As the Value of Enterprise Networks Escalates, So Does the Need for Configuration Management



Similar documents
Tying Order Management Is Critical to CRM Success

Customer-Centric CRM: Fully Optimizing CRM

Understanding Total Cost of Ownership of a Hosted vs. Premises-Based CRM Solution

Exhibit 1 The VoIP Business Case Source: The Yankee Group, Competitive advantage. Streamline business process. Improved IT process

Customer Relationship Success Demands Insight

Dynamic Best Practices of Vulnerability Management

Building Blocks of Transparent Web Security: Server-Gated Cryptography

The Financial Realities of CRM: A Guide to Best Practices, TCO and ROI

Improving Customer Service Representative Effectiveness Demands a Unified Agent Desktop

To Reduce Operating Costs and Drive Up Productivity, SMBs Must Rely on Trusted VoIP Vendors and Channel Partners

Great Expectations: Self-Service Success Can Happen

Chicago Mercantile Exchange Uses Red Hat Enterprise Linux to Double Daily Trades and Halve Hardware Costs

Storage Resource Management: A Foundation for the Shift to a Storage Utility

Cisco Network Optimization Service

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

The Mandate for Lights-Out IT Management

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

CA Service Desk Manager

WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability

Address IT costs and streamline operations with IBM service desk and asset management.

IBM Tivoli Netcool Configuration Manager

Implement a unified approach to service quality management.

Benchmarking VoIP Performance Management

Enhance visibility into and control over software projects IBM Rational change and release management software

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Top 10 Reasons to Automate your IT Run Books

Application Performance Management

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Redefining Infrastructure Management for Today s Application Economy

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

CA Configuration Automation

Solving the Security Puzzle

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

ITSM Process Description

Problem Management: A CA Service Management Process Map

Realizing the IT Management Value of Infrastructure Management

Achieving ITSM Excellence Through Availability Management

How To Integrate With Salesforce Crm

Service Suite for Communications Mobile workforce management solutions

Published April Executive Summary

Reduce IT Costs by Simplifying and Improving Data Center Operations Management

Traffic Visibility Networking (TVN) can Simplify and Scale IT Operations in a Networked World

Transforming change: four steps toward more effective change management

Virtual Infrastructure Creates Communications Agility

Eight Ways Better Software Deployment and Management Can Save You Money

Making the Business Case for IT Asset Management

THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT

White Paper: Application and network performance alignment to IT best practices

HP and netforensics Security Information Management solutions. Business blueprint

Reining in the Effects of Uncontrolled Change

Big Data Without Big Headaches: Managing Your Big Data Infrastructure for Optimal Efficiency

How To Protect Your Network From Attack From A Network Security Threat

Transforming IT Processes and Culture to Assure Service Quality and Improve IT Operational Efficiency

W H I T E P A P E R. Reducing Server Total Cost of Ownership with VMware Virtualization Software

Sample Global Network Security Market. 1 technavio insights

Achieve greater efficiency in asset management by managing all your asset types on a single platform.

SMBs and Large Enterprises Value Financing Solutions from Microsoft

Address IT costs and streamline operations with IBM service request and asset management solutions.

Network change is constant: Configuration and compliance management can help

Managed Services. Business Intelligence Solutions

BSM for IT Governance, Risk and Compliance: NERC CIP

Cisco TelePresence Select Operate and Cisco TelePresence Remote Assistance Service

Quantifying the Value of Investments in HP Cloud Service Automation. An ROI White Paper

Best Practices from Deployments of Oracle Enterprise Operations Monitor

Enterprise Application Performance Management: An End-to-End Perspective

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

CRM for Customer Service and Support

Product Lifecycle Management in the Medical Device Industry. An Oracle White Paper Updated January 2008

Deploying the CMDB for Change & Configuration Management

Getting Maximum Business Value out of ERP Sachin Kinare, Vivek Tatkare & Abhijit Dixit

How Operating Systems Create Network Efficiency

5 things to consider when estimating the ROI on cyber security.

Virtualization Essentials

solution brief NEC Remote Managed Services Prevent Costly Communications Downtime with Proactive Network Monitoring and Management from NEC

Network Application Performance Alignment to IT Best Practices

Applying ITIL v3 Best Practices

PULSE SECURE CARE PLUS SERVICES

Security and Identity Management Auditing Converge

Preemptive security solutions for healthcare

IBM Tivoli Netcool network management solutions for enterprise

An Oracle White Paper November Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager

The Case for Managed Infrastructure Services

Cost Savings Analysis of IP Address Management (IPAM) Software for Service Providers

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

agility made possible

can you improve service quality and availability while optimizing operations on VCE Vblock Systems?

