Identify and Manage Operational Risk Impacts on Your Organization

  • Buy Link or Shortcode: {j2store}230|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Vendor Management
  • Parent Category Link: /vendor-management

More than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.

A new threat will impact your organization's operations at some point. Make sure your plans are flexible enough to manage the inevitable consequences and that you understand where those threats may originate.

Our Advice

Critical Insight

  • Identifying and managing a vendor’s potential operational impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect operations.
  • Organizational leadership is often taken unaware during crises, and their plans lack the flexibility to adjust to significant market upheavals.

Impact and Result

Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.

  • Prioritize and classify your vendors with quantifiable, standardized rankings.
  • Prioritize focus on your high-risk vendors.
  • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts with our Operational Risk Impact Tool.

Identify and Manage Operational Risk Impacts on Your Organization Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Identify and Manage Operational Risk Impacts to Your Organization Storyboard – Use this research to better understand the negative impacts of vendor actions to your brand reputation.

Use this research to identify and quantify the potential operational impacts caused by vendors. Utilize Info-Tech's approach to look at the operational impact from various perspectives to better prepare for issues that may arise.

  • Identify and Manage Operational Risk Impacts to Your Organization Storyboard

2. Operational Risk Impact Tool – Use this tool to help identify and quantify the operational impacts of negative vendor actions.

By playing the “what if” game and asking probing questions to draw out – or eliminate - possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

  • Operational Risk Impact Tool
[infographic]

Further reading

Identify and Manage Operational Risk Impacts on Your Organization

Understand internal and external vendor risks to avoid potential disaster.

Analyst perspective

Organizations need to be aware of the operational damage vendors may cause to plan around those impacts effectively.

Frank Sewell

Organizations must be mindful that operational risks come from internal and external vendor sources. Missing either component in the overall risk assessment can significantly impact day-to-day business processes that cost revenue, delay projects, and lead to customer dissatisfaction.

Frank Sewell,

Research Director, Vendor Management
Info-Tech Research Group

Executive Summary

Your Challenge

More than any other time, our world is changing rapidly. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.

A new threat will impact your organization's operations at some point. Make sure your plans are flexible enough to manage the inevitable consequences and that you understand where those threats may originate.

Common Obstacles

Identifying and managing a vendor’s potential operational impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect operations.

Organizational leadership is often taken unaware during crises, and their plans lack the flexibility to adjust to significant market upheavals.

Info-Tech's Approach

Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.

Prioritize and classify your vendors with quantifiable, standardized rankings.

Prioritize focus on your high-risk vendors.

Standardize your processes for identifying and monitoring vendor risks to manage potential impacts with our Operational Risk Impact Tool.

Info-Tech Insight

Organizations must evolve their risk assessments to be more adaptive to respond to threats in the market. Ongoing monitoring of the vendors tied to company operations, and understanding where those vendors impact your operations, is imperative to avoiding disasters.

Info-Tech’s multi-blueprint series on vendor risk assessment

There are many individual components of vendor risk beyond cybersecurity.

There are many components to vendor risk, including: Financial, Reputational, Operational, Strategic, Security, Regulatory & Compliance.

This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

Out of Scope:
This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

Operational risk impacts

Potential losses to the organization due to incidents that affect operations.

  • In this blueprint we’ll explore operational risks, particularly from third-party vendors, and their impacts.
  • Identify potentially disruptive events to assess the overall impact on organizations and implement adaptive measures to identify, manage, and monitor vendor performance.
Operational

The world is constantly changing

The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

Below are some things no one expected to happen in the last few years:

27%

Businesses are changing their internal processes around TPRM in response to the Pandemic.

70%

Of organizations attribute a third-party breach to too much privileged access.

85%

Of breaches involved human factors (phishing, poor passwords, etc.).

Assess internal and external operational risk impacts

Due diligence and consistent monitoring are the keys to safeguarding your organization.

Two sides of the Same Coin

Internal

  • Poorly vetted supplemental staff
  • Bad system configurations
  • Lack of relevant skills
  • Poor vendor performance
  • Failure to follow established processes
  • Weak contractual accountability
  • Unsupportable or end-of-life system components

External

  • Cyberattacks
  • Supply Chain Issues
  • Geopolitical Disruptions
  • Vendor Acquisitions
  • N-Party Non-Compliance
  • Vendor Fraud

Operational risk is the risk of losses caused by flawed or failed processes, policies, systems, or events that disrupt business operations.

- Wikipedia

Internal operational risk

Vendors operating within your secure perimeter can open your organization to substantial risk.

Frequently monitor your internal process around vendor management to ensure safe operations.

  • Poorly vetted supplemental staff
  • Bad system configurations
  • Lack of relevant skills
  • Poor vendor performance
  • Failure to follow established processes
  • Weak contractual accountability
  • Unsupportable or end-of-life system components

Info-Tech Insight

You may have solid policies, but if your employees and vendors are not following them, they will not protect the organization.

External operational risks

  • Cyberattacks
  • Supplier issues and geopolitical instability
  • Vendor acquisitions
  • N-party vendor non-compliance

Identify and manage operational risks

Poorly configured systems

Failing to ensure that your vendor-supported systems are properly configured and that your vendors are meeting your IT change control and configuration standards is more commonplace than expected. Proper oversight and management of your support vendors are crucial to ensure they are meeting expectations in this regard.

Failure to follow processes

Most companies have policies and procedures around IT change and configuration control, security standards, risk management, vendor performance standards, etc. While having these processes is a good start, failure to perform continuous monitoring and management of these leads to increased risks of incidents.

Supply chain disruptions

Awareness of the supply chain's complications, and each organization's dependencies, are increasing for everyone. However, most organizations still do not understand the chain of n-party vendors that support their specific vendors or how interruptions in their supply chains could affect them. The 2022 Toyota shutdown due to Kojima is a perfect example of how one essential parts vendor could shut down your operations.

What to look for

Identify operational risk impacts

  • Does the vendor have a business continuity plan they will share for your review?
  • Is the vendor operating on old hardware that may be out of warranty or at end of life?
  • Is the vendor operating on older software or shareware that may lack the necessary patches?
  • Does the vendor self-audit, or do they use a vetted third-party audit firm to issue a SOC report annually?
  • Does the vendor have sufficient personnel in acceptable regions to support your operations?
  • Is the vendor willing to make concessions on contractual protections, or are they only offering “one-sided” agreements with “as-is” warranties?

Operational risks

Not knowing where your risks come from creates additional risks to operations.

  • Supply chain disruptions and global shortages.
    • Geopolitical disruptions and natural disasters have caused unprecedented interruptions to business. Do you know where your critical vendors are getting their supplies? Are you aware of their business continuity plans to accommodate for those interruptions?
  • Poor vendor performance.
    • Organizations need to understand where vendors are acting in their operations and manage the impact of replacing that vendor and cutting their losses rather than continuing to throw good money away after a bad performance.
  • Vendor acquisitions.
    • A lot of acquisition is going on in the market today. Large companies are buying competitors, imposing new terms on customers, or removing competing products from the market. Understand your options if a vendor is acquired by a company with which you do not wish to be in a relationship.

It is important to identify where potential risks to your operations may come from to manage and potentially eliminate them from impacting your organization.

Info-Tech Insight

Most organizations realize that their vendors could operationally affect them if an incident occurs. Still, they fail to follow the chain of events that might arise from those incidents to understand the impact fully.

Prepare your vendor risk management for success

Due diligence will enable successful outcomes.

  1. Obtain top-level buy-in; it is critical to success.
  2. Build enterprise risk management (ERM) through incremental improvement.
  3. Focus initial efforts on the “big wins” to prove the process works.
  4. Use existing resources.
  5. Build on any risk management activities that already exist in the organization.
  6. Socialize ERM throughout the organization to gain additional buy‑in.
  7. Normalize the process long term with ongoing updates and continuing education for the organization.

How to assess third-party operational risk

  1. Review Organizational Operations

    Understand the organization’s operational risks to prepare for the “what if” game exercise.
  2. Identify and Understand Potential Operational Risks

    Play the “what if” game with the right people at the table.
  3. Create a Risk Profile Packet for Leadership

    Pull all the information together in a presentation document.
  4. Validate the Risks

    Work with leadership to ensure that the proposed risks are in line with their thoughts.
  5. Plan to Manage the Risks

    Lower the overall risk potential by putting mitigations in place.
  6. Communicate the Plan

    It is important not only to have a plan but also to socialize it in the organization for awareness.
  7. Enact the Plan

    Once the plan is finalized and socialized, put it in place with continued monitoring for success.

Insight summary

Operational risk impacts often come from unexpected places and have unforeseen impacts. Knowing where your vendors place in critical business processes and those vendors' business continuity plans concerning your organization should be a priority for those who manage the vendors.

Insight 1

Organizations fail to plan for vendor acquisitions appropriately.

Vendors routinely get acquired in the IT space. Does your organization have appropriate safeguards from inadvertently entering a negative relationship? Do you have plans around replacing critical vendors purchased in such a manner?

Insight 2

Organizations often fail to understand how they factor into a vendor’s business continuity plan.

If one of your critical vendors goes down, do you know how they intend to re-establish business? Do you know how you factor into their priorities?

Insight 3

Organizations need to have a comprehensive understanding of how their vendor-managed systems integrate with Operations.

Do you understand where in the business processes vendor-supported systems lie? Do you have contingencies around disruptions that account for those pieces missing from the process?

Identifying operational vendor risk

Who should be included in the discussion

  • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make informed decisions.
  • Getting input from operational experts at your organization will enhance your organization's long-term potential for success.
  • Involving those who not only directly manage vendors but also understand your business processes will aid in determining the forward path for relationships with your current vendors and identifying new emerging potential partners.

See the blueprint Build an IT Risk Management Program

Review your operational plans for new risks on a regular basis.

Keep in mind Risk = Likelihood x Impact (R=L*I).

Impact (I) tends to remain the same, while Likelihood (L) is becoming closer to 100% as threat actors become more prevalent

Managing vendor operational risk impacts

What can we realistically do about the risks?

  • Review vendors’ business continuity plans and disaster recovery testing.
    • Understand your priority in their plans.
  • Institute proper contract lifecycle management.
    • Make sure to follow corporate due diligence and risk assessment policies and procedures.
    • Failure to do so consistently can be a recipe for disaster.
  • Develop IT governance and change control.
  • Introduce continual risk assessment to monitor the relevant vendor markets.
    • Regularly review your operational plans for new risks and evolving likelihoods.
    • Risk = Likelihood x Impact (R=L*I).
      • Impact (I) tends to remain the same and be well understood, while Likelihood (L) may often be considered 100%.
  • Be adaptable and allow for innovations that arise from the current needs.
    • Capture lessons learned from prior incidents to improve over time and adjust your plans accordingly.

Organizations need to review their organizational risk plans, considering the placement of vendors in their operations.

Pandemics, extreme weather, and wars that affect global supply chains are current realities, not unlikely scenarios.

Ongoing improvement

Incorporating lessons learned

  • Over time, despite everyone’s best observations and plans, incidents will catch us off guard.
  • When it happens, follow your incident response plans and act accordingly.
  • An essential step is to document what worked and what did not – collectively known as the “lessons learned.”
  • Use the lessons learned document to devise, incorporate, and enact a better risk management process.

Sometimes disasters occur despite our best plans to manage them.

When this happens, it is important to document the lessons learned and improve our plans going forward.

The "what if" game

1-3 hours

Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

  • Break into smaller groups (or if too small, continue as a single group).
  • Use the Operational Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potentials but manage the overall process to keep the discussion pertinent and on track.
  • Collect the outputs and ask the subject matter experts (SMEs) for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

Download the Operational Risk Impact Tool

Input

  • List of identified potential risk scenarios scored by likelihood and operational impact
  • List of potential management of the scenarios to reduce the risk

Output

  • Comprehensive operational risk profile on the specific vendor solution

Materials

  • Whiteboard/flip charts
  • Operational Risk Impact Tool to help drive discussion

Participants

  • Vendor Management – Coordinator
  • Organizational Leadership
  • Operations Experts (SMEs)
  • Legal/Compliance/Risk Manager

High risk example from tool

Sample Questions to Ask to Identify Impacts. Lists questions impact score, weight, question and comments or notes.

Being overly reliant on a single talented individual can impose risk to your operations. Make sure you include resiliency in your skill sets for critical business practices.

Impact score and level. Each score for impacts are unique to the organization.

Low risk example from tool

Sample Questions to Ask to Identify Impacts. Lists questions impact score, weight, question and comments or notes. Impact score and level. Each score for impacts are unique to the organization.

Summary

Seek to understand all aspects of your operations.

  • Organizations need to understand and map out where vendors are critical to their operations.
  • Those organizations that consistently follow their established risk assessment and due diligence processes will be better positioned to avoid disasters.
  • Bring the right people to the table to outline potential risks in the market and your organization.
  • Understand how your vendors prioritize your organization in their business continuity processes.
  • Incorporate “lessons learned” from prior incidents into your risk management process to build better plans for future issues.

Organizations must evolve their operational risk assessments considering their vendor portfolio.

Ongoing monitoring of the market and the vendors tied to company operations is imperative to avoiding disaster.

Related Info-Tech Research

Identify and Manage Financial Risk Impacts on Your Organization

  • Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them.
  • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

Identify and Manage Reputational Risk Impacts on Your Organization

  • Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
  • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your reputation and brand with our Reputational Risk Impact Tool.

Identify and Manage Strategic Risk Impacts on Your Organization

  • Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
  • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Risk Impact Tool.

Bibliography

“Weak Cybersecurity is taking a toll on Small Businesses.” Tripwire. August 7, 2022.

SecureLink 2022 White Paper SL_Page_EA+PAM (rocketcdn.me)

Member Poll March 2021 "Guide: Evolving Work Environments Impact of Covid-19 on Profile and Management of Third Parties.“ Shared Assessments. March 2021.

“Operational Risk.” Wikipedia.

Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, August 23, 2012.

Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.

The latest burning platform: Exit Plans in a shifting world

  • Large vertical image:
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A

The current global situation, marked by significant trade tensions and retaliatory measures between major economic powers, has elevated the importance of more detailed, robust, and executable exit plans for businesses in nearly all industries. The current geopolitical headwinds create an unpredictable environment that can severely impact supply chains, technology partnerships, and overall business operations. What was once a prudent measure is now a critical necessity – a “burning platform” – for ensuring business continuity and resilience.

Here I will delve deeper into the essential components of an effective exit plan, outline the practical steps for its implementation, and explain the crucial role of testing in validating its readiness.

exit plan

Continue reading

Drive Customer Convenience by Enabling Text-Based Customer Support

  • Buy Link or Shortcode: {j2store}531|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Customer Relationship Management
  • Parent Category Link: /customer-relationship-management
  • Text messaging services and applications (such as SMS, iMessage, WhatsApp, and Facebook Messenger) have seen explosive growth over the last decade. They are an entrenched part of consumers’ daily lives. For many demographics, text messaging rather than audio calls is the preferred medium of communication via smartphone.
  • Despite the popularity of text messaging services and applications with consumers, organizations have been slow to adequately incorporate these channels into their customer service strategy.
  • The result is a major disconnect between the channel preferences of consumers and the customer service options being offered by businesses.

Our Advice

Critical Insight

  • IT must work with their counterparts in customer service to build a technology roadmap that incorporates text messaging services and apps as a core channel for customer interaction. Doing so will increase IT’s stature as an innovator in the eyes of the business, while allowing the broader organization to leapfrog competitors that have not yet added text-based support to their repertoire of service channels. Incorporating text messaging as a customer service channel will increase customer satisfaction, improve retention, and reduce cost-to-serve.
  • A prudent strategy for text-based customer service begins with defining the value proposition and creating objectives: is there a strong fit with the organization’s customers and service use cases? Next, organizations must create a technology enablement roadmap for text-based support that incorporates the right tools and applications to deliver it. Finally, the strategy must address best practices for text-based customer service workflows and appropriate resourcing.

Impact and Result

  • Understand the value and use cases for text-based customer support.
  • Create a framework for enabling technologies that will support scalable text-based customer service.
  • Improve underlying business metrics such as customer satisfaction, retention, and time to resolution by having a plan for text-based support.
  • Better align IT with customer service and support needs.

Drive Customer Convenience by Enabling Text-Based Customer Support Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should be leveraging text-based services for customer support, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Create the business case for text-based customer support

Understand the use cases and benefits of using text-based services for customer support, and establish how they align to the organization’s current service strategy.

  • Drive Customer Convenience by Enabling Text-Based Customer Support – Phase 1: Create the Business Case for Text-Based Customer Support
  • Text-Based Customer Support Strategic Summary Template
  • Text-Based Customer Support Project Charter Template
  • Text-Based Customer Support Business Case Assessment

2. Create a technology enablement framework for text-based customer support

Identify the right applications that will be needed to adequately support a text-based support strategy.

  • Drive Customer Convenience by Enabling Text-Based Customer Support – Phase 2: Create a Technology Enablement Framework for Text-Based Customer Support
  • Text-Based Customer Support Requirements Traceability Matrix

3. Create customer service workflows for text-based support

Create repeatable workflows and escalation policies for text-centric support.

  • Drive Customer Convenience by Enabling Text-Based Customer Support – Phase 3: Create Customer Service Workflows for Text-Based Support
  • Text-Based Customer Support TCO Tool
  • Text-Based Customer Support Acceptable Use Policy
[infographic]

Workshop: Drive Customer Convenience by Enabling Text-Based Customer Support

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Create the Business Case for Text-Based Support

The Purpose

Create the business case for text-based support.

Key Benefits Achieved

A clear direction on the drivers and value proposition of text-based customer support for your organization.

Activities

1.1 Identify customer personas.

1.2 Define business and IT drivers.

Outputs

Identification of IT and business drivers.

Project framework and guiding principles for the project.

2 Create a Technology Enablement Framework for Text-Based Support

The Purpose

Create a technology enablement framework for text-based support.

Key Benefits Achieved

Prioritized requirements for text-based support and a vetted shortlist of the technologies needed to enable it.

Activities

2.1 Determine the correct migration strategy based on the current version of Exchange.

2.2 Plan the user groups for a gradual deployment.

Outputs

Exchange migration strategy.

User group organization by priority of migration.

3 Create Service Workflows for Text-Based Support

The Purpose

Create service workflows for text-based support.

Key Benefits Achieved

Customer service workflows and escalation policies, as well as risk mitigation considerations.

Present final deliverable to key stakeholders.

Activities

3.1 Review the text channel matrix.

3.2 Build the inventory of customer service applications that are needed to support text-based service.

Outputs

Extract requirements for text-based customer support.

4 Finalize Your Text Service Strategy

The Purpose

Finalize the text service strategy.

Key Benefits Achieved

Resource and risk mitigation plan.

Activities

4.1 Build core customer service workflows for text-based support.

4.2 Identify text-centric risks and create a mitigation plan.

4.3 Identify metrics for text-based support.

Outputs

Business process models assigned to text-based support.

Formulation of risk mitigation plan.

Key metrics for text-based support.

Develop a Security Awareness and Training Program That Empowers End Users

  • Buy Link or Shortcode: {j2store}370|cart{/j2store}
  • member rating overall impact: 9.4/10 Overall Impact
  • member rating average dollars saved: $12,075 Average $ Saved
  • member rating average days saved: 11 Average Days Saved
  • Parent Category Name: Security Strategy & Budgeting
  • Parent Category Link: /security-strategy-and-budgeting
  • The fast evolution of the cybersecurity landscape requires security training and awareness programs that are frequently updated and improved.
  • Security and awareness training programs often fail to engage end users. Lack of engagement can lead to low levels of knowledge retention.
  • Irrelevant or outdated training content does not properly prepare your end users to effectively defend the organization against security threats.

Our Advice

Critical Insight

  • One-time, annual training is no longer sufficient for creating an effective security awareness and training program.
  • By presenting security as a personal and individualized issue, you can make this new personal focus a driver for your organizational security awareness and training program.

Impact and Result

  • Create a training program that delivers smaller amounts of information on a more frequent basis to minimize effort, reduce end-user training fatigue, and improve content relevance.
  • Evaluate and improve your security awareness and training program continuously to keep its content up-to-date. Leverage end-user feedback to ensure content remains relevant to those who receive it.

Develop a Security Awareness and Training Program That Empowers End Users Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should develop a security awareness and training program that empowers end users, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Develop your training program

Create or mature a security awareness and training program that is tailored to your organization.

  • Develop a Security Awareness and Training Program That Empowers End Users – Phase 1: Develop Your Training Program
  • Security Awareness and Training Program Development Tool
  • End-User Security Job Description Template
  • Training Materials – Physical Computer Security
  • Training Materials – Cyber Attacks
  • Training Materials – Incident Response
  • Training Materials – Mobile Security
  • Training Materials – Passwords
  • Training Materials – Phishing
  • Training Materials – Social Engineering
  • Training Materials – Web Usage
  • Security Awareness and Training Vendor Evaluation Tool
  • Security Awareness and Training Metrics Tool
  • End-User Security Knowledge Test Template
  • Security Training Campaign Development Tool

2. Design an effective training delivery plan

Explore methods of training delivery and select the most effective solutions.

  • Develop a Security Awareness and Training Program That Empowers End Users – Phase 2: Design an Effective Training Delivery Plan
  • Information Security Awareness and Training Policy
  • Security Awareness and Training Gamification Guide
  • Mock Spear Phishing Email Examples
  • Security Training Email Templates
  • Security Awareness and Training Module Builder and Training Schedule
  • Security Training Campaign Development Tool
  • Security Training Program Manual
  • Security Awareness and Training Feedback Template
  • Security Awareness Month Week 1: Staying in Touch
  • Security Awareness Month Week 2: Sharing Special Moments
  • Security Awareness Month Week 3: Working and Networking
  • Security Awareness Month Week 4: Families and Businesses
[infographic]

Workshop: Develop a Security Awareness and Training Program That Empowers End Users

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Outline the Plan for Long-term Program Improvement

The Purpose

Identify the maturity level of the existing security awareness and training program and set development goals.

Establish program milestones and outline key initiatives for program development.

Identify metrics to measure program effectiveness.

Key Benefits Achieved

Identified the gaps between the current maturity level of the security awareness and training program and future target states.

Activities

1.1 Create a program development plan.

1.2 Investigate and select metrics to measure program effectiveness.

1.3 Execute some low-hanging fruit initiatives for collecting metrics: e.g. create a knowledge test, feedback survey, or gamification guide.

Outputs

Customized development plan for program.

Tool for tracking metrics.

Customized knowledge quiz ready for distribution.

Customized feedback survey for training.

Gamification program outline.

2 Identify and Assess Audience Groups and Security Training Topics

The Purpose

Determine the unique audience groups within your organization and evaluate their risks and vulnerabilities.

Prioritize training topics and audience groups to effectively streamline program development.

Key Benefits Achieved

Created a comprehensive list of unique audience groups and the corresponding security training that each group should receive.

Determined priority ratings for both audience groups and the security topics to be delivered.

Activities

2.1 Identify the unique audience groups within your organization and the threats they face.

2.2 Determine the priority levels of the current security topics.

2.3 Review audience groups and determine which topics need to be delivered to each group.

Outputs

Risk profile for each identified audience group.

Priority scores for all training topics.

List of relevant security topics for each identified audience group.

3 Plan the Training Delivery

The Purpose

Identify all feasible delivery channels for security training within your organization.

Build a vendor evaluation tool and shortlist or harvest materials for in-house content creation.

Key Benefits Achieved

List of all potential delivery mechanisms for security awareness and training.

Built a vendor evaluation tool and discussed a vendor shortlist.

Harvested a collection of free online materials for in-house training development.

Activities

3.1 Discuss potential delivery mechanisms for training, including the purchase and use of a vendor.

3.2 If selecting a vendor, review vendor selection criteria and discuss potential vendor options.

3.3 If creating content in-house, review and select available resources on the web.

Outputs

List of available delivery mechanisms for training.

Vendor assessment tool and shortlist.

Customized security training presentations.

4 Create a Training Schedule for Content Deployment

The Purpose

Create a plan for deploying a pilot program to gather valuable feedback.

Create an ongoing training schedule.

Define the end users’ responsibilities towards security within the organization.

Key Benefits Achieved

Created a plan to deploy a pilot program.

Created a schedule for training deployment.

Defined role of end users in helping protect the organization against security threats.

Activities

4.1 Build training modules.

4.2 Create an ongoing training schedule.

4.3 Define and document your end users’ responsibilities towards their security.

Outputs

Documented modular structure to training content.

Training schedule.

Security job description template.

End-user training policy.

Rationalize Your Collaboration Tools

  • Buy Link or Shortcode: {j2store}51|cart{/j2store}
  • member rating overall impact: 7.3/10 Overall Impact
  • member rating average dollars saved: 10 Average Days Saved
  • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
  • Parent Category Name: End-User Computing Applications
  • Parent Category Link: /end-user-computing-applications
  • Organizations collaboration toolsets are increasingly disordered and overburdened. Not only do organizations waste money by purchasing tools that overlap with their current toolset, but also employees’ productivity is destroyed by having to spend time switching between multiple tools.
  • Shadow IT is easier than ever. Without suitable onboarding and agreed-upon practices, employees will seek out their own solutions for collaboration. No transparency of what tools are being used means that information shared through shadow IT cannot be coordinated, monitored, or regulated effectively.

Our Advice

Critical Insight

  • Best-of-breed approaches create more confusion than productivity. Collaboration toolsets should be as streamlined as possible.
  • Employee-led initiatives to implement new toolsets are more successful. Focus on what is a suitable fit for employees’ needs.
  • Strategizing toolsets enhances security. File transfers and communication through unmonitored, unapproved tools increases phishing and hacking risks.

Impact and Result

  • Categorize your current collaboration toolset, identifying genuine overlaps and gaps in your collaboration capabilities.
  • Work through our best-practice recommendations to decide which redundant overlapping tools should be phased out.
  • Build business requirements to fill toolset gaps and create an adoption plan for onboarding new tools.
  • Create a collaboration strategy that documents collaboration capabilities, rationalizes them, and states which capability to use when.

Rationalize Your Collaboration Tools Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out how to create a collaboration strategy that will improve employee efficiency and save the organization time and money.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Evaluate current toolset

Identify and categorize current collaboration toolset usage to recognize unnecessary overlaps and legitimate gaps.

  • Rationalize Your Collaboration Tools – Phase 1: Evaluate Current Toolset
  • Identifying and Categorizing Shadow Collaboration Tools Survey
  • Overlaps and Gaps in Current Collaboration Toolset Template

2. Strategize toolset overlaps

Evaluate overlaps to determine which redundant tools should be phased out and explore best practices for how to do so.

  • Rationalize Your Collaboration Tools – Phase 2: Strategize Toolset Overlaps
  • Phase-Out Plan Gantt Chart Template
  • Phase-Out Plan Marketing Materials

3. Fill toolset gaps

Fill your collaboration toolset gaps with best-fit tools, build business requirements for those tools, and create an adoption plan for onboarding.

  • Rationalize Your Collaboration Tools – Phase 3: Fill Toolset Gaps
  • Adoption Plan Gantt Chart Template
  • Adoption Plan Marketing Materials
  • Collaboration Tools Business Requirements Document Template
  • Collaboration Platform Evaluation Tool
[infographic]

Workshop: Rationalize Your Collaboration Tools

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Categorize the Toolset

The Purpose

Create a collaboration vision.

Acknowledge the current state of the collaboration toolset.

Key Benefits Achieved

A clear framework to structure the collaboration strategy

Activities

1.1 Set the vision for the Collaboration Strategy.

1.2 Identify your collaboration tools with use cases.

1.3 Learn what collaboration tools are used and why, including shadow IT.

1.4 Begin categorizing the toolset.

Outputs

Beginnings of the Collaboration Strategy

At least five archetypical use cases, detailing the collaboration capabilities required for these cases

Use cases updated with shadow IT currently used within the organization

Overlaps and Gaps in Current Capabilities Toolset Template

2 Strategize Overlaps

The Purpose

Identify redundant overlapping tools and develop a phase-out plan.

Key Benefits Achieved

Communication and phase-out plans for redundant tools, streamlining the collaboration toolset.

Activities

2.1 Identify legitimate overlaps and gaps.

2.2 Explore business and user strategies for identifying redundant tools.

2.3 Create a Gantt chart and communication plan and outline post-phase-out strategies.

Outputs

Overlaps and Gaps in Current Capabilities Toolset Template

A shortlist of redundant overlapping tools to be phased out

Phase-out plan

3 Build Business Requirements

The Purpose

Gather business requirements for finding best-fit tools to fill toolset gaps.

Key Benefits Achieved

A business requirements document

Activities

3.1 Use SoftwareReviews and the Collaboration Platform Evaluation Tool to shortlist best-fit collaboration tool.

3.2 Build SMART objectives and goals cascade.

3.3 Walk through the Collaboration Tools Business Requirements Document Template.

Outputs

A shortlist of collaboration tools

A list of SMART goals and a goals cascade

Completed Business Requirements Document

4 Create an Adoption Plan

The Purpose

Create an adoption plan for successfully onboarding new collaboration tools.

Key Benefits Achieved

An adoption plan

Activities

4.1 Fill out the Adoption Plan Gantt Chart Template.

4.2 Create the communication plan.

4.3 Explore best practices to socialize the new tools.

Outputs

Completed Gantt chart

Adoption plan marketing materials

Long-term strategy for engaging employees with onboarded tools

IT Talent Trends 2022

  • Buy Link or Shortcode: {j2store}541|cart{/j2store}
  • member rating overall impact: 8.0/10 Overall Impact
  • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
  • member rating average days saved: Read what our members are saying
  • Parent Category Name: People & Leadership
  • Parent Category Link: /people-and-leadership

Business and IT leaders aiming to build and keep successful teams in 2022 must:

  • Optimize IT in the face of a competitive labor market.
  • Build or maintain a culture of diversity, equity, and inclusion.
  • Manage the monumental shift to the new normal of remote work.
  • Weather the Great Resignation and come out on top.
  • Correctly assess development areas for their teams.
  • Justify investing in IT talent.

Our Advice

Critical Insight

  • If 2021 was about beginning to act on employee needs, 2022 will be about strategically examining each trend to ensure that the organization's promises to take action are more than lip service.
  • Employees have always been able to see through disingenuous attempts to engage them, but in 2022 the stakes are higher due to increased talent mobility.

Impact and Result

This report includes:

  • A concise, executive-ready trend report.
  • Data and insights from IT organizations from around the world.
  • Steps to take for each of the trends depending on your current maturity level.
  • Examples and case studies.
  • Links to in-depth Info-Tech research and tools.

IT Talent Trends 2022 Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. IT Talent Trends Report for 2022 – A report to help you incorporate new ways of working into your business to build and keep the best team.

Discover Info-Tech’s 2022 talent trends for IT leaders, which will provide insight into taking a strategic approach to navigate the post-pandemic IT talent landscape.

  • IT Talent Trends Report for 2022

Infographic

Further reading

IT Talent Trends 2022

The last two years have been a great experiment … but it’s not over yet.

Incorporate new ways of working into your business to build and keep the best team.

Over the past two years, organizations have ventured into unprecedented ways of working and supporting their employees, as they tried to maintain productivity through the pandemic. This experiment has made lasting changes to both business models and employee expectations, and these effects will continue to be seen long after we return to a “new normal.”

While the pandemic forced us to work differently for the past two years, looking forward, successful organizations will incorporate new ways of working into their business models – beyond simply having a remote work policy.

How we work, source roles, and develop talent continue to evolve as we navigate a different world with employees being more vocal in their desires, and leaders continue to play a key role.

The IT talent market will never be the same, and organizations must reevaluate their employee experience from the bottom up to successfully weather the shift to the new normal.

IT Talent Trends 2022

Strategic Recruiting Finds Good Talent

Finding talent in a strained talent market requires a marketing approach. Posting a job description isn’t enough.

The (Not So) Great Resignation

IT is faring better than other functions; however, specific industries need to pay attention.

Grow Your DEI Practices Into Meaningful Actions

Good intentions are not enough.

Remote Work Is Here – Can Your Culture Adapt?

The Great Experiment is over. Are leaders equipped to capitalize on its promises?

Management Skills Drive Success in a Remote World

Despite the need for remote team management training, it is still not happening.

The pandemic has clarified employees’ needs and amplified their voices

If 2021 was about beginning to act on employee needs, 2022 will be about strategically examining each trend to ensure that the actions taken by the organization are more than lip service.

Employees have always been able to see through disingenuous attempts to engage them, but in 2022 the stakes are higher due to increased talent mobility.

Trends that were just starting to come into focus last year have established themselves as critical determinants of the employee experience in 2022.

2021

DEI: A Top Talent ObjectiveRemote Work Is Here to StayUncertainty Unlocks PerformanceA Shift in Skills PrioritiesA Greater Emphasis on Wellbeing
Arrow pointing down.Joiner pointing down.Joiner pointing down.

2022

Strategic Recruiting Finds Good Talent

Finding talent in a strained talent market requires a marketing approach. Posting a job description isn’t enough.

The (Not So) Great Resignation

IT is faring better than other functions; however, specific industries need to pay attention.

Grow Your DEI Practices Into Meaningful Actions

Good intentions are not enough.

Remote Work Is Here – Can Your Culture Adapt?

The Great Experiment is over. Are leaders equipped to capitalize on its promises?

Management Skills Drive Success in a Remote World

Despite the need for remote team management training, it is still not happening.

What employees are looking for is changing

Superficial elements of traditional office culture were stripped away by the quick shift to a remote environment, giving employees the opportunity to reevaluate what truly matters to them in a job.

The biggest change from 2019 (pre-pandemic) to today is increases in the importance of culture, flexible/remote work, and work-life balance.

Organizations that fail to keep up with this shift in priorities will see the greatest difficulty in hiring and retaining staff.

As an employee, which of the following would be important to you when considering a potential employer?

2019 2021
Flexible Work Pie graph representing response percentages from employees regarding importance of these factors. Flexible Work: 2019, Very 46%, Somewhat 49%, Not at All 5%.
n=275
Arrow pointing right. Pie graph representing response percentages from employees regarding importance of these factors. Flexible Work: 2021, Very 76%, Somewhat 21%, Not at All 2%.
n=206
Work-Life Balance Pie graph representing response percentages from employees regarding importance of these factors. Work-Life Balance: 2019, Very 67%, Somewhat 30%, Not at All 3%.
n=277
Arrow pointing right. Pie graph representing response percentages from employees regarding importance of these factors. Work-Life Balance: 2021, Very 80%, Somewhat 18%, Not at All 1%.
n=206
Culture Pie graph representing response percentages from employees regarding importance of these factors. Culture: 2019, Very 68%, Somewhat 31%, Not at All 1%.
n=277
Arrow pointing right. Pie graph representing response percentages from employees regarding importance of these factors. Culture: 2021, Very 81%, Somewhat 19%, Not at All 0%.
n=206
Source: Info-Tech Talent Trends Survey data collected in 2019 and 2021 Purple Very Important
Blue Somewhat Important
Green Not at All Important

IT’s top talent priorities in 2022

IT’s top Talent priorities reflect a post-pandemic focus on optimizing talent to fulfill strategic objectives: Top challenges for IT departments, by average rank, with 1 being the top priority.

Important

In the 2022 IT Talent Trends Survey, IT departments’ top priorities continue to be learning and innovation in support of organizational objectives. —› Enabling leaning and development within IT
—› Enabling departmental innovation
5.01
5.54
With employees being clearer and more vocal about their needs than ever before, employee experience has risen to the forefront of IT’s concern as a key enabler of strategic objectives. —› Providing a great employee experience for IT 5.66
Supporting departmental change 6.01
With organizations finally on the way to financial stability post pandemic, recruiting is a major focus. —› Recruiting (e.g. quickly filling vacant roles in IT with quality external talent) 6.18
However, IT’s key efforts are threatened by critical omissions: Fostering a positive employee relations climate in the department 6.32
Despite a focus on learning and development, leadership skills are not yet a top focus. —› Developing the organization's IT leaders 6.33
Rapidly moving internal IT employees to staff strategic priorities 6.96
Facilitating data-driven people decisions within IT 7.12
Controlling departmental labor costs and maximizing the value of the labor spend 7.13
Despite the need to provide a great employee experience, the focus on diversity, equity, and inclusion is low. —› Fostering an environment of diversity, equity, and inclusion in the department 7.31
Despite prioritizing recruiting, IT departments see candidate experience as a last priority, either not focusing on it or relegating it to HR. —› Providing a great candidate experience for IT candidates 8.43
(n=227)

IT Talent Trends 2022

Look beneath the surface of the trends to navigate them successfully

Above Ground
Focusing on what you see 'Above the line" won't solve the problem.

Talent isn't a checklist.

Strategic Recruiting Finds Good Talent

Finding talent in a strained talent market requires a marketing approach. Posting a job description isn't enough.
  • The number of job openings increased to 11.4 million on the last business day of October, up from 10.6 million in September (US Bureau of Labor Statistics, Dec. 2021)

The (Not So) Great Resignation

IT is faring better than other functions; however, specific industries need to pay attention.
  • In September, in the US, 4.4 million people left their jobs. That number dropped to 4.2 million in October. (US Labor Stats, Dec. 2021)
  • 30% of workers will likely switch jobs if they have to return to the office full time. (McKinsey, Dec. 2021)

Grow Your DEI Practices Into Meaningful Actions

Good intentions are not enough.
  • 95% of organizations are focusing on DEI. (2022 HR Trends Report)
  • 48% of IT departments have delivered training on DEI over the past year.

Remote Work is Here. Can Your Culture Adapt?

The Great Experiment is over. Are you equipped to capitalize on its promises?
  • 85% of organizations saw the same or higher productivity during the pandemic.
  • 91% of organizations are continuing remote work.

Management Skills Drive Success in a Remote World

Despite the need for remote team management training, it is still not happening.
  • 72% of IT departments report high effectiveness at managing remote staff.
  • Learning and development is IT's top priority.
Cross-section of the Earth and various plants with their root systems, highlighting the world above ground and below.
Beneath the Surface
For each trend, a strategic approach to get "under the line" will help form your response.

Talent needs a holistic approach, as under the line everything is connected. If you are experiencing challenges in one area, analyzing data (e.g. engagement, exit surveys, effectiveness of DEI program and leader training) can help drive overall experience.

  • 100% of job seekers cite culture as somewhat to very important.
  • Only 40% of employers advertise culture in job postings.
  • 70% of IT departments state voluntary turnover is less than 10%
  • Top reasons for resignation are salary, development, and opportunity for innovative work.
  • Resignation rates were higher in fields that had experienced extreme stress due to the pandemic (HBR, Dec. 2021)
  • Senior leadership is overestimating their own commitment to DEI.
  • Most IT departments are not driving their own DEI initiatives.
  • Without effectively measuring DEI practices, organizations will see 1.6x more turnover. (2022 HR Trends Report)
  • Senior leadership is not open to remote work in 23% of organizations.
  • Without leadership support, employees will not buy into remote work initiatives.
  • A remote work policy will not bring organizational benefits without employee buy-in.
  • 75% of senior managers believe remote team management is highly effective, but only 60% of frontline staff agree.
  • Training focuses on technical skills, to the exclusion of soft skills, including management and leadership.
Solutions
Recommendations depending on your department's maturity level.
Attention is required for candidate experience underpinned by a realistic employee value proposition. Gather and review existing data (e.g. early retirements, demographics) to understand your turnover rate. Use employee engagement tools to gauge employee sentiment among impacted groups and build out an engagement strategy to meet those needs. Conduct a cultural assessment to reveal hidden biases that may stand in the way of remote work efficacy. Provide management training on performance management and development coaching.

Logo for Info-Tech.Logo for ITRG.

This report is based on organizations just like yours

Survey timeline = October 2021
Total respondents = 245 IT professionals

Geospatial map of survey responses shaded in accordance with the percentages listed below.
01 United States 45% 08 Middle East 2%
02 Canada 23% 09 Other (Asia) 2%
03 Africa 8% 10 Germany 1%
04 Great Britain 6% 11 India 1%
05 Latin America, South America or Caribbean 4% 12 Netherlands 1%
06 Other (Europe) 4% 13 New Zealand 1%
07 Australia 2% (N-245)

A bar chart titled 'Please estimate your organization's revenue in US$ (Use operating budget if you are a public-sector organization)' measuring survey responses. '$0 - less than 1M, 7%', '$1M - less than 5M, 4%', '$5M - less than 10M, 4%', '$10M - less than 25M, 6%', '$25M - less than 50M, 5%', '$50M - less than 100M, 13%', '$100M - less than 500M, 24%', '$500M - less than 1B, 9%', '1B - less than 5B, 22%', '$5B+, 8%'. (n=191)

This report is based on organizations just like yours

Industry

Bar chart measuring percentage of survey respondents by industry. The largest percentages are from 'Government', 'Manufacturing', 'Media, information, Telecom & Technology', and 'Financial Services (including banking & insurance)'.

Info-Tech IT Maturity Model

Stacked bar chart measuring percentage of survey respondents by IT maturity level. Innovator is 7.11%, Business Partner is 16.44%, Trusted Operator is 24.89%, Firefighter is 39.11%, and Unstable is 12.44%.
(n=225)

Innovator – Transforms the Business
Reliable Technology Innovation

Business Partner – Expands the Business
Effective Execution Projects, Strategic Use of Analytics and Customer Technology

Trusted Operator – Optimizes Business
Effective Fulfillment of Work Orders, Functional Business Applications, and Reliable Data Quality

Firefighter – Supports the Business
Reliable Infrastructure and IT Service Desk

Unstable – Struggles to Support
Inability to Provide Reliable Business Services

This report is based on people just like you

Which of the following ethnicities (ethnicity refers to a group with a shared or common identity, culture, and/or language) do you identify with? Select all that apply. What gender do you identify most with?
A pie chart measuring percentage of survey respondents by ethnicity. Answers are 'White (e.g. European, North America), 59%', 'Asian (e.g. Japan, India, Philippines, Uzbekistan), 12%', 'Black (e.g. Africa, Caribbean, North America), 12%', 'Latin/Hispanic (e.g. Cuba, Guatemala, Spain, Brazil), 7%', 'Middle Eastern (e.g. Lebanon, Libya, Iran), 4%', 'Indigenous (e.g. First Nations, Inuit, Metis, Maori), 3%', 'Indo-Caribbean (e.g. Trinidad & Tobago, Guyana, St. Vincent), 3%'.
(N=245)
A pie chart measuring percentage of survey respondents by gender. Answers are 'Male, 67%', 'Female, 24%', 'Prefer not to answer, 5%', 'No Specification, 4%', 'Intersex, 0%'.
(n=228)

This report is based on people just like you

What is your sub-department of IT? Which title best describes your position?
Bar chart measuring percentage of survey respondents by sub-department. The top three answers are 'Senior Leadership', 'Infrastructure and Operations', and 'Application Development'.
(n=227)
Bar chart measuring percentage of survey respondents by title. The top four answers are 'Director-level, 29%', 'Manager, 22%', 'C-Level Officer, 18%', and 'VP-level, 11%.'
(N=245)

IT Talent Trends 2022

Each trend is introduced with key questions you can ask yourself to see how your department fares in that area.

The report is based on statistics from a survey of 245 of your peers.

It includes recommendations of next steps and a key metric to track your success.

It lists Info-Tech resources that you, as a member, can leverage to begin your journey to improve talent management in your department.

Strategic Recruiting Finds Good Talent

Finding talent in a strained talent market requires a marketing approach. Posting a job description isn’t enough.

The (Not So) Great Resignation

IT is faring better than other functions; however, specific industries need to pay attention.

Grow Your DEI Practices Into Meaningful Actions

Good intentions are not enough.

Remote Work Is Here – Can Your Culture Adapt?

The Great Experiment is over. Are leaders equipped to capitalize on its promises?

Management Skills Drive Success in a Remote World

Despite the need for remote team management training, it is still not happening.

The report is based on data gathered from Info-Tech Research Group’s 2022 IT Talent Trends Survey. The data was gathered in September and October of 2021.

Strategic Recruiting Finds Good Talent

Trend 1 | The Battle to Find and Keep Talent

As the economy has stabilized, more jobs have become available, creating a job seeker’s market. This is a clear sign of confidence in the economy, however fragile, as new waves of the pandemic continue.

Info-Tech Point of View

Recruiting tactics are an outcome of a well-defined candidate experience and employee value proposition.

Introduction

Cross-section of a plant and its roots, above and below ground. During our interviews, members that focused on sharing their culture with a strong employee value proposition were more likely to be successful in hiring their first-choice candidates.
Questions to ask yourself
  • Do you have a well-articulated employee value proposition?
  • Are you using your job postings to market your company culture?
  • Have you explored multiple channels for posting jobs to increase your talent pool of candidates?

47% of respondents are hiring external talent to fill existing gaps, with 40% using external training programs to upgrade current employees. (Info-Tech IT Talent Trends 2022 Survey)

In October, the available jobs (in the USA) unexpectedly rose to 11 million, higher than the 10.4 million experts predicted. (CNN Business, 2021)

Where has all the talent gone?

IT faces multiple challenges when recruiting for specialized talent

Talent scarcity is focused in areas with specialized skill sets such as security and architecture that are dynamic and evolving faster than other skill sets.

“It depends on what field you work in,” said ADP chief economist Nela Richardson. “There were labor shortages in those fields pre-pandemic and two years forward, there is even more demand for people with those skills” (CNBC, 19 Nov. 2021).

37% of IT departments are outsourcing roles to fill internal skill shortages. (Info-Tech Talent Trends 2022 Survey)

Roles Difficult to Fill

Horizontal bar chart measuring percentage of survey responses about which roles are most difficult to fill. In order from most difficult to least they are 'Security (n=177)', 'Enterprise Architecture (n=172)', 'Senior Leadership (n=169)', 'Data & Business Intelligence (n=171)', 'Applications Development (n=177)', 'Infrastructure & Operations (n=181)', 'Business Relationship Management (n=149)', 'Project Management (n=175)', 'Vendor Management (n=133)', 'Service Desk (n=184)'.(Info-Tech Talent Trends 2022 Survey)

Case Study: Using culture to drive your talent pool

This case study is happening in real time. Please check back to learn more as Goddard continues to recruit for the position.

Recruiting at NASA

Goddard Space Center is the largest of NASA’s space centers with approximately 11,000 employees. It is currently recruiting for a senior technical role for commercial launches. The position requires consulting and working with external partners and vendors.

NASA is a highly desirable employer due to its strong culture of inclusivity, belonging, teamwork, learning, and growth. Its culture is anchored by a compelling vision, “For the betterment of Humankind,” and amplified by a strong leadership team that actively lives their mission and vision daily.

Firsthand lists NASA as #1 on the 50 most prestigious internships for 2022.

Rural location and no flexible work options add to the complexity of recruiting

The position is in a rural area of Eastern Shore Virginia with a population of approximately 60,000 people, which translates to a small pool of candidates. Any hire from outside the area will be expected to relocate as the senior technician must be onsite to support launches twice a month. Financial relocation support is not offered and the position is a two-year assignment with the option of extension that could eventually become permanent.

Photo of Steve Thornton, Acting Division Chief, Solutions Division, Goddard Space Flight Center, NASA.

“Looking for a Talent Unicorn; a qualified, experienced candidate with both leadership skills and deep technical expertise that can grow and learn with emerging technologies.”

Steve Thornton
Acting Division Chief, Solutions Division,
Goddard Space Flight Center, NASA

Case Study: Using culture to drive your talent pool

A good brand overcomes challenges

Culture takes the lead in NASA's job postings, which attract a high number of candidates. Postings begin with a link to a short video on working at NASA, its history, and how it lives its vision. The video highlights NASA's diversity of perspectives, career development, and learning opportunities.

NASA's company brand and employer brand are tightly intertwined, providing a consistent view of the organization.

The employer vision is presented in the best place to reach NASA's ideal candidate: usajobs.gov, the official website of the United States Government and the “go-to” for government job listings. NASA also extends its postings to other generic job sites as well as LinkedIn and professional associations.

Photo of Robert Leahy, Chief Information Officer, Goddard Space Flight Center, NASA.

Interview with Robert Leahy
Chief Information Officer
Goddard Space Flight Center, NASA

“Making sure we have the tools and mechanisms are two hiring challenges we are going to face in the future as how we work evolves and our work environment changes. What will we need to consider with our job announcements and the criteria for selecting employees?”

Liteshia Dennis,
Office Chief, Headquarter IT Office, Goddard Space Flight Center, NASA

The ability to attract and secure candidates requires a strategy

Despite prioritizing recruiting, IT departments see candidate experience as THE last Priority, either not focusing on it or relegating it to HR

Candidate experience is listed as one of the bottom IT challenges, but without a positive experience, securing the talent you want will be difficult.

Candidate experience starts with articulating your unique culture, benefits, and opportunities for development and innovative work as well as outlining flexible working options within an employer brand. Defining an employee value proposition is key to marketing your roles to potential employees.

81% of respondents' rate culture as very important when considering a potential employer. (Info-Tech IT Talent Trends 2022 Survey)

Tactics Used in Job Postings to Position the Organization Favorably as a Potential Employer

Horizontal bar chart measuring percentage of survey responses about tactics used in job postings. The top tactics are 'Culture, 40%', 'Benefits, 40%', 'Opportunity for Innovative Work, 30%', and 'Professional Development, 30%'.(Info-Tech IT Talent Trends 2022 Survey)

Case Study: Increasing talent pool at Info-Tech Research Group

Strong sales leads to growth in operation capacity

Info-Tech Research Group is an IT research & advisory firm helping IT leaders make strategic, timely, and well-informed decisions. Our actionable tools and analyst guidance ensure IT organizations achieve measurable results.

The business has grown rapidly over the last couple of years, creating a need to recruit additional talent who were highly skilled in technical applications and approaches.

In response, approval was given to expand headcount within Research for fiscal year 2022 and to establish a plan for continual expansion as revenue continues to grow.

Looking for deep technical expertise with a passion for helping our members

Hiring for our research department requires talent who are typically subject matter experts within their own respective IT domains and interested in and capable of developing research and advising clients through calls and workshops.

This combination of skills, experience, and interest can be challenging to find, especially in an IT labor market that is more competitive than ever.

Photo of Tracy-Lynn Reid, Practice Lead.

Interview with Practice Lead Tracy-Lynn Reid

Focus on Candidate Experience increases successful hire rate

The senior leadership team established a project to focus on recruiting for net-new and open roles. A dedicated resource was assigned and used guidance from our research to enhance our hiring process to reduce time to hire and expand our candidate pool. Senior leaders stayed actively involved to provide feedback.

The hiring process was improved by including panel interviews with interview protocols and a rubric to evaluate all candidates equitably.

The initial screening conversation now includes a discussion on benefits, including remote and flexible work offerings, learning and development budget, support for post-secondary education, and our Buy-a-Book program.

As a result, about 70% of the approved net-new headcount was hired within 12 weeks, with recruitment ongoing.

Formalize Your Digital Business Strategy

  • Buy Link or Shortcode: {j2store}101|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Innovation
  • Parent Category Link: /innovation

Your organization already has a digital strategy, but there is a lack of understanding of what digital means across the enterprise. Digital investments have been made in the past but failed to yield or demonstrate business value. Given the pace of change, the current digital strategy is outdated, and new digital opportunities need to be identified to inform the technology innovation roadmap.

Our Advice

Critical Insight

Turn your digital strategy into a compelling change story that will create a unified vision of how you want to transform your business.

Impact and Result

  • Identify new digitally enabled growth opportunities.
  • Understand which digital ideas yield the biggest return and the value they generate for the organization.
  • Understand the impact of opportunities on your business capabilities.
  • Map a customer journey to identify opportunities to transform stakeholder experiences.

Formalize Your Digital Business Strategy Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Formalize Your Digital Business Strategy – a document that walks you through a series of activities to help brainstorm and ideate on possible new digital opportunities as an input into building your business case for a new IT innovation roadmap.

Knowing which digital opportunities create the greatest business value requires a structured approach to ideate, prioritize, and understand the value they create for the business to help inform the creation of your business case for investment approval.

  • Formalize Your Digital Strategy Storyboard

Infographic

Further reading

Formalize Your Digital Business Strategy

Stay relevant in an evolving digital economy

Executive Summary

Your Challenge

Common Obstacles

Solution

  • Since 2020, the environment has been volatile, leading many CIOs to rethink their priorities and strategies.
  • The organization already has a digital strategy, but there is a lack of understanding of what digital means across the enterprise.
  • Digital investments have been made but fail to demonstrate the business value.
  • The current digital strategy was developed in isolation and failed to garner consensus on a common understanding of the digital vision from across the business.
  • CIOs struggle to understand what existing capabilities need to transform or what new digital capabilities are needed to support the digital ambitions.
  • The existing Digital Strategy is synonymous with the IT Strategy.
  • Identify new digitally enabled growth opportunities.
  • Understand which digital ideas yield the biggest return and the value they generate for the organization.
  • Understand the impact of opportunities on your business capabilities.
  • Map the customer journey to identify opportunities to transform the stakeholder experience.

Info-Tech Insight

Turn your existing digital strategy into a compelling change story that will create a unified vision of how you want to transform your business.

Info-Tech’s Digital Transformation Journey

Your journey: An IT roadmap for your Digital Business Strategy

The image contains a screenshot of Info-Tech's Digital Transformation Journey.

By now, you understand your current business context and capabilities

The image contains a screenshot of the IT roadmap for your Digital Business Strategy.

By this point you have leveraged industry roundtables to better understand the art of the possible, exploring global trends, shifts in market forces, customer needs, emerging technologies, and economic forecasts to establish your business objectives and innovation goals.

Now you need to formalize digital business strategy.

Phase 1: Industry Trends Report

The image contains a screenshot of phase 1 industry trends report.

Phase 2: Digital Maturity Assessment

The image contains a screenshot of phase 2 digital maturity assessment.

Phase 3: Zero-In on Business Objectives

The image contains a screenshot of phase 3 Zero-in on business objectives.

Business and innovation goals are established through stakeholder interviews and a heatmap of your current capabilities for transformation.

Since 2020, market dynamics have forced organizations to reassess their strategies

The unprecedented pace of global disruptions has become both a curse and a silver lining for many CIOs. The ability to maximize the value of digital will be vital to remain relevant in the new digital economy.

The image contains a screenshot of an image that demonstrates how market dynamics force organizations to reassess their strategies.

Formalize your digital strategy to address industry trends and market dynamics

The goal of this phase is to ensure the scope of the current digital strategy reflects the right opportunities to allocate capital to resources, assets, and capabilities to drive strategic growth and operational efficiency.

There are three key activities outlined in this deck that that can be undertaken by industry members to help evolve their current digital business strategy.

  1. Identify New Digitally Enabled Growth Opportunities
    • Host an ideation session to identify new leapfrog ideas
    • Discuss assumptions, value drivers, and risks
    • Translate ideas into opportunities and consolidate
  2. Evaluate New Digital Opportunities and Business Capabilities
    • Build an opportunity profile
    • Identify business capabilities for transformation
  3. Transform Stakeholder Journeys
    • Understand the impact of opportunities on value-chains
    • Identify stakeholder personas
    • Build a stakeholder journey map
    • Compile your new list of digital opportunities
The image contains a screenshot of Formalize your digital business strategy.

Info-Tech’s approach

  1. Identify New Digital Opportunities
    • Conduct an ideation session
    • Identify leapfrog ideas from trends
    • Evaluate each leapfrog idea to define opportunity
  2. Evaluate Opportunities and Business Capabilities
    • Build Opportunity Profile
    • Understand the impact of opportunities on business capabilities
  3. Transform Stakeholder Journeys
    • Analyze value chains
    • Map your Stakeholder Journey
    • Breakdown opportunities into initiatives

Overview of Key Activities

Formalize your digital business strategy

Methodology

Members Engaged

  • CIO
  • Business Executives

Info-Tech

  • Industry Analyst
  • Executive Advisor

Phase 1: New Digital Opportunities

Phase 2: Evaluate Opportunities and Business Capabilities

Phase 3: Transform Stakeholder Journeys

Content Leveraged

  • Digital Business Strategy blueprint
  • Client’s Business Architecture
  1. Hold an ideation session with business executives.
    • Review relevant reports on industry trends, market shifts, and emerging technologies.
    • Establish guiding principles for digital transformation.
    • Leverage a trend-analysis approach to determine the most impactful and relevant trends.
    • From tends, elicit leapfrog ideas for growth opportunities.
    • For each idea, engage in discussion on assumptions, value drivers, benefits, and risks.
  1. Create opportunity profiles.
    • Evaluate each opportunity to determine if it is important to turn into initiatives
  2. Evaluate the impact of opportunities on your business capabilities.
    • Leverage a value-chain analysis to assess the impact of the opportunity across value chains in order to understand the impact across your business capabilities.
  1. Map stakeholder journey:
    • Identify stakeholder personas
    • Identify one journey scenario
    • Map stakeholder journey
    • Consolidate opportunities
  2. Breakdown opportunities into actional initiatives
    • Brainstorm priority initiatives against opportunities.

Deliverable:

Client’s Digital Business Strategy

Phase 1: Deliverable

  1. Compiled list of leapfrog ideas for new growth opportunities

Phase 2: Deliverables

  1. Opportunity Profile
  2. Business Capability Impact

Phase 3: Deliverables

  1. Opportunity Profile
  2. Business Capability Impact

Glossary of Terms

LEAPFROG IDEAS

The concept was originally developed in the area of industrial organizations and economic growth. Leapfrogging is the notion that organizations can identify opportunities to skip one or several stages ahead of their competitors.

DIGITAL OPPORTUNITIES

Opening of new possibilities to transform or change your business model and create operational efficiencies and customer experiences through the adoption of digital platforms, solutions, and capabilities.

INITIATIVES

Breakdown of opportunities into actionable initiatives that creates value for organizations through new or changes to business models, operational efficiencies, and customer experiences.

  1. LEAPFROG IDEAS:
    • Precision medicine
  2. DIGITAL OPPORTUNITY:
    • Machine Learning to sniff out pre-cancer cells
  3. INITIATIVES:
    1. Define genomic analytics capabilities and recruit
    2. Data quality and cleansing review
    3. Implement Machine Learning SW

Identify Digitally Enabled Opportunities

Host an ideation session to turn trends into growth opportunities with new leapfrog ideas.

Phase 1Phase 2Phase 3

Identify New Digitally Enabled Opportunities

Evaluate Opportunities and Business Capabilities

Transform Stakeholder Journeys

Phase 1

Host an Ideation Session to Identify New Digital Opportunities

1.1

IDENTIFY AND ASSEMBLE YOUR KEY STAKEHOLDERS

Build support and eliminate blind spots

It is important to make sure the right stakeholders participate in this working group. Designing a digital strategy will require debate, insights, and business decisions from a broad perspective across the enterprise. The focus is on the value to be generated from digital.

Consider:

  • Who are the decision makers and key influencers?
  • Who will impact the business?
  • Who has a vested interest in the success or failure of the practice? Who has the skills and competencies necessary to help you be successful?

Avoid:

  • Don’t focus on the organizational structure and hierarchy. Often stakeholder groups don’t fit the traditional structure.
  • Don’t ignore subject matter experts on either the business or IT side. You will need to consider both.
1.2

ESTABLISH GUIDING PRINCIPLES

Define the guardrails to focus your ideas

All ideas are great until you need one that works. Establish guiding principles that will help you establish the perimeters for turning big ideas into opportunities.

Consider:

  • Focus on the breadth and alignment to support business objectives
  • This should help narrow conceptual ideas into actionable initiatives

Avoid:

  • Don’t recreate the corporate guiding principles
  • Focus on what will help define strategic growth opportunities and operational efficiencies
1.3

LEVERAGE STRATEGIC FORESIGHT TO IDENTIFY LEAPFROG IDEAS

Create space to elicit “big ideas”

Leverage industry roundtables and trend reports imagining how digital solutions can help drive strategic growth and operational efficiency. Brainstorm new opportunities and discuss their viability to create value and better experiences for your stakeholders.

Consider:

  • Accelerate this exercise by leveraging stakeholder insights from:
    • Your corporate strategy and financial plan
    • Outputs from stakeholder interviews
    • Market research

Avoid:

  • Don’t simply go with the existing documented strategic objectives for the business. Ensure they are up to date and interview the decision makers to validate their perspectives if needed.

Host an Ideation Session

Identify digitally enabled opportunities

Industry Roundtables and Trend Reports

Industry Trends Report

The image contains a screenshot of phase 1 industry trends report.

Business Documents

The image contains a screenshot of Business Documents.

Digital Maturity Assessment

The image contains a screenshot of phase 2 digital maturity assessment.

Activity: 2-4 hours

Members Engaged

  • CIO
  • Business Executives

Info-Tech

  • Industry Analyst
  • Executive Advisor

Hold a visioning session with key business executives (e.g., CIO, CEO, CFO, CCO, and COO) and others as needed. Here is a proposed agenda of activities for the ideation session:

  1. Leverage current trend reports and relevant emerging trend reports, market analysis, and customer research to envision future possibilities.
  2. Establish guiding principles for defining your digital strategy and scope.
  3. Leverage insights from trend reports and market analysis to generate leapfrog ideas that can be turned into opportunities.
  4. For each leapfrog idea, engage in a discussion on assumptions, value drivers, benefits, and risks.

Content Leveraged

  • Digital Trends Report
  • Industry roundtables and trend reports
  • Digital Maturity Assessment
  • Digital Business Strategy v1.0

Deliverable:

  1. Guiding principles
  2. Strategic growth opportunities

1.1 Executive Stakeholder Engagement

Assemble Executive Stakeholders

Set yourself up for success with these three steps.

CIOs tasked with designing digital strategies must add value to the business. Given the goal of digital is to transform the business, CIOs will need to ensure they have both the mandate and support from the business executives.

Designing the digital strategy is more than just writing up a document. It is an integrated set of business decisions to create a competitive advantage and financial returns. Establishing a forum for debates, decisions, and dialogue will increase the likelihood of success and support during execution.

1. Confirm your role

2. Identify Stakeholders

3. Diverse Perspective

The digital strategy aims to transform the business. Given the scope, validate your role and mandate to lead this work. Identify a business executive to co-sponsor.

Identify key decision-makers and influencers who can help make rapid decisions as well as garner support across the enterprise.

Don’t be afraid to include contrarians or naysayers. They will help reduce any blind spots but can also become the greatest allies through participation.

1.2 Guiding Principles

Set the Guiding Principles

Guiding principles help define the parameters of your digital strategy. They act as priori decisions that establish the guardrails to limit the scope of opportunities from the perspective of people, assets, capabilities, and budgets that are aligned with the business objectives. Consider these components when brainstorming guiding principles:

Consider these three components when brainstorming

Breadth

Digital strategy should span people, culture, organizational structure, governance, capabilities, assets, and technology. The guiding principle should cover a 3600 view across the entire organization.

Planning Horizon

Timing should anchor stakeholders to look to the long-term with an eye on the foreseeable future i.e., business value realization in one, two, and three years.

Depth

Needs to encompass more than the enterprise view of lofty opportunities but establish boundaries to help define actionable initiatives (i.e., individual projects).

1.2 Guiding Principles

Examples of Guiding Principles

IT Principle NameIT Principle Statement
1.Enterprise value focusWe aim to provide maximum long-term benefits to the enterprise as a whole while optimizing total costs of ownership and risks.
2.Fit for purposeWe maintain capability levels and create solutions that are fit for purpose without over engineering them.
3.SimplicityWe choose the simplest solutions and aim to reduce operational complexity of the enterprise.
4.Reuse > buy > buildWe maximize reuse of existing assets. If we can’t reuse, we procure externally. As a last resort, we build custom solutions.
5.Managed dataWe handle data creation and modification and use it enterprise-wide in compliance with our data governance policy.
6.Controlled technical diversityWe control the variety of what technology platforms we use.
7.Managed securityWe manage security enterprise-wide in compliance with our security governance policy.
8.Compliance to laws and regulationsWe operate in compliance with all applicable laws and regulations.
9.InnovationWe seek innovative ways to use technology for business advantage.
10.Customer centricityWe deliver best experiences to our customers with our services and products.
11.Digital by default We always put digital solutions at the core of our plans for all viable solutions across the organization.
12.Customer-centricity by designWe design new products and services with the goal to drive greater engagement and experiences with our customers.

1.3 Trend-Analysis

Leverage strategic foresight to identify growth opportunities

What is Strategic Foresight?

In times of increasing uncertainty, rapid change, market volatility, and complexity, the development of strategies can be difficult. Strategic foresight offers a solution.
Strategic foresight refers to an approach that uses a range of methodologies, such as scanning the horizon for emerging changes and signals, analyzing megatrends, and developing multiple scenarios to identify opportunities (source: OECD, 2022). However, it cannot predict the future and is distinct from:

  • Forecasting tools
  • Strategic planning
  • Scenario planning (only)
  • Predictive analyses of the future

Why is Strategic Foresight useful?

  • Reduce uncertainties about the future
  • Better anticipate changes
  • Future-proof to stress test proposed strategies
  • Explore innovation to reveal new products, services, and approaches

Explore Info-Tech’s Strategic Foresight Process Tool

“When situations lack analogies to the past, it’s hard to envision the future.”

- J. Peter Scoblic, HBR, 2020

1.3 Trend-Analysis

Leverage industry roundtables and trend reports to understand the art of the possible

Uncover important business and industry trends that can inform possibilities for technology innovation.

Explore trends in areas such as:

  • Machine Learning
  • Citizen Dev 2.0
  • Venture Architecture
  • Autonomous Organizations
  • Self-Sovereign Cloud
  • Digital Sustainability

Market research is critical in identifying factors external to your organization and identifying technology innovation that will provide a competitive edge. It’s important to evaluate the impact each trend or opportunity will have in your organization and market.

Visit Info-Tech’s Trends & Priorities Research Center

Visit Info-Tech’s Industry Coverage Research to get started.

The image contains screenshots from Info-Tech blueprints.

Images are from Info-Tech’s Rethinking Higher Education Report and 2023 Tech Trends Report

1.3 Trend-Analysis

Scan the Horizon

Understand how the environment is evolving in your industry

Scan the horizon to detect early signs of future changes or threats.

Horizon scanning involves scanning, analyzing, and communicating changes in an organization’s environment to prepare for potential threats and opportunities. Much of what we know about the future is based around the interactions and trajectory of macro trends, trends, and drivers. These form the foundations for future intelligence.

Macro Trends

A macro trend captures a large-scale transformative trend on a global scale that could impact your addressable market

Industry Trend

An industry trend captures specific use cases of the macro trend in relation to your market and industry. Consider this in terms of shifts in your market dynamics i.e., competitors, size, transaction, international trade, supply/demand, etc.

Driver(s)

A driver is an underlying force causing the trend to occur. There can be multiple causal forces, or drivers, that influence a trend, and multiple trends can be influenced by the same causal force.

Identify signals of change in the present and their potential future impacts.

1.3 Trend-Analysis

Identify macro trends

Macro trends capture a global shift that can change the market and the industry. Here are examples of macro-trends to consider when scanning the horizon for your own organization:

Talent Availability

Customer Expectations

Emerging Technologies

Regulatory System

Supply Chain Continuity

Decentralized workforce

Hybrid workforce

Diverse workforce

Skills gap

Digital workforce

Multigenerational workforce

Personalization

Digital experience

Data ownership

Transparency

Accessibility

On-demand

Mobility

AI & robotics

Virtual world

Ubiquitous connectivity

Genomics (nano, bio, smart….)

Big data

Market control

Economic shifts

Digital regulation

Consumer protection

Global green

Resource scarcity

Sustainability

Supply chain digitization

Circular supply chains

Agility

Outsource

1.3 Trend-Analysis

Determine impact and relevance of trends

Understand which trends create opportunities or risks for your organization.

Key Concepts:

Once an organization has uncovered a set of trends that are of potential importance, a judgment must be made on which of the trends should be prioritized to understand their impact on your market and ultimately, the implications for your business or organization. Consider the following criteria to help you prioritize your trends.

Impact to Industry: The degree of impact the trend will have on your industry and market to create possibilities or risks for your business. Will this trend create opportunities for the business? Or does it pose a risk that we need to mitigate?

Relevance to Organization. The relevance of the trend to your organization. Does the trend align with the mission, vision, and business objectives of your organization?

Activity: 2-4hours

In order to determine which trends will have an impact on your industry and are relevant to your organization, you need to use a gating approach to short-list those that may create opportunities to capitalize on while you need to manage the ones that pose risk.

Impact

What does this trend mean for my industry and market?

  • Degree – how broad or narrow is the impact
  • Likelihood – the reality of disrupting an industry or market
  • Timing – when do we expect disruption?

Relevance

What opportunity or risk does it pose to my business/organization?

  • Significance – depth and breadth across the enterprise
  • Duration – how long is the anticipated impact?

1.3 Trend-Analysis

Prioritize Trends for Exploration

The image contains a screenshot of a table to demonstrate the trends.The image contains a graph that demonstrates the trends from the table on a graph to show how to prioritze them based on relevance and impact.

Info-Tech Insight

While the scorecard may produce a ranking based on weighted metrics, you need to leverage the group discussion to help contextualize and challenge assumptions when validating the priority. The room for debate is important to truly understand whether a trend is a fad or a fact that needs to be addressed.

1.3 Trend-Analysis

Discuss the driver(s) behind the trend

Determining the root cause(s) of a trend is an important precursor to understanding the how, why, and to what extent a trend will impact your industry and market.

Trend analysis can be a valuable approach to reduce uncertainties about the future and an opportunity to understand the underlying drivers (forces) that may be contributing to a shift in pattern. Understanding the drivers is important to help determine implication on your organization and potential opportunities.

The image contains a screenshot of a driver diagram.

1.3 Trend-Analysis

Examples of driver(s)

INDUSTRY

Healthcare Exemplar

Macro Trends

(Transformative change)

Industry Trend

(A pattern of change…)

Drivers

(“Why”….)

Accessibility

Increase in wait times

Aging population leading to global workforce shortage

New models of care e.g., diversify scope of practice

Address capacity issues

Understanding the drivers is not about predicting the future. Don’t get stuck in “analysis paralysis.” The key objective is to determine what opportunities and risks the trend and its underlying driver pose to your business. This will help elicit leapfrog opportunities that can be funneled into actionable initiatives.

Other examples…

Dimensions

Macro-Trends

Industry Trend

Driver

Social

Demographic shift

Global shortage of healthcare workers

Workforce age

Customer expectations

Patients as partners

Customer demographics

Technology

AI and robotics

Early detection of cancer

Patient outcomes

Ubiquitous connectivity

Virtual health

Capacity

Economic

Recession

Cost-savings

Sustainability

Consumer spending

Value-for-money

Prioritization

Environment

Climate change

Shift in manufacturers

ESG compliant vendors

Pandemic

Supply chain disruption

Local production

Political

Regulatory

Consolidation of professional colleges

Operational efficiency

De-regulation

New models of care

New service (business) model

1.3 Trend-Analysis

Case Study

Industry

Healthcare

Artificial Intelligence (AI) in Precision Medicine (Genomics)

Precision Medicine has become very popular over the recent years fueled by research but also political and patient demands to focus more on better outcomes vs. profits. A cancer care center in Canada wanted to look at what was driving this popularity but more importantly, what this potentially meant to their current service delivery model and operations and what opportunities and risks they needed to address in the foreseeable future. They determined the following drivers:

  • Improve patient outcomes
  • Earlier detection of cancer
  • Better patient experience
  • Ability to compute vast amounts of data to reduce manual effort and errors
  • Accelerate from research to clinical trials to delivery

The image contains a screenshot of AI in Genomics.

1.3 Trend-Analysis

INDUSTRY

Healthcare Exemplar

Category

Macro-Trends

Industry Trends

(Use-Case)

Drivers

Impact to Industry

Impact to Business

Talent Availability

Diverse workforce

Aboriginal health

Systemic inequities

Brand and legal

Policies in place

Hybrid workforce

Virtual care

COVID-19 and infectious disease

New models of care

New digital talent

Customer Expectation

Personalization

On-demand care

Patient experience

Patients as consumers

New operating model

Digital experience

Patient portals

Democratization of data

Privacy and security

Capacity

Emerging Technologies

Internet of Things (IoT)

Smart glucometers

Greater mobility

System redesign

Shift from hospital to home care

Quantum computing

Genomic sequencing

Accelerate analysis

Improve quality of data analysis

Faster to clinical trial and delivery

Regulatory System

Consumer protection

Protect access to sensitive patient data

HIPPA legislation

Restrict access to health record

Electronic health records

Global green

Green certification for redev. projects

Political optics

Higher costs

Contract management

Supply Chain

Supply chain disruptions

Surgical strategic sourcing

Preference cards

Quality

Organizational change management

New pharma entrants

Telco’s move into healthcare

Demand/supply

Funding model

Resource competition

Sample Output From Trend Analysis

1.3 Elicit New Opportunities

Leapfrog into the future

Turn trends into growth opportunities.

To thrive in the digital age, organizations must innovate big, leverage internal creativity, and prepare for flexibility.

In this digital era, organizations are often playing catch up to a rapidly evolving technological landscape and following a strict linear approach to innovation. However, this linear catch-up approach does not help companies get ahead of competitors. Instead, organizations must identify avenues to skip one or several stages of technological development to leapfrog ahead of their competitors.

“The best way to predict the future is to invent it.”

– Alan Kay

Leapfrogging takes place when an organization introduces disruptive innovation into the market and sidesteps competitors, who are unable to mobilize to respond to the opportunities.

1.3 Elicit New Opportunities

Funnel trends into leapfrog ideas

Go from trend insights into ideas for opportunities

Brainstorm ways to generate leapfrog ideas from trend insights.

Dealing with trends is one of the most important tasks for innovation. It provides the basis of developing the future orientation of the organization. However, being aware of a trend is one thing, to develop strategies for response is another.

To identify the impact the trend has on the organization, consider the four areas of growth for the organization:

  1. New Customers: Leverage the trend to target new customers for existing products or services.
  2. New Business Models: Adjust the business model to capture a change in how the organization delivers value.
  3. New Markets: Enter or create new markets by applying existing products or services to different problems.
  4. New Product or Service Offerings: Introduce new products or services to the existing market.

1.3 Elicit New Opportunities

INDUSTRY: Healthcare

SOURCE: Memorial Sloan Kettering Cancer Center

Case Study

Machine Learning Sensor to Sniff Out Cancer

Challenge

Solution

Results

Timely access to diagnostic services is a key indicator of a cancer patient’s prognosis i.e., outcome. Early detection of cancer means the difference between life and death for cancer patients.

Typically, cancer biomarkers need to be present to detect cancer. Often the presence of these biomarkers is late in the disease state when the cancer cells have likely spread, resulting in suspicions of cancer only when the patient does not feel well or suspects something is wrong.

Researchers in partnership with IBM Watson at Memorial Sloan Kettering Cancer Center (MSK) have created a tool that can sniff for and identify cancer in a blood sample using machine learning.

Originally, MSK worked with IBM Watson to identify machine learning as an emerging technology that could drive early cancer detection without the use of cancer biomarkers. But they needed to find specific use cases. After a series of concept prototypes, they were able to use machine learning to detect patterns in blood cells vs. cancer biomarkers to detect cancer disease.

Machine learning was an emerging trend that researchers at MSK felt held great promise. They needed to turn the trend into tangible opportunities by identifying some key use cases that could be prototyped.

Computational tools in oncology have the ability to greatly reduce clinician labor, improve the consistency of variant classification, and help accelerate the analytics of vast amounts of clinical data that would be prone to errors and delays when done manually.

From trends to leapfrog ideas

Additional Examples in the Appendix

Example of leapfrog ideas that can generate opportunities for consideration

Trend

New Customer

New Market

New Business or Operating Model

New Service Offering

What trend(s) pose a significant impact on your business?

New stakeholder segment

Enter or create new markets

Adjust the business or operating model to capture change in how the business creates and delivers value

Introduce new digital products, services and experiences

Virtualize Registration

Empower patients as consumers of healthcare partners

Direct B2C to close gap between providers and patients by removing middle administrative overhead.

24/7 On-Demand Patient Portal

Leverage AI to develop chatbots and on-demand

Phase 1: Deliverable

Phase 1 Deliverable

Example of output from phase 1 ideation session

Business Objectives

New Customers

(Customer Experience)

New Markets

(Health Outcomes)

New Business or

Operating Models

(Operational Excellence)

New Service Offering

(Value for Money)

Description:

Focus on improving experiences for patients and providers

Improve quality and standards of care to continually drive better health outcomes

Deliver care better, faster, and more efficiently

Reduce cost per capital of delivery care and increase value for services

Trends:

  • Global workforce shortage due to ageing demographics
  • Clinicians are burnt-out and unable to practice at the top of their profession
  • On-demand care/mobile/wearables
  • Virtual care
  • Faster access to quality service
  • Help navigating complex medical ecosystem from primary to acute to community
  • Standardize care across regions
  • New models of care to expand capacity
  • Improve medication errors
  • Opportunities to use genomics to design personalized medicine
  • Automate tasks
  • Leverage AI and robotics more effectively
  • Regulatory colleges consolidation mandate
  • Use data and analytics to forecast capacity and health outcomes
  • Upskill vs. virtualize workforce
  • Payment reform i.e., move to value-based care vs. fee-for-service
  • Consolidation of back-office functions like HR, supply chain, IT, etc. to reduce cost i.e., shared services model

Digital Opportunities:

  1. Virtual health command center
  2. Self-scheduling patient portal
  3. Patient way-finder
  4. Smart glucometer for diabetes
  1. Machine learning for early detection of cancer
  2. Visualization tools for capacity planning and forecasting
  3. Contact tracing apps for public health
  1. Build advanced analytics capabilities with new skills and business intelligence tools
  2. Pharmacy robotics
  3. Automate registration
  1. Automate provider billing solution
  2. Payment gateways – supplier portal in the cloud

Phase 2

Evaluate Opportunities and Business Capabilities

Build a better understanding of the opportunities and their impact on your business.

Phase 1Phase 2Phase 3

Identify New Digitally Enabled Opportunities

Evaluate Opportunities and Business Capabilities

Transform Stakeholder Journeys

Phase 2

Evaluate Opportunities and Business Capabilities

2.1

CREATE OPPORTUNITY PROFILES

Evaluate each opportunity

Some opportunities will have an immediate and significant impact on your business. Some may have a significant impact but on a longer time scale or some may be unlikely to have a significant impact at all. Understanding these trends is an important context for your digital business strategy.

Consider:

  • Does this opportunity conform with your guiding principles?
  • Can this opportunity feasibly deliver the anticipated benefits?
  • Is this opportunity desired by your stakeholders?

Avoid:

  • Overly vague language. Opportunities need to be specific enough to evaluate what impact they will have.
  • Simply following what competitors are doing. Be ambitious and tailor your digital strategy to your organizational values, goals, and priorities.
2.2

UNDERSTAND THE IMPACT OF OPPORTUNITIES ON BUSINESS CAPABILITIES

Understand the impact across your value chains

Each opportunity has the potential to impact multiple areas of your business. Prioritize where to start acting on new opportunities based on your business objectives and capabilities. You need to assess their impacts across value chains. Does the opportunity impact existing value chain(s) or create a new value chain?

Consider:

  • How well does this opportunity align with your digital vision, mission, and goals?
  • What will be the overall impact of this opportunity?
  • How urgently must you act?

Avoid:

  • Guessing. Validate assumptions and use clear, unbiased information to make decisions. Info-Tech has extensive resources to assist in evaluating trends, opportunities, and solutions.
  • Making everything a high priority. Most organizations can only prioritize one to two initiatives at a time.

2.1 Build an opportunity profile

Evaluate each opportunity

Discussion Framework:

In your discussion, evaluate each opportunity to assess assumptions, value drivers, and benefits.

Ideas matter, but not all ideas are created equal. Now that you have elicited opportunities, discuss the assumptions, risks, and benefits associated with each new digital opportunity.

Design Thinking

Leverage the guiding principles as the guardrails to limit the scope of your new digital opportunities. You may want to consider taking a design-thinking approach to innovation by discussing the merits of each opportunity based on:

  • DesirabilityDesirability: People want it. Does the solution enable the organization to meet the expectations of stakeholders?
  • Feasibility
  • Feasibility: Able to Execute. Do we have the capabilities to deliver e.g., the right skills, partners, technology, and leadership?

  • Viability
  • Viability: Delivers Value. Will this idea meet business goals e.g., cost, revenue, and benefits?

Source: Adapted from IDEO

Transform the Business

Must Prioritize

Should Plan

Drive Digital Experiences

Build Digital Capabilities

High Value/Low Complexity

  • stakeholders want it
  • easy to implement
  • capabilities exist to deliver
  • creates significant value
  • strategic growth = competitive advantage

High Value/High Complexity

  • customers want it
  • not easy to implement without carefully planning
  • need to invest in developing capabilities
  • Competitive differentiator

Low Value/Low Complexity

  • stakeholders don’t want it
  • easy to implement but takes resources away from priority
  • some capabilities exist
  • creates marginal value
  • minimal growth

Low Value/High Complexity

  • stakeholders don’t want it
  • difficult to implement
  • need to invest in developing capabilities
  • no real strategic growth

Could Have

Don’t Need

Transform Operations

IMPACT

COMPLEXITY

Source: Adapted from MoSCoW prioritization model

Exemplar: Opportunity Profile

Example:

An example of a template to capture the output of discussion.

Automate the Registration Process Around Admission, Discharge, and Transfer (ADT)

Description of Opportunity:

ADT is a critical function of registration that triggers patient identification to support services and billing. Currently, ADT is a heavily manual process with a high degree of errors as a result of human intervention. There is an opportunity to leverage intelligent automation by using RPA and AI.

Alignment With Business Objectives

Improve patient outcome

Drive operational efficiency and effectiveness

Better experiences for patients

Business Architecture

This opportunity may impact the following business capabilities:

  • Referral evaluation
  • Admission, discharge, and transfer management
  • Scheduling management
  • Patient registry management
  • Provider registry management
  • Patient billing
  • Provider billing
  • Finance management
  • EHR/EMR integration management
  • Enterprise data warehouse for reporting
  • Provincial/state quality reporting

Benefits & Outcomes

  • Reduce errors by manual registration
  • Improve turnaround time for registration
  • Create a consistent customer experience
  • Improve capacity
  • Virtualize low-value work

Key Risks & Assumptions

  • Need to add skills & knowledge to maintain systems
  • Perception of job loss or change by unions
  • assume documentation of standard work for automation vs. non-standard

Opportunity Owner

VP, Health Information Management (HIM)

Incremental Value

Reduce errors in patient identity

  • Next Steps
  • Investigate use cases for RPA and AI in registration
  • Build business case for funding

2.2 Business capabilities impact

Understand the impact on your business capabilities

Each opportunity has the potential to impact multiple areas of your business. Prioritize where to start acting on new opportunities based on your business objectives and capabilities.

You will need:

Industry Reference Architecture.Industry Reference Architecture

Activity: 1-2 hours

  1. Using your industry reference architecture, highlight the business capabilities that may be impacted by the opportunity. Use a value chain analysis approach to help with this exercise.
  2. Referring to your Prioritized Opportunities for Transformation, prioritize areas to transform. Priority should be given to low maturity areas that are highly or urgently relevant to your overall strategic goals.
+
Prioritized Opportunities for Transformation.Prioritized Opportunities for TransformationPrioritized Business Capability Map.

2.2 Business capabilities impact

Start with a value chain analysis

This will help identify the impact on your business capabilities.

As we identify and prioritize the opportunities available to us, we need to assess impacts on value chains. Does the opportunity directly impact an existing value chain? Or does it open us to the creation of a new value chain?

The image contains a screenshot of the value chain analysis.

The value chain perspective allows an organization to identify how to best minimize or enhance impacts and generate value.

As we move from opportunity to impact, it is important to break down opportunities into the relevant pieces so we can see a holistic picture of the sources of differentiation.

Exemplar: Prioritized Business Capability Map

The image contains a screenshot of the exemplar prioritized business capability map.

In this example, intelligent automation for referral and admission would create opportunity to virtualize repeatable tasks.

Phase 3

ETransform Stakeholder Journeys

Understand the impact of opportunities across the value chain and possibilities of new or better stakeholder experiences.

Phase 1Phase 2Phase 3

Identify New Digitally Enabled Opportunities

Evaluate Opportunities and Business Capabilities

Transform Stakeholder Journeys

Phase 3

Identify opportunities to transform stakeholder experiences

3.1 IDENTIFY STAKEHOLDER PERSONA

Understand WHO gains value from the value chain

To define a stakeholder scenario, you need to understand whom we are mapping for. Developing stakeholder personas is a great way to understand their needs through a lens of empathy.

Consider:

  • Keep your stakeholder persona groupings to the core clusters typical of your industry.
  • See it from their perspective not the business’s.

Avoid:

  • Don’t create a multitude of personas based on discrete nuances.
3.2 BUILD A STAKEHOLDER JOURNEY

Identify opportunities to transform the stakeholder experience

A stakeholder or customer journey helps teams visualize the impact of a given opportunity through a value chain. This exercise uncovers the specific initiatives and features that should be considered in the evolution of the digital strategy.

Consider:

  • Which stakeholders may be most affected by this opportunity?
  • How might stakeholders feel about a given solution as they move through the journey? What pain points can be solved?

Avoid:

  • Simply listing steps in a process. Put yourself in the shoes of whoever’s journey you are mapping. What do they care about?
  • Choosing a stakeholder with limited involvement in the process.
3.3 BREAKDOWN OPPORTUNITIES INTO INITIATIVES ALIGNED TO BUSINESS OBJECTIVES

Unlock key initiatives to deliver value

Opportunities need to be broken down into actionable initiatives that can be turned into business cases with clear goals, benefits realization, scope, work plans, and investment ask.

Consider:

  • Multiple initiatives can be grouped into one opportunity that is similar or in phases.
  • Ensure the initiatives support and enable the business goals.

Avoid:

  • Creating a laundry list of initiatives.
  • Initiatives that don’t align with business goals.

Map Stakeholder Journey

Conduct a journey mapping exercise to further refine and identify value streams to transform.

Stakeholder Journey Mapping

Digital Business Strategy Blueprint

Activity: 4-6 hours

Our analysts can guide and support you, where needed.

  1. First download the Define Your Digital Business Strategy blueprint to review the Stakeholder Journey Mapping exercise.
  2. Identify a stakeholder persona and a one-journey scenario.
  3. Map a stakeholder journey using a single persona across one-journey scenarios to identify pain points and opportunities to improve experiences and generate value.
  4. Consolidate a list of opportunities for business case prioritization.

Key Concepts:

Value Stream: a set of activities to create and capture value for and from the end consumer.

