictated by a higher level issue, there is greater burden on the project manager (PM) to verify that multiple measurable checkpoints exist that will alert the team when anything is awry. In all cases, the PM should verify that the stakeholders are made aware of identified risks and the proposed steps necessary to mitigate them. Also, that they have specific resources assigned to them as part of the project plan. So remember, when deciding on the date for the activity, the old adage well known by corporate leaders, there is no replacement for timing.

5 Page 5 Peregrine Systems and IBM provide significant contribution to the overall project. Identify affected resources of all types Virtually every element of the IT infrastructure can be impacted when a service desk operation is interrupted for whatever reason. Clearly as part of the early planning stages, a decision must be made as to what the agent s workstation and workspace will look like when the effort is complete. Will there be new hardware, will the agent images be the same (how many images are there really), how will physical access be addressed, and are there any special ergonomic requirements? Are there specific agent security or authorization implications associated with the physical relocation of personnel that could have an adverse impact on their ability to provide quality customer service? Once these physical location and organization elements have been planned for, attention can be turned to the tools, process, and data requirements of the consolidation activity. Each of these, as stated earlier, must have the six primitives dealt with as part of the plan. Verify that decisions regarding MAC (move, add, change hardware / software) of agent workstations is reflected in the existing Change Management System and the CMDB (Configuration Management Data Base). In the case of mergers and acquisitions, there may also be a training component for personnel new to the infrastructure elements and IT s management processes. Clearly there is significant work that must be accomplished by resources not attached to the day-to-day provision of service to the customer. In this space, Peregrine Systems and IBM provide significant contribution to the overall project through methods and experience to help ensure that the infrastructure meets all the various requirements of the consolidation work plan.

6 Page 6 Timely and detailed communication is key. The entire team must be unified. Plan for timely communications to all stakeholders It is extremely important to verify that all stakeholders are kept apprised of project/milestone status as the project progresses. When planning a consolidation activity within an existing company, and few if any personnel are relocated, it may be possible to have an open communications style to help eliminate surprises. In the case of multiple business entities coming together, whether through merger and acquisition or simply restructuring activities, an orchestrated approach to helping ensure that communications are timely and contain sufficient detail to be viable is key. There are regulatory implications that often gate corporate news if it can in any way effect stock value. Given that, the PM must, with the stakeholders, plan well in advance the distribution of what details will be made available to which resource groups. The entire team must be unified in its direction. However, when businesses merge, the resulting head count is sometimes less than the sum of the originating organizations. Looking again at the primitives, a determination must be made as to who will remain as a service desk agent, where will their workstation be located, and when are they expected to be ready to engage once again as a fullfunctioning Level-X service desk agent.

7 Page 7 One of the best indicators of success is when, the business unit manager asks, Didn t IT make that service desk consolidation this weekend? Measure success through the eyes of the customers As the criteria by which success will be measured are defined, it is imperative that at least some perspective is kept on keeping the trains running. If, for instance, your service desk may be a link in the chain of restoring service to an operating room attempting to retrieve drug interaction data from a corporate database, and normal service is constrained due to a consolidation/relocation activity, well let s just say that business must still operate and agreed to levels of service must be provided as best as possible. All the standard PM metrics still apply, but it is the business that must continue to operate. This then should be the focus of the stakeholders in any consolidation project. Once again, that disaster recovery plan may need to be brought out and dusted off to help ensure no time is lost in delivering service it s okay, it needed to be updated anyway. Throughout the course of the project, as risks are identified, anything that can have an adverse effect on Service Level Agreements (SLAs) must be noted and a decision made as to what will be acceptable for the time period when there may be a negative impact. If, during the actual physical consolidation activity, business were to experience a constraint of service condition, it may be in the best interest of IT and the business units to discuss mitigation steps prior to the event. One of the best indicators of success is when, following your physical consolidation/relocation, the business unit manager asks, Didn t IT make that service desk consolidation this weekend we didn t experience any change at all?