Selecting A Managed Service Provider WHITEPAPER

What you need from an Enterprise Grade CRM System. An Oracle White Paper November 2008

serena.com seven ways ppm will change your application development organization

Five Things to Consider in an Enterprise CRM Evaluation. An Oracle White Paper July 2010

Optimizing Cloud Efficiency Through Enhanced Visibility and Control. business White paper

Automated Change Management in the Data Center

INFRASTRUCTURE MANAGEMENT IS NOT ENOUGH: THE NEW IT OPERATIONS IMPERATIVE

An Application-Centric Infrastructure Will Enable Business Agility

BMC and ITIL: Continuing IT Service Evolution. Why adopting ITIL processes today can save your tomorrow

DCML - The Standard that Enables ITIL Compliance

How To Create An Intelligent Infrastructure Solution

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Transcription:

T H E Enterprise Computing & Networking January 2004 by Zeus Kerravala YANKEE G R O U P T H E Y A N K E E G R O U P R E P O R T As the Value of Enterprise Networks Escalates, So Does the Need for Configuration Management Executive Summary The enterprise network supports the most critical business applications and corporate communications. The impact of network outages has never been more acute. Yet, most enterprises diffidently accept network outages as a normal cost of doing business. What many managers do not realize is many outages are preventable with better configuration management. As trends such as Web services, IP convergence and on-demand computing continue to develop, the reliability of the network will become even more important. The network will support even more critical business applications, increasing the cost of downtime (see Exhibit 1). Even for more frequent and less publicly noticeable outages, the costs of downtime hurt the bottom line and offset the revenue and productivity benefits of new initiatives. In this report, the Yankee Group focuses on how network configuration management can give the enterprise the necessary discipline and workflow to maximize uptime. It maximizes uptime by increasing mean time between failures (MTBF) through effective change control, and reduces downtime and its associated cost of repair by minimizing mean time to repair (MTTR). Configuration management can provide greater control of change, which leads to better network resiliency, security and scalability. Exhibit 1 With More Critical Apps on the Network, the Cost of Downtime Escalates Source: The Yankee Group, 2004 Transportation 0.09 Retail E-Commerce Media Banking Brokerage 0.09 0.1 1.2 2.6 0 1 2 3 4 5 Reported Revenue Loss per Hour of Downtime (in Millions of Dollars) 4.5 Copyright 2004, the Yankee Group The Yankee Group Report is published for the sole use of Yankee Group Advisory Service members. It may not be duplicated, reproduced, stored in a retrieval system, or retransmitted without the express permission of the Yankee Group, 31 St. James Ave., Boston, MA 02116. Phone: (617) 956-5000. Fax: (617) 956-5005. The Yankee Group can be reached by e-mail at: info@yankeegroup.com. For more information, contact the Yankee Group. All rights reserved. All opinions and estimates herein constitute our judgment as of this date and are subject to change without notice.

Enterprise Computing & Networking Table of Contents I. Introduction: The Role of the Enterprise Network................... 2 II. The State of The Enterprise Network............................. 3 How Enterprises Deal with Downtime Today....................... 4 III. Configuration Management Overview........................... 6 Impact on Security.......................................... 8 Impact on the Business....................................... 8 IV. Conclusions and Recommendations............................. 9 I. Introduction: The Role of the Enterprise Network In only the past five years, the enterprise network has become the backbone of the business. Enterprises now rely on their networks to support mission-critical applications and service the needs of a business web of suppliers, vendors, partners, customers and employees. The expanded role of the network and the following trends will continue to drive the need for maximum uptime: Voice, video and data convergence: IP convergence is more of a matter of when than if for most companies. Full convergence promises to create a competitive advantage for companies by bringing all of their collaborative applications together and delivering truly unified communications. Web services: Enterprise application integration (EAI) has been limited to only the largest of enterprises because of its complexity and because there was no standard to deliver this across organizations. Web services will simplify application integration and create a standardized way for companies to communicate with one another, bringing application integration to mid-size organizations. The Web services protocols ride on top of IP networks, making network uptime a critical component of Web services. Migration to IP VPNs: More companies are migrating to IP networks. IP has the necessary openness and flexibility to adapt to current company challenges and will be the delivery mechanism for many new technologies and applications. On-demand computing: Utility or on-demand computing will become a new computing model for companies where resources are pooled and allocated as needed by applications and resources. This will help deliver the true realtime enterprise where information is available to any user, over any device, at any time. Any on-demand computing environment will require an ondemand network. 2 Copyright 2004, the Yankee Group. All rights reserved.