Value Chain: a string of end-to-end processes that creates value for the consumer.

Journey Scenario: a specific use case across a value chain (s).

Members Engaged

  • CIO
  • Business Executives

Info-Tech

  • Industry Analyst
  • Executive Advisor

Stakeholder Persona.Stakeholder Persona

1-Journey Use Case.1-Journey Use Case

Map Stakeholder Journey 
Map Stakeholder Journey

Content Leveraged

  • Stakeholder Persona
  • Journey Use Case
  • Map Stakeholder Journey

Deliverable:

  1. Guiding principles
  2. Strategic growth opportunities

Download the Define Your Digital Business Strategy blueprint for Customer Journey Mapping Activities

3.1 Persona identification

Identify a stakeholder persona and journey scenario

From value chain to journey scenario.

Stakeholder personas and scenarios help us build empathy towards our customers. It helps put us into the shoes of a stakeholder and relate to their experience to solve problems or understand how they experience the steps or processes required to accomplish a goal. A user persona is a valuable basis for stakeholder journey mapping.

A stakeholder persona is a fictitious profile to represent a customer or a user segment. Creating this persona helps us understand who your customers really are and why they are using your service or product.

A stakeholder scenario describes the situation the journey map addresses. Scenarios can be real (for existing products and services) or anticipated.

Learn more about applying design thinking methodologies

3.1 Persona identification

Identify a stakeholder persona

Who are you transforming for?

To define a stakeholder scenario, we need to understand who we are mapping for. In each value chain, we identified a stakeholder who gains value from that value chain. We now need to develop a stakeholder persona: a representation of the end user to gain a strong understanding of who they are, what they need, and their pains and gains.

One of the best ways to flesh out your stakeholder persona is to engage with the stakeholders directly or to gather the input of those who may engage with them within the organization.

For example, if we want to define a journey map for a student, we might want to gather the input of students or teaching faculty that have firsthand encounters with different student types and are able to define a common student type.

Info-Tech Insight

Run a survey to understand your end users and develop a stronger picture of who they are and what they are seeking to gain from your organization.

3.1 Persona identification

Identify stakeholder scenarios to map

For your digital strategy, leverage the existing and opportunity value chains identified in phases 1 and 2 for journey mapping.

Identify two existing value chains to be transformed.

In section 1, we identified existing value chains to be transformed. For example, your stakeholder persona is a registration clerk who is part of the Health Information Management team responsible for registering and adjudicating patient identity.

The image contains a screenshot example of two existing value chains to be transformed.

Identify one new value chain.

In section 2, we identified a new value chain. However, for a new opportunity, the scenario is more complex as it may capture many different areas of a value chain. Subsequently, a journey map for a new opportunity may require mapping all parts of the value chain.

The image contains a screenshot of one value chain.

3.1 Persona identification

Example Stakeholder Persona

Stakeholder demographics

Name: Anne

Age: 35

Occupation: HIM Clerk

Location: Unity Hospital System

Pains

What are their frustrations, fears, and anxieties?

  • Volume of patients to schedule
  • Too many applications to access
  • Data quality is an error
  • Extensive manual entry of data prone to errors
  • Disruptions with calls from patients, doctors, and FOI requests

What do they need to do?

What do they want to get done? How will they know they are successful?

  • Automate some non-valuable tasks that can also reduce human errors. Allow patients to self-schedule online or answer FAQs via a chatbox. Would love to have a virtual triage to alleviate volume of calls and redirects.

Gains

What are their wants, needs, hopes, and dreams?

  • Reduce errors in data entry for patient identity (reduce manual look-ups).
  • Have standard requests go through a chatbot.
  • Have physicians automate billing through front-end speech recognition software.

3.1 Persona identification

Define a journey statement for mapping

Now that we understand who we are mapping for, we need to define a journey statement to capture the stakeholder journey.

Leverage the following format to define the journey statement.

“As a [stakeholder], I need to [prioritized value chain task], so that I can [desired result or overall goal].”

The image contains a screenshot of a journey statement for mapping.

3.2 Stakeholder Journey-Map

Leverage customer journey mapping to capture value chains to be transformed

Conduct a journey mapping exercise to identify opportunities for innovation or automation.

A journey-based approach helps an organization understand how a stakeholder moves through a process and interacts with the organization in the form of touch points, channels, and supporting characters. By identifying pain points in the journey and the activity types, we can identify opportunities for innovation and automation along the journey.

The image contains a screenshot of an example of journey mapping.

Embrace design-thinking methodologies to elevate the stakeholder journey and build a competitive advantage for your organization.

3.2 Stakeholder Journey-Map

Key Concepts

0. Name: Annie Smith

Age: 35

Occupation: HIM Registration Clerk for Unity Hospital System

Key Concepts.0.Stakeholder Persona

A fictitious profile of a representative stakeholder group that shares a common yet discrete set of characteristics that embodies how they think, feel, and act.

1. Journey (Value Chain)

Describes the end-to-end steps or processes that a customer takes across the value chain that groups a set of activities, interactions, touch-points, and experiences.

2. Persona’s Goals

Exemplifies what the persona is thinking and wanting across each specific step of their journey.

3. Nature of Activity (see detailed definition in this section)

This section captures two key components: 1) the description of the action or interaction between the personas to achieve their goals, and 2) the classification of the activity to determine the feasibility for automation. The type is based on four main characteristics: 1) routine cognitive, 2) non-routine cognitive , 3) routine manual, and 4) non-routine manual.

4. Type of Touch-Point

The channel by which a persona interacts or touches products, services, the organization, or information.

5. Key Moments & Pain Points

Captures the emotional experience and value of the persona across each step and interaction.

6. Metrics

This section captures the KPIs used to measure the experience, process or activity today. Future KPIs will need to be developed to measure the opportunities.

7. Opportunities refer to both the possible initiatives to address the persona’s pain points, and the ability to enable business goals.

3.2 Stakeholder Journey-Map

Opportunities for Automation: Nature of Activity

Example
We identified opportunities for automation

Categorize the activity type to identify opportunities for automation. While there is no perfect framework for automation, this 4x4 matrix provides a general guide to identifying automation opportunities for consideration.

Automation example list.Automation Quadrant Analysis

Info-Tech Insight

Automation is more than a 1:1 relationship between the defined task or job and automation. When considering automation, look for opportunities to: 1) streamline across multiple processes, 2) utilize artificial intelligence to augment or virtualize manual tasks, and 3) create more structured data to allow for improved data quality over the long-term.

3.2 Stakeholder Journey-Map

Example of stakeholder journey output: Healthcare

Stakeholder: HIM Clerks

Journey: Follow-up visit of 80-year-old diabetes patient at diabetic clinic outpatient

Journey

(Value Chain)

AppointmentRegistrationIdentity ReconciliationEligibility VerificationTreatment Consult

Persona’s Goals

  • Confirm appointment
  • Verify referral through provider registry
  • Request medical insurance or care card
  • Enroll patient into CIS
  • Patient registry validation
  • Secondary identification request
  • Verify eligibility through the patient registry
  • Schedule follow referrals & appointments
  • Coding for billing

Nature of Activity

Priority

Priority

Investigate – ROI

Investigate – ROI

Defer

Type of Touchpoint

  • Telephone (land/mobile)
  • Email
  • CIS Application
  • Verbal
  • Patient registry system
  • Telephone
  • Patient and provider registry
  • CIS
  • Email, call, verbal
  • Physician billing
  • Hospital ERP
  • CIS
  • Paper appointments

Pain Points & Gains

  • Volume of calls
  • Manual scheduling
  • Too many applications
  • Data entry errors
  • Limited languages
  • Too many applications
  • Data entry errors
  • Too many applications
  • Limited languages
  • Ask patients to repeat info
  • Data entry errors
  • Too many applications
  • Limited languages
  • Ask patients to repeat info
  • Patient identity not linked to physician billing
  • Manual coding entry

Metrics

Time to appointment

Time to enrollment

Patient mis-match

Provider mis-match

Percentage of errors in billing codes

Opportunities

  • Patient scheduling portal (24/7)
  • Use of AI and chatbots
  • Automate patient matching index digitalization and integration
  • Automate provider matching index digitalization and integration
  • Natural language processing using front-end speech recognition software for billing

Break opportunities into a series of initiatives aligned to business objectives

Opportunity 1

Virtual Registration

»

Business Goals

Initiatives

Health Outcomes

Stakeholder Experience

New Models of Care

Operational Efficiency

  • Enterprise master patient index integration with patient registry
  • Intelligent automation for outpatient department
  • Customer service chat box for triage FOI1
  • Front-end speech recognition for billing (FESR)

Opportunity 2

Machine Learning Pre-Cancer Diagnosis

»

Business Goals

Initiatives

Health Outcomes

Stakeholder Experience

New Models of Care

Operational Efficiency

  • Enterprise Datawarehouse architecture (build data lake)
  • Build genomics analytics capabilities e.g., recruitment, data-quality review
  • Implementation of machine learning software
  • Supply chain integration with ERP for medical and research supplies
FOI = Freedom of Information

Info-Tech Insight

Evaluate if an opportunity will require a series of discrete activities to execute and/or if they can be a stand-alone initiative.

Now you are ready to select and prioritize digital initiatives for business case development

After completing all three phases of activities in this blueprint, you will have compiled a list of new and planned digital initiatives for prioritization and business case development in the next phase.

Consolidated List of Digital Initiatives.

Example: Consolidated List of Digital Initiatives

The next step will focus on prioritizing and building a business case for your top digital initiatives.

IT Roadmap for your Digital Business Strategy.

Appendix: Additional Examples

From trend to leapfrog ideas

Every idea is a good one, unless you need one that works.

Additional Examples
Examples of leapfrog ideas that can generate opportunities for consideration

Example 1 Finance

Trend

New Customer

New Market

New Business or Operating Model

New Service Offering

What trend(s) pose a significant impact on your business?

New customer segments

Enter or create new markets

Adjust the business or operating model to capture change in how the business creates and delivers value

Introduce new digital products, services, and experiences

Open banking

Account integrators (AISPs)

Payment integrators
(PISPs)

Data monetization

Social payments

Example 2: Retail

Trend

New Customer

New Market

New Business or Operating Model

New Service Offering

What trend(s) pose a significant impact on your business?

New customer segments

Enter or create new markets

Adjust the business or operating model to capture change in how the business creates and delivers value

Introduce new digital products, services, and experiences

Virtual cashier

(RFID Enablement)

Big-box retailers

Brick & mortar stores

Automated stores driving new customer experiences

Digital cart

From trend to leapfrog ideas

Every idea is a good one, unless you need one that works.

Additional Exemplars in Appendix

Examples of leapfrog ideas that can generate opportunities for consideration

Example 3:

Manufacturing

Trend

New Customer

New Market

New Business or

Operating Model

New Service Offering

What trend(s) pose a significant impact on your business?

New customer segments

Enter or create new markets

Adjust the business or operating model to capture change in how the business creates and delivers value

Introduce new digital products, services, and experiences

IT/OT convergence

Value-added resellers

New geographies

Train quality-control algorithms and sell as a service to other manufacturers

Quality control as a service

Case Study: International Airport

Persona Journey Map: International/Domestic Departure

Persona: Super Traveler

Name: Annie Smith

Age: 35

Occupation: Engineer, Global Consultant

Journey Activity Name: Inspired to Travel

Persona’s Goals

What Am I Thinking?

  • I am planning on traveling to Copenhagen, Denmark for work.
  • It’s my first time and I need to gather information about the destination, accommodation, costs, departure information, bag weight, etc..

Nature of Activity

What Am I Doing?

  • Logging onto airline website
  • Confirming departure gates

Type of Touchpoint

  • Airport rewards program
  • Airport Website
  • Online hotel eCommerce
  • Social media
  • Transportation services on mobile

Key moments & pain points

How Am I Feeling?

  • Frustrated because the airport website is difficult to navigate to get information
  • Annoyed because there is no FAQ online and I have to call; there’s a long wait to speak to someone.
  • Stress & uncertainty (cancellation, logistics, insurance, etc..)

Metrics

  • Travel dates
  • Trip price & budget

Opportunities

  • Tailored communication based on search history
  • Specific messaging (e.g., alerts for COVID-19, changes in events, etc.)
  • Interactive VR experience that guides customers through the airport as a navigator

Related Info-Tech Research

Tech Trends and Priorities Research Center

  • Access Info-Tech’s Tech Trends reports and research center to learn about current industry trends, shifts in markets, and disruptions that are impacting your industry and sector. This is a great starting place to gain insights into how the ecosystem is changing your business and the impact of these changes on IT.

Digital Business Strategy

  • Leverage Info-Tech’s Digital Business Strategy to identify opportunities to transform the customer experience.

Industry Reference Architecture

  • Access Info-Tech’s Industry coverage to accelerate your understanding of your business capabilities and opportunities for automation.

Contact Your Account Manager

Research Contributors and Experts

Joanne Lee

Joanne Lee

Principal, Research Director, CIO Strategy

Info-Tech Research Group

Kim Osborne-Rodgriguez

Kim Osborne-Rodgriguez

Research Director, CIO Strategy

Info-Tech Research Group

Joanne is an executive with over 25 years of in digital technology and management consulting across both public and private entities from solution delivery to organizational redesign across Canada and globally.

Prior to joining Info-Tech Research Group, Joanne was a management consultant within KPMG’s CIO management consulting services and the Western Canada Digital Health Practice lead. She has held several executive roles in the industry with the most recent position as Chief Program Officer for a large $450M EHR implementation. Her expertise spans cloud strategy, organizational design, data and analytics, governance, process redesign, transformation, and PPM. She is passionate about connecting people, concepts, and capital.

Joanne holds a Master’s in Business and Health Policy from the University of Toronto and a Bachelor of Science (Nursing) from the University of British Columbia.

Kim is a professional engineer and Registered Communications Distribution Designer (RCDD) with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach to digital transformation, with a track record of supporting successful implementations.

Kim holds a Bachelor’s degree in Mechatronics Engineering from University of Waterloo.

Research Contributors and Experts

Jack Hakimian

Jack Hakimian

Vice President, Research

Info-Tech Research Group

Charl Lombard.

Charl Lombard

President, Digital Transformation Consulting

Info-Tech Research Group

Jack has more than 25 years of technology and management consulting experience. He has served multi-billion dollar organizations in multiple industries including Financial Services and Telecommunications. Jack also served a number of large public sector institutions.

Prior to joining the Info-Tech Research Group, he worked for leading consulting players such as Accenture, Deloitte, EY, and IBM.

Jack led digital business strategy engagements as well as corporate strategy and M&A advisory services for clients across North America, Europe, the Middle East, and Africa. He is a seasoned technology consultant who has developed IT strategies and technology roadmaps, led large business transformations, established data governance programs, and managed the deployment of mission-critical CRM and ERP applications.

He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master’s degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management.

Charl has more than 20 years of professional services experience, “majoring” in digital transformation and strategic topics. He has led multiple successful Digital Transformation programs across a range of industries like Information technology, hospitality, Advanced Industries, High Tech, Entertainment, Travel and Transport, Insurance & Financial Services, Metals & Mining, Electric Power, Renewable Energy, Telecoms, Manufacturing) across different geographics (i.e., North America, EU, Africa) in both private and public sectors.

Prior to joining Info-Tech Research Group, Charl was the Vice President of Global Product Management and Strategy (Saber Hospitality Solution), Associate President, McKinsey Transformation Practice, e-Business Practice for PwC, and tech start-up founder and investor.

Charl is a frequent speaker at innovation and digital transformation conferences and holds an MBA from the University of Cape Town Graduate School of Business, and a bachelor’s degree from the University of Pretoria, South Africa.

Research Contributors and Experts

Mike Tweedie

Mike Tweedie

Practice Lead, CIO Strategy

Info-Tech Research Group

Michael Alemany

Michael Alemany

Vice President, Digital Transformation Consulting

Info-Tech Research Group

Mike Tweedie brings over 25 years of experience as a technology executive. He’s led several large transformation projects across core infrastructure, application, and IT services as the head of Technology at ADP Canada. He was also the Head of Engineering and Service Offerings for a large French IT services firm, focused on cloud adoption and complex ERP deployment and management.

Mike holds a Bachelor’s degree in Architecture from Ryerson University.

Michael is a leader in Info-Tech’s digital transformation consulting practice. He brings over 10 years of experience working with companies across a range of industries. His work experience includes ~4.5 years at McKinsey & Company where he led large-scale transformations for fortune 500 companies. Prior to joining Info-Tech, he worked for Sabre Corp., an SaaS platform provider for the travel and hospitality sector, leading Product Strategy & Operations. Michael holds an MBA from the Tuck School of Business at Dartmouth and a B.S in Business Strategy from Brigham Young University.

Research Contributors and Experts

Duane Cooney

Duane Cooney

Executive Counselor, Healthcare

Info-Tech Research Group

Denis Goulet

Denis Goulet

Senior Workshop Director

Info-Tech Research Group

Duane brings over 30 years of experiences a healthcare IT leader with a passion for the transformation of people, processes, and technology. He has led large-scale health technology transformation and operations across the enterprise. Before joining Info-Tech, Duane served as the Deputy CIO, Senior Information Technology Director, and Enterprise Architect for both public not-for-profit and private sectors. He has a Bachelors in Computer Science and is a graduate of EDS Operations. He holds certifications in EHR, LEAN/Agile, ITIL, and PMP.

Denis is an IAF Certified Professional Facilitator who has helped organizations and technology executives develop IT strategies for small to large global enterprises. He firmly believes in a collaborative value-driven approach. Prior to joining Info-Tech Research Group, Denis held several industry positions as CIO, Chief Administrative Office (City Manager), General Manager, and Vice President of Engineering. Denis holds an MBA from Queen’s University and a Diploma in Technology Engineering and Executive Municipal Management.

Jay Cappis.

Jay Cappis

Executive Advisor, Real-Estate

Info-Tech Research Group

Christine Brick.

Christine Brick

Executive Advisor, Financial Services
Info-Tech Research Group

Jay brings over 30 years of experience in management and technology across small and medium enterprises to large global enterprises including Exxon and Xerox. His cross-industry experience includes professional services, commercial real estate, oil and gas, digital start-ups, insurance, and aerospace. Jay has led business process improvements and change management and has expertise in software development lifecycle management and DevOps practices.

Christine brings over 20 years in IT transformation across DevOps, infrastructure, operations, supply chain, IT Strategy, modernization, cost optimization, data management, and operational risk. She brings expertise in business transformation, mergers and acquisitions, vendor selection, and contract management.

Bibliography

Bhatia, AD. “Transforming through disruptions: A conversation with Dan Antonelli. Transformation Insights.” McKinsey & Company. January 31, 2022. Web
Bertoletti, Antonella and Peter Eeles. “Use an IT Maturity Model.” IBM Garage Methodology. Web. accessed May 30, 2022.
Catlin, Tanguy, Jay Scanlan, and Paul Willmott. “Raising your Digital Quotient.” McKinsey Quarterly. June 1, 2015. Article
Custers, Heidi. “Digital Blueprint. Reference Architecture. Deloitte Digital.Accessed May 15, 2022.
Coundouris, Anthony. “Reviewed: The Top 5 Digital Transformation Frameworks in 2020.” Run-frictionless Blog. Accessed May 15, 2022. Web.
Daub, Matthias and Anna Wiesinger. “Acquiring the Capabilities you need to go digital.” Business Technology Office – McKinsey and Company. March 2015. Web.
De La Boutetiere, Alberto Montagner and Angelika Reich. “Unlocking success in digital transformations.” McKinsey and Company. October 2018. Web.
“Design Thinking Defined.” IDEO.com. November 21, 2022. Web.
Dorner, Karle and David Edelman. “What ‘Digital’ really means.” McKinsey Digital. July 2015. Web
“Everything Changed. Or Did it? Harvey Nash KPMG CIO Survey 2020.” KPMG, 2020
Kane, Gerald C., Doug Palmer, Ahn Nguyen Phillips, David Kiron, Natasha Buckley. “Aligning the organization for its digital future.” Findings from the 2016 Digital Business Global Executive Study and Research Project. MIT Sloan Management Review. July 26, 2016. Web
LaBerge, Laura, et al. “How COVID-19 has pushed companies over the technology tipping point—and transformed business forever.” McKinsey, 5 Oct. 2020. Accessed 14 June 2021
Mindtools Content Team. “Cause and Effect Analysis.” Mindtools.com. November 21, 2022. Web.
“Strategic Foresight.” OECD.org. November 21, 2022, Web
Sall, Sherman, Dan Lichtenfeld. “The Digital ME Method. Turning digital opportunities into customer engagement and business growth.” Sygnific. 2017. Web.
Scoblic, J. Peter. “Learning from the Future. How to make robust strategy in times of deep uncertainty.” Harvard Business Review, August 2020.
Silva, Bernardo and Schoenwaelder, Tom. ‘Why Good Strategies fail. Addressing the three critical strategic tensions.” Deloitte Monitor Group. 2019.

Take Control of Cloud Costs on Microsoft Azure

  • Buy Link or Shortcode: {j2store}426|cart{/j2store}
  • member rating overall impact: 10.0/10 Overall Impact
  • member rating average dollars saved: $125,999 Average $ Saved
  • member rating average days saved: 50 Average Days Saved
  • Parent Category Name: Cloud Strategy
  • Parent Category Link: /cloud-strategy
  • Traditional IT budgeting and procurement processes don't work for public cloud services.
  • The self-service nature of the cloud means that often the people provisioning cloud resources aren't accountable for the cost of those resources.
  • Without centralized control or oversight, organizations can quickly end up with massive Azure bills that exceed their IT salary cost.

Our Advice

Critical Insight

  • Most engineers care more about speed of feature delivery and reliability of the system than they do about cost.
  • Often there are no consequences for overarchitecting or overspending on Azure.
  • Many organizations lack sufficient visibility into their Azure spend, making it impossible to establish accountability and controls.

Impact and Result

  • Define roles and responsibilities.
  • Establish visibility.
  • Develop processes, procedures, and policies.

Take Control of Cloud Costs on Microsoft Azure Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should take control of cloud costs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Build a cost accountability framework

Assess your current state, define your cost allocation model, and define roles and responsibilities.

  • Cloud Cost Management Worksheet
  • Cloud Cost Management Capability Assessment
  • Cloud Cost Management Policy
  • Cloud Cost Glossary of Terms

2. Establish visibility

Define dashboards and reports, and document account structure and tagging requirements.

  • Service Cost Cheat Sheet for Azure

3. Define processes and procedures

Establish governance for tagging and cost control, define process for right-sizing, and define process for purchasing commitment discounts.

  • Right-Sizing Workflow (Visio)
  • Right-Sizing Workflow (PDF)
  • Commitment Purchasing Workflow (Visio)
  • Commitment Purchasing Workflow (PDF)

4. Build an implementation plan

Document process interactions, establish program KPIs, and build implementation roadmap and communication plan.

  • Cloud Cost Management Task List
[infographic]

Workshop: Take Control of Cloud Costs on Microsoft Azure

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Build a Cost Accountability Framework

The Purpose

Establish clear lines of accountability and document roles & responsibilities to effectively manage cloud costs.

Key Benefits Achieved

Understanding of key areas to focus on to improve cloud cost management capabilities.

Activities

1.1 Assess current state

1.2 Determine cloud cost model

1.3 Define roles & responsibilities

Outputs

Cloud cost management capability assessment

Cloud cost model

Roles & responsibilities

2 Establish Visibility

The Purpose

Establish visibility into cloud costs and drivers of those costs.

Key Benefits Achieved

Better understanding of what is driving costs and how to keep them in check.

Activities

2.1 Develop architectural patterns

2.2 Define dashboards and reports

2.3 Define account structure

2.4 Document tagging requirements

Outputs

Architectural patterns; service cost cheat sheet

Dashboards and reports

Account structure

Tagging scheme

3 Define Processes & Procedures

The Purpose

Develop processes, procedures, and policies to control cloud costs.

Key Benefits Achieved

Improved capability of reducing costs.

Documented processes & procedures for continuous improvement.

Activities

3.1 Establish governance for tagging

3.2 Establish governance for costs

3.3 Define right-sizing process

3.4 Define purchasing process

3.5 Define notification and alerts

Outputs

Tagging policy

Cost control policy

Right-sizing process

Commitment purchasing process

Notifications and alerts

4 Build an Implementation Plan

The Purpose

Document next steps to implement & improve cloud cost management program.

Key Benefits Achieved

Concrete roadmap to stand up and/or improve the cloud cost management program.

Activities

4.1 Document process interaction changes

4.2 Define cloud cost program KPIs

4.3 Build implementation roadmap

4.4 Build communication plan

Outputs

Changes to process interactions

Cloud cost program KPIs

Implementation roadmap

Communication plan

Tell Your Story With Data Visualization

  • Buy Link or Shortcode: {j2store}364|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Business Intelligence Strategy
  • Parent Category Link: /business-intelligence-strategy

Analysts do not feel empowered to challenge requirements to deliver a better outcome. This alongside underlying data quality issues prevents the creation of accurate and helpful information. Graphic representations do not provide meaningful and actionable insights.

Our Advice

Critical Insight

As organizations strive to become more data-driven, good storytelling with data visualization supports growing corporate data literacy and helps analysts in providing insights that improves organization's decision-making and value-driving processes, which ultimately boosts business performance.

Impact and Result

Follow a step-by-step guide to address the business bias of tacet experience over data facts and increase audience's understanding and acceptance toward data solutions.

Save the lost hours and remove the challenges of reports and dashboards being disregarded due to ineffective usage.

Gain insights from data-driven recommendations and have decision support to make informed decisions.

Tell Your Story With Data Visualization Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Tell Your Story With Data Visualization Deck – Solve challenging business problems more effectively and improve communication with audiences by demonstrating significant insights through data storytelling with impactful visuals.

Here is our step-by-step process of getting value out of effective storytelling with data visualization:

  • Step 1: Frame the business problem and the outcomes required.
  • Step 2: Explore the potential drivers and formulate hypotheses to test.
  • Step 3: Construct a meaningful narrative which the data supports.
    • Tell Your Story With Data Visualization Storyboard

    2. Storytelling Whiteboard Canvas Template – Plan out storytelling using Info-Tech’s whiteboard canvas template.

    This storytelling whiteboard canvas is a template that will help you create your visualization story narrative by:

  • Identifying the problem space.
  • Finding logical relationships and data identification.
  • Reviewing analysis and initial insights.
  • Building the story and logical conclusion.
    • Storytelling Whiteboard Canvas Template
    [infographic]

    Further reading

    Tell Your Story With Data Visualization

    Build trust with your stakeholders.

    Analyst Perspective

    Build trust with your stakeholders.

    Data visualization refers to graphical representations of data which help an audience understand. Without good storytelling, however, these representations can distract an audience with enormous amounts of data or even lead them to incorrect conclusions.

    Good storytelling with data visualization involves identifying the business problem, exploring potential drivers, formulating a hypothesis, and creating meaningful narratives and powerful visuals that resonate with all audiences and ultimately lead to clear actionable insights.

    Follow Info-Tech's step-by-step approach to address the business bias of tacit experience over data facts, improve analysts' effectiveness and support better decision making.

    Ibrahim Abdel-Kader, Research Analyst

    Ibrahim Abdel-Kader
    Research Analyst,
    Data, Analytics, and Enterprise Architecture

    Nikitha Patel, Research Specialist

    Nikitha Patel
    Research Specialist,
    Data, Analytics, and Enterprise Architecture

    Ruyi Sun, Research Specialist

    Ruyi Sun
    Research Specialist,
    Data, Analytics, and Enterprise Architecture

    Our understanding of the problem

    This research is designed for

    • Business analysts, data analysts, or their equivalent who (in either a centralized or federated operating model) look to solve challenging business problems more effectively and improve communication with audiences by demonstrating significant insights through visual data storytelling.

    This research will also assist

    • A CIO or business unit (BU) leader looking to improve reporting and analytics, reduce time to information, and embrace decision making.

    This research will help you

    • Identify the business problem and root causes that you are looking to address for key stakeholders.
    • Improve business decision making through effective data storytelling.
    • Focus on insight generation rather than report production.
    • Apply design thinking principles to support the collection of different perspectives.

    This research will help them

    • Understand the report quickly and efficiently, regardless of their data literacy level.
    • Grasp the current situation of data within the organization.

    Executive Summary

    Your Challenge Common Obstacles Info-Tech's Approach
    As analysts, you may experience some critical challenges when presenting a data story.
    • The graphical representation does not provide meaningful or actionable insights.
    • Difficulty selecting the right visual tools or technologies to create visual impact.
    • Lack of empowerment, where analysts don't feel like they can challenge requirements.
    • Data quality issues that prevent the creation of accurate and helpful information.
    Some common roadblocks may prevent you from addressing these challenges.
    • Lack of skills and context to identify the root cause or the insight that adds the most value.
    • Lack of proper design or over-visualization of data will mislead/confuse the audience.
    • Business audience bias, leading them to ignore reliable insights presented.
    • Lack of the right access to obtain data could hinder the process.
    • Understand and dissect the business problem through Info-Tech's guidance on root cause analysis and design thinking process.
    • Explore each potential hypothesis and construct your story's narratives.
    • Manage data visualization using evolving tools and create visual impact.
    • Inform business owners how to proceed and collect feedback to achieve continuous improvement.

    Info-Tech Insight
    As organizations strive to become more data-driven, good storytelling with data visualization supports growing corporate data literacy and helps analysts provide insights that improve organizational decision-making and value-driving processes, which ultimately boosts business performance.

    Glossary

    • Data: Facts or figures, especially those stored in a computer, that can be used for calculating, reasoning, or planning. When data is processed, organized, structured, or presented in a given context to make it useful, it is called information. Data leaders are accountable for certain data domains and sets.
    • Data storytelling: The ability to create a narrative powered by data and analytics that supports the hypothesis and intent of the story. Narrators of the story should deliver a significant view of the message in a way easily understood by the target audience. Data visualization can be used as a tactic to enhance storytelling.
    • Data visualization: The ability to visually represent a complete story to the target audience powered by data & analytics, using data storytelling as an enabling mechanism to convey narratives. Typically, there are two types of visuals used as part of data visualization: explanatory/informative visuals (the entire story or specific aspects delivered to the audience) and exploratory visuals (the collected data used to clarify what questions must be answered).
    • Data literacy: The ability to read, work with, analyze, and argue with data. Easy access to data is essential to exercising these skills. All organizational employees involved with data-driven decisions should learn to think critically about the data they use for analytics and how they assess and interpret the results of their work.
    • Data quality: A measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability, and being up-to-date. This is about how well-suited a data set is to serve its intended purpose, therefore business users and stakeholders set the standards for what is good enough. The governance function along with IT ensures that data quality measures are applied, and corrective actions taken.
    • Analytics/Business intelligence (BI): A technology-driven process for analyzing data and delivering actionable information that helps executives, managers, and workers make informed business decisions. As part of the BI process, organizations collect data from internal IT systems and external sources, prepare it for analysis, run queries against the data, and create data visualizations.
      Note: In some frameworks, analytics and BI refer to different types of analyses (i.e. analytics predict future outcomes, BI describes what is or has been).

    Getting value out of effective storytelling with data visualization

    Data storytelling is gaining wide recognition as a tool for supporting businesses in driving data insights and making better strategic decisions.

    92% of respondents agreed that data storytelling is an effective way of communicating or delivering data and analytics results.

    87% of respondents agreed that if insights were presented in a simpler/clearer manner, their organization's leadership team would make more data-driven decisions.

    93% of respondents agreed that decisions made based on successful data storytelling could potentially help increase revenue.

    Source: Exasol, 2021

    Despite organizations recognizing the value of data storytelling, issues remain which cannot be remedied solely with better technology.

    61% Top challenges of conveying important insights through dashboards are lack of context (61%), over-communication (54%), and inability to customize contents for intended audiences (46%).

    49% of respondents feel their organizations lack storytelling skills, regardless of whether employees are data literate.

    Source: Exasol, 2021

    Info-Tech Insight
    Storytelling is a key component of data literacy. Although enterprises are increasingly investing in data analytics software, only 21% of employees are confident with their data literacy skills. (Accenture, 2020)

    Prerequisite Checklist

    Before applying Info-Tech's storytelling methodology, you should have addressed the following criteria:

    • Select the right data visualization tools.
    • Have the necessary training in statistical analysis and data visualization technology.
    • Have competent levels of data literacy.
    • Good quality data founded on data governance and data architecture best practices.

    To get a complete view of the field you want to explore, please refer to the following Info-Tech resources:

    Select and Implement a Reporting and Analytics Solution

    Build a Data Architecture Roadmap

    Establish Data Governance

    Build Your Data Quality Program

    Foster Data-Driven Culture With Data Literacy

    Info-Tech's Storytelling With Data Visualization Framework

    Data Visualization Framework

    Info-Tech Insight
    As organizations strive to become more data-driven, good storytelling with data visualization supports growing corporate data literacy and helps analysts provide insights that improve organizational decision-making and value-driving processes, which ultimately boosts business performance.

    Research Benefits

    Member Benefits Business Benefits
    • Reduce time spent on getting your audience in the room and promote business involvement with the project.
    • Eliminate ineffectively used reports and dashboards being disregarded for lack of storytelling skills, resulting in real-time savings and monetary impact.
    • Example: A $50k reporting project has a 49% risk of the company being unable to communicate effective data stories (Exasol, 2021). Therefore, a $50k project has an approx. 50% chance of being wasted. Using Info-Tech's methodology, members can remove the risk, saving $25k and the time required to produce each report.
    • Address the common business bias of tacit experience over data-supported facts and increase audience understanding and acceptance of data-driven solutions.
    • Clear articulation of business context and problem.
    • High-level improvement objectives and return on investment (ROI).
    • Gain insights from data-driven recommendations to assist with making informed decisions.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit Guided Implementation Workshop Consulting
    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks are used throughout all four options.

    Adopt Generative AI in Solution Delivery

    • Buy Link or Shortcode: {j2store}146|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Development
    • Parent Category Link: /development
    • Delivery teams are under continuous pressure to deliver high value and quality solutions with limited capacity in complex business and technical environments. Common challenges experienced by these teams include:
      • Attracting and retaining talent
      • Maximizing the return on technology
      • Confidently shifting to digital
      • Addressing competing priorities
      • Fostering a collaborative culture
      • Creating high-throughput teams
    • Gen AI offers a unique opportunity to address many of these challenges.

    Our Advice

    Critical Insight

    • Your stakeholders' understanding of Gen AI, its value, and its application can be driven by hype and misinterpretation. This confusion can lead to unrealistic expectations and set the wrong precedent for the role Gen AI is intended to play.
    • Your SDLC is not well documented and is often executed inconsistently. An immature practice will not yield the benefits stakeholders expect.
    • The Gen AI marketplace is broad and diverse. Selecting the appropriate tools and partners is confusing and overwhelming.
    • There is a skills gap for what is needed to configure, adopt, and operate Gen AI.

    Impact and Result

    • Ground your Gen AI expectations. Set realistic and achievable goals centered on driving business value and efficiency across the entire SDLC by enabling Gen AI in key tasks and activities. Propose the SDLC as the ideal pilot for Gen AI.
    • Select the right Gen AI opportunities. Discuss how proven Gen AI capabilities can be applied to your solution delivery practice to achieve the outcomes and priorities stakeholders expect. Lessons learned sow the foundation for future Gen AI scaling.
    • Assess your Gen AI readiness in your solution delivery teams. Clarify the roles, processes, and tools needed for the implementation, use, and maintenance of Gen AI.

    Adopt Generative AI in Solution Delivery Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Adopt Generative AI in Solution Delivery Storyboard – A step-by-step guide that helps you assess whether Gen AI is right for your solution delivery practices.

    Gain an understanding of the potential opportunities that Gen AI can provide your solution delivery practices and answer the question "What should I do next?"

    • Adopt Generative AI in Solution Delivery Storyboard

    2. Gen AI Solution Delivery Readiness Assessment Tool – A tool to help you understand if your solution delivery practice is ready for Gen AI.

    Assess the readiness of your solution delivery team for Gen AI. This tool will ask several questions relating to your people, process, and technology, and recommend whether or not the team is ready to adopt Gen AI practices.

    • Gen AI Solution Delivery Readiness Assessment Tool
    [infographic]

    Further reading

    Adopt Generative AI in Solution Delivery

    Drive solution quality and team productivity with the right generative AI capabilities.

    Analyst Perspective

    Build the case for Gen AI with the right opportunities.

    Generative AI (Gen AI) presents unique opportunities to address many solution delivery challenges. Code generation can increase productivity, synthetic data generation can produce usable test data, and scanning tools can identify issues before they occur. To be successful, teams must be prepared to embrace the changes that Gen AI brings. Stakeholders must also give teams the opportunity to optimize their own processes and gauge the fit of Gen AI.

    Start small with the intent to learn. The right pilot initiative helps you learn the new technology and how it benefits your team without the headache of complex setups and lengthy training and onboarding. Look at your existing solution delivery tools to see what Gen AI capabilities are available and prioritize the use cases where Gen AI can be used out of the box.

    This is a picture of Andrew Kum-Seun

    Andrew Kum-Seun
    Research Director,
    Application Delivery and Management
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    Delivery teams are under continuous pressure to deliver high-value, high-quality solutions with limited capacity in complex business and technical environments. Common challenges experienced by these teams include:

    • Attracting and retaining talent
    • Maximizing the return on technology
    • Confidently shifting to digital
    • Addressing competing priorities
    • Fostering a collaborative culture
    • Creating high-throughput teams

    Generative AI (Gen AI) offers a unique opportunity to address many of these challenges.

    Common Obstacles

    • Your stakeholders' understanding of what is Gen AI, its value and its application, can be driven by hype and misinterpretation. This confusion can lead to unrealistic expectations and set the wrong precedent for the role Gen AI is intended to play.
    • Your solution delivery process is not well documented and is often executed inconsistently. An immature practice will not yield the benefits stakeholders expect.
    • The Gen AI marketplace is very broad and diverse. Selecting the appropriate tools and partners is confusing and overwhelming.
    • There is a skills gap for what is needed to configure, adopt, and operate Gen AI.

    Info-Tech's Approach

    • Ground your Gen AI expectations. Set realistic and achievable goals centered on driving business value and efficiency across the entire solution delivery process by enabling Gen AI in key tasks and activities. Propose this process as the ideal pilot for Gen AI.
    • Select the right Gen AI opportunities. Discuss how proven Gen AI capabilities can be applied to your solution delivery practice and achieve the outcomes and priorities stakeholders expect. Lessons learned sow the foundation for future Gen AI scaling.
    • Assess your Gen AI readiness in your solution delivery teams. Clarify the roles, processes, and tools needed for the implementation, use, and maintenance of Gen AI.

    Info-Tech Insight

    Position Gen AI as a tooling opportunity to enhance the productivity and depth of your solution delivery practice. Current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery. Assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.

    Insight Summary

    Overarching Info-Tech Insight

    Position Gen AI is a tooling opportunity to enhance the productivity and depth of your solution delivery practice. However, current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery. Assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.

    Understand and optimize first, automate with Gen AI later.
    Gen AI magnifies solution delivery inefficiencies and constraints. Adopt a user-centric perspective to understand your solution delivery teams' interactions with solution delivery tools and technologies to better replicate how they complete their tasks and overcome challenges.

    Enable before buy. Buy before build.
    Your solution delivery vendors see AI as a strategic priority in their product and service offering. Look into your existing toolset and see if you already have the capabilities. Otherwise, prioritize using off-the-shelf solutions with pre-trained Gen AI capabilities and templates.

    Innovate but don't experiment.
    Do not reinvent the wheel and lower your risk of success. Stick to the proven use cases to understand the value and fit of Gen AI tools and how your teams can transform the way they work. Use your lessons learned to discover scaling opportunities.

    Blueprint benefits

    IT benefits

    Business benefits

    • Select the Gen AI tools and capabilities that meet both the solution delivery practice and team goals, such as:
    • Improved team productivity and throughput.
    • Increased solution quality and value.
    • Greater team satisfaction.
    • Motivate stakeholder buy-in for the investment in solution delivery practice improvements.
    • Validate the fit and opportunities with Gen AI for future adoption in other IT departments.
    • Increase IT satisfaction by improving the throughput and speed of solution delivery.
    • Reduce the delivery and operational costs of enterprise products and services.
    • Use a pilot to demonstrate the fit and value of Gen AI capabilities and supporting practices across business and IT units.

    What is Gen AI?

    An image showing where Gen AI sits within the artificial intelligence.  It consists of four concentric circles.  They are labeled from outer-to-inner circle in the following order: Artificial Intelligence; Machine Learning; Deep Learning; Gen AI

    Generative AI (Gen AI)
    A form of ML whereby, in response to prompts, a Gen AI platform can generate new output based on the data it has been trained on. Depending on its foundational model, a Gen AI platform will provide different modalities and use case applications.

    Machine Learning (ML)
    The AI system is instructed to search for patterns in a data set and then make predictions based on that set. In this way, the system learns to provide accurate content over time. This requires a supervised intervention if the data is inaccurate. Deep learning is self-supervised and does not require intervention.

    Artificial Intelligence (AI)
    A field of computer science that focuses on building systems to imitate human behavior. Not all AI systems have learning behavior; many systems (such as customer service chatbots) operate on preset rules.

    Info-Tech Insight

    Many vendors have jumped on Gen AI as the latest marketing buzzword. When vendors claim to offer Gen AI functionality, pin down what exactly is generative about it. The solution must be able to induce new outputs from inputted data via self-supervision – not trained to produce certain outputs based on certain inputs.

    Augment your solution delivery teams with Gen AI

    Position Gen AI as a tooling opportunity to enhance the productivity and depth of your solution delivery practice. Current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery; assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.

    Solution Delivery Team

    Humans

    Gen AI Bots

    Product owner and decision maker
    Is accountable for the promised delivery of value to the organization.

    Business analyst and architect
    Articulates the requirements and aligns the team to the business and technical needs.

    Integrator and builder
    Implements the required solution.

    Collaborator
    Consults and supports the delivery.

    Administrator
    Performs common administrative tasks to ensure smooth running of the delivery toolchain and end-solutions.

    Designer and content creator
    Provides design and content support for common scenarios and approaches.

    Paired developer and tester
    Acts as a foil for existing developer or tester to ensure high quality output.

    System monitor and support
    Monitors and recommends remediation steps for operational issues that occur.

    Research deliverable

    This research is accompanied by a supporting deliverable to help you accomplish your goals.

    Gen AI Solution Delivery Readiness Assessment Tool

    Assess the readiness of your solution delivery team for Gen AI. This tool will ask several questions relating to your people, process, and technology, and recommend whether the team is ready to adopt Gen AI practices.

    This is a series of three screenshots from the Gen AI Solution Delivery Readiness Assessment Tool

    Step 1.1

    Set the context

    Activities

    1.1.1 Understand the challenges of your solution delivery teams.

    1.1.2 Outline the value you expect to gain from Gen AI.

    This step involves the following participants:

    • Applications VP
    • Applications Director
    • Solution Delivery Manager
    • Solution Delivery Team

    Outcomes of this step

    • SWOT Analysis to help articulate the challenges facing your teams.
    • A Gen AI Canvas that will articulate the value you expect to gain.

    IT struggles to deliver solutions effectively

    • Lack of skills and resources
      Forty-six percent of respondents stated that it was very or somewhat difficult to attract, hire, and retain developers (GitLab, 2023; N=5,010).
    • Delayed software delivery
      Code development (37%), monitoring/observability (30%), deploying to non-production environments (30%), and testing (28%) were the top areas where software delivery teams or organizations encountered the most delays (GitLab, 2023, N=5,010).
    • Low solution quality and satisfaction
      Only 64% of applications were identified as effective by end users. Effective applications are identified as at least highly important and have high feature and usability satisfaction (Application Portfolio Assessment, August 2021 to July 2022; N=315).
    • Burnt out teams
      While workplace flexibility comes with many benefits, longer work hours jeopardize wellbeing. Sixty-two percent of organizations reported increased working hours, while 80% reported an increase in flexibility ("2022 HR Trends Report," McLean & Company, 2022; N=394) .

    Creating high-throughput teams is an organizational priority.

    CXOs ranked "optimize IT service delivery" as the second highest priority. "Achieve IT business" was ranked first.

    (CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568)

    1.1.1 Understand the challenges of your solution delivery teams

    1-3 hours

    1. Complete a SWOT analysis of your solution delivery team to discover areas where Gen AI can be applied.
    2. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

    Strengths

    Internal characteristics that are favorable as they relate to solution delivery

    Weaknesses

    Internal characteristics that are unfavorable or need improvement

    Opportunities

    External characteristics that you may use to your advantage

    Threats

    External characteristics that may be potential sources of failure or risk

    Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

    Output

    • SWOT analysis of current state of solution delivery practice

    Participants

    • Applications VP
    • Applications Director
    • Solution Delivery Manager
    • Solution Delivery Team

    Gen AI can help solve your solution delivery challenges

    Why is software delivery an ideal pilot candidate for Gen AI?

    • Many software delivery practices are repeatable and standardized.
    • Software delivery roles that are using and implementing Gen AI are technically savvy.
    • Automation is a staple in many commonly used tools.
    • Change will likely not impact business operations.

    Improved productivity

    Gen AI jumpstarts the most laborious and mundane parts of software delivery. Delivery teams saved 22 hours (avg) per software use case when using AI in 2022, compared to last year when AI was not used ("Generative AI Speeds Up Software Development," PRNewswire, 2023).

    Fungible resources

    Teams are transferrable across different frameworks, platforms, and products. Gen AI provides the structure and guidance needed to work across a wider range of projects ("Game changer: The startling power generative AI is bringing to software development," KPMG, 2023).

    Improved solution quality

    Solution delivery artifacts (e.g. code) are automatically scanned to quickly identify bugs and defects based on recent activities and trends and validate against current system performance and capacity.

    Business empowerment

    AI enhances the application functionalities workers can build with low- and no-code platforms. In fact, "AI high performers are 1.6 times more likely than other organizations to engage non-technical employees in creating AI applications" ("The state of AI in 2022 — and a half decade in review." McKinsey, 2022, N=1,492).

    However, various fears, uncertainties, and doubts challenge Gen AI adoption

    Black Box

    Little transparency is provided on the tool's rationale behind content creation, decision making, and the use and storage of training data, creating risks for legal, security, intellectual property, and other areas.

    Role Replacement

    Some workers have job security concerns despite Gen AI being bound to their rule-based logic framework, the quality of their training data, and patterns of consistent behavior.

    Skills Gaps

    Teams need to gain expertise in AI/ML techniques, training data preparation, and continuous tooling improvements to support effective Gen AI adoption across the delivery practice and ensure reliable operations.

    Data Inaccuracy

    Significant good quality data is needed to build trust in the applicability and reliability of Gen AI recommendations and outputs. Teams must be able to combine Gen AI insights with human judgment to generate the right outcome.

    Slow Delivery of AI Solution

    Timelines are sensitive to organizational maturity, experience with Gen AI, and investments in good data management practices. 65% of organizations said it took more than three months to deploy an enterprise-ready AIOps solution (OpsRamp, 2022).

    Define the value you want Gen AI to deliver

    Well-optimized Gen AI instills stakeholder confidence in ongoing business value delivery and ensures stakeholder buy-in, provided proper expectations are set and met. However, business value is not interpreted or prioritized the same across the organization. Come to a common business value definition to drive change in the right direction by balancing the needs of the individual, team, and organization.

    Business value cannot always be represented by revenue or reduced expenses. Dissecting value by the benefit type and the value source's orientation allows you to see the many ways in which Gen AI brings value to the organization.

    Financial benefits vs. intrinsic needs

    • Financial benefits refers to the degree to which the value source can be measured through monetary metrics, such as revenue generation and cost saving.
    • Intrinsic needs refers to how a product, service, or business capability enhanced with Gen AI meets functional, user experience, and existential needs.

    Inward vs. outward orientation

    • Inward refers to value sources that are internally impacted by Gen AI and improve your employees' and teams' effectiveness in performing their responsibilities.
    • Outward refers to value sources that come from your interaction with external stakeholders and customers and were improved from using Gen AI.

    See our Build a Value Measurement Framework blueprint for more information about business value definition.

    An image of the Business Value Matrix for Gen AI

    Measure success with the right metrics

    Establishing and monitoring metrics are powerful ways to drive behavior and strategic changes in your organization. Determine the right measures that demonstrate the value of your Gen AI implementation by aligning them with your Gen AI objectives, business value drivers, and non-functional requirements.

    Select metrics with different views

    1. Solution delivery practice effectiveness
      The ability of your practice to deliver, support, and operate solutions with Gen AI
      Examples: Solution quality and throughput, delivery and operational costs, number of defects and issues, and system quality
    2. Solution quality and value
      The outcome of your solutions delivered with Gen AI tools
      Examples: Time and money saved, utilization of products and services, speed of process execution, number of errors, and compliance with standards
    3. Gen AI journey goals and milestones
      Your organization's position in your Gen AI journey
      Examples: Maturity score, scope of Gen AI adoption, comfort and
      confidence with Gen AI capabilities, and complexity of Gen AI use cases

    Leverage Info-Tech's Diagnostics

    IT Management & Governance

    • Improvement to application development quality and throughput effectiveness
    • Increased importance of application delivery and maintenance capabilities across the IT organization
    • Delegation of delivery accountability across more IT roles

    CIO Business Vision

    • Improvements to IT satisfaction and value from delivered solutions
    • Changes to the value and importance of IT core services enabled with Gen AI
    • The state of business and IT relationships
    • Capability to deliver and support Gen AI effectively

    1.1.2 Outline the value you expect to gain from Gen AI

    1-3 hours

    1. Complete the following fields to build your Gen AI canvas:
      1. Problem that Gen AI is intending to solve
      2. List of stakeholders
      3. Desired business and IT outcomes
      4. In-scope solution delivery teams, systems, and capabilities.
    2. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

    Output

    • Gen AI Canvas

    Participants

    • Applications VP
    • Applications Director
    • Solution Delivery Manager
    • Solution Delivery Team

    Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

    1.1.2 Example

    Example of an outline of the value you expect to gain from Gen AI

    Problem statements

    • Manual testing procedures hinder pace and quality of delivery.
    • Inaccurate requirement documentation leads to constant redesigning.

    Business and IT outcomes

    • Improve code quality and performance.
    • Expedite solution delivery cycle.
    • Improve collaboration between teams and reduce friction.

    List of stakeholders

    • Testing team
    • Application director
    • CIO
    • Design team
    • Project manager
    • Business analysts

    In-scope solution delivery teams, system, and capabilities

    • Web
    • Development
    • App development
    • Testing
    • Quality assurance
    • Business analysts
    • UI/UX design

    Align your objectives to the broader AI strategy

    Why is an organizational AI strategy important for Gen AI?

    • All Gen AI tactics and capabilities are designed, delivered, and managed to support a consistent interpretation of the broader AI vision and goals.
    • An organizational strategy gives clear understanding of the sprawl, criticality, and risks of Gen AI solutions and applications to other IT capabilities dependent on AI.
    • Gen AI initiatives are planned, prioritized, and coordinated alongside other software delivery practice optimizations and technology modernization initiatives.
    • Resources, skills, and capacities are strategically allocated to meet the needs of Gen AI considering other commitments in the software delivery optimization backlog and roadmap.
    • Gen AI expectations and practices uphold the persona, values, and principles of the software delivery team.

    What is an AI strategy?

    An AI strategy details the direction, activities, and tactics to deliver on the promise of your AI portfolio. It often includes:

    • AI vision and goals
    • Application, automation, and process portfolio involved or impacted by AI
    • Values and principles
    • Health of your AI portfolio
    • Risks and constraints
    • Strategic roadmap

    Step 1.2

    Evaluate opportunities for Gen AI

    Activities

    1.2.1 Align Gen AI opportunities with teams and capabilities.

    This step involves the following participants:

    • Applications VP
    • Applications Director
    • Solution Delivery Manager
    • Solution Delivery Team

    Outcomes of this step

    • Understand the Gen AI opportunities for your solution delivery practice.

    Learn how Gen AI is employed in solution delivery

    Gen AI opportunity Common Gen AI tools and vendors Teams than can benefit How can teams leverage this? Case study
    Synthetic data generation
    • Testing
    • Data Analysts
    • Privacy and Security
    • Create test datasets
    • Replace sensitive personal data

    How Unity Leverages Synthetic Data

    Code generation
    • Development
    • Testing
    • Code Templates & Boilerplate
    • Code Refactoring

    How CI&T accelerated development by 11%

    Defect forecasting and debugging
    • Project Manager & Quality Assurance
    • Development
    • Testing
    • Identify root cause
    • Static and dynamic code analysis
    • Debugging assistance

    Altran Uses Microsoft Code Defect AI Solution

    Requirements documentation and elicitation
    • Business Analysts
    • Development
    • Document functional requirements
    • Writing test cases

    Google collaborates with Replit to reduce time to bring new products to market by 30%

    UI design and prototyping
    • UI/UX Design
    • Development
    • Deployment
    • Rapid prototyping
    • Design assistance

    How Spotify is Upleveling Their Entire Design Team

    Other common AI opportunities solutions include test case generation, code translation, use case creation, document generation, and automated testing.

    Opportunity 1: Synthetic data generation

    Create artificial data that mimics the structure of real-life data.

    What are the expected benefits?

    • Availability of test data: Creation of large volumes of data compatible for testing multiple systems within the organization.
    • Improved privacy: Substituting real data with artificial leads to reduced data leaks.
    • Quicker data provisioning: Automated generation of workable datasets aligned to company policies.

    What are the notable risks and challenges?

    • Generalization and misrepresentations: Data models used in synthetic data generation may not be an accurate representation of production data because of potentially conflicting definitions, omission of dependencies, and multiple sources of truth.
    • Lack of accurate representation: It is difficult for synthetic data to fully capture real-world data nuances.
    • Legal complexities: Data to build and train the Gen AI tool does not comply with data residency and management standards and regulations.

    How should teams prepare for synthetic data generation?

    It can be used:

    • To train machine learning models when there is not enough real data, or the existing data does not meet specific needs.
    • To improve quality of test by using data that closely resembles production without the risk of leveraging sensitive and private information.

    "We can simply say that the total addressable market of synthetic data and the total addressable market of data will converge,"
    Ofir Zuk, CEO, Datagen (Forbes, 2022)

    Opportunity 2: Code generation

    Learn patterns and automatically generate code.

    What are the expected benefits?

    • Increased productivity: It allows developers to generate more code quickly.
    • Improved code consistency: Code is generated using a standardized model and lessons learnt from successful projects.
    • Rapid prototyping: Expedite development of a working prototype to be verified and validated.

    What are the notable risks and challenges?

    • Limited contextual understanding: AI may lack domain-specific knowledge or understanding of requirements.
    • Dependency: Overreliance on AI generated codes can affect developers' creativity.
    • Quality concerns: Generated code is untested and its alignment to coding and quality standards is unclear.

    How should teams prepare for code generation?

    It can be used to:

    • Build solutions without the technical expertise of traditional development.
    • Discover different solutions to address coding challenges.
    • Kickstart new development projects with prebuilt code.

    According to a survey conducted by Microsoft's GitHub, a staggering 92% of programmers were reported as using AI tools in their workflow (GitHub, 2023).

    Opportunity 3: Defect forecasting & debugging

    Predict and proactively address defects before they occur.

    What are the expected benefits?

    • Reduced maintenance cost: Find defects earlier in the delivery process, when it's cheaper to fix them.
    • Increased efficiency: Testing efforts can remain focused on critical and complex areas of solution.
    • Reduced risk: Find critical defects before the product is deployed to production.

    What are the notable risks and challenges?

    • False positives and negatives: Incorrect interpretation and scope of defect due to inadequate training of the Gen AI model.
    • Inadequate training: Training data does not reflect the complexity of the solutions code.
    • Not incorporating feedback: Gen AI models are not retrained in concert with solution changes.

    How should teams prepare for defect forecasting and debugging?

    It can be used to:

    • Perform static and dynamic code analysis to find vulnerabilities in the solution source code.
    • Forecast potential issues of a solution based on previous projects and industry trends.
    • Find root cause and suggest solutions to address found defects.

    Using AI technologies, developers can reduce the time taken to debug and test code by up to 70%, allowing them to finish projects faster and with greater accuracy (Aloa, 2023).

    Opportunity 4: Requirements documentation & elicitation

    Capturing, documenting, and analyzing function and nonfunctional requirements.

    What are the expected benefits?

    • Improve quality of requirements: Obtain different perspectives and contexts for the problem at hand and help identify ambiguities and misinterpretation of risks and stakeholder expectation.
    • Increased savings: Fewer resources are consumed in requirements elicitation activities.
    • Increased delivery confidence: Provide sufficient information for the solution delivery team to confidently estimate and commit to the delivery of the requirement.

    What are the notable risks and challenges?

    • Conflicting bias: Gen AI models may interpret the problem differently than how the stakeholders perceive it.
    • Organization-specific interpretation: Inability of the Gen AI models to accommodate unique interpretation of terminologies, standards, trends and scenarios.
    • Validation and review: Interpreting extracted insights requires human validation.

    How should teams prepare for requirements documentation & elicitation?

    It can be used to:

    • Document requirements in a clear and concise manner that is usable to the solution delivery team.
    • Analyze and test requirements against various user, business, and technical scenarios.

    91% of top businesses surveyed report having an ongoing investment in AI (NewVantage Partners, 2021).

    Opportunity 5: UI design and prototyping

    Analyze existing patterns and principles to generate design, layouts, and working solutions.

    What are the expected benefits?

    • Increased experimentation: Explore different approaches and tactics to solve a solution delivery problem.
    • Improved collaboration: Provide quick design layouts that can be reshaped based on stakeholder feedback.
    • Ensure design consistency: Enforce a UI/UX design standard for all solutions.

    What are the notable risks and challenges?

    • Misinterpretation of UX Requirements: Gen AI model incorrectly assumes a specific interpretation of user needs, behaviors, and problem.
    • Incorrect or missing requirements: Lead to extensive redesigns and iterations, adding to costs while hampering user experience.
    • Design creativity: May lack originality and specific brand aesthetics if not augmented well with human customizability and creativity.

    How should teams prepare for UI design and prototyping?

    It can be used to:

    • Visualize the solution through different views and perspectives such as process flows and use-case diagrams.
    • Create working prototypes that can be verified and validated by stakeholders and end users.

    A study by McKinsey & Company found that companies that invest in AI-driven design outperform their peers in revenue growth and customer experience metrics. They were found to achieve up to two times higher revenue growth than industry peers and up to 10% higher net promoter score (McKinsey & Company, 2018).

    Determine the importance of your opportunities by answering these questions

    Realizing the complete potential of Gen AI relies on effectively fostering its adoption and resulting changes throughout the entire solution delivery process.

    What are the challenges faced by your delivery teams that could be addressed by Gen AI?

    • Recognize the precise pain points, bottlenecks, or inefficiencies faced by delivery teams.
    • Include all stakeholders' perspectives during problem discovery and root cause analysis.

    What's holding back Gen AI adoption in the organization?

    • Apart from technical barriers, address cultural and organizational challenges and discuss how organizational change management strategies can mitigate Gen AI adoption risk.

    Are your objectives aligned with Gen AI capabilities?

    • Identify areas where processes can be modernized and streamlined with automation.
    • Evaluate the current capabilities and resources available within the organization to leverage Gen AI technologies effectively.

    How can Gen AI improve the entire solution delivery process?

    • Investigate and evaluate the improvements Gen AI can reasonably deliver, such as increased accuracy, quickened delivery cycles, improved code quality, or enhanced cross-functional collaboration.

    1.2.1 Align Gen AI opportunities to teams and capabilities

    1-3 hours

    1. Associate the Gen AI opportunities that can be linked to your system capabilities. These opportunities refer to the potential applications of generative AI techniques, such as code generation or synthetic data, to address specific challenges.
      1. Start by analyzing your system's requirements, constraints, and areas where Gen AI techniques can bring value. Identify the potential benefits of integrating Gen AI, such as increased productivity, or enhanced creativity.
      2. Next, discern potential risks or challenges, such as dependency or quality concerns, associated with the opportunity implementation.
    2. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

    Output

    • Gen AI opportunity selection

    Participants

    • Applications VP
    • Applications Director
    • Solution Delivery Manager
    • Solution Delivery Team

    Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

    Keep an eye out for red flags

    Not all Gen AI opportunities are delivered and adopted the same. Some present a bigger risk than others.

    • Establishing vague targets and success criteria
    • Defining Gen AI as substitution of human capital
    • Open-source software not widely adopted or validated
    • High level of dependency on automation
    • Unadaptable cross-functional training across organization
    • Overlooking privacy, security, legal, and ethical implications
    • Lack of Gen AI expertise and understanding of good practices

    Step 1.3

    Assess your readiness for Gen AI

    Activities

    1.3.1 Assess your readiness for Gen AI.

    This step involves the following participants:

    • Applications VP
    • Applications Director
    • Solution Delivery Manager
    • Solution Delivery Team

    Outcomes of this step

    • A completed Gen AI Readiness Assessment to confirm how prepared you are to embrace Gen AI in your solution delivery team.

    Prepare your SDLC* to leverage Gen AI

    As organizations evolve and adopt more tools and technology, their solution delivery processes become more complex. Process improvement is needed to simplify complex and undocumented software delivery activities and artifacts and prepare it for Gen AI. Gen AI scales process throughput and output quantity, but it multiplies the negative impact of problems the process already has.

    When is your process ready for Gen AI?

    • Solution value Ensures the accuracy and alignment of the committed feature and change requests to what the stakeholder truly expects and receives.
    • ThroughputDelivers new products, enhancements, and changes at a pace and frequency satisfactory to stakeholder expectations and meets delivery commitments.
    • Process governance Has clear ownership and appropriate standardization. The roles, activities, tasks, and technologies are documented and defined. At each stage of the process someone is responsible and accountable.
    • Process management Follows a set of development frameworks, good practices, and standards to ensure the solution and relevant artifacts are built, tested, and delivered consistently and repeatably.
    • Technical quality assurance – Accommodates committed non-functional requirements within the stage's outputs to ensure products meet technical excellence expectations.

    *software development lifecycle

    To learn more, visit Info-Tech's Modernize Your SDLC blueprint.

    To learn more, visit Info-Tech's Build a Winning Business Process Automation Playbook

    Assess the impacts from Gen AI changes

    Ensure that no stone is left unturned as you evaluate the fit of Gen AI and prepare your adoption and support plans.

    By shining a light on considerations that might have otherwise escaped planners and decision makers, an impact analysis is an essential component to Gen AI success. This analysis should answer the following questions on the impact to your solution delivery teams.

    1. Will the change impact how our clients/customers receive, consume, or engage with our products/services?
    2. Will there be an increase in operational costs, and a change to compensation and/or rewards?
    3. Will this change increase the workload and alter staffing levels?
    4. Will the vision or mission of the team change?
    5. Will a new or different set of skills be needed?
    6. Will the change span multiple locations/time zones?
    7. Are multiple products/services impacted by this change?
    8. Will the workflow and approvals be changed, and will there be a substantial change to scheduling and logistics?
    9. Will the tools of the team be substantially different?
    10. Will there be a change in reporting relationships?

    See our Master Organizational Change Management Practices blueprint for more information.

    Brace for impact

    A thorough analysis of change impacts will help your software delivery teams and change leaders:

    • Bypass avoidable problems.
    • Remove non-fixed barriers to success.
    • Acknowledge and minimize the impact of unavoidable barriers.
    • Identify and leverage potential benefits.
    • Measure the success of the change.

    Many key IT capabilities are required to successfully leverage Gen AI

    Portfolio Management

    An accurate and rationalized inventory of all Gen AI tools verifies they support the goals and abide to the usage policies of the broader delivery practice. This becomes critical when tooling is updated frequently and licenses and open- source community principles drastically change (e.g. after an acquisition).

    Quality Assurance

    Gen AI tools are routinely verified and validated to ensure outcomes are accurate, complete, and aligned to solution delivery quality standards. Models are retrained using lessons learned, new use cases, and updated training data.

    Security & Access Management

    Externally developed and trained Gen AI models may not include the measures, controls, and tactics you need to prevent vulnerabilities and protect against threats that are critical in your security frameworks, policies, and standards.

    Data Management & Governance

    All solution delivery data and artifacts can be transformed and consumed in various ways as they transit through solution delivery and Gen AI tools. Data integrations, structures, and definitions must be well-defined, governed, and monitored.

    OPERATIONAL SUPPORT

    Resources are available to support the ongoing operations of the Gen AI tool, including infrastructure, preparing training data, and managing integration with other tools. They are also prepared to recover backups, roll back, and execute recovery plans at a moment's notice.

    Apply Gen AI good practices in your solution delivery practice

    1. Keep the human in the loop.
      Gen AI models cannot produce high-quality content with 100% confidence. Keeping the human in the loop allows people to directly give feedback to the model to improve output quality.
    2. Strengthen prompt and query engineering.
      The value of the outcome is dependent on what is being asked. Good prompts and queries focus on creating the optimal input by selecting and phrasing the appropriate words, sentence structures, and punctuation to illustrate the focus, scope, problem, and boundaries.
    3. Thoughtfully prepare your training data.
      Externally hosted Gen AI tools may store your training data in their systems or use it to train their other models. Intellectual property and sensitive data can leak into third-party systems and AI models if it is not properly masked and sanitized.
    4. Build guardrails into your Gen AI models.
      Guardrails can limit the variability of any misleading Gen AI responses by defining the scope and bounds of the response, enforcing the policies of its use, and clarifying the context of its response.
    5. Monitor your operational costs.
      The cost breakdown will vary among the types of Gen AI solution and the vendor offerings. Cost per query, consultant fees, infrastructure hosting, and licensing costs are just a few cost factors. Open source can be an attractive cost-saving option, but you must be willing to invest in the roles to assume traditional vendor accountabilities.
    6. Check the licenses of your Gen AI tool.
      Each platform has licenses and agreements on how their solution can or cannot be used. They limit your ability to use the tool for commercial purposes or reproductions or may require you to purchase and maintain a specific license to use their solution and materials.

    See Build Your Generative AI Roadmap for more information.

    Assess your Gen AI readiness

    • Solution delivery team
      The team is educated on Gen AI, its use cases, and the tools that enable it. They have the skills and capacity to implement, create, and manage Gen AI.
    • Solution delivery process and tools
      The solution delivery process is documented, repeatable, and optimized to use Gen AI effectively. Delivery tools are configured to enable, leverage and manage Gen AI assets to improve their performance and efficiency.
    • Solution delivery artifacts
      Delivery artifacts (e.g. code, scripts, documents) that will be used to train and be leveraged by Gen AI tools are discoverable, accurate, complete, standardized, of sufficient quantity, optimized for Gen AI use, and stored in an accessible shared central repository.
    • Governance
      Defined policies, role definitions, guidelines, and processes that guide the implementation, development, operations, and management of Gen AI.
    • Vision and executive support
      Clear alignment of Gen AI direction, ambition, and objectives with broader business and IT priorities. Stakeholders support the Gen AI initiative and allocate human and financial resources for its implementation within the solution delivery team.
    • Operational support
      The capabilities to manage the Gen AI tools and ensure they support the growing needs of the solution delivery practice, such as security management, hosting infrastructure, risk and change management, and data and application integration.

    1.3.1 Assess your readiness for Gen AI

    1-3 hours

    1. Review the current state of your solution delivery teams including their capacity, skills and knowledge, delivery practices, and tools and technologies.
    2. Determine the readiness of your team to adopt Gen AI.
    3. Discuss the gaps that need to be filled to be successful with Gen AI.
    4. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

    Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

    Output

    • Gen AI Solution Delivery Readiness Assessment

    Participants

    • Applications VP
    • Applications Director
    • Solution Delivery Manager
    • Solution Delivery Team

    Recognize that Gen AI does not require a fully optimized solution delivery process

    1. Consideration; 2. Exploration; 3. Incorporation; 4. Proliferation; 5. Optimization.  Steps 3-5 are Recommended maturity levels to properly embrace Gen AI.

    To learn more, visit Info-Tech's Develop Your Value-First Business Process Automation (BPA) Strategy.

    Be prepared to take the next steps

    Deliver Gen AI to your solution delivery teams

    Modernize Your SDLC
    Efficient and effective SDLC practices are vital, as products need to readily adjust to evolving and changing business needs and technologies.

    Adopt Generative AI in Solution Delivery
    Generative AI can drive productivity and solution quality gains to your solution delivery teams. Level set expectations with the right use case to demonstrate its value potential.

    Select Your AI Vendor & Implementation Partner
    The right vendor and partner are critical for success. Build the selection criteria to shortlist the products and services that best meets the current and future needs of your teams.

    Drive Business Value With Off-the-Shelf AI
    Build a framework that will guide your teams through the selection of an off-the-shelf AI tool with a clear definition of the business case and preparations for successful adoption.

    Build Your Enterprise Application Implementation Playbook
    Your Gen AI implementation doesn't start with technology, but with an effective plan that your team supports and is aligned to broader stakeholder and sponsor priorities and goals.

    Build your Gen AI practice

    • Get Started With AI
    • AI Strategy & Generative AI Roadmap
    • AI Governance

    Related Info-Tech Research

    Build a Winning Business Process Automation Playbook
    Optimize and automate your business processes with a user-centric approach.

    Embrace Business Managed Applications
    Empower the business to implement their own applications with a trusted business-IT relationship.

    Application Portfolio Management Foundations
    Ensure your application portfolio delivers the best possible return on investment.

    Maximize the Benefits from Enterprise Applications with a Center of Excellence
    Optimize your organization's enterprise application capabilities with a refined and scalable methodology.

    Create an Architecture for AI
    Build your target state architecture from predefined best-practice building blocks.

    Deliver on Your Digital Product Vision
    Build a product vision your organization can take from strategy through execution.

    Enhance Your Solution Architecture Practices
    Ensure your software systems solution is architected to reflect stakeholders' short- and long-term needs.

    Apply Design Thinking to Build Empathy With the Business
    Use design thinking and journey mapping to make IT the business' go-to problem solver.

    Modernize Your SDLC
    Deliver quality software faster with new tools and practices.

    Drive Business Value With Off-the-Shelf AI
    A practical guide to ensure return on your off-the-shelf AI investment.

    Bibliography

    "Altran Helps Developers Write Better Code Faster with Azure AI." Microsoft, 2020.
    "Apply Design Thinking to Complex Teams, Problems, and Organizations." IBM, 2021.
    Bianca. "Unleashing the Power of AI in Code Generation: 10 Applications You Need to Know — AITechTrend." AITechTrend, 16 May 2023.
    Biggs, John. "Deep Code Cleans Your Code with the Power of AI." TechCrunch, 26 Apr 2018.
    "Chat GPT as a Tool for Business Analysis — the Brazilian BA." The Brazilian BA, 24 Jan 2023.
    Davenport, Thomas, and Randy Bean. "Big Data and AI Executive Survey 2019." New Vantage Partners, 2019.
    Davenport, Thomas, and Randy Bean. "Big Data and AI Executive Survey 2021." New Vantage Partners, 2021.
    Das, Tamal. "9 Best AI-Powered Code Completion for Productive Development." Geek flare, 5 Apr 2023.
    Gondrezick, Ilya. "Council Post: How AI Can Transform the Software Engineering Process." Forbes, 24 Apr 2020.
    "Generative AI Speeds up Software Development: Compass UOL Study." PR Newswire, 29 Mar 2023.
    "GitLab 2023 Global Develops Report Series." Gitlab, 2023.
    "Game Changer: The Startling Power Generative AI Is Bringing to Software Development." KPMG, 30 Jan 2023.
    "How AI Can Help with Requirements Analysis Tools." TechTarget, 28 July 2020.
    Indra lingam, Ashanta. "How Spotify Is Upleveling Their Entire Design Team." Framer, 2019.
    Ingle, Prathamesh. "Top Artificial Intelligence (AI) Tools That Can Generate Code to Help Programmers." Matchcoat, 1 Jan 2023.
    Kaur, Jagreet . "AI in Requirements Management | Benefits and Its Processes." Xenon Stack, 13 June 2023.
    Lange, Danny. "Game On: How Unity Is Extending the Power of Synthetic Data beyond the Gaming Industry." CIO, 17 Dec 2020.
    Lin, Ying. "10 Artificial Intelligence Statistics You Need to Know in 2020." OBERLO, 17 Mar. 2023.
    Mauran, Cecily. "Whoops, Samsung Workers Accidentally Leaked Trade Secrets via ChatGPT." Mashable, 6 Apr 2023.

    Do you believe in absolute efficiency?

    Weekend read. Hence I post this a bit later on Friday.
    Lately, I've been fascinated by infinity. And in infinity, some weird algebra pops up. Yet that weirdness is very much akin to what our business stakeholders want, driven by what our clients demand, and hence our KPIs drive us. Do more with less. And that is what absolute efficiency means.

    Register to read more …

    Analyze Your Service Desk Ticket Data

    • Buy Link or Shortcode: {j2store}483|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $6,499 Average $ Saved
    • member rating average days saved: 3 Average Days Saved
    • Parent Category Name: Service Desk
    • Parent Category Link: /service-desk
    • Leverage your service desk ticket data to gain insights for your service desk strategy.

    Our Advice

    Critical Insight

    • Properly analyzing ticket data is challenging for the following reasons:
      • Poor ticket hygiene and unclear ticket handling means the data is often inaccurate or incomplete.
      • Service desk personnel are not sure where to start with analysis.
      • Too many metrics are tracked to parse actionable data from the noise.
    • Ticket data won’t give you a silver bullet, but it can help point you in the right direction.

    Impact and Result

    • Create an iterative framework for tracking metrics, keeping data clean, and actioning your data on day-to-day and month-to-month timelines.

    Analyze Your Service Desk Ticket Data Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should analyze your service desk ticket data, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Import your ticket data

    Enter your data into our tool. Compare your own ITSM ticket fields to improve ticket data moving forward.

    • Service Desk Ticket Analysis Tool

    2. Analyze your ticket data

    Use the ticket analysis tool as a guide to build your own operational dashboards to measure metrics over time. Gain actionable insights from your data.

    • Ticket Analysis Report

    3. Action your ticket data

    Use the data to communicate your findings to the business and leadership using the Ticket Analysis Report.

    [infographic]

    Further reading

    INFO-TECH RESEARCH GROUP

    Analyze Your Service Desk Ticket Data

    Take a data-driven approach to service desk optimization.

    EXECUTIVE BRIEF

    Analyst Perspective

    Photo of Benedict Chang, Research Analyst, Infrastructure & Operations, Info-Tech Research Group

    Benedict Chang
    Research Analyst, Infrastructure & Operations
    Info-Tech Research Group

    Photo of Ken Weston ITIL MP, PMP, Cert.APM, SMC, Research Director, Infrastructure & Operations, Info-Tech Research Group

    Ken Weston ITIL MP, PMP, Cert.APM, SMC
    Research Director, Infrastructure & Operations
    Info-Tech Research Group

    The perfect time to start analyzing your ticket data is now

    Service desks improve their services by leveraging ticket data to inform their actions. However, many organizations don’t know where to start. It’s tempting to wait for perfect data, but there’s a lot of value in analyzing your ticket data as it exists today.

    Start small. Track key tension metrics based on the out-of-the-box functionality in your tool. Review the metrics regularly to stay on track.

    By reviewing your ticket data, you’re going to get better organically. You’re going to learn about the state of your environment, the health of your processes, and the quality of your services. Regularly analyze your data to drive improvements.

    Make ticket analysis a weekly habit. Every week, you should be evaluating how the past week went. Every month, you should be looking for patterns and trends.

    Executive Summary

    Your Situation

    Leverage your service desk ticket data to gain insights for improving your operations:

    1. Use a data-based approach to allocate service desk resources.
    2. Design appropriate SLOs and SLAs to better service end users.
    3. Gain efficiencies for your shift-left strategy.
    4. Communicate the current and future value of the service desk to the business.

    Common Obstacles

    Properly analyzing ticket data is challenging for the following reasons:

    • Poor ticket hygiene and unclear ticket handling guidelines can lead to untrustworthy results.
    • Undocumented tickets from various intake channels prevents you from seeing the whole picture.
    • Service desk personnel are not sure where to start with analysis and are too busy to find time.
    • Too many metrics are tracked to parse actionable insights from the noise.

    Info-Tech’s Approach

    Info-Tech’s approach to improvement:

    • To reduce the noise, standardize your ticket data in a format that will ease analysis.
    • Start with common analyses using the cleaned data set.
    • Identify action items based on your ticket data.

    Analyze your ticket data to help continually improve your service desk.

    Slow down. Give yourself time.

    Give yourself time to observe the new metrics and draw enough insights to make recommendations for improvement. Then, execute on those recommendations. Slow and steady improvement of the service desk only adds business value and will have a positive impact on customer satisfaction.

    Your challenge

    This research is designed to help service desk managers analyze their ticket data

    Analyzing ticket data involves:

    • Collecting ticket data and keeping it clean. Based on the metrics you’re analyzing, define ticket expectations and keep the data up to date.
    • Showing the value of the service desk. SLAs are meaningless if they are not met consistently. The prerequisite to implementing proper SLAs is fully understanding the workload of the service desk.
    • Understanding – and improving – the user experience. You cannot improve the user experience without meaningful metrics that allow you to understand the user experience. Different user groups will have different needs and different expectations of the level of service. Your metrics should reflect those needs and expectations.

    36% of organizations are prioritizing ticket handling in IT for 2021 (Source: SDI, 2021)

    12% of organizations are focusing directly on service desk improvement (Source: SDI, 2021)

    Common obstacles

    Many organizations face these barriers to analyzing their ticket data:

    • Finding time to properly analyze ticket data is a challenge. Not knowing where to start can lead to not analyzing the proper data. Service desks end up either tracking too much data or not tracking the proper metrics.
    • Data, even if clean, can be housed in various tools and databases. It’s difficult to aggregate data if the data is stored throughout various tools. Comparisons may also be difficult if the data sets aren’t consistent.
    • Shifting left to move tickets toward self-service is difficult when there is no visibility into which tickets should be shifted left.

    What your peers are saying about why they can’t start analyzing their ticket data:

    • “My technicians do not consistently update and close tickets.”
    • “My ITSM doesn’t have the capabilities I need to make informed decisions on shifting tickets left.”
    • “My tickets are always missing data”
    • “I’m constantly firefighting. I have no time for ticket data analysis.”
    • “I have no idea where to start with the amount of data I have.”
    (Source: Info-Tech survey, 2021; N=20.)

    Common obstacles that prevent effective ticket analysis

    We asked IT service desk managers and teams about their biggest hurdles

    Missing or Inaccurate Information
    • Lack of information in the ticket
    • Categories are too general/specific to draw insights
    • Poor ticket hygiene
    Missing Updates
    • Tickets aren’t updated while being resolved
    Correlating Tickets to Identify Trends
    • Not sure where to start with all the data at hand
    No Time
    • No time to figure out the tool or analyze the data properly
    Ineffective Categorization Schemes
    • Reduces the power of ticket data
    Tool Limitations
    • Can’t be easily customized
    • Too customized to be effective
    • Desired dashboards unavailable
    (Source: Info-Tech survey, 2021; N=20)

    Info-Tech’s approach

    Repeat this analysis every business cycle:

    • Gather Your Data
      Collect your ticket data OR start measuring the right metrics.
    • Extract & Analyze
      Organize and visualize your data to extract insights
    • Action the Results
      Implement low-effort improvements and celebrate quick successes.
    • Implement Larger Changes
      Reference your ticket data while implementing process, tooling, and other changes.
    • Communicate the Results
      Use your data to show the value of your effort.

    Measure the value of this blueprint

    Track these metrics as you improve

    Use the data to tell you which aspects of IT need to be shifted left and which need to be automated

    Your data will show you where you can improve.

    As you act on your data, you should see:

    • Lower costs per ticket
    • Decreased average time to resolve
    • Increased end-user satisfaction
    • Fewer tickets escalated beyond Tier 1

    An illustration of the 'Shift Left Strategy' using three line graphs arranged in a table with the same axes but representing different metrics. The header row is 'Metrics,' then values of the x-axes are 'Auto-Fix,' 'User,' 'Tier 1,' 'Tier2/Tier3,' and 'Vendor.' Under 'Metrics' we see 'Cost,' 'Time,' and 'Satisfaction.' The 'Cost' graph begins 'Low' at 'Auto-Fix' and gradually moves to 'High' at 'Vendor.' The 'Time' graph begins 'Low' at 'Auto-Fix' and gradually moves to 'High' at 'Vendor.' The 'Satisfaction' graph begins 'High' at 'Auto-Fix' and gradually moves to 'Low' at 'Vendor.' Below is an arrow directing us away from the 'Vendor' option and toward the 'Auto-Fix' option, 'Shift Ticket Resolution Left.'

    See Info-Tech’s blueprint Optimize the Service Desk With a Shift-Left Strategy.

    Info-Tech’s methodology for analyzing service desk tickets

    1. Import Your Ticket Data 2. Analyze Your Ticket Data 3. Communicate Your Insights
    Phase Steps
    1. Import Your Ticket Data
    1. Analyze High-Level Ticket Data
    2. Analyze Incidents, Service Requests, and Ticket Categories
    1. Build Recommendations
    2. Action and Communicate Your Ticket Data
    Phase Outcomes Enter your data into our tool. Compare your own ITSM ticket fields to improve ticket data moving forward. Use the Service Desk Ticket Analysis Tool as a guide to build your own operational dashboards to measure metrics over time. Gain actionable insights from your data. Use the data to communicate your findings to the business and leadership using the Ticket Analysis Report.

    Insight summary

    Slow down. Give yourself time.

    Give yourself time to observe the new metrics and draw enough insights to make recommendations for improvement. Then, execute on those recommendations. Slow and steady improvement of the service desk only adds business value and will have a positive impact on customer satisfaction.

    Iterate on what to track rather than trying to get it right the first time.

    Tracking the right data in your ticket can be challenging if you don’t know what you’re looking for. Start with standardized fields and iterate on your data analysis to figure out your gaps and needs.

    If you don’t know where to go, ticket data can point you in the right direction.

    If you have service desk challenges, you will need to allocate time to process improvement. However, prioritizing your initiatives is easier if you have the ticket data to point you in the right direction.

    Start with data from one business cycle.

    Service desks don’t need three years’ worth of data. Focus on gathering data for one business cycle (e.g. three months). That will give you enough information to start generating value.

    Let the data do the talking.

    Leverage the data to drive organizational and process change in your organization by tracking meaningful metrics. Choose those metrics using business-aligned goals.

    Paint the whole picture.

    Single metrics in isolation, even if measured over time, may not tell the whole story. Make sure you design tension metrics where necessary to get a holistic view of your service desk.

    Blueprint deliverables

    This blueprint’s key deliverable is a ticket analysis tool. Many of the activities throughout this blueprint will direct you to complete and interpret this tool. The other main deliverable is a stakeholder presentation template to help you document the outcomes of the project.
    Service Desk Ticket Analysis Tool Ticket Analysis Report
    Use this tool to identify trends and patterns in your ticket data to action improvement initiatives.

    Sample of the Service Desk Ticket Analysis Tool blueprint deliverable.

    Use this template to document the justification for addressing service desk improvement, the results of your analysis, and your next steps.

    Sample of the Ticket Analysis Report blueprint deliverable.

    Blueprint benefits

    IT Benefits

    • Discover and implement the proper metrics to improve your service desk
    • Use a data-based approach to improve your customer service and operational goals
    • Increase visibility with the business and other IT departments using a structured presentation

    Business Benefits

    • Quicker resolutions to incidents and service requests
    • Better expectations for the service desk and IT
    • Better visibility into the current state, challenges, and goals of the service desk
    • More effective support when contacting the service desk

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Guided Implementation

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 3-4 calls over the course of 2-3 months.

    What does a typical GI on this topic look like?

      Phase 1

    • Call #1: Scope requirements, objectives, and your specific challenges. Enter your data into the tool.
    • Phase 2

    • Call #2: Assess the current state across the different dashboards.
    • Phase 3

    • Call #3: Identify improvements and insights to include in the communication report.
    • Call #4: Review the service desk ticket analysis report.

    PHASE 1

    Import Your Ticket Data

    This phase will walk you through the following activities:

    • 1.1.1 Define your objectives for analyzing ticket data
    • 1.1.2 Identify success metrics
    • 1.1.3 Import your ticket data into the tool
    • 1.1.4 Update your ticket fields for future analysis

    This phase involves the following participants:

    • Service Desk Manager
    • ITSM Manager
    • Service Desk Technician

    1.1.1 Define your objectives for analyzing ticket data

    Input: Understanding of current service desk process and ticket routing

    Output: Defined objectives for the project

    Materials: Whiteboard/flip charts, Ticket Analysis Report

    Participants: Service Desk Staff, Service Desk Manager, IT Director, CIO

    Use the discussion questions below as a guide
    1. Identify your main objective for analyzing ticket data. Use these three sample objectives as a starting point:
      • Demonstrate value to the business by improving customer service.
      • Improve service desk operations.
      • Reduce the number of recurring incidents.
    2. Answer the following questions as a group:
      • What challenges do you have getting accurate data for this objective?
      • What data is missing for supporting this objective?
      • What kind of issues must be solved for us to make progress on achieving this objective?
      • What decisions are held up from a lack of data?
      • How can better ticket data help us to more effectively manage our services and operations?

    Document in the Ticket Analysis Report.

    1.1.2 Identify success metrics

    Select metrics that will track your progress on meeting the objective identified in Activity 1.1.1.

    Input: Understanding of current service desk process and ticket routing

    Output: Defined objectives for the project

    Materials: Whiteboard/flip charts, Ticket Analysis Report

    Participants: Service Desk Manager, IT Director, CIO

    Use these sample metrics as a starting point:
    Demonstrate value to the business by improving customer service
    Ticket trends by category by month # tickets by business department % SLAs met by IT teams
    Average customer satisfaction rating % incident tickets closed in one day Service request SLAs met by % Annual IT satisfaction survey result
    Improve service desk operations
    Incident tickets assigned, sorted by age and priority Scheduled requests for today and tomorrow Knowledgebase articles due for renewal this month Top 5-10 tickets for the quarter
    Unassigned tickets by age # incident tickets assigned by tech Open tickets by category Backlog summary by age
    Reducing the number of recurring incidents
    # incidents by category and resolution code Number of problem tickets opened and resolved Correlation of ticket volume trends to events Reduction of volume of recurring tickets
    Use of knowledgebase by users Use of self-service for ticket creation Use of service catalog Use of automated features (e.g. password resets)
    Average call hold time % calls abandoned Average resolution time Number of tickets reopened

    Document in the Ticket Analysis Report.