8 Page 8 It is critical to identify risks for each of the processes, tools, resource groups, and data exchanges. Some risk situations will, most likely, show a strong resemblance to disaster-like conditions. Identify any risks for tools, people, process, and data Each element of the plan has an inherent risk associated with it as the day-today flow of service is exposed to interruption. Therefore, it is critical that the PM and the Subject Matter Experts (SMEs) leading their respective areas of focus identify risks for each of the processes, tools, resource (people) groups, and data exchanges that is to be impacted by the project. As process owners are brought together and they walk through tabletop exercises using their respective process flows, each must validate that sub-process interfaces and data exchanges stay intact throughout the project. This is best accomplished using existing process flows and documentation. Should there be gaps in the flows or documentation, they can be addressed as a parallel or follow-on activity to the consolidation project. Any tool consolidation, upgrade, or replacement must then take the validated flows/documentation and verify that the refreshed tools do not create conflicts or voids in the service flow. Also, this is a good time to note any enhancements or updates that should be made to the disaster recovery (business continuity) plan. Caution sometimes it is the little things that can cause the greatest difficulty. For instance, it is not enough just to verify that the new phone numbers are posted on the Web site, there must also be sufficient effort applied to this activity to verify the numbers rollover from the old to the new location. Also, verification must be made that lines will take the call load of a combined service desk. Plan backup as if prepping for major disaster When the risks have been identified and decisions have been made as to how service support interruptions will be addressed, some risk situations will, most likely, show a strong resemblance to disaster-like conditions. That is to say, the same task sequence used to mitigate a disaster affecting IT services and service support, may be employed for service support recovery during the project. These risk conditions can be identified throughout the project and start as early as defining the scope and as part of task verification during work breakdown structure (WBS) activities. Do not lose sight of the SLAs that are to be supported throughout the project or the sponsor s objectives of the overall effort. Should achievement of SLAs be compromised as a result of project activities, be prepared to engage in recovery actions for the current tasks and somewhat closer scrutiny for the remainder of the project.

9 Page 9 The Risk/Frequency matrix that dictates the amount of focus a specific task or project should receive. Make sure the tasks connect and that outputs support inputs. Detail the project task plan and test it frequently In many service provider environments where things can sometimes go wrong, there is the Risk/Frequency matrix (as shown below) that dictates the amount of focus a specific task or project should receive. For instance category C activities that are Low Risk and Low Frequency are those activities we perform regularly that have limited impact associated with them. Activities such as volume name changes, calendar updates, address changes, server upgrades, etc. Category D activities are those that are low risk and high frequency, in other words, tasks that are not risky and are done all the time. At the service desk, that may be the regular barrage of password resets that sometimes plague an organization. Category B activities are high risk and high frequency. These are the tasks we perform regularly but know to watch very closely. Security authorizations, for example, to access new repositories require significant scrutiny as they should. And category A activities are those that are high risk and low frequency. This is where significant attention must be focused. It is here that we must plan well and test the plan often. When we consolidate multiple service desks, an activity we don t do very often, it can have a major adverse impact. Hence, the need to connect the dots. As the WBS is created, and tasks are prioritized, make sure the tasks connect and that outputs support inputs. High A B Risk Degree of impact if activities do not complete as planned C D Low Frequency Number of times this activity has been performed High

10 Page 10 Doing things right is good, but we must also do the right things. Satisfy the sponsor s objectives for the project A key role the PM plays is to ensure the team is made aware of the sponsor s and the stakeholder s project objectives. Knowledge of these targets is what makes for effective decisions, by all team members, throughout the course of the project. As has been proven repeatedly in IT projects, doing things right is good, but we must also do the right things. It is appropriate when documenting the project objectives, to assign an individual the responsibility of validating that the objective can be realized given the defined project tasks. Additionally, as the assigned resource, they ll maintain a perspective of ultimate achievement, throughout the project. This will allow the PM to minimize surprises. Also, there is a much better chance of course correction being of value if executed early enough in the process. At project closure time these defined objectives become major communication points in articulating the value of both planning and project management. Reassigning resources to other tasks is distracting and harmful to a project. Protect project schedule integrity by securing staffing resources that are dedicated to the project Those individuals with architect and technical skills who have well established business unit relationships are always in high demand. What is distracting and harmful to a project is to have assigned resources reassigned to other tasks. Reassignment of resources should also be part of the risk and the associated mitigation plans. It may be more appropriate to engage contracted resources to join the project team to complete specific tasks and have high demand resources engage in a role that is consistent with the amount of time they can dedicate to the project. The potential that they can be pulled from the project, either temporarily or for the duration is real and necessary in any organization. Their wealth of expertise is often best used in an oversight role where they can see multiple tasks and the associated interactions and exposures.