January 2004 These trends and new technologies have the potential to transform business and simultaneously reduce costs and increase revenue. However, the potential of these new technologies will never be realized if the security and reliability of the underlying network infrastructure cannot be guaranteed. Configuration management, as part of a thoughtful infrastructure management strategy, is a critical tool for managing the consistency, reliability and security of the enterprise network. II. The State of the Enterprise Network The importance of the enterprise network has grown tremendously over the past five years but the way it is managed has not. Network changes are still largely managed ad hoc, node by node rather than holistically. This engineering-intensive, ad hoc approach to network management has created the following: Eighty percent of IT budgets is used to maintain the status quo. Because of increased complexity, lower budgets and continued business demand, the percentage of budget used for keeping the lights on will continue to increase. Without imposing a disciplined approach to managing the network, maintaining the current operating environment will continue to consume a larger percentage of the IT budget, leaving new, value-producing initiatives on the shelf. A 2002 Yankee Group survey showed that, in multivendor networks (three vendors or more), 62 percent of network downtime is due to human error (see Exhibit 2). Many outages are the result of manual processes and ad hoc changes by network cowboys who make changes to network devices outside of change control processes and during business hours. These errors are selfinflicted and quite often preventable. Exhibit 2 Human Error Is the Leading Cause of Network Downtime Source: The Yankee Group 2002 Network Downtime Survey Power Errors 9% Unresolved Errors 3% Hardware Errors 10% Human Error 62% Telco Errors 16% Copyright 2004, the Yankee Group. All rights reserved. 3

Enterprise Computing & Networking Accurate documentation is difficult to maintain. Because networks are often managed ad hoc, changes are made on the fly and never recorded. Much of the what and why of network management lives inside the heads of these network cowboys, making the diagnosis and remediation process inefficient. Despite the increased importance of the enterprise network, most organizations have not adopted any kind of configuration management strategy. By identifying methods of reducing or even eliminating self-inflicted errors, companies can save millions of dollars in lost productivity and availability. How Enterprises Deal with Downtime Today Most network operations environments lack network-wide control of configuration baselines, which directly contributes to an unnecessarily high number of service outages and an impaired ability to quickly find and repair causal events. Exhibit 3 shows a typical incident response workflow. The highlighted phase of the process shows where configuration management is ad hoc. The engineer may make multiple configuration changes and then manually document the changes later. With enterprise networks growing rapidly, there is a continual need to establish and maintain baseline configurations, and to have the ability to audit these configurations for every device in the network at all times. A collection of ad hoc tools cannot do this, leading to the following problems: Configuration drift: Different individuals within the network engineering staff make a variety of small changes to lots of network elements over time. Device configurations become inconsistent, resulting in elements that are similar but each having widely different settings. The baseline state for a given device is lost. Loss of critical information: When documenting change is done after the fact, information invariably gets lost. Either some change is not documented, an incident happens before the documentation is completed, or engineers never get around to documentation because of more firefighting. Extended downtime: When network engineers are troubleshooting, it is critical they can quickly restore the device to a stable state. This at least gets the device to a functional condition (referred to as a safe harbor ) while troubleshooting continues to identify the root cause. Without a means of automatically restoring to a baseline state, the device stays down longer, exacerbating the business impact. Extended time to repair: Troubleshooting time and incident resolution takes longer because an engineer needs to manually get the device back to a stable configuration through configuration archaeology as well as trial and error. Lack of a verifiable baseline or enterprise gold standard: Having an enterprise-wide gold standard for the configuration of each device is the goal; but it is a worthless exercise if there is no way to validate and audit configurations after they are deployed to the device and in production. 4 Copyright 2004, the Yankee Group. All rights reserved.