    Inefficient ticket-handling processes lead to SLA breaches and unplanned downtime

    Analyze the ticket data to catch mismanaged or lost tickets that lead to unnecessary escalations and impact business profitability

    • Ticket Category – Are your tickets categorized by type of asset? By service?
    • Average Ticket Times – How long does it take to resolve or fulfill tickets?
    • Ticket Priority – What is the impact and urgency of the ticket?
    • SLA/OLA Violations – Did we meet our SLA objectives? If not, why?
    • Ticket Channel – How was the issue reported or ticket received?
    • Response and Fulfillment – Did we complete first contact resolution? How many times was it transferred?
    • Associated Tasks and Tickets – Is this incident associated with any other tasks like change tickets or problem tickets?

    Encourage proper ticket-handling procedures to enable data quality

    Ensure everyone understands the expectations and the value created from having ticket data that follows these expectations

    • Create and update tickets, but not at the expense of good customer service. Agents can start the ticket but shouldn’t spend five minutes creating the ticket when they should be troubleshooting the problem.
    • Update the ticket when the issue is resolved or needs to be escalated. If agents are escalating, they should make sure all relevant information is passed along within the ticket to the next technician.
    • Update user of ETA if issue cannot be resolved quickly.
    • Ticket templates for common incidents can lead to fast creation, data input, and categorizations. Templates can reduce the time it takes to create tickets from two minutes to 30 seconds.
    • Update categories to reflect the actual issue and resolution.
    • Reference or link to the knowledgebase article as the documented steps taken to resolve the incident.
    • Validate with the client that the incident is resolved; automate this process with ticket closure after a certain time.
    • Close or resolve the ticket on time.

    Info-Tech Insight

    Ticket handling ensures clean handovers, whether it is to higher tiers or back to the customer. When filling the ticket out with information intended for another party, ensure the information is written for their benefit and from their point of view.

    Service Desk Ticket Analysis Tool overview

    The Service Desk Ticket Analysis Tool will help you standardize your ticket data in a meaningful format that will allow you to apply common analyses to identify the actions you need to take to improve service desk operations

    TABS 1 & 2
    INSTRUCTIONS & DATA ENTRY
    TAB 3 : TICKET SUMMARY
    TICKET SUMMARY DASHBOARDS
    TABS 4 to 8: DASHBOARDS
    INCIDENT SERVICE REQUEST CATEGORY
    Sample of the Service Desk Ticket Analysis Tool, tabs 1 & 2.
    Input at least three months of your exported ticket data into the corresponding columns in the tool to feed into the common analysis graphs in the other tabs.
    Sample of the Service Desk Ticket Analysis Tool, tab 3.
    This tab contains multiple dashboards analyzing how tickets come in, who requests them, who resolves them, and how long it takes to resolve them.
    Sample of the Service Desk Ticket Analysis Tool, tabs 4 to 8.
    These tabs each have dashboards outlining analysis on incidents and service requests. The category tab will allow you to dive deeper on commonly reported issues.

    1.1.3 Import your data into our Service Desk Ticket Analysis Tool

    You can still leverage your current data, but use this opportunity to improve your service desk ticket fields down the line

    Input: ITSM data log

    Output: Populated Service Desk Ticket Data Analysis Tool

    Materials: Whiteboard/flip charts, Service Desk Ticket Analysis Tool

    Participants: Service Desk Manager, Service Desk Technicians

    Start here:

    • Extract your ticket data from your ITSM tool in an Excel or text format.
    • Look at the fields on the data entry tab of the Service Desk Ticket Analysis Tool.
    • Fill the fields with your ticket data by copying and pasting relevant sections. It is okay if you don’t have all the fields, but take note of the fields you are missing.
    • With the list of the fields you are missing, run through the following activity to decide if you will need to adopt or add fields to your own service desk ticket tool.
    Fields Captured
    Ticket Number Open Date
    Open Time Closed Date
    Closed Time Intake Channel
    Time to Resolve Site Location
    First Contact Resolution Resolution Code
    Category (I, II, III) Ticket Type (Request or Incident)
    Status of Ticket Resolved by Tier
    Ticket Priority Requestor/Department
    SLA Fulfilled Subject
    Technician

    When entering your data, pay close attention to the following fields:

    • Time to Resolve: This is automatically calculated using data in the Open Date, Open Time, Close Date, and Close Time fields. You have three options for entering your data in these fields:
      1. Enter your data as the fields describe. Ensure your data contain only the field description (e.g. Open Date separated from Open Time). If your data contain Open Date AND Open Time, Excel will not show both.
      2. Enter your data only in Open Date and Close Date. If your ITSM does not separate date and time, you can keep the data in a single cell and enter it in the column. The formula in Time to Resolve will still be accurate.
      3. If your ITSM outputs Time to Resolve, overwrite the formula in the Time to Resolve column.
    • SLA: If your ITSM outputs SLA fulfilled: Y/N, enter that directly into the SLA Fulfilled column.
    • Blank Columns: If you do not have data for all the columns, that is okay. Continue with the following activity. Note that some stock dashboards will be empty if that is the case.
    • Incidents vs. Service Requests: If you separate incidents and service requests, be sure to capture that in the SR/Incident for Tabs 4 and 5. If you do not separate the two, then you will only need to analyze Tab 3.
    Fields Captured
    Ticket Number Open Date
    Open Time Closed Date
    Closed Time Intake Channel
    Time to Resolve Site Location
    First Contact Resolution Resolution Code
    Category (I, II, III) Ticket Type (Request or Incident)
    Status of Ticket Resolved by Tier
    Ticket Priority Requestor/Department
    SLA Fulfilled Subject
    Technician

    Use Info-Tech’s tool instead of building your own. Download the Service Desk Ticket Analysis Tool.

    1.1.4 Update your ticket fields for future analysis

    Input: Populated Service Desk Ticket Data Analysis Tool

    Output: New ticket fields to track

    Materials: Whiteboard/flip charts, Service Desk Ticket Analysis Tool

    Participants: Service Desk Manager, Service Desk Technicians

    As a group, pay attention to the ticket fields populated in the tool as well as the ticket fields that you were not able to populate. Use the example “Fields Captured” table to the right, which lists all fields present in the ticket analysis tool.

    Discuss the following questions:

    1. Consider the fields not captured. Would it be valuable to start capturing that data for future analysis?
    2. If so, does your ITSM support that field?
    3. Can you make the change in-house or do you have to bring in an external ITSM administrator to make the change?
    4. Capture the results in the Ticket Analysis Report.
    Example: Fields Captured - Fields Not Captured
    Ticket Number Open Date
    Open Time Closed Date
    Closed Time Intake Channel
    Time to Resolve Site Location
    First Contact Resolution Resolution Code
    Category (I, II, III) Ticket Type (Request or Incident)
    Status of Ticket Resolved by Tier
    Ticket Priority Requestor/Department
    SLA Fulfilled Subject
    Technician

    Document in the Ticket Analysis Report.

    Info-Tech Insight

    Don’t wait for your ticket quality to be perfect. You can still draw actions from your ticket data. They will likely be process improvements initially, but the exercise of pulling the data is a necessary first step.

    Common ticket fields tracked by your peers

    Which of these metrics do you track and action?

    • Remember you don’t have to track every metric. Only track metrics that are actionable.

    For each metric that you end up tracking:

    • Look for trends over time.
    • Brainstorm reasons why the metric could rise or fall.

    Associate a metric with each improvement you execute.

    • Performing this step will allow you to better see the value from your team’s efforts.
    • It will also give you a quicker response than waiting for spikes in your data.

    A bar chart of 'Metrics tracked by other organizations' with the x-axis populated by different metrics and the y-axis as '% organizations who track the metric'. The highest percentage of businesses track 'Ticket volume', then 'Ticket trends by category', then 'Tickets by business units'. The lowest three shown are 'Reopened tickets', 'Cost per ticket', and 'Other'.(Source: Info-Tech survey, 2021; N=20)

    PHASE 2

    Analyze Your Ticket Data

    This phase will walk you through the following activities:

    • 2.1.1 Review high-level ticket dashboards
    • 2.2.1 Review incident, service request, and ticket category dashboards

    This phase involves the following participants:

    • Service Desk Manager
    • Service Desk Technicians
    • IT Managers

    Visualize your ticket data as a first step to analysis

    Identifying trends is easier when looking at diagrams, graphs, and figures

    Start your analysis with common visuals employed by other service desk professionals

    • Phase 2 will walk you through visualizing your data to get a better understanding of your ticket intake, incident management, and service request management.
    • Each step will walk you through:
      • Common visualizations used by service desks
      • Patterns to look for in your visualizations
      • Actions to take to address negative patterns and to continue positive trends
    • Share diagrams that underscore both the value being provided by the service desk as well as the scope of the pain points. Use Info-Tech’s Ticket Analysis Report template as a starting point.

    “Being able to tell stories with data is a skill that’s becoming ever more important in our world of increasing data and desire for data-driven decision making. An effective data visualization can mean the difference between success and failure when it comes to communicating the findings of your study, raising money for your nonprofit, presenting to your board, or simply getting your point across to your audience.” - Cole Knaflic, Founder and CEO, Storytelling with Data: A Data Visualization Guide for Business Professionals

    Use the detailed dashboards to determine the next steps for improvement

    A single number doesn’t tell the whole picture

    Analyze trends over time:

    • Analyze trends by day, by week, by month, and by year to determine:
      • When are the busy periods? (E.g. Do tickets tend to spike every morning, every Monday, or every September?)
      • When are the slow periods? (E.g. Do tickets drop at the end of the day, at midday, on Fridays, or over the summer?)
    • Are spikes or drops in volume consistent trends or one-time anomalies?

    Then build a plan to address them:

    • How will you handle volume spikes, if they’re consistent?
    • What can your resources work on during slow times, if they are consistent?
    • If you assume no shrinkage, can you handle the peaks in volume if you make all FTEs available to work on tickets at a certain time of day?

    Sample of a bar chart comparing tickets that were 'Backlog versus Closed by Month Opened'.

    Look for seasonal trends. In this example, we see high ticket volumes in May and January, with lower ticket volumes in June and July when many staff are taking holidays. However, also be careful to look at the big picture of how you pulled the data. August through October sees a high volume of open tickets because the data set is pulled in November, not because there’s a seasonal spike on tickets not closing at the end of the fiscal year.

    Track ticket data over time

    Make low-effort adjustments before major changes

    Don’t rush to a decision based off the first numbers you see

    Review ticket summary dashboard

    Ideally, you should track ticket patterns over an entire year to get a full sense of trends within each month of the year. At minimum, track for 30 days, then 60, then 90, and see if anything changes. The longer you can track ticket patterns, the more accurate your picture will be.

    Review additional dashboards

    If you separate incidents and service requests, and you have accurate ticket categories, then you can use these dashboards to further break down the data to identify ticket trends.

    The output of the ticket analysis will only be as accurate as its input.
    To get the most accurate results, first ensure your data is accurate, then analyze it over as much time as possible. Aggregating with accurate data will give you a better picture of the trends in demand that your service desk sees.

    Not separating incidents and service requests? Need to fix your ticket categories? Visit Standardize the Service Desk to get started.

    Analyze incidents and requests separately

    Each type has its own set of customer experiences and expectations

    • Different ticket types are associated with radically different prioritization, routing, and service levels. For instance, most incidents are resolved within a business day, but requests take longer to implement.
    • If you fail to distinguish between ticket types, your metrics will obscure service desk performance.
    • From a ticket analysis standpoint, separating ticket types prior to analysis or, better yet, at intake allows for cleaner data. In turn, this means more structured analyses, better insights, and more meaningful actions. Not separating ticket types may still get you to the same conclusions, but it will be much more difficult to sift through the data.

    Incident

    An unanticipated interruption of a service.
    The goal of incident management is to restore the service as soon as possible, even if the resolution involves a workaround.

    Request

    A generic description for a small change or service access.
    Requests are small, frequent, and low risk. They are best handled by a process distinct from incident, change, and project management.

    Not separating incidents and service requests? Need to fix your ticket categories? Visit Standardize the Service Desk to get started.

    Step 2.1

    Analyze Your High-Level Ticket Data

    Dashboards
    • Ticket Volume
    • Ticket Intake
    • Ticket Handling and Resolution
    • Ticket Categorization

    This step will walk you through the following activities:

    Visualize the current state of your service desk.

    This step involves the following participants:

    • Service Desk Manager
    • Service Desk Technicians
    • IT Managers

    Outcomes of this step

    Build your metrics baseline to compare with future metric results.

    Dashboards: Ticket Volume

    Example of a dashboard for ticket volume with two bar charts, one breaking down volume by month, and the other marking certain days or weeks in each month.

    Analyze your data for insights

    • Analyze volume trends by day, by week, by month, and by year to determine:
      • When are the busy periods? (E.g. Do tickets tend to spike every morning, every Monday, or every September?)
      • When are slow periods? (E.g. Do tickets drop at the end of the day, at midday, on Fridays, or over the summer?)
    • Are spikes or drops in volume consistent trends or one-time anomalies?
    • What can your resources be working on during slow times? Are you able to address ticket backlog?

    Dashboards: Ticket Intake

    Example of a dashboard for ticket intake with three bar charts, one breaking it down by 'Intake Channel', one by 'Requestor/Department', and one by 'Location'.

    Analyze your data for insights

    • Determine how to drive intake to the most appropriate solution for your organization:
      • A web portal is the most efficient intake method, but it must be user friendly to increase its adoption.
      • The phone should be available for urgent requests or incidents. Encourage those who call with a request to submit a ticket through the portal.
      • Discourage use of email if it is unstructured, as users don’t provide enough detail, and often two or three transactions are required for triage.
      • If walk-ups are encouraged, structure and formalize the support so it can be resourced and managed rather than interrupt-driven.

    Dashboard: Ticket Handling and Resolution

    Example of a dashboard for ticket handling and resolution with three bar charts, one breaking down 'Tickets Resolved by Technician', one by 'Tier', and one by 'Average Time to Resolve (Hours)'.

    Analyze your data for insights

    • Look at your ticket load by technician and by tier. This is an essential step to set your baseline to measure your shift-left initiatives. If you are focusing on self-service or Tier 1 training, the ticket load from higher tiers should decrease over time.
    • If Tiers 2 and 3 are handling the majority of the tickets, this could be a red flag indicating tickets are inappropriately escalated or Tier 1 could use more training and support.
    • For average time to resolve and average time to resolve by tier, are you meeting your SLAs? If not, are your SLAs too aggressive? Are tickets left open and not properly closed?

    Dashboard: Ticket Categorization

    Analyze your data for insights

    • Ticket categorization is critical to clean data. Having a categorization scheme with categories that are miscellaneous, too specific, or too general easily leads to inaccurate reporting or confusing workflows for technicians.
    • When looking at your ticket categories, first look for duplicate categories that could be collapsed into one.
    • Also look at your top five to seven categories and see if they make sense. Are these good candidates in your organization for automation or shift-left?
    • Compare your Tier 1 categories. The level of specificity for these categories should be comparable to easily run reports. If they are not, assess the need for a category redesign.

    Example of a dashboard for ticket categorization with one horizontal bar chart, 'Incident Ticket Volume by Level 1 Category'.

    Step 2.2

    Analyze Incidents, Service Requests, and Ticket Categories

    Dashboards
    • Incidents
    • Service Requests
    • Volume by Ticket Category
    • Resolution Times by Priority and/or Category
    • Tabs for More Granular Investigation and Reporting

    This step will walk you through the following activities:

    Visualize your incident and service request ticket load and analyze trends. Use this information and cross reference data sets to gain a holistic view of how the service desk interacts with IT and the business.

    This step involves the following participants:

    • Service Desk Manager
    • Service Desk Technicians
    • IT Managers

    Outcomes of this step

    Gain actionable, data-driven improvements based on your incident and service request data. Show the value of the service desk and highlight improvements needed.

    Incident and Service Requests Dashboard: Priority and SLA

    Example of an Incident and Service Requests dashboard for priority and SLA with three charts, one breaking down 'Incident Priority', one 'Average time to resolve (in hours) by priority', and one '% of SLA met'.

    Analyze your data for insights

    • Your ticket priority distribution for overall load and time to resolve (TTR) should look something like above with low-priority tickets having higher load and TTR and high/critical-priority tickets having a lower load and lower TTR. If it is reversed, that is a good indication that the service desk is too reactive or isn’t properly prioritizing its work.
    • If your SLA has a high failure rate, consider reassessing your targets with SLOs that you can meet before publishing them as achievable SLAs.

    Incident and Service Requests Dashboard: Priority and SLA

    Example of an Incident and Service Requests dashboard for resolution and close with three bar charts, one breaking down 'Incident Volume by Resolution Code', one 'Incidents Resolved by Tier', and one 'Average time to resolve (in hours) by Resolution Code'.

    Analyze your data for insights

    • Examine your ticket handling by looking at ticket status and resolution codes.
      • If you have a lot of blanks, then tickets are not properly handled. Consider reinforcing your standards for close codes and statuses.
      • Alternatively, if tickets are left open, you may have to build follow-ups on stale tickets into your process or introduce proper auto-close processes.

    Category, Resolution Time, and Resolution Code Dashboards

    These PivotCharts allow you to dig deeper

    Investigate whether there are trends in ticket volume and resolution times within specific categories and subcategories

    Tab 6, Category Dashboard; tab 7, Resolution Time Dashboard; and tab 8, Resolution Code Dashboard are PivotCharts. Use these tabs to investigate whether there are trends in ticket volume, resolution times, and resolution codes within specific categories and subcategories.

    Start with the charts that are available. The +/- buttons will allow you to show more granular information. By default, this granularity will be into the levels of the ticket categorization scheme.

    For most categorization schemes, there will be too many categories to properly graph. You can apply a filter to investigate specific categories by clicking on the drop-down buttons.

    Example of dashboards featured on next slide

    Use these tabs for more granular investigation and reporting

    TAB 6
    CATEGORY DASHBOARD
    TAB 7
    RESOLUTION TIME DASHBOARD
    TAB 8
    RESOLUTION TIME DASHBOARD
    Sample of the 'Ticket Volume by Second, Third Level Category' dashboard tab.
    Investigate ticket distributions in first, second, and third levels. Are certain categories overcrowded, suggesting they can be split? Are certain categories not being used?
    Sample of the 'Average Resolution Times' dashboard tab.
    Do average resolution times match your service level agreements? Do certain categories have significantly different resolution times? Are there areas that can benefit from shift-left?
    Sample of the 'Volume of Resolution Codes' dashboard tab.
    Are resolution codes being accurately used? Are there trends in resolution codes? Are these codes providing sufficient information for problem management?

    PHASE 3

    Communicate Your Insights

    This phase will walk you through the following activities:

    • 3.1.1 Review common recommendations
    • 3.2.1 Review ticket reports daily
    • 3.2.2 Incorporate ticket data into retrospectives and team updates
    • 3.2.3 Regularly review trends with business leaders
    • 3.2.4 Tell a story with your data

    This phase involves the following participants:

    • Service Desk Manager
    • Service Desk Technicians
    • IT Managers

    Step 3.1

    Build Recommendations Based on Your Ticket Data

    Activities
    • 3.1.1 Review common recommendations

    This step will walk you through the following activities:

    Review common recommendations as a first step to extracting insights from your own data.

    This step involves the following participants:

    • Service Desk Manager
    • Service Desk Technicians

    Outcomes of this step

    You will gain an understanding of the common challenges with service desks and ticket analysis in general. See which ones apply to you to inform your ticket data analysis moving forward.

    Review these common recommendations

    1. Fix your ticket categories
      Organize your ticket categorization scheme for proper routing and reporting.
    2. Focus more on self-service
      Self-service is essential to enable shift-left strategies. Focus on knowledgebase processes and portal ease of use.
    3. Update your service catalog
      Improve your service catalog, if necessary, to make it easy for end users to request services and for the service desk to provide those services.
    4. Direct volume toward other channels
      Walk-ups make it more difficult to properly log tickets and assign service desk resources. Drive volume to other channels to improve your ticket quality.
    5. Crosstrain Tier 1 on certain topics
      Tier 1 breadth of knowledge is essential to drive up first contact resolution.
    6. Build more automation
      Identify bottlenecks and challenges with your ticket data to streamline ticket handling and resolution.
    7. Revisit service level agreements
      Update your SLAs and/or SLOs to prioritize expectation management for your end users.
    8. Improve your data quality
      You can only analyze data that exists. Revisit your ticket-handling guidelines and more regularly check tickets to ensure they comply with those standards.

    Optimize your processes and look for opportunities for automation

    Leverage Info-Tech research to improve service desk processes

    Review your service desk processes and tools for optimization opportunities:

    • Clearly establish ticket-handling guidelines.
    • Use ticket templates to reduce time spent entering tickets.
    • Document incident management and service request fulfillment workflows and eliminate any unnecessary steps.
    • Automate manual tasks wherever possible.
    • Build or improve a self-service portal with a knowledgebase to allow users to resolve their own issues, reducing incoming ticket volume to the service desk.
    • Optimize your internal knowledgebase to reduce time spent troubleshooting recurring issues.
    • Leverage AI capabilities to speed up ticket processing and resolution.

    Standardize the Service Desk

    This project will help you build and improve essential service desk processes, including incident management, request fulfillment, and knowledge management.

    Optimize the Service Desk With a Shift-Left Strategy

    This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.

    Step 3.2

    Action and Communicate Your Ticket Data

    Activities
    • 3.2.1 Review your ticket queues daily
    • 3.2.2 Incorporate ticket data into retrospectives and team status updates
    • 3.2.3 Regularly review trends with business leaders
    • 3.2.4 Tell a story with your data

    This step will walk you through the following activities:

    Organize your scrums to report on the metrics that will inform daily and monthly operations.

    This step involves the following participants:

    • Service Desk Manager
    • Service Desk Technicians
    • IT Managers

    Outcomes of this step

    Use the dashboards and data to inform your daily and monthly scrums.

    3.2.1 Review your ticket queues daily

    Clean data is still useless if not used properly

    • The metrics you’ve chosen to measure and visualize in the previous step are useful for informing your day-to-day, week-to-week, and month-to-month strategies for the service desk and IT. Conduct scrums daily to action your dashboard data to help clear ticket queues.
    • Reference your dashboards daily with each IT team.
    • You need to have a dashboard of open tickets assigned to each team.

    Review Daily

    • Ticket volume over the last day (look for spikes)
    • SLA breach risks/SLA breaches
    • Recurring incidents
    • Tickets open
    • Tickets handed over (confirmation of handover)

    3.2.2 Incorporate ticket data into retrospectives and team status updates

    Explain your metric spikes and trends

    • Hold weekly or monthly meetings to review the ticket trends selected during Phases 1 and 2 of this blueprint.
    • Review ticket spikes, identify seasonal trends, and discuss root causes (e.g. projects/changes going live, onboarding blitz).
    • Discuss any actions associated with spikes and seasonal trends (e.g. resource allocation, hiring, training).
    • You can incorporate other IT leaders or departments in this meeting as needed to discuss action items for improvement, quality assurance concerns, customer service concerns, and/or operating level agreement concerns.

    Review Weekly/Monthly

    • Ticket volume
    • Ticket category by priority level over time
    • Tickets from different business groups, VIP groups, and different vertical levels
    • Tickets escalated, tickets that didn’t need to be escalated, tickets that were incorrectly escalated
    • Ticket priority levels over time
    • Most requested services
    • Tickets resolved by which group over time
    • Ability to meet SLAs and OLAs over time by different groups

    3.2.3 Regularly review trends with business leaders

    Use your data to help improve business relationships

    Review the following with business leaders:

    • Volume of work done this past time cycle for the leader’s group
    • Trends and spikes in the data and possible explanations for them (note: get their input on the potential causes of trends)
    • Improvements you plan to execute within the service desk
    • Action items you need from the business leader

    Use your data to show the value you provide to the group. Schedule quarterly meetings with the heads of different business groups to discuss the work that the service desk does for each group.

    Show trends in incidents and service requests: “I see you have a spike in CRM tickets. I’ve been working with the CRM team to address this issue.”

    3.2.4 Tell a story with your data

    Effectively communicate with the business and leadership

    • With your visualized metrics, organize your story into a presentation for different stakeholder groups. You can use the Ticket Analysis Report as a starting point to provide data about:
      • Value provided by the service desk
      • Successes
      • Opportunities for Improvements
      • Current state of KPIs
    • Include information about the causes of data trends and actions you will take in response to the data.
    • For each of these themes, look at the metrics you’ve chosen to track and see which ones fit to tell the story. Let the data do the talking.
    • Consider supplementing the ticket data with data from other systems. For example, you can include data on transactional customer satisfaction surveys, knowledgebase utilization, and self-service utilization.

    Sample of the Ticket Analysis Report.

    Download the Ticket Analysis Report.

    Ticket Analysis Report

    Include the following information as you build your ticket analysis report:

    • Value Provided by the Service Desk
      Start with the value provided by the service desk to different areas of the business. Include information about first contact resolution, average resolution times, ticket volume (e.g. by category, priority, location, requestor).
    • Successes
      Successes is a general field that can include how process improvements have impacted the service desk or how initiatives have enhanced shift-left opportunities. Highlight any positive trends over time.
    • Opportunities for Improvement
      Let the data guide the conversation to where improvements can be made. Day-to-day ops, self-service tools, shifting work left from Tier 2, Tier 3, standardizing a non-standard service, and staffing adjustments are possibilities for this section.
    • Current State of KPIs
      Mean time to resolve, FCR, ticket volume, and end-user satisfaction are great KPIs to include as a starting point.

    Sample of the Ticket Analysis Report.

    Download the Ticket Analysis Report.

    Summary of Accomplishment

    Problem Solved

    You now have a better understanding of how to action your service desk ticket data, including improvements to your current ticket templates for incidents and service requests.

    You also have the data to craft a story to different stakeholder groups to celebrate the successes of the service desk and highlight possible improvements. Continue this exercise iteratively to continue improving the service desk.

    Remember, ticket analysis is not a single event but an ongoing initiative. As you track, analyze, and action more data, you will find more improvements.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

    Contact your account representative for more information.

    workshops@infotech.com 1-888-670-8889

    Additional Support

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

    Photo of Benedict Chang.

    Contact your account representative for more information.

    workshops@infotech.com 1-888-670-8889

    To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    Sample of dashboards we saw earlier. Sample of the 'Ticket Analysis Report'.
    Analyze your dashboards
    An analyst will walk through the ticket data and dashboards with you and your team to help interpret the data and tailor improvements
    Populate your ticket data report
    Given the action items from this solution set, an analyst will help you craft a report to celebrate the successes and highlight needed improvements in the service desk.

    Related Info-Tech Research

    Optimize the Service Desk With a Shift-Left Strategy

    The best type of service desk ticket is the one that doesn’t exist.

    Incident & Problem Management

    Don’t let persistent problems govern your department.

    Design & Build a User-Facing Service Catalog

    Improve user satisfaction with IT with a convenient menu-like catalog.

    Bibliography

    Bayes, Scarlett. “ITSM: 2021 & Beyond.” Service Desk Institute, 2021. Web.

    “Benchmarking Report v.9.” Service Desk Institute, 17 Jan. 2020. Web.

    Bennett, Micah. “The 9 Help Desk Metrics That Should Guide Your Customer Support.” Zapier, 3 Dec. 2015. Web.

    “Global State of Customer Service: The transformation of customer service from 2015 to present day.” Microsoft Dynamics 365, Microsoft, 2020. Web.

    Goodey, Ben. “How to Manually Analyze Support Tickets.” SentiSum, 26 July 2021. Web.

    Jadhav, Megha. “Four Metrics to Analyze When Using Ticketing Software.” Vision Helpdesk Blog, 21 Mar. 2016. Web.

    Knaflic, Cole Nussbaumer. Storytelling with Data: A Data Visualization Guide for Business Professionals. Wiley, 2015.

    Li, Ta Hsin, et al. “Incident Ticket Analytics for IT Application Management Services.” 2014 IEEE International Conference on Services Computing, 2014. Web.

    Olson, Sarah. “10 Help Desk Metrics for Service Desks and Internal Help Desks.” Zendesk Blog, Sept. 2021. Web.

    Paramesh, S.P., et al. “Classifying the Unstructured IT Service Desk Tickets Using Ensemble of Classifiers.” 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), 2018. Web.

    Volini, Erica, et al. “2021 Global Human Capital Trends: Special Report.” Deloitte Insights, 21 July 2021. Web.

    “What Kind of Analysis You Can Perform on a Ticket Management System.” Commence, 3 Dec. 2019. Web.

    INFO-TECH RESEARCH GROUP

    Create and Manage Enterprise Data Models

    • Buy Link or Shortcode: {j2store}340|cart{/j2store}
    • member rating overall impact: 9.2/10 Overall Impact
    • member rating average dollars saved: $7,263 Average $ Saved
    • member rating average days saved: 16 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Business executives don’t understand the value of Conceptual and Logical Data Models and how they define their data assets.
    • Data, like mercury, is difficult to manage and contain.
    • IT needs to justify the time and cost of developing and maintaining Data Models.
    • Data as an asset is only perceived from a physical point of view, and the metadata that provides context and definition is often ignored.

    Our Advice

    Critical Insight

    • Data Models tell the story of the organization and its data in pictures to be used by a business as a tool to evolve the business capabilities and processes.
    • Data Architecture and Data Modeling have different purposes and should be represented as two distinct processes within the software development lifecycle (SDLC).
    • The Conceptual Model provides a quick win for both business and IT because it can convey abstract business concepts and thereby compartmentalize the problem space.

    Impact and Result

    • A Conceptual Model can be used to define the semantics and relationships for your analytical layer.
      • It provides a visual representation of your data in the semantics of business.
      • It acts as the anchor point for all data lineages.
      • It can be used by business users and IT for data warehouse and analytical planning.
      • It provides the taxonomies for data access profiles.
      • It acts as the basis for your Enterprise Logical and Message Models.

    Create and Manage Enterprise Data Models Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should create enterprise data models, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Setting the stage

    Prepare your environment for data architecture.

    • Enterprise Data Models

    2. Revisit your SDLC

    Revisit your SDLC to embed data architecture.

    • Enterprise Architecture Tool Selection

    3. Develop a Conceptual Model

    Create and maintain your Conceptual Data Model via an iterative process.

    4. Data Modeling Playbook

    View the main deliverable with sample models.

    • Data Modeling Playbook
    [infographic]

    Workshop: Create and Manage Enterprise Data Models

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish the Data Architecture Practice

    The Purpose

    Understand the context and goals of data architecture in your organization.

    Key Benefits Achieved

    A foundation for your data architecture practice.

    Activities

    1.1 Review the business context.

    1.2 Obtain business commitment and expectations for data architecture.

    1.3 Define data architecture as a discipline, its role, and the deliverables.

    1.4 Revisit your SDLC to embed data architecture.

    1.5 Modeling tool acquisition if required.

    Outputs

    Data Architecture vision and mission and governance.

    Revised SDLC to include data architecture.

    Staffing strategy.

    Data Architecture engagement protocol.

    Installed modeling tool.

    2 Business Architecture and Domain Modeling

    The Purpose

    Identify the concepts and domains that will inform your data models.

    Key Benefits Achieved

    Defined concepts for your data models.

    Activities

    2.1 Revisit business architecture output.

    2.2 Business domain selection.

    2.3 Identify business concepts.

    2.4 Organize and group of business concepts.

    2.5 Build the Business Data Glossary.

    Outputs

    List of defined and documented entities for the selected.

    Practice in the use of capability and business process models to identify key data concepts.

    Practice the domain modeling process of grouping and defining your bounded contexts.

    3 Harvesting Reference Models

    The Purpose

    Harvest reference models for your data architecture.

    Key Benefits Achieved

    Reference models selected.

    Activities

    3.1 Reference model selection.

    3.2 Exploring and searching the reference model.

    3.3 Harvesting strategies and maintaining linkage.

    3.4 Extending the conceptual and logical models.

    Outputs

    Established and practiced steps to extend the conceptual or logical model from the reference model while maintaining lineage.

    4 Harvesting Existing Data Artifacts

    The Purpose

    Gather more information to create your data models.

    Key Benefits Achieved

    Remaining steps and materials to build your data models.

    Activities

    4.1 Use your data inventory to select source models.

    4.2 Match semantics.

    4.3 Maintain lineage between BDG and existing sources.

    4.4 Select and harvest attributes.

    4.5 Define modeling standards.

    Outputs

    List of different methods to reverse engineer existing models.

    Practiced steps to extend the logical model from existing models.

    Report examples.

    5 Next Steps and Wrap-Up (offsite)

    The Purpose

    Wrap up the workshop and set your data models up for future success.

    Key Benefits Achieved

    Understanding of functions and processes that will use the data models.

    Activities

    5.1 Institutionalize data architecture practices, standards, and procedures.

    5.2 Exploit and extend the use of the Conceptual model in the organization.

    Outputs

    Data governance policies, standards, and procedures for data architecture.

    List of business function and processes that will utilize the Conceptual model.

    M&A Runbook for Infrastructure and Operations

    • Buy Link or Shortcode: {j2store}60|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: Strategy and Organizational Design
    • Parent Category Link: /strategy-and-organizational-design
    • I&O is often the last to be informed of an impending M&A deal.
    • The business doesn’t understand the necessary requirements or timeline for integration.
    • It’s hard to prioritize when you’re buried under a mountain of work.
    • Documentation may be lacking or nonexistent, and members of the target organization may be uncooperative.

    Our Advice

    Critical Insight

    • Manage expectations. The business often expects integration in days or weeks, not months or years. You need to set them straight.
    • Open your checkbook and prepare to hire. Integration will require a temporary increase in resources.
    • Tackle organizational and cultural change. People are harder to integrate than technology. Culture change is the hardest part, and the integration plan should address it.

    Impact and Result

    • Tailor your approach based on the business objectives of the merger or acquisition.
    • Separate the must-haves from the nice-to-haves.
    • Ensure adequate personnel and budget.
    • Plan for the integration into normal operations.

    M&A Runbook for Infrastructure and Operations Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how to partner with the business to conquer the challenges in your next merger or acquisition.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Establish goals

    Partner with the business to determine goals and establish high-level scope.

    • M&A Runbook for Infrastructure and Operations – Phase 1: Establish Goals
    • I&O M&A Project Napkin

    2. Conduct discovery

    Find out what the target organization’s I&O looks like.

    • M&A Runbook for Infrastructure and Operations – Phase 2: Conduct Discovery
    • I&O M&A Discovery Letter Template
    • I&O M&A Discovery Template
    • I&O M&A Workbook
    • I&O M&A Risk Assessment Tool

    3. Plan short-term integration

    Build a plan to achieve a day 1 MVP.

    • M&A Runbook for Infrastructure and Operations – Phase 3: Plan Short-Term Integration
    • I&O M&A Short-Term Integration Capacity Assessment Tool

    4. Map long-term integration

    Chart a roadmap for long-term integration.

    • M&A Runbook for Infrastructure and Operations – Phase 4: Map Long-Term Integration
    • I&O M&A Long-Term Integration Portfolio Planning Tool
    [infographic]

    Workshop: M&A Runbook for Infrastructure and Operations

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 High-Level Scope

    The Purpose

    Establish goals and conduct discovery.

    Key Benefits Achieved

    Alignment with business goals

    Documentation of target organization’s current state

    Activities

    0.1 Consult with stakeholders.

    0.2 Establish M&A business goals.

    0.3 Conduct target discovery.

    0.4 Document own environment.

    0.5 Clarify goals.

    Outputs

    Stakeholder communication plan

    M&A business goals

    I&O M&A Discovery Template

    Current state of organization

    2 Target Assessment

    The Purpose

    Assess risk and value of target organization.

    Key Benefits Achieved

    Accurate scope of I&O integration

    Risk mitigation plans

    Value realization strategies

    Activities

    1.1 Scope I&O M&A project.

    1.2 Assess risks.

    1.3 Assess value.

    Outputs

    I&O M&A Project Napkin

    Risk assessment

    Value assessment

    3 Day 1 Integration Project Plan

    The Purpose

    Establish day 1 integration project plan.

    Key Benefits Achieved

    Smoother day 1 integration

    Activities

    2.1 Determine Day 1 minimum viable operating model post M&A.

    2.2 Identify gaps.

    2.3 Build day 1 project plan.

    2.4 Estimate required resources.

    Outputs

    Day 1 project plan

    4 Long-Term Project Plan

    The Purpose

    Draw long-term integration roadmap.

    Key Benefits Achieved

    Improved alignment with M&A goals

    Greater realization of the deal’s value

    Activities

    3.1 Set long-term future state goals.

    3.2 Create a long-term project plan.

    3.3 Consult with business stakeholders on the long-term plan.

    Outputs

    Long-term integration project plan

    5 Change Management and Continual Improvement

    The Purpose

    Prepare for organization and culture change.

    Refine M&A I&O integration process.

    Key Benefits Achieved

    Smoother change management

    Improved M&A integration process

    Activities

    4.1 Complete a change management plan.

    4.2 Conduct a process post-mortem.

    Outputs

    Change management plan

    Process improvements action items

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Application Maintenance

      • Buy Link or Shortcode: {j2store}30|cart{/j2store}
      • Related Products: {j2store}30|crosssells{/j2store}
      • member rating overall impact: 10.0/10
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Applications
      • Parent Category Link: /applications

      The challenge

      • If you work with application maintenance or operations teams that handle the "run" of your applications, you may find that the sheer volume and variety of requests create large backlogs.
      • Your business and product owners may want scrum or DevOps teams to work on new functionality rather than spend effort on lifecycle management.
      • Increasing complexity and increasing reliance on technology may create unrealistic expectations for your maintenance teams. Business applications must be available around the clock, and new feature roadmaps cannot be side-tracked by maintenance.

      Our advice

      Insight

      • Improving maintenance focus may mean doing less work but create more value. Your teams need to be realistic about what commitments they take—balance maintenance with business value and risk levels.
      • Treat maintenance the same as any other development practice. Use the same intake and prioritization practices. Uphold the same quality standards.

      Impact and results 

      • Justify the necessity of streamlined and regular maintenance. Understand each stakeholder's objectives and concerns, validate them against your staff's current state, processes, and technologies involved.
      • Maintenance and risk go hand in hand. And the business wants to move forward all the time as well. Strengthen your prioritization practice. Use a holistic view of the business and technical impacts, risks, urgencies across the maintenance needs and requests. That allows you to justify their respective positions in the overall development backlog. Identify opportunities to bring some requirements and features together.
      • Build a repeatable process with appropriate governance around it. Ensure that people know their roles and responsibilities and are held accountable.
      • Instill development best-practices into your maintenance processes.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand everyday struggles regarding application maintenance, the root causes, and our methodology to overcome these. We show you how we can support you.

      Understand your maintenance priorities

      Identify your stakeholders and understand their drivers.

      • Streamline Application Maintenance – Phase 1: Assess the Current Maintenance Landscape (ppt)
      • Application Maintenance Operating Model Template (doc)
      • Application Maintenance Resource Capacity Assessment (xls)
      • Application Maintenance Maturity Assessment (xls)

      Define and employ maintenance governance

      Identify the right level of governance appropriate to your company and business context for your application maintenance. That ensures that people uphold standards across maintenance practices.

      • Streamline Application Maintenance – Phase 2: Develop a Maintenance Release Schedule (ppt)

      Enhance your prioritization practices

      Most companies cannot do everything for all applications and systems. Build your maintenance triage and prioritization rules to safeguard your company, maximize business value generation and IT risks and requirements.

      • Streamline Application Maintenance – Phase 3: Optimize Maintenance Capabilities (ppt)

      Streamline your maintenance delivery

      Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.

      • Streamline Application Maintenance – Phase 4: Streamline Maintenance Delivery (ppt)
      • Application Maintenance Business Case Presentation Document (ppt)

       

       

      Explore the Secrets of Oracle Cloud Licensing

      • Buy Link or Shortcode: {j2store}142|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: 5 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • Organizations are considering moving workloads to the cloud; however, they often struggle to understand Oracle's licensing and services models.
      • Complexity of licensing and high price tags can make the renewal process an overwhelming experience.
      • Oracle’s SaaS applications are the most mature, but Oracle’s on-premises E-Business Suite still has functionality gaps in comparison to Oracle’s cloud apps.

      Our Advice

      Critical Insight

      • Understand the Oracle agenda. Oracle has established a unique approach to their cloud offerings – they want all of your workloads on the Red Stack.
      • Communicate effectively. Be aware that Oracle will reach out to members at your organization at various levels. Having your executives on the same page is critical to successfully managing Oracle.
      • Negotiate hard. Oracle needs the deal more than the customer. Oracle's top leaders are heavily incentivized to drive massive cloud adoption and increase Oracle's share price. Use this to your advantage.

      Impact and Result

      • Conducting business with Oracle is not typical compared to other vendors. To emerge successfully from a commercial transaction with Oracle, customers must learn the “Oracle way” of conducting business, which includes a best-in-class sales structure, highly unique contracts, and license use policies coupled with a hyper-aggressive compliance function.
      • Leverage cloud spend to retire support on shelf-ware licenses, or gain virtualization rights for an on-premises environment.
      • Map out the process of how to negotiate from a position of strength, examining terms and conditions, discount percentages, and agreement pitfalls.
      • Carefully review key clauses in the Oracle Cloud Services Agreement to avoid additional spend and compliance risks.

      Explore the Secrets of Oracle Cloud Licensing Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should explore the secrets of Oracle Cloud licensing, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Evaluate licensing requirements

      Review current licensing options and models to determine which cloud products will most appropriately fit the organization's environment.

      • Oracle Cloud Services Agreement Terms and Conditions Evaluation Tool
      [infographic]

      Drive Technology Adoption

      • Buy Link or Shortcode: {j2store}111|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      The project isn’t over if the new product or system isn’t being used. How do you ensure that what you’ve put in place isn’t going to be ignored or only partially adopted? People are more complicated than any new system and managing them through the change needs careful planning.

      Our Advice

      Critical Insight

      Cultivating a herd mentality, where people adopt new technology merely because everyone else is, is an important goal in getting the bulk of users using the new product or system. The herd needs to gather momentum though and this can be done by using the more tech-able and enthused to lead the rest on the journey. Identifying and engaging these key resources early in the process will greatly assist in starting the flow.

      Impact and Result

      While communication is key throughout, involving staff in proof-of-concept activities and contests and using the train-the-trainer techniques and technology champions will all start the momentum toward technology adoption. Group activities will address the bulk of users, but laggards may need special attention.

      Drive Technology Adoption Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Drive Technology Adoption – A brief deck describing how to encourage users to adopt newly implemented technology.

      This document will help you to ensure that newly implemented systems and technologies are correctly adopted by the intended recipients.

      • Drive Technology Adoption Storyboard
      [infographic]

      Further reading

      Drive Technology Adoption

      The project is over. The new technology is implemented. Now how do we make sure it's used?

      Executive Summary

      Your Challenge

      Technology endlessly changes and evolves. Similarly, business directions and requirements change, and these changes need to be supported by technology. Improved functionality and evolvement of systems, along with systems becoming redundant or unsupported, means that maintaining a static environment is virtually impossible.

      Enormous amounts of IT budget are allocated to these changes each year. But once the project is over, how do you manage that change and ensure the systems are being used? Planning your technology adoption is vital.

      Common Obstacles

      The obstacles to technology adoption can be many and various, covering a broad spectrum of areas including:

      • Reluctance of staff to let go of familiar processes and procedures.
      • Perception that any change will add complications but not add value, thereby hampering enthusiasm to adopt.
      • Lack of awareness of the change.
      • General fear of change.
      • Lack of personal confidence.

      Info-Tech’s Approach

      Start by identifying, understanding, categorizing, and defining barriers and put in place a system to:

      • Gain an early understanding of the different types of users and their attitudes to technology and change.
      • Review different adoption techniques and analyze which are most appropriate for your user types.
      • Use a “Follow the Leader” approach, by having technical enthusiasts and champions to show the way.
      • Prevent access to old systems and methods.

      Info-Tech Insight

      For every IT initiative that will be directly used by users, consider the question, “Will the final product be readily accepted by those who are going to use it?” There is no point in implementing a product that no one is prepared to use. Gaining user acceptance is much more than just ticking a box in a project plan once UAT is complete.

      The way change should happen is clear

      Prosci specializes in change. Its ADKAR model outlines what’s required to bring individuals along on the change journey.

      AWARENESS

      • Awareness means more than just knowing there’s a change occurring,
      • it means understanding the need for change.

      DESIRE

      • To achieve desire, there needs to be motivation, whether it be from an
      • organizational perspective or personal.

      KNOWLEDGE

      • Both knowledge on how to train during the transition and knowledge
      • on being effective after the change are required. This can only be done
      • once awareness and desire are achieved.

      ABILITY

      • Ability is not knowledge. Knowing how to do something doesn’t necessarily translate to having the skills to do it.

      REINFORCEMENT

      • Without reinforcement there can be a tendency to revert.

      When things go wrong

      New technology is not being used

      The project is seen as complete. Significant investments have been made, but the technology either isn’t being used or is only partially in use.

      Duplicate systems are now in place

      Even worse. The failure to adopt the new technology by some means that the older systems are still being used. There are now two systems that fail to interact; business processes are being affected and there is widespread confusion.

      Benefits not being realized

      Benefits promised to the business are not being realized. Projected revenue increases, savings, or efficiencies that were forecast are now starting to be seen as under threat.

      There is project blowout

      The project should be over, but the fact that the technology is not being used has created a perception that the implementation is not complete and the project needs to continue.

      Info-Tech Insight

      People are far more complicated than any technology being implemented.

      Consider carefully your approach.

      Why does it happen?

      POOR COMMUNICATION

      There isn’t always adequate communications about what’s changing in the workplace.

      FEAR

      Fear of change is natural and often not rational. Whether the fear is about job loss or not being able to adapt to change; it needs to be managed.

      TRAINING

      Training can be insufficient or ineffective and when this happens people are left feeling like they don’t have the skills to make the change.

      LACK OF EXECUTIVE SUPPORT

      A lack of executive support for change means the change is seen as less important.

      CONFLICTING VIEWS OF CHANGE

      The excitement the project team and business feels about the change is not necessarily shared throughout the business. Some may just see the change as more work, changing something that already works, or a reason to reduce staff levels.

      LACK OF CONFIDENCE

      Whether it’s a lack of confidence generally with technology or concern about a new or changing tool, a lack of confidence is a huge barrier.

      BUDGETARY CONSTRAINTS

      There is a cost with managing people during a change, and budget must be allocated to allow for it.

      Communications

      Info-Tech Insight

      Since Sigmund Freud there has been endless work to understand people’s minds.
      Don’t underestimate the effect that people’s reactions to change can have on your project.

      This is a Kubler-ross change curve graph, plotting the following Strategies: Create Alignment; Maximize Communication; Spark Motivation; Develop Capability; Share Knowledge

      Communication plans are designed to properly manage change. Managing change can be easier when we have the right tools and information to adapt to new circumstances. The Kubler-Ross change curve illustrates the expected steps on the path to acceptance of change. With the proper communications strategy, each can be managed appropriately

      Analyst perspective

      Paul Binns – Principal Research Advisor, Info-Tech

      The rapidly changing technology landscape in our world has always meant that an enthusiasm or willingness to embrace change has been advantageous. Many of us have seen how the older generation has struggled with that change and been left behind.

      In the work environment, the events of the past two years have increased pressure on those slow to adopt as in many cases they couldn't perform their tasks without new tools. Previously, for example, those who may have been reluctant to use digital tools and would instead opt for face-to-face meetings, suddenly found themselves without an option as physical meetings were no longer possible. Similarly, digital collaboration tools that had been present in the market for some time were suddenly more heavily used so everyone could continue to work together in the “online world.”

      At this stage no one is sure what the "new normal" will be in the post-pandemic world, but what has been clearly revealed is that people are prepared to change given the right motivation.

      “Technology adoption is about the psychology of change.”
      Bryan Tutor – Executive Counsellor, Info-Tech

      The Fix

      • Categorize Users
        • Gain a clear understanding of your user types.
      • Identify Adoption Techniques
        • Understand the range of different tools and techniques available.
      • Match Techniques To Categories
        • Determine the most appropriate techniques for your user base.
      • Follow-the-Leader
        • Be aware of the different skills in your environment and use them to your advantage.
      • Refresh, Retrain, Restrain
        • Prevent reversion to old methods or systems.

      Categories

      Client-Driven Insight

      Consider your staff and industry when looking at the Everett Rogers curve. A technology organization may have less laggards than a traditional manufacturing one.

      In Everett Rogers’ book Diffusion of Innovations 5th Edition (Free Press, 2005), Rogers places adopters of innovations into five different categories.

      This is an image of an Innovation Adoption Curve from Everett Rogers' book Diffusion of Innovations 5th Edition

      Category 1: The Innovator – 2.5%

      Innovators are technology enthusiasts. Technology is a central interest of theirs, either at work, at home, or both. They tend to aggressively pursue new products and technologies and are likely to want to be involved in any new technology being implemented as soon as possible, even before the product is ready to be released.

      For people like this the completeness of the new technology or the performance can often be secondary because of their drive to get new technology as soon as possible. They are trailblazers and are not only happy to step out of their comfort zone but also actively seek to do so.

      Although they only make up about 2.5% of the total, their enthusiasm, and hopefully endorsement of new technology, offers reassurance to others.

      Info-Tech Insight

      Innovators can be very useful for testing before implementation but are generally more interested in the technology itself rather than the value the technology will add to the business.

      Category 2: The Early Adopter – 13.5%

      Whereas Innovators tend to be technologists, Early Adopters are visionaries that like to be on board with new technologies very early in the lifecycle. Because they are visionaries, they tend to be looking for more than just improvement – a revolutionary breakthrough. They are prepared to take high risks to try something new and although they are very demanding as far as product features and performance are concerned, they are less price-sensitive than other groups.

      Early Adopters are often motivated by personal success. They are willing to serve as references to other adopter groups. They are influential, seen as trendsetters, and are of utmost importance to win over.

      Info-Tech Insight

      Early adopters are key. Their enthusiasm for technology, personal drive, and influence make them a powerful tool in driving adoption.

      Category 3: The Early Majority – 34%

      This group is comprised of pragmatists. The first two adopter groups belong to early adoption, but for a product to be fully adopted the mainstream needs to be won over, starting with the Early Majority.

      The Early Majority share some of the Early Adopters’ ability to relate to technology. However, they are driven by a strong sense of practicality. They know that new products aren’t always successful. Consequently, they are content to wait and see how others fare with the technology before investing in it themselves. They want to see well-established references before adopting the technology and to be shown there is no risk.

      Because there are so many people in this segment (roughly 34%), winning these people over is essential for the technology to be adopted.

      Category 4: The Late Majority – 34%

      The Late Majority are the conservatives. This group is generally about the same size as the Early Majority. They share all the concerns of the Early Majority; however, they are more resistant to change and are more content with the status quo than eager to progress to new technology. People in the Early Majority group are comfortable with their ability to handle new technology. People in the Late Majority are not.

      As a result, these conservatives prefer to wait until something has become an established standard and take part only at the end of the adoption period. Even then, they want to see lots of support and ensure that there is proof there is no risk in them adopting it.

      Category 5: The Laggard – 16%

      This group is made up of the skeptics and constitutes 16% of the total. These people want nothing to do with new technology and are generally only content with technological change when it is invisible to them. These skeptics have a strong belief that disruptive new technologies rarely deliver the value promised and are almost always worried about unintended consequences.

      Laggards need to be dealt with carefully as their criticism can be damaging and without them it is difficult for a product to become fully adopted. Unfortunately, the effort required for this to happen is often disproportional to the size of the group.

      Info-Tech Insight

      People aren’t born laggards. Technology projects that have failed in the past can alter people’s attitudes, especially if there was a negative impact on their working lives. Use empathy when dealing with people and respect their hesitancy.

      Adoption Techniques

      Different strokes for different folks

      Technology adoption is all about people; and therefore, the techniques required to drive that adoption need to be people oriented.

      The following techniques are carefully selected with the intention of being impactful on all the different categories described previously.

      Technology Adoption: Herd Mentality; Champions; Force; Group Training; One-on-One; Contests; Marketing; Proof of Concept; Train the Trainer

      There are multitudes of different methods to get people to adopt new technology, but which is the most appropriate for your situation? Generally, it’s a combination.

      Technology Adoption: Herd Mentality; Champions; Force; Group Training; One-on-One; Contests; Marketing; Proof of Concept; Train the Trainer

      Train the Trainer

      Use your staff to get your message across.

      Abstract

      This technique involves training key members of staff so they can train others. It is important that those selected are strong communicators, are well respected by others, and have some expertise in technology.

      Advantages

      • Cost effective
      • Efficient dissemination of information
      • Trusted internal staff

      Disadvantages

      • Chance of inconsistent delivery
      • May feel threatened by co-worker

      Best to worst candidates

      • Early Adopter: Influential trendsetters. Others receptive of their lead.
      • Innovator: Comfortable and enthusiastic about new technology, but not necessarily a trainer.
      • Early Majority: Tendency to take others’ lead.
      • Late Majority: Risk averse and tend to follow others, only after success is proven.
      • Laggard: Last to adopt usually. Unsuitable as Trainer.

      Marketing

      Marketing should be continuous throughout the change to encourage familiarity.

      Abstract

      Communication is key as people are comfortable with what is familiar to them. Marketing is an important tool for convincing adopters that the new product is mainstream, widely adopted and successful.

      Advantages

      • Wide communication
      • Makes technology appear commonplace
      • Promotes effectiveness of new technology

      Disadvantages

      • Reliant on staff interest
      • Can be expensive

      Best to worst candidates

      • Early Majority: Pragmatic about change. Marketing is effective encouragement.
      • Early Adopter: Receptive and interested in change. Marketing is supplemental.
      • Innovator: Actively seeks new technology. Does not need extensive encouragement.
      • Late Majority: Requires more personal approach.
      • Laggard: Resistant to most enticements.

      One-on-One

      Tailored for individuals.

      Abstract

      One-on-one training sometimes is the only way to train if you have staff with special needs or who are performing unique tasks.
      It is generally highly effective but inefficient as it only addresses individuals.

      Advantages

      • Tailored to specific need(s)
      • Only relevant information addressed
      • Low stress environment

      Disadvantages

      • Expensive
      • Possibility of inconsistent delivery
      • Personal conflict may render it ineffective

      Best to worst candidates

      • Laggard: Encouragement and cajoling can be used during training.
      • Late Majority: Proof can be given of effectiveness of new product.
      • Early Majority: Effective, but not cost efficient.
      • Early Adopter: Effective, but not cost-efficient.
      • Innovator: Effective, but not cost-efficient.

      Group Training

      Similar roles, attitudes, and abilities.

      Abstract

      Group training is one of the most common methods to start people on their journey toward new technology. Its effectiveness with the two largest groups, Early Majority and Late Majority, make it a primary tool in technology adoption.

      Advantages

      • Cost effective
      • Time effective
      • Good for team building

      Disadvantages

      • Single method may not work for all
      • Difficult to create single learning pace for all

      Best to worst candidates

      • Early Majority: Receptive. The formality of group training will give confidence.
      • Late Majority: Conservative attitude will be receptive to traditional training.
      • Early Adopter: Receptive and attentive. Excited about the change.
      • Innovator: Will tend to want to be ahead or want to move ahead of group.
      • Laggard: Laggards in group training may have a negative impact.

      Force

      The last resort.

      Abstract

      The transition can’t go on forever.

      At some point the new technology needs to be fully adopted and if necessary, force may have to be used.

      Advantages

      • Immediate full transition
      • Fixed delivery timeline

      Disadvantages

      • Alienation of some staff
      • Loss of faith in product if there are issues

      Best to worst candidates

      • Laggard: No choice but to adopt. Forces the issue.
      • Late Majority: Removes issue of reluctance to change.
      • Early Majority: Content, but worried about possible problems.
      • Early Adopter: Feel less personal involvement in change process.
      • Innovator: Feel less personal involvement in change process.

      Contests

      Abstract

      Contests can generate excitement and create an explorative approach to new technology. People should not feel pressured. It should be enjoyable and not compulsory.

      Advantages

      • Rapid improvement of skills
      • Bring excitement to the new technology
      • Good for team building

      Disadvantages

      • Those less competitive or with lower skills may feel alienated
      • May discourage collaboration

      Best to worst candidates

      • Early Adopter: Seeks personal success. Risk taker. Effective.
      • Innovator: Enthusiastic to explore limits of technology.
      • Early Majority: Less enthusiastic. Pragmatic. Less competitive.
      • Late Majority: Conservative. Not enthusiastic about new technology.
      • Laggard: Reluctant to get involved.

      Incentives

      Incentives don’t have to be large.

      Abstract

      For some staff, merely taking management’s lead is not enough. Using “Nudge” techniques to give that extra incentive is quite effective. Incentivizing staff either financially or through rewards, recognition, or promotion is a successful adoption technique for some.

      Advantages

      Encouragement to adopt from receiving tangible benefit

      Draws more attention to the new technology

      Disadvantages

      Additional expense to business or project

      Possible poor precedent for subsequent changes

      Best to worst candidates

      Early Adopter: Desire for personal success makes incentives enticing.

      Early Majority: Prepared to change, but extra incentive will assist.

      Late Majority: Conservative attitude means incentive may need to be larger.

      Innovator: Enthusiasm for new technology means incentive not necessary.

      Laggard: Sceptical about change. Only a large incentive likely to make a difference.

      Champions

      Strong internal advocates for your new technology are very powerful.

      Abstract

      Champions take on new technology and then use their influence to promote it in the organization. Using managers as champions to actively and vigorously promote the change is particularly effective.

      Advantages

      • Infectious enthusiasm encourages those who tend to be reluctant
      • Use of trusted internal staff

      Disadvantages

      • Removes internal staff from regular duties
      • Ineffective if champion not respected

      Best to worst candidates

      • Early Majority: Champions as references of success provide encouragement.
      • Late Majority: Management champions in particular are effective.
      • Laggard: Close contact with champions may be effective.
      • Early Adopter: Receptive of technology, less effective.
      • Innovator: No encouragement or promotion required.

      Herd Mentality

      Follow the crowd.

      Abstract

      Herd behavior is when people discount their own information and follow others. Ideally all adopters would understand the reason and advantages in adopting new technology, but practically, the result is most important.

      Advantages

      • New technology is adopted without question
      • Increase in velocity of adoption

      Disadvantages

      • Staff may not have clear understanding of the reason for change and resent it later
      • Some may adopt the change before they are ready to do so

      Best to worst candidates

      • Early Majority: Follow others’ success.
      • Late Majority: Likely follow an established proven standard.
      • Early Adopter: Less effective as they prefer to set trends rather than follow.
      • Innovator: Seeks new technology rather than following others.
      • Laggard: Suspicious and reluctant to change.

      Proof of Concepts

      Gain early input and encourage buy-in.

      Abstract

      Proof of concept projects give early indications of the viability of a new initiative. Involving the end users in these projects can be beneficial in gaining their support

      Advantages

      Involve adopters early on

      Valuable feedback and indications of future issues

      Disadvantages

      If POC isn’t fully successful, it may leave lingering negativity

      Usually, involvement from small selection of staff

      Best to worst candidates

      • Innovator: Strong interest in getting involved in new products.
      • Early Adopter: Comfortable with new technology and are influencers.
      • Early Majority: Less interest. Prefer others to try first.
      • Late Majority: Conservative attitude makes this an unlikely option.
      • Laggard: Highly unlikely to get involved.

      Match techniques to categories

      What works for who?

      This clustered column chart categorizes techniques by category

      Follow the leader

      Engage your technology enthusiasts early to help refine your product, train other staff, and act as champions. A combination of marketing and group training will develop a herd mentality. Finally, don’t neglect the laggards as they can prevent project completion.

      This is an inverted funnel chart with the output of: Change Destination.  The inputs are: 16% Laggards; 34% Late Majority; 34% Early Majority; 13.3% Early Adopters; 2% Innovators

      Info-Tech Insight

      Although there are different size categories, none can be ignored. Consider your budget when dealing with smaller groups, but also consider their impact.

      Refresh, retrain, restrain

      We don’t want people to revert.

      Don’t assume that because your staff have been trained and have access to the new technology that they will keep using it in the way they were trained. Or that they won’t revert back to their old methods or system.

      Put in place methods to remove completely or remove access to old systems. Schedule refresh training or skill enhancement sessions and stay vigilant.

      Research Authors

      Paul Binns

      Paul Binns

      Principal Research Advisor, Info-Tech Research Group

      With over 30 years in the IT industry, Paul brings to his work his experience as a Strategic Planner, Consultant, Enterprise Architect, IT Business Owner, Technologist, and Manager. Paul has worked with both small and large companies, local and international, and has had senior roles in government and the finance industry.

      Scott Young

      Scott Young

      Principal Research Advisor, Info-Tech Research Group

      Scott Young is a Director of Infrastructure Research at Info-Tech Research Group. Scott has worked in the technology field for over 17 years, with a strong focus on telecommunications and enterprise infrastructure architecture. He brings extensive practical experience in these areas of specialization, including IP networks, server hardware and OS, storage, and virtualization.

      Related Info-Tech Research

      User Group Analysis Workbook

      Use Info-Tech’s workbook to gather information about user groups, business processes, and day-to-day tasks to gain familiarity with your adopters.

      Governance and Management of Enterprise Software Implementation

      Use our research to engage users and receive timely feedback through demonstrations. Our iterative methodology with a task list focused on the business’ must-have functionality allows staff to return to their daily work sooner.

      Quality Management User Satisfaction Survey

      This IT satisfaction survey will assist you with early information to use for categorizing your users.

      Master Organizational Change Management Practices

      Using a soft, empathetic approach to change management is something that all PMOs should understand. Use our research to ensure you have an effective OCM plan that will ensure project success.

      Bibliography

      Beylis, Guillermo. “COVID-19 accelerates technology adoption and deepens inequality among workers in Latin America and the Caribbean.” World Bank Blogs, 4 March 2021. Web.

      Cleland, Kelley. “Successful User Adoption Strategies.” Insight Voices, 25 Apr. 2017. Web.

      Hiatt, Jeff. “The Prosci ADKAR ® Model.” PROSCI, 1994. Web.

      Malik, Priyanka. “The Kübler Ross Change Curve in the Workplace.” whatfix, 24 Feb. 2022. Web.

      Medhaugir, Tore. “6 Ways to Encourage Software Adoption.” XAIT, 9 March 2021. Web.

      Narayanan, Vishy. “What PwC Australia learned about fast tracking tech adoption during COVID-19” PWC, 13 Oct. 2020. Web.

      Sridharan, Mithun. “Crossing the Chasm: Technology Adoption Lifecycle.” Think Insights, 28 Jun 2022. Web.

      2020 Security Priorities Report

      • Buy Link or Shortcode: {j2store}245|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting

      Use this deck to learn what projects security practitioners are prioritizing for 2020. Based on a survey of 460 IT security professionals, this report explains what you need to know about the top five priorities, including:

      • Signals and drivers
      • Benefits
      • Critical uncertainties
      • Case study
      • Implications

      While the priorities should in no way be read as prescriptive, this research study provides a high-level guide to understand that priorities drive the initiatives, projects, and responsibilities that make up organizations' security strategies.

      Our Advice

      Critical Insight

      There is always more to do, and if IT leaders are to grow with the business, provide meaningful value, and ascend the ladder to achieve true business partner and innovator status, aggressive prioritization is necessary. Clearly, security has become a priority across organizations, as security budgets have continued to increase over the course of 2019. 2020’s priorities highlight that data security has become the thread that runs through all other security priorities, as data is now the currency of the modern digital economy. As a result, data security has reshaped organizations’ priorities to ensure that data is always protected.

      Impact and Result

      Ultimately, understanding how changes in technology and patterns of work stand to impact the day-to-day lives of IT staff across seniority and industries will allow you to evaluate what your priorities should be for 2020. Ensure that you’re spending your time right. Use data to validate. Prioritize and implement.

      2020 Security Priorities Report Research & Tools

      Start here – read the Executive Brief

      This storyboard will help you understand what projects security practitioners are prioritizing for 2020.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Data security

      Data security often rubs against other organizational priorities like data quality, but organizations need to understand that the way they store, handle, and dispose of data is now under regulatory oversight.

      • 2020 Security Priorities Report – Priority 1: Data Security

      2. Cloud security

      Cloud security means that organizations can take advantage of automation tools not only for patching and patch management but also to secure code throughout the SDLC. It is clear that cloud will transform how security is performed.

      • 2020 Security Priorities Report – Priority 2: Cloud Security

      3. Email security

      Email security is critical, since email continues to be one of the top points of ingress for cyberattacks from ransomware to business email compromise.

      • 2020 Security Priorities Report – Priority 3: Email Security

      4. Security risk management

      Security risk management requires organizations to make decisions based on their individual risk tolerance on such things as machine learning and IoT devices.

      • 2020 Security Priorities Report – Priority 4: Security Risk Management

      5. Security awareness and training

      Human error continues to be a security issue. In 2020, organizations should tailor their security awareness and training to their people so that they are more secure not only at work but also in life.

      • 2020 Security Priorities Report – Priority 5: Security Awareness and Training
      [infographic]

      Implement Software Asset Management

      • Buy Link or Shortcode: {j2store}313|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $107,154 Average $ Saved
      • member rating average days saved: 39 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management
      • Organizations are aware of the savings that result from implementing software asset management (SAM), but are unsure of where to start the process.
      • Poor data capture procedures and lack of a centralized repository produce an incomplete picture of software assets and licenses, preventing accurate forecasting and license optimization.
      • Audit protocols are ad hoc, resulting in sloppy reporting and time-consuming work and lack of preparedness for external software audits.

      Our Advice

      Critical Insight

      • A strong SAM program will benefit all aspects of the business. Data and reports gained through SAM will enable data-driven decision making for all areas of the business.
      • Don’t just track licenses; manage them to create value from data. Gathering and monitoring license data is just the beginning. What you do with that data is the real test.
      • Win the audit battle without fighting. Conduct internal audits to minimize surprises when external audits are requested.

      Impact and Result

      • Conduct a current state assessment of existing SAM processes to form an appropriate plan for implementing or improving your SAM program.
      • Define standard policies, processes, and procedures for each stage of the software asset lifecycle, from procurement through to retirement.
      • Develop an internal audit policy to mitigate the risk of costly external audits.

      Implement Software Asset Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement software asset management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess & plan

      Assess current state and plan the scope of the SAM program, team, and budget.

      • Implement Software Asset Management – Phase 1: Assess & Plan
      • SAM Maturity Assessment
      • SAM Standard Operating Procedures
      • SAM Budget Workbook

      2. Procure, receive & deploy

      Define processes for software requests, procurement, receiving, and deployment.

      • Implement Software Asset Management – Phase 2: Procure, Receive & Deploy
      • SAM Process Workflows (Visio)
      • SAM Process Workflows (PDF)

      3. Manage, redeploy & retire

      Define processes for software inventory, maintenance, harvest and redeployment, and retirement.

      • Implement Software Asset Management – Phase 3: Manage, Redeploy & Retire
      • Patch Management Policy

      4. Build supporting processes

      Build processes for audits and plan the implementation.

      • Implement Software Asset Management – Phase 4: Build Supporting Processes & Tools
      • Software Audit Scoping Email Template
      • Software Audit Launch Email Template
      • SAM Communication Plan
      • SAM FAQ Template
      • Software Asset Management Policy
      [infographic]

      Workshop: Implement Software Asset Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess & Plan

      The Purpose

      Assess current state and plan the scope of the SAM program, team, and budget.

      Key Benefits Achieved

      Current state assessment

      Defined roles and responsibilities

      SAM budget plan

      Activities

      1.1 Outline SAM challenges and objectives.

      1.2 Assess current state.

      1.3 Identify roles and responsibilities for SAM team.

      1.4 Identify metrics and reports.

      1.5 Identify SAM functions to centralize vs. decentralize.

      1.6 Plan SAM budget process.

      Outputs

      Current State Assessment

      RACI Chart

      Defined metrics and reports

      SAM Budget Workbook

      2 Procure, Receive & Deploy

      The Purpose

      Define processes for software requests, procurement, receiving, and deployment.

      Key Benefits Achieved

      Defined standards for software procurement

      Documented processes for software receiving and deployment

      Activities

      2.1 Determine software standards.

      2.2 Define procurement process for new contracts.

      2.3 Define process for contract renewals and additional procurement scenarios.

      2.4 Design process for receiving software.

      2.5 Design deployment workflow.

      2.6 Define process for non-standard software requests.

      Outputs

      Software standards

      Standard Operating Procedures

      SAM Process Workflows

      3 Manage, Redeploy & Retire

      The Purpose

      Define processes for software inventory, maintenance, harvest and redeployment, and retirement.

      Key Benefits Achieved

      Defined process for conducting software inventory

      Maintenance and patch policy

      Documented workflows for software harvest and redeployment as well as retirement

      Activities

      3.1 Define process for conducting software inventory.

      3.2 Define policies for software maintenance and patches.

      3.3 Map software license harvest and reallocation process.

      3.4 Define policy for retiring software.

      Outputs

      Standard Operating Procedures

      Patch management policy

      SAM Process Workflows

      4 Build Supporting Processes & Tools

      The Purpose

      Build processes for audits, identify tool requirements, and plan the implementation.

      Key Benefits Achieved

      Defined process for internal and external audits

      Tool requirements

      Communication and implementation plan

      Activities

      4.1 Define and document the internal audit process.

      4.2 Define and document the external audit process.

      4.3 Document tool requirements.

      4.4 Develop a communication plan.

      4.5 Prepare an FAQ list.

      4.6 Identify SAM policies.

      4.7 Develop a SAM roadmap to plan your implementation.

      Outputs

      Audit response templates

      Tool requirements

      Communication plan

      End-user FAQ list

      Software Asset Management Policy

      Implementation roadmap

      Further reading

      Implement Software Asset Management

      Go beyond tracking licenses to proactively managing software throughout its lifecycle.

      Table of contents

      1. Title
      2. Executive Brief
      3. Execute the Project/DIY Guide
      4. Next Steps
      5. Appendix

      Analyst Perspective

      “Organizations often conflate software asset management (SAM) with license tracking. SAM is not merely knowing how many licenses you require to be in compliance; it’s asking the deeper budgetary questions to right-size your software spend.

      Software audits are a growing concern for businesses, but proactive reporting and decision making supported by quality data will mitigate audit risks. Value is left on the table through underused or poor-quality data, so active data management must be in play. A dedicated ITAM tool can assist with extracting value from your license data.

      Achieving an optimized SAM program is a transformative effort, but the people, processes, and technology need to be in place before that can happen.” (Sandi Conrad, Senior Director, Infrastructure & Operations Practice, Info-Tech Research Group)

      Software license complexity and audit frequency are increasing: are you prepared to manage the risk?

      This Research Is Designed For:

      • CIOs that want to improve IT’s reputation with the business.
      • CIOs that want to eliminate the threat of a software audit.
      • Organizations that want proactive reporting that benefits the entire business.
      • IT managers who want visibility into their software usage.

      This Research Will Help You:

      • Establish a standardized software management process.
      • Track and manage software throughout its lifecycle, from procurement through to retirement or redeployment.
      • Rationalize your software license estate.
      • Improve your negotiations with software vendors.
      • Improve the quality of your SAM data gathering and reporting.

      Executive summary

      Situation

      • Organizations are aware of the savings that result from implementing software asset management (SAM), but are unsure of where to start the process. With no formal standards in place for managing licenses, organizations are constantly at risk for costly software audits and poorly executed software spends.

      Complication

      • Poor data-capture procedures produce an incomplete picture of software lifecycles.
      • No centralized repository exists, resulting in fragmented reporting.
      • Audit protocols are ad hoc, resulting in sloppy reporting and time-consuming work.

      Resolution

      • Conduct a current state assessment of existing SAM processes to form an appropriate plan for implementing or improving your SAM program.
      • Build and involve a SAM team in the process from the beginning to help embed the change.
      • Define standard policies, processes, and procedures for each stage of the software asset lifecycle, from procurement through to retirement. Pace yourself; a staged implementation will make your ITAM program a success.
      • Develop an internal audit program to mitigate the risk of costly audits.
      • Once a standardized SAM program and data are in place, you will be able to use the data to optimize and rationalize your software licenses.

      Info-Tech Insight

      A strong SAM program will benefit all aspects of the business.
      Data and reports gained through SAM will enable data-driven decision making for all areas of the business.

      Don’t just track licenses; manage them to create value from data.
      Gathering and monitoring license data is just the beginning. What you do with that data is the real test.

      Win the audit battle without fighting.
      Conduct internal audits to minimize surprises when external audits are requested.

      Build the business case for SAM on cost and risk avoidance

      You can estimate the return even without tools or data.

      Benefit Calculate the return
      Compliance

      How many audits did you have in the past three years?

      How much time did you spend in audit response?

      Suppose you had two audits each year for the last three years, each with an average $250,000 in settlements.

      A team of four with an average salary of $75,000 each took six months to respond each year, allocating 20% of their work time to the audit.

      You could argue annual audits cost on average $530,000. Increasing ITAM maturity stands to reduce that cost significantly.

      Efficiency

      How much do you spend on software and maintenance by supplier?

      Suppose you spent $1M on software last year. What if you could reduce the spend by just 10% through better practices?

      SAM can help reduce the annual spend by simplifying support, renegotiating contracts based on asset data, reducing redundancy, and reducing spend.

      The Business Benefits of SAM

      • Compliance: Managing audits and meeting legal, contractual, and regulatory obligations.
      • Efficiency: Reducing costs and making the best use of assets while maintaining service.
      • Agility: Anticipate requirements using asset data for business intelligence and analytics.

      Poor software asset management practices increase costs and risks

      Failure to implement SAM can lead to:

      High cost of undiscovered IT assets
      • Needless procurement of software for new hires can be costly.
      Licensing, liability, and legal violations
      • Legal actions and penalties that result from ineffective SAM processes and license incompliance can severely impact an organization’s financial performance and corporate brand image.
      Compromised security
      • Not knowing what assets you have, who is using them and how, can compromise the security of sensitive information.
      Increased management costs
      • Not having up-to-date software license information impacts decision making, with many management teams failing to respond quickly and efficiently to operational demands.
      Increased disruptions
      • Vendors seek out organizations who don’t manage their software assets effectively; it is likely that you could be subject to major operational disruptions as a result of an audit.
      Poor supplier/vendor relationship
      • Most organizations fear communicating with vendors and are anxious about negotiating new licenses.

      54% — A study by 1E found that only 54% of organizations believe they can identify all unused software in their organization.

      28% — On average, 28% of deployed software is unused, with a wasted cost of $224 per PC on unused software (1E, 2014).

      53% — Express Metrix found that 53% of organizations had been audited within the past two years. Of those, 72% had been audited within the last 12 months.

      SAM delivers cost savings beyond the procurement stage

      SAM delivers cost savings in several ways:

      • Improved negotiating position
        • Certainty around software needs and licensing terms can put the organization in a better negotiating position for new contracts or contract renewals.
      • Improved purchasing position
        • Centralized procurement can allow for improved purchasing agreements with better pricing.
      • More accurate forecasting and spend
        • With accurate data on what software is installed vs. used, more accurate decisions can be made around software purchasing needs and budgeting.
      • Prevention of over deployment
        • Deploy software only where it is needed based on what end users actively use.
      • Software rationalization
        • SAM data may reveal multiple applications performing similar functions that can be rationalized into a single standard software that is used across the enterprise.
      • License harvesting
        • Identify unused licenses that can be harvested and redeployed to other users rather than purchasing new licenses.

      SAM delivers many benefits beyond cost savings

      Manage risk. If licensing terms are not properly observed, the organization is at risk of legal and financial exposure, including illegal software installation, loss of proof of licenses purchased, or breached terms and conditions.

      Control and predict spend. Unexpected problems related to software assets and licenses can significantly impact cash flow.

      Less operational interruptions. Poor software asset management processes could lead to failed deployments, software update interruptions, viruses, or a shutdown of unlicensed applications.

      Avoid security breaches. If data is not secure through software patches and security, confidential information may be disclosed.

      More informed decisions. More accurate data on software assets improves transparency and informs decision making.

      Improved contract management. Automated tools can alert you to when contracts are up for renewal to allow time to plan and negotiate, then purchase the right amount of licenses.

      Avoid penalties. Conduct internal audits and track compliance to avoid fees or penalties if an external audit occurs.

      Reduced IT support. Employees should require less support from the service desk with proper, up to date, licensed software, freeing up time for IT Operations to focus on other work.

      Enhanced productivity. By rationalizing and standardizing software offerings, more staff should be using the same software with the same versioning, allowing for better communication and collaboration.

      Asset management is especially correlated with the following processes

      Being highly effective at asset management means that you are more likely to be highly effective at almost all IT processes, especially:

      Icon for process 'BAI10 Configuration Management'. Configuration Management
      76% more effective
      Icon for process 'ITRG03 Manage Service Catalogs'. Service Catalog
      74% more effective
      Icon for process 'APO11 Quality Management'. Quality Management
      63% more effective
      Icon for process 'ITRG08 Data Quality'. Data Quality
      62% more effective
      Icon for process 'MEA01 Performance Measurement'. Performance Measurement
      61% more effective
      Icon for process 'BAI05 Organizational Change Management'. Organizational Change Management
      60% more effective
      Icon for process 'APO05 Portfolio Management'. Portfolio Management
      59% more effective
      Icon for process 'APO03 Enterprise Architecture'. Enterprise Architecture
      58% more effective

      Why? Good SAM processes are integral to both service management and configuration management

      (Source: Info-Tech Research Group, IT Management and Governance Diagnostic; N=972 organizations) (High asset management effectiveness was defined as those organizations with an effectiveness score of 8 or above.)

      To accelerate progress, Info-Tech Research Group parses software asset management into its essential processes

      Focus on software asset management essentials

      Software Procurement:

      • Define procurement standards for software and related warranties and support options.
      • Develop processes and workflows for purchasing and work out financial implications to inform budgeting later.

      Software Deployment and Maintenance:

      • Define policies, processes, and workflows for software receiving, deployment, and maintenance practices.
      • Develop processes and workflows for managing imaging, harvests and redeployments, service requests, and large-scale rollouts.

      Software Harvest and Retirement:

      • Manage the employee termination and software harvest cycle.
      • Develop processes, policies, and workflows for software security and retirement.

      Software Contract and Audit Management:

      • Develop processes for data collection and validation to prepare for an audit.
      • Define metrics and reporting processes to keep asset management processes on track.
      A diagram that looks like a tier circle with 'Implement SAM' at the center. The second ring has 'Request & Procure', 'Receive & Deploy', 'Manage & Maintain', and 'Harvest & Retire'. The third ring seems to be a cycle beginning with 'Plan', 'Request', 'Procure', 'Deploy', 'Manage', 'Retire', and back to 'Plan'.

      Asset management is a key piece of Info-Tech’s COBIT-based IT Management and Governance Framework

      The Info-Tech / COBIT5 IT Management & Governance Framework, a number of IT process icons arranged like a periodic table. A magnifying glass highlights process 'BAI09 Asset Management' in the 'Infrastructure & Operations' category.

      Follow Info-Tech's methodology to build a plan to implement software asset management

      Phase 1
      Assess & Plan
      Phase 2
      Procure, Receive & Deploy
      Phase 3
      Manage, Redeploy & Retire
      Phase 4
      Build supporting processes

      1.1

      Assess current state

      2.1

      Request & procure

      3.1

      Manage & maintain contracts

      4.1

      Compliance & audits

      1.2

      Build team and define metrics

      2.2

      Receive & deploy

      3.2

      Harvest or retire

      4.2

      Communicate & build roadmap

      1.3

      Plan & budget
      Deliverables
      Standard Operating Procedures (SOP)
      SAM maturity assessment Process workflows Process workflows Audit response templates
      RACI chart Software standards Patch management policy Communication plan & FAQ template
      SAM metrics SAM policies
      SAM budget workbook

      Thanks to SAM, Visa saved $200 million in three years

      Logo for VISA.

      Case Study

      Industry: Financial Services
      Source: International Business Software Managers Association

      Visa, Inc.

      Visa, Inc. is the largest payment processing company in the world, with a network that can handle over 40,000 transactions every minute.

      Software Asset Management Program

      In 2006, Visa launched a formal IT asset management program, but it was not until 2011 that it initiated a focus on SAM. Joe Birdsong, the SAM director, first addressed four major enterprise license agreements (ELAs) and compliance issues. The SAM team implemented a few dedicated SAM tools in conjunction with an aggressive approach to training.

      Results

      The proactive approach taken by Visa used a three-pronged strategy: people, process, and tools. The process included ELA negotiations, audit responses, and software license rationalization exercises.

      According to Birdsong, “In the past three years, SAM has been credited with saving Visa over $200 million.”

      An timeline arrow with benchmarks, in order: 'Tool purchases', 'ELA negotiations', 'License rationalization', 'Audit responses', '$200 million in savings in just three years thanks to optimized SAM processes'.

      Info-Tech delivers: Use our tools and templates to accelerate your project to completion

      Thumbnail of Info-Tech's 'SAM Standard Operating Procedures (SOP)'.
      SAM Standard Operating Procedures (SOP)
      Thumbnail of Info-Tech's 'SAM Maturity Assessment'.
      SAM Maturity Assessment
      Thumbnail of Info-Tech's 'SAM Visio Process Workflows'.
      SAM Visio Process Workflows
      Thumbnail of Info-Tech's 'SAM Budget Workbook'.
      SAM Budget Workbook
      Thumbnail of Info-Tech's 'Additional SAM Policy Templates'.
      Additional SAM Policy Templates
      Thumbnail of Info-Tech's 'Software Asset Management Policy'.
      Software Asset Management Policy
      Thumbnail of Info-Tech's 'SAM Communication Plan'.
      SAM Communication Plan
      Thumbnail of Info-Tech's 'SAM FAQ Template'.
      SAM FAQ Template

      Use these insights to help guide your understanding of the project

      • SAM provides value to other processes in IT.
        Data, reports, and savings gained through SAM will enable data-driven decision making for all areas of the business.
      • Don’t just track licenses; manage them to create value from data.
        Gathering and monitoring license data is just the beginning. What you do with that data is the real test.
      • SAM isn’t about managing costs; it’s about understanding your environment to make better decisions.
        Capital tied up in software can impact the progress of other projects.
      • Managing licenses can impact the entire organization.
        Gain project buy-in from stakeholders by articulating the impact that managing licenses can have on other projects and the prevalence of shadow IT.

      Measure the value of a guided implementation (GI)

      Engaging in GIs doesn’t just offer valuable project advice, it also results in significant cost savings.

      GI Measured Value (Assuming 260 workdays in a year)
      Phase 1: Assess & Plan
      • Time, value, and resources saved by using Info-Tech’s methodology to assess current state and create a defined SAM team with actionable metrics
      • For example, 2 FTEs * 5 days * $80,000/year = $6,400
      Phase 2: Procure, Receive & Deploy
      • Time, value, and resources saved by using Info-Tech’s methodology to streamline request, procurement, receiving, and deployment processes for software assets.
      • For example, 2 FTEs * 5 days * $80,000/year = $6,400
      Phase 3: Manage, Redeploy & Retire
      • Time, value, and resources saved by using Info-Tech’s methodology to streamline the maintenance, inventory, license redeployment, and software retiring processes.
      • For example, 2 FTEs * 5 days * $80,000/year = $6,400
      Phase 4: Build Supporting Processes and Tools
      • Time, resources, and potential audit fines saved by using Info-Tech’s methodology to improve audit defense processes ($298,325 average audit penalty (Based on the results of Cherwell Software’s 2013 Software Audit Industry Report)) and design a communication and implementation plan.
      • For example, 2 FTEs * 5days * $80,000/year = $6,400 + $298,325 = $304,725
      Total savings $330,325

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Implement Software Asset Management – project overview

      Phase 1: Assess & plan Phase 2: Procure, receive & deploy Phase 3: Manage, redeploy & retire Phase 4: Build supporting processes
      Supporting Tool icon Best-Practice Toolkit

      Step 1.1: Assess current state

      Step 1.2: Build team and define metrics

      Step 1.3: Plan and budget

      Step 2.1: Request and procure

      Step 2.2: Receive and deploy

      Step 3.1: Manage and maintain contracts

      Step 3.2: Harvest, redeploy, or retire

      Step 4.1: Compliance and audits

      Step 4.2: Communicate and build roadmap

      Guided Implementations
      • Assess current state and challenges.
      • Define roles and responsibilities as well as metrics.
      • Discuss SAM budgeting.
      • Define software standards and procurement process.
      • Build processes for receiving software and deploying software.
      • Define process for conducting software inventory and maintenance and patches.
      • Build software harvest and redeployment processes and retirement.
      • Define process for internal and external audits.
      • Develop communication and implementation plan.
      Associated Activity icon Onsite Workshop Module 1:
      Assess & Plan
      Module 2:
      Map Core Processes: Procure, Receive & Deploy
      Module 3:
      Map Core Processes: Manage, Redeploy & Retire
      Module 4:
      Prepare for audit, build roadmap and communications

      Workshop Overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
      Activities
      Assess & Plan

      1.1 Outline SAM challenges and objectives

      1.2 Assess current state

      1.3 Identify roles and responsibilities for SAM team

      1.4 Identify metrics and reports

      1.5 Identify SAM functions to centralize vs. decentralize

      1.6 Plan SAM budget process

      Map Core Processes: Procure, Receive & Deploy

      2.1 Determine software standards

      2.2 Define procurement process for new contracts

      2.3 Define process for contract renewals and additional procurement scenarios

      2.4 Design process for receiving software

      2.5 Design deployment workflow

      2.6 Define process for non-standard software requests

      Map Core Processes: Manage, Redeploy & Retire

      3.1 Define process for conducting software inventory

      3.2 Define policies for software maintenance and patches

      3.3 Map software license harvest and reallocation process

      3.4 Define policy for retiring software

      Build Supporting Processes

      4.1 Define and document the internal audit process

      4.2 Define and document the external audit process

      4.3 Develop a communication plan

      4.4 Prepare an FAQ list

      4.5 Identify SAM policies

      4.6 Develop a SAM roadmap to plan your implementation

      Deliverables
      • SAM maturity assessment
      • RACI chart
      • Defined metrics and reports
      • Budget workbook
      • Process workflows
      • Software standards
      • Process workflows
      • Patch management policy
      • Standard operating procedures
      • Audit response templates
      • Communication plan
      • FAQ template
      • Additional policy templates
      • Roadmap of initiatives

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Phase 1: Assess Current State

      VISA fought fire with fire to combat costly software audits

      Logo for VISA.