11 Page 11 There really is no replacement for testing or practice. Make mistakes early using table-top drills Practice, practice, practice. It is true for entertainment performance as well as service support. The elements of performance and the theater in which it takes place is not relegated to entertainment alone. We sometimes use the analogy of the orchestra to articulate the intricacies associated with task relationships. Well, just like a good orchestra, it takes practice. That means with each other and with the score (for us that would be the task plan). Dependent on the magnitude of the effort it may start out with sections practicing together before the whole orchestra ever comes together to run through the music. For a service desk consolidation effort, this means that it is imperative for the PM and SMEleads, at a minimum, to go through table-top exercises and execute all the steps to help ensure, as best as possible, that nothing is left out and that the sequence is correct. There really is no replacement for testing or practice. Summary All the tools, examples and analogies in the world will not take the place of effective planning when it comes to completing a series of tasks. However, tools allow us to work smarter instead of harder. A service desk consolidation or relocation is not without exposure, but the potential of providing better customer service is worth the effort. For more information To learn more about IBM Global Services and our service desk, please contact your IBM sales representative or visit: ibm.com/service

12 Copyright IBM Corporation 2005 IBM Global Services Route 100 Somers, NY U.S.A. Produced in the United States of America All Rights Reserved IBM, the IBM logo and the On Demand Business logo are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. G

IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.

IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration. IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

A proven 5-step framework for managing supplier performance

A proven 5-step framework for managing supplier performance IBM Software Industry Solutions Industry/Product Identifier A proven 5-step framework for managing supplier performance Achieving proven 5-step spend framework visibility: benefits, for managing barriers,

More information

Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives

Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services

More information

PRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT

PRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT The Define/Align/Approve Reference Series PRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT Value added IT depends on accurate information regarding the use, location and configuration of every asset, from

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act

More information

PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >

PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name

More information

AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION

AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION Five key success factors IT organizations today are under constant business pressure to transform their infrastructure to reduce costs, increase

More information

The hidden costs of data migration.

The hidden costs of data migration. IBM Global Technology Services December 2007 The hidden costs of data migration. Strategies for reducing costs and quickly achieving return on investment Page 2 Contents 2 Executive summary 3 Introduction

More information

Datacenter Migration Think, Plan, Execute

Datacenter Migration Think, Plan, Execute Datacenter Migration Think, Plan, Execute Datacenter migration is often regarded as a purely technical, almost trivial side-project, to be delivered by existing IT staff alongside their day jobs. With

More information

Purpose: Content: Definition: Benefits: outputs outcomes benefits Business Case dis-benefit Key Responsibilities: Approach: Executive Developed

Purpose: Content: Definition: Benefits: outputs outcomes benefits Business Case dis-benefit Key Responsibilities: Approach: Executive Developed Key Learning Points The Swirl Logo is a trade mark of the AXELOS Limited. Is used by the Project Board throughout the project to verify its continued viability:- Is the investment in this project still

More information

Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager

Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Part two of a two-part series. If you read my first article in this series, Building a Business Continuity Program, you know that

More information

AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION

AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION Five key success factors Whether the decision to relocate or consolidate a data center is driven by cost pressure or the need for greater IT efficiency,

More information

IBM Tivoli Storage Manager for Virtual Environments

IBM Tivoli Storage Manager for Virtual Environments IBM Storage Manager for Virtual Environments Non-disruptive backup and instant recovery: Simplified and streamlined Highlights Simplify management of the backup and restore process for virtual machines

More information

BSM for IT Governance, Risk and Compliance: NERC CIP

BSM for IT Governance, Risk and Compliance: NERC CIP BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................

More information

Modernizing enterprise application development with integrated change, build and release management.

Modernizing enterprise application development with integrated change, build and release management. Change and release management in cross-platform application modernization White paper December 2007 Modernizing enterprise application development with integrated change, build and release management.