January 2004 Exhibit 3 How Enterprises Handle Downtime Today Source: The Yankee Group, 2004 Network Event Open Trouble Ticket Configuration Error? No Reassign Trouble Ticket Yes Make Configuration Change No Problem Resolved? Yes Update Configuration Management System Close Trouble Ticket All of these problems lead to a higher cost of downtime, longer repair times and lower service reliability. The configuration of a device and the impact that configuration has on dependent devices is one of the first things a network manager will investigate during an outage. Without a consistent and controlled approach to device changes, it is nearly impossible to correlate those changes to network outages. The Yankee Group Network Downtime Survey revealed 83 percent of companies have no ability to correlate outages with configuration changes. This leads to lengthy troubleshooting times that translate into increased mean time to repair. The network operations staff must scramble and guess what the problem is. In many cases, the proposed changes cause other problems that may not appear until later. Outages last longer and the costs to repair them increase because valuable and expensive engineering skills are dedicated to the effort. Copyright 2004, the Yankee Group. All rights reserved. 5

Enterprise Computing & Networking Inaccurate documentation also leads to lengthy problem solving. Most engineers do not have a simple way to document device changes as they are made. It is common to see operations center staff track configuration changes in spreadsheets or in homegrown databases. This makes entering the information a manual and inconsistent process. Often a week or more elapses before an engineer can enter the details of a configuration change. The data is often not current or accurate and network operators lose valuable time looking for information or acting on the wrong information. Trying to manage a network in this ad hoc fashion puts the network operations team on the defensive where they are constantly working from behind, fixing one problem after another. This continual firefighting takes away from other, more strategic, initiatives. The Yankee Group estimates approximately 90 percent of IT initiatives are delivered late, partially because of the lengthy troubleshooting that monopolizes IT staff time. One of the keys to creating a successful network strategy will be to deploy configuration management software that can minimize the overall MTTR and help create a more consistent and manageable environment. III. Configuration Management Overview Configuration is the C in the FCAPS (Fault, Configuration, Accounting, Performance, Security) model, the standard model for components of network management. Leading network management tools such as those from HP OpenView, Computer Associates and IBM/Tivoli offer tools for virtually every requirement of the FCAPS model except configuration. Configuration management has been the domain of the equipment manufacturers. In fact, until recently, the only configuration management platforms were those available directly from the hardware vendors. They provide basic abilities to make simple changes but have no advanced capabilities and lack the ability to manage multivendor networks. As a result, most network managers work with one network management system for alerts but require several configuration management tools for making changes to network elements. As companies continue to build intelligence and automation into the network, manageability will be the key for any successful strategy. Configuration management, in particular, enables that manageability. A strong configuration management strategy delivers these benefits: A centralized view of all the network elements in a multivendor network: Network engineers will have a common system to record and access configuration information for every network device, regardless of platform. A uniform network element configuration: Configuration management fosters a consistent environment. With more uniform configuration, MTTR is shorter. The network elements have a greater commonality that gives network engineers a better understanding of and more familiarity with the configuration of each device. It also enables operations staffs to institute a more structured, consistent troubleshooting process across the infrastructure. 6 Copyright 2004, the Yankee Group. All rights reserved.

January 2004 Faster and more accurate device configurations, changes and deployments: Standardizing on one configuration management tool enables automated configuration, faster changes and provisioning. Consistency means manageability. Enforcement of compliance with standards and policies: Many enterprises have standards and policies for equipment configuration but no means to track adherence to those standards. This can lead to security holes or misconfigurations, which lead to unplanned downtime, loss of proprietary data and audit findings. Ability to track network changes and instill accountability: Network managers can immediately detect when changes are made to the approved baseline state of a device, identify who made the change, then enforce configuration standards and change management processes. Ability to quickly restore to a known and trusted state (safe harbor): Rolling the device or a group of devices immediately back to a known functional condition reduces the impact of downtime. Without this capability, engineers would have to spend critical time searching for a stable configuration and manually reconfiguring devices. As companies investigate configuration management platforms, the following features need to be incorporated into the solution: Multivendor capabilities Rollback and restoration capabilities Hierarchal user access and permissions Event-driven change detection Accounting and reporting Ease-of-use based on a strong GUI Detailed device information (current and historical) Centralized management Implementing a configuration management tool that incorporates these capabilities delivers immediate benefits to the network manager and the enterprise. Business units will not have to cope with unplanned outages as often and the duration of downtime will be shorter. An additional benefit often overlooked is the positive impact on network security. Configuration management should always be part of the overall enterprise network security strategy. Copyright 2004, the Yankee Group. All rights reserved. 7