      Case Study

      Industry: Financial Services
      Source: SAM Summit 2014

      Challenge

      Visa implemented an IT asset management program in 2006. After years of software audit teams from large firms visiting and leaving expensive software compliance bills, the world’s leading payment processing company decided it was time for a change.

      Upper management recognized that it needed to combat audits. It had the infrastructure in place and the budget to purchase SAM tools that could run discovery and tracking functions, but it was lacking the people and processes necessary for a mature SAM program.

      Solution

      Visa decided to fight fire with fire. It initially contracted the same third-party audit teams to help build out its SAM processes. Eventually, Visa formed a new SAM team that was led by a group of former auditors.

      The former auditors recognized that their role was not technology based, so a group of technical individuals were hired to help roll out various SAM tools.

      The team rolled out tools like BDNA Discover and Normalize, Flexera FlexNet Manager, and Microsoft SCCM.

      Results

      To establish an effective SAM team, diverse talent is key. Visa focused on employees that were consultative but also technical. Their team needed to build relationships with teams within the organization and externally with vendors.

      Most importantly, the leaders of the team needed to think like auditors to better prepare for audits. According to Joe Birdsong, SAM Director at Visa, “we want to be viewed as a team that can go in and help right-size their environment and better understand licensing to help teams make better decisions.”

      The SAM team was only the beginning.

      Step 1.1 Assess current state and plan scope

      Phase 1:
      Assess & Plan
      This step will walk you through the following activities:This step involves the following participants:

      1.1

      Assess current state
      • 1.1.1 Outline the organization’s SAM challenges
      • 1.1.2 Identify objectives of SAM program
      • 1.1.3 Determine the maturity of your SAM program
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and SAM Manager

      1.2

      Build team and define metrics

      1.3

      Plan & budget

      Step Outcomes

      • An outline of the challenges related to SAM
      • A clear direction for the program based on drivers, anticipated benefits, and goals
      • A completed maturity assessment of current SAM processes

      Sketch out challenges related to software asset management to shape the direction of the project

      Common SAM challenges

      • Audits are disruptive, time-consuming, and costly
      • No audit strategy and response in place
      • Software non-compliance risk is too high
      • Lacking data to forecast software needs
      • No central repository of software licenses
      • Untracked or unused software licenses results in wasted spend
      • Software license and maintenance costs account for a large percentage of the budget
      • Lacking data to know what software is purchased and deployed across the organization
      • Lack of software standards make it difficult to collect consistent information about software products
      • New software licenses are purchased when existing licenses remain on the shelf or multiple similar software products are purchased
      • Employees or departments make ad hoc purchases, resulting in overspending and reduced purchasing power
      • License renewal dates come up unexpectedly without time for adequate decision making
      • No communication between departments to coordinate software purchasing
      • Difficult to stay up to date with software licensing rule changes to remain in compliance
      • Processes and policies are unstandardized and undocumented

      Outline the organization’s SAM challenges

      Associated Activity icon 1.1.1 Brainstorm SAM challenges

      Participants: CIO/CFO, IT Director, Asset Manager, Purchasing, Service Desk Manager, Security (optional), Operations (optional)

      1. Distribute sticky notes to participants. Have everyone start by identifying challenges they face as a result of poor software asset management.
      2. As group, discuss and outline the software asset management challenges facing the organization. These may be challenges caused by poor SAM processes or simply by a lack of process. Group the challenges into key pain points to inform the current state discussion and assessment to follow.

      To be effective with software asset management, understand the drivers and potential impact to the organization

      Drivers of effective SAM Results of effective SAM
      Contracts and vendor licensing programs are complex and challenging to administer without data related to assets and their environment. Improved access to accurate data on contracts, licensing, warranties, installed software for new contracts, renewals, and audit requests.
      Increased need to meet compliance requires a formal approach to tracking and managing assets. Encryption, software application controls, and change notifications all contribute to better asset controls and data security.
      Cost cutting is on the agenda, and management is looking to reduce overall IT spend in the organization in any possible way. Reduction of software spend through data for better forecasting, planning, and licensing rationalization and harvesting.
      Audits are time consuming, disruptive to project timelines and productivity, and costly. Respond to audits with a formalized process, accurate data, and minimal disruption using always-available reporting.

      Determine goals to focus the direction of your SAM program

      Associated Activity icon 1.1.2 Identify objectives of the SAM program

      Participants: CIO/CFO, IT Director, Asset Manager, Service Manager (optional)

      Document: Document in the Standard Operating Procedures.

      1. Identify the drivers behind the software asset management implementation or improvement project. List on a whiteboard or flip chart.
      2. Using the project drivers as input, brainstorm the goals of the SAM project. Discuss the goals as a group and finalize into a list of objectives for the SAM program.
      3. Record the objectives in the SOP and keep them in mind as you work through the rest of the project.

      Sample Objectives:

      1. A single data repository to efficiently manage assets for their entire lifecycle.
      2. Formalizing a methodology for documenting assets to make data retrieval easy and accurate.
      3. Defining and documenting processes to determine where improvements can be made.
      4. Improving customer experience in accessing, using, and maintaining assets.
      5. Centralizing contract information.
      6. Providing access to information for all technical teams as needed.

      Implementing SAM processes will support other IT functions

      By improving how you manage your licenses and audit requests, you will not only provide benefits through a mature SAM program, you will also improve your service desk and disaster recovery functions.

      Service Desk Disaster Recovery
      • Effective service desk tickets require a certain degree of technical detail for completion that a SAM program often provides.
      • Many tools are available that can handle both ITSM and ITAM functions. Your SAM data can be integrated into many of your service desk functions.
      • For example, if a particular application is causing a high number of tickets, SAM data could show the application’s license is almost expired and its usage has decreased due to end-user frustrations. The SAM team could review the application and decide to purchase software that better meets end-user needs.
      • If you don’t know what you have, you don’t know what needs to be back online first.
      • The ability to restore system functionality is heavily dependent on the ability to locate or reproduce master media documentation and system configuration information.
      • If systems/software are permanently lost, the ability to recover software licensing information is crucial to preserving compliance.
      • License agreement and software are needed to demonstrate software ownership. Unless the proof of ownership is present, there is no proof of compliance.
      Short description of Info-Tech blueprint 'Standardize the Service Desk'. Short description of Info-Tech blueprint 'Create a Right-Sized Disaster Recovery Plan'.

      Each level of SAM maturity comes with its own unique challenges

      Maturity People & Policies Processes Technology
      Chaos
      • No dedicated staff
      • No policies published
      • Procedures not documented or standardized
      • Licenses purchased randomly
      • Help desk images machines, but users can buy and install software
      • Minimal tracking tools in place
      Reactive
      • Semi-focused SAM manager
      • No policies published
      • Reliance on suppliers to provide reports for software purchases
      • Buy licenses as needed
      • Software installations limited to help desk
      • Discovery tools and spreadsheets used to manage software
      Controlled
      • Full-time SAM manager
      • End-user policies published and requiring sign-off
      • License reviews with maintenance and support renewals
      • SAM manager involved in budgeting and planning sessions
      • Discovery and inventory tools used to manage software
      • Compliance reports run as needed
      Proactive
      • Extended SAM team, including help desk and purchasing
      • Corporate anti-piracy statement in place and enforced
      • Quarterly license reviews
      • Centralized view into software licenses
      • Software requests through service catalog with defined standard and non-standard software
      • Product usage reports and alerts in place to harvest and reuse licenses
      • Compliance and usage reports used to negotiate software contracts
      Optimized
      • SAM manager trained and certified
      • Working with HR, Legal, Finance, and IT to enforce policies
      • Full support and maintenance analysis for all license reviews
      • Quarterly meetings with SAM team to review policies, procedures, upcoming contracts, and rollouts
      • Software deployed automatically through service catalog/apps store
      • Detailed savings reports provided to executive team annually
      • Automated policy enforcement and process workflows

      Determine the maturity of your SAM program

      Supporting Tool icon 1.1.3 Use the SAM Maturity Assessment Tool
      1. Download the SAM Maturity Assessment Tool and go to tab 2.
      2. Complete the self-assessment in all seven categories:
        1. Control Environment
        2. Roles & Responsibilities
        3. Policies & Procedures
        4. Competence
        5. Planning & Implementation Process
        6. Monitoring & Review
        7. Inventory Processes
      3. Go to tab 3 and examine the graphs produced. Identify the areas in your SAM program that require the most attention and which are already relatively mature.
      4. Use the results of this maturity assessment to focus the efforts of the project moving forward. Return to the assessment after a pre-determined time (e.g. one year later) to track improvement in maturity over time.
      Screenshot of the results page from the SAM Maturity Assessment Tool. Screenshot of the processes page from the SAM Maturity Assessment Tool.

      Step 1.2 Build team and define metrics

      Phase 1:
      Assess & Plan
      This step will walk you through the following activities:This step involves the following participants:

      1.1

      Assess current state
      • 1.2.1 Identify roles and responsibilities for SAM team
      • 1.2.2 Identify metrics and KPIs to track the success of your SAM program
      • 1.2.3 Define SAM reports to track metrics
      • CIO/CFO
      • IT Director
      • SAM Manager
      • SAM Team
      • Service Desk Manager

      1.2

      Build team and define metrics

      1.3

      Plan & budget

      Step Outcomes

      • A description of the roles and responsibilities of IT staff involved in SAM
      • A list of metrics and reports to track to measure the success of the software asset management program

      Define roles and responsibilities for the SAM program

      Roles and responsibilities should be adapted to fit specific organizational requirements based on its size, structure, and distribution and the scope of the program. Not all roles are necessary and in small organizations, one or two people may fulfill multiple roles.

      Senior Management Sponsor – Ensures visibility and support for the program.

      IT Asset Manager – Responsible for management of all assets and maintaining asset database.

      Software Asset Manager – Responsible for management of all software assets (a subset of the overall responsibility of the IT Asset Manager).

      SAM Process Owner – Responsible for overall effectiveness and efficiency of SAM processes.

      Asset Analyst – Maintains up-to-date records of all IT assets, including software version control.

      Additional roles that interact with SAM:

      • Security Manager
      • Auditors
      • Procurement Manager
      • Legal Council
      • Change Manager
      • Configuration Manager
      • Release and Deployment Manager
      • Service Desk Manager

      Form a software asset management team to drive project success

      Many organizations simply do not have a large enough staff to hire a full-time software asset manager. The role will need to be championed by an internal employee.

      Avoid filling this position with a temporary contract; one of the most difficult operational factors in SAM implementation and continuity is constant turnover and organizational shifts. Hiring a software asset manager on contract might get the project going faster, but without the knowledge gained by doing the processes, the program won’t have enough momentum to sustain itself.

      Software Asset Manager Duties

      • Gather proof of license.
      • Record and track all assets within the SAM repository.
      • Produce compliance reports.
      • Preparation of budget requests.
      • Administration of software renewal process.
      • Contract and support analysis.
      • Document procedures.
      • Ensure project is on track.

      SAM Team Member Duties

      • Record license and contract data in SAM tool.
      • Assist in production of SAM reports.
      • Data analysis.
      • Match tickets to SAM data.
      • Assist in documentation.
      • Assist in compliance reports.
      • Gather feedback from end users.

      Info-Tech Best Practice

      Make sure your SAM team is diverse. The SAM team will need to be skilled at achieving compliance, but there is also a need for technically skilled individuals to maximize the function of the SAM tool(s) at your organization.

      Identify roles and responsibilities for SAM

      Associated Activity icon 1.2.1 Complete a RACI chart for your organization

      Participants: CIO/CFO, IT Director, SAM Manager, SAM Team, Service Desk Manager

      Document: Document in the Standard Operating Procedures.

      Determine the roles and responsibilities for your SAM program. Record the results in a RACI (responsible, accountable, consulted, informed) chart such as the example below.

      SAM Processes and Tasks CIO CFO SAM Manager IT Director Service Management Team IT Ops Security Finance Legal Project Manager
      Policies/Governance A C R R I I C I R I
      Strategy A C R R I I I I C
      Risk Management/Asset Security A C R R C R C C C
      Data Entry/Quality I I A R R
      Compliance Auditing R C A R I I I I
      Education & Training R I A C I I
      Contract Lifecycle Management R R A R C C C C R C
      Workflows R C A R I I I R I C/I
      Budgeting R R R A C R
      Software Acquisition R I A R I C R C C
      Controls/Reporting R I A R I I C I
      Optimize License Harvesting I I A R I C C

      Identify metrics to form the framework of the project

      Trying to achieve goals without metrics is like trying to cook without measuring your ingredients. You might succeed, but you’ll have no idea how to replicate it.

      SAM metrics should measure one of five categories:

      • Quantity → How many do we have? How many do we want?
      • Compliance → What is the level of compliance in a specific area?
      • Duration → How long does it take to achieve the desired result?
      • Financial → What is the cost/value? What is our comparative spend?
      • Quality → How good was the end result? E.g. Completeness, accuracy, timeliness

      The metrics you track depend on your maturity level. As your organization shifts in maturity, the metrics you prioritize for tracking will shift to reflect that change. Example:

      Metric category Low maturity metric High maturity metric
      Compliance % of software installed that is unauthorized % of vendors in effective licensing position (ELP) report
      Quantity % of licenses documented in ITAM tool % of requests made through unauthorized channels

      Associate KPIs and metrics with SAM goals

      • Identify the critical success factors (CSFs) for your software asset management program based on strategic goals.
      • For each success factor, identify the key performance indicators (KPIs) to measure success, as well as specific metrics that will be tracked and reported on.
      • Sample metrics are below:

      CSF = Goal, or what success looks like

      KPI = How achievement of goal will be defined

      Metric = Numerical measure to determine if KPI has been achieved

      CSF/Goal KPI Metrics
      Improve accuracy of software budget and forecasting
      • Reduce software spend by 5%
      • Total software asset spending
      • Budgeted software spend vs. actual software spend
      Avoid over purchasing software licenses and optimize use of existing licenses
      • Reduce number of unused and underused licenses by 10%
      • Number of unused licenses
      • Money saved from harvesting licenses instead of purchasing new ones
      Improve accuracy of data
      • Data in SAM tool matches what is deployed with 95% accuracy
      • Percentage of entitlements recorded in SAM tool
      • Percentage of software titles recognized by SAM tool
      Improved service delivery
      • Reduce time to deploy new software by 10%
      • Mean time to purchase new software
      • Mean time to fulfill new software requests

      Identify metrics and KPIs to track the success of your SAM program

      Associated Activity icon 1.2.2 Brainstorm metrics and KPIs

      Participants: CIO, IT Director, SAM Manager, SAM Team

      Document: Document in the Standard Operating Procedures.

      1. Discuss the goals and objectives of implementing or improving software asset management, based on challenges identified earlier.
      2. From the goals, identify the critical success factors for the SAM program.
      3. For each CSF, identify one to three key performance indicators (KPIs) to evaluate achievement of the success factor.
      4. For each KPI, identify one to three metrics that can be tracked and reported on to measure success. Ensure that the metrics are tangible and measurable.

      Use the table below as an example.

      Goal/CSF KPI Metric
      Improve license visibility Increase accuracy and completeness of SAM data
      • % of total titles included in ITAM tool
      • % of licenses documented in ITAM tool
      Reduce software costs Reduce number of unused software licenses by 20%
      • % of licenses assigned to ex-employees
      • % of deployed licenses that have not been used in the past six months
      Reduce shadow IT Reduce number of unauthorized software purchases and installations by 10%
      • % of software requests made through unauthorized channels
      • % of software installed that is unauthorized

      Tailor metrics and reports to specific stakeholders

      Asset Managers

      Asset managers require data to manage how licenses are distributed throughout the organization. Are there multiple versions of the same application deployed? What proportion of licenses deployed are assigned to employees who are no longer at the organization? What are the usage patterns for applications?

      Service Desk Technicians

      Service desk technicians need real-time data on licenses currently available to deploy to machines that need to be imaged/updated, otherwise there is a risk of breaching a vendor agreement.

      Business Managers and Executives

      Business managers and executives need reports to make strategic decisions. The reports created for business stakeholders need to help them align business projects or business processes with SAM metrics. To determine which reports will provide the most value, start by looking at business goals and determining the tactical data that will help inform and support these goals and their progress.

      Additional reporting guidelines:

      • Dashboards should provide quick-glance information for daily maintenance.
      • Alerts should be set for all contract renewals to provide enough advanced notice (e.g. 90 days).
      • Reports should be automated to provide actionable information to appropriate stakeholders as needed.

      Define SAM reports to track metrics

      Associated Activity icon 1.2.3 Identify reports and metrics to track regularly

      Participants: CIO, IT Director, SAM Manager, SAM Team

      Document: Document in the Standard Operating Procedures.

      1. Identify key stakeholders requiring SAM reports. For each audience, identify their goals and requirements from reporting.
      2. Using the list of metrics identified previously, sort metrics into reports for each audience based on their requirements and goals. Add any additional metrics required.
      3. Identify a reporting frequency for each report.

      Example:

      Stakeholder Purpose Report Frequency
      Asset Manager
      • Manage budget
      • Manage contracts and cash flow
      • Ensure processes are being followed
      Operational budget spent to date Monthly
      Capital budget spent to date Monthly
      Contracts coming due for renewal Quarterly
      Software harvested for redeployment Quarterly
      Number of single applications being managed Annually
      CFO
      • Manage budget
      • Manage cash flow
      Software purchased, operational & capital Monthly
      Software accrued for future purchases Monthly
      Contracts coming due for renewal
      • Include dollar value, savings/spend
      Quarterly
      CIO
      • Resource planning
      • Progress reporting
      Software deployments and redeployments Monthly
      Software rollouts planned Quarterly
      % of applications patched Quarterly
      Money saved Annually
      Number of contracts & apps managed Quarterly

      Step 1.3 Plan the SAM program and budget

      Phase 1:
      Assess & Plan
      This step will walk you through the following activities:This step involves the following participants:

      1.1

      Assess current state
      • 1.3.1 Identify SAM functions to centralize vs. decentralize
      • 1.3.2 Complete the SAM budget tool
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and SAM Manager
      • CFO

      1.2

      Build team and define metrics

      1.3

      Plan & budget

      Step Outcomes

      • Defined scope for the SAM program in terms of the degree of centralization of core functions and contracts
      • A clearer picture of software spend through the use of a SAM budgeting tool.

      Asset managers need to be involved in infrastructure projects at the decision-making stage

      Ensure that your software asset manager is at the table when making key IT decisions.

      Many infrastructure managers and business managers are unaware of how software licensing can impact projects. For example, changes in core infrastructure configuration can have big impacts from a software licensing perspective.

      Mini Case Study

      • When a large healthcare organization’s core infrastructure team decided to make changes to their environment, they failed to involve their asset manager in the decision-making process.
      • When the healthcare organization decided to make changes to their servers, they were running Oracle software on their servers, but the licenses were not being tracked.
      • When the change was being made to the servers, the business contacted Oracle to notify them of the change. What began as a tech services call quickly devolved into a licensing error; the vendor determined that the licenses deployed in the server environment were unauthorized.
      • For breaching the licensing agreement, Oracle fined the healthcare organization $250,000.
      • Had the asset manager been involved in the process, they would have understood the implications that altering the hardware configuration would have on the licensing agreement and a very expensive mistake could have been avoided.

      Decide on the degree of centralization for core SAM functions

      • Larger organizations with multiple divisions or business units will need to decide which SAM functions will be centralized and which, if any, will be decentralized as they plan the scope of their SAM program. Generally, certain core functions should be centralized for the SAM program to deliver the greatest benefits.
      • The degree of centralization may also be broken down by contract, with some contracts centralized and some decentralized.
      • A centralized SAM database gives needed visibility into software assets and licenses across the organization, but operation of the database may also be done locally.

      Centralization

      • Allows for more strategic planning
      • Visibility into software licenses across the organization promotes rationalization and cost savings
      • Ensure common products are used
      • More strategic sourcing of vendors and resellers
      • Centrally negotiate pricing for better deals
      • Easier to manage risk and prepare for audits
      • Greater coordination of resources

      Decentralization

      • May allow for more innovation
      • May be easier to demonstrate local compliance if the organization is geographically decentralized
      • May be easier to procure software if offices are in different countries
      • Deployment and installation of software on user devices may be easier

      Identify SAM functions to centralize vs. decentralize

      Associated Activity icon 1.3.1 Identify functions for centralization

      Participants: CIO, IT Director, SAM Manager, SAM Team

      Document: Document in the Standard Operating Procedures.

      1. If applicable, identify SAM functions that will need to be centralized and evaluate the implications of centralization to ensure it is feasible.
      2. If applicable, identify SAM functions that will be decentralized, if resources are available to manage those functions locally.

      Example:

      Centralized Functions
      • Operation of SAM database
      • SAM budget
      • Vendor selection
      • Contract negotiation and purchasing
      • Data analysis
      • Software receiving and inventory
      • Audits and risk management
      Decentralized functions
      • Procurement
      • Deployment and installation

      Software comprises the largest part of the infrastructure and operations budget

      After employee salaries (38%), the four next largest spend buckets have historically been infrastructure related. Adding salaries and external services, the average annual infrastructure and operations spend is over 50% of all IT spend.

      The largest portion of that spend is on software license and maintenance. As of 2016, software accounted for the roughly the same budget total as voice communications, data communications, and hardware combined. Managing software contracts is a crucial part of any mature budgeting process.

      Graph showing the percentage of all IT spend used for 'Ongoing software license and maintenance' annually. In 2010 it was 17%; in 2018 it was 21%. Graph showing the percentage of all IT spend used for 'Hardware maintenance / upgrades' annually. In 2010 it was 7%; in 2018 it was 8%. Graph showing the percentage of all IT spend used for 'Data communications' annually. In 2010 it was 7%; in 2018 it was 7%. Graph showing the percentage of all IT spend used for 'Voice communications' annually. In 2010 it was 5%; in 2018 it was 7%.

      Gain control of the budget to increase the success of SAM

      A sophisticated software asset management program will be able to uncover hidden costs, identify opportunities for rationalization, save money through reharvesting unused licenses, and improve forecasting of software usage to help control IT spending.

      While some asset managers may not have experience managing budgets, there are several advantages to the ITAM function owning the budget:

      • Be more involved in negotiating pricing with vendors.
      • Build better relationships with stakeholders across the business.
      • Gain greater purchasing power and have a greater influence on purchasing decisions.
      • Forecast software requirements more accurately.
      • Inform benchmarks and metrics with more data.
      • Directly impact the reduction in IT spend.
      • Manage the asset database more easily and have a greater understanding of software needs.
      • Identify opportunities for cost savings through rationalization.

      Examine your budget from a SAM perspective to optimize software spend

      How does examining your budget from a SAM perspective benefit the business?

      • It provides a chance to examine vendor contracts as they break down contracts by projects and services, which gives a clearer picture of where software fits into the budget.
      • It also gives organizations a chance to review vendor agreements and identify any redundancies present in software supporting services.

      Review the budget:

      • When reviewing your budget, implement a contingency fund to mitigate risk from a possible breach of compliance.
      • If your organization incurs compliance issues that relate to specific services, these fines may be relayed back to the departments that own those services, affecting how much money each department has.
      • The more sure you are of your compliance position, the less likely you are to need a contingency fund, and vice versa.

      Info-Tech Best Practice

      Finance needs to be involved. Their questions may cover:

      • Where are the monthly expenditures? Where are our financial obligations? Do we have different spending amounts based on what time of year it is?

      Use the SAM Budget Workbook to uncover insights about your software spend

      Supporting Tool icon 1.3.2 Complete the SAM budget tool

      The SAM Budget Workbook is designed to assist in developing and justifying the budget for software assets for the upcoming year.

      Instructions

      1. Work through tabs 2-6, following the instructions as you go.
      2. Tab 2 involves selecting software vendors and services provided by software.
      3. Tab 3 involves classifying services by vendor and assigning a cost to them. Tab 3 also allows you to classify the contract status.
      4. Tab 4 is a cost variance tracking sheet for software contracts.
      5. Tabs 5 and 6 are monthly budget sheets that break down software costs by vendor and service, respectively.
      6. Tab 7 provides graphs to analyze the data generated by the tool.
      7. Use the results found on tab 7 to analyze your budget: are you spending too much with one service? Is there vendor overlap based on what project or service that software is reporting?
      Screenshots of the 'Budget of Services Supported by Software Vendors' and 'Software Expense cashflow reports by Vendor' pages from the SAM Budget Workbook. Screenshot of the 'Analysis of Data' page from the SAM Budget Workbook.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.3

      Sample of activity 1.1.3 'Determine the maturity of your SAM program'. Determine the maturity of your SAM program

      Using the SAM Maturity Assessment Tool, fill out a series of questions in a survey to assess the maturity of your current SAM program. The survey assesses seven categories that will allow you to align your strategy to your results.

      1.2.3

      Sample of activity 1.2.3 'Define SAM reports to track metrics'. Define SAM reports to track metrics

      Identify key stakeholders with reporting needs, metrics to track to fulfill reporting requirements, and a frequency for producing reports.

      Phase 1 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Assess and Plan

      Proposed Time to Completion (in weeks): 4
      Step 1.1: Assess current state Step 1.2: Build team and define metrics Step 1.3: Plan and budget
      Start with an analyst kick-off call:
      • Outline SAM challenges
      • Overview of the project
      • Assess current maturity level
      Review findings with analyst:
      • Define roles and responsibilities of SAM staff
      • Identify metrics and reports to track
      Review findings with analyst:
      • Plan centralization of SAM program
      • Discuss SAM budgeting
      Then complete these activities…
      • Identify challenges
      • Identify objectives of SAM program
      • Assess maturity of current state
      Then complete these activities…
      • Define roles and responsibilities
      • Identify metrics and KPIs
      • Plan reporting
      Then complete these activities…
      • Identify SAM functions to centralize
      • Complete the SAM budgeting tool
      With these tools & templates:
      • SAM Maturity Assessment
      • Standard Operating Procedures
      With these tools & templates:
      • Standard Operating Procedures
      With these tools & templates:
      • SAM Budget Workbook

      Phase 2: Procure, Receive, and Deploy

      VISA used high-quality SAM data to optimize its software licensing

      Logo for VISA.

      Case Study

      Industry: Financial Services
      Source: SAM Summit 2014

      Challenge

      Visa formed a SAM team in 2011 to combat costly software audits.

      The team’s first task was to use the available SAM data and reconcile licenses deployed throughout the organization.

      Organizations as large as Visa constantly run into issues where they are grossly over or under licensed, causing huge financial risk.

      Solution

      Data collection and analysis were used as part of the license rationalization process. Using a variety of tools combined with a strong team allowed Visa to perform the necessary steps to gather license data and analyze usage.

      One of the key exercises was uniting procurement and deployment data and the teams responsible for each.

      End-to-end visibility allowed the data to be uniform. As a result, better decisions about license rationalization can be made.

      Results

      By improving its measurement of SAM data, Visa was able to dedicate more time to analyze and reconcile its licenses. This led to improved license management and negotiations that reflected actual usage.

      By improving license usage through rationalization, Visa reduced the cost of supporting additional titles.

      The SAM team also performed license reclamation to harvest and redistribute licenses to further improve usage. The team’s final task was to optimize audit responses.

      Step 2.1 Request and procure software

      Phase 2:
      Procure, Receive & Deploy
      This step will walk you through the following activities:This step involves the following participants:

      2.1

      Request & Procure
      • 2.1.1 Determine which software contracts should be centralized vs. localized
      • 2.1.2 Determine your software standards
      • 2.1.3 Define procurement policy
      • 2.1.4 Identify approvals and requests for authorization thresholds
      • 2.1.5 Build software procurement workflow for new contracts
      • 2.1.6 Define process for contract renewals and additional procurement scenarios
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team

      2.2

      Receive & Deploy

      Step Outcomes

      • Defined standards for software requests
      • A documented policy for software procurement including authorization thresholds
      • Documented process workflows for new contracts and contract renewals

      Procurement and SAM teams must work together to optimize purchasing

      Procurement and SAM must collaborate on software purchases to ensure software purchases meet business requirements and take into account all data on existing software and licenses to optimize the purchase and contract. Failure to work together can lead to unnecessary software purchases, overspending on purchases, and undesirable contract terms.

      SAM managers must collaborate with Procurement when purchasing software.

      SAM managers should:

      • Receive requests for software licenses
      • Ensure a duplicate license isn’t already purchased before going through with purchase
      • Ensure the correct license is purchased for the correct individuals
      • Ensure the purchasing information is tracked in the ITAM/SAM tool
      • Report on software usage to inform purchases
      Two cartoon people in work attire each holding a piece of a puzzle that fits with the other. Procurement must commit to be involved in the asset management process.

      Procurement should:

      • Review requests and ensure all necessary approvals have been received before purchasing
      • Negotiate optimal contract terms
      • Track and manage purchasing information and invoices and handle financial aspects
      • Use data from SAM team on software usage to decide on contract terms and optimize value

      Centralize procurement to decrease the likelihood of overspending

      Centralized negotiation and purchasing of software can ensure that the SAM team has visibility and control over the procurement process to help prevent overspending and uncontrolled agreements.

      Benefits of centralized procurement

      • Ability to easily manage software demand.
      • Provides capability to effectively manage your relationships with suppliers.
      • Allows for decreased contract processing times.
      • Provides easy access to data with a single consolidated system for tracking assets at an early stage.
      • Reduces number of rogue purchases by individual departments.
      • Efficiency through automation and coordinated effort to examine organization’s compliance and license position.
      • Higher degree of visibility and transparency into asset usage in the organization.

      Info-Tech Insights

      It may be necessary to procure some software locally if organizations have multiple locations, but try to centrally procure and manage the biggest contracts from vendors that are likely to audit the organization. Even with a decentralized model, ensure all teams communicate and that contracts remain visible centrally even if managed locally.

      Standards for software procurement help prevent overspending

      Software procurement is often more difficult for organizations than hardware procurement because:

      • Key departments that need to be involved in the purchasing process do not communicate or interact enough.
      • A fear of software auditing causes organizations to overspend to mitigate risk.
      • Standards are often not in place, with most purchases being made outside of the gold imaging standard.
      • A lack of discovery results in gross overspending on software licenses that are already present and underused.

      Info-Tech Insight

      One of the major challenges involved in implementing SAM is uniting multiple datasets and data sources across the enterprise. A conversation with each major business unit will help with the creation of software procurement standards that are acceptable to all.

      Determine which software contracts should be centralized vs. localized (optional)

      Associated Activity icon 2.1.1 Identify central standard enterprise offerings

      Participants: CIO, IT Director, SAM Manager, SAM Team

      Document: Document in the Standard Operating Procedures.

      1. As a group, list as many software contracts that are in place across the organization as can easily be identified, focusing on top vendors.
      2. Identify which existing software contracts are standard enterprise offerings that are procured and managed centrally and which are non-standard or localized applications.
      3. Looking at the list of non-standard software, identify if any can or should be rationalized or replaced with a standard offering.
      Standard enterprise offerings
      • Microsoft
      • IBM
      • Adobe
      • Dell
      • Cisco
      • VMware
      • Barracuda
      Localized or non-standard software

      Classify your approved software into tiers to improve workflow efficiency

      Not all titles are created equal; classifying your pre-approved and approved software titles into a tiered system will provide numerous benefits for your SAM program.

      The more prestigious the asset tier, the higher the degree of data capture, support, and maintenance required.

      • Mission-critical, high-priority applications are classified as gold standard.
      • Secondary applications or high priority are silver standard.
      • Low-usage applications or normal priority are bronze standard.

      E.g. An enterprise application that needs to be available 24/7, such as a learning management system, should be classified as a gold tier to ensure it has 24/7 support.

      Creating tiers assists stakeholders in justifying the following set of decision points:

      • Which assets will require added maintenance (e.g. software assurance for Microsoft)
      • Technical support requirements to meet business requirements
      • Lifecycle and upgrade cycle of the software assets.
      • Monitoring usage to determine whether licenses can be harvested
      • Authorizations required for purchase requests

      Determine your software standards

      Associated Activity icon 2.1.2 Identify standard software images for your organization

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      1. As a group, discuss and identify the relevant software asset tiers and number of tiers.
      2. For each tier, define:
        • Support requirements (hours and payments)
        • Maintenance requirements (mandatory or optional)
        • Lifecycle (when to upgrade, when to patch)
        • Financial requirements (CapEx/OpEx expenses)
        • Request authorizations (requestors and approvers)
      3. Sort the software contracts identified in the previous category into tiers, for example:
        • Mission-critical software (gold tier)
        • High-priority software (silver tier)
        • Normal-priority software (bronze tier)
      4. Use the SOP as an example.

      Determine which licensing options and methodologies fit into future IT strategy

      Not everyone is ready to embrace the cloud for all solutions; make sure to align cloud strategy to business requirements. Work closely with IT executives to determine appropriate contract terms, licensing options, and tracking processes.

      Vendors make changes to bundles and online services terms on a regular basis. Ensure you document your agreed upon terms to save your required functionality as vendor standard offerings change.

      • Any contracts getting moved to the cloud will need to undergo a contract comparison first.
      • The contract you signed last month could be completely different this month. Many cloud contracts are dynamic in nature.
      • Keep a copy of the electronic contract that you signed in a secure, accessible location.
      • Consider reaching a separate agreement with the vendor that they will ensure you maintain the results of the original agreement to prevent scope creep.

      Not all on-premises to cloud options transition linearly:

      • Features of perpetual licenses may not map to subscriptions
      • Product terms may differ from online services terms
      • Licensing may change from per device to per user
      • Vendor migrations may be more complex than anticipated

      Download the Own the Cloud: Strategy and Action Plan blueprint for more guidance

      Understand the three primary models of software usage agreements

      Licensed Open Source Shareware
      License Structure A software supplier is paid for the permission to use their software. The software is provided free of charge, but is still licensed. The software is provided free of charge, but is still licensed. Usage may be on a trial basis, with full usage granted after purchase.
      Source Code The source code is still owned by the supplier. Source code is provided, allowing users to change and share the software to suit their needs. Source code is property of the original developer/supplier.
      Technical Support Technical support is included in the price of the contract. Technical support may be provided, often in a community-based format from other developers of the open-source software in question. Support may be limited during trial of software, but upgraded once a purchase is made.

      Info-Tech Insight

      Open-source software should be managed in the same manner as commercial software to understand licensing requirements and be aware of any changes to these agreements, such as commercialization of such products, as well as any rules surrounding source code.

      Coordinate with purchasing department to define software procurement policy

      Associated Activity icon 2.1.3 Define procurement policy

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      Define and document policies that will apply to IT software purchases, including policies around:

      • Software purchase approvals
      • Licenses for short-term contractors
      • On-premises vs. SaaS purchases
      • Shareware and freeware fees
      • Open-source software

      Use the example below as guidance and document in the SOP.

      • Software will not be acquired through user corporate credit cards, office supply, petty cash, or personal expense budgets. Purchases made outside of the acceptable processes will not be reimbursed and will be removed from company computers.
      • Contractors who are short term and paid through vendor contracts and invoices will supply their own licenses.
      • Software may be purchased as on-premises or as-a-service solutions as IT deems appropriate for the solution.
      • Shareware and freeware authors will be paid the fee they specify for use of their products.
      • Open-source software will be managed in the same manner as commercial software to understand licensing requirements and be aware of any changes to these agreements, such as commercialization of such products.

      Identify approvals and requests for authorization thresholds

      Associated Activity icon 2.1.4 Identify financial thresholds for approvals and requests

      Participants: Asset Manager, Purchasing, CIO, CFO, IT Director

      Document: Document in the Standard Operating Procedures.

      Identify and classify financial thresholds for contracts requiring approval. For each category of contract value, identify who needs to authorize the request. Discuss and document any other approvals necessary. An example is provided below.

      Example:
      Requests for authorization will need to be directed based on the following financial thresholds:

      Contract value Authorization
      <$50,000 IT Director
      $50,000 to $250,000 CIO
      $250,000 to $500,000 CIO and CFO
      >$500,000 Legal review

      Develop a defined process for software procurement

      A poorly defined software procurement workflow can result in overspending on unnecessary software licensing throughout the year. This can impact budgeting and any potential software refreshes, as businesses will often rely on purchasing what they can afford, not what they need.

      Benefits of a defined workflow

      • Standardized understanding of the authorization processes results in reduced susceptibility to errors and quicker processing times.
      • Compliance with legal regulations.
      • Protection from compliance violations.
      • Transparency with the end user by communicating the process of software procurement to the business.

      Elements to include in procurement workflows:

      • RFP
      • Authorizations and approvals
      • Contract review
      • Internal references to numbers, cost centers, locations, POs, etc.

      Four types of procurement workflows:

      1. New contract – Purchasing brand new software
      2. Add to contract – Adding new POs or line items to an existing contract
      3. Contract renewal – Renewing an existing contract
      4. No contract required – Smaller purchases that don’t require a signed contract

      Outline the procurement process for new contracts

      The procurement workflow may involve the Service Desk, procurement team, and asset manager.

      The following elements should be accounted for:

      • Assignee
      • Requestor
      • Category
      • Type
      • Model or version
      • Requisition number
      • Purchase order number
      • Unit price
      A flowchart outlining the procurement process for new contracts. There are three levels, at the top is 'Tier 2 or Tier 3', the middle is 'IT Procurement', the bottom is 'Asset Manager'. It begins in 'Tier 2 or Tier 3' with 'Approved request received', and if it is not declined it moves on to 'Purchasing request forwarded to Procurement' on the 'IT Procurement' level. If an RFP is required, it eventually moves to 'Receives contract' on the 'Asset Manager' level and ends with 'Document license requirements, notify IT Product Owner'.

      Build software procurement workflow for new contracts

      Associated Activity icon 2.1.5 Build new contract procurement workflow

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      1. As a team, outline each of the tasks in the process of procuring a new software asset using cue cards, sticky notes, or a whiteboard.
      2. Use the sample procurement workflow on the previous slide as an example if needed.
      3. Ensure the following elements required for the asset procurement process have been accounted for:
        • Assignee
        • Requestor
        • Category
        • Type
        • Model or version
        • Requisition number
        • Purchase order number
        • Unit price
      4. Review the workflow and make any adjustments necessary to improve the process. Document using Visio and add to the SOP.

      Review vendor contracts to right-size licensing procurement

      Many of your applications come from the same vendor, and a view into the business services provided by each software vendor contract will prove beneficial to the business.

      • You may uncover overlaps in services provided by software across departments.
      • The same service may be purchased from different vendors simply because two departments never compared notes!
      • This leaves a lot of money on the table from a lack of volume discounts.
      A graphic depicting a Venn diagram in which the 'Software' and 'Services' circles overlap, both of which stem from a 'Vendor Contract'.
      • Be cautious about approaching license budgeting strictly from a cost perspective. SAM is designed to right-size your licenses to properly support your organization.
      • One trap organizations often fall into is bundling discounts. Vendors will offer steep discounts if clients purchase multiple titles. On the surface, this might seem like a great offer.
      • However, what often happens is that organizations will bundle titles to get a steep discount on their prize title of the group.
      • The other titles become shelfware, and when the time comes to renew the contract, the maintenance fees on the shelfware titles will often make the contract more expensive than if only the prize title was purchased.

      Additionally, information regarding what licenses are being used for certain services may yield insight into potential redundancies. For example, two separate departments may have each have a different application deployed that supports the same service. This presents an opportunity for savings based on bulk licensing agreements, not to mention a simplified support environment by reducing the number of titles deployed in your environment.

      Define a procedure for tracking and negotiating contract renewals

      Participants: IT Director/CIO, Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      Discuss and document a policy for tracking and negotiating contract renewals. Answer the following questions as guides:

      • How will renewal dates be tracked and monitored?
      • How soon should contracts be reviewed prior to renewal to determine appropriateness for use and compliance?
      • What criteria will be used to determine if the product should be renewed?
      • Who will be consulted for contract renewal decisions for major contracts?
      • How will licensing and support decisions be made?

      Optional contract review:

      1. Take a sample contract to renew. Create a list of services that are supported by the software. Look for overlaps, redundancies, shelfware, and potential bundling opportunities. Recall the issues outlined when purchasing bundled software.
      2. Create a list of action items to bring into the next round of contract negotiations with that vendor and identify a start date to begin reviewing these items.

      Define process for contract renewals and additional procurement scenarios

      Associated Activity icon 2.1.6 Build additional procurement workflows

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      Build procurement workflows and define policies and procedures for additional purchasing scenarios beyond new contracts.

      This may include:

      1. Contract renewals
      2. Single purchase, non-contract procurement
      3. Adding to contracts

      Use the sample workflows in the Standard Operating Procedures as a guide.

      A flowchart outlining the procurement process for 'Software Contract Renewal'.

      A flowchart outlining the procurement process for 'Software single purchase, non-contract'.

      Negotiate for value to ensure quality license agreements

      Approach negotiating from a value-first, price-second perspective.

      Contract negotiations too often come down to a question of price. While you want to avoid overpaying for licenses, a worse offense is getting a steep discount for a bundle of applications where the majority will go unused.

      Vendors will try to sell a full stack of software at a steep discount to give the illusion of value. Often organizations bite off more than they can chew. When auditors come knocking, the business may be in compliance, but being over-licensed is a dangerous state to be in. Organizations end up over-licensed and in possession of numerous “shelfware” apps that sit on the proverbial shelf collecting dust while drawing expensive maintenance and licensing fees from the business.
      • Pressure from the business is also an issue. Negotiations can be rushed in an effort to fulfill an immediate need.
      • Make sure you clearly outline the level of compliance expected from the vendor.
      • Negotiate reduced-fee software support services. Your Service Desk can already handle the bulk of requests, and investing in a mature Service Desk will provide more lasting value than paying for expensive maintenance and support services that largely go unused.

      Learn to negotiate effectively to optimize contract renewals

      Leverage Info-Tech’s research, Master Contract Review and Negotiation for Software Agreements, to review your software contracts to leverage your unique position during negotiations and find substantial cost savings.

      This blueprint includes the following tools and templates:

      • RASCI Chart
      • Vendor Communication Management Plan
      • Software Business Use Case Template
      • SaaS TCO Calculator
      • Software Terms & Conditions Evaluation Tool
      • Software Buyer’s Checklist
      • Controlled Vendor Communications Letter
      • Key Vendor Fiscal Year End Calendar
      • Contract Negotiation Tactics Playbook

      Step 2.2 Receive and deploy software

      Phase 2:
      Procure, Receive & Deploy
      This step will walk you through the following activities:This step involves the following participants:

      2.1

      Request & Procure
      • 2.2.1 Identify storage locations for software information and media
      • 2.2.2 Design the workflow for receiving software
      • 2.2.3 Design and document the deployment workflow(s)
      • 2.2.4 Create a list of pre-approved, approved, and unapproved software titles
      • 2.2.5 Document the request and deployment process for non-standard software requests
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team
      • Purchasing (optional)
      • Service Desk Manager (optional)
      • Operations (optional)
      • Release & Deployment manager (optional)

      2.2

      Receive & Deploy

      Step Outcomes

      • A strategy for storing software information and media in the ITAM database and DML
      • A documented workflow for the software receiving process
      • Documented process workflows for software requests and deployment, including for large quantities of software
      • A list of pre-approved, approved, and unapproved software titles for deployment
      • A process for responding to non-standard software requests

      Verify product and information upon receipt

      Upon receipt of procured software:

      • Verify that the product is correct
      • Reconcile with purchase record to ensure the order has been completed
      • Verify that the invoice is correct
      • Update financial information such as budget and accounting records
      • Update ITAM database to show status as received
      • Record/attach license keys and software codes in ITAM database
      • Attach relevant documents to record in the ITAM database (license reports, invoices, end-user agreement, etc.)
      • Download and store any installation files, DVDs, and CDs
      • Once software has been installed, verify license is matched to discovered installed software within the ITAM database

      Info-Tech Best Practice

      While most software will be received through email and download, in some cases physical software may be received through courier or mail. Ensure processes and procedures are defined for both cases.

      Establish a secure repository for licenses and documentation

      All licenses, documentation, and digital media for authorized and supported software should be collected and stored in a central, secure location to minimize risk of theft, loss, or unauthorized installation or duplication of software.

      Where to store software data?

      The ITAM database should contain an up-to-date record of all software assets, including their associated:

      • Serial numbers
      • License keys and codes
      • Contracts and agreements

      The database allows you to view software that is installed and associated licenses.

      A definitive media library (DML) is a single logical storage area, which may consist of one or more locations in which definitive authorized versions of all software configuration items are securely stored and protected.

      The DML consists of file storage as well as physical storage of CDs and DVDs and must be continually updated to contain the latest information about each configuration item.

      The DML is used to organize content and link to automated deployment to easily install software.

      Use a definitive media library (DML) to assist in storage of software packages for deployment

      The DML will usually contain the most up-to-date versions to minimize errors created by having unauthorized, old, or problematic software releases being deployed into the live IT environment. The DML can be used for both full-packed product (FPP) software and in-house developed software, providing formalized data around releases of in-house software.

      The DML should consist of two main storage areas:

      1. Secure file storage
      2. Secure physical storage for any master CD/DVDs

      Additional Recommendations:

      • The process of building, testing, adapting, and final pre-production testing should provide your IT department with a solid final deployment package, but the archive will enable you to quickly pull in a previous version if necessary.
      • When upgrading software packages to include new patches or configurations, use the DML to ensure you're referencing a problem-free version.
      • Include the DML in your disaster recovery plan (DRP) and include testing of the DML as part of your DRP testing. If you need to rebuild servers from these files, offsite, you'll want to know your backup DML is sound.

      Ensure you have a strategy to create and update your DML

      Your DML should have a way to separate archived, new, and current software to allow for optimal organization of files and code, to ensure the correct software is installed, and to prepare for automated deployment through the service catalog.

      New software hasn’t been tested yet. Make it available for testing, but not widely available.

      Keep a record for archived software, but do not make it available for install.

      Current software is regularly used and should be available for install.

      Deployment

      • Are you using tools to integrate with the DML for deployment?
      • Store files that are ready for automated deployment in a separate location.

      Identify storage locations for software information and media

      Associated Activity icon 2.2.1 Identify software storage locations

      Participants: Asset Manager, IT Director

      Document: Document in the Standard Operating Procedures.

      1. Identify storage locations for asset data that is received (i.e. ITAM database, DML).
      2. Identify information that should be stored with each asset (i.e. license, serial number, invoice, end-user license agreement) and where this information should be stored.
      3. Identify fields that should be populated in the DML for each record:
        • Product name
        • Version
        • Description
        • Authorized by
        • Received by/date
        • Configuration item on which asset is installed
        • Media
        • Physical and backup locations
        • Verified by/date

      Define the standard process for receiving software

      Define the following in your receiving process:

      • Process for software received by email/download
      • Process for physical material received at Service Desk
      • Information to be recorded and where
      • Process following discrepancy of received software
      A flowchart outlining the standard process for receiving software. There are two levels, at the top is 'Desktop Support Team' and the bottom is 'Procurement'. It begins in 'Desktop Support Team' with 'Received at Service Desk' or 'Receive by email/download'. If the reconciliation is correct it eventually moves on to 'Fulfill service request, deliver and close ticket'. If the reconciliation is not correct it moves to 'Contact vendor with discrepancy details' in 'Procurement'. If a return is required 'Repackage and ship', or if not 'Notify Desktop Support Team of resolution'.

      Design the workflow for receiving software

      Associated Activity icon 2.2.2 Design the workflow for receiving software

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      Option 1: Whiteboard

      1. Discuss the workflow and draw it on the whiteboard.
      2. Assess whether you are using the best workflow. Modify it if necessary.
      3. Use the sample workflow from this step as a guide if starting from scratch.
      4. Engage the team in refining the process workflow.
      5. Transfer data to Visio and add to the SOP.

      Option 2: Tabletop Exercise

      1. Distribute index cards to each member of the team.
      2. Have each person write a single task they perform on the index card. Be granular. Include the title or the name of the person responsible.
      3. Mark cards that are decision points. Use a card of a different color or use a marker to make a colored dot.
      4. Arrange the index cards in order, removing duplicates.
      5. Assess whether you are using the best workflow. Engage the team to refine it if necessary.
      6. Transfer data to Visio and add to the SOP.

      Build release management into your software deployment process

      A sound software deployment process is tied to sound release management practices.

      Releases: A collection of authorized changes to an IT service. Releases are divided into:

      • Major software releases/upgrades: Normally containing large areas of new functionality, some of which may make intervening fixes to redundant problems.
      • Minor software releases/upgrades: Normally containing small enhancements and fixes, some of which may have already been issued as emergency fixes.
      • Emergency software fixes: Contain the corrections to a small number of known problems.

      Ensure that release management processes work with SAM processes:

      • If a release will impact licensing, the SAM manager must be made aware to make any necessary adjustments.
      • Deployment models should be in line with SAM strategy (i.e. is software rolled out to everyone or individually when upgrades are needed?).
      • How will user requests for upgrades be managed?
      • Users should be on the same software version to ensure file compatibility and smooth patch management.
      • Ideally, software should be no more than two versions back.

      Document the process workflow for software deployment

      Define the process for deploying software to users.

      Include the following in your workflow:

      • All necessary approvals
      • Source of software
      • Process for standard vs. non-standard software requests
      • Update ITAM database once software has been installed with license data and install information
      A flowchart outlining the process workflow for software deployment. There are four levels, at the top is 'Business', then 'Desktop Support Team', 'Procurement', and the bottom is 'Asset Manager'. It begins in 'Business' with 'Request for software', and if it is approved by the manager it moves to 'Check DB: Can a volume serial # be used?' in 'Desktop Support Team'. If yes, it eventually moves on to 'Close ticket' on the same level, if not it eventually moves to 'Initiate procurement process' in 'Procurement', 'Initiate receiving process' in 'Asset Manager', and finally to 'Run quarterly license review to purchase volume licenses'.

      Large-scale software rollouts should be run as projects

      Rollouts or upgrades of large quantities of software will likely be managed as projects.

      These projects should include project plans, including resources, timelines, and detailed procedures.

      Define the process for large-scale deployment if it will differ from the regular deployment process.

      A flowchart outlining large-scale software rollouts. There are three levels, at the top is 'IT Procurement', then 'Asset Manager', and the bottom is 'Software Packager'. It begins in 'IT Procurement' with 'Project plan approved', and if a bid is not required it skips to 'Sign contract/Create purchase order'. This eventually moves to 'Receive access to eLicense site/receive access to new product' in 'Asset Manager', and either to 'Approve invoice for payment, forward to accounting' on the same level or to 'Download software, license keys' in 'Software Packager' then eventually to 'Deploy'.

      Design and document the deployment workflow(s)

      Associated Activity icon 2.2.3 Document deployment workflows for desktop and large-scale deployment

      Participants: Asset Manager, Service Desk Manager, Release & Deployment Manager

      Document: Document in the Standard Operating Procedures.

      1. Outline each step in the process of software deployment using notecards or on a whiteboard. Be as granular as possible. On each card, describe the step and the individual responsible for each step.
        • Be sure to identify the type of release for standard software releases and patches.
        • Additionally, identify how additional software outside the scope of the base image will be addressed.
      2. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
      3. Examine each challenge or pain point. Discuss whether there is a clear solution to the problem. If so, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, considering people, processes, and available technology.
      4. Document separately the process for large-scale software deployment if required.

      Develop standards to streamline your software estate

      Software should be approved and deployed based on approved standards to minimize over-deployed software and manage costs appropriately. A list of standard software improves the efficiency of the software approval process.

      • Pre-approved titles include basic platforms like Office or Adobe Reader that are often available in enterprise-wide license packages.
      • Approved titles include popular titles with license numbers that need to be managed on a role-by-role basis. For example, if most of your marketing team uses the Adobe Creative Suite, a user still needs to get approval before they can get a license.
      • Unapproved titles are managed on a case-by-case basis and are up to the discretion of the asset manager and other involved parties.

      Additionally, create a list of unauthorized software including titles not to be installed under any circumstances. This list should be designed with feedback from your end users and technical support staff. Front-line knowledge is crucial to identifying which titles are causing major problems.

      Create a list of pre-approved, approved, and unapproved software titles

      Associated Activity icon 2.2.4 Determine software categories for deployment

      Participants: IT Director, Asset Manager, Purchasing (optional), Service Desk Manager (optional), Release & Deployment Manager (optional)

      Document: Document in the Standard Operating Procedures.

      1. Define software categories that will be used to build software standards.
      2. Include definitions of each category.
      3. Add examples of software to each category to begin building list of approved software titles for deployment.

      Use the following example as a guide.

      Category Definition Software titles
      Pre-approved/standard
      • Supported and approved for install for all end users
      • Included on most, if not all devices
      • Typically installed as a base image
      • Microsoft Office (Outlook, Word, Excel, PowerPoint)
      • Adobe Reader
      • Windows
      Approved by role
      • Supported and approved for install, but only for certain groups of end users
      • Popular titles with license numbers that need to be managed on a role-by-role basis
      • Pre-approved for purchase with business manager’s approval
      • Adobe Creative Cloud Suite
      • Adobe Acrobat Pro
      • Microsoft Visio
      Unapproved/requires review
      • Not previously approved or installed by IT
      • Special permission required for installation based on demonstrable business need
      • Managed on a case-by-case basis
      • Up to the discretion of the asset manager and other involved parties
      • Dynamics
      • Zoom Text
      • Adaptive Insights
      Unauthorized
      • Not to be installed under any circumstances
      • Privately owned software
      • Pirated copies of any software titles
      • Internet downloads

      Define the review and approval process for non-standard software

      Software requiring review will need to be managed on a case-by-case basis, with approval dependent on software evaluation and business need.

      The evaluation and approval process may require input from several parties, including business analysts, Security, technical team, Finance, Procurement, and the manager of the requestor’s department.

      A flowchart outlining the review and approval process for non-standard software. There are five levels, at the top is 'Business Analyst/Project Manager', then 'Security Team', 'Technical Team', 'Financial & Contract Review' and the bottom is 'Procurement'. It begins in 'Business Analyst/Project Manager' with 'Request for non-standard software', and if the approved product is available it moves to 'Evaluate tool for security, data, and privacy compliance' in 'Security Team'. If more evaluation is necessary it moves to 'Evaluate tool for infrastructure and integration requirements' in 'Technical Team', and then 'Evaluate terms and conditions' in 'Financial & Contract Review'. At any point in the evaluation process it can move back to the 'Business Analyst/Project Manager' level for 'Assemble requirements details', and finally down to the 'Procurement' level for 'Execute purchase'.

      Document the request and deployment process for non-standard software

      Associated Activity icon 2.2.5 Document process for non-standard software requests

      Participants: Asset Manager, Service Desk Manager, Release & Deployment Manager

      Document: Document in the Standard Operating Procedures.

      Define the review and approval process for non-standard software requests.

      Use the workflow on the previous slide as a guide to map your own workflow process and document the steps in the Standard Operating Procedures.

      The following assessments may need to be included in the process:

      • Functionality and use requirements: May include suggestion back to the business before proceeding any further to see if similar, already approved software could be used in its place.
      • Technical specifications: Cloud, data center, hardware, backups, integrations (Active Directory, others), file, and program compatibility.
      • Security: Security team may need to assess to ensure nothing will install that will compromise data or systems security.
      • Privacy policy: Security and compliance team may need to evaluate the solution to ensure data will be secured and accessed only by authorized users.
      • Terms and conditions: The contracts team may evaluate terms and conditions to ensure contracts and end-user agreements do not violate existing standards.
      • Accessibility and compliance: Software may be required to meet accessibility requirements in accordance with company policies.

      BMW deployed a global data centralization program to achieve 100% license visibility

      Logo for BMW.

      Case Study

      Industry: Financial Services
      Source: SAM Summit 2014

      Challenge

      BMW is a large German automotive manufacturer that employs over 100,000 people. It has over 7,000 software products deployed across 106,000 clients and servers in over 150 countries.

      When the global recession hit in 2008, the threat of costly audits increased, so BMW decided to boost its SAM program to cut licensing costs. It sought to centralize inventory data from operations across the globe.

      Solution

      A new SAM office was established in 2009 in Germany. The SAM team at BMW began by processing all the accumulated license and installation data from operations in Germany, Austria, and the UK. Within six months, the team had full visibility of all licenses and software assets.

      Compliance was also a priority. The team successfully identified where they could make substantial reductions in support and maintenance costs as well as remove surplus costs associated with duplicate licensing.

      Results

      BMW overcame a massive data centralization project to achieve 100% visibility of its global licensing estate, an incredible achievement given the scope of the operation.

      BMW experienced efficiency gains due to transparency and centralized management of licenses through the new SAM office.

      Additionally, internal investment in training and technical knowledge has helped BMW continuously improve the program. This has resulted in ongoing cost reductions for the manufacturer.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.5

      Sample of activity 2.1.5 'Build software procurement workflow for new contracts'. Build software procurement workflow for new contracts

      Use the sample workflow to document your own process for procurement of new software contracts.

      2.2.4

      Sample of activity 2.2.4 'Create a list of pre-approved, approved, and unapproved software titles'. Create a list of pre-approved, approved, and unapproved software titles

      Build definitions of software categories to inform software standards and brainstorm examples of each category.

      Phase 2 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Procure, receive, and deploy

      Proposed Time to Completion (in weeks): 6
      Step 2.1: Request and procureStep 2.2: Receive and deploy
      Start with an analyst kick-off call:
      • Define standards for software requests
      • Build procurement policy
      • Define procurement processes
      Review findings with analyst:
      • Build processes for software receiving
      • Build processes for software requests and deployment
      • Define process for non-standard requests
      Then complete these activities…
      • Determine software standards
      • Define procurement policy
      • Identify authorization thresholds
      • Build procurement workflows for new contracts and renewals
      Then complete these activities…
      • Identify storage locations for software information
      • Design workflow for receiving software
      • Design workflow for software deployment
      • Create a list of approved and non-standard requests
      • Define process for non-standard requests
      With these tools & templates:
      • Standard Operating Procedures
      With these tools & templates:
      • Standard Operating Procedures

      Phase 3: Manage, Redeploy, and Retire

      Step 3.1 Manage and maintain software contracts

      Phase 3:
      Manage, Redeploy & Retire
      This step will walk you through the following activities:This step involves the following participants:

      3.1

      Manage & Maintain Software
      • 3.1.1 Define process for conducting software inventory
      • 3.1.2 Define policies for software maintenance and patches
      • 3.1.3 Document your patch management policy
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team
      • Release Manager (optional)
      • Security (optional)

      3.2

      Harvest, Redeploy, or Retire

      Step Outcomes

      • A process for conducting regular software inventory checks and analyzing the data to continually manage software assets and license compliance.
      • An understanding of software maintenance requirements
      • A policy for conducting regular software maintenance and patching
      • A documented patch management policy

      Manage your software licenses to decrease your risk of overspending

      Many organizations fail to track their software inventory effectively; the focus often remains on hardware due to its more tangible nature. However, annual software purchases often account for a higher IT spend than annual hardware purchases, so it’s important to track both.

      Benefits of managing software licenses

      • Better control of the IT footprint. Many companies already employ hardware asset management, but when they employ SAM, there is potential to save millions of dollars through optimal use of all technology assets.
      • Better purchasing decisions and negotiating leverage. Enhanced visibility into actual software needs means not only can companies procure and deploy the right increments of software in the right areas, but they can also do so more cost-effectively through tools such as volume purchase agreements or bundled services.
      • No refund policy combined with shelfware (software that sits unused “on the shelf”) is where software companies make their money.
      • Managing licenses will help prevent costly audit penalties. Special attention should be paid to software purchased from large vendors such as Microsoft, Oracle, Adobe, SAP, or IBM.

      Maintain a comprehensive, up-to-date software inventory to manage licenses effectively

      A clearly defined process for inventory management will reduce the risk of over buying licenses and falling out of compliance.

      • A detailed software inventory and tracking system should act as a single point of contact for all your license data.
      • Maintain a comprehensive inventory of installed software through complete and accurate records of all licenses, certifications, and software purchase transactions, storing these in a secure repository.
      • Periodically review installed software and accompanying licenses to ensure only legal and supported software is in use and to ensure ongoing compliance with the software management policy.

      Info-Tech Best Practice

      Have and maintain a list of supported software to guide what new software will be approved for purchase and what current software should be retained on the desktops, servers, and other processing devices.

      Conduct a baseline inventory of deployed software to know what you have

      You have to know what you have before you can manage it.

      A baseline inventory tells you exactly what software you have deployed and where it is being used. This can help to determine how to best optimize software and license usage.

      A software inventory will allow you to:

      • Identify all software residing on computers.
      • Compare existing software to the list of supported software.
      • Identify and delete illegal or unsupported software.
      • Identify and stop software use that violates license agreements, copyright law, or organizational policies.

      Two methods for conducting a software inventory:

      1. If you have several computers to analyze, use automated tools to conduct inventory for greater accuracy and efficiency. Software inventory or discovery tools scan installed software and generate inventory reports, while asset management tools will help you manage that data.
      2. Manual inventory may be possible if your organization has few computers.

      How to conduct a manual software inventory:

      1. Record serial number of device being analyzed.
      2. Record department and employee to whom the computer is assigned.
      3. Inspect contents of hard drive and/or server to identify software as well as hidden files and directories.
      4. Record licensing information for software found on workstation and server.
      5. Compare findings with list of supported software and licenses stored in repository.

      Keep the momentum going through regular inventory and licensing checks

      Take preventive action to avoid unauthorized software usage through regular software inventory and license management:

      • Regularly update the list of supported software and authorized use.
      • Monitor and optimize software license usage.
      • Continually communicate with and train employees around software needs and policies.
      • Maintain a regular inventory schedule to keep data up to date and remain compliant with licensing requirements – your specific schedule will depend on the size of the company and procurement schedule.
      • Conduct random spot inventories – even if you are using a tool, periodic spot checks should still be performed to ensure accuracy of inventory.
      • Periodically review software procurement records and ensure procurement process is being followed.
      • Continuously monitor software installations on networked computers through automated tools.
      • Ensure software licensing documentation and data is secure.

      Define process for conducting software inventory

      Associated Activity icon 3.1.1 Define process for regular software inventory

      Participants: IT Director, Asset Manager

      Document: Document in the Standard Operating Procedures.

      1. If a baseline software inventory has not been conducted, discuss and document a plan for completing the inventory.
        • Will the inventory be conducted manually or through automated tools?
        • If manually, what information will be collected and recorded? Which devices will be analyzed? Where will data be stored?
        • If automatically, which tools will be used? Will any additional information need to be collected? Who will have access to the inventory?
        • When will the inventory be conducted and by whom?
          • Monthly inventory may be required if there is a lot of change and movement, otherwise quarterly is usually sufficient.
      2. Document how inventory data will be analyzed.
        • How will data be compared against supported software?
        • How will software violations be addressed?
      3. Develop a plan for continual inventory spot checks and maintenance.
        • How often will inventory be conducted and/or analyzed?
        • How often will spot checks be performed?

      Don’t forget that software requires maintenance

      While maintenance efforts are typically focused around hardware, software maintenance – including upgrades and patches – must be built into the software asset management process to ensure software remains compliant with security and regulatory requirements.

      Software maintenance guidelines:

      • Maintenance agreements should be stored in the ITAM database.
      • Software should be kept as current as possible. It is recommended that software remain no more than two versions off.
      • Unsupported software should be uninstalled or upgraded as required.
      • Upgrades should be tested, especially for high-priority or critical applications or if integrated with other applications.
      • Change and release management best practices should be applied for all software upgrades and patches.
      • A process should be defined for how often patches will be applied to end-user devices.

      Integrate patch management with your SAM practice to improve security and reduce downtime

      The integration between patch management and asset management is incredibly valuable from a technology point of view. IT asset management (ITAM) tools create reports on the characteristics of deployed software. By combining these reports with a generalized software updater, you can automate most simple patches to save your team’s efforts for more-critical incidents. Usage reports can also help determine which applications should be reviewed and removed from the environment.

      • In recent years, patch management has grown in popularity due to widespread security threats, the resultant downtime, and expenses associated with them.
      • The main objective of patch management is to create a consistently configured environment that is secure against known vulnerabilities in operating systems and application software.

      Assessing new patches should include questions such as:

      • What’s the risk of releasing the patch? What is the criticality of the system? What end users will be affected?
      • How will we manage business disruption during an incident caused by a failed patch deployment?
      • In the event of service outage as a result of a failed patch deployment, how will we recover services effectively in business priority order?
      • What’s the risk of expediting the patch? Of not releasing the patch at all?

      Define policies for software maintenance and patches

      Associated Activity icon 3.1.2 Define software maintenance and patching policies

      Participants: IT Director, Asset Manager, Release Manager (optional), Security (optional)

      Document: Document in the Standard Operating Procedures.

      Software maintenance:

      Review the software maintenance guidelines in this section and in the SOP template. Discuss each policy and revise and document in accordance with your policies.

      Patch management:

      Discuss and document patch management policies:

      1. How often will end-user devices receive patches?
      2. How often will servers be patched?
      3. How will patches be prioritized? See example below.
        • Critical patches will be applied within two days of release, with testing prioritized to meet this schedule.
        • High-priority patches will be applied within 30 days of release, with testing scheduled to meet this requirement.
        • Normal-priority patches will be evaluated for appropriateness and will be installed as needed.

      Document your patch management policy

      Supporting Tool icon 3.1.3 Use the Patch Management Policy template to document your policy

      The patch management policy helps to ensure company computers are properly patched with the latest appropriate updates to reduce system vulnerability and to enhance repair application functionality. The policy aids in establishing procedures for the identification of vulnerabilities and potential areas of functionality enhancements, as well as the safe and timely installation of patches. The patch management policy is key to identifying and mitigating any system vulnerabilities and establishing standard patch management practices.

      Use Info-Tech’s Patch Management Policy template to get started.

      Sample of the 'Patch Management Policy' template.

      Step 3.2 Harvest, Redeploy, or Retire Software

      Phase 3:
      Manage, Redeploy & Retire
      This step will walk you through the following activities:This step involves the following participants:

      3.1

      Manage & Maintain Software
      • 3.2.1 Map your software license harvest and reallocation process
      • 3.2.2 Define the policy for retiring software
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team

      3.2

      Harvest, Redeploy, or Retire

      Step Outcomes

      • A defined process for harvesting and reallocating unused software licenses
      • A defined policy for how and when to retire unused or outdated software

      Harvest and reallocate software to optimize license usage

      Using a defined process for harvesting licenses will yield a crop of savings throughout the organization.

      Unused software licenses are present in nearly every organization and result in wasted resources and software spend. Recycling and reharvesting licenses is a critical process within software asset management to save your organization money.

      Licensing Recycling

      When computers are no longer in use and retired, the software licenses installed on the machines may be able to be reused.

      License recycling involves reusing these licenses on machines that are still in use or for new employees.

      License Harvesting

      License harvesting involves more actively identifying machines with licenses that are either not in use or under utilized, and recovering them to be used elsewhere, thus reducing overall software spend on new licenses.

      Use software monitoring data to identify licenses for reallocation in alignment with policies and agreements

      1. Monitor software usage
        Monitor and track software license usage to gain a clear picture of where and how existing software licenses are being used and identify any unused or underused licenses.
      2. Identify licenses for reharvesting
        Identify software licenses that can be reharvested and reallocated according to your policy.
      3. Uninstall software
        Notify user, schedule a removal time if approved, uninstall software, and confirm it has been removed.
      4. Reallocate license when needed

      Sources of surplus licenses for harvest:

      • Projects that required a license during a particular time period, but now do not require a license (i.e. the free version of the software will suffice)
      • Licenses assigned to users no longer with the organization
      • Software installed on decommissioned hardware
      • Installed software that hasn’t been used by the user in the last 90 days (or other defined period)
      • Over-purchased software due to poorly controlled software request, approval, or provisioning processes

      Info-Tech Insight

      Know the stipulations of your end-user license agreement (EULA) before harvesting and reallocating licenses. There may be restrictions on how often a license can be recycled in your agreement.

      Create a defined process for software license harvesting

      Define a standard reharvest timeline. For example, every 90 days, your SAM team can perform an internal audit using your SAM tool to gather data on software usage. If a user has not used a title in that time period, your team can remove that title from that user’s machine. Depending on the terms and conditions of the contract, the license can either be retired or harvested and reallocated.

      Ensure you have exception rules built in for software that’s cyclical in its usage. For example, Finance may only use tax software during tax season, so there’s no reason to lump it under the same process as other titles.

      It’s important to note that in addition to this process, you will need a software usage policy that supports your license harvest process.

      The value of license harvesting

      • Let’s say you paid for 1,000 licenses of a software title at a price of $200 per license.
      • Of this total, 950 have been deployed, and of that total, 800 are currently being used.
      • This means that 16% of deployed licenses are not in use – at a cost of $30,000.
      • With a defined license harvest process, this situation would have been prevented.

      Build a workflow to document the software harvest process

      Include the following in your process:

      • How will unused software be identified?
      • How often will usage reports be reviewed?
      • How will the user be notified of software to be removed?
      • How will the software be removed?
      A flowchart documenting the software harvest process. There are two levels, at the top is 'IT Asset Manager', and the bottom is 'Desktop Support Team'. It begins in 'IT Asset Manager' with 'Create/Review Usage Report', and if the client agrees to removal it moves to 'License deactivation required?' in 'Desktop Support Team'. Eventually you 'Close ticket' and it moves back up to 'Discovery tool will register change automatically' in 'IT Asset Manager'.

      Map your software license harvest and reallocation process

      Associated Activity icon 3.2.1 Build license harvest and reallocation workflow

      Participants: IT Director, Asset Manager, Service Desk Manager

      Document: Document in the Standard Operating Procedures.

      1. Outline each step in the process of software harvest and reallocation using notecards or a whiteboard. Be as granular as possible. On each card, describe the step and the individual responsible for each step.
      2. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
      3. Examine each challenge or pain point. Discuss whether there is a clear solution to the problem. If so, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, considering people, processes, and available technology.
      4. Use the sample workflow on the previous slide as a guide if needed.

      The same flowchart documenting the software harvest process from the previous section.

      Improve your software retirement process to drive savings for the whole business

      Business Drivers for Software Disposal

      • Cost Reduction
        • Application retirement allows the application and the supporting hardware stack to be decommissioned.
        • This eliminates recurring costs such as licensing, maintenance, and application administration costs, representing potentially significant savings
      • Consolidation
        • Many legacy applications are redundant systems. For example, many companies have ten or more legacy financial systems from mergers/acquisitions.
        • Systems can be siloed, running incompatible software. Moving data to a common accessible repository streamlines research, audits, and reporting.
      • Compliance
        • An increased focus on regulations places renewed emphasis on e-discovery policies. Keeping legacy applications active just to retain data is an expensive proposition.
        • During application retirement, data is classified, assigned retention policies, and disposed of according to data/governance initiatives.
      • Risk Mitigation
        • Relying on IT to manage legacy systems is problematic. The lack of IT staff familiar with the application increases the potential risk of delayed responses to audits and e-discovery.
        • Retiring application data to a common platform lets you leverage skills you have current investments in. This enables you to be responsive to audit or litigation results.

      Retire your outdated software to decrease IT spend on redundant applications

      Benefits of software retirement:

      1. Assists the service desk in not having to support every release, version, or edition of software that your company might have used in the past.
      2. Stay current with product releases so your company is better placed to take advantage of improvements built-in to such products, rather than being limited by the lack of a newly introduced function.
      3. Removing software that is no longer of commercial benefit can offer a residual value through assets.

      Consequences of continuing to support outdated software:

      • Budgets are tied up to support existing applications and infrastructure, which leaves little room to invest in new technologies that would otherwise help grow business.
      • Much of this software includes legacy systems that were acquired or replaced when new applications were deployed. The value of these outdated systems decreases with every passing year, yet organizations often continue to support these applications.
        • Fear of compliance and data access are the most common reasons.
      • Unfortunately, the cost of doing so can consume over 50% of an overall IT budget.

      The solution to this situation is to retire outdated software.

      “Time and time again, I keep hearing stories from schools on how IT budgets are constantly being squeezed, but when I dig a little deeper, little or no effort is being made on accounting for software that might be on the kit we are taking away.” (Phil Goldsmith, Managing Director – ScrumpyMacs)

      Define the policy for retiring software

      Associated Activity icon 3.2.2 Document process for software retirement

      Participants: IT Director, Asset Manager, Operations

      Document: Document in the Standard Operating Procedures.

      1. Discuss and document the process for retiring software that has been deemed redundant due to changing business needs or an improvement in competitive options.
      2. Consider the following:
        • What criteria will determine when software is suited for retirement?
        • The contract should always be reviewed before making a decision to ensure proper notice is given to the vendor.
        • Notice should be provided as soon as possible to ensure no additional billing arrives for renewals.
        • How will software be removed from all devices? How soon must the software be replaced, if applicable?
        • How long will records be archived in the ITAM database?
      3. Document decisions in the Standard Operating Procedures.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.2

      Sample of activity 3.1.2 'Define policies for software maintenance and patches'. Define policies for software maintenance and patches

      Discuss best practices and define policies for conducting regular software maintenance and patching.

      3.2.1

      Sample of activity 3.3.1 'Assess the maturity of audit management processes and policies'. Map your software license harvest and reallocation process

      Build a process workflow for harvesting and reallocating unused software licenses.

      Phase 3 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Manage, redeploy, and retire

      Proposed Time to Completion (in weeks): 4
      Step 3.1: Manage and maintain softwareStep 3.2: Harvest, redeploy, or retire
      Start with an analyst kick-off call:
      • Define a process for conducting software inventory
      • Define a policy for software maintenance
      • Build a patch management policy
      Review findings with analyst:
      • Build a process for harvesting and reallocating software licenses
      • Define a software retirement policy
      Then complete these activities…
      • Define process for conducting software inventory
      • Define policies for software maintenance
      • Document patch management policy
      Then complete these activities…
      • Map software harvest and reallocation process
      • Define software retirement policy
      With these tools & templates:
      • Standard Operating Procedures
      • Patch Management Policy
      With these tools & templates:
      • Standard Operating Procedures

      Phase 4: Build Supporting Processes & Tools

      Visa used an internal SAM strategy to win the audit battle

      Logo for VISA.

      Case Study

      Industry: Financial Services
      Source: SAM Summit 2014

      Challenge

      The overarching goal of any SAM program is compliance to prevent costly audit fines. The SAM team at Visa was made up of many individuals who were former auditors.

      To deal with audit requests from vendors, “understand how auditors do things and understand their approach,” states Joe Birdsong, SAM Director at Visa.

      Vendors are always on the lookout for telltale signs of a lucrative audit. For Visa, the key was to understand these processes and learn how to prepare for them.

      Solution

      Vendors typically look for the following when evaluating an organization for audit:

      1. A recent decrease in customer spend
      2. How easy the licensed software is to audit
      3. Organizational health

      Ultimately, an audit is an attack on the relationship between the vendor and organization. According to Birdsong: “Maybe they haven’t really touched base with your teams and had good contact and relationship with them, and they don’t really know what’s going on in your enterprise.”

      Results

      By understanding the motivations behind potential audits, Visa was able to form a strategy to increase transparency with the vendor.

      Regular data collection, almost real-time reporting, and open, quick communication with the vendor surrounding audits made Visa a low-risk client for vendors.

      Buy-in from management is also important, and the creation of an official SAM strategy helps maintain support. Thanks to its proactive SAM program, Visa saved $200 million in just three years.

      Step 4.1 Ensure compliance for audits

      Phase 4:
      Build supporting processes & tools
      This step will walk you through the following activities:This step involves the following participants:

      4.1

      Compliance & audits
      • 4.1.1 Define and document the internal audit process
      • 4.1.2 Define and document the external audit process
      • 4.1.3 Prepare an audit scoping email template
      • 4.1.4 Prepare an audit launch email template
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team

      4.2

      Communicate & build roadmap

      Step Outcomes

      • An understanding of the audit process and importance of audit preparation
      • A defined process for conducting regular internal audits to prepare for and defend against external audits
      • A strategy and documented process for responding to external audit requests

      Take a lifecycle approach to your software compliance process

      Internal audits are an effective way for organizations to regularly assess their licensing position in preparation for an audit.

      1. Gather License Data
        Use your SAM tool to run a discovery check to determine the current state of your software estate.
      2. Improve Data Quality
        Scan the data for red flags. Improve its completeness, consistency, and quality.
      3. Identify Audit Risks
        Using corrected license data, examine your reports and identify areas of risk within the organization.
      4. Identify priority titles
        Determine which titles need attention first by using the output of the license rationalization step.
      5. Reconcile to eliminate gaps
        Ensure that the correct number of licenses are deployed for each title.
      6. Draft Vendor Response
        Prepare response to vendor for when an audit has been requested.

      Improve audit response maturity by leveraging technology and contract data

      By improving your software asset management program’s maturity, you will drive savings for the business that go beyond the negotiating table.

      Recognize the classic signs of each stage of audit response maturity to identify where your organization currently stands and where it can go.

      • Optimized: Automated tools generate compliance, usage, and savings reports. Product usage reports and alerts in place to harvest and reuse licenses. Detailed savings reports provided to executive team.
      • Proactive: Best practices enforced. Compliance positions are checked quarterly, and compliance reports are used to negotiate software contracts.
      • Reactive: Best practices identified but unused. Manual tools still primarily in use. Compliance reports are time-consuming and often inaccurate.
      • Chaotic: Purchases are ad hoc and transaction based. Minimal tracking in place, leading to time-consuming manual processes.

      Implement a proactive internal audit strategy to defend against external audits

      Audits – particularly those related to software – have been on the rise as vendors attempt to recapture revenue.

      Being prepared for an audit is critical. Internal preparation will not only help your organization reduce the risk associated with an audit but will also improve daily operations through focusing on diligent documentation and data collection.

      Conducting routine internal audits will help prepare your organization for the real deal and may even prevent the audit from happening altogether. Hundreds of thousands of dollars can be saved through a proactive audit strategy with routine documentation in place.

      In addition to the fines incurred from a failed audit, numerous other negative consequences can arise:

      • Multiple audits: Failing an audit makes the organization more likely to be audited again.
      • Poor perception of IT: Unless non-compliance was previously disclosed to the business, IT can be deemed responsible.
      • Punitive injunctions: If a settlement is not reached, vendors will apply for an injunction, inhibiting use of their software.
      • Inability to justify purchases: IT can have difficulty justifying the purchase of additional resources after a failed audit.
      • Disruption to business: Precious time and resources will be spent dealing with the results of the audit.

      Perform routine internal compliance reports to decrease audit risk

      The intent of an internal audit is to stop the battle from happening before it starts. Waiting for a knock at the door from a vendor can be stressful, and it can do harm beyond a costly fine.

      • Internal audits help to ensure you’re keeping track of any software changes to keep your data and licensing up to date and avoid costly surprises if an external audit is requested.
      • Identify areas where processes are breaking down and address them before there’s a potential negative impact.
      • Identify control points in processes ahead of time to more easily identify access points where information should be verified.

      “You want to get [the] environment to a level where you’re comfortable sharing information with [a] vendor. Inviting them in to have a chat and exposing numbers means there’s no relationship there where they’re coming to audit you. They only come to audit you when they know there’s a gain to be had, otherwise what’s the point of auditing?
      I want customers to get comfortable with licensing and what they’re spending, and then there’s no problem exposing that to vendors. Vendors actually appreciate that.”
      (Ben Brand, SAM Practice Manager, Insight)

      Info-Tech Insight

      “The supreme art of war is to subdue the enemy without fighting.” – Sun Tzu

      Performing routine checks on your license compliance will drastically reduce the risk that your organization gets hit with a costly fine. Maintaining transparency and demonstrating compliance will fend off audit-hungry vendors.

      Define and document the internal audit process

      Associated Activity icon 4.1.1 Document process and procedures for internal audits

      Participants: CIO and/or IT Director, Asset Manager, IT Managers

      Document: Document in the Standard Operating Procedures.

      Define and document a process for conducting internal software audits.
      Include the following:

      1. How often will audits be completed for each software published?
      2. When will audits be conducted?
      3. Who will conduct the audit? Who will be consulted?
      4. What will be included in the scope of the audit?

      Example:

      • Annual audits will be completed for each software publisher, scheduled as part of the license or maintenance agreement renewals.
      • Where annual purchases are not required, vendor audits for compliance will be conducted annually, with a date predetermined based on minimizing scheduling conflicts with larger audits.
      • Audit will be completed with input from product managers.
      • Audit will include:
        • Software compliance review: Licenses owned compared to product installed.
        • Version review: Determine if installed versions match company standards. If there is a need for upgrades, does the license permit upgrading?
        • Maintenance review: Does the maintenance match requirements for the next year’s plans and licenses in use?
        • Support review: Is the support contract appropriate for use?
        • Budget: Has budget been allocated; is there an adjustment required due to increases?

      Identify organizational warning signs to decrease audit risk

      Being prepared for an audit is critical. Internal preparation will not only help your organization reduce the risk associated with an audit but will also improve daily operations through focusing on diligent documentation and data collection.

      Certain triggers exist that indicate a higher risk of an audit occurring. It is important to recognize these warning signs so you can prepare accordingly.

      Health of organization
      If your organization is putting out fires and a vendor can sense it, they’ll see an audit as a highly lucrative exercise.

      Decrease in customer spend
      A decrease in spend means that an organization has a high chance of being under-licensed.

      License complexity
      The more complex the license, the harder it is to remain in compliance. Some vendors are infamous for their complex licensing agreements.

      Audit Strategy

      • Audits should neither be feared nor embraced.
      • An audit is an attack on your relationship with your vendor; your vendor needs to defend its best interests, but it would also rather maintain a satisfied relationship with its client.
      • A proactive approach to audits through routine reporting and transparency with vendors will alleviate all fear surrounding the audit process. It provides your vendor with compliance assurance and communicates that an audit won’t net the vendor enough revenue to justify the effort.

      Focus on three key tactics for success before responding to an audit

      Taking these due diligence steps will pay dividends downstream, reducing the risk of negative results such as release of confidential information.

      Form an Audit Team

      • Once an audit letter is received from a vendor or third party, a virtual team needs to be formed.
      • The team should be cross-functional, representing various core areas of the business.
      • Don’t forget legal counsel: they will assist in the review of audit provision(s) to determine your contractual rights and obligations with respect to the audit.

      Sign an NDA

      • An NDA should be signed by all parties, the organization, the vendor, and the auditor.
      • Don’t wait on a vendor to provide its NDA. The organization should have its own and provide it to both parties.
      • If the auditor is a third party, negotiate a three-way NDA. This will prevent data being shared with other third parties.

      Examine Contract History

      • Vendors will attempt to alter terms of contracts when new products are purchased.
      • Maintain your current agreement if they are more favorable by “grandfathering” your original agreement.
      • Oracle master level agreements are an example: master level agreements offer more favorable terms than more recent versions.

      Info-Tech Insight

      Even if you cannot get a third-party NDA signed, the negotiation process should delay the overall audit process by at least a month, buying your organization valuable time to gather license data.

      Be prepared for external audit requests with a defined process for responding

      1. Vendor-initiated audit request received and brought to attention of IT Asset Manager and CIO.
      2. Acknowledge receipt of audit notice.
      3. Negotiate timing and scope of the audit (including software titles, geographic locations, entities, and completion date).
      4. Notify staff not to remove or acquire licenses for software under audit.
      5. Gather documentation and create report of all licensed software within audit scope.
        • Include original contract, most recent contract, and any addendums, purchase receipts, or reseller invoices, and publisher documentation such as manuals or electronic media.
      6. Compare documentation to installed software according to ITAM database.
      7. Validate any unusual or non-compliant software.
      8. Complete documentation requested by auditor and review results.

      Define and document the external audit process

      Associated Activity icon 4.1.2 Define external audit process

      Participants: CIO and/or IT Director, Asset Manager, IT Managers

      Document: Document in the Standard Operating Procedures.

      Define and document a process for responding to external software audit requests.
      Include the following:

      1. Who must be notified of the audit request when it is received?
      2. When must acknowledgement of the notice be sent and by whom?
      3. What must be defined under the scope of the audit (e.g. software titles, geographic locations, entities, completion date)?
      4. What communications must be sent to IT staff and end users to ensure compliance?
      5. What documentation should be gathered to review?
      6. How will documentation be verified against data?
      7. How will unusual or non-compliant software be identified and validated?
      8. Who needs to be informed of the results?

      Control audit scope with an audit response template

      Supporting Tool icon 4.1.3 Prepare an audit scoping email template

      Use the Software Audit Scoping Email Template to create an email directed at your external (or internal) auditors. Send the audit scoping email several weeks before an audit to determine the audit’s scope and objectives. The email should include:

      • Detailed questions about audit scope and objectives.
      • Critical background information on your organization/program.

      The email will help focus your preparation efforts and initiate your relationship with the auditors.

      Control scope by addressing the following:

      • Products covered by a properly executed agreement
      • Geographic regions
      • User groups
      • Time periods
      • Specific locations
      • A subset of users’ computers
      Sample of the 'Software Audit Scoping Email Template'.

      Keep leadership informed with an audit launch email

      Supporting Tool icon 4.1.4 Prepare an audit launch email template

      Approximately a week before the audit, you should email the internal leadership to communicate information about the start of the audit. Use the Software Audit Launch Email Template to create this email, including:

      • Staffing
      • Functional requirements
      • Audit contact person information
      • Scheduling details
      • Audit report estimated delivery time

      For more guidance on preparing for a software audit, see Info-Tech’s blueprint: Prepare and Defend Against a Software Audit.

      Sample of the 'Software Audit Launch Email Template'.

      A large bank employed proactive, internal audits to experience big savings

      Case Study

      Industry: Banking
      Source: Pomeroy

      Challenge

      A large American financial institution with 1,300 banking centers in 12 states, 28,000 end users, and 108,000 assets needed to improve its asset management program.

      The bank had employed numerous ITAM tools, but IT staff identified that its asset data was still fragmented. There was still incomplete insight into what assets the banked owned, the precise value of those assets, their location, and what they’re being used for.

      The bank decided to establish an asset management program that involved internal audits to gather more-complete data sets.

      Solution

      With the help of a vendor, the bank implemented cradle-to-grave asset tracking and lifecycle management, which provided discovery of almost $80 million in assets.

      The bank also assembled an ITAM team and a dedicated ITAM manager to ensure that routine internal audits were performed.

      The team was instrumental in establishing standardization of IT policies, hardware configuration, and service requirements.

      Results

      • The bank identified and now tracks over 108,000 assets.
      • The previous level of 80% accuracy in inventory tracking was raised to 96%.
      • Nearly $500,000 was saved through asset recovery and repurposing of 600 idle assets.
      • There are hundreds of thousands of dollars in estimated savings as the result of avoiding costly penalties from failed audits thanks to proactive internal audits.