More information

RFP Attachment C Classifications

RFP Attachment C Classifications RFP 1. Applications IT Architect Analyzes and designs the architecture for software applications and enhancements, including the appropriate application of frameworks and design patterns and the interrelationships

More information

Successfully managing geographically distributed development

Successfully managing geographically distributed development IBM Rational SCM solutions for distributed development August 2004 Successfully managing geographically distributed development Karen Wade SCM Product Marketing Manager IBM Software Group Page 2 Contents

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

How To Restore From A Backup In Sharepoint

How To Restore From A Backup In Sharepoint Recovering Microsoft Office SharePoint Server Data Granular search and recovery means time and cost savings. An Altegrity Company 2 Introduction 3 Recovering from Data Loss 5 Introducing Ontrack PowerControls

More information

The case for cloud-based data backup

The case for cloud-based data backup IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

More information

How Technology Supports Project, Program and Portfolio Management

How Technology Supports Project, Program and Portfolio Management WHITE PAPER: HOW TECHNOLOGY SUPPORTS PROJECT, PROGRAM AND PORTFOLIO MANAGEMENT SERIES 4 OF 4 How Technology Supports Project, Program and Portfolio Management SEPTEMBER 2007 Enrico Boverino CA CLARITY

More information

Strategies for assessing cloud security

Strategies for assessing cloud security IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary

More information

IBM Global Services September 2008. Disaster recovery strategies for internal recovery

IBM Global Services September 2008. Disaster recovery strategies for internal recovery IBM Global Services September 2008 Disaster recovery strategies for internal recovery Page No.2 Contents 2 Introduction 3 The Y2K effect 4 Fall of distributed systems 4 New challenges 5 New suite of enablers

More information

Improve business agility with WebSphere Message Broker

Improve business agility with WebSphere Message Broker Improve business agility with Message Broker Enhance flexibility and connectivity while controlling costs and increasing customer satisfaction Highlights Leverage business insight by dynamically enriching

More information

Harness the value of information throughout the enterprise. IBM InfoSphere Master Data Management Server. Overview

Harness the value of information throughout the enterprise. IBM InfoSphere Master Data Management Server. Overview IBM InfoSphere Master Data Management Server Overview Master data management (MDM) allows organizations to generate business value from their most important information. Managing master data, or key business

More information

Data Center Consolidation

Data Center Consolidation Data Center Consolidation With computers spread across the enterprise, and the number of networked databases and applications growing at an exponential rate, the challenges of efficient networking, data

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

SAP Managed Services SAP MANAGED SERVICES. Maximizing Performance and Value, Minimizing Risk and Cost

SAP Managed Services SAP MANAGED SERVICES. Maximizing Performance and Value, Minimizing Risk and Cost SAP Managed Services SAP MANAGED SERVICES Maximizing Performance and Value, Minimizing Risk and Cost WE RE FOCUSED ON YOUR GOALS Increase productivity with fewer resources. Optimize IT systems while cutting

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Master data management vision and value: Part 2

Master data management vision and value: Part 2 IBM Software Master data management vision and value: Part 2 Determine the business value of MDM 1 23 45 Introduction Speak the stakeholder Do the math Remember the soft Conclusion and Introduction Why

More information

Planning a Backup Strategy

Planning a Backup Strategy Planning a Backup Strategy White Paper Backups, restores, and data recovery operations are some of the most important tasks that an IT organization performs. Businesses cannot risk losing access to data

More information

White Paper. IT Service Management Process Maps. Select Your Route to ITIL Best Practice

White Paper. IT Service Management Process Maps. Select Your Route to ITIL Best Practice White Paper IT Service Process Maps Select Your Route to ITIL Best Practice Brian Johnson VP and WW ITIL Practice Manager, CA Inc. Nancy Hinich Solution Manager, Technical Services, CA Inc. Pete Waterhouse

More information

CDC UNIFIED PROCESS JOB AID

CDC UNIFIED PROCESS JOB AID CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing

More information

Program Title: Advanced Project Management Knowledge, Skills & Software Program ID: #1039168 Program Cost: $4,690 Duration: 52.