Enterprise Computing & Networking Impact on Security For years, network security has focused on the network perimeter. Organizations have spent money on firewalls, intrusion detection systems and VPN concentrators but have always treated security as more of an overlay to the network rather than an integral component. Configuration management is the core of any strong security strategy. It helps enforce policies, identify security holes and prevent unauthorized changes to network elements. The security concerns of companies identified by the Yankee Group Network Downtime Survey illustrate these risks: Fifty percent of respondents reported unauthorized changes were made in the past 12 months. Of the unauthorized changes reported, the network staff could not account for 47 percent of the changes. Seventy percent of companies used shared passwords to manage network devices where only 30 percent used centralized security servers such as TACACS+ or RADIUS. Sixty-eight percent of respondents had no method of tracking operator logins and configuration changes. For companies that truly wish to make security part of the corporate DNA, configuration management is a must for delivering the necessary control mechanisms. These control mechanisms ensure only authorized personnel are making the necessary changes to the network within the defined best practices of the company or government organization. Impact on the Business Companies that fail to implement a robust configuration and control strategy for their networks will not have the required network flexibility or resiliency to take full advantage of productivity improving technology. Effective configuration management has critical business impact in four ways: Increased efficiency: Faster administration lowers MTTR; operations center staff are more efficient, and respond and resolve more problems faster. Increased productivity: As networks become more important, downtime negatively affects the productivity of end users. Ironically, today s networked organizations are like the mainframe environments of years past. If users do not have network access, they have very little information or functionality available to them. Configuration management prevents outages that idle employees. Revenue protection and generation: With more critical transactions relying on the network infrastructure, the costs of downtime have never been higher. Configuration management prevents many of the outages that affect revenue. When employees are more productive, they can focus on revenue-generating activities. 8 Copyright 2004, the Yankee Group. All rights reserved.

January 2004 Reduced risk of regulatory non-compliance: The ability to attest to internal change control processes meets specific requirements of emerging industry and government regulations, including the Sarbanes-Oxley Act, and is fundamental to avoiding audit findings. The impact of configuration management should not be underestimated. It is realistic that operations centers could see a 20 percent increase in the efficiency of the network engineering and operations staff and a 20 percent reduction in MTTR. That would be analogous to adding one support person for every five people employed in network operations at no cost. This alone can justify the investment in a multivendor configuration management tool. More important, the network operations center staff will never be able to manage the increasing network scale and complexity required for advanced business applications without a comprehensive configuration management strategy. IV. Conclusions and Recommendations A comprehensive configuration management strategy is crucial for today s extended enterprise network. The scale and responsibility of the enterprise network is too great to be managed haphazardly. The costs of downtime are evident and in many cases preventable. To get started, the Yankee Group offers the following recommendations: Calculate the cost of downtime. Network managers need to work with business unit managers to identify and quantify the frequency of outages and the business impact. They should ask whether it is revenue or productivity that is adversely affected and if the lost revenue is recoverable. Calculate support costs. Network managers need to quantify MTBF, MTTR and the costs of repair. Identify how much time is spent troubleshooting, root cause analysis, and change management. How many man-hours can be recovered through effective configuration management? Team up with the security organization. In many organizations, network managers and security managers work in silos. By working together to establish configuration management policies and integrated change controls, each group s job gets easier. Each will have a consistent view of the entire network and an increased trust in the way device configurations are managed, making the network more efficient to secure and monitor. Configuration management is often overlooked. Fault and performance management garners the most attention in the network operations center. What network engineers are beginning to realize is that a strong network configuration management strategy makes fault and performance management easier. New multivendor configuration management tools enable network managers to deploy consistent change management practices as well as discipline and workflow procedures across the entire network. The network is more reliable, is more secure, experiences fewer outages and minimizes the impact if unexpected changes do occur. Copyright 2004, the Yankee Group. All rights reserved. 9

Enterprise Computing & Networking Did You Know The Yankee Group... Is a world s most trusted name for communications and networking research and consulting, focusing on strategic planning assistance, technology forecasting, and industry analysis. Has unmatched expertise across telecommunications, wireless/mobil communications, IT business applications, and consumer technologies. Was founded in 1970 as the first research and advisory services firm. Maintains offices and research staff in North America, Latin America, Asia-Pacific, and Europe/Middle East/Africa (EMEA). Employs approximately 200 skilled professionals. Offers a porfolio comprising nearly 100 service offerings-avisory services, decision instruments, signature events, and consulting. Provides complete technology and management consulting capabilities. Showcases a full calendar of technology-related conferences and seminars held around the globe. Delivers a full line of research reports and research notes via the Internet and Lotus Notes. ACCURATE RELIABLE TRUSTED 10 Copyright 2004, the Yankee Group. All rights reserved.