      Step 4.2 Build communication plan and roadmap

      Phase 4:
      Build supporting processes & tools
      This step will walk you through the following activities:This step involves the following participants:

      4.1

      Compliance & audits
      • 4.2.1 Develop a communication plan to convey the right messages
      • 4.2.2 Anticipate end-user questions by preparing an FAQ list
      • 4.2.3 Build a software asset management policy
      • 4.2.4 Build additional SAM policies
      • 4.2.5 Develop a SAM roadmap to plan your implementation
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team

      4.2

      Communicate & build roadmap

      Step Outcomes

      • A documented communications plan for relevant stakeholders to understand the benefits and changes the SAM program will bring
      • A list of anticipated end-user questions with responses
      • Documented software asset management policies
      • An implementation roadmap

      Communicate SAM processes to gain acceptance and support

      Communication is crucial to the integration and overall implementation of your SAM program. If staff and users do not understand the purpose of processes and policies, they will fail to provide the desired value.

      An effective communication plan will:

      • Gain support from management at the project proposal phase.
      • Create end-user buy-in once the program is set to launch.
      • Maintain the presence of the program throughout the business.
      • Instill ownership throughout the business from top-level management to new hires.

      Communicate the following:

      1. Advertise successes

        • Regularly demonstrate the value of the SAM program with descriptive statistics focused on key financial benefits.
        • Share data with the appropriate personnel; promote success to obtain further support from senior management.
      2. Report and share asset data

        • Sharing detailed asset-related reports frequently gives decision makers useful data to aid in their strategy.
        • These reports can help your organization prepare for audits, adjust budgeting, and detect unauthorized software.
      3. Communicate the value of SAM

        • Educate management and end users about how they fit into the bigger picture.
        • Individuals need to know which behaviors may put the organization at risk or adversely affect data quality.

      Educate staff and end users through SAM training to increase program success

      As part of your communication plan and overall SAM implementation, training should be provided to both staff and end users within the organization.

      • ITAM solutions are complex by nature with both business process and technical knowledge required to use them correctly.
      • All facets of the business, from management to new hires, should be provided with training to help them understand their role in the program’s success.
      • Keep the message appropriate to the audience – end users don’t need to know the complete process, but will need to know policy and how to request.
      • Even after the SAM program has been fully implemented, keep employees up to date with policies and processes through ongoing training sessions for both new hires and existing employees:
        • New hires: Provide new hires with all relevant SAM policies and ensure they understand the importance of software asset management.
        • Existing employees: Continually remind them of how SAM is involved in their daily operations and inform them of any changes to policies.

      Create your communications plan to anticipate challenges, remove obstacles, and ensure buy-in

      Provide separate communications to key stakeholder groups

      Why:
      • What problems are you trying to solve?
      What:
      • What processes will it affect (that will affect me)?
      Who:
      • Who will be affected?
      • Who do I go to if I have issues with the new process?
      Three circular arrows each linking t the next in a downward daisy chain. The type arrow has 'IT Staff' in the middle, the second 'Management', and the third 'End Users' When:
      • When will this be happening?
      • When will it affect me?
      How:
      • How will these changes manifest themselves?
      Goal:
      • What is the final goal?
      • How will it benefit me?

      Develop a communication plan to convey the right messages

      Associated Activity icon 4.2.1 Develop a communication plan to convey the right messages

      Participants: CIO, IT Director, Asset Manager, Service Desk Manager

      Document: Document in the SAM Communication Plan.

      1. Identify the groups that will be affected by the SAM program.
      2. For each group requiring a communication plan, identify the following:
      3. Benefits of SAM for that group of individuals (e.g. more efficient software requests).
      4. The impact the change will have on them (e.g. change in the way a certain process will work).
      5. Communication method (i.e. how you will communicate).
      6. Timeframe (i.e. when and how often you will communicate the changes).
      7. Complete this information in a table like the one below and document in the Communication Plan.
      Group Benefits Impact Method Timeline
      Executives
      • Improved audit compliance
      • Improved budgeting and forecasting
      • Review and sign off on policies
      End Users
      • Streamlined software request process
      • Follow software installation and security policies
      IT
      • Faster access to data and one source of truth
      • Modified processes
      • Ensure audits are completed regularly

      Anticipate end-user questions by preparing an FAQ list

      Associated Activity icon 4.2.2 Prepare an FAQ list

      Document: Document FAQ questions and answers in the SAM FAQ Template.

      ITAM imposes changes to end users throughout the business and it’s normal to expect questions about the new program. Prepare your team ahead of time by creating a list of FAQs.

      Some common questions include:

      • Why are you changing from the old processes?
      • Why now?
      • What are you going to ask me to do differently?
      • Will I lose any of my software?

      The benefits of preparing a list of answers to FAQs include:

      • A reduction in time spent creating answers to questions. If you focus on the most common questions, you will make efficient use of your team’s time.
      • Consistency in your team’s responses. By socializing the answers to FAQs, you ensure that no one on your team is out of the loop and the message remains consistent across the board.

      Include policy design and enforcement in your communication plan

      • Software asset management policies should define the actions to be taken to support software asset management processes and ensure the effective and efficient management of IT software assets across the asset lifecycle.
      • Implementing asset management policies enforces the notion that the organization takes its IT assets and the management of them seriously and will help ensure the benefits of SAM are achieved.
      • Designing, approving, documenting, and adopting one set of standard SAM policies for each department to follow will ensure the processes are enforced equally across the organization.

      Info-Tech Insight

      Use policy templates to jumpstart your policy development and ensure policies are comprehensive, but be sure to modify and adapt policies to suit your corporate culture or they will not gain buy-in from employees. For a policy to be successful, it must be a living document and have participation and involvement from the committees and departments to whom it will pertain.

      Build a software asset management policy

      Supporting Tool icon 4.2.3 Document a SAM policy

      Use Info-Tech’s Software Asset Management Policy template to define and document the purpose, scope, objectives, and roles and responsibilities for your organization's software asset management program.

      The template allows you to customize policy requirements for:

      • Procurement
      • Installation and Removal
      • Maintenance
      • Mergers and Acquisitions
      • Company Divestitures
      • Audits

      …as well as consequences for non-compliance.

      Sample of the 'Software Asset Management Policy' template.

      Use Info-Tech’s policy templates to build additional policies

      Supporting Tool icon 4.2.4 Build additional SAM policies

      Asset Security Policy
      The IT asset security policy will describe your organization's approach to ensuring the physical and digital security of your IT assets throughout their entire lifecycle.

      End-User Devices Acceptable Use Policy
      This policy should describe how business tools provided to employees are to be used in a responsible, ethical, and compliant manner, as well as the consequences of non-compliance.

      Purchasing Policy
      The purchasing policy helps to establish company standards, guidelines, and procedures for the purchase of all information technology hardware, software, and computer-related components as well as the purchase of all technical services.

      Release Management Policy
      Use this policy template to define and document the purpose, scope, objectives, and roles and responsibilities for your organization's release management program.

      Internet Acceptable Use Policy
      Use this template to help keep the internet use policy up to date. This policy template includes descriptions of acceptable and unacceptable use, security provisions, and disclaimers on the right of the organization to monitor usage and liability.

      Samples of additional SAM policies, listed to the left.

      Implement SAM in a phased, constructive approach

      One of the most difficult decisions to make when implementing a SAM program is: “where do we start?”

      It’s not necessary to deploy a comprehensive SAM program to start. Build on the essentials to become more mature as you grow.

      SAM Program Maturity (highest to lowest)

      • Audits and reporting
        Gather and analyze data about software assets to ensure compliance for audits and to continually improve the business.
      • Contracts and budget
        Analyze contracts and licenses for software across the enterprise and optimize planning to enable cost reduction.
      • Lifecycle standardization
        Define standards and processes for all asset lifecycle phases from request and procurement through to retirement and redistribution.
      • Inventory and tracking
        Define assets you will procure, distribute, and track. Know what you have, where it is deployed, and keep track of contracts and all relevant data.

      Integrate your SAM program with the organization to assist its implementation

      SAM cannot perform on its own – it must be integrated with other functional areas of the organization to maintain its stability and support.

      • Effective SAM is supported by a comprehensive set of processes as part of its implementation.
      • For example, integration with the procurement team’s processes and tools is required to track software purchases to mitigate software license compliance risk.
      • Integration with Finance is required to support internal cost allocations and chargebacks.
      • Integration with the service desk is required to track and deploy software requests.

      Info-Tech Best Practice

      To integrate SAM effectively, a clear implementation roadmap needs to be designed. Prioritize “quick wins” to demonstrate success to the business early and to gain buy-in from your team. Short-term gains should be designed to support long-term goals of your SAM program.

      Sample short-term goals
      • Identify inventory classification and tool
      • Create basic SAM policies and processes
      • Implement SAM auto-discovery tools
      Sample long-term goals
      • Software contract data integration
      • Continual improvement through review and revision
      • Software compliance reports, internal audits

      Develop a SAM roadmap to plan your implementation

      Associated Activity icon 4.2.5 Build a project roadmap
      1. Identify and review all initiatives that will be taken to implement or improve the software asset management program. These may fall under people, process, or technology-related tasks.
      2. Assign a priority level to each task (Quick Win, Low, Medium, High).
      3. Use the priority to sort tasks into start dates, breaking down by:
        1. Short, medium, or long-term
        2. 1 month, 3 months, 6 months, 12+ months
        3. Q1, Q2, Q3, Q4
      4. Review tasks and adjust start dates for some, if needed to set realistic and achievable timelines.
      5. Transfer tasks to a project plan or Gantt chart to formalize.
      Examples:
      Q1 Q2 Q3 Q4
      • Hire software asset manager
      • Document SOP
      • Define policies
      • Select a SAM tool
      • Create list of approved services and software
      • Define metrics
      • Inventory existing software and contracts
      • Build a patch policy
      • Build a service catalog
      • Contract renewal alignment
      • Run internal audit
      • Security review

      Review and maintain the SAM program to reach optimal maturity

      • SAM is a dynamic process. It must adapt to keep pace with the direction of the organization. New applications, different licensing needs, and a constant stream of new end users all contribute to complicating the licensing process.
      • As part of your organization’s journey to an optimized SAM program, put in place continual improvement practices to maintain momentum.

      A suggested cycle of review and maintenance for your SAM: 'Plan', 'Do', 'Check', 'Act'.

      Info-Tech Insight

      Advertising the increased revenue that is gained from good SAM practices is a powerful way to gain project buy-in.

      Keep the momentum going:

      • Clearly define ongoing responsibilities for each role.
      • Develop a training and awareness program for new employees to be introduced to SAM processes and policies.
      • Continually review and revise existing processes as necessary.
      • Measure the success of the program to identify areas for improvement and demonstrate successes.
      • Measure adherence to process and policies and enforce as needed.

      Reflect on the outcomes of implementing SAM to target areas for improvement and share knowledge gained within and beyond the SAM team. Some questions to consider include:

      1. How did the data compare to our expectations? Was the project a success?
      2. What obstacles were present that impacted the project?
      3. How can we apply lessons learned through this project to others in the future?

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.2.1

      Sample of activity 4.2.1 'Develop a communication plan to convey the right messages'. Develop a communication plan to convey the right messages

      Identify stakeholders requiring communication and formulate a message and delivery method for each.

      4.2.5

      Sample of activity 4.2.5 'Develop a SAM roadmap to plan your implementation'. Develop a SAM roadmap to plan your implementation

      Outline the tasks necessary for the implementation of this project and prioritize to build a project roadmap.

      Phase 4 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Build supporting processes & tools

      Proposed Time to Completion (in weeks): 4
      Step 4.1: Compliance & audits Step 4.2: Communicate & build roadmap
      Start with an analyst kick-off call:
      • Discuss audit process
      • Define a process for internal audits
      • Define a process for external audit response
      Review findings with analyst:
      • Build communication plan
      • Discuss policy needs
      • Build a roadmap
      Then complete these activities…
      • Document internal audit process
      • Document external audit process
      • Prepare audit templates
      Then complete these activities…
      • Develop communication plan
      • Prepare an FAQ list for end users
      • Build SAM policies
      • Develop a roadmap
      With these tools & templates:
      • Standard Operating Procedures
      • Software Audit Scoping Email Template
      • Software Audit Launch Email Template
      With these tools & templates:
      • SAM Communication Plan
      • Software Asset Management FAQ Template
      • Software Asset Management Policy
      • Additional Policy Templates

      Bibliography

      2013 Software Audit Industry Report.” Express Metrix, 2013. Web.

      7 Vital Trends Disrupting Today’s Workplace: Results and Data from 2013 TINYpulse Employee Engagement Survey.” TINYpulse, 2013. Web.

      Beaupoil, Christof. “How to measure data quality and protect against software audits.” Network World, 6 June 2011.

      Begg, Daniel. “Effective Licence Position (ELP) – What is it really worth?” LinkedIn, 19 January 2016.

      Boehler, Bernhard. “Advanced License Optimization: Go Beyond Compliance for Maximum Cost Savings.” The ITAM Review, 24 November 2014.

      Bruce, Warren. “SAM Baseline – process & best practice.” Microsoft. 2013 Australia Partner Conference.

      Case Study Top 20 U.S. Bank Tackles Asset Management.” Pomeroy, 2012. Web.

      Cherwell Software Software Audit Industry Report.” Cherwell Software, 2015. Web.

      Conrad, Sandi. “SAM starter kit: everything you need to get started with software asset management. Conrad & Associates, 2010.

      Corstens, Jan, and Diederik Van der Sijpe. “Contract risk & compliance software asset management (SAM).” Deloitte, 2012.

      Deas, A., T. Markowitzm and E. Black. “Software asset management: high risk, high reward.” Deloitte, 2014.

      Doig, Chris. “Why you should always estimate ROI before buying enterprise software” CIO, 13 August 2015.

      Fried, Chuck. “America Needs An Education On Software Asset Management (SAM).” LinkedIn. 16 June 2015.

      Lyons, Gwen. “Understanding the Drivers Behind Application Rationalization Critical to Success.” Flexera Software Blog, 31 October 2012.

      Bibliography

      Metrics to Measure SAM Success: eight ways to prove your SAM program is delivering business benefits.” Snow Software White Paper, 2015.

      Microsoft. “The SAM Optimization Model.” Microsoft Corporation White Paper, 2010.

      Miller, D. and M. Oliver. “Engaging Stakeholders for Project Success.” Project Management Institute White Paper, 2015.

      Morrison, Dan. “5 Common Misconceptions of Software Asset Management.” SoftwareOne. 12 May 2015.

      O’Neill, Leslie T. “Visa Case Study: SAM in the 21st Century.” International Business Software Managers Association (IBSMA), 30 July 2014.

      Reducing Hidden Operating Costs Through IT Asset Discovery.” NetSupport Inc., 2011.

      SAM Summit 2014, 23-25 June 2014, University of Chicago Gleacher Center Conference Facilities, Chicago, MI.

      Saxby, Heather. “20 Things Every CIO Needs to Know about Software Asset Management.” Crayon Software Experts, 13 May 2015.

      The 2016 State of IT: Managing the money monsters for the coming year.” Spiceworks, 2016.

      The Hidden Cost of Unused Software.” A 1E Report, 1E.com: 2014. Web.

      What does it take to achieve software license optimization?” Flexera White Paper, 2013.

      Research contributors and experts

      Photo of Michael Dean, Director, User Support Services, Des Moines University Michael Dean
      Director, User Support Services
      Des Moines University
      Simon Leuty
      Co-Founder
      Livingstone Tech
      Photo of Simon Leuty, Co-Founder, Livingstone Tech
      Photo of Clare Walsh, PR Consultant, Adesso Tech Ltd. Clare Walsh
      PR Consultant
      Adesso Tech Ltd.
      Alex Monaghan
      Director, Presales EMEA
      Product Support Solutions
      Photo of Alex Monaghan, Director, Presales EMEA, Product Support Solutions

      Research contributors and experts

      Photo of Ben Brand, SAM Practice Manager, Insight Ben Brand
      SAM Practice Manager
      Insight
      Michael Swanson
      President
      ISAM
      Photo of Michael Swanson, President, ISAM
      Photo of Bruce Aboudara, SVP, Marketing & Business Development, Scalable Software Bruce Aboudara
      SVP, Marketing & Business Development
      Scalable Software
      Will Degener
      Senior Solutions Consultant
      Scalable Software
      Photo of Will Degener, Senior Solutions Consultant, Scalable Software

      Research contributors and experts

      Photo of Peter Gregorowicz, Associate Director, Network & Client Services, Vancouver Community College Peter Gregorowicz
      Associate Director, Network & Client Services
      Vancouver Community College
      Peter Schnitzler
      Operations Team Lead
      Toyota Canada
      Photo of Peter Schnitzler, Operations Team Lead, Toyota Canada
      Photo of David Maughan, Head of Service Transition, Mott MacDonald Ltd. David Maughan
      Head of Service Transition
      Mott MacDonald Ltd.
      Brian Bernard
      Infrastructure & Operations Manager
      Lee County Clerk of Court
      Photo of Brian Bernard, Infrastructure & Operations Manager, Lee County Clerk of Court

      Research contributors and experts

      Photo of Leticia Sobrado, IT Data Governance & Compliance Manager, Intercept Pharmaceuticals Leticia Sobrado
      IT Data Governance & Compliance Manager
      Intercept Pharmaceuticals

      What is resilience?

      • Large vertical image:
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      Aside from the fact that operational resilience is mandated by law as of January 2025 (yes, next year), having your systems and applications available to your customers whenever they need your services is always a good idea. Customers, both existing and new ones, typically prefer smooth operations over new functionality. If you have any roadblocks in your current customer journey, then solving those is also part of operational resilience (and excellence).

      Does this mean you should not market new products or services? Of course not! Solving a customer journey roadblock is ensuring that your company is resilient. The Happy Meal is a prime example: it solved a product roadblock for small children and a profits roadblock for the company. For more info, just google it. But before you bring a new service online, be sure that it can withstand the punches that will be thrown at it. 

      What is resilience? 

      Resilience is the art of making sure your services are available to your customers whenever they can use them. Note I did not say 24/7/365. Your business may require that, but perhaps your systems need "only" to be available during "normal" business hours.

      Resilient systems can withstand adverse events that impair their ability to perform normal functions, and, like in the case the Happy Meals, increased peak demands. Events can include simple breakdowns (like a storage device, an internet connection that fails, or a file that fails to load) or something worse, like a cyber attack or a larger failure in your data center.

      Your client does not care what the cause is; what counts for the client is, "Can I access your service? (or buy that meal for my kid.)"

      Resilience entails several aspects:

      • availability
      • performance
      • right-sizing
      • hardening
      • restore-ability
      • testing
      • monitoring
      • management and governance

      It is now tempting to apply these aspects only to your organization's IT or technical parts. That is insufficient. Your operations, management, and even e.g. sales must ensure that services rendered result in happy clients and happy shareholders/owners. The reason is that resilient operations are a symphony. Not one single department or set of actions will achieve this. When you have product development working with the technical teams to develop a resilient flow at the right level for its earning potential, then you maximize profits.

      This synergy ensures that you invest exactly the right level of resources. There are no exaggerated technical or operational elements for ancillary services. That frees resources to ensure your main services receive the full attention they deserve.

      Resilience, in other words, is the result of a mindset and a way of operating that helps your business remain at the top of its game and provides a top service to clients while keeping the bottom line in the black. 

      Why do we need to spend on this?

      I mean, if it ain't broke, don't fix it. That old adage is true, and yet not. Services can remain up and running for a long time with single points of failure. But can you afford to have them break at any time? If yes, and your customers don't mind waiting for you to patch things up, then you can "risk-accept" that situation. But how realistic is that these days? If I cannot buy it at your shop today, I'll more than likely get it from another. If I'm in a contract with you, yet you cannot deliver, we will have a conversation, or at the very least, a moment of disappointment. If you have enough "disappointments," you will lose the customer. Lose enough customers, and you will have a reputational problem or worse.

      We don't like to spend resources on something that "may"go wrong. We do risk assessments to determine the true cost of non-delivery and the likelihood of that happening. And there are different ways to deal with that assessment's outcome. Not everything needs to have double the number of people working on it, just in case one resignes. Not every system needs an availability of 99,999%.

      But sometimes, we do not have a choice. When lives are at stake, like in medical or aviation services, being sorry is not a good starting point. The same goes for financial services. the DORA and NIS2 legislation in the EU, the CEA, FISMA, and GLBA in the US, and ESPA in Japan, to name a few, are legislations that require your company, if active in the relevant regulated sectors, to comply and ensure that your services continue to perform.

      Most of these elements have one thing in common: we need to know what is important for our service delivery and what is not.

      Business service

      That brings us to the core subject of what needs to be resilient. The answer is very short and very complex at the same time. It is the service that you offer to your customers which must meet reliance levels.

      Take the example of a hospital. When there is a power outage, the most critical systems must continue operating for a given period. That also means that sufficient capable staff must be present to operate said equipment; it even means that the paths leading to said hospital should remain available; if not by road, then, e.g., by helicopter. If these inroads are unavailable, an alternate hospital should be able to take on the workload. 

      Not everything here in this example is the responsibility of the hospital administrators! This is why the management and governance parts of the resilience ecosystem are so important in the bigger picture. 

      If we look at the financial sector, the EU DORA (Digital Operational Resilience Act) specifically states that you must start with your business services. Like many others, the financial sector can no longer function without its digital landscape. If a bank is unexpectedly disconnected from its payment network, especially SWIFT, it will not be long before there are existential issues. A trading department stands to lose millions if the trading system fails. 

      Look in your own environment; you will see many such points. What if your internet connection goes down, and you rely on it for most of your business? How long can you afford to be out? How long before your clients notice and take action? Do you supply a small but critical service to an institution? Then, you may fall under the aforementioned laws (it's called third-party requirements, and your client may be liable to follow them.)

      But also, outside of the technology, we see points in the supply chain that require resilience. Do you still rely on a single person or provider for a critical function? Do you have backup procedures if the tech stops working, yet your clients require you to continue to service them? 

      In all these and other cases, you must know what your critical services are so that you can analyze the requirements and put the right measures in place.

      Once you have defined your critical business services and have analyzed their operational requirements, you can start to look at what you need to implement the aforementioned areas of availability, monitoring, hardening, and others. Remember we're still at the level of business service. The tech comes later and will require a deeper analysis. 

      In conclusion.

      Resilient operations ensure that you continue to function, at the right price, in the face of adverse events. If you can, resilience starts at the business level from the moment of product conception. If the products have long been developed, look at how they are delivered to the client and upgrade operations, resources, and tech where needed.

      In some cases, you are legally required to undertake this exercise. But in all cases, it is important that you understand your business services and the needs of your clients and put sufficient resources in the right places of your delivery chain. 

      If you want to discuss this further, please contact me for a free talk.

       

      IT Operations

      Make Prudent Decisions When Increasing Your Salesforce Footprint

      • Buy Link or Shortcode: {j2store}134|cart{/j2store}
      • member rating overall impact: 8.9/10 Overall Impact
      • member rating average dollars saved: $55,224 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • Too often, organizations fail to achieve economy of scale. They neglect to negotiate price holds, do not negotiate deeper discounts as volume increases, or do not realize there are already existing contracts within the organization.
      • Understand what to negotiate. Organizations do not know what can and cannot be negotiated, which means value gets left on the table.
      • Integrations with other applications must be addressed from the outset. Many users buy the platform only to realize later on that the functionality they wanted does not exist and may be an extra expense with customization.

      Our Advice

      Critical Insight

      • Buying power dissipates when you sign the contract. Get the right product for the right number of users for the right term and get it right the first time.
      • Getting the best price does not assure a great total cost of ownership or ROI. There are many components as part of the purchasing process that if unaccounted for can lead to dramatic and unbudgeted spend.
      • Avoid buyer’s remorse through due diligence before signing the deal. If you need to customize the software or extend it with a third-party add-in, identify your costs and timelines upfront. Plan for successful adoption.

      Impact and Result

      • Centralize purchasing instead of enabling small deals to maximize discount levels by creating a process to derive a cost-effective methodology when subscribing to Sales Cloud, Service Cloud, and Force.com.
      • Educate your organization on Salesforce’s licensing methods and contract types, enabling informed purchasing decisions. Critical components of every agreement that need to be negotiated are a renewal escalation cap, term protection, and license metrics to document what comes with each. Re-bundling protection is also critical in case a product is no longer desired.
      • Proactively addressing integrations and business requirements will enable project success and enable the regular upgrades the come with a multi-tenant cloud services SaaS solution.

      Make Prudent Decisions When Increasing Your Salesforce Footprint Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you need to understand and document your Salesforce licensing strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish software requirements

      Begin your journey by understanding whether Salesforce is the right CRM. Also proactively approach Salesforce licensing by understanding which information to gather and assessing the current state and gaps.

      • Make Prudent Decisions When Increasing Your Salesforce Footprint – Phase 1: Establish Software Requirements
      • Salesforce Licensing Purchase Reference Guide
      • RASCI Chart

      2. Evaluate licensing options

      Review current products and licensing models to determine which licensing models will most appropriately fit the organization's environment.

      • Make Prudent Decisions When Increasing Your Salesforce Footprint – Phase 2: Evaluate Licensing Options
      • Salesforce TCO Calculator
      • Salesforce Discount Calculator

      3. Evaluate agreement options

      Review Salesforce’s contract types and assess which best fits the organization’s licensing needs.

      • Make Prudent Decisions When Increasing Your Salesforce Footprint – Phase 3: Evaluate Agreement Options
      • Salesforce Terms and Conditions Evaluation Tool

      4. Purchase and manage licenses

      Conduct negotiations, purchase licensing, finalize a licensing management strategy, and enhance your CRM with a Salesforce partner.

      • Make Prudent Decisions When Increasing Your Salesforce Footprint – Phase 4: Purchase and Manage Licenses
      • Controlled Vendor Communications Letter
      • Vendor Communication Management Plan
      [infographic]

      Workshop: Make Prudent Decisions When Increasing Your Salesforce Footprint

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish Software Requirements

      The Purpose

      Assess current state and align goals; review business feedback.

      Interview key stakeholders to define business objectives and drivers.

      Key Benefits Achieved

      Have a baseline for whether Salesforce is the right solution.

      Understand Salesforce as a solution.

      Examine all CRM options.

      Activities

      1.1 Perform requirements gathering to review Salesforce as a potential solution.

      1.2 Gather your documentation before buying or renewing.

      1.3 Confirm or create your Salesforce licensing team.

      1.4 Meet with stakeholders to discuss the licensing options and budget allocation.

      Outputs

      Copy of your Salesforce Master Subscription Agreement

      RASCI Chart

      Salesforce Licensing Purchase Reference Guide

      2 Evaluate Licensing Options

      The Purpose

      Review product editions and licensing options.

      Review add-ons and licensing rules.

      Key Benefits Achieved

      Understand how licensing works.

      Discuss licensing rules and their application to your current environment.

      Determine the product and license mix that is best for your requirements.

      Activities

      2.1 Determine the editions, licenses, and add-ons for your Salesforce CRM solution.

      2.2 Calculate total cost of ownership.

      2.3 Use the Salesforce Discount Calculator to ensure you are getting the discount you deserve.

      2.4 Meet with stakeholders to discuss the licensing options and budget allocation.

      Outputs

      Salesforce CRM Solution

      Salesforce TCO Calculator

      Salesforce Discount Calculator

      Salesforce Licensing Purchase Reference Guide

      3 Evaluate Agreement Options

      The Purpose

      Review terms and conditions of Salesforce contracts.

      Review vendors.

      Key Benefits Achieved

      Determine if MSA or term agreement is best.

      Learn what specific terms to negotiate.

      Activities

      3.1 Perform a T&Cs review and identify key “deal breakers.”

      3.2 Decide on an agreement that nets the maximum benefit.

      Outputs

      Salesforce T&Cs Evaluation Tool

      Salesforce Licensing Purchase Reference Guide

      4 Purchase and Manage Licenses

      The Purpose

      Finalize the contract.

      Discuss negotiation points.

      Discuss license management and future roadmap.

      Discuss Salesforce partner and implementation strategy.

      Key Benefits Achieved

      Discuss negotiation strategies.

      Learn about licensing management best practices.

      Review Salesforce partner options.

      Create an implementation plan.

      Activities

      4.1 Know the what, when, and who to negotiate.

      4.2 Control the flow of communication.

      4.3 Assign the right people to manage the environment.

      4.4 Discuss Salesforce partner options.

      4.5 Discuss implementation strategy.

      4.6 Meet with stakeholders to discuss licensing options and budget allocation.

      Outputs

      Salesforce Negotiation Strategy

      Vendor Communication Management Plan

      RASCI Chart

      Info-Tech’s Core CRM Project Plan

      Salesforce Licensing Purchase Reference Guide

      Incident Management for Small Enterprise

      • Buy Link or Shortcode: {j2store}482|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $6,531 Average $ Saved
      • member rating average days saved: 3 Average Days Saved
      • Parent Category Name: Incident & Problem Management
      • Parent Category Link: /incident-and-problem-management
      • Technical debt and disparate systems are big constraints for most small enterprise (SE) organizations. What may have worked years ago is no longer fit for purpose or the business is growing faster than the current tools in place can handle.
      • Super specialization of knowledge is also a common factor in smaller teams caused by complex architectures. While helpful, if that knowledge isn’t documented it can walk out the door with the resource and the rest of the team is left scrambling.
      • Lessons learned may be gathered for critical incidents but often are not propagated, which impacts the ability to solve recurring incidents.
      • Over time, repeated incidents can have a negative impact on the customer’s perception that the service desk is a credible and essential service to the business.

      Our Advice

      Critical Insight

      • Go beyond the blind adoption of best-practice frameworks. No simple formula exists for improving incident management maturity. Identify the challenges in your incident lifecycle and draw on best-practice frameworks pragmatically to build a structured response to those challenges.
      • Track, analyze, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns you can be susceptible to recurring incidents that increase in damage over time. Make the case for problem management, and successfully reduce the volume of unplanned work by scheduling it into regular IT activity.
      • Recurring incidents will happen; use runbooks for a consistent response each time. Save your organization response time and confusion by developing your own specific incident use cases. Incident response should follow a standard process, but each incident will have its own escalation process or call tree that identifies key participants.

      Impact and Result

      • Effective and efficient management of incidents involves a formal process of identifying, classifying, categorizing, responding, resolving, and closing of each incident. The key for smaller organizations, where technology or resources is a constraint, is to make the best practices usable for your unique environment.
      • Develop a plan that aligns with your organizational needs, and adapt best practices into light, sustainable processes, with the goal to improve time to resolve, cost to serve, and ultimately, end-user satisfaction.
      • Successful implementation of incident management will elevate the maturity of the service desk to a controlled state, preparing you for becoming proactive with problem management.

      Incident Management for Small Enterprise Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement incident management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and log incidents

      This phase will provide an overview of the incident lifecycle and an activity on how to classify the various types of incidents in your environment.

      • Service Desk Standard Operating Procedure
      • Incident Management Workflow Library (Visio)
      • Incident Management Workflow Library (PDF)

      2. Prioritize and define SLAs

      This phase will help you develop a categorization scheme for incident handling that ensures success and keeps it simple. It will also help you identify the most important runbooks necessary to create first.

      • Service Desk Ticket Categorization Schemes
      • IT Incident Runbook Prioritization Tool
      • IT Incident Management Runbook Blank Template

      3. Respond, recover, and close incidents

      This phase will help you identify how to use a knowledgebase to resolve incidents quicker. Identify what needs to be answered during a post-incident review and identify the criteria needed to invoke problem management.

      • Knowledgebase Article Template
      • Root-Cause Analysis Template
      • Post-Incident Review Questions Tracking Tool
      [infographic]

      Workshop: Incident Management for Small Enterprise

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess the Current State

      The Purpose

      Assess the current state of the incident management lifecycle within the organization.

      Key Benefits Achieved

      Understand the incident lifecycle and how to classify them in your environment.

      Identify the roles and responsibilities of the incident response team.

      Document the incident workflows to identify areas of opportunities.

      Activities

      1.1 Outline your incident lifecycle challenges.

      1.2 Identify and classify incidents.

      1.3 Identify roles and responsibilities for incident handling.

      1.4 Design normal and critical incident workflows for target state.

      Outputs

      List of incident challenges for each phase of the incident lifecycle

      Incident classification scheme mapped to resolution team

      RACI chart

      Incident Workflow Library

      2 Define the Target State

      The Purpose

      Design or improve upon current incident and ticket categorization schemes, priority, and impact.

      Key Benefits Achieved

      List of the most important runbooks necessary to create first and a usable template to go forward with

      Activities

      2.1 Improve incident categorization scheme.

      2.2 Prioritize and define SLAs.

      2.3 Understand the purpose of runbooks and prioritize development.

      2.4 Develop a runbook template.

      Outputs

      Revised ticket categorization scheme

      Prioritization matrix based on impact and urgency

      IT Incident Runbook Prioritization Tool

      Top priority incident runbook

      3 Bridge the Gap

      The Purpose

      Respond, recover, and close incidents with root-cause analysis, knowledgebase, and incident runbooks.

      Key Benefits Achieved

      This module will help you to identify how to use a knowledgebase to resolve quicker.

      Identify what needs to be answered during a post-incident review.

      Identify criteria to invoke problem management.

      Activities

      3.1 Build a targeted knowledgebase.

      3.2 Build a post-incident review process.

      3.3 Identify metrics to track success.

      3.4 Build an incident matching process.

      Outputs

      Working knowledgebase template

      Root-cause analysis template and post-incident review checklist

      List of metrics

      Develop criteria for problem management

      Considerations to Optimize Container Management

      • Buy Link or Shortcode: {j2store}499|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Center & Facilities Strategy
      • Parent Category Link: /data-center-and-facilities-strategy

      Do you experience challenges with the following:

      • Equipping IT operations processes to manage containers.
      • Choosing the right container technology.
      • Optimizing your infrastructure strategy for containers.

      Our Advice

      Critical Insight

      • Plan ahead to ensure your container strategy aligns with your infrastructure roadmap. Before deciding between bare metal and cloud, understand the different components of a container management solution and plan for current and future infrastructure services.
      • When selecting tools from multiple sources, it is important to understand what each tool should and should not meet. This holistic approach is necessary to avoid gaps and duplication of effort.

      Impact and Result

      Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain, uses your current infrastructure, and reduces costs for compute and image scan time.

      Considerations to Optimize Container Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations to Optimize Container Management Deck – A document to guide you design your container strategy.

      A document that walks you through the components of a container management solution and helps align your business objectives with your current infrastructure services and plan for your future assets.

      • Considerations to Optimize Container Management Storyboard

      2. Container Reference Architecture – A best-of-breed template to help you build a clear, concise, and compelling strategy document for container management.

      Complete the reference architecture tool to strategize your container management.

      • Container Reference Architecture
      [infographic]

      Further reading

      Considerations to Optimize Container Management

      Design a custom reference architecture that meets your requirements.

      Analyst Perspective

      Containers have become popular as enterprises use DevOps to develop and deploy applications faster. Containers require managed services because the sheer number of containers can become too complex for IT teams to handle. Orchestration platforms like Kubernetes can be complex, requiring management to automatically deploy container-based applications to operating systems and public clouds. IT operations staff need container management skills and training.

      Installing and setting up container orchestration tools can be laborious and error-prone. IT organizations must first implement the right infrastructure setup for containers by having a solid understanding of the scope and scale of containerization projects and developer requirements. IT administrators also need to know how parts of the existing infrastructure connect and communicate to maintain these relationships in a containerized environment. Containers can run on bare metal servers, virtual machines in the cloud, or hybrid configurations, depending on your IT needs

      Nitin Mukesh, Senior Research Analyst, Infrastructure and Operations

      Nitin Mukesh
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech’s Approach

      The container software market is constantly evolving. Organizations must consider many factors to choose the right container management software for their specific needs and fit their future plans.

      It's important to consider your organization's current and future infrastructure strategy and how it fits with your container management strategy. The container management platform you choose should be compatible with the existing network infrastructure and storage capabilities available to your organization.

      IT operations staff have not been thinking the same way as developers who have now been using an agile approach for some time. Container image builds are highly automated and have several dependencies including scheduling, testing, and deployment that the IT staff is not trained for or lack the ability to create anything more than a simple image.

      Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain and reduces costs for compute and image scan time.

      Plan ahead to ensure your container strategy aligns with your infrastructure roadmap. Before deciding between bare metal and cloud, understand the different components of a container management solution and plan for current and future infrastructure services.

      Your challenge

      Choosing the right container technology: IT is a rapidly changing and evolving market, with startups and seasoned technology vendors maintaining momentum in everything from container platforms to repositories to orchestration tools. The rapid evolution of container platform components such as orchestration, storage, networking, and system services such as load balancing has made the entire stack a moving target.

      However, waiting for the industry to be standardized can be a recipe for paralysis, and waiting too long to decide on solutions and approaches can put a company's IT operations in catch-up mode.

      Keeping containers secure: Security breaches in containers are almost identical to operating system level breaches in virtual machines in terms of potential application and system vulnerabilities. It is important for any DevOps team working on container and orchestration architecture and management to fully understand the potential vulnerabilities of the platforms they are using.

      Optimize your infrastructure strategy for containers: One of the challenges enterprise IT operations management teams face when it comes to containers is the need to rethink the underlying infrastructure to accommodate the technology. While you may not want to embrace the public cloud for your critical applications just yet, IT operations managers will need an on-premises infrastructure so that applications can scale up and down the same way as they are containerized.

      Common ways organizations use containers

      A Separation of responsibilities
      Containerization provides a clear separation of responsibilities as developers can focus on application logic and dependencies, while IT operations teams can focus on deployment and management instead of application details such as specific software versions and configurations.

      B Workload portability
      Containers can run almost anywhere: physical servers or on-premise data centers on virtual machines or developer machines, as well as public clouds on Linux, Windows, or Mac operating systems, greatly easing development and deployment.

      “Lift and shift” existing applications into a modern cloud architecture. Some organizations even use containers to migrate existing applications to more modern environments. While this approach provides some of the basic benefits of operating system virtualization, it does not provide all the benefits of a modular, container-based application architecture.

      C Application isolation
      Containers virtualize CPU, memory, storage, and network resources at the operating system level, providing developers with a logically isolated view of the operating system from other applications.

      Source: TechTarget, 2021

      What are containers and why should I containerize?

      A container is a partially isolated environment in which an application or parts of an application can run. You can use a single container to run anything from small microservices or software processes to larger applications. Inside the container are all the necessary executable, library, and configuration files. Containers do not contain operating system images. This makes them lighter and more portable with much less overhead. Large application deployments can deploy multiple containers into one or more container clusters (CapitalOne, 2020).

      Containers have the following advantages:

      • Reduce overhead costs: Because containers do not contain operating system images, they require fewer system resources than traditional or hardware virtual machine environments.
      • Enhanced portability: Applications running in containers can be easily deployed on a variety of operating systems and hardware platforms.
      • More consistent operations: DevOps teams know that applications in containers run the same no matter where they are deployed.
      • Efficiency improvement: Containers allow you to deploy, patch, or scale applications faster.
      • Develop better applications: Containers support Agile and DevOps efforts to accelerate development and production cycles.

      Source: CapitalOne, 2020

      Container on the cloud or on-premise?

      On-premises containers Public cloud-based containers

      Advantages:

      • Full control over your container environment.
      • Increased flexibility in networking and storage configurations.
      • Use any version of your chosen tool or container platform.
      • No need to worry about potential compliance issues with data stored in containers.
      • Full control over the host operating system and environment.

      Disadvantages:

      • Lack of easy scalability. This can be especially problematic if you're using containers because you want to be more agile from a DevOps perspective.
      • No turnkey container deployment solution. You must set up and maintain every component of the container stack yourself.

      Advantages:

      • Easy setup and management through platforms such as Amazon Elastic Container Service or Azure Container Service. These products require significant Docker expertise to use but require less installation and configuration than on-premise installations.
      • Integrates with other cloud-based tools for tasks such as monitoring.
      • Running containers in the cloud improves scalability by allowing you to add compute and storage resources as needed.

      Disadvantages:

      • You should almost certainly run containers on virtual machines. That can be a good thing for many people; however, you miss out on some of the potential benefits of running containers on bare metal servers, which can be easily done.
      • You lose control. To build a container stack, you must use the orchestrator provided by your cloud host or underlying operating system.

      Info-Tech Insight
      Start-ups and small businesses that don't typically need to be closely connected to hardware can easily move (or start) to the cloud. Large (e.g. enterprise-class) companies and companies that need to manage and control local hardware resources are more likely to prefer an on-premises infrastructure. For enterprises, on-premises container deployments can serve as a bridge to full public cloud deployments or hybrid private/public deployments. The answer to the question of public cloud versus on premises depends on the specific needs of your business.

      Container management

      From container labeling that identifies workloads and ownership to effective reporting that meets the needs of different stakeholders across the organization, it is important that organizations establish an effective framework for container management.

      Four key considerations for your container management strategy:

      01 Container Image Supply Chain
      How containers are built

      02 Container Infrastructure and Orchestration
      Where and how containers run together

      03 Container Runtime Security and Policy Enforcement
      How to make sure your containers only do what you want them to do

      04 Container Observability
      Runtime metrics and debugging

      To effectively understand container management solutions, it is useful to define the various components that make up a container management strategy.

      1: Container image supply chain

      To run a workload as a container, it must first be packaged into a container image. The image supply chain includes all libraries or components that make up a containerized application. This includes CI/CD tools to test and package code into container images, application security testing tools to check for vulnerabilities and logic errors, registries and mirroring tools for hosting container images, and attribution mechanisms such as image signatures for validating images in registries.

      Important functions of the supply chain include the ability to:

      • Scan container images in registries for security issues and policy compliance.
      • Verify in-use image hashes have been scanned and authorized.
      • Mirror images from public registries to isolate yourself from outages in these services.
      • Attributing images to the team that created them.

      Source: Rancher, 2022

      Info-Tech Insight
      It is important to consider disaster recovery for your image registry. As mentioned above, it is wise to isolate yourself from registry disruptions. However, external registry mirroring is only one part of the equation. You also want to make sure you have a high availability plan for your internal registry as well as proper backup and recovery processes. A highly available, fault-tolerant container management platform is not just a runtime environment.

      2: Container infrastructure and orchestration

      Orchestration tools

      Once you have a container image to run, you need a location to run it. That means both the computer the container runs on and the software that schedules it to run. If you're working with a few containers, you can make manual decisions about where to run container images, what to run with container images, and how best to manage storage and network connectivity. However, at scale, these kinds of decisions should be left to orchestration tools like Kubernetes, Swarm, or Mesos. These platforms can receive workload execution requests, determine where to run based on resource requirements and constraints, and then actually launch that workload on its target. And if a workload fails or resources are low, it can be restarted or moved as needed.

      Source: DevOpsCube, 2022

      Storage

      Storage is another important consideration. This includes both the storage used by the operating system and the storage used by the container itself. First, you need to consider the type of storage you actually need. Can I outsource my storage concerns to a cloud provider using something like Amazon Relational Database Service instead? If not, do you really need block storage (e.g. disk) or can an external object store like AWS S3 meet your needs? If your external object storage service can meet your performance and durability requirements as well as your governance and compliance needs, you're in luck. You may not have to worry about managing the container's persistent storage. Many external storage services can be provisioned on demand, support discrete snapshots, and some even allow dynamic scaling on demand.

      Networking

      Network connectivity inside and outside the containerized environment is also very important. For example, Kubernetes supports a variety of container networking interfaces (CNIs), each providing different functionality. Questions to consider here are whether you can set traffic control policies (and the OSI layer), how to handle encryption between workloads and between workloads and external entities, and how to manage traffic import for containerized workloads. The impact of these decisions also plays a role on performance.

      Backups

      Backups are still an important task in containerized environments, but the backup target is changing slightly. An immutable, read-only container file system can be recreated very easily from the original container image and does not need to be backed up. Backups or snapshots on permanent storage should still be considered. If you are using a cloud provider, you should also consider fault domain and geo-recovery scenarios depending on the provider's capabilities. For example, if you're using AWS, you can use S3 replication to ensure that EBS snapshots can be restored in another region in case of a full region outage.

      3: Container runtime security and policy enforcement

      Ensuring that containers run in a place that meets the resource requirements and constraints set for them is necessary, but not sufficient. It is equally important that your container management solution performs continuous validation and ensures that your workloads comply with all security and other policy requirements of your organization. Runtime security and policy enforcement tools include a function for detecting vulnerabilities in running containers, handling detected vulnerabilities, ensuring that workloads are not running with unnecessary or unintended privileges, and ensuring that only other workloads that need to be allowed can connect.

      One of the great benefits of (well implemented) containerized software is reducing the attackable surface of the application. But it doesn't completely remove it. This means you need to think about how to observe running applications to minimize security risks. Scanning as part of the build pipeline is not enough. This is because an image without vulnerabilities at build time can become a vulnerable container because new flaws are discovered in its code or support libraries. Instead, some modern tools focus on detecting unusual behavior at the system call level. As these types of tools mature, they can make a real difference to your workload’s security because they rely on actual observed behavior rather than up-to-date signature files.

      4: Container observability

      What’s going on in there?

      Finally, if your container images are being run somewhere by orchestration tools and well managed by security and policy enforcement tools, you need to know what your containers are doing and how well they are doing it. Orchestration tools will likely have their own logs and metrics, as will networking layers, and security and compliance checking tools; there is a lot to understand in a containerized environment. Container observability covers logging and metrics collection for both your workloads and the tools that run them.

      One very important element of observability is the importance of externalizing logs and metrics in a containerized environment. Containers come and go, and in many cases the nodes running on them also come and go, so relying on local storage is not recommended.

      The importance of a container management strategy

      A container management platform typically consists of a variety of tools from multiple sources. Some container management software vendors or container management services attempt to address all four key components of effective container management. However, many organizations already have tools that provide at least some of the features they need and don't want to waste existing licenses or make significant changes to their entire infrastructure just to run containers.

      When choosing tools from multiple sources, it's important to understand what needs each tool meets and what it doesn't. This holistic approach is necessary to avoid gaps and duplication of effort.

      For example, scanning an image as part of the build pipeline and then rescanning the image while the container is running is a waste of CPU cycles in the runtime environment. Similarly, using orchestration tools and separate host-based agents to aggregate logs or metrics can waste CPU cycles as well as storage and network resources.

      Planning a container management strategy

      1 DIY, Managed Services, or Packaged Products
      Developer satisfaction is important, but it's also wise to consider the team running the container management software. Migrating from bare metal or virtual machine-based deployment methodologies to containers can involve a significant learning curve, so it's a good idea to choose a tool that will help smooth this curve.
      2 Kubernetes
      In the world of container management, Kubernetes is fast becoming the de facto standard for container orchestration and scheduling. Most of the products that address the other aspects of container management discussed in this post (image supply chain, runtime security and policy enforcement, observability) integrate easily with Kubernetes. Kubernetes is open-source software and using it is possible if your team has the technical skills and the desire to implement it themselves. However, that doesn't mean you should automatically opt to build yourself.
      3 Managed Kubernetes
      Kubernetes is difficult to implement well. As a result, many solution providers offer packaged products or managed services to facilitate Kubernetes adoption. All major cloud providers now offer Kubernetes services that reduce the operational burden on your teams. Organizations that have invested heavily in the ecosystem of a particular cloud provider may find this route suitable. Other organizations may be able to find a fully managed service that provides container images and lets the service provider worry about running the images which, depending on the cost and capacity of the organization, may be the best option.
      4 Third-Party Orchestration Products
      A third approach is packaged products from providers that can be installed on the infrastructure (cloud or otherwise). These products can offer several potential advantages over DIY or cloud provider offerings, such as access to additional configuration options or cluster components, enhanced functionality, implementation assistance and training, post-installation product support, and reduced risk of cloud provider lock-in.

      Source: Kubernetes, 2022; Rancher, 2022

      Infrastructure considerations

      It's important to describe your organization’s current and future infrastructure strategy and how it fits into your container management strategy. It’s all basic for now, but if you plan to move to a virtual machine or cloud provider next year, your container management solution should be able to adapt to your environment now and in the future. Similarly, if you’ve already chosen a public cloud, you may want to make sure that the tool you choose supports some of the cloud options, but full compatibility may not be an important feature.

      Infrastructure considerations extend beyond computing. Choosing a container management platform should be compatible with the existing network infrastructure and storage capacity available to your organization. If you have existing policy enforcement, monitoring, and alerting tools, the ideal solution should be able to take advantage of them. Moving to containers can be a game changer for developers and operations teams, so continuing to use existing tools to reduce complexity where possible can save time and money.

      Leverage the reference architecture to guide your container management strategy

      Questions for support transition

      Using the examples as a guide, complete the tool to strategize your container management

      Download the Reference Architecture

      Bibliography

      Mell, Emily. “What is container management and why is it important?” TechTarget, April 2021.
      https://www.techtarget.com/searchitoperations/definition/container-management-software#:~:text=A%20container%20management%20ecosystem%20automates,operator%20to%20keep%20up%20with

      Conrad, John. “What is Container Orchestration?” CapitalOne, 24 August 2020.
      https://www.capitalone.com/tech/cloud/what-is-container-orchestration/?v=1673357442624

      Kubernetes. “Cluster Networking.” Kubernetes, 2022.
      https://kubernetes.io/docs/concepts/cluster-administration/networking/

      Rancher. “Comparing Kubernetes CNI Providers: Flannel, Calico, Canal, and Weave.” Rancher, 2022.
      https://www.suse.com/c/rancher_blog/comparing-kubernetes-cni-providers-flannel-calico-canal-and-weave/

      Wilson, Bob. “16 Best Container Orchestration Tools and Services.” DevopsCube, 5 January 2022.
      https://devopscube.com/docker-container-clustering-tools/

      Mergers & Acquisitions: The Sell Blueprint

      • Buy Link or Shortcode: {j2store}324|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy

      There are four key scenarios or entry points for IT as the selling/divesting organization in M&As:

      • IT can suggest a divestiture to meet the business objectives of the organization.
      • IT is brought in to strategy plan the sale/divestiture from both the business’ and IT’s perspectives.
      • IT participates in due diligence activities and complies with the purchasing organization’s asks.
      • IT needs to reactively prepare its environment to enable the separation.

      Consider the ideal scenario for your IT organization.

      Our Advice

      Critical Insight

      Divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

      • The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
      • A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
      • Transactions that are driven by digital motivations, requiring IT’s expertise.
      • There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.

      Impact and Result

      Prepare for a sale/divestiture transaction by:

      • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
      • Creating a standard strategy that will enable strong program management.
      • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

      Mergers & Acquisitions: The Sell Blueprint Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how your organization can excel its reduction strategy by engaging in M&A transactions. Review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Proactive Phase

      Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

      • One-Pager: M&A Proactive
      • Case Study: M&A Proactive
      • Information Asset Audit Tool
      • Data Valuation Tool
      • Enterprise Integration Process Mapping Tool
      • Risk Register Tool
      • Security M&A Due Diligence Tool
      • Service Catalog Internal Service Level Agreement Template

      2. Discovery & Strategy

      Create a standardized approach for how your IT organization should address divestitures or sales.

      • One-Pager: M&A Discovery & Strategy – Sell
      • Case Study: M&A Discovery & Strategy – Sell

      3. Due Diligence & Preparation

      Comply with due diligence, prepare the IT environment for carve-out possibilities, and establish the separation project plan.

      • One-Pager: M&A Due Diligence & Preparation – Sell
      • Case Study: M&A Due Diligence & Preparation – Sell
      • IT Due Diligence Charter
      • IT Culture Diagnostic
      • M&A Separation Project Management Tool (SharePoint)
      • SharePoint Template: Step-by-Step Deployment Guide
      • M&A Separation Project Management Tool (Excel)

      4. Execution & Value Realization

      Deliver on the separation project plan successfully and communicate IT’s transaction value to the business.

      • One-Pager: M&A Execution & Value Realization – Sell
      • Case Study: M&A Execution & Value Realization – Sell

      Infographic

      Workshop: Mergers & Acquisitions: The Sell Blueprint

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Pre-Transaction Discovery & Strategy

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for divesting or selling.

      Formalize the program plan.

      Create the valuation framework.

      Strategize the transaction and finalize the M&A strategy and approach.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Set up crucial elements to facilitate the success of the transaction.

      Have a repeatable transaction strategy that can be reused for multiple organizations.

      Activities

      1.1 Conduct the CIO Business Vision and CEO-CIO Alignment diagnostics.

      1.2 Identify key stakeholders and outline their relationship to the M&A process.

      1.3 Understand the rationale for the company's decision to pursue a divestiture or sale.

      1.4 Assess the IT/digital strategy.

      1.5 Identify pain points and opportunities tied to the divestiture/sale.

      1.6 Create the IT vision statement and mission statement and identify IT guiding principles and the transition team.

      1.7 Document the M&A governance.

      1.8 Establish program metrics.

      1.9 Create the valuation framework.

      1.10 Establish the separation strategy.

      1.11 Conduct a RACI.

      1.12 Create the communication plan.

      1.13 Prepare to assess target organizations.

      Outputs

      Business perspectives of IT

      Stakeholder network map for M&A transactions

      Business context implications for IT

      IT’s divestiture/sale strategic direction

      Governance structure

      M&A program metrics

      IT valuation framework

      Separation strategy

      RACI

      Communication plan

      Prepared to assess target organization(s)

      2 Mid-Transaction Due Diligence & Preparation

      The Purpose

      Establish the foundation.

      Discover the motivation for separation.

      Identify expectations and create the carve-out roadmap.

      Prepare and manage employees.

      Plan the separation roadmap.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Methodology identified to enable compliance during due diligence.

      Employees are set up for a smooth and successful transition.

      Separation activities are planned and assigned.

      Activities

      2.1 Gather and evaluate the stakeholders involved, M&A strategy, future-state operating model, and governance.

      2.2 Review the business rationale for the divestiture/sale.

      2.3 Establish the separation strategy.

      2.4 Create the due diligence charter.

      2.5 Create a list of IT artifacts to be reviewed in the data room.

      2.6 Create a carve-out roadmap.

      2.7 Create a service/technical transaction agreement.

      2.8 Measure staff engagement.

      2.9 Assess the current culture and identify the goal culture.

      2.10 Create employee transition and functional workplans.

      2.11 Establish the separation roadmap.

      2.12 Establish and align project metrics with identified tasks.

      2.13 Estimate integration costs.

      Outputs

      Stakeholder map

      IT strategy assessed

      IT operating model and IT governance structure defined

      Business context implications for IT

      Separation strategy

      Due diligence charter

      Data room artifacts

      Carve-out roadmap

      Service/technical transaction agreement

      Engagement assessment

      Culture assessment

      Employee transition and functional workplans

      Integration roadmap and associated resourcing

      3 Post-Transaction Execution & Value Realization

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for separation.

      Plan the separation roadmap.

      Prepare employees for the transition.

      Engage in separation.

      Assess the transaction outcomes.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Separation activities are planned and assigned.

      Employees are set up for a smooth and successful transition.

      Separation strategy and roadmap are executed to benefit the organization.

      Review what went well and identify improvements to be made in future transactions.

      Activities

      3.1 Identify key stakeholders and outline their relationship to the M&A process.

      3.2 Gather and evaluate the M&A strategy, future-state operating model, and governance.

      3.3 Review the business rationale for the divestiture/sale.

      3.4 Establish the separation strategy.

      3.5 Prioritize separation tasks.

      3.6 Establish the separation roadmap.

      3.7 Establish and align project metrics with identified tasks.

      3.8 Estimate separation costs.

      3.9 Measure staff engagement.

      3.10 Assess the current culture and identify the goal culture.

      3.11 Create employee transition and functional workplans.

      3.12 Complete the separation by regularly updating the project plan.

      3.13 Assess the service/technical transaction agreement.

      3.14 Confirm separation costs.

      3.15 Review IT’s transaction value.

      3.16 Conduct a transaction and separation SWOT.

      3.17 Review the playbook and prepare for future transactions.

      Outputs

      M&A transaction team

      Stakeholder map

      IT strategy assessed

      IT operating model and IT governance structure defined

      Business context implications for IT

      Separation strategy

      Separation roadmap and associated resourcing

      Engagement assessment

      Culture assessment

      Employee transition and functional workplans

      Updated separation project plan

      Evaluated service/technical transaction agreement

      SWOT of transaction

      M&A Sell Playbook refined for future transactions

      Further reading

      Mergers & Acquisitions: The Sell Blueprint

      For IT leaders who want to have a role in the transaction process when their business is engaging in an M&A sale or divestiture.

      EXECUTIVE BRIEF

      Analyst Perspective

      Don’t wait to be invited to the M&A table, make it.

      Photo of Brittany Lutes, Research Analyst, CIO Practice, Info-Tech Research Group.
      Brittany Lutes
      Research Analyst,
      CIO Practice
      Info-Tech Research Group
      Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice, Info-Tech Research Group.
      Ibrahim Abdel-Kader
      Research Analyst,
      CIO Practice
      Info-Tech Research Group

      IT has always been an afterthought in the M&A process, often brought in last minute once the deal is nearly, if not completely, solidified. This is a mistake. When IT is brought into the process late, the business misses opportunities to generate value related to the transaction and has less awareness of critical risks or inaccuracies.

      To prevent this mistake, IT leadership needs to develop strong business relationships and gain respect for their innovative suggestions. In fact, when it comes to modern M&A activity, IT should be the ones suggesting potential transactions to meet business needs, specifically when it comes to modernizing the business or adopting digital capabilities.

      IT needs to stop waiting to be invited to the acquisition or divestiture table. IT needs to suggest that the table be constructed and actively work toward achieving the strategic objectives of the business.

      Executive Summary

      Your Challenge

      There are four key scenarios or entry points for IT as the selling/divesting organization in M&As:

      • IT can suggest a divestiture to meet the business objectives of the organization.
      • IT is brought in to strategy plan the sale/divestiture from both the business’ and IT’s perspectives.
      • IT participates in due diligence activities and complies with the purchasing organization’s asks.
      • IT needs to reactively prepare its environment to enable the separation.

      Consider the ideal scenario for your IT organization.

      Common Obstacles

      Some of the obstacles IT faces include:

      • IT is often told about the transaction once the deal has already been solidified and is now forced to meet unrealistic business demands.
      • The business does not trust IT and therefore does not approach IT to define value or reduce risks to the transaction process.
      • The people and culture element is forgotten or not given adequate priority.

      These obstacles often arise when IT waits to be invited into the transaction process and misses critical opportunities.

      Info-Tech's Approach

      Prepare for a sale/divestiture transaction by:

      • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
      • Creating a standard strategy that will enable strong program management.
      • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

      Info-Tech Insight

      As the number of merger, acquisition, and divestiture transactions continues to increase, so too does IT’s opportunity to leverage the growing digital nature of these transactions and get involved at the onset.

      The changing M&A landscape

      Businesses will embrace more digital M&A transactions in the post-pandemic world

      • When the pandemic occurred, businesses reacted by either pausing (61%) or completely cancelling (46%) deals that were in the mid-transaction state (Deloitte, 2020). The uncertainty made many organizations consider whether the risks would be worth the potential benefits.
      • However, many organizations quickly realized the pandemic is not a hindrance to M&A transactions but an opportunity. Over 16,000 American companies were involved in M&A transactions in the first six months of 2021 (The Economist). For reference, this had been averaging around 10,000 per six months from 2016 to 2020.
      • In addition to this transaction growth, organizations have increasingly been embracing digital. These trends increase the likelihood that, as an IT leader, you will engage in an M&A transaction. However, it is up to you when you get involved in the transactions.

      The total value of transactions in the year after the pandemic started was $1.3 billion – a 93% increase in value compared to before the pandemic. (Nasdaq)

      71% of technology companies anticipate that divestitures will take place as a result of the COVID-19 pandemic. (EY, 2020)

      Your challenge

      IT is often not involved in the M&A transaction process. When it is, it’s often too late.

      • The most important driver of an acquisition is the ability to access new technology (DLA Piper), and yet 50% of the time, IT isn’t involved in the M&A transaction at all (IMAA Institute, 2017).
      • Additionally, IT’s lack of involvement in the process negatively impacts the business:
        • Most organizations (60%) do not have a standardized approach to integration (Steeves and Associates), let alone separation.
        • Two-thirds of the time, the divesting organization and acquiring organization will either fail together or succeed together (McKinsey, 2015).
        • Less than half (47%) of organizations actually experience the positive results sought by the M&A transaction (Steeves and Associates).
      • Organizations pursuing M&A and not involving IT are setting themselves up for failure.

      Only half of M&A deals involve IT (Source: IMAA Institute, 2017)

      Common Obstacles

      These barriers make this challenge difficult to address for many organizations:

      • IT is rarely afforded the opportunity to participate in the transaction deal. When IT is invited, this often happens later in the process where separation will be critical to business continuity.
      • IT has not had the opportunity to demonstrate that it is a valuable business partner in other business initiatives.
      • One of the most critical elements that IT often doesn’t take the time or doesn’t have the time to focus on is the people and leadership component.
      • IT waits to be invited to the process rather then actively involving themselves and suggesting how value can be added to the process.

      In hindsight, it’s clear to see: Involving IT is just good business.

      47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion. (Source: IMAA Institute, 2017)

      “Solutions exist that can save well above 50 percent on divestiture costs, while ensuring on-time delivery.” (Source: SNP)

      Info-Tech's approach

      Acquisitions & Divestitures Framework

      Acquisitions and divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

      1. The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
      2. Transactions that are driven by digital motivations, requiring IT’s expertise.
      3. A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
      4. There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.
      A diagram highlighting the 'IT Executives' Role in Acquisitions and Divestitures' when they are integrated at different points in the 'Core Business Timeline'. There are four main entry points 'Proactive', 'Discovery and Strategy', 'Due Diligence and Preparation', and 'Execution and Value Realized'. It is highlighted that IT can and should start at 'Proactive', but most organizations start at 'Execution and Value Realized'. 'Proactive': suggest opportunities to evolve the organization; prove IT's value and engage in growth opportunities early. Innovators start here. Steps of the business timeline in 'Proactive' are 'Organization strategies are defined' and 'M and A is considered to enable strategy'. After a buy or sell transaction is initiated is 'Discovery and Strategy': pre-transaction state. If it is a Buy transaction, 'Establish IT's involvement and approach'. If it is a Sell transaction, 'Prepare to engage in negotiations'. Business Partners start here. Steps of the business timeline in 'Discovery and Strategy' are 'Searching criteria is set', 'Potential candidates are considered', and 'LOI is sent/received'. 'Due Diligence and Preparation': mid-transaction state. If it is a Buy transaction, 'Identify potential transaction benefits and risks'. If it is a Sell transaction, 'Comply, communicate, and collaborate in transaction'. Trusted Operators start here. Steps of the business timeline in 'Due Diligence and Preparation' are 'Due diligence engagement occurs', 'Final agreement is reached', and 'Preparation for transaction execution occurs'. 'Execution and Value Realization': post-transaction state. If it is a Buy transaction, 'Integrate the IT environments and achieve business value'. If it is a Sell transaction, 'Separate the IT environment and deliver on transaction terms'. Firefighters start here. Steps of the business timeline in 'Execution and Value Realization' are 'Staff and operations are addressed appropriately', 'Day 1 of implementation and integration activities occurs', '1st 100 days of new entity state occur' and 'Ongoing risk mitigating and value creating activities occur'.

      The business’ view of IT will impact how soon IT can get involved

      There are four key entry points for IT

      A colorful visualization of the four key entry points for IT and a fifth not-so-key entry point. Starting from the top: 'Innovator', Information and Technology as a Competitive Advantage, 90% Satisfaction; 'Business Partner', Effective Delivery of Strategic Business Projects, 80% Satisfaction; 'Trusted Operator', Enablement of Business Through Application and Work Orders, 70% Satisfaction; 'Firefighter', Reliable Infrastructure and IT Service Desk, 60% Satisfaction; and then 'Unstable', Inability to Consistently Deliver Basic Services, <60% Satisfaction.
      1. Innovator: IT suggests a sale or divestiture to meet the business objectives of the organization.
      2. Business Partner: IT is brought in to strategy plan the sale/divestiture from both the business’ and IT’s perspective.
      3. Trusted Operator: IT participates in due diligence activities and complies with the purchasing organization’s asks.
      4. Firefighter: IT needs to reactively prepare its environment in order to enable the separation.

      Merger, acquisition, and divestiture defined

      Merger

      A merger looks at the equal combination of two entities or organizations. Mergers are rare in the M&A space, as the organizations will combine assets and services in a completely equal 50/50 split. Two organizations may also choose to divest business entities and merge as a new company.

      Acquisition

      The most common transaction in the M&A space, where an organization will acquire or purchase another organization or entities of another organization. This type of transaction has a clear owner who will be able to make legal decisions regarding the acquired organization.

      Divestiture

      An organization may decide to sell partial elements of a business to an acquiring organization. They will separate this business entity from the rest of the organization and continue to operate the other components of the business.

      Info-Tech Insight

      A true merger does not exist, as there is always someone initiating the discussion. As a result, most M&A activity falls into acquisition or divestiture categories.

      Selling vs. buying

      The M&A process approach differs depending on whether you are the selling or buying organization

      This blueprint is only focused on the sell side:

      • Examples of sell-related scenarios include:
        • Your organization is selling to another organization with the intent of keeping its regular staff, operations, and location. This could mean minimal separation is required.
        • Your organization is selling to another organization with the intent of separating to be a part of the purchasing organization.
        • Your organization is engaging in a divestiture with the intent of:
          • Separating components to be part of the purchasing organization permanently.
          • Separating components to be part of a spinoff and establish a unit as a standalone new company.
      • As the selling organization, you could proactively seek out suitors to purchase all or components of your organization, or you could be approached by an organization.

      The buy side is focused on:

      • More than two organizations could be involved in a transaction.
      • Examples of buy-related scenarios include:
        • Your organization is buying another organization with the intent of having the purchased organization keep its regular staff, operations, and location. This could mean minimal integration is required.
        • Your organization is buying another organization in its entirety with the intent of integrating it into your original company.
        • Your organization is buying components of another organization with the intent of integrating them into your original company.
      • As the purchasing organization, you will probably be initiating the purchase and thus will be valuating the selling organization during due diligence and leading the execution plan.

      For more information on acquisitions or purchases, check out Info-Tech’s Mergers & Acquisitions: The Buy Blueprint.

      Core business timeline

      For IT to be valuable in M&As, you need to align your deliverables and your support to the key activities the business and investors are working on.

      Info-Tech’s methodology for Selling Organizations in Mergers, Acquisitions, or Divestitures

      1. Proactive

      2. Discovery & Strategy

      3. Due Diligence & Preparation

      4. Execution & Value Realization

      Phase Steps

      1. Identify Stakeholders and Their Perspective of IT
      2. Assess IT’s Current Value and Future State
      3. Drive Innovation and Suggest Growth Opportunities
      1. Establish the M&A Program Plan
      2. Prepare IT to Engage in the Separation or Sale
      1. Engage in Due Diligence and Prepare Staff
      2. Prepare to Separate
      1. Execute the Transaction
      2. Reflection and Value Realization

      Phase Outcomes

      Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

      Create a standardized approach for how your IT organization should address divestitures or sales.

      Comply with due diligence, prepare the IT environment for carve-out possibilities, and establish the separation project plan.

      Deliver on the separation project plan successfully and communicate IT’s transaction value to the business.

      Metrics for each phase

      1. Proactive

      2. Discovery & Strategy

      3. Valuation & Due Diligence

      4. Execution & Value Realization

      • % Share of business innovation spend from overall IT budget
      • % Critical processes with approved performance goals and metrics
      • % IT initiatives that meet or exceed value expectation defined in business case
      • % IT initiatives aligned with organizational strategic direction
      • % Satisfaction with IT's strategic decision-making abilities
      • $ Estimated business value added through IT-enabled innovation
      • % Overall stakeholder satisfaction with IT
      • % Percent of business leaders that view IT as an Innovator
      • % IT budget as a percent of revenue
      • % Assets that are not allocated
      • % Unallocated software licenses
      • # Obsolete assets
      • % IT spend that can be attributed to the business (chargeback or showback)
      • % Share of CapEx of overall IT budget
      • % Prospective organizations that meet the search criteria
      • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
      • % Business leaders that view IT as a Business Partner
      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target
      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT separation
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      IT's role in the selling transaction

      And IT leaders have a greater likelihood than ever of needing to support a merger, acquisition, or divestiture.

      1. Reduced Risk

        IT can identify risks that may go unnoticed when IT is not involved.
      2. Increased Accuracy

        The business can make accurate predictions around the costs, timelines, and needs of IT.
      3. Faster Integration

        Faster integration means faster value realization for the business.
      4. Informed Decision Making

        IT leaders hold critical information that can support the business in moving the transaction forward.
      5. Innovation

        IT can suggest new opportunities to generate revenue, optimize processes, or reduce inefficiencies.

      The IT executive’s critical role is demonstrated by:

      • Reduced Risk

        47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion (IMAA Institute, 2017).
      • Increased Accuracy

        Sellers often only provide 15 to 30 days for the acquiring organization to decide (Forbes, 2018), increasing the necessity of accurate pricing.
      • Faster Integration

        36% of CIOs have visibility into only business unit data, making the divestment a challenge (EY, 2021).
      • Informed Decision Making

        Only 38% of corporate and 22% of private equity firms include IT as a significant aspect in their transaction approach (IMAA Institute, 2017).
      • Innovation

        Successful CIOs involved in M&As can spend 70% of their time on aspects outside of IT and 30% of their time on technology and delivery (CIO).

      Playbook benefits

      IT Benefits

      • IT will be seen as an innovative partner to the business, and its suggestions and involvement in the organization will lead to benefits, not hindrances.
      • Develop a streamlined method to prepare the IT environment for potential carve-out and separations, ensuring risk management concerns are brought to the business’ attention immediately.
      • Create a comprehensive list of items that IT needs to do during the separation that can be prioritized and actioned.

      Business Benefits

      • The business will get accurate and relevant information about its IT environment in order to sell or divest the company to the highest bidder for a true price.
      • Fewer business interruptions will happen, because IT can accurately plan for and execute the high-priority separation tasks.
      • The business can obtain a high-value offer for the components of IT being sold and can measure the ongoing value the sale will bring.

      Insight summary

      Overarching Insight

      IT controls if and when it gets invited to support the business through a purchasing growth transaction. Take control of the process, demonstrate the value of IT, and ensure that separation of IT environments does not lead to unnecessary and costly decisions.

      Proactive Insight

      CIOs on the forefront of digital transformation need to actively look for and suggest opportunities to acquire or partner on new digital capabilities to respond to rapidly changing business needs.

      Discovery & Strategy Insight

      IT organizations that have an effective M&A program plan are more prepared for the transaction, enabling a successful outcome. A structured strategy is particularly necessary for organizations expected to deliver M&As rapidly and frequently.

      Due Diligence & Preparation Insight

      IT often faces unnecessary separation challenges because of a lack of preparation. Secure the IT environment and establish how IT will retain employees early in the transaction process.

      Execution & Value Realization Insight

      IT needs to demonstrate value and cost savings within 100 days of the transaction. The most successful transactions are when IT continuously realizes synergies a year after the transaction and beyond.

      Blueprint deliverables

      Key Deliverable: M&A Sell Playbook

      The M&A Sell Playbook should be a reusable document that enables your IT organization to successfully deliver on any divestiture transaction.

      Screenshots of the 'M and A Sell Playbook' deliverable.

      M&A Sell One-Pager

      See a one-page overview of each phase of the transaction.

      Screenshots of the 'M and A Sell One-Pagers' deliverable.

      M&A Sell Case Studies

      Read a one-page case study for each phase of the transaction.

      Screenshots of the 'M and A Sell Case Studies' deliverable.

      M&A Separation Project Management Tool (SharePoint)

      Manage the separation process of the divestiture/sale using this SharePoint template.

      Screenshots of the 'M and A Separation Project Management Tool (SharePoint)' deliverable.

      M&A Separation Project Management Tool (Excel)

      Manage the separation process of the divestiture/sale using this Excel tool if you can’t or don’t want to use SharePoint.

      Screenshots of the 'M and A Separation Project Management Tool (Excel)' deliverable.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 10 calls over the course of 2 to 4 months.

        Proactive Phase

      • Call #1: Scope requirements, objectives, and your specific challenges.
      • Discovery & Strategy Phase

      • Call #2: Determine stakeholders and business perspectives on IT.
      • Call #3: Identify how M&A could support business strategy and how to communicate.
      • Due Diligence & Preparation Phase

      • Call #4: Establish a transaction team and divestiture/sale strategic direction.
      • Call #5: Create program metrics and identify a standard separation strategy.
      • Call #6: Prepare to carve out the IT environment.
      • Call #7: Identify the separation program plan.
      • Execution & Value Realization Phase

      • Call #8: Establish employee transitions to retain key staff.
      • Call #9: Assess IT’s ability to deliver on the divestiture/sale transaction.

      The Sell Blueprint

      Phase 1

      Proactive

      Phase 1

      Phase 2 Phase 3 Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Reduction Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Separation or Sale
      • 3.1 Engage in Due Diligence and Prepare Staff
      • 3.2 Prepare to Separate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Conduct the CEO-CIO Alignment diagnostic
      • Conduct the CIO Business Vision diagnostic
      • Visualize relationships among stakeholders to identify key influencers
      • Group stakeholders into categories
      • Prioritize your stakeholders
      • Plan to communicate
      • Valuate IT
      • Assess the IT/digital strategy
      • Determine pain points and opportunities
      • Align goals to opportunities
      • Recommend reduction opportunities

      This phase involves the following participants:

      • IT and business leadership

      What is the Proactive phase?

      Embracing the digital drivers

      As the number of merger, acquisition, or divestiture transactions driven by digital means continues to increase, IT has an opportunity to not just be involved in a transaction but actively seek out potential deals.

      In the Proactive phase, the business is not currently considering a transaction. However, the business could consider one to reach its strategic goals. IT organizations that have developed respected relationships with the business leaders can suggest these potential transactions.

      Understand the business’ perspective of IT, determine who the critical M&A stakeholders are, valuate the IT environment, and examine how it supports the business goals in order to suggest an M&A transaction.

      In doing so, IT isn’t waiting to be invited to the transaction table – it’s creating it.

      Goal: To support the organization in reaching its strategic goals by suggesting M&A activities that will enable the organization to reach its objectives faster and with greater-value outcomes.

      Proactive Prerequisite Checklist

      Before coming into the Proactive phase, you should have addressed the following:

      • Understand what mergers, acquisitions, and divestitures are.
      • Understand what mergers, acquisitions, and divestitures mean for the business.
      • Understand what mergers, acquisitions, and divestitures mean for IT.

      Review the Executive Brief for more information on mergers, acquisitions, and divestitures for selling organizations.

      Proactive

      Step 1.1

      Identify M&A Stakeholders and Their Perspective of IT

      Activities

      • 1.1.1 Conduct the CEO-CIO Alignment diagnostic
      • 1.1.2 Conduct the CIO Business Vision diagnostic
      • 1.1.3 Visualize relationships among stakeholders to identify key influencers
      • 1.1.4 Group stakeholders into categories
      • 1.1.5 Prioritize your stakeholders
      • 1.16 Plan to communicate

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical M&A stakeholders

      Outcomes of Step

      Understand how the business perceives IT and establish strong relationships with critical M&A stakeholders.

      Business executives' perspectives of IT

      Leverage diagnostics and gain alignment on IT’s role in the organization

      • To suggest or get involved with a merger, acquisition, or divestiture, the IT executive leader needs to be well respected by other members of the executive leadership team and the business.
      • Specifically, the Proactive phase relies on the IT organization being viewed as an Innovator within the business.
      • Identify how the CEO/business executive currently views IT and where they would like IT to move within the Maturity Ladder.
      • Additionally, understand how other critical department leaders view IT and how they view the partnership with IT.
      A colorful visualization titled 'Maturity Ladder' detailing levels of IT function that a business may choose from based on the business executives' perspectives of IT. Starting from the bottom: 'Struggle', Does not embarrass, Does not crash; 'Support', Keeps business happy, Keeps costs low; 'Optimize', Increases efficiency, Decreases costs; 'Expand', Extends into new business, Generates revenue; 'Transform', Creates new industry.

      Misalignment in target state requires further communication between the CIO and CEO to ensure IT is striving toward an agreed-upon direction.

      Info-Tech’s CIO Business Vision (CIO BV) diagnostic measures a variety of high-value metrics to provide a well-rounded understanding of stakeholder satisfaction with IT.

      Sample of Info-Tech's CIO Business Vision diagnostic measuring percentages of high-value metrics like 'IT Satisfaction' and 'IT Value' regarding business leader satisfaction. A note for these two reads 'Evaluate business leader satisfaction with IT this year and last year'. A section titled 'Relationship' has metrics such as 'Understands Needs' and 'Trains Effectively'. A note for this section reads 'Examine relationship indicators between IT and the business'. A section titled 'Security Friction' has metrics such as 'Regulatory Compliance-Driven' and 'Office/Desktop Security'.

      Business Satisfaction and Importance for Core Services

      The core services of IT are important when determining what IT should focus on. The most important services with the lowest satisfaction offer the largest area of improvement for IT to drive business value.

      Sample of Info-Tech's CIO Business Vision diagnostic specifically comparing the business satisfaction of 12 core services with their importance. Services listed include 'Service Desk', 'IT Security', 'Requirements Gathering', 'Business Apps', 'Data Quality', and more. There is a short description of the services, a percentage for the business satisfaction with the service, a percentage comparing it to last year, and a numbered ranking of importance for each service. A note reads 'Assess satisfaction and importance across 12 core IT capabilities'.

      1.1.1 Conduct the CEO-CIO Alignment diagnostic

      2 weeks

      Input: IT organization expertise and the CEO-CIO Alignment diagnostic

      Output: An understanding of an executive business stakeholder’s perception of IT

      Materials: M&A Sell Playbook, CEO-CIO Alignment diagnostic

      Participants: IT executive/CIO, Business executive/CEO

      1. The CEO-CIO Alignment diagnostic can be a powerful input. Speak with your Info-Tech account representative to conduct the diagnostic. Use the results to inform current IT capabilities.
      2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret and draw conclusions from the results.
      3. Examine the results of the survey and note where there might be specific capabilities that could be improved.
      4. Determine whether there are any areas of significant disagreement between the you and the CEO. Mark down those areas for further conversations. Additionally, take note of areas that could be leveraged to support transactions or support your rationale in recommending transactions.

      Download the sample report.

      Record the results in the M&A Sell Playbook.

      1.1.2 Conduct the CIO Business Vision diagnostic

      2 weeks

      Input: IT organization expertise, CIO BV diagnostic

      Output: An understanding of business stakeholder perception of certain IT capabilities and services

      Materials: M&A Buy Playbook, CIO Business Vision diagnostic

      Participants: IT executive/CIO, Senior business leaders

      1. The CIO Business Vision (CIO BV) diagnostic can be a powerful tool for identifying IT capability focus areas. Speak with your account representative to conduct the CIO BV diagnostic. Use the results to inform current IT capabilities.
      2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret the results and draw conclusions from the diagnostic.
      3. Examine the results of the survey and take note of any IT services that have low scores.
      4. Read through the diagnostic comments and note any common themes. Especially note which stakeholders identified they have a favorable relationship with IT and which stakeholders identified they have an unfavorable relationship. For those who have an unfavorable relationship, identify if they will have a critical role in a growth transaction.

      Download the sample report.

      Record the results in the M&A Sell Playbook.

      Create a stakeholder network map for M&A transactions

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Example:

      Diagram of stakeholders and their relationships with other stakeholders, such as 'Board Members', 'CFO/Finance', 'Compliance', etc. with 'CIO/IT Leader' highlighted in the middle. There are unidirectional black arrows and bi-directional green arrows indicating each connection.

        Legend
      • Black arrows indicate the direction of professional influence
      • Dashed green arrows indicate bidirectional, informal influence relationships

      Info-Tech Insight

      Your stakeholder map defines the influence landscape that the M&A transaction will occur within. This will identify who holds various levels of accountability and decision-making authority when a transaction does take place.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantial relationships with your stakeholders.

      1.1.3 Visualize relationships among stakeholders to identify key influencers

      1-3 hours

      Input: List of M&A stakeholders

      Output: Relationships among M&A stakeholders and influencers

      Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

      Participants: IT executive leadership

      1. The purpose of this activity is to list all the stakeholders within your organization that will have a direct or indirect impact on the M&A transaction.
      2. Determine the critical stakeholders, and then determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
        • Use black arrows to indicate the direction of professional influence.
        • Use dashed green arrows to indicate bidirectional, informal influence relationships.

      Record the results in the M&A Sell Playbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps IT leaders categorize their stakeholders by their level of influence and ownership in the merger, acquisition, or divestiture process.

      A prioritization map of stakeholder categories split into four quadrants. The vertical axis is 'Influence', from low on the bottom to high on top. The horizontal axis is 'Ownership/Interest', from low on the left to high on the right. 'Spectators' are low influence, low ownership/interest. 'Mediators' are high influence, low ownership/interest. 'Noisemakers' are low influence, high ownership/interest. 'Players' are high influence, high ownership/interest.

      There are four areas in the map, and the stakeholders within each area should be treated differently.

      Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.

      Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.

      Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.

      Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

      1.1.4 Group stakeholders into categories

      30 minutes

      Input: Stakeholder map, Stakeholder list

      Output: Categorization of stakeholders and influencers

      Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

      Participants: IT executive leadership, Stakeholders

      1. Identify your stakeholders’ interest in and influence on the M&A process as high, medium, or low by rating the attributes below.
      2. Map your results to the model to the right to determine each stakeholder’s category.

      Same prioritization map of stakeholder categories as before. This one has specific stakeholders mapped onto it. 'CFO' is mapped as low interest and middling influence, between 'Mediator' and 'Spectator'. 'CIO' is mapped as higher than average interest and high influence, a 'Player'. 'Board Member' is mapped as high interest and high influence, a 'Player'.

      Level of Influence
      • Power: Ability of a stakeholder to effect change.
      • Urgency: Degree of immediacy demanded.
      • Legitimacy: Perceived validity of stakeholder’s claim.
      • Volume: How loud their “voice” is or could become.
      • Contribution: What they have that is of value to you.
      Level of Interest

      How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

      Record the results in the M&A Sell Playbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Level of Support

      Supporter

      Evangelist

      Neutral

      Blocker

      Stakeholder Category Player Critical High High Critical
      Mediator Medium Low Low Medium
      Noisemaker High Medium Medium High
      Spectator Low Irrelevant Irrelevant Low

      Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by answering the following question: How significant is that stakeholder to the M&A or divestiture process?

      These parameters are used to prioritize which stakeholders are most important and should receive your focused attention.

      1.1.5 Prioritize your stakeholders

      30 minutes

      Input: Stakeholder matrix

      Output: Stakeholder and influencer prioritization

      Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

      Participants: IT executive leadership, M&A/divestiture stakeholders

      1. Identify the level of support of each stakeholder by answering the following question: How significant is that stakeholder to the M&A transaction process?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.

      Stakeholder

      Category

      Level of Support

      Prioritization

      CMO Spectator Neutral Irrelevant
      CIO Player Supporter Critical

      Record the results in the M&A Sell Playbook.

      Define strategies for engaging stakeholders by type

      A revisit to the map of stakeholder categories, but with strategies listed for each one, and arrows on the side instead of an axis. The vertical arrow is 'Authority', which increases upward, and the horizontal axis is Ownership/Interest which increases as it moves to the right. The strategy for 'Players' is 'Engage', for 'Mediators' is 'Satisfy', for 'Noisemakers' is 'Inform', and for 'Spectators' is 'Monitor'.

      Type

      Quadrant

      Actions

      Players High influence, high interest – actively engage Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.
      Mediators High influence, low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.
      Noisemakers Low influence, high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
      Spectators Low influence, low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying stakeholder groups, the IT executive leader can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of Mediators and Players are met.

      1.1.6 Plan to communicate

      30 minutes

      Input: Stakeholder priority, Stakeholder categorization, Stakeholder influence

      Output: Stakeholder communication plan

      Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

      Participants: IT executive leadership, M&A/divestiture stakeholders

      The purpose of this activity is to make a communication plan for each of the stakeholders identified in the previous activities, especially those who will have a critical role in the M&A transaction process.

      1. In the M&A Sell Playbook, input the type of influence each stakeholder has on IT, how they would be categorized in the M&A process, and their level of priority. Use this information to create a communication plan.
      2. Determine the methods and frequency of communication to keep the necessary stakeholder satisfied and maintain or enhance IT’s profile within the organization.

      Record the results in the M&A Sell Playbook.

      Proactive

      Step 1.2

      Assess IT’s Current Value and Method to Achieve a Future State

      Activities

      • 1.2.1 Valuate IT
      • 1.2.2 Assess the IT/digital strategy

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical stakeholders to M&A

      Outcomes of Step

      Identify critical opportunities to optimize IT and meet strategic business goals through a merger, acquisition, or divestiture.

      How to valuate your IT environment

      And why it matters so much

      • Valuating your current organization’s IT environment is a critical step that all IT organizations should take, whether involved in an M&A or not, to fully understand what it might be worth.
      • The business investments in IT can be directly translated into a value amount. For every $1 invested in IT, the business might be gaining $100 in value back or possibly even loosing $100.
      • Determining, documenting, and communicating this information ensures that the business takes IT’s suggestions seriously and recognizes why investing in IT is so critical.
      • There are three ways a business or asset can be valuated:
        • Cost Approach: Look at the costs associated with building, purchasing, replacing, and maintaining a given aspect of the business.
        • Market Approach: Look at the relative value of a particular aspect of the business. Relative value can fluctuate and depends on what the markets and consequently society believe that particular element is worth.
        • Discounted Cash Flow Approach: Focus on what the potential value of the business could be or the intrinsic value anticipated due to future profitability.
      • (Source: “Valuation Methods,” Corporate Finance Institute)

      Four ways to create value through digital

      1. Reduced costs
      2. Improved customer experience
      3. New revenue sources
      4. Better decision making
      5. (Source: McKinsey & Company)

      1.2.1 Valuate IT

      1 day

      Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk

      Output: Valuation of IT

      Materials: Relevant templates/tools listed on the following slides, Capital budget, Operating budget, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership

      The purpose of this activity is to demonstrate that IT is not simply an operational functional area that diminishes business resources. Rather, IT contributes significant value to the business.

      1. Review each of the following slides to valuate IT’s data, applications, infrastructure and operations, and security and risk. These valuations consider several tangible and intangible factors and result in a final dollar amount.
      2. Input the financial amounts identified for each critical area into a summary slide. Use this information to determine where IT is delivering value to the organization.