Program Title: Advanced Project Management Knowledge, Skills & Software Program ID: #1039168 Program Cost: $4,690 Duration: 52. Program Title: Advanced Project Management Knowledge, Skills & Software Program ID: #1039168 Program Cost: $4,690 Duration: 52.5 hours Program Description The Advance Project Management Knowledge, Skills

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

Project Knowledge Areas

Project Knowledge Areas From Houston S: The Project Manager s Guide to Health Information Technology Implementation. Chicago: HIMSS; 2011; pp 27 39. This book is available on the HIMSS online bookstore at www. himss.org/store.

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

ITSM Process Description

ITSM Process Description ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management

More information

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History

More information

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects

Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects State of Arkansas Office of Information Technology 124 W. Capitol Ave. Suite 990 Little Rock, AR 72201 501.682.4300 Voice 501.682.4020 Fax http://www.cio.arkansas.gov/techarch Best Practices Statement

More information

THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS

THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS The CXO s Guide to Managing Expansion While Controlling Costs & Compliance Considerations 2 45% OF IT PROFESSIONALS

More information

Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today s presentation)

Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today s presentation) Data Center Migration Primer Mark Smith Wednesday, June 27, 2012 General Information Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today

More information

Recovering Microsoft Office SharePoint Server Data. Granular search and recovery means time and cost savings.

Recovering Microsoft Office SharePoint Server Data. Granular search and recovery means time and cost savings. Recovering Microsoft Office SharePoint Server Data Granular search and recovery means time and cost savings. 2 Introduction 5 Recovering from Data Loss 6 7 Introducing Ontrack PowerControls for SharePoint

More information

Blend Approach of IT Service Management and PMBOK for Application Support Project

Blend Approach of IT Service Management and PMBOK for Application Support Project Blend Approach of IT Service and PMBOK for Application Support Project Introduction: This paper addresses the process area, phases and documentation to be done for Support Project using Project and ITSM

More information

White paper September 2009. Realizing business value with mainframe security management

White paper September 2009. Realizing business value with mainframe security management White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment

More information

The IBM Solution Architecture for Energy and Utilities Framework

The IBM Solution Architecture for Energy and Utilities Framework IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions

More information

How To Protect Your Active Directory (Ad) From A Security Breach

How To Protect Your Active Directory (Ad) From A Security Breach Securing Active Directory: An Ounce of Prevention or a Pound of Cure? Abstract This technical brief reviews three tasks that should be a part of your proactive Active Directory (AD) security routine: Establishing

More information

Program Management April 2006. Program Management

Program Management April 2006. Program Management April 2006 Program Management Page 2 Contents 1 Background and Definitions 5 Enterprise Business Strategy A Typical Originator of Programs What is EGL? 6 Program Characteristics 10 Enabling Mechanisms

More information

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.

WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware. WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure

More information

IT Services Management Service Brief

IT Services Management Service Brief IT Services Management Service Brief Service Continuity (Disaster Recovery Planning) Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction

More information

IBM Software. IBM TRIRIGA: The power of true integration in workplace management solutions

IBM Software. IBM TRIRIGA: The power of true integration in workplace management solutions IBM Software IBM TRIRIGA: The power of true integration in workplace management solutions 2 IBM TRIRIGA: The power of true integration in workplace management solutions Introduction In today s increasingly

More information

pm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS

pm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS pm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage

More information

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.

More information

Department of Administration Portfolio Management System 1.3 June 30, 2010

Department of Administration Portfolio Management System 1.3 June 30, 2010 E 06/ 30/ 2010 EX AM PL 1. 3 06/ 28/ 2010 06/ 24/ 2010 06/ 23/ 2010 06/ 15/ 2010 06/ 18/ 2010 Portfolio System 1.3 June 30, 2010 Contents Section 1. Project Overview... 1 1.1 Project Description... 1 1.2

More information

White Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management

White Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management White Paper An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management Managing Data as an Enterprise Asset By setting up a structure of

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

ITIL Roles Descriptions

ITIL Roles Descriptions ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test

More information

System Security and Auditing for IBM i

System Security and Auditing for IBM i IBM Systems Lab Services and Training Power Services System Security and Auditing for IBM i Security breach prevention and protection 2 System Security and Auditing for IBM i Highlights Reduce the risk

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing

More information

Software Asset Management on System z

Software Asset Management on System z Software Asset Management on System z Mike Zelle Tivoli WW IT Asset Management Marketing SAM in SHARE Project Manager mzelle@us.ibm.com Agenda Why Software Asset Management (SAM) The Discipline of Software

