Cloud Sourcing New Market Dynamics Require Changes To Sourcing Strategy. Gaetano Santucci November 2012



Similar documents
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples

Orchestrating the New Paradigm Cloud Assurance

BMC s Security Strategy for ITSM in the SaaS Environment

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Amazon Web Services. For Government, Education, and Nonprofit Organizations. Jakob Huhn. Partner Manager Benelux, Public Sector

Accelerate the journey to your Cloud

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net

Cloud models and compliance requirements which is right for you?

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions

Hybrid Cloud Computing

CLOUD MIGRATION STRATEGIES

Contact Centers in the Cloud: A Better Way to Source

Case Study Cloud Computing

The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model!

Cloud Computing. Nahil Mahmood. CEO, Delta Tech Founder & President, CSA

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Anypoint Platform Cloud Security and Compliance. Whitepaper

SAP HANA Cloud Platform Frequently Asked Questions - Business

CA XCOM Data Transport- Secure, Reliable File Transfer for Heterogeneous Environments

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

Tips For Buying Cloud Infrastructure

The Fastest Path to the Cloud Building Your SaaS Company on Force.com

3 rd Party Vendor Risk Management

Cloud Services Overview

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Information Technology: This Year s Hot Issue - Cloud Computing

Cloud Vendor Evaluation

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

The Gotchas of Cloud-Based

Delivering Cloud Services Transformation : Plan > Build> Assure> Secure. Stephen Miles Vice President, Solution Sales, APJ

Data Protection & Cloud. Corradino Milone PreSales Commvault Italia

Cloud Computing Security Issues

Software Enabled Creative Destruction. Jason Jackson, Field CTO, Pivotal

A Strategic Approach to Meeting the Demand for Cloud

VCE BUSINESS UPDATE AND OVERVIEW

Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)

Client Security Risk Assessment Questionnaire

Security Officer s Checklist in a Sourcing Deal

APPLICATION-CENTRIC SOLUTIONS FOR A CLOUD-EMPOWERED ENTERPRISE

Cloud Computing Evolution Not Revolution

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Adopting Cloud Computing with a RISK Mitigation Strategy

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager

Orchestrated. Release Management. Gain insight and control, eliminate ineffective handoffs, and automate application deployments

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

White Paper. Managed IT Services as a Business Solution

Securing the Service Desk in the Cloud

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Cloud Services Catalog with Epsilon

Move your business into the Cloud with one single, easy step.

Cloud Deployment Models. Kirk Kern CTO Cloud Solutions NetApp US Public Sector

Cloud Computing: Background, Risks and Audit Recommendations

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Clarity in the Cloud. Defining cloud services and the strategic impact on businesses.

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

ALIGNING BUSINESS STRATEGY TO CLOUD APPLICATIONS

Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services

The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve

Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014

Services Providers. Ivan Soto

Avnet's Guide to Cloud Computing

ITSMF UK. 150 Wharfdale Road, Winnersh Triangle, Wokingham, RG415RB, United Kingdom. Tel: +44 (0) Fax: +44 (0)

Cloud Security and Managing Use Risks

Pharma CloudAdoption. and Qualification Trends

Contingency Plan for HIPAA

The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution

PERFORMANCE Technologies A.E. June 2015

Security and Privacy in Cloud Computing

"Service Lifecycle Management strategies for CIOs"

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

How To Use Egnyte

Seamless adaptive multi-cloud management of service-based applications

Best Practices for Building Mobile Web

PAC Multi-Client Study Applications Modernization: The path to Omni-channel retail

LEGAL ISSUES IN CLOUD COMPUTING

Hot Topics in IT. CUAV Conference May 2012

FINANCIAL SERVICES DEPLOYMENTS. Sari Lafferty, DCIA Yung Chou, Microsoft Pete Manca, Egenera Kevin Nyberg, NaviSite Nicole Nakashian, Agio

Transcription:

Cloud Sourcing New Market Dynamics Require Changes To Sourcing Strategy Gaetano Santucci November 2012

Four powerful dynamics are reshaping the IT services ecosystem The innovation revolution The tech industry is entering a period of unprecedented change. Technology is shaping the business. As-a-service becomes the norm New pricing and delivery models change how and from whom services are sold and provisioned. Changing user demographics and decision structures The rise of the business influencer and the digital native Innovation moving to the edge/the rise of social and mobile Innovation shifts from core applications to the edge of the enterprise and analytics. 1

Business wants: A place to experiment Fast integration Looser IT restrictions Responsiveness Faster time-to-market The need for speed fuels the IT-business disconnect IT wants: Plenty of notice Predictability Stability Justification Controls 2

The state of the art of SaaS Main benefits perceived by the users Concerns about SaaS is decreasing (2009 2011) Europe SaaS main fields of applications (public sector included) improved business agility focalization of resources speed of implementation faster delivery of new features and functions lower overall costs reduction of doubts related to security, integration, performance, costs and complexity fear of financially and operational lock-in with a unique vendor Collaboration Customer Relationships Management Human Resource Management Asset management Claim management The SaaS outpaces other ICT services, with an increase factor higher than the growth rate of other traditional services 3

The balance is shifting between traditional and emerging services Application development (agile, mobile, modernization) IT consulting (strategy, business process consulting, change management) System integration (packaged apps implementation, apps integration) Outsourcing (mainframes, networks, data centers, desktops, applications) Traditional services Emerging services Data consulting services (implementation design, integration) Data outsourcing services SaaS seats Saas implementation Public cloud implementation and consulting Security project work/consulting Security managemet services Services integration Services orchestration Product dev services (R&D, SW and embedded systems) 4

What does this mean for Sourcing? New stakeholders and decision structures New and different stakeholder requirements Radically different marketplace and vendor capabilities Last year s sourcing strategy will not meet this year s needs. 5

Knowing the criteria for sourcing s Involvement will be a key skill Empowered Business Zone Intermediate Business Zone Core Business Zone Localized impact on business Risk can be BOUNDED Need for speed primary Localized impact on business Risk can be MANAGED Moderate agility required High business impact High Risk Agility least important 6

The continuum of sourcing empowerment Empowered Business Zone Intermediate Business Zone Core Business Zone Sourcing and IT educates and provides backstop when required Sourcing and IT as educator and consultant Inspector Sourcing and IT leads sourcing lifecycle Full risk assessment Ongoing contract compliance Measure value Audit value 7

Key areas of SaaS contract negotiation Type Pricing Data usage and access Business continuity Security Support Exit clause Usage based or user-based Term or pay-as-you-go Key issues/recommendations Regular access to data define format and frequency of backup Ability to get data back at termination of contract How is the vendor allowed to use your data during relationship How long should the vendor keep your data post-relationship Nightly backups of customer data are typical Look for multiple data centers in multiple locations Find out annual (or better) testing of disaster recovery plan Look for audits such as SSAE 16, ISO 27001, and industry-specific, such as FISMA or PCI Password compliance, logs and audit trails Physical and electronic security Right to customer audit. Define hours, modes, escalation, governance, response time, definitions of severity For cause and for no cause, make sure to detail notification windows/minimums and fees (if any) 8

Thank you Gaetano Santucci Consip S.p.A. Director of Competence Center e-mail: gaetano.santucci@consip.it