      Info-Tech Insight

      Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.

      Record the results in the M&A Sell Playbook.

      Data valuation

      Data valuation identifies how you monetize the information that your organization owns.

      Create a data value chain for your organization

      When valuating the information and data that exists in an organization, there are many things to consider.

      Info-Tech has two tools that can support this process:

      1. Information Asset Audit Tool: Use this tool first to take inventory of the different information assets that exist in your organization.
      2. Data Valuation Tool: Once information assets have been accounted for, valuate the data that exists within those information assets.

      Data Collection

      Insight Creation

      Value Creation

      Data Valuation

      01 Data Source
      02 Data Collection Method
      03 Data
      04 Data Analysis
      05 Insight
      06 Insight Delivery
      07 Consumer
      08 Value in Data
      09 Value Dimension
      10 Value Metrics Group
      11 Value Metrics
      Screenshots of Tab 2 of Info-Tech's Data Valuation Tool.

      Instructions

      1. Using the Data Valuation Tool, start gathering information based on the eight steps above to understand your organization’s journey from data to value.
      2. Identify the data value spectrum. (For example: customer sales service, citizen licensing service, etc.)
      3. Fill out the columns for data sources, data collection, and data first.
      4. Capture data analysis and related information.
      5. Then capture the value in data.
      6. Add value dimensions such as usage, quality, and economic dimensions.
        • Remember that economic value is not the only dimension, and usage/quality has a significant impact on economic value.
      7. Collect evidence to justify your data valuation calculator (market research, internal metrics, etc.).
      8. Finally, calculate the value that has a direct correlation with underlying value metrics.

      Application valuation

      Calculate the value of your IT applications

      When valuating the applications and their users in an organization, consider using a business process map. This shows how business is transacted in the company by identifying which IT applications support these processes and which business groups have access to them. Info-Tech has a business process mapping tool that can support this process:

      • Enterprise Integration Process Mapping Tool: Complete this tool first to map the different business processes to the supporting applications in your organization.

      Instructions

      1. Start by calculating user costs. This is the multiplication of: (# of users) × (% of time spent using IT) × (fully burdened salary).
      2. Identify the revenue per employee and divide that by the average cost per employee to calculate the derived productivity ratio (DPR).
      3. Once you have calculated the user costs and DPR, multiply those total values together to get the application value.
      4. User Costs

        Total User Costs

        Derived Productivity Ratio (DPR)

        Total DPR

        Application Value

        # of users % time spent using IT Fully burdened salary Multiply values from the 3 user costs columns Revenue per employee Average cost per employee (Revenue P.E) ÷ (Average cost P.E) (User costs) X (DPR)

      5. Once the total application value is established, calculate the combined IT and business costs of delivering that value. IT and business costs include inflexibility (application maintenance), unavailability (downtime costs, including disaster exposure), IT costs (common costs statistically allocated to applications), and fully loaded cost of active (full-time equivalent [FTE]) users.
      6. Calculate the net value of applications by subtracting the total IT and business costs from the total application value calculated in step 3.
      7. IT and Business Costs

        Total IT and Business Costs

        Net Value of Applications

        Application maintenance Downtime costs (include disaster exposure) Common costs allocated to applications Fully loaded costs of active (FTE) users Sum of values from the four IT and business costs columns (Application value) – (IT and business costs)

      (Source: CSO)

      Infrastructure valuation

      Assess the foundational elements of the business’ information technology

      The purpose of this exercise is to provide a high-level infrastructure valuation that will contribute to valuating your IT environment.

      Calculating the value of the infrastructure will require different methods depending on the environment. For example, a fully cloud-hosted organization will have different costs than a fully on-premises IT environment.

      Instructions:

      1. Start by listing all of the infrastructure-related items that are relevant to your organization.
      2. Once you have finalized your items column, identify the total costs/value of each item.
        • For example, total software costs would include servers and storage.
      3. Calculate the total cost/value of your IT infrastructure by adding all of values in the right column.

      Item

      Costs/Value

      Hardware Assets Total Value +$3.2 million
      Hardware Leased/Service Agreement -$
      Software Purchased +$
      Software Leased/Service Agreement -$
      Operational Tools
      Network
      Disaster Recovery
      Antivirus
      Data Centers
      Service Desk
      Other Licenses
      Total:

      For additional support, download the M&A Runbook for Infrastructure and Operations.

      Risk and security

      Assess risk responses and calculate residual risk

      The purpose of this exercise is to provide a high-level risk assessment that will contribute to valuating your IT environment. For a more in-depth risk assessment, please refer to the Info-Tech tools below:

      1. Risk Register Tool
      2. Security M&A Due Diligence Tool

      Instructions

      1. Review the probability and impact scales below and ensure you have the appropriate criteria that align to your organization before you conduct a risk assessment.
      2. Identify the probability of occurrence and estimated financial impact for each risk category detail and fill out the table on the right. Customize the table as needed so it aligns to your organization.
      3. Probability of Risk Occurrence

        Occurrence Criteria
        (Classification; Probability of Risk Event Within One Year)

        Negligible Very Unlikely; ‹20%
        Very Low Unlikely; 20 to 40%
        Low Possible; 40 to 60%
        Moderately Low Likely; 60 to 80%
        Moderate Almost Certain; ›80%

      Note: If needed, you can customize this scale with the severity designations that you prefer. However, make sure you are always consistent with it when conducting a risk assessment.

      Financial & Reputational Impact

      Budgetary and Reputational Implications
      (Financial Impact; Reputational Impact)

      Negligible (‹$10,000; Internal IT stakeholders aware of risk event occurrence)
      Very Low ($10,000 to $25,000; Business customers aware of risk event occurrence)
      Low ($25,000 to $50,000; Board of directors aware of risk event occurrence)
      Moderately Low ($50,000 to $100,000; External customers aware of risk event occurrence)
      Moderate (›$100,000; Media coverage or regulatory body aware of risk event occurrence)

      Risk Category Details

      Probability of Occurrence

      Estimated Financial Impact

      Estimated Severity (Probability X Impact)

      Capacity Planning
      Enterprise Architecture
      Externally Originated Attack
      Hardware Configuration Errors
      Hardware Performance
      Internally Originated Attack
      IT Staffing
      Project Scoping
      Software Implementation Errors
      Technology Evaluation and Selection
      Physical Threats
      Resource Threats
      Personnel Threats
      Technical Threats
      Total:

      1.2.2 Assess the IT/digital strategy

      4 hours

      Input: IT strategy, Digital strategy, Business strategy

      Output: An understanding of an executive business stakeholder’s perception of IT, Alignment of IT/digital strategy and overall organization strategy

      Materials: Computer, Whiteboard and markers, M&A Sell Playbook

      Participants: IT executive/CIO, Business executive/CEO

      The purpose of this activity is to review the business and IT strategies that exist to determine if there are critical capabilities that are not being supported.

      Ideally, the IT and digital strategies would have been created following development of the business strategy. However, sometimes the business strategy does not directly call out the capabilities it requires IT to support.

      1. On the left half of the corresponding slide in the M&A Sell Playbook, document the business goals, initiatives, and capabilities. Input this information from the business or digital strategies. (If more space for goals, initiatives, or capabilities is needed, duplicate the slide).
      2. On the other half of the slide, document the IT goals, initiatives, and capabilities. Input this information from the IT strategy and digital strategy.

      For additional support, see Build a Business-Aligned IT Strategy.

      Record the results in the M&A Sell Playbook.

      Proactive

      Step 1.3

      Drive Innovation and Suggest Growth Opportunities

      Activities

      • 1.3.1 Determine pain points and opportunities
      • 1.3.2 Align goals with opportunities
      • 1.3.3 Recommend reduction opportunities

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical M&A stakeholders

      Outcomes of Step

      Establish strong relationships with critical M&A stakeholders and position IT as an innovative business partner that can suggest reduction opportunities.

      1.3.1 Determine pain points and opportunities

      1-2 hours

      Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade

      Output: List of pain points or opportunities that IT can address

      Materials: Computer, Whiteboard and markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Business stakeholders

      The purpose of this activity is to determine the pain points and opportunities that exist for the organization. These can be external or internal to the organization.

      1. Identify what opportunities exist for your organization. Opportunities are the potential positives that the organization would want to leverage.
      2. Next, identify pain points, which are the potential negatives that the organization would want to alleviate.
      3. Spend time considering all the options that might exist, and keep in mind what has been identified previously.

      Opportunities and pain points can be trends, other departments’ initiatives, business perspectives of IT, etc.

      Record the results in the M&A Sell Playbook.

      1.3.2 Align goals with opportunities

      1-2 hours

      Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade, List of pain points and opportunities

      Output: An understanding of an executive business stakeholder’s perception of IT, Foundations for reduction strategy

      Materials: Computer, Whiteboard and markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Business stakeholders

      The purpose of this activity is to determine whether a growth or separation strategy might be a good suggestion to the business in order to meet its business objectives.

      1. For the top three to five business goals, consider:
        1. Underlying drivers
        2. Digital opportunities
        3. Whether a growth or reduction strategy is the solution
      2. Just because a growth or reduction strategy is a solution for a business goal does not necessarily indicate M&A is the way to go. However, it is important to consider before you pursue suggesting M&A.

      Record the results in the M&A Sell Playbook.

      1.3.3 Recommend reduction opportunities

      1-2 hours

      Input: Growth or separation strategy opportunities to support business goals, Stakeholder communication plan, Rationale for the suggestion

      Output: M&A transaction opportunities suggested

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO, Business executive/CEO

      The purpose of this activity is to recommend a merger, acquisition, or divestiture to the business.

      1. Identify which of the business goals the transaction would help solve and why IT is the one to suggest such a goal.
      2. Leverage the stakeholder communication plan identified previously to give insight into stakeholders who would have a significant level of interest, influence, or support in the process.

      Info-Tech Insight

      With technology and digital driving many transactions, leverage your organizations’ IT environment as an asset and reason why the divestiture or sale should happen, suggesting the opportunity yourself.

      Record the results in the M&A Sell Playbook.

      By the end of this Proactive phase, you should:

      Be prepared to suggest M&A opportunities to support your company’s goals through sale or divestiture transactions

      Key outcome from the Proactive phase

      Develop progressive relationships and strong communication with key stakeholders to suggest or be aware of transformational opportunities that can be achieved through sale or divestiture strategies.

      Key deliverables from the Proactive phase
      • Business perspective of IT examined
      • Key stakeholders identified and relationship to the M&A process outlined
      • Ability to valuate the IT environment and communicate IT’s value to the business
      • Assessment of the business, digital, and IT strategies and how M&As could support those strategies
      • Pain points and opportunities that could be alleviated or supported through an M&A transaction
      • Sale or divestiture recommendations

      The Sell Blueprint

      Phase 2

      Discovery & Strategy

      Phase 1

      Phase 2

      Phase 3Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Reduction Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Separation or Sale
      • 3.1 Engage in Due Diligence and Prepare Staff
      • 3.2 Prepare to Separate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Create the mission and vision
      • Identify the guiding principles
      • Create the future-state operating model
      • Determine the transition team
      • Document the M&A governance
      • Create program metrics
      • Establish the separation strategy
      • Conduct a RACI
      • Create the communication plan
      • Assess the potential organization(s)

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Transaction FoundationDiscover the Motivation for Divesting or SellingFormalize the Program PlanCreate the Valuation FrameworkStrategize the TransactionNext Steps and Wrap-Up (offsite)

      Activities

      • 0.1 Conduct the CIO Business Vision and CEO-CIO Alignment diagnostics
      • 0.2 Identify key stakeholders and outline their relationship to the M&A process
      • 0.3 Identify the rationale for the company's decision to pursue a divestiture or sale
      • 1.1 Review the business rationale for the divestiture/sale
      • 1.2 Assess the IT/digital strategy
      • 1.3 Identify pain points and opportunities tied to the divestiture/sale
      • 1.4 Create the IT vision statement, create the IT mission statement, and identify IT guiding principles
      • 2.1 Create the future-state operating model
      • 2.2 Determine the transition team
      • 2.3 Document the M&A governance
      • 2.4 Establish program metrics
      • 3.1 Valuate your data
      • 3.2 Valuate your applications
      • 3.3 Valuate your infrastructure
      • 3.4 Valuate your risk and security
      • 3.5 Combine individual valuations to make a single framework
      • 4.1 Establish the separation strategy
      • 4.2 Conduct a RACI
      • 4.3 Review best practices for assessing target organizations
      • 4.4 Create the communication plan
      • 5.1 Complete in-progress deliverables from previous four days
      • 5.2 Set up review time for workshop deliverables and to discuss next steps

      Deliverables

      1. Business perspectives of IT
      2. Stakeholder network map for M&A transactions
      1. Business context implications for IT
      2. IT’s divestiture/sale strategic direction
      1. Operating model for future state
      2. Transition team
      3. Governance structure
      4. M&A program metrics
      1. IT valuation framework
      1. Separation strategy
      2. RACI
      3. Communication plan
      1. Completed M&A program plan and strategy
      2. Prepared to assess target organization(s)

      What is the Discovery & Strategy phase?

      Pre-transaction state

      The Discovery & Strategy phase during a sale or divestiture is a unique opportunity for many IT organizations. IT organizations that can participate in the transaction at this stage are likely considered a strategic partner of the business.

      For one-off sales/divestitures, IT being invited during this stage of the process is rare. However, for organizations that are preparing to engage in many divestitures over the coming years, this type of strategy will greatly benefit from IT involvement. Again, the likelihood of participating in an M&A transaction is increasing, making it a smart IT leadership decision to, at the very least, loosely prepare a program plan that can act as a strategic pillar throughout the transaction.

      During this phase of the pre-transaction state, IT may be asked to participate in ensuring that the IT environment is able to quickly and easily carve out components/business lines and deliver on service-level agreements (SLAs).

      Goal: To identify a repeatable program plan that IT can leverage when selling or divesting all or parts of the current IT environment, ensuring customer satisfaction and business continuity

      Discovery & Strategy Prerequisite Checklist

      Before coming into the Discovery & Strategy phase, you should have addressed the following:

      • Understand the business perspective of IT.
      • Know the key stakeholders and have outlined their relationship to the M&A process.
      • Be able to valuate the IT environment and communicate IT's value to the business.
      • Understand the rationale for the company's decision to pursue a sale or divestiture and the opportunities or pain points the sale should address.

      Discovery & Strategy

      Step 2.1

      Establish the M&A Program Plan

      Activities

      • 2.1.1 Create the mission and vision
      • 2.1.2 Identify the guiding principles
      • 2.1.3 Create the future-state operating model
      • 2.1.4 Determine the transition team
      • 2.1.5 Document the M&A governance
      • 2.1.6 Create program metrics

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Outcomes of Step

      Establish an M&A program plan that can be repeated across sales/divestitures.

      The vision and mission statements clearly articulate IT’s aspirations and purpose

      The IT vision statement communicates a desired future state of the IT organization, whereas the IT mission statement portrays the organization’s reason for being. While each serves its own purpose, they should both be derived from the business context implications for IT.

      Vision Statements

      Mission Statements

      Characteristics

      • Describe a desired future
      • Focus on ends, not means
      • Concise
      • Aspirational
      • Memorable
      • Articulate a reason for existence
      • Focus on how to achieve the vision
      • Concise
      • Easy to grasp
      • Sharply focused
      • Inspirational

      Samples

      To be a trusted advisor and partner in enabling business innovation and growth through an engaged IT workforce. (Source: Business News Daily) IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset. (Source: Forbes, 2013)

      2.1.1 Create the mission and vision statements

      2 hours

      Input: Business objectives, IT capabilities, Rationale for the transaction

      Output: IT’s mission and vision statements for reduction strategies tied to mergers, acquisitions, and divestitures

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create mission and vision statements that reflect IT’s intent and method to support the organization as it pursues a reduction strategy.

      1. Review the definitions and characteristics of mission and vision statements.
      2. Brainstorm different versions of the mission and vision statements.
      3. Edit the statements until you get to a single version of each that accurately reflects IT’s role in the reduction process.

      Record the results in the M&A Sell Playbook.

      Guiding principles provide a sense of direction

      IT guiding principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting IT investment portfolio management, solution development, and procurement decisions.

      A diagram illustrating the place of 'IT guiding principles' in the process of making 'Decisions on the use of IT'. There are four main items, connecting lines naming the type of process in getting from one step to the next, and a line underneath clarifying the questions asked at each step. On the far left, over the question 'What decisions should be made?', is 'Business context and IT implications'. This flows forward to 'IT guiding principles', and they are connected by 'Influence'. Next, over the question 'How should decisions be made?', is the main highlighted section. 'IT guiding principles' flows forward to 'Decisions on the use of IT', and they are connected by 'Guide and inform'. On the far right, over the question 'Who has the accountability and authority to make decisions?', is 'IT policies'. This flows back to 'Decisions on the use of IT', and they are connected by 'Direct and control'.

      IT principles must be carefully constructed to make sure they are adhered to and relevant

      Info-Tech has identified a set of characteristics that IT principles should possess. These characteristics ensure the IT principles are relevant and followed in the organization.

      Approach focused. IT principles should be focused on the approach – how the organization is built, transformed, and operated – as opposed to what needs to be built, which is defined by both functional and non-functional requirements.

      Business relevant. Create IT principles that are specific to the organization. Tie IT principles to the organization’s priorities and strategic aspirations.

      Long lasting. Build IT principles that will withstand the test of time.

      Prescriptive. Inform and direct decision making with actionable IT principles. Avoid truisms, general statements, and observations.

      Verifiable. If compliance can’t be verified, people are less likely to follow the principle.

      Easily Digestible. IT principles must be clearly understood by everyone in IT and by business stakeholders. IT principles aren’t a secret manuscript of the IT team. IT principles should be succinct; wordy principles are hard to understand and remember.

      Followed. Successful IT principles represent a collection of beliefs shared among enterprise stakeholders. IT principles must be continuously communicated to all stakeholders to achieve and maintain buy-in.

      In organizations where formal policy enforcement works well, IT principles should be enforced through appropriate governance processes.

      Consider the example principles below

      IT Principle Name

      IT Principle Statement

      1. Risk Management We will ensure that the organization’s IT Risk Management Register is properly updated to reflect all potential risks and that a plan of action against those risks has been identified.
      2. Transparent Communication We will ensure employees are spoken to with respect and transparency throughout the transaction process.
      3. Separation for Success We will create a carve-out strategy that enables the organization and clearly communicates the resources required to succeed.
      4. Managed Data We will handle data creation, modification, separation, and use across the enterprise in compliance with our data governance policy.
      5.Deliver Better Customer Service We will reduce the number of products offered by IT, enabling a stronger focus on specific products or elements to increase customer service delivery.
      6. Compliance With Laws and Regulations We will operate in compliance with all applicable laws and regulations for both our organization and the potentially purchasing organization.
      7. Defined Value We will create a plan of action that aligns with the organization’s defined value expectations.
      8. Network Readiness We will ensure that employees and customers have immediate access to the network with minimal or no outages.
      9. Value Generator We will leverage the current IT people, processes, and technology to turn the IT organization into a value generator by developing and selling our services to purchasing organizations.

      2.1.2 Identify the guiding principles

      2 hours

      Input: Business objectives, IT capabilities, Rationale for the transaction, Mission and vision statements

      Output: IT’s guiding principles for reduction strategies tied to mergers, acquisitions, and divestitures

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create the guiding principles that will direct the IT organization throughout the reduction strategy process.

      1. Review the role of guiding principles and the examples of guiding principles that organizations have used.
      2. Brainstorm different versions of the guiding principles. Each guiding principle should start with the phrase “We will…”
      3. Edit and consolidate the statements until you have a list of approximately eight to ten statements that accurately reflect IT’s role in the reduction process.
      4. Review the guiding principles every six months to ensure they continue to support the delivery of the business’ reduction strategy goals.

      Record the results in the M&A Sell Playbook.

      Create two IT teams to support the transaction

      IT M&A Transaction Team

      • The IT M&A Transaction Team should consist of the strongest members of the IT team who can be expected to deliver on unusual or additional tasks not asked of them in normal day-to-day operations.
      • The roles selected for this team will have very specific skills sets or deliver on critical separation capabilities, making their involvement in the combination of two or more IT environments paramount.
      • These individuals need to have a history of proving themselves very trustworthy, as they will likely be required to sign an NDA as well.
      • Expect to have to certain duplicate capabilities or roles across the M&A Team and Operational Team.

      IT Operational Team

      • This group is responsible for ensuring the business operations continue.
      • These employees might be those who are newer to the organization but can be counted on to deliver consistent IT services and products.
      • The roles of this team should ensure that end users or external customers remain satisfied.

      Key capabilities to support M&A

      Consider the following capabilities when looking at who should be a part of the IT Transaction Team.

      Employees who have a significant role in ensuring that these capabilities are being delivered will be a top priority.

      Infrastructure & Operations

      • System Separation
      • Data Management
      • Helpdesk/Desktop Support
      • Cloud/Server Management

      Business Focus

      • Service-Level Management
      • Enterprise Architecture
      • Stakeholder Management
      • Project Management

      Risk & Security

      • Privacy Management
      • Security Management
      • Risk & Compliance Management

      Build a lasting and scalable operating model

      An operating model is an abstract visualization, used like an architect’s blueprint, that depicts how structures and resources are aligned and integrated to deliver on the organization’s strategy.

      It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint before embarking on detailed organizational design.

      The visual should highlight which capabilities are critical to attaining strategic goals and clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization.

      As you assess the current operating model, consider the following:

      • Does the operating model contain all the necessary capabilities your IT organization requires to be successful?
      • What capabilities should be duplicated?
      • Are there individuals with the skill set to support those roles? If not, is there a plan to acquire or develop those skills?
      • A dedicated project team strictly focused on M&A is great. However, is it feasible for your organization? If not, what blockers exist?
      A diagram with 'Initiatives' and 'Solutions' on the left and right of an area chart, 'Customer' at the top, the area between them labelled 'Functional Area n', and six horizontal bars labelled 'IT Capability' stacked on top of each other. The 'IT Capability' bars are slightly skewed to the 'Solutions' side of the chart.

      Info-Tech Insight

      Investing time up-front getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and allowing your model to change as the business changes.

      2.1.3 Create the future-state operating model

      4 hours

      Input: Current operating model, IT strategy, IT capabilities, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

      Output: Future-state operating model for divesting organizations

      Materials: Operating model, Capability overlay, Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to establish what the future-state operating model will be if your organization needs to adjust to support a divestiture transaction. If your organization plans to sell in its entirety, you may choose to skip this activity.

      1. Ensuring that all the IT capabilities are identified by the business and IT strategy, document your organization’s current operating model.
      2. Identify what core capabilities would be critical to the divesting transaction process and separation. Highlight and make copies of those capabilities in the M&A Sell Playbook. As a result of divesting, there may also be capabilities that will become irrelevant in your future state.
      3. Ensure the capabilities that will be decentralized are clearly identified. Decentralized capabilities do not exist within the central IT organization but rather in specific lines of businesses, products, or locations to better understand needs and deliver on the capability.

      An example operating model is included in the M&A Sell Playbook. This process benefits from strong reference architecture and capability mapping ahead of time.

      Record the results in the M&A Sell Playbook.

      2.1.4 Determine the transition team

      3 hours

      Input: IT capabilities, Future-state operating model, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

      Output: Transition team

      Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a team that will support your IT organization throughout the transaction. Determining which capabilities and therefore which roles will be required ensures that the business will continue to get the operational support it needs.

      1. Based on the outcome of activity 2.1.3, review the capabilities that your organization will require on the transition team. Group capabilities into functional groups containing capabilities that are aligned well with one another because they have similar responsibilities and functionalities.
      2. Replace the capabilities with roles. For example, stakeholder management, requirements gathering, and project management might be one functional group. Project management and stakeholder management might combine to create a project manager role.
      3. Review the examples in the M&A Sell Playbook and identify which roles will be a part of the transition team.

      For more information, see Redesign Your Organizational Structure

      What is governance?

      And why does it matter so much to IT and the M&A process?

      • Governance is the method in which decisions get made, specifically as they impact various resources (time, money, and people).
      • Because M&A is such a highly governed transaction, it is important to document the governance bodies that exist in your organization.
      • This will give insight into what types of governing bodies there are, what decisions they make, and how that will impact IT.
      • For example, funds to support separation need to be discussed, approved, and supplied to IT from a governing body overseeing the acquisition.
      • A highly mature IT organization will have automated governance, while a seemingly non-existent governance process will be considered ad hoc.
      A pyramid with four levels representing the types of governing bodies that are available with differing levels of IT maturity. An arrow beside the pyramid points upward. The bottom of the arrow is labelled 'Traditional (People and document centric)' and the top is labelled 'Adaptive (Data centric)'. Starting at the bottom of the pyramid is level 1 'Ad Hoc Governance', 'Governance that is not well defined or understood within the organization. It occurs out of necessity but often not by the right people'. Level 2 is 'Controlled Governance', 'Governance focused on compliance and decisions driven by hierarchical authority. Levels of authority are defined and often driven by regulatory'. Level 3 is 'Agile Governance', 'Governance that is flexible to support different needs and quick response in the organization. Driven by principles and delegated throughout the company'. At the top of the pyramid is level 4 'Automated Governance', 'Governance that is entrenched and automated into organizational processes and product/service design. Empowered and fully delegated governance to maintain fit and drive organizational success and survival'.

      2.1.5 Document M&A governance

      1-2 hours

      Input: List of governing bodies, Governing body committee profiles, Governance structure

      Output: Documented method on how decisions are made as it relates to the M&A transaction

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine the method in which decisions are made throughout the M&A transaction as it relates to IT. This will require understanding both governing bodies internal to IT and those external to IT.

      1. First, determine the other governance structures within the organization that will impact the decisions made about M&A. List out these bodies or committees.
      2. Create a profile for each committee that looks at the membership, purpose of the committee, decision areas (authority), and the process of inputs and outputs. Ensure IT committees that will have a role in this process are also documented. Consider the benefits realized, risks, and resources required for each.
      3. Organize the committees into a structure, identifying the committees that have a role in defining the strategy, designing and building, and running.

      Record the results in the M&A Sell Playbook.

      Current-state structure map – definitions of tiers

      Strategy: These groups will focus on decisions that directly connect to the strategic direction of the organization.

      Design & Build: The second tier of groups will oversee prioritization of a certain area of governance as well as design and build decisions that feed into strategic decisions.

      Run: The lowest level of governance will be oversight of more-specific initiatives and capabilities within IT.

      Expect tier overlap. Some committees will operate in areas that cover two or three of these governance tiers.

      Measure the IT program’s success in terms of its ability to support the business’ M&A goals

      Upper management will measure IT’s success based on your ability to support the underlying reasons for the M&A. Using business metrics will help assure business stakeholders that IT understands their needs and is working with the business to achieve them.

      Business-Specific Metrics

      • Revenue Growth: Increase in the top line as seen by market expansion, product expansion, etc. by percentage/time.
      • Synergy Extraction: Reduction in costs as determined by the ability to identify and eliminate redundancies over time.
      • Profit Margin Growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs over time.

      IT-Specific Metrics

      • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure over time.
      • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
      • Meeting or improving on IT budget estimates: Delivering successful IT separation on a budget that is the same or lower than the budget estimated during due diligence.
      • Meeting or improving on IT time-to-separation estimates: Delivering successful IT carve-out on a timeline that is the same or shorter than the timeline estimated during due diligence.
      • Business capability support: Delivering the end state of IT that supports the expected business capabilities and growth.

      Establish your own metrics to gauge the success of IT

      Establish SMART M&A Success Metrics

      S pecific Make sure the objective is clear and detailed.
      M easurable Objectives are measurable if there are specific metrics assigned to measure success. Metrics should be objective.
      A ctionable Objectives become actionable when specific initiatives designed to achieve the objective are identified.
      R ealistic Objectives must be achievable given your current resources or known available resources.
      T ime-Bound An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline.
      • What should IT consider when looking to identify potential additions, deletions, or modifications that will either add value to the organization or reduce costs/risks?
      • Provide a definition of synergies.
      • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure.
      • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
      • Meeting or improving on IT budget estimates: Delivering successful IT separation on a budget that is the same or lower than the budget estimated during due diligence.
      • Meeting or improving on IT time-to-separation estimates: Delivering successful IT carve-out on a timeline that is the same or shorter than the timeline estimated during due diligence.
      • Revenue growth: Increase in the top line as a result, as seen by market expansion, product expansion, etc., as a result of divesting lines of the business and selling service-level agreements to the purchasing organization.
      • Synergy extraction: Reduction in costs, as determined by the ability to identify and eliminate redundancies.
      • Profit margin growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs.

      Metrics for each phase

      1. Proactive

      2. Discovery & Strategy

      3. Valuation & Due Diligence

      4. Execution & Value Realization

      • % Share of business innovation spend from overall IT budget
      • % Critical processes with approved performance goals and metrics
      • % IT initiatives that meet or exceed value expectation defined in business case
      • % IT initiatives aligned with organizational strategic direction
      • % Satisfaction with IT's strategic decision-making abilities
      • $ Estimated business value added through IT-enabled innovation
      • % Overall stakeholder satisfaction with IT
      • % Percent of business leaders that view IT as an Innovator
      • % IT budget as a percent of revenue
      • % Assets that are not allocated
      • % Unallocated software licenses
      • # Obsolete assets
      • % IT spend that can be attributed to the business (chargeback or showback)
      • % Share of CapEx of overall IT budget
      • % Prospective organizations that meet the search criteria
      • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
      • % Business leaders that view IT as a Business Partner
      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target
      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT separation
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      2.1.6 Create program metrics

      1-2 hours

      Input: IT capabilities, Mission, vision, and guiding principles, Rationale for the acquisition

      Output: Program metrics to support IT throughout the M&A process

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine how IT’s success throughout a growth transaction will be measured and determined.

      1. Document a list of appropriate metrics on the whiteboard. Remember to include metrics that demonstrate the business impact. You can use the sample metrics listed on the previous slide as a starting point.
      2. Set a target and deadline for each metric. This will help the group determine when it is time to evaluate progression.
      3. Establish a baseline for each metric based on information collected within your organization.
      4. Assign an owner for tracking each metric as well as someone to be accountable for performance.

      Record the results in the M&A Sell Playbook.

      Discovery & Strategy

      Step 2.2

      Prepare IT to Engage in the Separation or Sale

      Activities

      • 2.2.1 Establish the separation strategy
      • 2.2.2 Conduct a RACI
      • 2.2.3 Create the communication plan
      • 2.2.4 Assess the potential organization(s)

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Outcomes of Step

      Identify IT’s plan of action when it comes to the separation/sale and align IT’s separation/sale strategy with the business’ M&A strategy.

      Separation strategies

      There are several IT separation strategies that will let you achieve your target technology environment.

      IT Separation Strategies
      • Divest. Carve out elements of the IT organization and sell them to a purchasing organization with or without a service-level agreement.
      • Sell. Sell the entire IT environment to a purchasing organization. The purchasing organization takes full responsibility in delivering and running the IT environment.
      • Spin-Off Joint Venture. Carve out elements of the IT organization and combine them with elements of a new or purchasing organization to create a new entity.

      The approach IT takes will depend on the business objectives for the M&A.

      • Generally speaking, the separation strategy is well understood and influenced by the frequency of and rationale for selling.
      • Based on the initiatives generated by each business process owner, you need to determine the IT separation strategy that will best support the desired target technology environment, especially if you are still operating or servicing elements of that IT environment.

      Key considerations when choosing an IT separation strategy include:

      • What are the main business objectives of the M&A?
      • What are the key synergies expected from the transaction?
      • What IT separation strategy best helps obtain these benefits?
      • What opportunities exist to position the business for sustainable and long-term growth?

      Separation strategies in detail

      Review highlights and drawbacks of different separation strategies

      Divest
        Highlights
      • Recommended for businesses striving to reduce costs and potentially even generate revenue for the business through the delivery of SLAs.
      • Opportunity to reduce or scale back on lines of business or products that are not driving profits.
        Drawbacks
      • May be forced to give up critical staff that have been known to deliver high value.
      • The IT department is left to deliver services to the purchasing organization with little support or consideration from the business.
      • There can be increased risk and security concerns that need to be addressed.
      Sell
        Highlights
      • Recommended for businesses looking to gain capital to exit the market profitably or to enter a new market with a large sum of capital.
      • The business will no longer exist, and as a result all operational costs, including IT, will become redundant.
        Drawbacks
      • IT is no longer needed as an operating or capital service for the organization.
      • Lost resources, including highly trained and critical staff.
      • May require packaging employees off and using the profit or capital generated to cover any closing costs.
      Spin-Off or Joint Venture
        Highlights
      • Recommended for businesses looking to expand their market presence or acquire new products. Essentially aligning the two organizations in the same market.
      • Each side has a unique offering but complementing capabilities.
        Drawbacks
      • As much as the organization is going through a separation from the original company, it will be going through an integration with the new company.
      • There could be differences in culture.
      • This could require a large amount of investment without a guarantee of profit or success.

      2.2.1 Establish the separation strategy

      1-2 hours

      Input: Business separation strategy, Guiding principles, M&A governance

      Output: IT’s separation strategy

      Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine IT’s approach to separating or selling. This approach might differ slightly from transaction to transaction. However, the businesses approach to transactions should give insight into the general separation strategy IT should adopt.

      1. Make sure you have clearly articulated the business objectives for the M&A, the technology end state for IT, and the magnitude of the overall separation.
      2. Review and discuss the highlights and drawbacks of each type of separation.
      3. Use Info-Tech’s Separation Posture Selection Framework on the next slide to select the separation posture that will appropriately enable the business. Consider these questions during your discussion:
        1. What are the main business objectives of the M&A? What key IT capabilities will need to support business objectives?
        2. What key synergies are expected from the transaction? What opportunities exist to position the business for sustainable growth?
        3. What IT separation best helps obtain these benefits?

      Record the results in the M&A Sell Playbook.

      Separation Posture Selection Framework

      Business M&A Strategy

      Resultant Technology Strategy

      M&A Magnitude (% of Seller Assets, Income, or Market Value)

      IT Separation Posture

      A. Horizontal Adopt One Model ‹100% Divest
      ›99% Sell
      B. Vertical Create Links Between Critical Systems Any Divest
      C. Conglomerate Independent Model Any Joint Venture
      Divest
      D. Hybrid: Horizontal & Conglomerate Create Links Between Critical Systems Any Divest
      Joint Venture

      M&A separation strategy

      Business M&A Strategy Resultant Technology Strategy M&A Magnitude (% of Seller Assets, Income, or Market Value) IT Separation Posture

      You may need a hybrid separation posture to achieve the technology end state.

      M&A objectives may not affect all IT domains and business functions in the same way. Therefore, the separation requirements for each business function may differ. Organizations will often choose to select and implement a hybrid separation posture to realize the technology end state.

      Each business division may have specific IT domain and capability needs that require an alternative separation strategy.

      • Example: Even when conducting a joint venture by forming a new organization, some partners might view themselves as the dominant partner and want to influence the IT environment to a greater degree.
      • Example: Some purchasing organizations will expect service-level agreements to be available for a significant period of time following the divestiture, while others will be immediately independent.

      2.2.2 Conduct a RACI

      1-2 hours

      Input: IT capabilities, Transition team, Separation strategy

      Output: Completed RACI for Transition team

      Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to identify the core accountabilities and responsibilities for the roles identified as critical to your transition team. While there might be slight variation from transaction to transaction, ideally each role should be performing certain tasks.

      1. First, identify a list of critical tasks that need to be completed to support the sale or separation. For example:
        • Communicate with the company M&A team.
        • Identify the key IT solutions that can and cannot be carved out.
        • Gather data room artifacts and provide them to acquiring organization.
      2. Next, identify at the activity level which role is accountable or responsible for each activity. Enter an A for accountable, R for responsible, or A/R for both.

      Record the results in the M&A Sell Playbook.

      Communication and change

      Prepare key stakeholders for the potential changes

      • Anytime you are starting a project or program that will depend on users and stakeholders to give up their old way of doing things, change will force people to become novices again, leading to lost productivity and added stress.
      • Change management can improve outcomes for any project where you need people to adopt new tools and procedures, comply with new policies, learn new skills and behaviors, or understand and support new processes.
      • M&As move very quickly, and it can be very difficult to keep track of which stakeholders you need to be communicating with and what you should be communicating.
      • Not all organizations embrace or resist change in the same ways. Base your change communications on your organization’s cultural appetite for change in general.
        • Organizations with a low appetite for change will require more direct, assertive communications.
        • Organizations with a high appetite for change are more suited to more open, participatory approaches.

      Three key dimensions determine the appetite for cultural change:

      • Power Distance. Refers to the acceptance that power is distributed unequally throughout the organization.
        In organizations with a high power distance, the unequal power distribution is accepted by the less powerful employees.
      • Individualism. Organizations that score high in individualism have employees who are more independent. Those who score low in individualism fall into the collectivism side, where employees are strongly tied to one another or their groups.
      • Uncertainty Avoidance. Describes the level of acceptance that an organization has toward uncertainty. Those who score high in this area find that their employees do not favor uncertain situations, while those that score low in this area find that their employees are comfortable with change and uncertainty.

      2.2.3 Create the communication plan

      1-2 hours

      Input: IT’s M&A mission, vision, and guiding principles, M&A transition team, IT separation strategy, RACI

      Output: IT’s M&A communication plan

      Materials: Flip charts/whiteboard, Markers, RACI, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a communication plan that IT can leverage throughout the initiative.

      1. Create a structured communication plan that allows for continuous communication with the integration management office, senior management, and the business functional heads.
      2. Outline key topics of communication, with stakeholders, inputs, and outputs for each topic.
      3. Review Info-Tech’s example communication plan in the M&A Sell Playbook and update it with relevant information.
      4. Does this communication plan make sense for your organization? What doesn’t make sense? Adjust the communication guide to suit your organization.

      Record the results in the M&A Sell Playbook.

      Assessing potential organizations

      As soon as you have identified organizations to consider, it’s imperative to assess critical risks. Most IT leaders can attest that they will receive little to no notice when the business is pursuing a sale and IT has to assess the IT organization. As a result, having a standardized template to quickly assess the potential acquiring organization is important.

      Ways to Assess

      1. News: Assess what sort of news has been announced in relation to the organization. Have they had any risk incidents? Has a critical vendor announced working with them?
      2. LinkedIn: Scan through the LinkedIn profiles of employees. This will give you a sense of what platforms they have based on employees. It will also give insight into positive or negative employee experiences that could impact retention.
      3. Trends: Some industries will have specific solutions that are relevant and popular. Assess what the key players are (if you don’t already know) to determine the solution.
      4. Business Architecture: While this assessment won’t perfect, try to understand the business’ value streams and the critical business and IT capabilities that would be needed to support them. Will your organization or employee skills be required to support these long term?

      Info-Tech Insight

      Assessing potential organizations is not just for the purchaser. The seller should also know what the purchasing organization’s history with M&As is and what potential risks could occur if remaining connected through ongoing SLAs.

      2.2.4 Assess the potential organization(s)

      1-2 hours

      Input: Publicized historical risk events, Solutions and vendor contracts likely in the works, Trends

      Output: IT’s valuation of the potential organization(s) for selling or divesting

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO

      The purpose of this activity is to assess the organization(s) that your organization is considering selling or divesting to.

      1. Complete the Historical Valuation Worksheet in the M&A Sell Playbook to understand the type of IT organization that your company may support.
        • The business likely isn’t looking for in-depth details at this time. However, as the IT leader, it is your responsibility to ensure critical risks are identified and communicated to the business.
      2. Use the information identified to help the business narrow down which organizations could be the right organizations to sell or divest to.

      Record the results in the M&A Sell Playbook.

      By the end of this pre-transaction phase you should:

      Have a program plan for M&As and a repeatable M&A strategy for IT when engaging in reduction transactions

      Key outcomes from the Discovery & Strategy phase
      • Prepare the IT environment to support the potential sale or divestiture by identifying critical program plan elements and establishing a separation or carve-out strategy that will enable the business to reach its goals.
      • Create a M&A strategy that accounts for all the necessary elements of a transaction and ensures sufficient governance, capabilities, and metrics exist.
      Key deliverables from the Discovery & Strategy phase
      • Create vision and mission statements
      • Establish guiding principles
      • Create a future-state operating model
      • Identify the key roles for the transaction team
      • Identify and communicate the M&A governance
      • Determine target metrics
      • Identify the M&A operating model
      • Select the separation strategy framework
      • Conduct a RACI for key transaction tasks for the transaction team
      • Document the communication plan

      M&A Sell Blueprint

      Phase 3

      Due Diligence & Preparation

      Phase 1Phase 2

      Phase 3

      Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Reduction Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Separation or Sale
      • 3.1 Engage in Due Diligence and Prepare Staff
      • 3.2 Prepare to Separate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Drive value with a due diligence charter
      • Gather data room artifacts
      • Measure staff engagement
      • Assess culture
      • Create a carve-out roadmap
      • Prioritize separation tasks
      • Establish the separation roadmap
      • Identify the buyer’s IT expectations
      • Create a service/transaction agreement
      • Estimate separation costs
      • Create an employee transition plan
      • Create functional workplans for employees
      • Align project metrics with identified tasks

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team
      • Business leaders
      • Purchasing organization
      • Transition team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Transaction FoundationDiscover the Motivation for SeparationIdentify Expectations and Create the Carve-Out RoadmapPrepare and Manage EmployeesPlan the Separation RoadmapNext Steps and Wrap-Up (offsite)

      Activities

      • 0.1 Identify the rationale for the company's decision to pursue a divestiture/sale.
      • 0.2 Identify key stakeholders and determine the IT transaction team.
      • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
      • 1.1 Review the business rationale for the divestiture/sale.
      • 1.2 Identify pain points and opportunities tied to the divestiture/sale.
      • 1.3 Establish the separation strategy.
      • 1.4 Create the due diligence charter.
      • 2.1 Identify the buyer’s IT expectations.
      • 2.2 Create a list of IT artifacts to be reviewed in the data room.
      • 2.3 Create a carve-out roadmap.
      • 2.4 Create a service/technical transaction agreement.
      • 3.1 Measure staff engagement.
      • 3.2 Assess the current culture and identify the goal culture.
      • 3.3 Create an employee transition plan.
      • 3.4 Create functional workplans for employees.
      • 4.1 Prioritize separation tasks.
      • 4.2 Establish the separation roadmap.
      • 4.3 Establish and align project metrics with identified tasks.
      • 4.4 Estimate separation costs.
      • 5.1 Complete in-progress deliverables from previous four days.
      • 5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. IT strategy
      2. IT operating model
      3. IT governance structure
      4. M&A transaction team
      1. Business context implications for IT
      2. Separation strategy
      3. Due diligence charter
      1. Data room artifacts identified
      2. Carve-out roadmap
      3. Service/technical transaction agreement
      1. Engagement assessment
      2. Culture assessment
      3. Employee transition plans and workplans
      1. Separation roadmap and associated resourcing
      1. Divestiture separation strategy for IT

      What is the Due Diligence & Preparation phase?

      Mid-transaction state

      The Due Diligence & Preparation phase during a sale or divestiture is a critical time for IT. If IT fails to proactively participate in this phase, IT will have to merely react to separation expectations set by the business.

      If your organization is being sold in its entirety, staff will have major concerns about their future in the new organization. Making this transition as smooth as possible and being transparent could go a long way in ensuring their success in the new organization.

      In a divestiture, this is the time to determine where it’s possible for the organization to divide or separate from itself. A lack of IT involvement in these conversations could lead to an overcommitment by the business and under-delivery by IT.

      Goal: To ensure that, as the selling or divesting organization, you comply with regulations, prepare staff for potential changes, and identify a separation strategy if necessary

      Due Diligence Prerequisite Checklist

      Before coming into the Due Diligence & Preparation phase, you must have addressed the following:

      • Understand the rationale for the company's decision to pursue a sale or divestiture and what opportunities or pain points the sale should alleviate.
      • Identify the key roles for the transaction team.
      • Identify the M&A governance.
      • Determine target metrics.
      • Select a separation strategy framework.
      • Conduct a RACI for key transaction tasks for the transaction team.

      Before coming into the Due Diligence & Preparation phase, we recommend addressing the following:

      • Create vision and mission statements.
      • Establish guiding principles.
      • Create a future-state operating model.
      • Identify the M&A operating model.
      • Document the communication plan.
      • Examine the business perspective of IT.
      • Identify key stakeholders and outline their relationship to the M&A process.
      • Be able to valuate the IT environment and communicate IT’s value to the business.

      The Technology Value Trinity

      Delivery of Business Value & Strategic Needs

      • Digital & Technology Strategy
        The identification of objectives and initiatives necessary to achieve business goals.
      • IT Operating Model
        The model for how IT is organized to deliver on business needs and strategies.
      • Information & Technology Governance
        The governance to ensure the organization and its customers get maximum value from the use of information and technology.

      All three elements of the Technology Value Trinity work in harmony to deliver business value and achieve strategic needs. As one changes, the others need to change as well.

      • Digital and IT Strategy tells you what you need to achieve to be successful.
      • IT Operating Model and Organizational Design is the alignment of resources to deliver on your strategy and priorities.
      • Information & Technology Governance is the confirmation of IT’s goals and strategy, which ensures the alignment of IT and business strategy. It’s the mechanism by which you continuously prioritize work to ensure that what is delivered is in line with the strategy. This oversight evaluates, directs, and monitors the delivery of outcomes to ensure that the use of resources results in the achieving the organization’s goals.

      Too often strategy, operating model and organizational design, and governance are considered separate practices. As a result, “strategic documents” end up being wish lists, and projects continue to be prioritized based on who shouts the loudest – not based on what is in the best interest of the organization.

      Due Diligence & Preparation

      Step 3.1

      Engage in Due Diligence and Prepare Staff

      Activities

      • 3.1.1 Drive value with a due diligence charter
      • 3.1.2 Gather data room artifacts
      • 3.1.3 Measure staff engagement
      • 3.1.4 Assess culture

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team
      • Business leaders
      • Prospective IT organization
      • Transition team

      Outcomes of Step

      This step of the process is when IT should prepare and support the business in due diligence and gather the necessary information about staff changes.

      3.1.1 Drive value with a due diligence charter

      1-2 hours

      Input: Key roles for the transaction team, M&A governance, Target metrics, Selected separation strategy framework, RACI of key transaction tasks for the transaction team

      Output: IT Due Diligence Charter

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a charter leveraging the items completed in the previous phase, as listed on the Due Diligence Prerequisite Checklist slide, to gain executive sign-off.

      1. In the IT Due Diligence Charter in the M&A Sell Playbook, complete the aspects of the charter that are relevant for you and your organization.
      2. We recommend including these items in the charter:
        • Communication plan
        • Transition team roles
        • Goals and metrics for the transaction
        • Separation strategy
        • Sale/divestiture RACI
      3. Once the charter has been completed, ensure that business executives agree to the charter and sign off on the plan of action.

      Record the results in the M&A Sell Playbook.

      3.1.2 Gather data room artifacts

      4 hours

      Input: Future-state operating model, M&A governance, Target metrics, Selected separation strategy framework, RACI of key transaction tasks for the transaction team

      Output: List of items to acquire and verify can be provided to the purchasing organization while in the data room

      Materials: Critical domain lists on following slides, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team, Legal team, Compliance/privacy officers

      The purpose of this activity is to create a list of the key artifacts that you could be asked for during the due diligence process.

      1. Review the lists on the following pages as a starting point. Identify which domains, stakeholders, artifacts, and information should be requested for the data room.
      2. IT leadership may or may not be asked to enter the data room directly. The short notice for having to find these artifacts for the purchasing organization can leave your IT organization scrambling. Identify the critical items worth obtaining ahead of time.
      3. Once you have identified the artifacts, provide the list to the legal team or compliance/privacy officers and ensure they also agree those items can be provided. If changes to the documents need to be made, take the time to do so.
      4. Store all items in a safe and secure file or provide to the M&A team ahead of due diligence.

      **Note that if your organization is not leading/initiating the data room, then you can ignore this activity.

      Record the results in the M&A Sell Playbook.

      Critical domains

      Understand the key stakeholders and outputs for each domain

      Domain

      Stakeholders

      Key Artifacts

      Key Information to request

      Business
      • Enterprise Architecture
      • Business Relationship Manager
      • Business Process Owners
      • Business capability map
      • Capability map (the M&A team should be taking care of this, but make sure it exists)
      • Business satisfaction with various IT systems and services
      Leadership/IT Executive
      • CIO
      • CTO
      • CISO
      • IT budgets
      • IT capital and operating budgets (from current year and previous year)
      Data & Analytics
      • Chief Data Officer
      • Data Architect
      • Enterprise Architect
      • Master data domains, system of record for each
      • Unstructured data retention requirements
      • Data architecture
      • Master data domains, sources, and storage
      • Data retention requirements
      Applications
      • Applications Manager
      • Application Portfolio Manager
      • Application Architect
      • Applications map
      • Applications inventory
      • Applications architecture
      • Copy of all software license agreements
      • Copy of all software maintenance agreements
      Infrastructure
      • Head of Infrastructure
      • Enterprise Architect
      • Infrastructure Architect
      • Infrastructure Manager
      • Infrastructure map
      • Infrastructure inventory
      • Network architecture (including which data centers host which infrastructure and applications)
      • Inventory (including separation capabilities of vendors, versions, switches, and routers)
      • Copy of all hardware lease or purchase agreements
      • Copy of all hardware maintenance agreements
      • Copy of all outsourcing/external service provider agreements
      • Copy of all service-level agreements for centrally provided, shared services and systems
      Products and Services
      • Product Manager
      • Head of Customer Interactions
      • Product lifecycle
      • Product inventory
      • Customer market strategy

      Critical domains (continued)

      Understand the key stakeholders and outputs for each domain

      Domain

      Stakeholders

      Key Artifacts

      Key Information to request

      Operations
      • Head of Operations
      • Service catalog
      • Service overview
      • Service owners
      • Access policies and procedures
      • Availability and service levels
      • Support policies and procedures
      • Costs and approvals (internal and customer costs)
      IT Processes
      • CIO
      • IT Management
      • VP of IT Governance
      • VP of IT Strategy
      • IT process flow diagram
      • Processes in place and productivity levels (capacity)
      • Critical processes/processes the organization feels they do particularly well
      IT People
      • CIO
      • VP of Human Resources
      • IT organizational chart
      • Competency & capacity assessment
      • IT organizational structure (including resources from external service providers such as contractors) with appropriate job descriptions or roles and responsibilities
      • IT headcount and location
      Security
      • CISO
      • Security Architect
      • Security posture
      • Information security staff
      • Information security service providers
      • Information security tools
      • In-flight information security projects
      Projects
      • Head of Projects
      • Project portfolio
      • List of all future, ongoing, and recently completed projects
      Vendors
      • Head of Vendor Management
      • License inventory
      • Inventory (including what will and will not be transitioning, vendors, versions, number of licenses)

      Retain top talent throughout the transition

      Focus on retention and engagement

      • People are such a critical component of this process, especially in the selling organization.
      • Retaining employees, especially the critical employees who hold specific skills or knowledge, will ensure the success and longevity of the divesting organization, purchasing organization, or the new company.
      • Giving employees a role in the organization and ensuring they do not see their capabilities as redundant will be critical to the process.
      • It is okay if employees need to change what they were doing temporarily or even long-term. However, being transparent about these changes and highlighting their value to the process and organization(s) will help.
      • The first step to moving forward with retention is to look at the baseline engagement and culture of employees and the organization. This will help determine where to focus and allow you to identify changes in engagement that resulted from the transaction.
      • Job engagement drivers are levers that influence the engagement of employees in their day-to-day roles.
      • Organizational engagement drivers are levers that influence an employee’s engagement with the broader organization.
      • Retention drivers are employment needs. They don’t necessarily drive engagement, but they must be met for engagement to be possible.

      3.1.3 Measure staff engagement

      3-4 hours

      Input: Engagement survey

      Output: Baseline engagement scores

      Materials: Build an IT Employee Engagement Program

      Participants: IT executive/CIO, IT senior leadership, IT employees of current organization

      The purpose of this activity is to measure current staff engagement to have a baseline to measure against in the future state. This is a good activity to complete if you will be divesting or selling in entirety.

      The results from the survey should act as a baseline to determine what the organization is doing well in terms of employee engagement and what drivers could be improved upon.

      1. Review Info-Tech’s Build an IT Employee Engagement Program research and select a survey that will best meet your needs.
      2. Conduct the survey and note which drivers employees are currently satisfied with. Likewise, note where there are opportunities.
      3. Document actions that should be taken to mitigate the negative engagement drivers throughout the transaction and enhance or maintain the positive engagement drivers.

      Record the results in the M&A Sell Playbook.

      Assess culture as a part of engagement

      Culture should not be overlooked, especially as it relates to the separation of IT environments

      • There are three types of culture that need to be considered.
      • Most importantly, this transition is an opportunity to change the culture that might exist in your organization’s IT environment.
      • Make a decision on which type of culture you’d like IT to have post transition.

      Target Organization's Culture. The culture that the target organization is currently embracing. Their established and undefined governance practices will lend insight into this.

      Your Organization’s Culture. The culture that your organization is currently embracing. Examine people’s attitudes and behaviors within IT toward their jobs and the organization.

      Ideal Culture. What will the future culture of the IT organization be once separation is complete? Are there aspects that your current organization and the target organization embrace that are worth considering?

      Culture categories

      Map the results of the IT Culture Diagnostic to an existing framework

      Competitive
      • Autonomy
      • Confront conflict directly
      • Decisive
      • Competitive
      • Achievement oriented
      • Results oriented
      • High performance expectations
      • Aggressive
      • High pay for good performance
      • Working long hours
      • Having a good reputation
      • Being distinctive/different
      Innovative
      • Adaptable
      • Innovative
      • Quick to take advantage of opportunities
      • Risk taking
      • Opportunities for professional growth
      • Not constrained by rules
      • Tolerant
      • Informal
      • Enthusiastic
      Traditional
      • Stability
      • Reflective
      • Rule oriented
      • Analytical
      • High attention to detail
      • Organized
      • Clear guiding philosophy
      • Security of employment
      • Emphasis on quality
      • Focus on safety
      Cooperative
      • Team oriented
      • Fair
      • Praise for good performance
      • Supportive
      • Calm
      • Developing friends at work
      • Socially responsible

      Culture Considerations

      • What culture category was dominant for each IT organization?
      • Do you share the same dominant category?
      • Is your current dominant culture category the most ideal to have post-separation?

      3.1.4 Assess Culture

      3-4 hours

      Input: Cultural assessments for current IT organization, Cultural assessment for target IT organization

      Output: Goal for IT culture

      Materials: IT Culture Diagnostic

      Participants: IT executive/CIO, IT senior leadership, IT employees of current organization, IT employees of target organization, Company M&A team

      The purpose of this activity is to assess the different cultures that might exist within the IT environments of the organizations involved. By understanding the culture that exists in the purchasing organization, you can identify the fit and prepare impacted staff for potential changes.

      1. Complete this activity by leveraging the blueprint Fix Your IT Culture, specifically the IT Culture Diagnostic.
      2. Fill out the diagnostic for the IT department in your organization:
        1. Answer the 16 questions in tab 2, Diagnostic.
        2. Find out your dominant culture and review recommendations in tab 3, Results.
      3. Document the results from tab 3, Results, in the M&A Sell Playbook if you are trying to record all artifacts related to the transaction in one place.
      4. Repeat the activity for the purchasing organization.
      5. Leverage the information to determine what the goal for the culture of IT will be post-separation if it will differ from the current culture.

      Record the results in the M&A Sell Playbook.

      Due Diligence & Preparation

      Step 3.2

      Prepare to Separate

      Activities

      • 3.2.1 Create a carve-out roadmap
      • 3.2.2 Prioritize separation tasks
      • 3.2.3 Establish the separation roadmap
      • 3.2.4 Identify the buyer’s IT expectations
      • 3.2.5 Create a service/transaction agreement
      • 3.2.6 Estimate separation costs
      • 3.2.7 Create an employee transition plan
      • 3.2.8 Create functional workplans for employees
      • 3.2.9 Align project metrics with identified tasks

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Transition team
      • Company M&A team
      • Purchasing organization

      Outcomes of Step

      Have an established plan of action toward separation across all domains and a strategy toward resources.

      Don’t underestimate the importance of separation preparation

      Separation involves taking the IT organization and dividing it into two or more separate entities.

      Testing the carve capabilities of the IT organization often takes 3 months. (Source: Cognizant, 2014)

      Daimler-Benz lost nearly $19 billion following its purchase of Chrysler by failing to recognize the cultural differences that existed between the two car companies. (Source: Deal Room)

      Info-Tech Insight

      Separating the IT organization requires more time and effort than business leaders will know. Frequently communicate challenges and lost opportunities when carving the IT environment out.

      Separation needs

      Identify the business objectives of the sale to determine the IT strategy

      Set up a meeting with your IT due diligence team to:

      • Ensure there will be no gaps in the delivery of products and services in the future state.
      • Discuss the people and processes necessary to achieve the target technology environment and support M&A business objectives.

      Use this opportunity to:

      • Identify data and application complexities between the involved organizations.
      • Identify the IT people and process gaps, initiatives, and levels of support expected.
      • Determine your infrastructure needs to ensure effectiveness and delivery of services:
        • Does IT have the infrastructure to support the applications and business capabilities?
        • Identify any gaps between the current infrastructure in both organizations and the infrastructure required.
        • Identify any redundancies/gaps.
        • Determine the appropriate IT separation strategies.
      • Document your gaps, redundancies, initiatives, and assumptions to help you track and justify the initiatives that must be undertaken and help estimate the cost of separation.

      Separation strategies

      There are several IT separation strategies that will let you achieve your target technology environment.

      IT Separation Strategies
      • Divest. Carve out elements of the IT organization and sell them to a purchasing organization with or without a service-level agreement.
      • Sell. Sell the entire IT environment to a purchasing organization. The purchasing organization takes full responsibility in delivering and running the IT environment.
      • Spin-Off Joint Venture. Carve out elements of the IT organization and combine them with elements of a new or purchasing organization to create a new entity.

      The approach IT takes will depend on the business objectives for the M&A.

      • Generally speaking, the separation strategy is well understood and influenced by the frequency of and rationale for selling.
      • Based on the initiatives generated by each business process owner, you need to determine the IT separation strategy that will best support the desired target technology environment, especially if you are still operating or servicing elements of that IT environment.

      Key considerations when choosing an IT separation strategy include:

      • What are the main business objectives of the M&A?
      • What are the key synergies expected from the transaction?
      • What IT separation strategy best helps obtain these benefits?
      • What opportunities exist to position the business for sustainable and long-term growth?

      Separation strategies in detail

      Review highlights and drawbacks of different separation strategies

      Divest
        Highlights
      • Recommended for businesses striving to reduce costs and potentially even generate revenue for the business through the delivery of SLAs.
      • Opportunity to reduce or scale back on lines of business or products that are not driving profits.
        Drawbacks
      • May be forced to give up critical staff that have been known to deliver high value.
      • The IT department is left to deliver services to the purchasing organization with little support or consideration from the business.
      • There can be increased risk and security concerns that need to be addressed.
      Sell
        Highlights
      • Recommended for businesses looking to gain capital to exit the market profitably or to enter a new market with a large sum of capital.
      • The business will no longer exist, and as a result all operational costs, including IT, will become redundant.
        Drawbacks
      • IT is no longer needed as an operating or capital service for the organization.
      • Lost resources, including highly trained and critical staff.
      • May require packaging employees off and using the profit or capital generated to cover any closing costs.
      Spin-Off or Joint Venture
        Highlights
      • Recommended for businesses looking to expand their market presence or acquire new products. Essentially aligning the two organizations in the same market.
      • Each side has a unique offering but complementing capabilities.
        Drawbacks
      • As much as the organization is going through a separation from the original company, it will be going through an integration with the new company.
      • There could be differences in culture.
      • This could require a large amount of investment without a guarantee of profit or success.

      Preparing the carve-out roadmap

      And why it matters so much

      • When carving out the IT environment in preparation for a divestiture, it’s important to understand the infrastructure, application, and data connections that might exist.
      • Much to the business’ surprise, carving out the IT environment is not easy, especially when considering the services and products that might depend on access to certain applications or data sets.
      • Once the business has indicated which elements they anticipate divesting, be prepared for testing the functionality and ability of this carve-out, either through automation or manually. There are benefits and drawbacks to both methods:
        • Automated requires a solution and a developer to code the tests.
        • Manual requires time to find the errors, possibly more time than automated testing.
      • Identify if there are dependencies that will make the carve-out difficult.
        • For example, the business is trying to divest Product X, but that product is integrated with Product Y, which is not being sold.
        • Consider all the processes and products that specific data might support as well.
        • Moreover, the data migration tool will need to enter the ERP system and identify not just the data but all supporting and historical elements that underlie the data.

      Critical components to consider:

      • Selecting manual or automated testing
      • Determining data dependencies
      • Data migration capabilities
      • Auditing approval
      • People and skills that support specific elements being carved out

      3.2.1 Create a carve-out roadmap

      6 hours

      Input: Items included in the carve-out, Dependencies, Whether testing is completed, If the carve-out will pass audit, If the carve-out item is prepared to be separated

      Output: Carve-out roadmap

      Materials: Business’ divestiture plan, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Business leaders, Transition team

      The purpose of this activity is to prepare the IT environment by identifying a carve-out roadmap, specifically looking at data, infrastructure, and applications. Feel free to expand the roadmap to include other categories as your organization sees fit.

      1. In the Carve-Out Roadmap in the M&A Sell Playbook, identify the key elements of the carve-out in the first column.
      2. Note any dependencies the items might have. For example:
        • The business is selling Product X, which is linked to Data X and Data Y. The organization does not want to sell Data Y. Data X would be considered dependent on Data Y.
      3. Once the dependencies have been confirmed, begin automated or manual testing to examine the possibility of separating the data sets (or other dependencies) from one another.
      4. After identifying an acceptable method of separation, inform the auditing individual or body and confirm that there would be no repercussions for the planned process.

      Record the results in the M&A Sell Playbook.

      3.2.2 Prioritize separation tasks

      2 hours

      Input: Separation tasks, Transition team, M&A RACI

      Output: Prioritized separation list

      Materials: Separation task checklist, Separation roadmap

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to prioritize the different separation tasks that your organization has identified as necessary to this transaction. Some tasks might not be relevant for this particular transaction, and others might be critical.

      1. Begin by downloading the SharePoint or Excel version of the M&A Separation Project Management Tool.
      2. Identify which separation tasks you want to have as part of your project plan. Alter or remove any tasks that are irrelevant to your organization. Add in tasks you think are missing.
      3. When deciding criticality of the task, consider the effect on stakeholders, those who are impacted or influenced in the process of the task, and dependencies (e.g. data strategy needs to be addressed first before you can tackle its dependencies, like data quality).
      4. Feel free to edit the way you measure criticality. The standard tool leverages a three-point scale. At the end, you should have a list of tasks in priority order based on criticality.

      Record the updates in the M&A Separation Project Management Tool (SharePoint).

      Record the updates in the M&A Separation Project Management Tool (Excel).

      Separation checklists

      Prerequisite Checklist
      • Build the project plan for separation and prioritize activities
        • Plan first day
        • Plan first 30/100 days
        • Plan first year
      • Create an organization-aligned IT strategy
      • Identify critical stakeholders
      • Create a communication strategy
      • Understand the rationale for the sale or divestiture
      • Develop IT's sale/divestiture strategy
        • Determine goal opportunities
        • Create the mission and vision statements
        • Create the guiding principles
        • Create program metrics
      • Consolidate reports from due diligence/data room
      • Conduct culture assessment
      • Create a transaction team
      • Establish a service/technical transaction agreement
      • Plan and communicate culture changes
      • Create an employee transition plan
      • Assess baseline engagement
      Business
      • Design an enterprise architecture
      • Document your business architecture
      • Meet compliance and regulatory standards
      • Identify and assess all of IT's risks
      Applications
      • Prioritize and address critical applications
        • CRM
        • HRIS
        • Financial
        • Sales
        • Risk
        • Security
        • ERP
        • Email
      • Develop method of separating applications
      • Model critical applications that have dependencies on one another
      • Identify the infrastructure capacity required to support critical applications
      • Prioritize and address critical applications
      Leadership/IT Executive
      • Build an IT budget
      • Structure operating budget
      • Structure capital budget
      • Identify the workforce demand vs. capacity
      • Establish and monitor key metrics
      • Communicate value realized/cost savings
      Data
      • Confirm data strategy
      • Confirm data governance
      • Build a data architecture roadmap
      • Analyze data sources and domains
      • Evaluate data storage (on-premises vs. cloud)
      • Develop an enterprise content management strategy and roadmap
      • Ensure cleanliness/usability of data sets
      • Identify data sets that can remain operational if reduced/separated
      • Develop reporting and analytics capabilities
      • Confirm data strategy
      Operations
      • Manage sales access to customer data
      • Determine locations and hours of operation
      • Separate/terminate phone lists and extensions
      • Split email address books
      • Communicate helpdesk/service desk information

      Separation checklists (continued)

      Infrastructure
      • Manage organization domains
      • Consolidate data centers
      • Compile inventory of vendors, versions, switches, and routers
      • Review hardware lease or purchase agreements
      • Review outsourcing/service provider agreements
      • Review service-level agreements
      • Assess connectivity linkages between locations
      • Plan to migrate to a single email system if necessary
      • Determine network access concerns
      Vendors
      • Establish a sustainable vendor management office
      • Review vendor landscape
      • Identify warranty options
      • Identify the licensing grant
      • Rationalize vendor services and solutions
      People
      • Design an IT operating model
      • Design your future IT organizational structure
      • Conduct a RACI for prioritized activities
      • Conduct a culture assessment and identify goal IT culture
      • Build an IT employee engagement program
      • Determine critical roles and systems/process/products they support
      • Define new job descriptions with meaningful roles and responsibilities
      • Create employee transition plans
      • Create functional workplans
      Projects
      • Identify projects to be on hold
      • Communicate project intake process
      • Reprioritize projects
      Products & Services
      • Redefine service catalog
      • Ensure customer interaction requirements are met
      • Select a solution for product lifecycle management
      • Plan service-level agreements
      Security
      • Conduct a security assessment
      • Develop accessibility prioritization and schedule
      • Establish an information security strategy
      • Develop a security awareness and training program
      • Develop and manage security governance, risk, and compliance
      • Identify security budget
      • Build a data privacy and classification program
      IT Processes
      • Evaluate current process models
      • Determine productivity/capacity levels of processes
      • Identify processes to be changed/terminated
      • Establish a communication plan
      • Develop a change management process
      • Establish/review IT policies
      • Evaluate current process models

      3.2.2 Establish the separation roadmap

      2 hours

      Input: Prioritized separation tasks, Carve-out roadmap, Employee transition plan, Separation RACI, Costs for activities, Activity owners

      Output: Separation roadmap

      Materials: M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel), SharePoint Template: Step-by-Step Deployment Guide

      Participants: IT executive/CIO, IT senior leadership, Transition team, Company M&A team

      The purpose of this activity is to create a roadmap to support IT throughout the separation process. Using the information gathered in previous activities, you can create a roadmap that will ensure a smooth separation.

      1. Use our Separation Project Management Tool to help track critical elements in relation to the separation project. There are a few options available:
        1. Follow the instructions on the next slide if you are looking to upload our SharePoint project template. Additional instructions are available in the SharePoint Template Step-by-Step Deployment Guide.
        2. If you cannot or do not want to use SharePoint as your project management solution, download our Excel version of the tool.
          **Remember that this your tool, so customize to your liking.
      2. Identify who will own or be accountable for each of the separation tasks and establish the time frame for when each project should begin and end. This will confirm which tasks should be prioritized.

      Record the updates in the M&A Separation Project Management Tool (SharePoint).

      Record the updates in the M&A Separation Project Management Tool (Excel).

      Separation Project Management Tool (SharePoint Template)

      Follow these instructions to upload our template to your SharePoint environment

      1. Create or use an existing SP site.
      2. Download the M&A Separation Project Management Tool (SharePoint) .wsp file from the Mergers & Acquisitions: The Sell Blueprint landing page.
      3. To import a template into your SharePoint environment, do the following:
        1. Open PowerShell.
        2. Connect-SPO Service (need to install PowerShell module).
        3. Enter in your tenant admin URL.
        4. Enter in your admin credentials.
        5. Set-SPO Site https://YourDomain.sharepoint.com/sites/YourSiteHe... -DenyAddAndCustomizePages 0
        OR
        1. Turn on both custom script features to allow users to run custom
      4. Screenshot of the 'Custom Script' option for importing a template into your SharePoint environment. Feature description reads 'Control whether users can run custom script on personal sites and self-service created sites. Note: changes to this setting might take up to 24 hours to take effect. For more information, see http://go.microsoft.com/fwlink/?LinkIn=397546'. There are options to prevent or allow users from running custom script on personal/self-service created sites.
      5. Enable the SharePoint Server feature.
      6. Upload the .wsp file in Solutions Gallery.
      7. Deploy by creating a subsite and select from custom options.
        • Allow or prevent custom script
        • Security considerations of allowing custom script
        • Save, download, and upload a SharePoint site as a template
      8. Refer to Microsoft documentation to understand security considerations and what is and isn’t supported:

      For more information, check out the SharePoint Template: Step-by-Step Deployment Guide.

      Supporting the transition and establishing service-level agreements

      The purpose of this part of the transition is to ensure both buyer and seller have a full understanding of expectations for after the transaction.

      • Once the organizations have decided to move forward with a deal, all parties need a clear level of agreement.
      • IT, since it is often seen as an operational division of an organization, is often expected to deliver certain services or products once the transaction has officially closed.
      • The purchasing organization or the new company might depend on IT to deliver these services until they are able to provide those services on their own.
      • Having a clear understanding of what the buyer’s expectations are and what your company, as the selling organization, can provide is important.
      • Have a conversation with the buyer and document those expectations in a signed service agreement.

      3.2.4 Identify the buyer's IT expectations

      3-4 hours

      Input: Carve-out roadmap, Separation roadmap, Up-to-date version of the agreement

      Output: Buyer’s IT expectations

      Materials: Questions for meeting

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Purchasing company M&A team, Purchasing company IT leadership

      The purpose of this activity is to determine if the buyer has specific service expectations for your IT organization. By identifying, documenting, and agreeing on what services your IT organization will be responsible for, you can obtain a final agreement to protect you as the selling organization.

      1. Buyers should not assume certain services will be provided. Organize a meeting with IT leaders and the company M&A teams to determine what services will be provided.
      2. The next slide has a series of questions that you can start from. Ensure you get detailed information about each of the services.
      3. Once you fully understand the buyer’s IT expectations, create an SLA in the next activity and obtain sign-off from both organizations.

      Questions to ask the buyer

      1. What services would you like my IT organization to provide?
      2. How long do you anticipate those services will be provided to you?
      3. How do you expect your staff/employees to communicate requests or questions to my staff/employees?
      4. Are there certain days or times that you expect these services to be delivered?
      5. How many staff do you expect should be available to support you?
      6. What should be the acceptable response time on given service requests?
      7. When it comes to the services you require, what level of support should we provide?
      8. If a service requires escalation to Level 2 or Level 3 support, are we still expected to support this service? Or are we only Level 1 support?
      9. What preventative security methods does your organization have to protect our environment during this agreement period?

      3.2.5 Create a service/ transaction agreement

      6 hours

      Input: Buyer's expectations, Separation roadmap

      Output: SLA for the purchasing organization

      Materials: Service Catalog Internal Service Level Agreement Template, M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel)

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Purchasing company M&A team, Purchasing company IT leadership

      The purpose of this activity is to determine if the buyer has specific service expectations for your IT organization post-transaction that your IT organization is agreeing to provide.

      1. Document the expected services and the related details in a service-level agreement.
      2. Provide the SLA to the purchasing organization.
      3. Obtain sign-off from both organizations on the level of service that is expected of IT.
      4. Update the M&A Separation Project Management Tool Excel or SharePoint document to reflect any additional items that the purchasing organization identified.

      *For organizations being purchased in their entirety, this activity may not be relevant.

      Modify the Service Catalog Internal Service Level Agreement with the agreed-upon terms of the SLA.

      Importance of estimating separation costs

      Change is the key driver of separation costs

      Separation costs are dependent on the following:
      • Meeting synergy targets – whether that be cost saving or growth related.
        • Employee-related costs, licensing, and reconfiguration fees play a huge part in meeting synergy targets.
      • Adjustments related to compliance or regulations – especially if there are changes to legal entities, reporting requirements, or risk mitigation standards.
      • Governance or third party–related support required to ensure timelines are met and the separation is a success.
      Separation costs vary by industry type.
      • Certain industries may have separation costs made up of mostly one type, differing from other industries, due to the complexity and demands of the transaction. For example:
        • Healthcare separation costs are mostly driven by regulatory, safety, and quality standards, as well as consolidation of the research and development function.
        • Energy and Utilities tend to have the lowest separation costs due to most transactions occurring within the same sector rather than as cross-sector investments. For example, oil and gas transactions tend to be for oil fields and rigs (strategic fixed assets), which can easily be added to the buyer’s portfolio.

      Separation costs are more related to the degree of change required than the size of the transaction.

      3.2.6 Estimate separation costs

      3-4 hours

      Input: Separation tasks, Transition team, Valuation of current IT environment, Valuation of target IT environment, Outputs from data room, Technical debt, Employees

      Output: List of anticipated costs required to support IT separation

      Materials: Separation task checklist, Separation roadmap, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to estimate the costs that will be associated with the separation. Identify and communicate a realistic figure to the larger M&A team within your company as early in the process as possible. This ensures that the funding required for the transaction is secured and budgeted for in the overarching transaction.

      1. On the associated slide in the M&A Sell Playbook, input:
        • Task
        • Domain
        • Cost type
        • Total cost amount
        • Level of certainty around the cost
      2. Provide a copy of the estimated costs to the company’s M&A team. Also provide any additional information identified earlier to help them understand the importance of those costs.

      Record the results in the M&A Sell Playbook.

      Employee transition planning

      Considering employee impact will be a huge component to ensure successful separation

      • Meet With Leadership
      • Plan Individual and Department Redeployment
      • Plan Individual and Department Layoffs
      • Monitor and Manage Departmental Effectiveness
      • For employees, the transition could mean:
        • Changing from their current role to a new role to meet requirements and expectations throughout the transition.
        • Being laid off because the role they are currently occupying has been made redundant.
      • It is important to plan for what the M&A separation needs will be and what the IT operational needs will be.
      • A lack of foresight into this long-term plan could lead to undue costs and headaches trying to retain critical staff, rehiring positions that were already let go, and keeping redundant employees longer then necessary.

      Info-Tech Insight

      Being transparent throughout the process is critical. Do not hesitate to tell employees the likelihood that their job may be made redundant. This will ensure a high level of trust and credibility for those who remain with the organization after the transaction.

      3.2.7 Create an employee transition plan

      3-4 hours

      Input: IT strategy, IT organizational design

      Output: Employee transition plans

      Materials: M&A Sell Playbook, Whiteboard, Sticky notes, Markers

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to create a transition plan for employees.

      1. Transition planning can be done at specific individual levels or more broadly to reflect a single role. Consider these four items in the transition plan:
        • Understand the direction of the employee transitions.
        • Identify employees that will be involved in the transition (moved or laid off).
        • Prepare to meet with employees.
        • Meet with employees.
      2. For each employee that will be facing some sort of change in their regular role, permanent or temporary, create a transition plan.
      3. For additional information on transitioning employees, review the blueprint Streamline Your Workforce During a Pandemic.

      **Note that if someone’s future role is a layoff, then there is no need to record anything for skills needed or method for skill development.

      Record the results in the M&A Sell Playbook.

      3.2.8 Create functional workplans for employees

      3-4 hours

      Input: Prioritized separation tasks, Employee transition plan, Separation RACI, Costs for activities, Activity owners

      Output: Employee functional workplans

      Materials: M&A Sell Playbook, Learning and development tools

      Participants: IT executive/CIO, IT senior leadership, IT management team, Company M&A team, Transition team

      The purpose of this activity is to create a functional workplan for the different employees so that they know what their key role and responsibilities are once the transaction occurs.

      1. First complete the transition plan from the previous activity (3.2.7) and the separation roadmap. Have these documents ready to review throughout this process.
      2. Identify the employees who will be transitioning to a new role permanently or temporarily. Creating a functional workplan is especially important for these employees.
      3. Identify the skills these employees need to have to support the separation. Record this in the corresponding slide in the M&A Sell Playbook.
      4. For each employee, identify someone who will be a point of contact for them throughout the transition.

      It is recommended that each employee have a functional workplan. Leverage the IT managers to support this task.

      Record the results in the M&A Sell Playbook.

      Metrics for separation

      Valuation & Due Diligence

      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target

      Execution & Value Realization

      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT separation
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      3.2.9 Align project metrics with identified tasks

      3-4 hours

      Input: Prioritized separation tasks, Employee transition plan, Separation RACI, Costs for activities, Activity owners, M&A goals

      Output: Separation-specific metrics to measure success

      Materials: Separation roadmap, M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Transition team

      The purpose of this activity is to understand how to measure the success of the separation project by aligning metrics to each identified task.

      1. Review the M&A goals identified by the business. Your metrics will need to tie back to those business goals.
      2. Identify metrics that align to identified tasks and measure achievement of those goals. For each metric you consider, ask the following questions:
        • What is the main goal or objective that this metric is trying to solve?
        • What does success look like?
        • Does the metric promote the right behavior?
        • Is the metric actionable? What is the story you are trying to tell with this metric?
        • How often will this get measured?
        • Are there any metrics it supports or is supported by?

      Record the results in the M&A Sell Playbook.

      By the end of this mid-transaction phase you should:

      Have successfully evaluated your IT people, processes, and technology to determine a roadmap forward for separating or selling.

      Key outcomes from the Due Diligence & Preparation phase
      • Participate in due diligence activities to comply with regulatory and auditing standards and prepare employees for the transition.
      • Create a separation roadmap that considers the tasks that will need to be completed and the resources required to support separation.
      Key deliverables from the Due Diligence & Preparation phase
      • Drive value with a due diligence charter
      • Gather data room artifacts
      • Measure staff engagement
      • Assess culture
      • Create a carve-out roadmap
      • Prioritize separation tasks
      • Establish the separation roadmap
      • Identify the buyer’s IT expectations
      • Create a service/transaction agreement
      • Estimate separation costs
      • Create an employee transition plan
      • Create functional workplans for employees
      • Align project metrics with identified tasks

      M&A Sell Blueprint

      Phase 4

      Execution & Value Realization

      Phase 1Phase 2Phase 3

      Phase 4

      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Reduction Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Separation or Sale
      • 3.1 Engage in Due Diligence and Prepare Staff
      • 3.2 Prepare to Separate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Monitor service agreements
      • Continually update the project plan
      • Confirm separation costs
      • Review IT’s transaction value
      • Conduct a transaction and separation SWOT
      • Review the playbook and prepare for future transactions

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Vendor management team
      • IT transaction team
      • Company M&A team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Engage in Separation

      Day 4

      Establish the Transaction FoundationDiscover the Motivation for IntegrationPlan the Separation RoadmapPrepare Employees for the TransitionEngage in SeparationAssess the Transaction Outcomes (Must be within 30 days of transaction date)

      Activities

      • 0.1 Identify the rationale for the company's decision to pursue a divestiture/sale.
      • 0.2 Identify key stakeholders and determine the IT transaction team.
      • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
      • 1.1 Review the business rationale for the divestiture/sale.
      • 1.2 Identify pain points and opportunities tied to the divestiture/sale.
      • 1.3 Establish the separation strategy.
      • 1.4 Create the due diligence charter.
      • 2.1 Prioritize separation tasks.
      • 2.2 Establish the separation roadmap.
      • 2.3 Establish and align project metrics with identified tasks.
      • 2.4 Estimate separation costs.
      • 3.1 Measure staff engagement
      • 3.2 Assess the current culture and identify the goal culture.
      • 3.3 Create an employee transition plan.
      • 3.4 Create functional workplans for employees.
      • S.1 Complete the separation by regularly updating the project plan.
      • S.2 Assess the service/technical transaction agreement.
      • 4.1 Confirm separation costs.
      • 4.2 Review IT’s transaction value.
      • 4.3 Conduct a transaction and separation SWOT.
      • 4.4 Review the playbook and prepare for future transactions.

      Deliverables

      1. IT strategy
      2. IT operating model
      3. IT governance structure
      4. M&A transaction team
      1. Business context implications for IT
      2. Separation strategy
      3. Due diligence charter
      1. Separation roadmap and associated resourcing
      1. Engagement assessment
      2. Culture assessment
      3. Employee transition plans and workplans
      1. Evaluate service/technical transaction agreement
      2. Updated separation project plan
      1. SWOT of transaction
      2. M&A Sell Playbook refined for future transactions

      What is the Execution & Value Realization phase?

      Post-transaction state

      Once the transaction comes to a close, it’s time for IT to deliver on the critical separation tasks. As the selling organization in this transaction, you need to ensure you have a roadmap that properly enables the ongoing delivery of your IT environment while simultaneously delivering the necessary services to the purchasing organization.

      Throughout the separation transaction, some of the most common obstacles IT should prepare for include difficulty separating the IT environment, loss of key personnel, disengaged employees, and security/compliance issues.

      Post-transaction, the business needs to understands the value they received by engaging in the transaction and the ongoing revenue they might obtain as a result of the sale. You also need to ensure that the IT environment is functioning and mitigating any high-risk outcomes.

      Goal: To carry out the planned separation activities and deliver the intended value to the business.

      Execution Prerequisite Checklist

      Before coming into the Execution & Value Realization phase, you must have addressed the following:

      • Understand the rationale for the company's decisions to pursue a sale or divestiture and what opportunities or pain points the sale should alleviate.
      • Identify the key roles for the transaction team.
      • Identify the M&A governance.
      • Determine target metrics.
      • Select a separation strategy framework.
      • Conduct a RACI for key transaction tasks for the transaction team.
      • Create a carve-out roadmap.
      • Prioritize separation tasks.
      • Establish the separation roadmap.
      • Create employee transition plans.

      Before coming into the Execution & Value Realization phase, we recommend addressing the following:

      • Create vision and mission statements.
      • Establish guiding principles.
      • Create a future-state operating model.
      • Identify the M&A operating model.
      • Document the communication plan.
      • Examine the business perspective of IT.
      • Identify key stakeholders and outline their relationship to the M&A process.
      • Establish a due diligence charter.
      • Be able to valuate the IT environment and communicate IT’s value to the business.
      • Gather and present due diligence data room artifacts.
      • Measure staff engagement.
      • Assess and plan for culture.
      • Estimate separation costs.
      • Create functional workplans for employees.
      • Identify the buyer’s IT expectations.
      • Create a service/ transaction agreement.

      Separation checklists

      Prerequisite Checklist
      • Build the project plan for separation and prioritize activities
        • Plan first day
        • Plan first 30/100 days
        • Plan first year
      • Create an organization-aligned IT strategy
      • Identify critical stakeholders
      • Create a communication strategy
      • Understand the rationale for the sale or divestiture
      • Develop IT's sale/divestiture strategy
        • Determine goal opportunities
        • Create the mission and vision statements
        • Create the guiding principles
        • Create program metrics
      • Consolidate reports from due diligence/data room
      • Conduct culture assessment
      • Create a transaction team
      • Establish a service/technical transaction agreement
      • Plan and communicate culture changes
      • Create an employee transition plan
      • Assess baseline engagement
      Business
      • Design an enterprise architecture
      • Document your business architecture
      • Meet compliance and regulatory standards
      • Identify and assess all of IT's risks
      Applications
      • Prioritize and address critical applications
        • CRM
        • HRIS
        • Financial
        • Sales
        • Risk
        • Security
        • ERP
        • Email
      • Develop method of separating applications
      • Model critical applications that have dependencies on one another
      • Identify the infrastructure capacity required to support critical applications
      • Prioritize and address critical applications
      Leadership/IT Executive
      • Build an IT budget
      • Structure operating budget
      • Structure capital budget
      • Identify the workforce demand vs. capacity
      • Establish and monitor key metrics
      • Communicate value realized/cost savings
      Data
      • Confirm data strategy
      • Confirm data governance
      • Build a data architecture roadmap
      • Analyze data sources and domains
      • Evaluate data storage (on-premises vs. cloud)
      • Develop an enterprise content management strategy and roadmap
      • Ensure cleanliness/usability of data sets
      • Identify data sets that can remain operational if reduced/separated
      • Develop reporting and analytics capabilities
      • Confirm data strategy
      Operations
      • Manage sales access to customer data
      • Determine locations and hours of operation
      • Separate/terminate phone lists and extensions
      • Split email address books
      • Communicate helpdesk/service desk information

      Separation checklists (continued)

      Infrastructure
      • Manage organization domains
      • Consolidate data centers
      • Compile inventory of vendors, versions, switches, and routers
      • Review hardware lease or purchase agreements
      • Review outsourcing/service provider agreements
      • Review service-level agreements
      • Assess connectivity linkages between locations
      • Plan to migrate to a single email system if necessary
      • Determine network access concerns
      Vendors
      • Establish a sustainable vendor management office
      • Review vendor landscape
      • Identify warranty options
      • Identify the licensing grant
      • Rationalize vendor services and solutions
      People
      • Design an IT operating model
      • Design your future IT organizational structure
      • Conduct a RACI for prioritized activities
      • Conduct a culture assessment and identify goal IT culture
      • Build an IT employee engagement program
      • Determine critical roles and systems/process/products they support
      • Define new job descriptions with meaningful roles and responsibilities
      • Create employee transition plans
      • Create functional workplans
      Projects
      • Identify projects to be on hold
      • Communicate project intake process
      • Reprioritize projects
      Products & Services
      • Redefine service catalog
      • Ensure customer interaction requirements are met
      • Select a solution for product lifecycle management
      • Plan service-level agreements
      Security
      • Conduct a security assessment
      • Develop accessibility prioritization and schedule
      • Establish an information security strategy
      • Develop a security awareness and training program
      • Develop and manage security governance, risk, and compliance
      • Identify security budget
      • Build a data privacy and classification program
      IT Processes
      • Evaluate current process models
      • Determine productivity/capacity levels of processes
      • Identify processes to be changed/terminated
      • Establish a communication plan
      • Develop a change management process
      • Establish/review IT policies
      • Evaluate current process models

      Execution & Value Realization

      Step 4.1

      Execute the Transaction

      Activities

      • 4.1.1 Monitor service agreements
      • 4.1.2 Continually update the project plan

      This step will walk you through the following activities:

      • Monitor service agreements
      • Continually update the project plan

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Vendor management team
      • IT transaction team
      • Company M&A team

      Outcomes of Step

      Successfully execute the separation of the IT environments and update the project plan, strategizing against any roadblocks as they come.