More information

IBM Tivoli Netcool network management solutions for SMB

IBM Tivoli Netcool network management solutions for SMB IBM Netcool network management solutions for SMB An integrated approach enhances IT as it supports business needs for the SMB environment Highlights Automate management tasks to reduce IT workload and

More information

The 9 Things in the PMBOK

The 9 Things in the PMBOK The 9 Things in the PMBOK 9/15/2011 The PMBOK Project Body of Knowledge sum of knowledge within the profession of project management used dto document and standardize di generally accepted project management

More information

Lowering business costs: Mitigating risk in the software delivery lifecycle

Lowering business costs: Mitigating risk in the software delivery lifecycle August 2009 Lowering business costs: Mitigating risk in the software delivery Roberto Argento IBM Rational Business Development Executive Valerie Hamilton IBM Rational Solution Marketing Manager and Certified

More information

Project Management Office (PMO)

Project Management Office (PMO) Contents I. Overview of Project Management...4 1. Project Management Guide (PMG)...4 1.1 Introduction...4 1.2 Scope...6 1.3 Project Types...6 2. Document Overview, Tailoring, and Guidance...7 3. The Project

More information

A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.

A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration. A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering

More information

The business value of improved backup and recovery

The business value of improved backup and recovery IBM Software Thought Leadership White Paper January 2013 The business value of improved backup and recovery The IBM Butterfly Analysis Engine uses empirical data to support better business results 2 The

More information

IT Project Management Methodology. Project Scope Management Support Guide

IT Project Management Methodology. Project Scope Management Support Guide NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA IT Project Management Methodology Project Scope Management Support Guide Version 0.3 Version Date Author Change Description 0.1 23 rd Mar, 2013 Gerald

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

IBM Tivoli Asset Management for IT

IBM Tivoli Asset Management for IT Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related

More information

PHASE 5: DESIGN PHASE

PHASE 5: DESIGN PHASE PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed

More information

Change Management Process Guide

Change Management Process Guide XXXXX (XX) IT Operational Process Change Management Process Guide XXXXX Information Technology Preface The purpose of this document is to outline the procedures that govern the Change Management process

More information

Supporting information technology risk management

Supporting information technology risk management IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management

More information

Transforming Field Service Operations w ith Microsoft Dynamics NAV

Transforming Field Service Operations w ith Microsoft Dynamics NAV Transforming Field Service Operations w ith Microsoft Dynamics NAV Open Door Technology Inc. Date: May 2010 www.opendoor.ca 8 77.777.776 Contents Introduction... 3 Mobile Technology Needs for Field Services

More information

Expert Reference Series of White Papers. Importance of Schedule and Cost Control

Expert Reference Series of White Papers. Importance of Schedule and Cost Control Expert Reference Series of White Papers Importance of Schedule and Cost Control 1-800-COURSES www.globalknowledge.com Importance of Schedule and Cost Control Bill Scott, PE, PMP, PgMP Outline I. Project

More information

MGMT 4135 Project Management. Chapter-16. Project Oversight

MGMT 4135 Project Management. Chapter-16. Project Oversight MGMT 4135 Project Management Chapter-16 Project Oversight Project Oversight: defined as a set of principles and processes to guide and improve the management of projects. Ensures projects meet the needs

More information

WHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS

WHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS WHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS Nonprofits are experiencing increased pressure, oversight, and demand for transparency from all sides. Whether the focus is government compliance, competition

More information

Can You Recover Active Directory from a Disaster?