January 2004 is a global leader in technology research and consulting. Our customers, which include technology vendors and users, benefit from our accurate, reliable, and trusted research, consulting, and personalized one-to-one client interaction covering communications and IT products and services. Now in our fourth decade, the company is headquartered in Boston and maintains offices throughout North America, Europe, Latin America, and the Pacific Rim. ACCURATE RELIABLE TRUSTED Copyright 2004, the Yankee Group. All rights reserved. 11

The Yankee Group World Headquarters 31 St. James Avenue BOSTON, MASSACHUSETTS 02116-4114 T 617.956.5000 F 617.956.5005 info@yankeegroup.com Regional Headquarters North America 31 St. James Avenue BOSTON, MASSACHUSETTS 02116-4114 T 617.956.5000 F 617.956.5005 info@yankeegroup.com 951 Mariner s Island Boulevard, Suite 260 SAN MATEO, CALIFORNIA 94404-5023 T 650.522.3600 F 650.522.3666 info@yankeegroup.com Asia-Pacific Itochu Enex Bldg., 6F 1-24-12 Meguro, Meguro-Ku TOKYO 153-8655 JAPAN T 81.3.5740.8081 F 81.3.5436.5057 asiainfo@yankeegroup.com EMEA 55 Russell Square LONDON WC1B 4HP UNITED KINGDOM T 44.20.7307.1050 F 44.20.7323.3747 euroinfo@yankeegroup.com Latin America Alameda Santos 234, 7º Andar, 01418-000 SÃO PAULO, SP, BRASIL T 55.11.3145.3855 F 55.11.3145.3892 info@yankeegroup.com.br Advisory Services Yankee Group AnalystDirect advisory service annual memberships offer clients access to research and one-to-one expert guidance. Advisory services represent our best value for clients. The services help our members understand industry, regulatory, competitive, and market-demand influences, as well as opportunities and risks to their current strategies. Membership includes an invaluable in-person strategy session with Yankee Group analysts, direct access to a team of analysts, research reports, forecasts, research notes, and regular audioconferences on relevant topics. We offer advisory services on almost 40 selected topics in Telecommunications; Wireless/Mobile Communications; Consumers, Media & Entertainment; and Information Technology Hardware, Software & Services. Decision Instruments The Yankee Group offers a full portfolio of technology and market forecasts, trackers, surveys, and total cost of ownership (TCO), return on investment (ROI), selection, and migration tools. Decision instruments provide our clients the data required to compare, evaluate, or justify strategic and tactical decisions a hands-on perspective of yesterday, today, and tomorrow shaped and delivered through original research, in-depth market knowledge, and the unparalleled insight of a Yankee Group analyst. Trackers Trackers enable accurate, up-to-date tactical comparison and strategic analysis of industry-specific metrics. This detailed and highly segmented tool provides discrete proprietary and performance data, as well as blended metrics interpreted and normalized by Yankee Group analysts. Surveys Surveys take the pulse of current attitudes, preferences, and practices across the marketplace, including supply, delivery, and demand. These powerful tools enable clients to understand their target customers, technology demand, and shifting market dynamics. Forecasts Forecasts provide a basis for sound business planning. These market indicators are a distillation of continuing Yankee Group research, interpreted by our analysts and delivered from the pragmatic stance our clients have trusted for decades. Signature Events The Yankee Group s signature events provide a real-time opportunity to connect with the technologies, companies, and visionaries that are transforming Telecommunications; Wireless/Mobile Communications; Consumers, Media & Entertainment; and Information Technology Hardware, Software & Services. Our exclusive interactive forums are the ideal setting for Yankee Group analysts and other industry leaders to discuss and define the future of conversable technologies, business models, and strategies. Consulting Services The Yankee Group s integrated model blends quantitative research, qualitative analysis, and consulting. This approach maximizes the value of our solution and the return on our clients consulting investment. Each consulting project defines and follows research objectives, methodology, desired deliverables, and project schedule. Many Yankee Group clients combine advisory service memberships with a custom-consulting project, enabling them to augment our ongoing research with proprietary studies. Thousands of clients across the globe have engaged the Yankee Group for consulting services in order to hone their corporate strategies and maximize overall return. For More Information... Phone: 617.956.5000, Fax: 617.956.5005. E-mail: info@yankeegroup.com. Web site: www.yankeegroup.com. ACCURATE RELIABLE TRUSTED The Yankee Group believes the statements contained in this publication are based on accurate and reliable information. However, because our information is provided from various sources, including third parties, we cannot warrant that this publication is complete and error-free. The Yankee Group disclaims all implied warranties, including, without limitation, warranties of merchantability or fitness for a particular purpose. The Yankee Group shall have no liability for any direct, incidental, special, or consequential damages or lost profits. This publication was prepared by the Yankee Group for use by our clients.