      Key concerns to monitor during separation

      If you are entering the transaction at this point, consider and monitor the following three items above all else.

      Your IT environment, reputation as an IT leader, and impact on key staff will depend on monitoring these aspects.

      • Risk & Security. Make sure that the channels of communication between the purchasing organization and your IT environment are properly determined and protected. This might include updating or removing employees’ access to certain programs.
      • Retaining Employees. Employees who do not see a path forward in the organization or who feel that their skills are being underused will be quick to move on. Make sure they are engaged before, during, and after the transaction to avoid losing employees.
      • IT Environment Dependencies. Testing the IT environment several times and obtaining sign-off from auditors that this has been completed correctly should be completed well before the transaction occurs. Have a strong architecture outlining technical dependencies.

      For more information, review:

      • Reduce and Manage Your Organization’s Insider Threat Risk
      • Map Technical Skills for a Changing Infrastructure Operations Organization
      • Build a Data Architecture Roadmap

      4.1.1 Monitor service agreements

      3-6 months

      Input: Original service agreement, Risk register

      Output: Service agreement confirmed

      Materials: Original service agreement

      Participants: IT executive/CIO, IT senior leadership, External organization IT senior leadership

      The purpose of this activity is to monitor the established service agreements on an ongoing basis. Your organization is most at risk during the initial months following the transaction.

      1. Ensure the right controls exist to prevent the organization from unnecessarily opening itself up to risks.
      2. Meet with the purchasing organization/subsidiary three months after the transaction to ensure that everyone is satisfied with the level of services provided.
      3. This is not a quick and completed activity, but one that requires ongoing monitoring. Repeatedly identify potential risks worth mitigating.

      For additional information and support for this activity, see the blueprint Build an IT Risk Management Program.

      4.1.2 Continually update the project plan

      Reoccurring basis following transition

      Input: Prioritized separation tasks, Separation RACI, Activity owners

      Output: Updated separation project plan

      Materials: M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel)

      Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team

      The purpose of this activity is to ensure that the project plan is continuously updated as your transaction team continues to execute on the various components outlined in the project plan.

      1. Set a regular cadence for the transaction team to meet, update the project plan, review the status of the various separation task items, and strategize how to overcome any roadblocks.
      2. Employ governance best practices in these meetings to ensure decisions can be made effectively and resources allocated strategically.

      Record the updates in the M&A Separation Project Management Tool (SharePoint).

      Record the updates in the M&A Separation Project Management Tool (Excel).

      Execution & Value Realization

      Step 4.2

      Reflection and Value Realization

      Activities

      • 4.2.1 Confirm separation costs
      • 4.2.2 Review IT’s transaction value
      • 4.2.3 Conduct a transaction and separation SWOT
      • 4.2.4 Review the playbook and prepare for future transactions

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Transition team
      • Company M&A team

      Outcomes of Step

      Review the value that IT was able to generate around the transaction and strategize about how to improve future selling or separating transactions.

      4.2.1 Confirm separation costs

      3-4 hours

      Input: Separation tasks, Carve-out roadmap, Transition team, Previous RACI, Estimated separation costs

      Output: Actual separation costs

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Transaction team, Company M&A team

      The purpose of this activity is to confirm the associated costs around separation. While the separation costs would have been estimated previously, it’s important to confirm the costs that were associated with the separation in order to provide an accurate and up-to-date report to the company’s M&A team.

      1. Taking all the original items identified previously in activity 3.2.6, identify if there were changes in the estimated costs. This can be an increase or a decrease.
      2. Ensure that each cost has a justification for why the cost changed from the original estimation.

      Record the results in the M&A Sell Playbook.

      Track cost savings and revenue generation

      Throughout the transaction, the business would have communicated its goals, rationales, and expectations for the transaction. Sometimes this is done explicitly, and other times the information is implicit. Either way, IT needs to ensure that metrics have been defined and are measuring the intended value that the business expects. Ensure that the benefits realized to the organization are being communicated regularly and frequently.

      1. Define Metrics: Select metrics to track synergies through the separation.
        1. You can track value by looking at percentages of improvement in process-level metrics depending on the savings or revenue being pursued.
        2. For example, if the value being pursued is decreasing costs, metrics could range from capacity to output, highlighting that the output remains high despite smaller IT environments.
      2. Prioritize Value-Driving Initiatives: Estimate the cost and benefit of each initiative's implementation to compare the amount of business value to the cost. The benefits and costs should be illustrated at a high level. Estimating the exact dollar value of fulfilling a synergy can be difficult and misleading.
          Steps
        • Determine the benefits that each initiative is expected to deliver.
        • Determine the high-level costs of implementation (capacity, time, resources, effort).
      3. Track Cost Savings and Revenue Generation: Develop a detailed workplan to resource the roadmap and track where costs are saved and revenue is generated as the initiatives are undertaken.

      4.2.2 Review IT’s transaction value

      3-4 hours

      Input: Prioritized separation tasks, Separation RACI, Activity owners, M&A company goals

      Output: Transaction value

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO, IT senior leadership, Company's M&A team

      The purpose of this activity is to track how your IT organization performed against the originally identified metrics.

      1. If your organization did not have the opportunity to identify metrics, determine from the company M&A what those metrics might be. Review activity 3.2.9 for more information on metrics.
      2. Identify whether the metric (which should support a goal) was at, below, or above the original target metric. This is a very critical task for IT to complete because it allows IT to confirm that they were successful in the transaction and that the business can count on them in future transactions.
      3. Be sure to record accurate and relevant information on why the outcomes (good or bad) are supporting the M&A goals set out by the business.

      Record the results in the M&A Sell Playbook.

      4.2.3 Conduct a transaction and separation SWOT

      2 hours

      Input: Separation costs, Retention rates, Value that IT contributed to the transaction

      Output: Strengths, weaknesses, opportunities, and threats

      Materials: Flip charts, Markers, Sticky notes

      Participants: IT executive/CIO, IT senior leadership, Business transaction team

      The purpose of this activity is to assess the positive and negative elements of the transaction.

      1. Consider the internal and external elements that could have impacted the outcome of the transaction.
        • Strengths. Internal characteristics that are favorable as they relate to your development environment.
        • Weaknesses Internal characteristics that are unfavorable or need improvement.
        • Opportunities External characteristics that you may use to your advantage.
        • Threats External characteristics that may be potential sources of failure or risk.

      Record the results in the M&A Sell Playbook.

      M&A Sell Playbook review

      With an acquisition complete, your IT organization is now more prepared then ever to support the business through future M&As

      • Now that the transaction is more than 80% complete, take the opportunity to review the key elements that worked well and the opportunities for improvement.
      • Critically examine the M&A Sell Playbook your IT organization created and identify what worked well to help the transaction and where your organization could adjust to do better in future transactions.
      • If your organization were to engage in another sale or divestiture under your IT leadership, how would you go about the transaction to make sure the company meets its goals?

      4.2.4 Review the playbook and prepare for future transactions

      4 hours

      Input: Transaction and separation SWOT

      Output: Refined M&A playbook

      Materials: M&A Sell Playbook

      Participants: IT executive/CIO

      The purpose of this activity is to revise the playbook and ensure it is ready to go for future transactions.

      1. Using the outputs from the previous activity, 4.2.3, determine what strengths and opportunities there were that should be leveraged in the next transaction.
      2. Likewise, determine which threats and weaknesses could be avoided in the future transactions.
        Remember, this is your M&A Sell Playbook, and it should reflect the most successful outcome for you in your organization.

      Record the results in the M&A Sell Playbook.

      By the end of this post-transaction phase you should:

      Have completed the separation post-transaction and be fluidly delivering the critical value that the business expected of IT.

      Key outcomes from the Execution & Value Realization phase
      • Ensure the separation tasks are being completed and that any blockers related to the transaction are being removed.
      • Determine where IT was able to realize value for the business and demonstrate IT’s involvement in meeting target goals.
      Key deliverables from the Execution & Value Realization phase
      • Monitor service agreements
      • Continually update the project plan
      • Confirm separation costs
      • Review IT’s transaction value
      • Conduct a transaction and separation SWOT
      • Review the playbook and prepare for future transactions

      Summary of Accomplishment

      Problem Solved

      Congratulations, you have completed the M&A Sell Blueprint!

      Rather than reacting to a transaction, you have been proactive in tackling this initiative. You now have a process to fall back on in which you can be an innovative IT leader by suggesting how and why the business should engage in a separation or sale transaction. You have:

      • Created a standardized approach for how your IT organization should address divestitures or sales.
      • Retained critical staff and complied with any regulations throughout the transaction.
      • Delivered on the separation project plan successfully and communicated IT’s transaction value to the business.

      Now that you have done all of this, reflect on what went well and what can be improved if you were to engage in a similar divestiture or sale again.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information
      workshops@infotech.com 1-888-670-8899

      Research Contributors and Experts

      Ibrahim Abdel-Kader
      Research Analyst | CIO
      Info-Tech Research Group
      Brittany Lutes
      Senior Research Analyst | CIO
      Info-Tech Research Group
      John Annand
      Principal Research Director | Infrastructure
      Info-Tech Research Group
      Scott Bickley
      Principal Research Director | Vendor Management
      Info-Tech Research Group
      Cole Cioran
      Practice Lead | Applications
      Info-Tech Research Group
      Dana Daher
      Research Analyst | Strategy & Innovation
      Info-Tech Research Group
      Eric Dolinar
      Manager | M&A Consulting
      Deloitte Canada
      Christoph Egel
      Director, Solution Design & Deliver
      Cooper Tire & Rubber Company
      Nora Fisher
      Vice President | Executive Services Advisory
      Info-Tech Research Group
      Larry Fretz
      Vice President | Industry
      Info-Tech Research Group

      Research Contributors and Experts

      David Glazer
      Vice President of Analytics
      Kroll
      Jack Hakimian
      Senior Vice President | Workshops and Delivery
      Info-Tech Research Group
      Gord Harrison
      Senior Vice President | Research & Advisory
      Info-Tech Research Group
      Valence Howden
      Principal Research Director | CIO
      Info-Tech Research Group
      Jennifer Jones
      Research Director | Industry
      Info-Tech Research Group
      Nancy McCuaig
      Senior Vice President | Chief Technology and Data Office
      IGM Financial Inc.
      Carlene McCubbin
      Practice Lead | CIO
      Info-Tech Research Group
      Kenneth McGee
      Research Fellow | Strategy & Innovation
      Info-Tech Research Group
      Nayma Naser
      Associate
      Deloitte
      Andy Neill
      Practice Lead | Data & Analytics, Enterprise Architecture
      Info-Tech Research Group

      Research Contributors and Experts

      Rick Pittman
      Vice President | Research
      Info-Tech Research Group
      Rocco Rao
      Research Director | Industry
      Info-Tech Research Group
      Mark Rosa
      Senior Vice President & Chief Information Officer
      Mohegan Gaming and Entertainment
      Tracy-Lynn Reid
      Research Lead | People & Leadership
      Info-Tech Research Group
      Jim Robson
      Senior Vice President | Shared Enterprise Services (retired)
      Great-West Life
      Steven Schmidt
      Senior Managing Partner Advisory | Executive Services
      Info-Tech Research Group
      Nikki Seventikidis
      Senior Manager | Finance Initiative & Continuous Improvement
      CST Consultants Inc.
      Allison Straker
      Research Director | CIO
      Info-Tech Research Group
      Justin Waelz
      Senior Network & Systems Administrator
      Info-Tech Research Group
      Sallie Wright
      Executive Counselor
      Info-Tech Research Group

      Bibliography

      “5 Ways for CIOs to Accelerate Value During Mergers and Acquisitions.” Okta, n.d. Web.

      Altintepe, Hakan. “Mergers and acquisitions speed up digital transformation.” CIO.com, 27 July 2018. Web.

      “America’s elite law firms are booming.” The Economist, 15 July 2021. Web.

      Barbaglia, Pamela, and Joshua Franklin. “Global M&A sets Q1 record as dealmakers shape post-COVID world.” Nasdaq, 1 April 2021. Web.

      Boyce, Paul. “Mergers and Acquisitions Definition: Types, Advantages, and Disadvantages.” BoyceWire, 8 Oct. 2020. Web.

      Bradt, George. “83% Of Mergers Fail -- Leverage A 100-Day Action Plan For Success Instead.” Forbes, 27 Jan. 2015. Web.

      Capgemini. “Mergers and Acquisitions: Get CIOs, IT Leaders Involved Early.” Channel e2e, 19 June 2020. Web.

      Chandra, Sumit, et al. “Make Or Break: The Critical Role Of IT In Post-Merger Integration.” IMAA Institute, 2016. Web.

      Deloitte. “How to Calculate Technical Debt.” The Wall Street Journal, 21 Jan. 2015. Web.

      Ernst & Young. “IT As A Driver Of M&A Success.” IMAA Institute, 2017. Web.

      Fernandes, Nuno. “M&As In 2021: How To Improve The Odds Of A Successful Deal.” Forbes, 23 March 2021. Web.

      “Five steps to a better 'technology fit' in mergers and acquisitions.” BCS, 7 Nov. 2019. Web.

      Fricke, Pierre. “The Biggest Opportunity You’re Missing During an M&Aamp; IT Integration.” Rackspace, 4 Nov. 2020. Web.

      Garrison, David W. “Most Mergers Fail Because People Aren't Boxes.” Forbes, 24 June 2019. Web.

      Harroch, Richard. “What You Need To Know About Mergers & Acquisitions: 12 Key Considerations When Selling Your Company.” Forbes, 27 Aug. 2018. Web.

      Hope, Michele. “M&A Integration: New Ways To Contain The IT Cost Of Mergers, Acquisitions And Migrations.” Iron Mountain, n.d. Web.

      “How Agile Project Management Principles Can Modernize M&A.” Business.com, 13 April 2020. Web.

      Hull, Patrick. “Answer 4 Questions to Get a Great Mission Statement.” Forbes, 10 Jan. 2013. Web.

      Kanter, Rosabeth Moss. “What We Can Learn About Unity from Hostile Takeovers.” Harvard Business Review, 12 Nov. 2020. Web.

      Koller, Tim, et al. “Valuation: Measuring and Managing the Value of Companies, 7th edition.” McKinsey & Company, 2020. Web.

      Labate, John. “M&A Alternatives Take Center Stage: Survey.” The Wall Street Journal, 30 Oct. 2020. Web.

      Lerner, Maya Ber. “How to Calculate ROI on Infrastructure Automation.” DevOps.com, 1 July 2020. Web.

      Loten, Angus. “Companies Without a Tech Plan in M&A Deals Face Higher IT Costs.” The Wall Street Journal, 18 June 2019. Web.

      Low, Jia Jen. “Tackling the tech integration challenge of mergers today” Tech HQ, 6 Jan. 2020. Web.

      Lucas, Suzanne. “5 Reasons Turnover Should Scare You.” Inc. 22 March 2013. Web.

      “M&A Trends Survey: The future of M&A. Deal trends in a changing world.” Deloitte, Oct. 2020. Web.

      Maheshwari, Adi, and Manish Dabas. “Six strategies tech companies are using for successful divesting.” EY, 1 Aug. 2020. Web.

      Majaski, Christina. “Mergers and Acquisitions: What's the Difference?” Investopedia, 30 Apr. 2021.

      “Mergers & Acquisitions: Top 5 Technology Considerations.” Teksetra, 21 Jul. 2020. Web.

      “Mergers Acquisitions M&A Process.” Corporate Finance Institute, n.d. Web.

      “Mergers and acquisitions: A means to gain technology and expertise.” DLA Piper, 2020. Web.

      Nash, Kim S. “CIOs Take Larger Role in Pre-IPO Prep Work.” The Wall Street Journal, 5 March 2015. Web.

      O'Connell, Sean, et al. “Divestitures: How to Invest for Success.” McKinsey, 1 Aug. 2015. Web

      Paszti, Laila. “Canada: Emerging Trends In Information Technology (IT) Mergers And Acquisitions.” Mondaq, 24 Oct. 2019. Web.

      Patel, Kiison. “The 8 Biggest M&A Failures of All Time” Deal Room, 9 Sept. 2021. Web.

      Peek, Sean, and Paula Fernandes. “What Is a Vision Statement?” Business News Daily, 7 May 2020. Web.

      Ravid, Barak. “How divestments can re-energize the technology growth story.” EY, 14 July 2021. Web.

      Ravid, Barak. “Tech execs focus on growth amid increasingly competitive M&A market.” EY, 28 April 2021. Web.

      Resch, Scott. “5 Questions with a Mergers & Acquisitions Expert.” CIO, 25 June 2019. Web.

      Salsberg, Brian. “Four tips for estimating one-time M&A integration costs.” EY, 17 Oct. 2019. Web.

      Samuels, Mark. “Mergers and acquisitions: Five ways tech can smooth the way.” ZDNet, 15 Aug. 2018. Web.

      “SAP Divestiture Projects: Options, Approach and Challenges.” Cognizant, May, 2014. Web.

      Steeves, Dave. “7 Rules for Surviving a Merger & Acquisition Technology Integration.” Steeves and Associates, 5 Feb. 2020. Web.

      Tanaszi, Margaret. “Calculating IT Value in Business Terms.” CSO, 27 May 2004. Web.

      “The CIO Playbook. Nine Steps CIOs Must Take For Successful Divestitures.” SNP, 2016. Web.

      “The Role of IT in Supporting Mergers and Acquisitions.” Cognizant, Feb. 2015. Web.

      Torres, Roberto. “M&A playbook: How to prepare for the cost, staff and tech hurdles.” CIO Dive, 14 Nov. 2019. Web.

      “Valuation Methods.” Corporate Finance Institute, n.d. Web.

      Weller, Joe. “The Ultimate Guide to the M&A Process for Buyers and Sellers.” Smartsheet, 16 May 2019. Web.

      2022 Tech Trends

      • Buy Link or Shortcode: {j2store}94|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • The post-pandemic workplace continues to shift and requires collaboration between remote workers and office workers.
      • Digital transformation has accelerated across every organization and CIOs must maneuver to keep pace.
      • Customer expectations have shifted, and spending habits are moving away from in-person activities to online.
      • IT must improve its maturity in key capabilities to maintain relevance in the organization.

      Our Advice

      Critical Insight

      • Improve the capabilities that matter. Focus on IT capabilities that are most relevant to competing in the digital economy and will enable the CEO's mission for growth.
      • Assess how external environment presents opportunities or threats to your organization using a scenarios approach, then chart a plan.

      Impact and Result

      • Use the data and analysis from Info-Tech's 2022 Tech Trends report to inform your digital strategic plan.
      • Discover the five trends shaping IT's path in 2022 and explore use cases for emerging technologies.
      • Hear directly from leading subject matter experts on each trend with featured episodes from our Tech Insights podcast.

      2022 Tech Trends Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. 2022 Tech Trends Report – A deck that discusses five use cases that can improve on your organization’s ability to compete in the digital economy.

      The post-pandemic pace of change continues to accelerate as the economic rapidly becomes more digital. To keep pace with shifting consumer expectations, CIOs must help the CEO compete in the digital economy by focusing on five key capabilities: innovation, human resources management, data architecture, security strategy, and business process controls and internal audit. Raising maturity in these capabilities will help CIOs deliver on opportunities to streamline back-office processes and develop new lines of revenue.

      • 2022 Tech Trends Report

      Infographic

      Further reading

      2022 Tech Trends

      Enabling the digital economy

      Supporting the CEO for growth

      The post-pandemic pace of change

      The disruptions to the way we work caused by the pandemic haven’t bounced back to normal.

      As part of its research process for the 2022 Tech Trends Report, Info-Tech Research Group conducted an open online survey among its membership and wider community of professionals. The survey was fielded from August 2021 through to September 2021, collecting 475 responses. We asked some of the same questions as last year’s survey so we can compare results as well as new questions to explore new trends.

      How much do you expect your organization to change permanently compared to how it was operating before the pandemic?

      • 7% – No change. We'll keep doing business as we always have.
      • 33% – A bit of change. Some ways of working will shift long term
      • 47% – A lot of change. The way we work will be differ in many ways long term. But our business remains...
      • 13% – Transformative change. Our fundamental business will be different and we'll be working in new ways.

      This year, about half of IT professionals expect a lot of change to the way we work and 13% expect a transformative change with a fundamental shift in their business. Last year, the same percentage expected a lot of change and only 10% expected transformative change.

      30% more professionals expect transformative permanent change compared to one year ago.

      47% of professionals expect a lot of permanent change; this remains the same as last year. (Info-Tech Tech Trends 2022 Survey)

      The pandemic accelerated the speed of digital transformation

      With the massive disruption preventing people from gathering, businesses shifted to digital interactions with customers.

      A visualization of the growth of 'Global average share of customer interactions that are digital' from December 2019 to July 2020. In that time it went from 36% to 58% with an 'Acceleration of 3 years'.

      Companies also accelerated the pace of creating digital or digitally enhanced products and services.

      A visualization of the growth of 'Global average share of partially or fully digitized products and/or services' from December 2019 to July 2020. In that time it went from 35% to 55% with an 'Acceleration of 7 years'. (McKinsey, 2020)

      “The Digital Economy incorporates all economic activity reliant on or significantly enhanced by the use of digital inputs, including digital technologies, digital infrastructure, digital services and data.” (OECD Definition)

      IT must enable participation in the digital economy

      Consumer spending is tilting more digital.

      Consumers have cut back spending on sectors where purchases are mostly made offline. That spending has shifted to digital services and online purchases. New habits formed during the pandemic are likely to stick for many consumers, with a continued shift to online consumption for many sectors.

      Purchases on online platforms are projected to rise from 10% today to 33% by 2030.

      Estimated online share of consumption
      Recreation & culture 30%
      Restaurants & hotels 50%
      Transport 10%
      Communications 90%
      Education 50%
      Health 20%
      Housing & utilities 50%
      (HSBC, 2020)

      Changing customer expectations pose a risk.

      IT practitioners agree that customer expectations are changing. They expect this to be more likely to disrupt their business in the next 12 months than new competition, cybersecurity incidents, or government-enacted policy changes.

      Factors likely to disrupt business in next 12 months
      Government-enacted policy changes 22%
      Cybersecurity incidents 56%
      Regulatory changes 45%
      Established competitor wins 26%
      New player enters the market 23%
      Changing customer expectations 68%
      (Info-Tech Tech Trends 2022 Survey)

      This poses a challenge to IT departments below the “expand” level of maturity

      CIOs must climb the maturity ladder to help CEOs drive growth.

      Most IT departments rated their maturity in the “optimize” or “support” level on Info-Tech’s maturity ladder.

      CIOs at the “optimize” level can play a role in digital transformation by improving back-office processes but should aim for a higher mandate.

      CIOs achieving at the “expand” level can help directly improve revenues by improving customer-facing products and services, and those at the “transform” level can help fundamentally change the business to create revenue in new ways. CIOs can climb the maturity ladder by enabling new digital capabilities.

      Maturity is heading in the wrong direction.

      Only half of IT practitioners described their department’s maturity as “transform” compared to last year’s survey, and more than twice the number rated themselves as “struggle.”

      A colorful visualization of the IT 'Maturity Ladder' detailing levels of IT function within an organization. Percentages represent answers from IT practitioners to an Info-Tech survey about the maturity level of their company. Starting from the bottom: 13% answered 'Struggle', compared to 6% in 2020; 35% answered 'Support'; 37% answered 'Optimize'; 12% answered 'Expand'; and only 3% answered 'Transform', compared to 6% in 2020.

      48% rate their IT departments as low maturity.

      Improve maturity by focusing on key capabilities to compete in the digital economy

      Capabilities to unlock digital

      Innovation: Identify innovation opportunities and plan how to use technology innovation to create a competitive advantage or achieve improved operational effectiveness and efficiency.

      Human Resources Management: Provide a structured approach to ensure optimal planning, evaluation, and development of human resources.

      Data Architecture: Manage the business’ data stores, including technology, governance, and people that manage them. Establish guidelines for the effective use of data.

      Security Strategy: Define, operate, and monitor a system for information security management. Keep the impact and occurrence of information security incidents within risk appetite levels.

      Business Process Controls and Internal Audit: Manage business process controls such as self-assessments and independent assurance reviews to ensure information related to and used by business processes meets security and integrity requirements. (ISACA, 2020)

      A periodic table-esque arrangement of Info-Tech tools and templates titled 'IT Management and Governance Framework', subtitled 'A comprehensive and connected set of research to help you optimize and improve your core IT processes', and anchored by logos for Info-Tech and COBIT. Color-coded sections with highlighted tools or templates are: 'Strategy and Governance' with 'APO04 Innovation' highlighted; 'People and Resources' with 'APO07 Human Resources Management' highlighted; 'Security and Risk' with 'APO13 Security Strategy' and 'DSS06 MEA02 Business Process Controls and Internal Audit' highlighted; 'Data and BI' with 'ITRG07 Data Architecture' highlighted. Other sections are 'Financial Management', 'Service planning and architecture', 'Infrastructure and operations', 'Apps', and 'PPM and projects'.

      5 Tech Trends for 2022

      In this report, we explore five use cases for emerging technology that can improve on capabilities needed to compete in the digital economy. Use cases combine emerging technologies with new processes and strategic planning.

      DIGITAL ECONOMY

      TREND 01 | Human Resources Management

      HYBRID COLLABORATION
      Provide a digital employee experience that is flexible, contextual, and free from the friction of hybrid operating models.

      TREND 02 | Security Strategy

      BATTLE AGAINST RANSOMWARE
      Prevent ransomware infections and create a response plan for a worst-case scenario. Collaborate with relevant external partners to access resources and mitigate risks.

      TREND 03 | Business Process Controls and Internal Audit

      CARBON METRICS IN ENERGY 4.0
      Use internet of things (IoT) and auditable tracking to provide insight into business process implications for greenhouse gas emissions.

      TREND 04 | Data Architecture

      INTANGIBLE VALUE CREATION
      Provide governance around digital marketplace and manage implications of digital currency. Use blockchain technology to turn unique intellectual property into saleable digital products

      TREND 05 | Innovation

      AUTOMATION AS A SERVICE
      Automate business processes and access new sophisticated technology services through platform integration.

      Hybrid Collaboration

      TREND 01 | HUMAN RESOURCES MANAGEMENT

      Provide a digital employee experience that is flexible, contextual, and free from the friction of hybrid operating models.

      Emerging technologies:
      Intelligent conference rooms; intelligent workflows, platforms

      Introduction

      Hybrid work models enable productive, diverse, and inclusive talent ecosystems necessary for the digital economy.

      Hybrid work models have become the default post-pandemic work approach as most knowledge workers prefer the flexibility to choose whether to work remotely or come into the office. CIOs have an opportunity lead hybrid work by facilitating collaboration between employees mixed between meeting at the office and virtually.

      IT departments rose to the challenge to quickly facilitate an all-remote work scenario for their organizations at the outset of the pandemic. Now they must adapt again to facilitate the hybrid work model, which brings new friction to collaboration but also new opportunities to hire a talented, engaged, and diverse workforce.

      79% of organizations will have a mix of workers in the office and at home. (Info-Tech Tech Trends 2022 Survey)

      35% view role type as a determining factor in the feasibility of the hybrid work model.

      Return-to-the-office tensions

      Only 18% of employees want to return to the office full-time.

      But 70% of employers want people back in the office. (CNBC, April 2021)

      Signals

      IT delivers the systems needed to make the hybrid operating model a success.

      IT has an opportunity to lead by defining the hybrid operating model through technology that enables collaboration. To foster collaboration, companies plan to invest in the same sort of tools that helped them cope during the pandemic.

      As 79% of organizations envision a hybrid model going forward, investments into hybrid work tech stacks – including web conferencing tools, document collaboration tools, and team workspaces – are expected to continue into 2022.

      Plans for future investment in collaboration technologies

      Web Conferencing 41%
      Document Collaboration and Co-Authoring 39%
      Team Workspaces 38%
      Instant Messaging 37%
      Project and Task Management Tools 36%
      Office Meeting Room Solutions 35%
      Virtual Whiteboarding 30%
      Intranet Sites 21%
      Enterprise Social Networking 19%
      (Info-Tech Tech Trends 2022 Survey)

      Drivers

      COVID-19

      Vaccination rates around the world are rising and allowing more offices to welcome back workers because the risk of COVID-19 transmission is reduced and jurisdictions are lifting restrictions limiting gatherings.

      Worker satisfaction

      Most workers don't want to go to the office full-time. In a Bloomberg poll (2021), almost half of millennial and Gen Z workers say they would quit their job if not given an option to work remotely.

      IT spending

      Companies are investing more into IT budgets to find ways to support a mix of remote work and in-office resources to cope with work disruption. This extra spending is offset in some cases by companies saving money from having employees work from home some portion of the time. (CIO Dive, 2021)

      Risks and Benefits

      Benefits

      Flexibility Employees able to choose between working from home and working in the office have more control over their work/life balance.
      Intelligence Platforms that track contextual work relationships can accelerate workflows through smart recommendations that connect people at the right time, in the right place.
      Talent Flexible work arrangements provide businesses with access to the best talent available around the world and employees with more career options as they work from a home office (The Official Microsoft Blog, 2021).

      Risks

      Uncertainty The pandemic lacks a clear finish line and local health regulations can still waver between strict control of movement and open movement. There are no clear assurances of what to expect for how we'll work in the near future.
      FOMO With some employees going back to the office while others remain at home, employee bases could be fractured along the lines of those seeing each other in person every day and those still connecting by videoconference.
      Complexity Workers may not know in advance whether they're meeting certain people in person or online, or a mix of the two. They'll have to use technology on the fly to try and collaborate across a mixed group of people in the office and people working remotely (McKinsey Quarterly, 2021).

      “We have to be careful what we automate. Do we want to automate waste? If a company is accustomed to having a ton of meetings and their mode in the new world is to move that online, what are you going to do? You're going to end up with a lot of fatigue and disenchantment…. You have to rethink your methods before you think about the automation part of it." (Vijay Sundaram, Chief Strategy Officer, Zoho)

      Photo of Vijay Sundaram, Chief strategy officer, Zoho.

      Listen to the Tech Insights podcast: Unique approach to hybrid collaboration

      Case Study: Zoho

      Situation

      Zoho Corp. is a cloud software firm based in Chennai, India. It develops a wide range of cloud software, including enterprise collaboration software and productivity tools. Over the past decade, Zoho has used flexible work models to grant remote work options to some employees.

      When the coronavirus pandemic hit, not only did the office have to shut down but also many employees had to relocate back with families in rural areas. The human costs of the pandemic experienced by staff required Zoho to respond by offering counseling services and material support to employees.

      Complication

      Zoho prides itself as an employee-centric company and views its culture as a community that's purpose goes beyond work. That sense of community was lost because of the disruption caused by the pandemic. Employees lost their social context and their work role models. Zoho had to find a way to recreate that without the central hub of the office or find a way to work with the limitations of it not being possible.

      Resolution

      To support employees in rural settings, Zoho sent out phones to provide redundant bandwidth. As lockdowns in India end, Zoho is taking a flexible approach and giving employees the option to come to the office. It's seeing more people come back each week, drawn by the strong community.

      Zoho supports the hybrid mix of workers by balancing synchronous and asynchronous collaboration. It holds meetings when absolutely necessary through tools like Zoho Meet but tries to keep more work context to asynchronous collaboration that allows people to complete tasks quickly and move on. Its applications are connected to a common platform that is designed to facilitate workflows between employees with context and intelligence. (Interview with Vijay Sundaram, Chief Strategy Officer, Zoho)

      “We tend to think of it on a continuum of synchronous to asynchronous work collaboration. It’s become the paramount norm for so many different reasons…the point is people are going to work at different times in different locations. So how do we enable experiences where everyone can participate?" (Jason Brommet, Head of Modern Work and Security Business Group at Microsoft)

      Photo of Jason Brommet, Head of Modern Work and Security Business Group at Microsoft.

      Listen to the Tech Insights podcast: Microsoft on the ‘paradox of hybrid work’

      Case Study: Microsoft

      Situation

      Before the pandemic, only 18% of Microsoft employees were working remotely. As of April 1, 2020, they were joined by the other 82% of non-essential workers at the company in working remotely.

      As with its own customers, Microsoft used its own software to enable this new work experience, including Microsoft Teams for web conferencing and instant messaging and Office 365 for document collaboration. Employees proved just as productive getting their work done from home as they were working in the office.

      Complication

      At Microsoft, the effects of firm-wide remote work changed the collaboration patterns of the company. Even though a portion of the company was working remotely before the pandemic, the effects of everyone working remotely were different. Employees collaborated in a more static and siloed way, focusing on scheduled meetings with existing relationships. Fewer connections were made with more disparate parts of the organization. There was also a decrease in synchronous communication and an increase in asynchronous communication.

      Resolution

      Microsoft is creating new tools to break down the silos in organizations that are grappling with hybrid work challenges. For example, Viva Insights is designed to inform workers about their collaboration habits with analytics. Microsoft wants to provide workers with insights on their collaborative networks and whether they are creating new connections or deepening existing connections. (Interview with Jason Brommet, Head of Modern Work and Security Business Group, Microsoft; Nature Human Behaviour, 2021)

      What's Next?

      Distributed collaboration space:

      International Workplace Group says that more companies are taking advantage of its full network deals on coworking spaces. Companies such as Standard Charter are looking to provide their workers with a happy compromise between working from home and making the commute all the way to the central office. The hub-and-spoke model gives employees the opportunity to work near home and looks to be part of the hybrid operating model mix for many companies. (Interview with Wayne Berger, CEO of IWG Canada & Latin America)

      Optimized hybrid meetings:

      Facilitating hybrid meetings between employees grouped in the office and remote workers will be a major pain point. New hybrid meeting solutions will provide cameras embedded with intelligence to put boardroom participants into independent video streams. They will also focus on making connecting to the same meeting from various locations as convenient as possible and capture clear and crisp audio from each speaker.

      Uncertainties

      Mix between office and remote work:

      It's clear we're not going to work the way we used to previously with central work hubs, but full-on remote work isn't the right path forward either. A new hybrid work model is emerging, and organizations are experimenting to find the right approach.

      Attrition:

      Between April and September 2021, 15 million US workers quit their jobs, setting a record pace. Employees seek a renewed sense of purpose in their work, and many won’t accept mandates to go back to the office. (McKinsey, 2021)

      Equal footing in meetings:

      What are the new best practices for conducting an effective meeting between employees in the office and those who are remote? Some companies ask each employee to connect via a laptop. Others are using conference rooms with tech to group in-office workers together and connect them with remote workers.

      Hybrid Collaboration Scenarios

      Organizations can plan their response to the hybrid work context by plotting their circumstances across two continuums: synchronous to asynchronous collaboration approach and remote work to central hub work model.

      A map of hybrid collaboration scenarios with two axes representing 'Work Context, From all remote work to gathering in a central hub' and 'Collaboration Style, From collaborating at the same time to collaborating at different times'. The axes split the map into quarters. 'Work Context' ranges from 'Remote Work' on the left to 'Central Hub' on the right. 'Collaboration Style' ranges from 'Synchronous' on top to 'Asynchronous' on bottom. The top left quarter, synchronous remote work, reads 'Virtual collective collaboration via videoconference and collaboration software, with some workers meeting in coworking spaces.' The top right quarter, synchronous central hub, reads 'In-person collective collaboration in the office.' The bottom left quarter, asynchronous remote work, reads 'Virtual group collaboration via project tracking tools and shared documents.' The bottom right quarter, asynchronous central hub, reads 'In-person group collaboration in coworking spaces and the main office.'

      Recommendations

      Rethink technology solutions. Don't expect your pre-pandemic videoconference rooms to suffice. And consider how to optimize your facilities and infrastructure for hot-desking scenarios.

      Optimize remote work. Shift from the collaboration approach you put together just to get by to the program you'll use to maximize flexibility.

      Enable effective collaboration. Enable knowledge sharing no matter where and when your employees work and choose the best collaboration software solutions for your scenario.

      Run better meetings. Successful hybrid workplace plans must include planning around hybrid meetings. Seamless hybrid meetings are the result of thoughtful planning and documented best practices.

      89% of organizations invested in web conferencing technology to facilitate better collaboration, but only 43% invested in office meeting room solutions. (Info-Tech Tech Trends 2022 Survey)

      Info-Tech Resources

      Battle Against Ransomware

      TREND 02 | SECURITY STRATEGY

      Prevent ransomware infections and create a response plan for a worst-case scenario. Collaborate with relevant external partners to access resources and mitigate risks.

      Emerging technologies:
      Open source intelligence; AI-powered threat detection

      “It has been a national crisis for some time…. For every [breach] that hits the news there are hundreds that never make it.” (Steve Orrin, Federal Chief Technology Officer, Intel)

      Photo of Steve Orrin, Federal Chief Technology Officer, Intel.

      Listen to the Tech Insights podcast: Ransomware crisis and AI in military

      Introduction

      Between 2019 and 2020, ransomware attacks rose by 62% worldwide and by 158% in North America. (PBS NewsHour, 2021)

      Security strategies are crucial for companies to control access to their digital assets and confidential data, providing it only to the right people at the right time. Now security strategies must adapt to a new caliber of threat in ransomware to avoid operational disruption and reputational damage.

      In 2021, ransomware attacks exploiting flaws in widely used software from vendors Kaseya, SolarWinds, and Microsoft affected many companies and saw record-breaking ransomware payments made to state-sponsored cybercriminal groups.

      After a ransomware attack caused Colonial Pipeline to shut down its pipeline operations across the US, the ransomware issue became a topic of federal attention with executives brought before Senate committees. A presidential task force to combat ransomware was formed.

      62% of IT professionals say they are more concerned about being a victim of ransomware than they were one year ago. (Info-Tech Tech Trends 2022 Survey)

      $70 million demanded by REvil gang in ransom to unlock firms affected by the Kaseya breach. (TechRadar, 2021)

      Signals

      Organizations are taking a multi-faceted approach to preparing for the event of a ransomware breach.

      The most popular methods to prepare for ransomware are to buy an insurance policy or create offline backups and redundant systems. Few are making an effort to be aware of free decryption tools, and only 2% admit to budgeting to pay ransoms.

      44% of IT professionals say they spent time and money specifically to prevent ransomware over the past year. (Info-Tech Tech Trends 2022 Survey)

      Approaches to prepare for ransomware

      Kept aware of free decryption tools available 9%
      Set aside budget to pay ransoms 2%
      Designed network to contain ransomware 24%
      Implemented technology to eradicate ransomware 36%
      Created a specific incident response plan for ransomware 26%
      Created offline backups and redundant systems 41%
      Purchased insurance covering cyberattacks 47%

      (Info-Tech Tech Trends 2022 Survey)

      Drivers

      National security concerns

      Attacks on US infrastructure and government agencies have prompted the White House to treat ransomware as a matter of national security. The government stance is that Russia supports the attacks. The US is establishing new mechanisms to address the threat. Plans include new funding to support ransomware response, a mandate for organizations to report incidents, and requirements for organizations to consider the alternatives before paying a ransom. (Institute for Security and Technology, 2021)

      Advice from cybersecurity insurance providers

      Increases in ransom payouts have caused cybersecurity insurance providers to raise premiums and put in place more security requirements for policyholders to try and prevent ransomware infection. However, when clients are hit with ransomware, insurance providers advise to pay the ransom as it's usually the cheapest option. (ProPublica, 2019)

      Reputational damage

      Ransomware attacks also often include a data breach event with hackers exfiltrating the data before encrypting it. Admitting a breach to customers can seriously damage an organization's reputation as trustworthy. Organizations may also be obligated to pay for credit protection of their customers. (Interview with Frank Trovato, Research Director – Infrastructure, Info-Tech Research Group)

      Risks and Benefits

      Benefits

      Privacy Protecting personal data from theft improves people’s confidence that their privacy is being respected and they are not at risk of identity theft.
      Productivity Ransomware can lock out employees from critical work systems and stop them from being able to complete their tasks.
      Access Ransomware has prevented public access to transportation, healthcare, and any number of consumer services for days at a time. Ransomware prevention ensures public service continuity.

      Risks

      Expenses Investing in cybersecurity measures to protect against attacks is becoming more expensive, and recently cybersecurity insurance premiums have gone up in response to expensive ransoms.
      Friction More security requirements could create friction between IT priorities and business priorities in trying to get work done.
      Stability If ransomware attacks become worse or cybercriminals retaliate for not receiving payments, people could find their interactions with government services and commercial services are disrupted.

      Case Study: Victim to ransomware

      Situation

      In February 2020, a large organization found a ransomware note on an admin’s workstation. They had downloaded a local copy of the organization’s identity management database for testing and left a port open on their workstation. Hackers exfiltrated it and encrypted the data on the workstation. They demanded a ransom payment to decrypt the data.

      Complication

      Because private information of employees and customers was breached, the organization decided to voluntarily inform the state-level regulator. With 250,000 accounts affected, plans were made to require password changes en masse. A public announcement was made two days after the breach to ensure that everyone affected could be reached.

      The organization decided not to pay the ransom because it didn’t need the data back, since it had a copy on an unaffected server.

      Resolution

      After a one-day news cycle for the breach, the story about the ransom was over. The organization also received praise for handling the situation well and quickly informing stakeholders.

      The breach motivated the organization to put more protections in place. It implemented a deny-by-default network and turned off remote desktop protocol and secure shell. It mandated multi-factor authentication and put in a new endpoint-detection and response system. (Interview with CIO of large enterprise)

      What's Next

      AI for cybersecurity:

      New endpoint protections using AI are being deployed to help defend against ransomware and other cybersecurity intrusions. The solutions focus on the prevention and detection of ransomware by learning about the expected behavior of an environment and then detecting anomalies that could be attack attempts. This type of approach can be applied to everything from reading the contents of an email to helping employees detect phishing attempts to lightweight endpoint protection deployed to an Internet of Things device to detect an unusual connection attempt.

      Unfortunately, AI is a tool available to both the cybersecurity industry and hackers. Examples of hackers tampering with cybersecurity AI to bypass it have already surfaced. (Forbes, 23 Sept. 2021)

      Uncertainties

      Government response:

      In the US, the Ransomware Task Force has made recommendations to the government but it's not clear whether all of them will be followed. Other countries such as Russia are reported to be at least tolerating ransomware operations if not supporting them directly with resources.

      Supply chain security:

      Sophisticated attacks using zero-day exploits in widely used software show that organizations simply can't account for every potential vulnerability.

      Arms escalation:

      The ransomware-as-a-service industry is doing good business and finding new ways to evade detection by cybersecurity vendors. New detection techniques involving AI are being introduced by vendors, but will it just be another step in the back-and-forth game of one-upmanship? (Interview with Frank Trovato)

      Battle Against Ransomware Scenarios

      Determine your organization’s threat profile for ransomware by plotting two variables: the investment made in cybersecurity and the sophistication level of attacks that you should be prepared to guard against.

      A map of Battle Against Ransomware scenarios with two axes representing 'Attack Sophistication, From off-the-shelf, ransomware-as-a-service kits to state-sponsored supply chain attacks' and 'Investment in Cybersecurity, From low, minimal investment to high investment for a multi-layer approach.'. The axes split the map into quarters. 'Attack Sophistication' ranges from 'Ransomware as a Service' on the left to 'State-Sponsored' on the right. 'Investment in Cybersecurity' ranges from 'High' on top to 'Low' on bottom. The top left quarter, highly invested ransomware as a service, reads 'Organization is protected from most ransomware attacks and isn’t directly targeted by state-sponsored attacks.' The top right quarter, highly invested state-sponsored, reads 'Organization is protected against most ransomware attacks but could be targeted by state-sponsored attacks if considered a high-value target.' The bottom left quarter, low investment ransomware as a service, reads 'Organization is exposed to most ransomware attacks and is vulnerable to hackers looking to make a quick buck by casting a wide net.' The bottom right quarter, low investment state-sponsored, reads 'Organization is exposed to most ransomware attacks and risks being swept up in a supply chain attack by being targeted or as collateral damage.'

      Recommendations

      Create a ransomware incident response plan. Assess your current security practices and identify gaps. Quantify your ransomware risk to prioritize investments and run tabletop planning exercises for ransomware attacks.

      Reduce your exposure to ransomware. Focus on securing the frontlines by improving phishing awareness among staff and deploying AI tools to help flag attacks. Use multi-factor authentication. Take a zero-trust approach and review your use of RDP, SSH, and VPN.

      Require security in contracts. Security must be built into vendor contracts. Government contracts are now doing this, elevating security to the same level as functionality and support features. This puts money incentives behind improving security. (Interview with Intel Federal CTO Steve Orrin)

      42% of IT practitioners feel employees must do much more to help defend against ransomware. (Info-Tech Tech Trends 2022 Survey)

      Info-Tech Resources

      Carbon Metrics in Energy 4.0

      TREND 03 | BUSINESS PROCESS CONTROLS AND INTERNAL AUDIT

      Use Internet of Things (IoT) and auditable tracking to provide insight into business process implications for greenhouse gas emissions.

      Emerging technologies:
      IoT

      Introduction

      Making progress towards a carbon-neutral future.

      A landmark report published in 2021 by the United Nations Intergovernmental Panel on Climate Change underlines that human actions can still determine the future course of climate change. The report calls on governments, individuals, and organizations to stop putting new greenhouse gas emissions into the atmosphere no later than 2050, and to be at the halfway point to achieving that by 2030.

      With calls to action becoming more urgent, organizations are making plans to reduce the use of fossil fuels, move to renewable energy sources, and reduce consumption that causes more emissions downstream. As both voluntary and mandatory regulatory requirements task organizations with reducing emissions, they will first be challenged to accurately measure the size of their footprint.

      CIOs in organizations are well positioned to make conscious decisions to both influence how technology choices impact carbon emissions and implement effective tracking of emissions across the entire enterprise.

      Canada’s CIO strategy council is calling on organizations to sign a “sustainable IT pledge” to cut emissions from IT operations and supply chain and to measure and disclose emissions annually. (CIO Strategy Council, Sustainable IT Pledge)

      SCOPE 3 – Indirect Consumption

      • Goods and services
      • Fuel, travel, distribution
      • Waste, investments, leased assets, employee activity

      SCOPE 2 – Indirect Energy

      • Electricity
      • Heat and cooling

      SCOPE 1 – Direct

      • Facilities
      • Vehicles

      Signals

      Emissions tracking requires a larger scope.

      About two-thirds of organizations have a commitment to reduce greenhouse gas emissions. When asked about what tactics they use to reduce emissions, the most popular options affect either scope 1 emissions (retiring older IT equipment) or scope 2 emissions (using renewable energy sources). Fewer are using tactics that would measure scope 3 emissions such as using IoT to track or using software or AI.

      68% of organizations say they have a commitment to reduce greenhouse gas emissions. (Info-Tech Tech Trends 2022 Survey)

      Approaches to reducing carbon emissions

      Using "smart technologies" or IoT to help cut emissions 12%
      Creating incentive programs for staff to reduce emissions 10%
      Using software or AI to manage energy use 8%
      Using external DC or cloud on renewable energy 16%
      Committing to external emissions standards 15%
      Retiring/updating older IT equipment 33%
      Using renewable energy sources 41%

      (Info-Tech Tech Trends 2022 Survey)

      Drivers

      Investor pressure

      The world’s largest asset manager, at $7 trillion in investments, says it will move away from investing in firms that are not aligned to the Paris Agreement. (The New York Times, 2020)

      Compliance tipping point

      International charity CDP has been collecting environmental disclosure from organizations since 2002. In 2020, more than 9,600 of the world’s largest companies – representing over 50% of global market value – took part. (CDP, 2021)

      International law

      In 2021, six countries have net-zero emissions policies in law, six have proposed legislations, and 20 have policy documents. (Energy & Climate Intelligence Unit, 2021)

      Employee satisfaction

      In 2019, thousands of workers walked out of offices of Amazon, Google, Twitter, and Microsoft to demand their employers do more to reduce carbon emissions. (NBC News, 2021)

      High influence factors for carbon reduction

      • 25% – New government laws or policies
      • 9% – External social pressures
      • 9% – Pressure from investors
      • 8% – International climate compliance efforts
      • 7% – Employee satisfaction

      (Info-Tech Tech Trends 2022 Survey)

      Risks and Benefits

      Benefits

      Trust Tracking carbon emissions creates transparency into an organization’s operations and demonstrates accountability to its carbon emissions reduction goals.
      Innovation As organizations become more proficient with carbon measurement and modeling, insights can be leveraged as a decision-making tool.
      Resilience Reducing energy usage shrinks your carbon footprint, increases operational efficiency, and decreases energy costs.

      Risks

      Regulatory Divergence Standardization of compliance enforcement around carbon emissions is a work in progress. Several different voluntary frameworks exist, and different governments are taking different approaches including taxation and cap-and-trade markets.
      Perceptions Company communications that speak to emissions reduction targets without providing proof can be accused of “greenwashing” or falsely trying to improve public perception.
      Financial Pain Institutional investments are requiring clear commitments and plans to reduce greenhouse gases. Some jurisdictions are now taxing carbon emissions.

      “When you can take technology and embed that into management change decisions that impact the environment, you can essentially guarantee that [greenhouse gas] offset. Companies that are looking to reduce their emissions can buy those offsets and it creates value for everybody.” (Wade Barnes, CEO and founder of Farmers Edge)

      Photo of Wade Barnes, CEO and founder of Farmers Edge.

      Listen to the Tech Insights podcast: The future of farming is digital

      Case Study

      Situation

      The Alberta Technology Innovation and Emissions Reduction Regulation is Alberta’s approach to reduce emissions from large industrial emitters. It prices GHG and provides a trading system.

      No-till farming and nitrogen management techniques sequester up to 0.3 metric tons of GHG per year.

      Complication

      Farmers Edge offers farmers a digital platform that includes IoT and a unified data warehouse. It can turn farm records into digital environmental assets, which are aggregated and sold to emitters.

      Real-time data from connected vehicles, connected sensors, and other various inputs can be verified by third-party auditors.

      Resolution

      Farmers Edge sold aggregated carbon offsets to Alberta power producer Capital Power to help it meet regulatory compliance.

      Farmers Edge is expanding its platform to include farmers in other provinces and in the US, providing them opportunity to earn revenue via its Smart Carbon program.

      The firm is working to meet standards outlined by the U.S. Department of Agriculture’s Natural Resources Conservation Service. (Interview with Wade Barnes, CEO, Farmers Edge)

      What's Next

      Global standards:

      The International Sustainability Standards Board (ISSB) has been formed by the International Financial Reporting Standards Foundation and will have its headquarters location announced in November at a United Nations conference. The body is already governing a set of global standards that have a roadmap for development through 2023 through open consultation. The standards are expected to bring together the multiple frameworks for sustainability standards and offer one global set of standards. (Business Council of Canada, 2021)

      CIOs take charge:

      The CIO is well positioned to take the lead role on corporate sustainability initiatives, including measuring and reducing an organization’s carbon footprint (or perhaps even monetizing carbon credits for an organization that is a negative emitter). CIOs can use their position as facilities managers and cross-functional process owners and mandate to reduce waste and inefficiency to take accountability for this important role. CIOs will expand their roles to deliver transparent and auditable reporting on environmental, social, and governance (ESG) goals for the enterprise.

      Uncertainties

      International resolve:

      Fighting the climate crisis will require governments and private sector collaboration from around the world to commit to creating new economic structures to discourage greenhouse gas emissions and incentivize long-term sustainable thinking. If some countries or private sector forces continue to prioritize short-term gains over sustainability, the U.N.’s goals won’t be achieved and the human costs as a result of climate change will become more profound.

      Cap-and-trade markets:

      Markets where carbon credits are sold to emitters are organized by various jurisdictions around the world and have different incentive structures. Some are created by governments and others are voluntary markets created by industry. This type of organization for these markets limits their size and makes it hard to scale the impact. Organizations looking to sell carbon credits at volume face the friction of having to navigate different compliance rules for each market they want to participate in.

      Carbon Metrics in Energy 4.0 Scenarios

      Determine your organization’s approach to measuring carbon dioxide and other greenhouse gas emissions by considering whether your organization is likely to be a high emitter or a carbon sink. Also consider your capability to measure and report on your carbon footprint.

      A map of Carbon Metrics in Energy 4.0 scenarios with two axes representing 'Quantification Capability, From not tracking any emissions whatsoever to tracking all emissions at every scope' and 'Greenhouse Gas Emissions, From mitigating more emissions than you create to emitting more than regulations allow'. The axes split the map into quarters. 'Quantification Capability' ranges from 'No Measures' on the left to 'All Emissions Measured' on the right. 'Greenhouse Gas Emissions' ranges from 'More Than Allowed' on top to 'Net-Negative' on bottom. The top left quarter, no measures and more than allowed, reads 'Companies that are likely to be high emitters and not measuring will attract the most scrutiny from regulators and investors.' The top right quarter, all measured and more than allowed, reads 'Companies emit more than regulators allow but the measurements show a clear path to mitigation through the purchase of carbon credits.' The bottom left quarter, no measures and net-negative, reads 'Companies able to achieve carbon neutrality or even be net-negative in emissions but unable to demonstrate it will still face scrutiny from regulators.' The bottom right quarter, all measured and net-negative, reads 'Companies able to remove more emissions than they create have an opportunity to aggregate those reductions and sell on a cap-and-trade market.'

      Recommendations

      Measure the whole footprint. Devise a plan to measure scope 1, 2, and 3 greenhouse gas emissions at a level that is auditable by a third party.

      Gauge the impact of Industry 4.0. New technologies in Industry 4.0 include IoT, additive manufacturing, and advanced analytics. Make sustainability a core part of your focus as you plan out how these technologies will integrate with your business.

      Commit to net zero. Make a clear commitment to achieve net-zero emissions by a specific date as part of your organization’s core strategy. Take a continuous improvement approach to make progress towards the goal with measurable results.

      New laws from governments will have the highest degree of influence on an organization’s decision to reduce emissions. (Info-Tech Tech Trends 2022 Survey)

      Info-Tech Resources

      Intangible Value Creation

      TREND 04 | DATA ARCHITECTURE

      Use blockchain technology to turn unique intellectual property into saleable digital products. Provide governance around marketplaces where sales are made.

      Emerging technologies:
      Blockchain, Distributed Ledger Technology, Virtual Environments

      Introduction

      Decentralized technologies are propelling the digital economy.

      As the COVID-19 pandemic has accelerated our shift into virtual social and economic systems, blockchain technology poses a new technological frontier – further disrupting digital interactions and value creation by providing a modification of data without relying on third parties. New blockchain software developments are being used to redefine how central banks distribute currency and to track provenance for scarce digital assets.

      Tokenizing the blockchain

      Non-fungible tokens (NFTs) are distinct cryptographic tokens created from blockchain technology. The rarity systems in NFTs are redefining digital ownership and being used to drive creator-centric communities.

      Not crypto-currency, central currency

      Central Bank Digital Currencies (CBDC) combine the same architecture of cryptocurrencies built on blockchain with the financial authority of a central bank. These currencies are not decentralized because they are controlled by a central authority, rather they are distributed systems. (Decrypt, 2021)

      80% of banks are working on a digital currency. (Atlantic Council, 2021)

      Brands that launched NFTs

      NBA, NFL, Formula 1, Nike, Stella Artois, Coca-Cola, Mattel, Dolce & Gabbana, Ubisoft, Charmin

      Banks that launched digital currencies

      The Bahamas, Saint Kitts and Nevis, Antigua and Barbuda, Saint Lucia, Grenada

      Signals

      ID on the blockchain

      Blockchains can contain smart contracts that automatically execute given specific conditions, protecting stakeholders involved in a transaction. These have been used by central banks to automate when and how currency can be spent and by NFT platforms to attribute a unique identity to a digital asset. Automation and identity verification are the most highly valued digital capabilities of IT practitioners.

      $69.3 million – The world’s most expensive NFT artwork sale, for Beeple’s “Everydays: The First 5,000 Days” (The New York Times, Mar. 2021)

      Digital capabilities that provide high value to the organization

      E-commerce 50%
      Automation 79%
      Smart contracts 42%
      Community building and engagement 55%
      Real-time payments 46%
      Tracking provenance 33%
      Identity verification 74%

      (Info-Tech Tech Trends 2022 Survey)

      Drivers

      Financial autonomy

      Central banks view cryptocurrencies as "working against the public good" and want to maintain control over their financial system to maintain the integrity of payments and provide financial crime oversight and protections against money laundering. (Board of Governors of the Federal Reserve System, 2021)

      Bitcoin energy requirements and greenhouse gas emissions

      Annual energy consumption of the Bitcoin blockchain in China is estimated to peak in 2024 at 297 TwH and generate 130.5 million metric tons of carbon emissions. That would exceed the annual GHG of the Czech Republic and Qatar and rank in the top 10 among 182 cities and 42 industrial sectors in China. This is motiving cryptocurrency developers and central banks to move away from the energy-intensive "Proof of Work" mining approach and towards the "Proof of Stake" approach. (Nature Communications, 2021)

      Digital communities

      During the pandemic, people spent more time exploring digital spaces and interacting in digital communities. Asset ownership within those communities is a way for individuals to show their own personal investment in the community and achieve a status that often comes with additional privileges. The digital assets can also be viewed as an investment vehicle or to gain access to exclusive experiences.

      “The pillars of the music economy have always been based on three things that the artist has never had full control of. The idea of distribution is freed up. The way we are going to connect to fans in this direct to fan value prop is very interesting. The fact we can monetize it, and that money exchange, that transaction is immediate. And on a platform like S!NG we legitimately have a platform to community build…. Artists are getting a superpower.” (Raine Maida, Chief Product Officer, S!NG Singer, Our Lady Peace)

      Raine Maida, Chief Product Officer, S!NG, and Singer, Our Lady Peace.

      Listen to the Tech Insights podcast: Raine Maida's startup is an NFT app for music

      Case Study

      Situation

      Artists can create works and distribute them to a wide audience more easily than ever with the internet. Publishing a drawing or a song to a website allows it to be infinitely copied. Creators can use social media accounts and digital advertisements to build up a fan base for their work and monetize it through sales or premium-access subscriber schemes.

      Complication

      The internet's capacity for frictionless distribution is a boon and a burden for artists at the same time. Protecting copyright in a digital environment is difficult because there is no way to track a song or a picture back to its creator. This devalues the work because it can be freely exchanged by users.

      Resolution

      S!NG allows creators to mint their works with a digital token that stamps its origin to the file and tracks provenance as it is reused and adapted into other works. It uses the ERC 721 standard on the Ethereum blockchain to create its NFT tokens. They are portable files that the user can create for free on the S!NG platform and are interoperable with other digital token platforms. This enables a collaboration utility by reducing friction in using other people's works while giving proper attribution. Musicians can create mix tracks using the samples of others’ work easily and benefit from a smart-contract-based revenue structure that returns money to creators when sales are made. (Interview with Geoff Osler and Raine Maida, S!NG Executives)

      Risks and Benefits

      Benefits

      Autonomy Digital money and assets could proliferate the desire for autonomy as users have greater control over their assets (by cutting out the middlemen, democratizing access to investments, and re-claiming ownership over intangible data).
      Community Digital worlds and assets offer integrated and interoperable experiences influenced by user communities.
      Equity Digital assets allow different shareholder equity models as they grant accessible and affordable access to ownership.

      Risks

      Volatility Digital assets are prone to volatile price fluctuations. A primary reason for this is due to its perceived value relative to the fiat currency and the uncertainty around its future value.
      Security While one of the main features of blockchain-based digital assets is security, digital assets are vulnerable to breaches during the process of storing and trading assets.
      Access Access to digital marketplaces requires a steep learning curve and a base level of technical knowledge.

      What's Next

      Into the Metaverse:

      Digital tokens are finding new utility in virtual environments known as the Metaverse. Decentraland is an example of a virtual reality environment that can be accessed via a web browser. Based on the Ethereum blockchain, it's seen sales of virtual land plots for hundreds of thousands of dollars. Sotheby's is one buyer, building a digital replica of its New Bond Street gallery in London, complete with commissionaire Hans Lomuldur in avatar form to greet visitors. The gallery will showcase and sell Sotheby's digital artworks. (Artnet News, 2021)

      Bitcoin as legal tender:

      El Salvador became the first country in the world to make Bitcoin legal tender in September 2021. The government intended for this to help citizens avoid remittance fees when receiving money sent from abroad and to provide a way for citizens without bank accounts to receive payments. Digital wallet Chivo launched with technical glitches and in October a loophole that allowed “price scalping” had to be removed to stop speculators from using the app to trade for profit. El Salvador’s experiment will influence whether other countries consider using Bitcoin as legal tender. (New Scientist, 2021)

      Uncertainties

      Stolen goods at the mint:

      William Shatner complained that Twitter account @tokenizedtweets had taken his content without permission and minted tokens for sale. In doing so, he pointed out there’s no guarantee a minted digital asset is linked to the creator of the attached intellectual property.

      Decentralized vs. distributed finance:

      Will blockchain-based markets be controlled by a single platform operator or become truly open? For example, Dapper Labs centralizes the minting of NFTs on its Flow blockchain and controls sales through its markets. OpenSea allows NFTs minted elsewhere to be brought to the platform and sold.

      Supply and demand:

      Platforms need to improve the reliability of minting technology to create tokens in the future. Ethereum's network is facing more demand than it can keep up with and requires future upgrades to improve its efficiency. Other platforms that support minting tokens are also awaiting upgrades to be fully functional or have seen limited NFT projects launched on their platform.

      Intangible Value Creation Scenarios

      Determine your organization’s strategy by considering the different scenarios based on two main factors. The design decisions are made around whether digital assets are decentralized or distributed and whether the assets facilitate transactions or collections.

      A map of Intangible Value Creation scenarios with two axes representing 'Fungibility, From assets that are designed to be exchanged like currency to assets that are unique' and 'Asset Control Model, From decentralized control with open ownership to centralized control with distributed assets'. The axes split the map into quarters. 'Fungibility' ranges from 'Transactional' on the left to 'Collectible' on the right. 'Asset Control Model' ranges from 'Distributed' on top to 'Decentralized' on bottom. The top left quarter, distributed transactional, reads 'Platform-controlled digital exchanges and utility (e.g. tokens exchanged for fan experiences, central bank digital currency, S!NG).' The top right quarter, distributed collectible, reads 'Platform-controlled digital showcases and community (e.g. NBA Top Shot, Decentraland property).' The bottom left quarter, decentralized transactional, reads 'Peer-controlled digital exchanges and utility (e.g. Bitcoin).' The bottom right quarter, decentralized collectible, reads 'Peer-controlled digital showcases and community (e.g. OpenSea and Ethereum-based NFTs).'

      Recommendations

      Determine your role in the digital asset ecosystem.
      • Becoming a platform provider for digital tokens will require a minting capability to create blockchain-based assets and a marketplace for users to exchange them.
      • Issuing digital tokens to a platform through a sale will require making partnerships and marketing.
      • Investing in digital assets will require management of digital wallets and subject-matter expert analysis of the emerging markets.
      Track the implications of digital currencies.

      Track what your country’s central bank is planning for digital currency and determine if you’ll need to prepare to support it. Be informed about payment partner support for cryptocurrency and consider any complications that may introduce.

      $1 billion+ – The amount of cryptocurrency spent by consumers globally through crypto-linked Visa cards in first half of 2021. (CNBC, July 2021)

      Info-Tech Resources

      Automation as a Service

      TREND 05 | INNOVATION

      Automate business processes and access new sophisticated technology services through platform integration.

      Emerging technologies:
      Cloud platforms, APIs, Generative AI

      Introduction

      The glue for innovation

      Rapidly constructing a business model that is ready to compete in a digital economy requires continuous innovation. Application programming interfaces (APIs) can accelerate innovation by unlocking marketplaces of ready-to-use solutions to business problems and automating manual tasks to make more time for creativity. APIs facilitate a microarchitecture approach and make it possible to call upon a new capability with a few lines of code. This is not a new tool, as the first API was specified in 1951, but there were significant advances of both scale and capability in this area in 2021.

      In the past 18 months, API adoption has exploded and even industries previously considered as digital laggards are now integrating them to reinvent back-office processes. Technology platforms specializing in API management are attracting record-breaking investment. And sophisticated technology services such as artificial intelligence are being delivered by APIs.

      APIs can play a role in every company’s digital strategy, from transforming back-office processes to creating revenue as part of a platform.

      $500,000 was invested in API companies in 2016. (Forbes, May 2021)

      $2,000,000,000+ was invested in API companies in 2020. (Forbes, May 2021)

      69% of IT practitioners say digital transformation has been a high priority for their organization during the pandemic. (Info-Tech Tech Trends 2022 Survey)

      51% of developers used more APIs in 2020 than in 2019. (InsideHPC, 2021)

      71% of developers planned to use even more APIs in 2021. (InsideHPC, 2021)

      Signals

      IT practitioners indicate that digital transformation was a strong focus for their organization during the pandemic and will remain so during the period afterwards, and one-third say their organizations were “extremely focused” on digital transformation.

      When it came to shifting processes from being done manually to being completed digitally, more than half of IT practitioners say they shifted at least 21% of their processes during the past year. More than one in five say that at least 60% of their processes were shifted from manual to digital in the past year.

      3.5 trillion calls were performed on API management platform Apigee, representing a 50% increase year over year. (SiliconANGLE, 2021)

      Processes shifted from manual to digital in the past year

      A horizontal bar chart recording survey responses regarding the percent of processes that shifted from manual to digital in the past year. The horizontal axis is 'percent of survey respondents' with values from 0 to 35%. The vertical axis is 'percent of process shifted to digital' with bar labels 'Between 0 to 20%', 'Between 21 to 40%', and so on until 'Between 81 to 100%'. 20% of respondents answered '0 to 20%' of processes went digital. 28% of respondents answered '21 to 40%' of processes went digital. 30% of respondents answered '41 to 60%' of processes went digital. 15% of respondents answered '61 to 80%' of processes went digital. 7% of respondents answered '81 to 100%' of processes went digital.

      Drivers

      Covid-19

      The pandemic lockdowns pushed everyone into a remote-work scenario. With in-person interaction not an option, even more traditional businesses had to adapt to digital processes.

      Customer Expectations

      The success of digital services in the consumer space is causing expectations to rise in other areas, such as professional services. Consumers now want their health records to be portable and they want to pay their lawyer through e-transfer, not by writing a cheque. (Interview with Mik Lernout)

      Standardization

      Technology laggard industries such as legal and healthcare are recognizing the pain of working with siloed systems. New standardization efforts are driving the adoption of open APIs at a rapid rate. (Interview with Jennifer Jones, Research Director – Industry, Info-Tech Research Group)

      Risks and Benefits

      Benefits

      Speed Using a microarchitecture approach with readily available services constructed in different ways provides a faster way to get from idea to minimum-viable product.
      Intelligence Open APIs have more than ever exposed people to sophisticated AI algorithms that were in the domain of only advanced researchers just a couple years ago. Developers can integrate AI with a couple lines of code. Non-technical users can train algorithms with low-code and no-code tools (Forbes, Sept. 2021).
      Resilience If one function of a solution doesn't work, it can be easily replaced with another one available on the market and the overall experience is maintained.

      Risks

      Loss of Privacy APIs are being targeted by hackers as a way to access personal information. Recent API-related leaks affected Experian, John Deere, Clubhouse, and Peloton (VentureBeat, 2021).
      Complexity Using a decentralized approach to assemble applications means that there is no single party accountable for the solution. Different pieces can break, or oversights can go unnoticed.
      Copycats Platforms that take the approach of exposing all functions via API run the risk of having their services used by a competitor to offer the same solution but with an even better user experience.

      “When we think about what the pandemic did, we had this internal project called 'back to the future.' It kind of put the legal industry in a time machine and it kind of accelerated the legal industry 5, maybe even 10 years. A lot of the things we saw with the innovators became table stakes.” (Mik Lernout, Vice President of Product, Clio)

      Photo of Mik Lernout, Vice president of product, Clio.

      Listen to the Tech Insights podcast: Clio drives digital transformation to redefine the legal industry

      Case Study

      Situation

      The COVID-19 pandemic required the legal industry to shift to remote work. A typically change-resistant industry was now holding court hearings over videoconference, taking online payments, and collecting e-signatures on contracts. For Clio, a software-as-a-service software vendor that serves the legal industry, its client base grew and its usage increased. It previously focused on the innovators in the legal industry, but now it noticed laggards were going digital too.

      Complication

      Law firms have very different needs depending on their legal practice area (e.g. family law, corporate law, or personal injury) and what jurisdiction they operate in.

      Clients are also demanding more from their lawyers in terms of service experience. They don't want to travel to the law office to drop off a check but expect digital interactions on par with service they receive in other areas.

      Resolution

      Since its inception, Clio built its software product so that all of its functions could be called upon by an API as well. It describes its platform as the "operating system for the legal industry." Its API functions include capabilities like managing activities, billing, and contracts. External developers can submit applications to the Clio Marketplace to add new functionality. Its platform approach enables it to find solutions for its 150,000+ users. During the pandemic, Clio saw its customers rely on its APIs more than ever before. It expects this accelerated adoption to be the way of working in the future. (ProgrammableWeb, 2021; Interview with Mik Lernout)

      What's Next

      GOOGLE’S API-FIRST APPROACH:

      Google is expanding its Apigee API management platform so enterprises will be able to connect existing data and applications and access them via APIs. It's part of Google's API-first approach to digital transformation, helping enterprises with their integration challenges. The new release includes tools and a framework that's needed to integrate services in this way and includes pre-built connectors for common business apps and services such as Salesforce, Cloud SQL, MySQL, and BigQuery. (SiliconANGLE, 2021)

      Uncertainties

      API SECURITY:

      APIs represent another potential vulnerability for hackers to exploit and the rise in popularity has come with more security incidents. Companies using APIs have leaked data through APIs, with one research report on the state of API security finding that 91% of organizations have suffered an API security incident. Yet more than a quarter of firms running production APIs don’t have an API security strategy. (VentureBeat, 2021)

      For low IT maturity organizations moving onto platforms that introduce API capabilities, education is required about the consequences of creating more integrations. Platforms must bear some responsibility for monitoring for irregular activity. (Interview with Mik Lernout)

      Automation as a Service Scenarios

      Determine your organization’s platform strategy from the basis of your digital maturity – from that of a laggard to a native – and whether it involves monetized APIs vs. freely available public APIs. A strategy can include both the consumption of APIs and the creation of them.

      A map of Automation as a Service scenarios with two axes representing 'Business Model, From an open and public API to a monetized pay-for-use API' and 'Digital Maturity, From being a digital laggard to being a digital native'. The axes split the map into quarters. 'Business Model' ranges from 'Public APIs' on the left to 'Monetized APIs' on the right. 'Digital Maturity' ranges from 'Digital Native' on top to 'Digital Laggard' on bottom. The top left quarter, digital native public APIs, reads 'Platform business model that grows through adoption of free APIs (e.g. Clio).' The top right quarter, digital native monetized APIS, reads 'Platform business model with spectrum of API services including free tiers.' The bottom left quarter, digital laggard public APIs, reads 'Consume public APIs to simplify and automate business processes and improve customer experience (e.g. law firms using Clio).' The bottom right quarter, digital laggard monetized APIs, reads 'Consume paid APIs to provide customers with expanded services (e.g. retailer Lowe’s uses AccuWeather to predict supply and demand).'

      Recommendations

      Leverage APIs to connect your systems. Create a repeatable process to improve the quality, reusability, and governance of your web APIs.

      Transform your business model with digital platforms. Use the best practices of digital native enterprises and leverage your core assets to compete in a digital economy.

      Deliver sophisticated new capabilities with APIs. Develop an awareness of new services made available through API integration, such as artificial intelligence, and take advantage of them.

      4.5 billion words per day generated by the OpenAI natural language API GPT-3, just nine months after launch. (OpenAI, 2021)

      Info-Tech Resources

      Behind the design

      Inspiration provided by the golden ratio

      The golden ratio has long fascinated humans for its common occurrence in nature and inspired artists who adopted its proportions as a guiding principle for their creations. A new discovery of the golden ratio in economic cycles was published in August 2021 by Bert de Groot, et al. As the boundaries of value creation blur between physical and digital and the pace of change accelerates, these digital innovations may change our lives in many ways. But they are still bound by the context of the structure of the economy. Hear more about this surprising finding from de Groot and from this report’s designer by listening to our podcast. (Technological Forecasting and Social Change, 2021)

      “Everything happening will adapt itself into the next cycle, and that cycle is one phi distance away.” (Bert de Groot, professor of economics at Erasmus University Rotterdam)

      Photo of Bert de Groot, Professor of Economics at Erasmus University Rotterdam.

      Listen to the Tech Insights podcast: New discovery of the golden ratio in the economy

      Contributing Experts

      Vijay Sundaram
      Chief Strategy Officer, Zoho
      Photo of Vijay Sundaram, Chief Strategy Officer, Zoho.
      Jason Brommet
      Head of Modern Work and Security Business Group, Microsoft
      Photo of Jason Brommet, Head of Modern Work and Security Business Group at Microsoft.
      Steve Orrin
      Federal Chief Technology Officer, Intel
      Photo of Steve Orrin, Federal Chief Technology Officer, Intel.
      Wade Barnes
      CEO and Founder, Farmers Edge
      Photo of Wade Barnes, CEO and founder of Farmers Edge.

      Contributing Experts

      Raine Maida
      Chief Product Officer, S!NG
      Singer, Our Lady Peace
      Raine Maida, Chief Product Officer, S!NG Singer, Our Lady Peace.
      Geoff Osler
      CEO, S!NG
      Photo of Geoff Osler, CEO, S!NG.
      Mik Lernout
      Vice President of Product, Clio
      Photo of Mik Lernout, Vice President of Product, Clio.
      Bert de Groot
      Professor of Economics, Erasmus University Rotterdam
      Photo of Bert de Groot, Professor of Economics at Erasmus University Rotterdam.

      Bibliography – Enabling the Digital Economy

      “2021 Canada Dealer Financing Satisfaction Study.” J.D. Power, 13 May 2021. Accessed 27 May 2021.

      Brown, Sara. “The CIO Role Is Changing. Here’s What’s on the Horizon.” MIT Sloan, 2 Aug. 2021. Accessed 16 Aug. 2021.

      de Groot, E. A., et al. “Disentangling the Enigma of Multi-Structured Economic Cycles - A New Appearance of the Golden Ratio.” Technological Forecasting and Social Change, vol. 169, Aug. 2021, pp. 120793. ScienceDirect, https://doi.org/10.1016/j.techfore.2021.120793.

      Hatem, Louise, Daniel Ker, and John Mitchell. “Roadmap toward a common framework for measuring the Digital Economy.” Report for the G20 Digital Economy Task Force, OECD, 2020. Accessed 19 Oct. 2021.

      LaBerge, Laura, et al. “How COVID-19 has pushed companies over the technology tipping point—and transformed business forever.” McKinsey, 5 Oct. 2020. Accessed 14 June 2021.

      Pomeroy, James. The booming digital economy. HSBC, Sept. 2020. Web.

      Salman, Syed. “Digital Transformation Realized Through COBIT 2019.” ISACA, 13 Oct. 2020. Accessed 25 Oct. 2021.

      Bibliography – Hybrid Collaboration

      De Smet, Aaron, et al. “Getting Real about Hybrid Work.” McKinsey Quarterly, 9 July 2021. Web.

      Herskowitz, Nicole. “Brace Yourselves: Hybrid Work Is Hard. Here’s How Microsoft Teams and Office 365 Can Help.” Microsoft 365 Blog, 9 Sept. 2021. Web.

      Melin, Anders, and Misyrlena Egkolfopoulou. “Employees Are Quitting Instead of Giving Up Working From Home.” Bloomberg, 1 June 2021. Web.

      Spataro, Jared. “Microsoft and LinkedIn Share Latest Data and Innovation for Hybrid Work.” The Official Microsoft Blog, 9 Sept. 2021. Web.

      Subin, Samantha. “The new negotiation over job benefits and perks in post-Covid hybrid work.” CNBC, 23 Apr. 2021. Web.

      Torres, Roberto. “How to Sidestep Overspend as Hybrid Work Tests IT.” CIO Dive, 26 July 2021. Accessed 16 Sept. 2021.

      Wong, Christine. “How the hybrid workplace will affect IT spending.” ExpertIP, 15 July 2021. Web.

      Yang, Longqi, et al. “The Effects of Remote Work on Collaboration among Information Workers.” Nature Human Behaviour, Sept. 2021, pp. 1-12. Springer Nature, https://doi.org/10.1038/s41562-021-01196-4.

      Bibliography – Battle Against Ransomware

      Berg, Leandro. “RTF Report: Combatting Ransomware.” Institute for Security and Technology (IST), 2021. Accessed 21 Sept. 2021.

      Dudley, Renee. “The Extortion Economy: How Insurance Companies Are Fueling a Rise in Ransomware Attacks.” ProPublica, 27 Aug. 2019. Accessed 22 Sept. 2021.

      Durbin, Steve. “Council Post: Artificial Intelligence: The Future Of Cybersecurity?” Forbes, 23 Sept. 2021. Accessed 21 Oct. 2021.

      “FACT SHEET: Ongoing Public U.S. Efforts to Counter Ransomware.” The White House, 13 Oct. 2021. Web.

      Jeffery, Lynsey, and Vignesh Ramachandran. “Why ransomware attacks are on the rise — and what can be done to stop them.” PBS NewsHour, 8 July 2021. Web.

      McBride, Timothy, et al. Data Integrity: Recovering from Ransomware and Other Destructive Events. NIST Special Publication (SP) 1800-11, National Institute of Standards and Technology, 22 Sept. 2020. NIST Computer Security Resource Center (CSRC), https://doi.org/10.6028/NIST.SP.1800-11.

      Mehrotra, Karitkay, and Jennifer Jacobs. “Crypto Channels Targeted in Biden’s Fight Against Ransomware.” BNN Bloomberg, 21 Sept. 2021. Web.

      Sharma, Mayank. “Hackers demand $70m ransom after executing massive Solar Winds-like attack.” TechRadar, 5 July 2021. Web.

      “Unhacked: 121 Tools against Ransomware on a Single Website.” Europol, 26 July 2021. Web.

      Bibliography – Carbon Metrics in Energy 4.0

      “The A List 2020.” CDP, 2021. Web.

      Baazil, Diedrik, Hugo Miller, and Laura Hurst. “Shell loses climate case that may set precedent for big oil.” Australian Financial Review, 27 May 2021. Web.

      “BlackRock’s 2020 Carbon Footprint.” BlackRock, 2020. Accessed 25 May 2021.

      “CDP Media Factsheet.” CDP, n.d. Accessed 25 May 2021.

      Glaser, April, and Leticia Miranda. “Amazon workers demand end to pollution hitting people of color hardest.” NBC News, 24 May 2021. Accessed 25 May 2021.

      Little, Mark. “Why Canada should be the home of the new global sustainability standards board.” Business Council of Canada, 1 Oct. 2021. Accessed 22 Oct. 2021.

      McIntyre, Catherine. “Canada vying for global headquarters to oversee sustainable-finance standards.” The Logic, 22 July 2021. Web.

      “Net Zero Scorecard.” Energy & Climate Intelligence Unit, 2021. Accessed 25 May 2021.

      Sayer, Peter. “Greenhouse gas emissions: The next big issue for CIOs.” CIO, 13 Oct. 2021. Web.

      “Scope 1 and Scope 2 Inventory Guidance.” US EPA, OAR. 14 Dec. 2020. Web.

      Sorkin, Andrew Ross. “BlackRock C.E.O. Larry Fink: Climate Crisis Will Reshape Finance.” The New York Times, 14 Jan. 2020. Web.

      “Sustainable IT Pledge.” CIO Strategy Council, 2021. Accessed 22 Oct. 2021.

      Bibliography – Intangible Value Creation

      Areddy, James T. “China Creates Its Own Digital Currency, a First for Major Economy.” Wall Street Journal, 5 Apr. 2021. Web.

      Boar, Codruta, et al. Impending arrival - a sequel to the survey on central bank digital currency. BIS Papers No 107, Jan. 2020. Web.

      Brainard, Lael. “Speech by Governor Brainard on Private Money and Central Bank Money as Payments Go Digital: An Update on CBDCs.” Board of Governors of the Federal Reserve System, 24 May 2021. Accessed 28 May 2021.

      Howcroft, Elizabeth, and Ritvik Carvalho. “How a 10-second video clip sold for $6.6 million.” Reuters, 1 Mar. 2021. Web.

      “Central Bank Digital Currency Tracker.” Atlantic Council, 2021. Accessed 10 Sept. 2021.

      “Expert Comment From Warwick Business School: Problems With El Salvador’s Bitcoin Experiment Are Unsurprising.” Mondo Visione, 8 Sept. 2021. Accessed 10 Sept. 2021.

      Goldstein, Caroline. “In Its Ongoing Bid to Draw Crypto-Collectors, Sotheby’s Unveils a Replica of Its London H.Q. in the Blockchain World Decentraland.” Artnet News, 7 June 2021. Web.

      Hamacher, Adriana. “Taco Bell to Charmin: 10 Big Brands Jumping On The NFT Bandwagon.” Decrypt, 22 Mar. 2021. Web.

      Hazan, Eric, et al. “Getting tangible about intangibles: The future of growth and productivity?” McKinsey. 16 June 2021. Web.

      Bibliography – Intangible Value Creation

      Herrera, Pedro. “Dapp Industry Report: Q3 2021 Overview.” DappRadar, 1 Oct. 2021. Web.

      Holland, Frank. “Visa Says Crypto-Linked Card Usage Tops $1 Billion in First Half of 2021.” CNBC, 7 July 2021. Web.

      Jiang, Shangrong, et al. “Policy Assessments for the Carbon Emission Flows and Sustainability of Bitcoin Blockchain Operation in China.” Nature Communications, vol. 12, no. 1, Apr. 2021, p. 1938. Springer Nature, https://doi.org/10.1038/s41467-021-22256-3.

      Reyburn, Scott. “JPG File Sells for $69 Million, as ‘NFT Mania’ Gathers Pace.” The New York Times, 11 Mar. 2021. Web.

      Taylor, Luke. “Bitcoin: El Salvador’s Cryptocurrency Gamble Hit by Trading Loophole.” New Scientist, 25 Oct. 2021. Web.

      Bibliography – Automation as a Service

      Belsky, Scott. “The Furry Lisa, CryptoArt, & The New Economy Of Digital Creativity.” Medium, 21 Feb. 2021. Web.

      Culbertson, Joy. “10 Top Law APIs.” ProgrammableWeb, 14 Feb. 2021. Web.

      Caballar, Rina Diane. “Programming by Voice May Be the Next Frontier in Software Development - IEEE Spectrum.” IEEE Spectrum: Technology, Engineering, and Science News, 22 Mar 2021. Accessed 23 Mar. 2021.

      Gonsalves, Chris. “The Problem with APIs.” VentureBeat, 7 May 2021. Web.

      Graca, Joao. “Council Post: How APIs Are Democratizing Access To AI (And Where They Hit Their Limits).” Forbes, 24 Sept 2021. Accessed 28 Sept. 2021.

      Harris, Tony. “What is the API Economy?” API Blog: Everything You Need to Know, 4 May 2021. Web.

      Kitsing, Meelis. Scenarios for Digital Platform Ecosystems, 2020, pp. 453-57. ResearchGate, https://doi.org/10.1109/ICCCS49078.2020.9118571.

      Pilipiszyn, Ashley. “GPT-3 Powers the Next Generation of Apps.” OpenAI, 25 Mar. 2021. Web.

      Rethans, John. “So You Want to Monetize Your APIs?” APIs and Digital Transformation, 29 June 2018. Web.

      Bibliography – Automation as a Service

      Salyer, Patrick. “API Stack: The Billion Dollar Opportunities Redefining Infrastructure, Services & Platforms.” Forbes, 4 May 2021. Accessed 27 Oct. 2021.

      staff. “RapidAPI Raises $60M for Expansion of API Platform.” InsideHPC, 21 Apr. 2021. Web.

      Taulli, Tom. “API Economy: Is It The Next Big Thing?” Forbes, 18 Jan. 2021. Accessed 5 May 2021.

      Warren, Zach. “Clio Taking 2021 Cloud Conference Virtual, Announces New Mission Among Other News.” Legaltech News, 11 Mar. 2021. Web.

      Wheatley, Mike. “Google Announces API-First Approach to Application Data Integration with Apigee.” SiliconANGLE, 28 Sept. 2021. Web.

      About the research

      Tech trends survey

      As part of its research process for the 2022 Tech Trends Report, Info-Tech Research Group conducted an open online survey among its membership and wider community of professionals. The survey was fielded from August 2021 to September 2021, collecting 475 responses.

      The underlying metrics are diverse, capturing 14 countries and regions and 16 Industries.

      A geospatial chart of the world documenting the percentage of respondents from each country to Info-Tech's '2022 Tech Trends Report' Percentages are below.
      01 United States 45.3% 08 India 1.7%
      02 Canada 19.2% 09 Other (Asia) 1.7%
      03 Africa 9.3% 10 New Zealand 1.5%
      04 Other (Europe) 5.3% 11 Germany 0.8%
      05 Australia 4.2% 12 Mexico 0.4%
      06 Great Britain 3.8% 13 Netherlands 0.4%
      07 Middle East 2.9% 14 Japan 0.2%

      Industry

      01 Government 18.9%
      02 Media, Information, & Technology 12.8%
      03 Professional Services 12.8%
      04 Manufacturing 9.9%
      05 Education 8.8%
      06 Healthcare 8.2%
      07 Financial Services 7.8%
      08 Transportation & Logistics 3.4%
      09 Utilities 3.4%
      10 Insurance 2.5%
      11 Retail & Wholesale 2.5%
      12 Construction 2.3%
      13 Natural Resources 2.1%
      14 Real Estate & Property Management 1.7%
      15 Arts & Leisure 1.5%
      16 Professional Associations 1.3%

      Department

      IT (information technology) 88.2%
      Other (Department) 3.79%
      Operations 2.32%
      Research & Development 1.89%
      Sales 1.26%
      Administration 1.06%
      Finance 0.42%
      HR (Human Resources) 0.42%
      Marketing 0.42%
      Production 0.21%

      Role

      Manager 24%
      Director-level 22%
      C-level officer 19%
      VP-level 9%
      Team lead / supervisor 7%
      Owner / President / CEO 7%
      Team member 7%
      Consultant 5%
      Contractor 1%

      IT Spend

      Respondents on average spent 35 million per year on their IT budget.