Can You Recover Active Directory from a Disaster? Can You Recover Active Directory from a Disaster? Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2012 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

Building an Excellent Relationship with your Cloud-Based Contact Center Infrastructure Vendor. April 2014

Building an Excellent Relationship with your Cloud-Based Contact Center Infrastructure Vendor. April 2014 Building an Excellent Relationship with your Cloud-Based Contact Center Infrastructure Vendor April 2014 Sponsored by: - 1 - DMG Consulting LLC Table of Contents Introduction... 1 Cloud-Based Contact Center

More information

Disaster Recovery and Business Continuity Plan

Disaster Recovery and Business Continuity Plan Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix

More information

Appendix V Risk Management Plan Template

Appendix V Risk Management Plan Template Appendix V Risk Management Plan Template Version 2 March 7, 2005 This page is intentionally left blank. Version 2 March 7, 2005 Title Page Document Control Panel Table of Contents List of Acronyms Definitions

More information

IBM Software Information Management. Scaling strategies for mission-critical discovery and navigation applications

IBM Software Information Management. Scaling strategies for mission-critical discovery and navigation applications IBM Software Information Management Scaling strategies for mission-critical discovery and navigation applications Scaling strategies for mission-critical discovery and navigation applications Contents

More information

IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.

IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations. IBM asset management solutions White paper Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations. September 2007 2 Contents 2 Executive summary 3 Introduction

More information

PHASE 9: OPERATIONS AND MAINTENANCE PHASE

PHASE 9: OPERATIONS AND MAINTENANCE PHASE PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.

More information

Information Technology Project Oversight Framework

Information Technology Project Oversight Framework i This Page Intentionally Left Blank i Table of Contents SECTION 1: INTRODUCTION AND OVERVIEW...1 SECTION 2: PROJECT CLASSIFICATION FOR OVERSIGHT...7 SECTION 3: DEPARTMENT PROJECT MANAGEMENT REQUIREMENTS...11

More information

The Software-defined Data Center in the Enterprise

The Software-defined Data Center in the Enterprise The Software-defined Data Center in the Enterprise A Cloud Report by Ben Kepes This report underwitten by: NIMBOXX The Software-defined Data Center in the Enterprise 02/12/2015 Table of Contents 1. Executive

More information

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains

More information

CA Service Desk Manager

CA Service Desk Manager DATA SHEET CA Service Desk Manager CA Service Desk Manager (CA SDM), on-premise or on-demand, is designed to help you prevent service disruptions, better manage change risks, and provides a 360-degree

More information

PROJECT RISK MANAGEMENT

PROJECT RISK MANAGEMENT PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized

More information

A Guide To The Project Management Body of Knowledge (PMBOK) Significant Changes from the 3 rd edition to the 4 th edition

A Guide To The Project Management Body of Knowledge (PMBOK) Significant Changes from the 3 rd edition to the 4 th edition A Guide To The Project Body of Knowledge (PMBOK) Significant Changes from the 3 rd edition to the 4 th edition Major Changes The adoption of the verb-noun format for process names Amplification as to Enterprise

More information

Input, Output and Tools of all Processes

Input, Output and Tools of all Processes 1 CIS12-3 IT Project Management Input, Output and Tools of all Processes Marc Conrad D104 (Park Square Building) Marc.Conrad@luton.ac.uk 26/02/2013 18:22:06 Marc Conrad - University of Luton 1 2 Mgmt /

More information

Services for the CFO Financial Management Consulting

Services for the CFO Financial Management Consulting IBM Global Business Services Services for the CFO Financial Management Consulting Financial Management Chief financial officers (CFOs) are currently in a highly visible, highly influential position. They

More information

Explanation of a Project and the Value of a Project Manager

Explanation of a Project and the Value of a Project Manager Comprehensive Consulting Solutions, Inc. Bu siness Savvy. IT Smart. What is a Project and when is a Project Manager needed? White Paper Published: March 2001 (with revisions) Explanation of a Project and

More information

Project Management Plan for

Project Management Plan for Project Management Plan for [Project ID] Prepared by: Date: [Name], Project Manager Approved by: Date: [Name], Project Sponsor Approved by: Date: [Name], Executive Manager Table of Contents Project Summary...

More information

Automated Disaster Recovery With BMC Atrium Orchestrator

Automated Disaster Recovery With BMC Atrium Orchestrator BEST PRACTICES WHITE PAPER Automated Disaster Recovery With BMC Atrium Orchestrator Applying the capabilities of IT Process Automation to help meet the daily challenges faced by Disaster Recovery / IT

More information

Memory-to-memory session replication

Memory-to-memory session replication Memory-to-memory session replication IBM WebSphere Application Server V7 This presentation will cover memory-to-memory session replication in WebSphere Application Server V7. WASv7_MemorytoMemoryReplication.ppt

More information