      Accounting for the outlier responses – the median spend sits closer to 4.5 million per year. The highest spend on IT was within the Government, Healthcare, and Retail & Wholesale sectors.

      Build Your First RPA Bot

      • Buy Link or Shortcode: {j2store}238|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $53,126 Average $ Saved
      • member rating average days saved: 24 Average Days Saved
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Your organization has many business processes that rely on manual, routine, and repetitive data collection and processing work. These processes need to be automated to meet strategic priorities.
      • Your stakeholders decided to invest in robotic process automation (RPA). They are ready to begin the planning and delivery of their first RPA bot.
      • However, your organization lacks the critical foundations involved in successful RPA delivery, such as analysis of the suitability of candidate processes, business and IT collaboration, and product ownership.

      Our Advice

      Critical Insight

      • Manage your business and IT debt before you adopt RPA. RPA doubles down on your process inefficiencies, lack of operations and architectural standardization, and unenforced quality standards. RPA solutions will be fragile and prone to failure if debt is not managed.
      • Adopt BizDevOps. RPA will not be successful if your lines-of-business (LOBs) and IT are not working together. IT must empathize with how LOBs operate and proactively support the underlying operational systems. LOBs must be accountable for all products leveraging RPA and be able to rationalize RPA’s technical feasibility.
      • Start with RPA 1.0. Don’t get caught up in the AI and machine learning (RPA 2.0) hype. Evaluate the acceptance and value of RPA 1.0 to establish a sustainable and collaborative foundation for its delivery and management. Then use the lessons learned to prepare for future RPA 2.0 adoption. In many cases, RPA 1.0 is good enough.

      Impact and Result

      • Establish the right expectations. Gain a grounded understanding of RPA value and limitations in your context. Discuss current IT and business operations challenges to determine if they will impact RPA success.
      • Build your RPA governance. Clarify the roles, processes, and tools needed to support RPA delivery and management through IT and business collaboration.
      • Evaluate the fit of RPA. Obtain a thorough view of the business and technical complexities of your candidate processes. Indicate where and how RPA is expected to generate the most return.

      Build Your First RPA Bot Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how you should build your first RPA bot, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define your RPA governance

      Set the expectations of your first RPA bot. Define the guiding principles, ethics, and delivery capabilities that will govern RPA delivery and support.

      • Build Your First RPA Bot – Phase 1: Define Your RPA Governance

      2. Deliver and manage your bots

      Validate the fit of your candidate business processes for RPA and ensure the support of your operational system. Shortlist the features of your desired RPA vendor. Modernize your delivery process to accommodate RPA.

      • Build Your First RPA Bot – Phase 2: Deliver and Manage Your Bots

      3. Roadmap your RPA adoption

      Build a roadmap of initiatives to implement your first bot and build the foundations of your RPA practice.

      • Build Your First RPA Bot – Phase 3: Roadmap Your RPA Adoption
      [infographic]

      Workshop: Build Your First RPA Bot

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your RPA Governance

      The Purpose

      State the success criteria of your RPA adoption through defined objectives and metrics.

      Define your RPA guiding principles and ethics.

      Build the RPA capabilities that will support the delivery and management of your bots.

      Key Benefits Achieved

      Grounded stakeholder expectations

      RPA guiding principles

      RPA capabilities and the key roles to support RPA delivery and management

      Activities

      1.1 State Your RPA Objectives.

      1.2 Define Your RPA Principles

      1.3 Develop Your RPA Capabilities

      Outputs

      RPA objectives and metrics

      RPA guiding principles and ethics

      RPA and product ownership, RPA capabilities, RPA role definitions

      2 Deliver and Manage Your Bots

      The Purpose

      Evaluate the fit of your candidate business processes for automation.

      Define the operational platform to support your RPA solution.

      Shortlist the desired RPA vendor features.

      Optimize your product delivery process to support RPA.

      Key Benefits Achieved

      Verifies the decision to implement RPA for the candidate business process

      The system changes and modifications needed to support RPA

      Prioritized list of RPA vendor features

      Target state RPA delivery process

      Activities

      2.1 Prepare Your RPA Platform

      2.2 Select Your RPA Vendor

      2.3 Deliver and Manage Your Bots

      Outputs

      Assessment of candidate business processes and supporting operational platform

      List of desired RPA vendor features

      Optimized delivery process

      3 Roadmap Your RPA Adoption

      The Purpose

      Build your roadmap to implement your first RPA bot and build the foundations of your RPA practice.

      Key Benefits Achieved

      Implementation initiatives

      RPA adoption roadmap

      Activities

      3.1 Roadmap Your RPA Adoption

      Outputs

      RPA adoption roadmap

      Design a Tabletop Exercise to Support Your Security Operation

      • Buy Link or Shortcode: {j2store}319|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,599 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Threat management has become resource intensive, requiring continuous monitoring, collection, and analysis of massive volumes of security event data.
      • Security incidents are inevitable, but how they are handled is critical.
      • The increasing use of sophisticated malware is making it difficult for organizations to identify the true intent behind the attack campaign.
      • The incident response is often handled in an ad hoc or ineffective manner.

      Our Advice

      Critical Insight

      • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and share information mutually with other organizations to stay ahead of incoming threats.
      • Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
      • You might experience a negative return on your security control investment. As technology in the industry evolves, threat actors will adopt new tools, tactics, and procedures; a tabletop exercise will help ensure teams are leveraging your security investment properly and providing relevant situational awareness to stay on top of the rapidly evolving threat landscape.

      Impact and Result

      Establish and design a tabletop exercise capability to support and test the efficiency of the core prevention, detection, analysis, and response functions that consist of an organization's threat intelligence, security operations, vulnerability management, and incident response functions.

      Design a Tabletop Exercise to Support Your Security Operation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should design a tabletop exercise, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Plan

      Evaluate the need for a tabletop exercise.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

      2. Design

      Determine the topics, scope, objectives, and participant roles and responsibilities.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

      3. Develop

      Create briefings, guides, reports, and exercise injects.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop
      • Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

      4. Conduct

      Host the exercise in a conference or classroom setting.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

      5. Evaluate

      Plan to ensure measurement and continued improvement.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate
      [infographic]

      Implement an IT Chargeback System

      • Buy Link or Shortcode: {j2store}71|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • Business units voraciously consume IT services and don’t understand the actual costs of IT. This is due to lack of IT cost transparency and business stakeholder accountability for consumption of IT services.
      • Business units perceive IT costs as uncompetitive, resulting in shadow IT and a negative perception of IT.
      • Business executives have decided to implement an IT chargeback program and IT must ensure the program succeeds.

      Our Advice

      Critical Insight

      Price IT services so that business consumers find them meaningful, measurable, and manageable:

      • The business must understand what they are being charged for. If they can’t understand the value, you’ve chosen the wrong basis for charge.
      • Business units must be able to control and track their consumption levels, or they will feel powerless to control costs and you’ll never attain real buy-in.

      Impact and Result

      • Explain IT costs in ways that matter to the business. Instead of focusing on what IT pays for, discuss the value that IT brings to the business by defining IT services and how they serve business users.
      • Develop a chargeback model that brings transparency to the flow of IT costs through to business value. Demonstrate how a good chargeback model can bring about fair “pay-for-value” and “pay-for-what-you-use” pricing.
      • Communicate IT chargeback openly and manage change effectively. Business owners will want to know how their profit and loss statements will be affected by the new pricing model.

      Implement an IT Chargeback System Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement an IT chargeback program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch

      Make the case for IT chargeback, then assess the financial maturity of the organization and identify a pathway to success. Create a chargeback governance model.

      • Implement IT Chargeback – Phase 1: Launch
      • IT Chargeback Kick-Off Presentation

      2. Define

      Develop a chargeback model, including identifying user-facing IT services, allocating IT costs to services, and setting up the chargeback program.

      • Implement IT Chargeback – Phase 2: Define
      • IT Chargeback Program Development & Management Tool

      3. Implement

      Communicate the rollout of the IT chargeback model and establish a process for recovering IT services costs from business units.

      • Implement IT Chargeback – Phase 3: Implement
      • IT Chargeback Communication Plan
      • IT Chargeback Rollout Presentation
      • IT Chargeback Financial Presentation

      4. Revise

      Gather and analyze feedback from business owners, making necessary modifications to the chargeback model and communicating the implications.

      • Implement IT Chargeback – Phase 4: Revise
      • IT Chargeback Change Communication Template
      [infographic]

      Workshop: Implement an IT Chargeback System

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Kick-Off IT Chargeback

      The Purpose

      Make the case for IT chargeback.

      Identify the current and target state of chargeback maturity.

      Establish a chargeback governance model.

      Key Benefits Achieved

      Investigated the benefits and challenges of implementing IT chargeback.

      Understanding of the reasons why traditional chargeback approaches fail.

      Identified the specific pathway to chargeback success.

      Activities

      1.1 Investigate the benefits and challenges of implementing IT chargeback

      1.2 Educate business owners and executives on IT chargeback

      1.3 Identify the current and target state of chargeback maturity

      1.4 Establish chargeback governance

      Outputs

      Defined IT chargeback mandate

      IT chargeback kick-off presentation

      Chargeback maturity assessment

      IT chargeback governance model

      2 Develop the Chargeback Model

      The Purpose

      Develop a chargeback model.

      Identify the customers and user-facing services.

      Allocate IT costs.

      Determine chargeable service units.

      Key Benefits Achieved

      Identified IT customers.

      Identified user-facing services and generated descriptions for them.

      Allocated IT costs to IT services.

      Identified meaningful, measurable, and manageable chargeback service units.

      Activities

      2.1 Identify user-facing services and generate descriptions

      2.2 Allocate costs to user-facing services

      2.3 Determine chargeable service units and pricing

      2.4 Track consumption

      2.5 Determine service charges

      Outputs

      High-level service catalog

      Chargeback model

      3 Communicate IT Chargeback

      The Purpose

      Communicate the implementation of IT chargeback.

      Establish a process for recovering the costs of IT services from business units.

      Share the financial results of the charge cycle with business owners.

      Key Benefits Achieved

      Managed the transition to charging and recovering the costs of IT services from business units.

      Communicated the implementation of IT chargeback and shared the financial results with business owners.

      Activities

      3.1 Create a communication plan

      3.2 Deliver a chargeback rollout presentation

      3.3 Establish a process for recovering IT costs from business units

      3.4 Share the financial results from the charge cycle with business owners

      Outputs

      IT chargeback communication plan

      IT chargeback rollout presentation

      IT service cost recovery process

      IT chargeback financial presentation

      4 Review the Chargeback Model

      The Purpose

      Gather and analyze feedback from business owners on the chargeback model.

      Make necessary modifications to the chargeback model and communicate implications.

      Key Benefits Achieved

      Gathered business stakeholder feedback on the chargeback model.

      Made necessary modifications to the chargeback model to increase satisfaction and accuracy.

      Managed changes by communicating the implications to business owners in a structured manner.

      Activities

      4.1 Address stakeholder pain points and highly disputed costs

      4.2 Update the chargeback model

      4.3 Communicate the chargeback model changes and implications to business units

      Outputs

      Revised chargeback model with business feedback, change log, and modifications

      Chargeback change communication

      Determine the Future of Microsoft Project in Your Organization

      • Buy Link or Shortcode: {j2store}357|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $125,999 Average $ Saved
      • member rating average days saved: 50 Average Days Saved
      • Parent Category Name: Project Management Office
      • Parent Category Link: /project-management-office
      • You use Microsoft tools to manage your work, projects, and/or project portfolio.
      • Its latest offering, Project for the web, is new and you’re not sure what to make of it. Microsoft says it will soon replace Microsoft Project and Project Online, but the new software doesn’t seem to do what the old software did.
      • The organization has adopted M365 for collaboration and work management. Meetings happen on Teams, projects are scoped a bit with Planner, and the operations group uses Azure Boards to keep track of what they need to get done.
      • Despite your reservations about the new project management software, Microsoft software has become even more ubiquitous.

      Our Advice

      Critical Insight

      • The various MS Project offerings (but most notably the latest, Project for the web) hold the promise of integrating with the rest of M365 into a unified work management solution. However, out of the box, Project for the web and the various platforms within M365 are all disparate utilities that need to be pieced together in a purpose-built manner to make use of them for holistic work management purposes. If you’re looking for a cohesive product out of the box, look elsewhere. If you’re looking to assemble a wide array of work, project, and portfolio management functions across different functions and departments, you may have found what you seek.
      • Rather than choosing tools based on your gaps, assess your current maturity level so that you optimize your investment in the Microsoft landscape.

      Impact and Result

      Follow Info-Tech’s path in this blueprint to:

      • Perform a tool audit to trim your work management tool landscape.
      • Navigate the MS Project and M365 licensing landscape.
      • Make sense of what to do with Project for the web and take the right approach to rolling it out (i.e. DIY or MS Gold Partner driven) based upon your needs.
      • Create an action plan to inform next steps.

      After following the program in this blueprint, you will be prepared to advise the organization on how to best leverage the rapidly shifting work management options within M365 and the place of MS Project within it.

      Determine the Future of Microsoft Project in Your Organization Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should make sense of the MS Project and M365 landscapes, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Determine your tool needs

      Assess your work management tool landscape, current state maturity, and licensing needs to inform a purpose-built work management action plan.

      • M365 Task Management Tool Guide
      • M365 Project Management Tool Guide
      • M365 Project Portfolio Management Tool Guide
      • Tool Audit Workbook
      • Force Field Analysis Tool
      • Microsoft Project & M365 Licensing Tool
      • Project Portfolio Management Maturity Assessment Workbook (With Tool Analysis)
      • Project Management Maturity Assessment Workbook (With Tool Analysis)

      2. Weigh your MS Project implementation options

      Get familiar with Project for the web’s extensibility as well as the MS Gold Partner ecosystem as you contemplate the best implementation approach(s) for your organization.

      • None
      • None

      3. Finalize your implementation approach

      Prepare a boardroom-ready presentation that will help you communicate your MS Project and M365 action plan to PMO and organizational stakeholders.

      • Microsoft Project & M365 Action Plan Template

      Infographic

      Workshop: Determine the Future of Microsoft Project in Your Organization

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Driving Forces and Risks

      The Purpose

      Assess the goals and needs as well as the risks and constraints of a work management optimization.

      Take stock of your organization’s current work management tool landscape.

      Key Benefits Achieved

      Clear goals and alignment across workshop participants as well as an understanding of the risks and constraints that will need to be mitigated to succeed.

      Current-state insight into the organization’s work management tool landscape.

      Activities

      1.1 Review the business context.

      1.2 Explore the M365 work management landscape.

      1.3 Identify driving forces for change.

      1.4 Analyze potential risks.

      1.5 Perform current-state analysis on work management tools.

      Outputs

      Business context

      Current-state understanding of the task, project, and portfolio management options in M365 and how they align with the organization’s ways of working

      Goals and needs analysis

      Risks and constraints analysis

      Work management tool overview

      2 Determine Tool Needs and Process Maturity

      The Purpose

      Determine your organization’s work management tool needs as well as its current level of project management and project portfolio management process maturity.

      Key Benefits Achieved

      An understanding of your tooling needs and your current levels of process maturity.

      Activities

      2.1 Review tool audit dashboard and conduct the final audit.

      2.2 Identify current Microsoft licensing.

      2.3 Assess current-state maturity for project management.

      2.4 Define target state for project management.

      2.5 Assess current-state maturity for project portfolio management.

      2.6 Define target state for project portfolio management.

      Outputs

      Tool audit

      An understanding of licensing options and what’s needed to optimize MS Project options

      Project management current-state analysis

      Project management gap analysis

      Project portfolio management current-state analysis

      Project portfolio management gap analysis

      3 Weigh Your Implementation Options

      The Purpose

      Take stock of your implementation options for Microsoft old project tech and new project tech.

      Key Benefits Achieved

      An optimized implementation approach based upon your organization’s current state and needs.

      Activities

      3.1 Prepare a needs assessment for Microsoft 365 and Project Plan licenses.

      3.2 Review the business case for Microsoft licensing.

      3.3 Get familiar with Project for the web.

      3.4 Assess the MS Gold Partner Community.

      3.5 Conduct a feasibility test for PFTW.

      Outputs

      M365 and Project Plan needs assessment

      Business case for additional M365 and MS Project licensing

      An understand of Project for the web and how to extend it

      MS Gold Partner outreach plan

      A go/no-go decision for extending Project for the web on your own

      4 Finalize Implementation Approach

      The Purpose

      Determine the best implementation approach for your organization and prepare an action plan.

      Key Benefits Achieved

      A purpose-built implementation approach to help communicate recommendations and needs to key stakeholders.

      Activities

      4.1 Decide on the implementation approach.

      4.2 Identify the audience for your proposal.

      4.3 Determine timeline and assign accountabilities.

      4.4 Develop executive summary presentation.

      Outputs

      An implementation plan

      Stakeholder analysis

      A communication plan

      Initial executive presentation

      5 Next Steps and Wrap-Up (offsite)

      The Purpose

      Finalize your M365 and MS Project work management recommendations and get ready to communicate them to key stakeholders.

      Key Benefits Achieved

      Time saved in developing and communicating an action plan.

      Stakeholder buy-in.

      Activities

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Outputs

      Finalized executive presentation

      A gameplan to communicate your recommendations to key stakeholders as well as a roadmap for future optimization

      Further reading

      Determine the Future of Microsoft Project in Your Organization

      View your task management, project management, and project portfolio management options through the lens of M365.

      EXECUTIVE BRIEF

      Analyst Perspective

      Microsoft Project is an enigma

      Microsoft Project has dominated its market since being introduced in the 1980s, yet the level of adoption and usage per license is incredibly low.

      The software is ubiquitous, mostly considered to represent its category for “Project Management.” Yet, the software is conflated with its “Portfolio Management” offerings as organizations make platform decisions with Microsoft Project as the incorrectly identified incumbent.

      And incredibly, Microsoft has dominated the next era of productivity software with the “365” offerings. Yet, it froze the “Project” family of offerings and introduced the not-yet-functional “Project for the web.”

      Having a difficult time understanding what to do with, and about, Microsoft Project? You’re hardly alone. It’s not simply a question of tolerating, embracing, or rejecting the product: many who choose a competitor find they’re still paying for Microsoft Project-related licensing for years to come.

      If you’re in the Microsoft 365 ecosystem, use this research to understand your rapidly shifting landscape of options.

      (Barry Cousins, Project Portfolio Management Practice Lead, Info-Tech Research Group)

      Executive Summary

      Your Challenge

      You use Microsoft (MS) tools to manage your work, projects, and/or project portfolio.

      Their latest offering, Project for the web, is new and you’re not sure what to make of it. Microsoft says it will soon replace Microsoft Project and Project Online, but the new software doesn’t seem to do what the old software did.

      The organization has adopted M365 for collaboration and work management. Meetings happen on Teams, projects are scoped a bit with Planner, and the operations group uses Azure Boards to keep track of what they need to get done.

      Despite your reservations about the new project management software, Microsoft software has become even more ubiquitous.

      Common Obstacles

      M365 provides the basic components for managing tasks, projects, and project portfolios, but there is no instruction manual for making those parts work together.

      M365 isn’t the only set of tools at play. Business units and teams across the organization have procured other non-Microsoft tools for work management without involving IT.

      Microsoft’s latest project offering, Project for the web, is still evolving and you’re never sure if it is stable or ready for prime time. The missing function seems to involve the more sophisticated project planning disciplines, which are still important to larger, longer, and costlier projects.

      Common Obstacles

      Follow Info-Tech’s path in this blueprint to:

      • Perform a tool audit to trim your work management tool landscape.
      • Navigate the MS Project and M365 licensing landscape.
      • Make sense of what to do with Project for the web and take the right approach to rolling it out (i.e. DIY or MS Gold Partner driven) for your needs.
      • Create an action plan to inform next steps.

      After following the program in this blueprint, you will be prepared to advise the organization on how to best leverage the rapidly shifting work management options within M365 and the place of MS Project within it.

      M365 and, within it, O365 are taking over

      Accelerated partly by the pandemic and the move to remote work, Microsoft’s market share in the work productivity space has grown exponentially in the last two years.

      70% of Fortune 500 companies purchased 365 from Sept. 2019 to Sept. 2020. (Thexyz blog, 2020)

      In its FY21 Q2 report, Microsoft reported 47.5 million M365 consumer subscribers – an 11.2% increase from its FY20 Q4 reporting. (Office 365 for IT Pros, 2021)

      As of September 2020, there were 258,000,000 licensed O365 users. (Thexyz blog, 2020)

      In this blueprint, we’ll look at what the what the phenomenal growth of M365 means for PMOs and project portfolio practitioners who identify as Microsoft shops

      The market share of M365 warrants a fresh look at Microsoft’s suite of project offerings

      For many PMO and project portfolio practitioners, the footprint of M365 in their organizations’ work management cultures is forcing a renewed look at Microsoft’s suite of project offerings.

      The complicating factor is this renewed look comes at a transitional time in Microsoft’s suite of project and portfolio offerings.

      • The market dominance of MS Project Server and Project Online are wanning, with Microsoft promising the end-of-life for Online sometime in the coming years.
      • Project Online’s replacement, Project for the web, is a viable task management and lightweight project management tool, but its viability as a replacement for the rigor of Project Online is at present largely a question mark.
      • Related to the uncertainty and promise around Project for the web, the Dataverse and the Power Platform offer a glimpse into a democratized future of work management tools but anything specific about that future has yet to solidify.

      Microsoft Project has 66% market share in the project management tool space. (Celoxis, 2018)

      A copy of MS project is sold or licensed every 20 seconds. (Integent, 2013)

      MS Project is evolving to meet new work management realities

      It also evolved to not meet the old project management realities.

      • The lines between traditional project management and operational task management solutions are blurring as organizations struggle to keep up with demands.
      • To make the software easier to use, modern work management doesn’t involve the complexities from days past. You won’t find anywhere to introduce complex predecessor-successor relationships, unbalanced assignments with front-loading or back-loading, early-start/late-finish, critical path, etc.
      • “Work management” is among the latest buzzwords in IT consulting. With Project for the web (PFTW), Azure Boards, and Planner, Microsoft is attempting to compete with lighter and better-adopted tools like Trello, Basecamp, Asana, Wrike, and Monday.com.
      • Buyers of project and work management software have struggled to understand how PFTW will still be usable if it gets the missing project management function from MS Project.

      Info-Tech Insight

      Beware of the Software Granularity Paradox.

      Common opinion 1: “Plans and estimates that are granular enough to be believable are too detailed to manage and maintain.”

      Common opinion 2: “Plans simple enough to publish aren’t detailed enough to produce believable estimates.”

      In other words, software simple enough to get widely adopted doesn’t produce believable plans. Software that can produce believable plans is too complex to use at scale.

      A viable task and project management option must walk the line between these dichotomies.

      M365 gives you the pieces, but it’s on PMO users to piece them together in a viable way

      With the new MS Project and M365, it’s on PMOs to avoid the granularity paradox and produce a functioning solution that fits with the organization’s ways of working.

      Common perception still sees Microsoft Project as a rich software tool. Thus, when we consider the next generation of Microsoft Project, it’s easy to expect a newer and friendlier version of what we knew before.

      In truth, the new solution is a collection of partially integrated but largely disparate tools that each satisfy a portion of the market’s needs. While it looks like a rich collection of function when viewed through high-level requirements, users will find:

      • Overlaps, where multiple tools satisfy the same functional requirement (e.g. “assign a task”)
      • Gaps, where a tool doesn’t quite do enough and you’re forced to incorporate another tool (e.g. reverting back to Microsoft Project for advanced resource planning)
      • Islands, where tools don’t fluently talk to each other (e.g. Planner data integrated in real-time with portfolio data, which requires clunky, unstable, decentralized end-user integrations with Microsoft Power Automate)
      A colourful arrangement of Microsoft programs arranged around a pile of puzzle pieces.

      Info-Tech's approach

      Use our framework to best leverage the right MS Project offerings and M365 components for your organization’s work management needs.

      The Info-Tech difference:

      1. A simple to follow framework to help you make sense of a chaotic landscape.
      2. Practical and tactical tools that will help you save time.
      3. Leverage industry best practices and practitioner-based insights.
      An Info-Tech framework titled 'Determine the Future of Microsoft Project in Your Organization, subtitle 'View your task, project, and portfolio management options through the lens of Microsoft 365'. There are four main sections titled 'Background', 'Approaches', 'Deployments', and 'Portfolio Outcomes'. In '1) Background' are 'Analyze Content', 'Assess Constraints', and 'Determine Goals and Needs'. In '2) Approaches' are 'DIY: Are you ready to do it yourself?' 'Info-Tech: Can our analysts help?', and 'MS Gold Partner: Are you better off with a third party?'. In '3) Deployments' are five sections: 'Personal Task Management', Barriers to Portfolio Outcomes: Isolated to One Person. 'Team Task Management', Barriers to Portfolio Outcomes: Isolated to One Team. 'Project Portfolio Management', Barriers to Portfolio Outcomes: Isolated to One Project. 'Project Management', Barriers to Portfolio Outcomes: Functionally Incomplete. 'Enterprise Project and Portfolio Management', Barriers to Portfolio Outcomes: Underadopted. In '4) Portfolio Outcomes' are 'Informed Steering Committee', 'Increased Project Throughput', 'Improved Portfolio Responsiveness', 'Optimized Resource Utilization', and 'Reduced Monetary Waste'.

      Determine the Future of Microsoft Project in Your Organization

      View your task, project, and portfolio management options through the lens of Microsoft 365.

      1. Background

      • Analyze Content
      • Assess Constraints
      • Determine Goals and Needs

      2. Approaches

      • DIY – Are you ready to do it yourself?
      • Info-Tech – Can our analysts help?
      • MS Gold Partner – Are you better off with a third party?

      3. Deployments

        Task Management

      • Personal Task Management
        • Who does it? Knowledge workers
        • What is it? To-do lists
        • Common Approaches
          • Paper list and sticky notes
          • Light task tools
        • Applications
          • Planner
          • To Do
        • Level of Rigor 1/5
        • Barriers to Portfolio Outcomes: Isolated to One Person
      • Team Task Management
        • Who does it? Groups of knowledge workers
        • What is it? Collaborative to-do lists
        • Common Approaches
          • Kanban boards
          • Spreadsheets
          • Light task tools
        • Applications
          • Planner
          • Azure Boards
          • Teams
        • Level of Rigor 2/5
        • Barriers to Portfolio Outcomes: Isolated to One Team
      • Project Management

      • Project Portfolio Management
        • Who does it? PMO Directors, Portfolio Managers
        • What is it?
          • Centralized list of projects
          • Request and intake handling
          • Aggregating reporting
        • Common Approaches
          • Spreadsheets
          • PPM software
          • Roadmaps
        • Applications
          • Project for the Web
          • Power Platform
        • Level of Rigor 3/5
        • Barriers to Portfolio Outcomes: Isolated to One Project
      • Project Management
        • Who does it? Project Managers
        • What is it? Deterministic scheduling of related tasks
        • Common Approaches
          • Spreadsheets
          • Lists
          • PM software
          • PPM software
        • Applications
          • Project Desktop Client
        • Level of Rigor 4/5
        • Barriers to Portfolio Outcomes: Functionally Incomplete
      • Enterprise Project and Portfolio Management

      • Enterprise Project and Portfolio Management
        • Who does it? PMO and ePMO Directors, Portfolio Managers, Project Managers
        • What is it?
          • Centralized request and intake handling
          • Resource capacity management
          • Deterministic scheduling of related tasks
        • Common Approaches
          • PPM software
        • Applications
          • Project Online
          • Project Desktop Client
          • Project Server
        • Level of Rigor 5/5
        • Barriers to Portfolio Outcomes: Underadopted

      4. Portfolio Outcomes

      • Informed Steering Committee
      • Increased Project Throughput
      • Improved Portfolio Responsiveness
      • Optimized Resource Utilization
      • Reduced Monetary Waste

      Info-Tech's methodology for Determine the Future of MS Project for Your Organization

      1. Determine Your Tool Needs

      2. Weigh Your MS Project Implementation Options

      3. Finalize Your Implementation Approach

      Phase Steps

      1. Survey the M365 Work Management Tools
      2. Perform a Process Maturity Assessment to Help Inform Your M365 Starting Point
      3. Consider the Right MS Project Licenses for Your Stakeholders
      1. Get Familiar With Extending Project for the Web Using Power Apps
      2. Assess the MS Gold Partner Community
      1. Prepare an Action Plan

      Phase Outcomes

      1. Work Management Tool Audit
      2. MS Project and Power Platform Licensing Needs
      3. Project Management and Project Portfolio Management Maturity Assessment
      1. Project for the Web Readiness Assessment
      2. MS Gold Partner Outreach Plan
      1. MS Project and M365 Action Plan Presentation

      Insight Summary

      Overarching blueprint insight: Microsoft Parts Sold Separately. Assembly required.

      The various MS Project offerings (but most notably the latest, Project for the web) hold the promise of integrating with the rest of M365 into a unified work management solution. However, out of the box, Project for the web and the various platforms within M365 are all disparate utilities that need to be pieced together in a purpose-built manner to make use of them for holistic work management purposes.

      If you’re looking for a cohesive product out of the box, look elsewhere. If you’re looking to assemble a wide array of work, project, and portfolio management functions across different functions and departments, you may have found what you seek

      Phase 1 insight: Align your tool choice to your process maturity level.

      Rather than choosing tools based on your gaps, make sure to assess your current maturity level so that you optimize your investment in the Microsoft landscape.

      Phase 2 insight: Weigh your options before jumping into Microsoft’s new tech.

      Microsoft’s new Project plans (P1, P3, and P5) suggest there is a meaningful connection out of the box between its old tech (Project desktop, Project Server, and Project Online) and its new tech (Project for the web).

      However, the offerings are not always interoperable.

      Phase 3 insight: Keep the iterations small as you move ahead with trials and implementations.

      Organizations are changing as fast as the software we use to run them.

      If you’re implementing parts of this platform, keep the changes small as you monitor the vendors for new software versions and integrations.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Key deliverable: Microsoft Project & M365 Action Plan Template

      The Action Plan will help culminate and present:

      • Context and Constraints
      • DIY Implementation Approach
      Or
      • MS Partner Implementation Approach
      • Future-State Vision and Goals
      Samples of Info-Tech's key deliverable 'Microsoft Project and M365 Action Plan Template'.

      Tool Audit Workbook

      Sample of Info-Tech deliverable 'Tool Audit Workbook'.

      Assess your organization's current work management tool landscape and determine what tools drive value for individual users and teams and which ones can be rationalized.

      Force Field Analysis

      Sample of Info-Tech deliverable 'Force Field Analysis'.

      Document the driving and resisting forces for making a change to your work management tools.

      Maturity Assessments

      Sample of Info-Tech deliverable 'Maturity Assessments'.

      Use these assessments to identify gaps in project management and project portfolio management processes. The results will help guide process improvement efforts and measure success and progress.

      Microsoft Project & M365 Licensing Tool

      Sample of Info-Tech deliverable 'Microsoft Project and M365 Licensing Tool'.

      Determine the best licensing options and approaches for your implementation of Microsoft Project.

      Curate your work management tools to harness valuable portfolio outcomes

      • Increase Project Throughput

        Do more projects by ensuring the right projects and the right amount of projects are approved and executed.
      • Support an Informed Steering Committee

        Easily compare progress of projects across the portfolio and enable the leadership team to make decisions.
      • Improve portfolio responsiveness

        Make the portfolio responsive to executive steering when new projects and changing priorities need rapid action.
      • Optimize Resource Utilization

        Assign the right resources to approved projects and minimize the chronic over-allocation of resources that leads to burnout.
      • Reduce Monetary Waste

        Terminate low-value projects early and avoid sinking additional funds into unsuccessful ventures.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 8 calls over the course of 3 to 4 months.

        Introduction

      • Call #1: Scope requirements, objectives, and your specific challenges.
      • Phase 1

      • Call #2: Explore the M365 work management landscape.
      • Call #3: Discuss Microsoft Project Plans and their capabilities.
      • Call #4: Assess current-state maturity.
      • Phase 2

      • Call #5: Get familiar with extending Project for the web using Power Apps.
      • Call #6: Assess the MS Gold Partner Community.
      • Phase 3

      • Call #7: Determine approach and deployment.
      • Call #8: Discuss action plan.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1
      Assess Driving Forces and Risks

      Day 2
      Determine Tool Needs and Process Maturity

      Day 3
      Weigh Your Implementation Options

      Day 4
      Finalize Implementation Approach

      Day 5
      Next Steps and Wrap-Up (offsite)

      Activities

      • 1.1 Review the business context.
      • 1.2 Explore the M365 work management landscape.
      • 1.3 Identify driving forces for change.
      • 1.4 Analyze potential risks.
      • 1.5 Perform current-state analysis on work management tools.
      • 2.1 Review tool audit dashboard and conduct the final audit.
      • 2.2 Identify current Microsoft licensing.
      • 2.3 Assess current-state maturity for project management.
      • 2.4 Define target state for project management.
      • 2.5 Assess current-state maturity for project portfolio management.
      • 2.6 Define target state for project portfolio management.
      • 3.1 Prepare a needs assessment for Microsoft 365 and Project Plan licenses.
      • 3.2 Review the business case for Microsoft licensing.
      • 3.3 Get familiar with Project for the web.
      • 3.4 Assess the MS Gold Partner Community.
      • 3.5 Conduct a feasibility test for PFTW.
      • 4.1 Decide on the implementation approach.
      • 4.2 Identify the audience for your proposal.
      • 4.3 Determine timeline and assign accountabilities.
      • 4.4 Develop executive summary presentation.
      • 5.1 Complete in-progress deliverables from previous four days.
      • 5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Force Field Analysis
      2. Tool Audit Workbook
      1. Tool Audit Workbook
      2. Project Management Maturity Assessment
      3. Portfolio Management Maturity Assessment
      1. Microsoft Project and M365 Licensing Tool
      1. Microsoft Project & M365 Action Plan
      1. Microsoft Project & M365 Action Plan

      Determine the Future of Microsoft Project for Your Organization

      Phase 1: Determine Your Tool Needs

      Phase 1: Determine Your Tool Needs

      Phase 2: Weigh Your Implementation Options Phase 3: Finalize Your Implementation Approach
      • Step 1.1: Survey the M365 work management landscape
      • Step 1.2: Explore the Microsoft Project Plans and their capabilities
      • Step 1.3: Assess the maturity of your current PM & PPM capabilities
      • Step 2.1: Get familiar with extending Project for the web using Power Apps
      • Step 2.2: Assess the MS Gold Partner Community
      • Step 3.1: Prepare an action plan

      Phase Outcomes

      • Tool Audit
      • Microsoft Project Licensing Analysis
      • Project Management Maturity Assessment
      • Project Portfolio Management Maturity Assessments

      Step 1.1

      Survey the M365 Work Management Landscape

      Activities

      • 1.1.1 Distinguish between task, project, and portfolio capabilities
      • 1.1.2 Review Microsoft’s offering for task, project, and portfolio management needs
      • 1.1.4 Assess your organizational context and constraints
      • 1.1.3 Explore typical deployment options

      This step will walk you through the following activities:

      • Assessing your organization’s context for project and project portfolio management
      • Documenting the organization’s constraints
      • Establishing the organization’s goals and needs

      This step involves the following participants:

      • PMO Director
      • Resource Managers
      • Project Managers
      • Knowledge Workers

      Outcomes of Step

      • Knowledge of the Microsoft ecosystem as it relates to task, project, and portfolio management
      • Current organizational context and constraints

      Don’t underestimate the value of interoperability

      The whole Microsoft suite is worth more than the sum of its parts … if you know how to put it together.

      38% of the worldwide office suite market belongs to Microsoft. (Source: Statistica, 2021)

      1 in 3 small to mid-sized organizations moving to Microsoft Project say they are doing so because it integrates well with Office 365. (Source: CBT Nuggets, 2018)

      There’s a gravity to the Microsoft ecosystem.

      And while there is no argument that there are standalone task management tools, project management tools, or portfolio management tools that are likely more robust, feature-rich, and easier to adopt, it’s rare that you find an ecosystem that can do it all, to an acceptable level.

      That is the value proposition of Microsoft: the ubiquity, familiarity, and versatility. It’s the Swiss army knife of software products.

      The work management landscape is evolving

      With M365, Microsoft is angling to become the industry leader, and your organization’s hub, for work management.

      Workers lose up to 40% of their time multi-tasking and switching between applications. (Bluescape, 2018)

      25 Context switches – On average, workers switch between 10 apps, 25 times a day. (Asana, 2021)

      “Work management” is among the latest buzzwords in IT consulting.

      What is work management? It was born of a blurring of the traditional lines between operational or day-to-day tasks and project management tasks, as organizations struggle to keep up with both operational and project demands.

      To make the software easier to use, modern work management doesn’t involve the complexities from days past. You won’t find anywhere to introduce complex predecessor-successor relationships, unbalanced assignments with front-loading or back-loading, early-start/late-finish, critical path, etc.

      Indeed, with Project for the web, Azure Boards, Planner, and other M365 utilities, Microsoft is attempting to compete with lighter and better-adopted tools (e.g. Trello, Wike, Monday.com).

      The Microsoft world of work management can be understood across three broad categories

      1. Task Management

        Task management is essentially the same as keeping track of a to-do list. While you can have a project-related task, you can also have a non-project-related task. The sum of project and non-project tasks make up the work that you need to complete.
      2. Project Management

        Project management (PM) is a methodical approach to planning and guiding project processes from start to finish. Implementing PM processes helps establish repeatable steps and controls that enable project success. Documentation of PM processes leads to consistent results and dependable delivery on expectations.
      3. Portfolio Management

        Project portfolio management (PPM) is a strategic approach to approving, prioritizing, resourcing, and reporting on project. In addition, effective PPM should nurture the completion of projects in the portfolio in the most efficient way and track the extent to which the organization is realizing the intended benefits from completed projects.

      The slides ahead explain each of these modes of working in the Microsoft ecosystem in turn. Further, Info-Tech’s Task, Project, and Project Portfolio Management Tool Guides explain these areas in more detail.

      Use Info-Tech’s Tool Guides assess your MS Project and M365 work management options

      Lean on Info-Tech’s Tool Guides as you navigate Microsoft’s tasks management, project management, and project portfolio management options.

      • The slides ahead take you through a bird’s-eye view of what your MS Project and M365 work management options look like across Info-Tech’s three broad categories
      • In addition to these slides, Info-Tech has three in-depth tool guides that take you through your operational task management, project management, and project portfolio management options in MS Project and M365.
      • These tool guides can be leveraged as you determine whether Microsoft has the required toolset for your organization’s task, project, and project portfolio management needs.

      Download Info-Tech’s Task Management, Project Management, and Project Portfolio Management Tool Guides

      Task Management Overview

      What is task management?

      • It is essentially the same as keeping track of a to-do list. While you can have a project-related task, you can also have a non-project-related task. The sum of project and non-project tasks make up the work that you need to complete.

      What are the benefits of task management using applications within the MS suite?

      • Many organizations already own the tools and don't have to go out and buy something separately.
      • There is easy integration with other MS applications.

      What is personal task management?

      • Tools that allow you to structure work that is visible only to you. This can include work from tasks you are going to be completing for yourself and tasks you are completing as part of a larger work effort.

      What is team task management?

      • Tools that allow users to structure work that is visible to a group. When something is moved or changed, it affects what the group is seeing because it is a shared platform.

      Get familiar with the Microsoft product offerings for task management

      A diagram of Microsoft products and what they can help accomplish. It starts on the right with 'Teams' and 'Outlook'. Both can flow through to 'Personal Task Management' with products 'Teams Tasks' and 'To-Do', but Teams also flows into 'Team Task Management' with products 'Planner' and 'Project for the web'. See the next two slides for more details on these modes of working.

      Download the M365 Task Management Tool Guide

      Personal Task Management

      The To-Do list

      • Who does it?
        • Knowledge workers
      • What is it?
        • How each knowledge worker organizes their individual work tasks in M365
      • When is it done?
        • As needed throughout the day
      • Where is it done?
        • Paper
        • Digital location
      • How is it done?
        • DIY and self-developed
        • Usually not repeatable and evolves depending on work location and tools available
        • Not governed

      Microsoft differentiator:

      Utilities like Planner and To-Do make it easier to turn what are often ad hoc approaches into a more repeatable process.

      Team Task Management

      The SharedTo-Do list

      • Who does it?
        • Groups of knowledge workers
      • What is it?
        • Temporary and permanent collections of knowledge workers
      • When is it done?
        • As needed or on a pre-determined cadence
      • Where is it done?
        • Paper
        • Digital location
      • How is it done?
        • User norms are established organically and adapted based upon the needs of the team.
        • To whatever extent processes are repeatable in the first place, they remain repeatable only if the team is a collective.
        • Usually governed within the team and not subject to wider visibility.

      Microsoft differentiator:

      Teams has opened personal task management tactics up to more collaborative approaches.

      Project Management Overview

      2003

      Project Server: This product serves many large enterprise clients, but Microsoft has stated that it is at end of life. It is appealing to industries and organizations where privacy is paramount. This is an on-premises system that combines servers like SharePoint, SQL, and BI to report on information from Project Desktop Client. To realize the value of this product, there must be adoption across the organization and engagement at the project-task level for all projects within the portfolio.

      2013

      Project Online: This product serves many medium enterprise clients. It is appealing for IT departments who want to get a rich set of features that can be used to intake projects, assign resources, and report on project portfolio health. It is a cloud solution built on the SharePoint platform, which provides many users a sense of familiarity. However, due to the bottom-up reporting nature of this product, again, adoption across the organization and engagement at the project task level for all projects within the portfolio is critical.

      2020

      Project for the web: This product is the newest on the market and is quickly being evolved. Many O365 enthusiasts have been early adopters of Project for the web despite its limited features when compared to Project Online. It is also a cloud solution that encourages citizen developers by being built on the MS Power Platform. This positions the product well to integrate with Power BI, Power Automate, and Power Apps. It is, so far, the only MS product that lends itself to abstracted portfolio management, which means it doesn’t rely on project task level engagement to produce portfolio reports. The portfolio can also run with a mixed methodology by funneling Project, Azure Boards, and Planner boards into its roadmap function.

      Get familiar with the Microsoft product offerings for project management

      A diagram of Microsoft products and what they can help accomplish in Personal and Team Project Management. Products listed include 'Project Desktop Client', 'Project Online', 'SharePoint', 'Power Platform', 'Azure DevOps', 'Project for the web', Project Roadmap', 'Project Home', and 'Project Server'. See the next slide for more details on personal and team project management as modes of working.

      Download the M365 Project Management Tool Guide

      Project Management

      Orchestrating the delivery of project work

      • Who does it?
        • Project managers
      • What is it?
        • Individual project managers developing project plans and schedules in the MS Project Desktop Client
      • When is it done?
        • Throughout the lifecycle of the project
      • Where is it done?
        • Digital location
      • How is it done?
        • Used by individual project managers to develop and manage project plans.
        • Common approaches may or may not involve reconciliation of resource capacity through integration with Active Directory.
        • Sometimes usage norms are established by organizational project management governance standards, though individual use of the desktop client is largely ungoverned.

      Microsoft differentiator:

      For better or worse, Microsoft’s core solution is veritably synonymous with project management itself and has formally contributed to the definition of the project management space.

      Project Portfolio Management Overview

      Optimize what you’re already using and get familiar with the Power Platform.

      What does PPM look like within M365?

      • The Office suite in the Microsoft 365 suite boasts the world’s most widely used application for the purposes of abstracted and strategic PPM: Excel. For the purposes of PPM, Excel is largely implemented in a suboptimal fashion, and as a result, organizations fail to gain PPM adoption and maturation through its use.
      • Until very recently, Microsoft toolset did not explicitly address abstracted PPM needs.
      • However, with the latest version of M365 and Project for the web, Microsoft is boasting of renewed PPM capabilities from its toolset. These capabilities are largely facilitated through what Microsoft is calling its Power Platform (i.e. a suite of products that includes Power, Power Apps, and Power Automate).

      Explore the Microsoft product offering for abstracted project portfolio management

      A diagram of Microsoft products for 'Adaptive or Abstracted Portfolio Management'. Products listed include 'Excel', 'MS Lists', 'Forms', 'Teams', and the 'Power Platform' products 'Power BI', 'Power Apps', and 'Power Automate'. See the next slide for more details on adaptive or abstracted portfolio management as a mode of working.

      Download the M365 Project Portfolio Management Tool Guide

      Project Portfolio Management

      Doing the right projects, at the right time, with the right resources

      • Who does it?
        • PMO directors; portfolio managers
      • What is it?
        A strategic approach to approving, prioritizing, resourcing, and reporting on projects using applications in M365 and Project for the web. In distinction to enterprise PPM, a top-down or abstracted approach is applied, meaning PPM data is not tied to project task details.
      • Where is it done?
        • Digital tool, either homegrown or commercial
      • How is it done?
        • Currently in M365, PPM approaches are largely self-developed, though Microsoft Gold Partners are commonly involved.
        • User norms are still evolving, along with the software’s (Project for the web) function.

      Microsoft differentiator:

      Integration between Project for the web and Power Apps allows for custom approaches.

      Project Portfolio Management Overview

      Microsoft’s legacy project management toolset has contributed to the definition of traditional or enterprise PPM space.

      A robust and intensive bottom-up approach that requires task level roll-ups from projects to inform portfolio level data. For this model to work, reconciliation of individual resource capacity must be universal and perpetually current.

      If your organization has low or no maturity with PPM, this approach will be tough to make successful.

      In fact, most organizations under adopt the tools required to effectively operate with the traditional project portfolio management. Once adopted and operationalized, this combination of tools gives the executives the most precise view of the current state of projects within the portfolio.

      Explore the Microsoft product offering for enterprise project portfolio management

      A diagram of Microsoft products for 'Enterprise or Traditional Portfolio Management'. Products listed include 'Project Desktop Client', 'SharePoint', 'Project Online', 'Azure DevOps', 'Project Roadmaps', and 'Project Home'. See the next slide for more details on this as a mode of working.

      Download the M365 Project Portfolio Management Tool Guide

      Enterprise Project and Portfolio Management

      Bottom-up approach to managing the project portfolio

      • Who does it?
        • PMO and ePMO directors; portfolio managers
        • Project managers
      • What is it?
        • A strategic approach to approving, prioritizing, resourcing, and reporting on projects using applications in M365 and Project for the web. In distinction to enterprise PPM, a top-down or abstracted approach is applied, meaning PPM data is not tied to project task details.
      • Where is it done?
        • Digital tool that is usually commercial.
      • How is it done?
        • Microsoft Gold Partner involvement is highly likely in successful implementations.
        • Usage norms are long established and customized solutions are prevalent.
        • To be successful, use must be highly governed.
        • Reconciliation of individual resource capacity must be universal and perpetually current.

      Microsoft differentiator:

      Microsoft’s established network of Gold Partners helps to make this deployment a viable option.

      Assess your current tool ecosystem across work management categories

      Use Info-Tech’s Tool Audit Workbook to assess the value and satisfaction for the work management tools currently in use.

      • With the modes of working in mind that have been addressed in the previous slides and in Info-Tech’s Tool Guides, the activity slides ahead encourage you to engage your wider organization to determine all of the ways of working across individuals and teams.
      • Depending on the scope of your work management optimization, these engagements may be limited to IT or may extend to the business.
      • Use Info-Tech’s Tool Audit Workbook to help you gather and make sense of the tool data you collect. The result of this activity is to gain insight into the tools that drive value and fail to drive value across your work management categories with a view to streamline the organization’s tool ecosystem.

      Download Info-Tech’s Tool Audit Workbook

      Sample of Info-Tech's Tool Audit Workbook.

      1.2.1 Compile list of tools

      1-3 hours

      Input: Information on tools used to complete task, project, and portfolio tasks

      Output: Analyzed list of tools

      Materials: Whiteboard/Flip Charts, Tool Audit Workbook

      Participants: Portfolio Manager (PMO Director), PMO Admin Team, Project Managers, Business Stakeholders

      1. Identify the stakeholder groups that are in scope. For each group that you’ve identified, brainstorm the different tools and artifacts that are necessary to get the task, project, and project portfolio management functions done.
      2. Make sure to record the tool name and specify its category (standard document, artifact, homegrown solution, or commercial solution).
      3. Think about and discuss how often the tool is being used for each use case across the organization. Document whether its use is required. Then assess reporting functionality, data accuracy, and cost.
      4. Lastly, give a satisfaction rating for each use case.

      Excerpt from the Tool Audit Workbook

      Excerpt from Info-Tech's Tool Audit Workbook on compiling tools.

      1.2.1 Review dashboard

      1-3 hours

      Input: List of key PPM decision points, List of who is accountable for PPM decisions, List of who has PPM decision-making authority

      Output: Prioritized list of PPM decision-making support needs

      Materials: Whiteboard/Flip Charts, Tool Audit Workbook

      Participants: Portfolio Manager (PMO Director), PMO Admin Team, CIO

      Discuss the outputs of the Dashboards tab to inform your decision maker on whether to pass or fail the tool for each use case.

      Sample of a BI dashboard used to evaluate the usefulness of tools. Written notes include: 'Slice the data based on stakeholder group, tool, use case, and category', and 'Review the results of the questionnaire by comparing cost and satisfaction'.

      1.2.1 Execute final audit

      1 hour

      Input: List of key PPM decision points, List of who is accountable for PPM decisions, List of who has PPM decision-making authority

      Output: Prioritized list of PPM decision-making support needs

      Materials: Whiteboard/Flip Charts, Tool Audit Workbook

      Participants: Portfolio Manager (PMO Director), PMO Admin Team, CIO

      1. Using the information available, schedule time with the leadership team to present the results.
      2. Identify the accountable party to make the final decision on what current tools pass or fail the final audit.
      3. Mind the gap presented by the failed tools and look to possibilities within the M365 and Microsoft Project suite. For each tool that is deemed unsatisfactory for the future state, mark it as “Fail” in column O on tab 2 of the Tool Audit Workbook. This will ensure the item shows in the “Fail” column on tab 4 of the tool when you refresh the data.
      4. For each of the tools that “fail” your audit and that you’re going to make recommendations to rationalize in a future state, try to capture the annual total current-state spending on licenses, and the work modes the tool currently supports (i.e. task, project, and/or portfolio management).
      5. Additionally, start to think about future-state replacements for each tool within or outside of the M365/MS Project platforms. As we move forward to finalize your action plan in the last phase of this blueprint, we will capture and present this information to key stakeholders.

      Document your goals, needs, and constraints before proceeding

      Use Info-Tech’s Force Field Analysis Tool to help weigh goals and needs against risks and constraints associated with a work management change.

      • Now that you have discussed the organization’s ways of working and assessed its tool landscape – and made some initial decisions on some tool options that might need to change across that landscape – gather key stakeholders to define (a) why a change is needed at this time and (b) to document some of the risks and constraints associated with changing.
      • Info-Tech’s Force Field Analysis Tool can be used to capture these data points. It takes an organizational change management approach and asks you to consider the positive and negative forces associated with a work management tool change at this time.
      • The slides ahead walk you through a force field analysis activity and help you to navigate the relevant tabs in the Tool.

      Download Info-Tech's Force Field Analysis Tool

      Sample of Info-Tech's Force Field Analysis Tool.

      1.2.1 Identify goals and needs (1 of 2)

      Use tab 1 of the Force Field Analysis Workbook to assess goals and needs.

      30 minutes

      Input: Opportunities associated with determining the use case for Microsoft Project and M365 in your organization

      Output: Plotted opportunities based on probability and impact

      Materials: Whiteboard/Flip Charts, Force Field Analysis Tool

      Participants: Portfolio Manager (PMO Director), PMO Admin Team, Project Managers

      1. Brainstorm opportunities associated with exploring and/or implementing Microsoft Project and the Microsoft 365 suite of products for task, project, and project portfolio management.
      2. Document relevant opportunities in tab 1 of the Force Field Analysis Tool. For each driving force for the change (note: a driving force can include goals and needs) that is identified, provide a category that explains why the driving force is a concern (i.e. with this force is the organization looking to mature, integrate, scape, or accelerate?).
      3. In addition, assess the ease of achieving or realizing each goal or need and the impact of realizing them on the PMO and/or the organization.
      4. See the next slide for a screenshot that helps you navigate tab 1 of the Tool.

      Download the Force Field Analysis Tool

      1.2.1 Identify goals and needs (2 of 2)

      Screenshot of tab 1 of the Force Field Analysis Workbook.

      Screenshot of tab 1 of the Force Field Analysis Workbook. There are five columns referred to as columns B through F with the headings 'Opportunities', 'Category', 'Source', 'Ease of Achieving', and 'Impact on PMO/Organization'.

      In column B on tab 1, note the specific opportunities the group would like to call out.

      In column C, categorize the goal or need being articulated by the list of drop-down options: will it accelerate the time to benefit? Will it help to integrate systems and data sources? Will it mature processes and the organization overall? Will it help to scale across the organization? Choose the option that best aligns with the opportunity.

      In column D, categorize the source of the goal or need as internal or external.

      In column E, use the drop-down menus to indicate the ease of realizing each goal or need for the organization. Will it be relatively easy to manifest or will there be complexities to implementing it?

      In column F, use the drop-down menus to indicate the positive impact of realizing or achieving each need on the PMO and/or the organization.

      On tab 3 of the Force Field Analysis Workbook, your inputs on tab 1 are summarized in graphical form from columns B to G. On tab 3, these goals and needs results are contrasted with your inputs on tab 2 (see next slide).

      1.2.2 Identify risk and constraints (1 of 2)

      Use tab 2 of the Force Field Analysis Workbook to assess opposing forces to change.

      30 minutes

      Input: Risks associated with determining the use case for Microsoft Project and M365 in your organization

      Output: Plotted risks based on probability and impact

      Materials: Whiteboard/Flip Charts, Force Field Analysis Tool

      Participants: Portfolio Manager (PMO Director), PMO Admin Team, Project Managers

      1. With the same working group from 1.2.1, brainstorm risks, constraints, and other opposing forces pertaining to your potential future state.
      2. Document relevant opposing forces in tab 2 of the Force Field Analysis Tool. For each opposing force for the change (note: a driving force can include goals and needs) that is identified, provide a category that explains why the opposing force is a concern (i.e. will it impact or is it impacted by time, resources, maturity, budget, or culture?).
      3. In addition, assess the likelihood of the risk or constraint coming to light and the negative impact of it coming to light for your proposed change.
      4. See the next slide for a screenshot that helps you navigate tab 2 of the Force Field Analysis Tool.

      Download the Force Field Analysis Tool

      1.2.2 Identify risk and constraints (2 of 2)

      Screenshot of tab 2 of the Force Field Analysis Workbook.

      Screenshot of tab 2 of the Force Field Analysis Workbook. There are five columns referred to as columns B through F with the headings 'Risks and Constraints', 'Category', 'Source', 'Likelihood of Constraint/Risk/Resisting Force Being Felt', and 'Impact to Derailing Goals and Needs'.

      In column B on tab 2, note the specific risks and constraints the group would like to call out.

      In column C, categorize the risk or constraint being articulated by the list of drop-down options: will it impact or is it impacted by time, resources, budget, culture or maturity?

      In column D, categorize the source of the goal or need as internal or external.

      In column E, use the drop-down menus to indicate the likelihood of each risk or constraint materializing during your implementation. Will it definitely occur or is there just a small chance it could come to light?

      In column F, use the drop-down menus to indicate the negative impact of the risk or constraint to achieving your goals and needs.

      On tab 3 of the Force Field Analysis Workbook, your inputs on tab 2 are summarized in graphical form from columns I to N. On tab 3, your risk and constraint results are contrasted with your inputs on tab 1 to help you gauge the relative weight of driving vs. opposing forces.

      Step 1.2

      Explore the Microsoft Project Plans and their capabilities

      Activities

      • 1.1.1 Review the Microsoft 365 licensing features
      • 1.1.2 Explore the Microsoft Project Plan licenses
      • 1.1.3 Prepare a needs assessment for Microsoft 365 and Project Plan licenses

      This step will walk you through the following activities:

      • Review the suite of task management, project management, and project portfolio management options available in Microsoft 365.
      • Prepare a preliminary checklist of required M365 apps for your stakeholders.

      This step usually involves the following participants:

      • PMO/Portfolio Manager
      • Project Managers
      • CIO and other executive stakeholders
      • Other project portfolio stakeholders (project and IT workers)

      Outcomes of Step

      • Preliminary requirements for an M365 project management and project portfolio management tool implementation

      Microsoft recently revamped its project plans to balance its old and new tech

      Access to the new tech, Project for the web, comes with all license types, while Project Online Professional and Premium licenses have been revamped as P3 and P5.

      Navigating Microsoft licensing is never easy, and Project for the web has further complicated licensing needs for project professionals.

      As we’ll cover in step 2.1 of this blueprint, Project for the web can be extended beyond its base lightweight work management functionality using the Power Platform (Power Apps, Power Automate, and Power BI). Depending on the scope of your implementation, this can require additional Power Platform licensing.

      • In this step, we will help you understand the basics of what’s already included in your enterprise M365 licensing as well as what’s new in Microsoft’s recent Project licensing plans (P1, P3, and P5).
      • As we cover toward the end of this step, you can use Info-Tech’s MS Project and M365 Licensing Tool to help you understand your plan and licensing needs. Further assistance on licensing can be found in the Task, Project, and Portfolio Management Tool Guides that accompany this blueprint and Info-Tech’s Modernize Your Microsoft Licensing for the Cloud Era.

      Download Info-Tech’s Modernize Your Microsoft Licensing for the Cloud Era

      Licensing features for knowledge workers

      Please note that licensing packages are frequently subject to change. This is up to date as of August 2021. For the most up-to-date information on licensing, visit the Microsoft website.

      Bundles are extremely common and can be more cost effective than à la carte options for the Microsoft products.

      The biggest differentiator between M365 and O365 is that the M365 product also includes Windows 10 and Enterprise Mobility and Security.

      The color coding in the diagram indicates that the same platform/application suite is available.

      Platform or Application M365 E3 M365 E5 O365 E1 O365 E3 O365 E5
      Microsoft Forms X X X X X
      Microsoft Lists X X X X X
      OneDrive X X X X X
      Planner X X X X X
      Power Apps for Office 365 X X X X X
      Power Automate for Office X X X X X
      Power BI Pro X X
      Power Virtual Agents for Teams X X X X X
      SharePoint X X X X X
      Stream X X X X X
      Sway X X X X X
      Teams X X X X X
      To Do X X X X X

      Get familiar with Microsoft Project Plan 1

      Please note that licensing packages are frequently subject to change. This is up to date as of August 2021. For the most up to date information on licensing, visit the Microsoft website.

      Who is a good fit?

      • New project managers
      • Zero-allocation project managers
      • Individuals and organizations who want to move out of Excel into something less fragile (easily breaking formulas)

      What does it include?

      • Access to Project Home, a landing page to access all project plans you’ve created or have been assigned to.
      • Access to Grid View, Board View, and Timeline (Gantt) View to plan and manage your projects with Project for the web
      • Sharing Project for the web plans across Microsoft Teams channels
      • Co-authoring on project plans

      When does it make sense?

      • Lightweight project management
      • No process to use bottom-up approach for resourcing data
      • Critical-path analysis is not required
      • Organization does not have an appetite for project management rigor

      Get familiar with Microsoft Project Plan 3

      Please note that licensing packages are frequently subject to change. This is up to date as of August 2021. For the most up to date information on licensing, visit the Microsoft website.

      Who is a good fit?

      • Experienced and dedicated project managers
      • Organizations with complex projects
      • Large project teams are required to complete project work
      • Organizations have experience using project management software

      What does it include?

      Everything in Project Plan 1 plus the following:

      • Reporting through Power BI Report template apps (note that there are no pre-built reports for Project for the web)
      • Access to build a Roadmap of projects from Project for the web and Azure DevOps with key milestones, statuses, and deadlines
      • Project Online to submit and track timesheets for project teams
      • MS Project Desktop Client to support resource management

      When does it make sense?

      • Project management is an established discipline at the organization
      • Critical-path analysis is commonly used
      • Organization has some appetite for project management rigor
      • Resources are expected to submit timesheets to allow for more precise resource management data

      Get familiar with Microsoft Project Plan 5

      Please note that licensing packages are frequently subject to change. This is up to date as of August 2021. For the most up to date information on licensing, visit the Microsoft website.

      Who is a good fit?

      • Experienced and dedicated project managers
      • Experienced and dedicated PMO directors
      • Dedicated portfolio managers
      • Organizations proficient at sustaining data in a standard tool

      What does it include?

      Everything in Project Plan 3 plus the following:

      • Portfolio selection and optimization
      • Demand management
      • Enterprise resource planning and management through deterministic task and resource scheduling
      • MS Project Desktop Client to support resource management

      When does it make sense?

      • Project management is a key success factor at the organization
      • Organization employs a bottom-up approach for resourcing data
      • Critical-path analysis is required
      • Formal project portfolio management processes are well established
      • The organization is willing to either put in the time, energy, and resources to learn to configure the system through DIY or is willing to leverage a Microsoft Partner to help them do so

      What’s included in each plan (1 of 2)

      Plan details are up to date as of September 2021. Plans and pricing can change often. Visit the Microsoft website to validate plan options and get pricing details.
      MS Project Capabilities Info-Tech's Editorial Description P1 P3 P5
      Project Home Essentially a landing page that allows you to access all the project plans you've created or that you're assigned to. It amalgamates plans created in Project for the web, the Project for the web app in Power Apps, and Project Online. X X X
      Grid view One of three options in which to create your project plans in Project for the web (board view and timeline view are the other options). You can switch back and forth between the options. X X X
      Board view One of three options in which to create your project plans in Project for the web (grid view and timeline view are the other options). You can switch back and forth between the options. X X X
      Timeline (Gantt) view One of three options in which to create your project plans in Project for the web (board view and grid view are the other options). You can switch back and forth between the options. X X X
      Collaboration and communication This references the ability to add Project for the web project plans to Teams channels. X X X
      Coauthoring Many people can have access to the same project plan and can update tasks. X X X
      Project planning and scheduling For this the marketing lingo says "includes familiar scheduling tools to assign project tasks to team members and use different views like Grid, Board, and Timeline (Gantt chart) to oversee the schedule." Unclear how this is different than the project plans in the three view options above. X X X

      X - Functionality Included in Plan

      O - Functionality Not Included in Plan

      What’s included in each plan (2 of 2)

      Plan details are up to date as of September 2021. Plans and pricing can change often. Visit the Microsoft website to validate plan options and get pricing details.
      MS Project Capabilities Info-Tech's Editorial Description P1 P3 P5
      Reporting This seems to reference Excel reports and the Power BI Report Template App, which can be used if you're using Project Online. There are no pre-built reports for Project for the web, but third-party Power Apps are available. O X X
      Roadmap Roadmap is a platform that allows you to take one or more projects from Project for the web and Azure DevOps and create an organizational roadmap. Once your projects are loaded into Roadmap you can perform additional customizations like color status reporting and adding key days and milestones. O X X
      Timesheet submission Project Online and Server 2013 and 2016 allow team members to submit timesheets if the functionality is required. O X X
      Resource management The rich MS Project client supports old school, deterministic project scheduling at the project level. O X X
      Desktop client The full desktop client comes with P3 and P5, where it acts as the rich editor for project plans. The software enjoys a multi-decade market dominance as a project management tool but was never paired with an enterprise collaboration server engine that enjoyed the same level of success. O X X
      Portfolio selection and optimization Portfolio selection and optimization has been offered as part of the enterprise project and portfolio suite for many years. Most people taking advantage of this capability have used a Microsoft Partner to formalize and operationalize the feature. O O X
      Demand Management Enterprise demand management is targeted at the most rigorous of project portfolio management practices. Most people taking advantage of this capability have used a Microsoft Partner to formalize and operationalize the feature. O O X
      Enterprise resource planning and management The legacy MS Project Online/Server platform supports enterprise-wide resource capacity management through an old-school, deterministic task and resource scheduling engine, assuming scaled-out deployment of Active Directory. Most people succeeding with this capability have used a Microsoft Partner to formalize and operationalize the feature. O O X

      X - Functionality Included in Plan

      O - Functionality Not Included in Plan

      Use Info-Tech’s MS Project and M365 Licensing Tool

      Leverage the analysis in Info-Tech’s MS Project & M365 Licensing Tool to help inform your initial assumptions about what you need and how much to budget for it.

      • The Licensing Tool can help you determine what Project Plan licensing different user groups might need as well as additional Power Platform licensing that may be required.
      • It consists of four main tabs: two set-up tabs where you can validate the plan and pricing information for M365 and MS Project; an analysis tab where you set up your user groups and follow a survey to assess their Project Plan needs; and another analysis tab where you can document your Power Platform licensing needs across your user groups.
      • There is also a business case tab that breaks down your total licensing needs. The outputs of this tab can be used in your MS Project & M365 Action Plan Template, which we will help you develop in phase three of this blueprint.

      Download Info-Tech's Microsoft Project & M365 Licensing Tool

      Sample of Info-Tech's Microsoft Project and M365 Licensing Tool.

      1.2.1 Conduct a needs assessment

      1-2 hours

      Input: List of key user groups/profiles, Number of users and current licenses

      Output: List of Microsoft applications/capabilities included with each license, Analysis of user group needs for Microsoft Project Plan licenses

      Materials: Microsoft Project & 365 Licensing Tool

      Participants: Portfolio Manager (PMO Director), PMO Admin Team, Project Managers

      1. As a group, analyze the applications included in your current or desired 365 license and calculate any additional Power Platform licensing needs.
      2. Screenshot of the 'Application/Capabilities' screen from the 'Microsoft Project and M365 Licensing Tool'.
      3. Within the same group, use the drop-down menus to analyze your high-level MS Project requirements by selecting whether each capability is necessary or not.
      4. Your inputs to the needs assessment will determine the figures in the Business Case tab. Consider exporting this information to PDF or other format to distribute to stakeholders.
      5. Screenshot of the 'Business Case' tab from the 'Microsoft Project and M365 Licensing Tool'.

      Download Info-Tech's Microsoft Project & M365 Licensing Tool

      Step 1.3

      Assess the maturity of your current PM & PPM capabilities

      Activities

      • Assess current state project and project portfolio management processes and tools
      • Determine target state project and project portfolio management processes and tools

      This step will walk you through the following activities:

      • Assess current state project and project portfolio management processes and tools
      • Determine target state project and project portfolio management processes and tools

      This step usually involves the following participants:

      • PMO/Portfolio Manager
      • Project Managers
      • CIO and other executive stakeholders
      • Other project portfolio stakeholders (project and IT workers)

      Outcomes of Step

      • Current and target state maturity for project management and project portfolio management processes

      Project portfolio management and project management are more than tools

      Implementing commercial tools without a matching level of process discipline is a futile exercise, leaving organizations frustrated at the wasted time and money.

      • The tool is only as good as the data that is input. There is often a misunderstanding that a tool will be “automatic.” While it is true that a tool can help make certain processes easier and more convenient by aggregating information, enhancing reporting, and coauthoring, it will not make up the data. If data becomes stale, the tool is no longer valid for accurate decision making.
      • Getting people onboard and establishing a clear process is often the hardest part. As IT folk, it can be easy to get wrapped up in the technology. All too often excitement around tools can drown out the important requisites around people and process. The reality is people and process are a necessary condition for a tool to be successful. Having a tool will not be sufficient to overcome obstacles like poor stakeholder buy-in, inadequate governance, and the absence of a standard operating procedure.

      • Slow is the way to go. When deciding what tools to purchase, start small and scale up rather than going all in and all too often ending up with many unused features and fees.

      "There's been a chicken-egg debate raging in the PPM world for decades: What comes first, the tool or the process? It seems reasonable to say, ‘We don't have a process now, so we'll just adopt the one in the tool.’ But you'll soon find out that the tool doesn't have a process, and you needed to do more planning and analysis before buying the tool." (Barry Cousins, Practice Lead, Project Portfolio Management)

      Assess your process maturity to determine the right tool approach

      Take the time to consider and reflect on the current and target state of the processes for project portfolio management and project management.

      Project Portfolio Management

      • Status and Progress Reporting
        1. Intake, Approval, and Prioritization

          PPM is the practice of selecting the right projects and ensuring the organization has the necessary resources to complete them. PPM should enable executive decision makers to make sense of the excess of demand and give IT the ability to prioritize those projects that are most valuable to the business.
        2. Resource Management

        3. Project Management

          1. Initiation
          2. Planning
          3. Execution
          4. Monitoring and Controlling
          5. Closing
          Tailor a project management framework to fit your organization. Formal methodologies aren’t always the best fit. Take what you can use from formal frameworks and define a right-sized approach to your project management processes.
        4. Project Closure

        5. Benefits Tracking

      Info-Tech’s maturity assessment tools can help you match your tools to your maturity level

      Use Info-Tech’s Project Portfolio Management Maturity Assessment Tool and Project Management Maturity Assessment Tool.

      • The next few slides in this step take you through using our maturity assessment tools to help gauge your current-state and target-state maturity levels for project management (PM) and project portfolio management (PPM).
      • In addition to the process maturity assessments, these workbooks also help you document current-state support tools and desired target-state tools.
      • The outputs of these workbooks can be used in your MS Project & M365 Action Plan Template, which we will help you develop in phase three of this blueprint.

      Download Info-Tech’s Project Portfolio Management Maturity Assessment Tool and Project Management Maturity Assessment Tool

      Samples of Info-Tech's Project Portfolio Management Maturity Assessment Tool and Project Management Maturity Assessment Tool.

      Conduct a gap analysis survey for both project and project portfolio management.

      • Review the category and activity statements: For each gap analysis tab in the maturity assessments, use the comprehensive activity statements to identify gaps for the organization.
      • Assess the current state: To assess the current state, evaluate whether the statement should be labeled as:
        • Absent: There is no evidence of any activities supporting this process.
        • Initial: Activity is ad hoc and not well defined.
        • Defined: Activity is established and there is moderate adherence to its execution.
        • Repeatable: Activity is established, documented, repeatable, and integrated with other phases of the process.
        • Managed: Activity execution is tracked by gathering qualitative and quantitative feedback

      Once this is documented, take some time to describe the type of tool being used to do this (commercial, home-grown, standardized document) and provide additional details, where applicable.

      Define the target state: Repeat the assessment of activity statements for the target state. Then gauge the organizational impact and complexity of improving each capability on a scale of very low to very high.

      Excerpt from Info-Tech's Project Portfolio Management Maturity Assessment Tool, the 'PPM Current State Target State Maturity Assessment Survey'. It has five columns whose purpose is denoted in notes. Column 1 'Category within the respective discipline'; Column 2 'Statement to consider'; Column 3 'Select the appropriate answer for current and target state'; Column 4 'Define the tool type'; Column 5 'Provide addition detail about the tool'.

      Analyze survey results for project and project portfolio management maturity

      Take stock of the gap between current state and target state.

      • What process areas have the biggest gap between current and target state?
      • What areas are aligned across current and target state?

      Identify what areas are currently the least and most mature.

      • What process area causes the most pain in the organization?
      • What process area is the organization’s lowest priority?

      Note the overall current process maturity.

      • After having done this exercise, does the overall maturity come as a surprise?
      • If so, what are some of the areas that were previously overlooked?
      A table and bar graph documenting and analysis of maturity survey results. The table has four columns labelled 'Process Area', 'Current Process Completeness', 'Current Maturity Level', and 'Target State Maturity'. Rows headers in the 'Process Area' column are 'Intake, Approval, and Prioritization', 'Resource Management', 'Portfolio Reporting', 'Project Closure and Benefits Realization', 'Portfolio Administration', and finally 'Overall Maturity'. The 'Current Process Completeness' column's values are in percentages. The 'Current Maturity Level' and 'Target State Maturity' columns' values can be one of the following: 'Absent', 'Initial', 'Defined', 'Repeatable', or 'Managed'. The bar chart visualizes the levels of the 'Target State' and 'Current State' with 'Absent' from 0-20%, 'Initial' from 20-40%, 'Defined' from 40-60%, 'Repeatable' from 60-80%, and 'Managed' from 80-100%.
      • Identify process areas with low levels of maturity
      • Spot areas of inconsistency between current and target state.
      • Assess the overall gap to get a sense of the magnitude of the effort required to get to the target state.
      • 100% doesn’t need to be the goal. Set a goal that is sustainable and always consider the value to effort ratio.

      Screenshot your results and put them into the MS Project and M365 Action Plan Template.

      Review the tool overview and plan to address gaps (tabs 3 & 4)

      Tool Overview:

      Analyze the applications used to support your project management and project portfolio management processes.

      Look for:

      • Tools that help with processes across the entire PM or PPM lifecycle.
      • Tools that are only used for one specific process.

      Reflect on the overlap between process areas with pain points and the current tools being used to complete this process.

      Consider the sustainability of the target-state tool choice

      Screenshot of a 'Tool Overview' table. Chart titled 'Current-to-Target State Supporting Tools by PPM Activity' documenting the current and target states of different supporting tools by PPM Activity. Tools listed are 'N/A', 'Standardized Document', 'Homegrown Tool', and 'Commercial Tool'.

      You have the option to create an action plan for each of the areas of improvement coming out of your maturity assessment.

      This can include:

      • Tactical Optimization Action: What is the main action needed to improve capability?
      • Related Actions: Is there a cross-over with any actions for other capabilities?
      • Timeframe: Is this near-term, mid-term, or long-term?
      • Proposed Start Date
      • Proposed Go-Live Date
      • RACI: Who will be responsible, accountable, consulted, and informed?
      • Status: What is the status of this action item over time?

      Determine the Future of Microsoft Project for Your Organization

      Phase 2: Weigh Your Implementation Options

      Phase 1: Determine Your Tool Needs

      Phase 2: Weigh Your Implementation Options

      Phase 3: Finalize Your Implementation Approach
      • Step 1.1: Survey the M365 work management landscape
      • Step 1.2: Perform a process maturity assessment to help inform your M365 starting point
      • Step 1.3: Consider the right MS Project licenses for your stakeholders
      • Step 2.1: Get familiar with extending Project for the web using Power Apps
      • Step 2.2: Assess the MS Gold Partner Community
      • Step 3.1: Prepare an action plan

      Phase Outcomes

      • A decision on how best to proceed (or not proceed) with Project for the web
      • A Partner outreach plan

      Step 2.1

      Get familiar with extending Project for the web using Power Apps

      Activities

      • Get familiar with Project for the web: how it differs from Microsoft’s traditional project offerings and where it is going
      • Understand the basics of how to extend Project for the web in Power Apps
      • Perform a feasibility test

      This step will walk you through the following activities:

      • Get familiar with Project for the web
      • Understand the basics of how to extend Project for the web in Power Apps
      • Perform a feasibility test to determine if taking a DIY approach to extending Project for the web is right for your organization currently

      This step usually involves the following participants:

      • Portfolio Manager (PMO Director)
      • Project Managers
      • Other relevant PMO stakeholders

      Outcomes of Step

      • A decision on how best to proceed (or not proceed) with Project for the web

      Project for the web is the latest of Microsoft’s project management offerings

      What is Project for the web?

      • First introduced in 2019 as Project Service, Project for the web (PFTW) is Microsoft’s entry into the world of cloud-based work management and lightweight project management options.
      • Built on the Power Platform and leveraging the Dataverse for data storage, PFTW integrates with the many applications that M365 users are already employing in their day-to-day work management and collaboration activities.
      • It is available as a part of your M365 subscription with the minimum activation of P1 license – it comes with P3 and P5 licenses as well.
      • From a functionality and user experience perspective, PFTW is closer to applications like Planner or Azure Boards than it is to traditional MS Project options.

      What does it do?

      • PFTW allows for task and dependency tracking and basic timeline creation and scheduling and offers board and grid view options. It also allows real-time coauthoring of tasks among team members scheduled to the same project.
      • PFTW also comes with a product/functionality Microsoft calls Roadmap, which allows users to aggregate multiple project timelines into a single view for reporting purposes.

      What doesn't it do?

      • With PFTW, Microsoft is offering noticeably less traditional project management functionality than its existing solutions. Absent are table stakes project management capabilities like critical path, baselining, resource load balancing, etc.

      Who is it for?

      • Currently, in its base lightweight project management option, PFTW is targeted toward occasional or part-time project managers (not the PMP-certified set) tasked with overseeing and/or collaborating on small to mid-sized initiatives and projects.

      Put Project for the web in perspective

      Out of the box, PFTW occupies a liminal space when it comes to work management options

      • More than a task management tool, but not quite a full project management tool
      • Not exactly a portfolio management tool, yet some PPM reporting functionality is inherent in the PFTW through Roadmap

      The table to the right shows some of the functionality in PFTW in relation to the task management functionality of Planner and the enterprise project and portfolio management functionality of Project Online.

      Table 2.1a Planner Project for the web Project Online
      Coauthoring on Tasks X X
      Task Planning X X X
      Resource Assignments X X X
      Board Views X X X
      MS Teams Integration X X X
      Roadmap X X
      Table and Gantt Views X X
      Task Dependency Tracking X X
      Timesheets X
      Financial Planning X
      Risks and Issues Tracking X
      Program Management X
      Advanced Portfolio Management X

      Project for the web will eventually replace Project Online

      • As early as 2018 Microsoft has been foreshadowing a transition away from the SharePoint-backed Project environments of Server and Online toward something based in Common Data Service (CDS) – now rebranded as the Dataverse.
      • Indeed, as recently as the spring of 2021, at its Reimagine Project Management online event, Microsoft reiterated its plans to sunset Project Online and transition existing Online users to the new environment of Project for the web – though it provided no firm dates when this might occur.
        • The reason for this move away from Online appears to be an acknowledgment that the rigidity of the tool is awkward in our current dynamic, collaborative, and overhead-adverse work management paradigm.
        • To paraphrase a point made by George Bullock, Sr. Product Marketing Manager, for Microsoft at the Reimagine Project Management event, teams want to manage work as they see fit, but the rigidity of legacy solutions doesn’t allow for this, leading to a proliferation of tools and data sprawl. (This comment was made during the “Overview of Microsoft Project” session during the Reimagine event.)

      PFTW is Microsoft’s proposed future-state antidote to this challenge. Its success will depend on how well users are able to integrate the solution into a wider M365 work management setting.

      "We are committed to supporting our customers on Project Online and helping them transition to Project for the Web. No end-of-support has been set for Project Online, but when the time comes, we will communicate our plans on the transition path and give you plenty of advance notice." (Heather Heide, Program Manager, Microsoft Planner and Project. This comment was made during the “Overview of Microsoft Project” session during the Reimagine event.)

      Project for the web can be extended beyond its base lightweight functionality

      Project for the web can be extended to add more traditional and robust project and project portfolio management functionality using the Power Platform.

      Microsoft plans to sunset Project Online in favor of PFTW will at first be a head-scratcher for those familiar with the extensive PPM functionality in Project Online and underwhelmed by the project and portfolio management in PFTW.

      However, having built the solution upon the Power Platform, Microsoft has made it possible to take the base functionality in PFTW and extend it to create a more custom, organizationally specific user experience.

      • With a little taste of what can be done with PFTW by leveraging the Power Platform – and, in particular, Power Apps – it becomes more obvious how we, as users, can begin to evolve the base tool toward a more traditional PPM solution and how, in time, Microsoft’s developers may develop the next iteration of PFTW into something more closely resembling Project Online.

      Before users get too excited about using these tools to build a custom PPM approach, we should consider the time, effort, and skills required. The slides ahead will take you through a series of considerations to help you gauge whether your PMO is ready to go it alone in extending the solution.

      Extending the tool enhances functionality

      Table 2.1a in this step displayed the functionality in PFTW in relation to the task management tool Planner and the robust PPM functionality in Online.

      The table to the right shows how the functionality in PFTW can differ from the base solution and Project Online when it is extended using the model-driven app option in Power Apps.

      Caveat: The list of functionality and processes in this table is sample data.

      This functionality is not inherent in the solution as soon as you integrate with Power Apps. Rather it must be built – and your success in developing these functions will depend upon the time and skills you have available.

      Table 2.1b Project for the web PFTW extended with PowerApps Project Online
      Critical Path X
      Timesheets X
      Financial Planning X X
      Risks and Issues Tracking X X
      Program Management X
      Status Updates X
      Project Requests X
      Business Cases X
      Project Charters X
      Resource Planning and Capacity Management X X
      Project Change Requests X

      Get familiar with the basics of Power Apps before you decide to go it alone

      While the concept of being able to customize and grow a commercial PPM tool is enticing, the reality of low-code development and application maintenance may be too much for resource-constrained PMOs.

      Long story short: Extending PFTW in Power Apps is time consuming and can be frustrating for the novice to intermediate user.

      It can take days, even weeks, just to find your feet in Power Apps, let alone to determine requirements to start building out a custom model-driven app. The latter activity can entail creating custom columns and tables, determining relationships between tables to get required outputs, in addition to basic design activities.

      Time-strapped and resource-constrained practitioners should pause before committing to this deployment approach. To help better understand the commitment, the slides ahead cover the basics of extending PFTW in Power Apps:

      1. Dataverse environments.
      2. Navigating Power App Designer and Sitemap Designer
      3. Customizing tables and forms in the Dataverse

      See Info-Tech’s M365 Project Portfolio Management Tool Guide for more information on Power Apps in general.

      Get familiar with Power Apps licensing

      Power Apps for 365 comes with E1 through E5 M365 licenses (and F3 and F5 licenses), though additional functionality can be purchased if required.

      While extending Project for the web with Power Apps does not at this time, in normal deployments, require additional licensing from what is included in a E3 or E5 license, it is not out of the realm of possibility that a more complex deployment could incur costs not included in the Power Apps for 365 that comes with your enterprise agreement.

      The table to the right shows current additional licensing options.

      Power Apps, Per User, Per App Plan

      Per User Plan

      Cost: US$10 per user per app per month, with a daily Dataverse database capacity of 40 MB and a daily Power Platform request capacity of 1,000. Cost: US$40 per user per month, with a daily Dataverse database capacity of 250 MB and a daily Power Platform request capacity of 5,000.
      What's included? This option is marketed as the option that allows organizations to “get started with the platform at a lower entry point … [or those] that run only a few apps.” Users can run an application for a specific business case scenario with “the full capabilities of Power Apps” (meaning, we believe, that unlicensed users can still submit data via an app created by a licensed user). What's included? A per-user plan allows licensed users to run unlimited canvas apps and model-driven apps – portal apps, the licensing guide says, can be “provisioned by customers on demand.” Dataverse database limits (the 250 MB and 5,000 request capacity mentioned above) are pooled at the per tenant, not the per user plan license, capacity.

      For more on Power Apps licensing, refer to Info-Tech’s Modernize Your Microsoft Licensing for the Cloud Era for more information.

      What needs to be configured?

      Extending Project for the web requires working with your IT peers to get the right environments configured based upon your needs.

      • PFTW data is stored in the Microsoft Dataverse (formerly Common Data Service or CDS).
      • The organization’s Dataverse can be made up of one to many environments based upon its needs. Environments are individual databases with unique proprieties in terms of who can access them and what applications can store data in them.
      • Project for the web supports three different types of environments: default, production, and sandbox.
      • You can have multiple instances of a custom PFTW app deployed across these environments and across different users – and the environment you choose depends upon the use case of each instance.

      Types of Environments

      • Default Environment

        • It is the easiest to deploy and get started with the PFTW Power App in the default environment. However, it is also the most restricted environment with the least room for configuration.
        • Microsoft recommends this environment for simple deployments or for projects that span the organization. This is because everyone in the organization is by default a member of this environment – and, with the least room for configuration, the app is relatively straightforward.
        • At minimum, you need one project license to deploy PFTW in the default environment.
      • Production Environment

        • This environment affords more flexibility for how a custom app can be configured and deployed. Unlike the default environment, deploying a production environment is a manual process (through the Power Platform Admin Center) and security roles need to be set to limit users who can access the environment.
        • Because users can be limited, production environments can be used to support more advanced deployments and can support diverse processes for different teams.
        • At present, you need at least five Project licenses to deploy to production environments.
      • Sandbox Environment

        • This environment is for users who are responsible for the creation of custom apps. It offers the same functionality as a production environment but allows users to make changes without jeopardizing a production environment.

      Resources to provide your IT colleagues with to help in your PFTW deployment:

      1. Project for the web admin help (Product Documentation, Microsoft)
      2. Advanced deployment for Project for the web (Video, Microsoft)
      3. Get Started with Project Power App (Product Support Documentation, Microsoft)
      4. Project for the Web Security Roles (Product Support Documentation, Microsoft)

      Get started creating or customizing a model-driven app

      With the proper environments procured, you can now start extending Project for the web.

      • Navigate to the environment you would like to extend PFTW within. For the purposes of the slides ahead, we’ll be using a sandbox environment for an example. Ensure you have the right access set up for production and sandbox environments of your own (see links on previous slide for more assistance).
      • To begin extending PFTW, the two core features you need to be familiar with before you start in Power Apps are (1) Tables/Entities and (2) the Power Apps Designer – and in particular the Site Map.

      From the Power Apps main page in 365, you can change your environment by selecting from the options in the top right-hand corner of the screen.

      Screenshot of the Power Apps “Apps” page in a sandbox environment. The Project App will appear as “Project” when the application is installed, though it is also easy to create an app from scratch.

      Model-driven apps are built around tables

      In Power Apps, tables (formerly called entities and still referred to as entities in the Power Apps Designer) function much like tables in Excel: they are containers of columns of data for tracking purposes. Tables define the data for your app, and you build your app around them.

      In general, there are three types of tables:

      • Standard: These are out-of-the box tables included with a Dataverse environment. Most standard tables can be customized.
      • Managed: These are tables that get imported into an environment as part of a managed solution. Managed tables cannot be customized.
      • Custom: These types of tables can either be imported from another solution or created directly in the Dataverse environment. To create custom tables, users need to have System Administrator or System Customizer security roles within the Dataverse.

      Tables can be accessed under Data banner on the left-hand panel of your Power Apps screen.

      The below is a list of standard tables that can be used to customize your Project App.

      A screenshot of the 'Data' banner in 'Power Apps' and a list of table names.

      Table Name

      Display Name

      msdyn_project Project
      msdyn_projectchange Change
      msdyn_projectprogram Program
      msdyn_projectrequest Request
      msdyn_projectrisk Risk
      msdyn_projectissue Issue
      msdyn_projectstatusreport Status

      App layouts are designed in the Power App Designer

      You configure tables with a view to using them in the design of your app in the Power Apps Designer.

      • If you’re customizing a Project for the web app manually installed into your production or sandbox environment, you can access Designer by highlighting the app from your list of apps on the Apps page and clicking “Edit” in the ribbon above.
        • If you’re creating a model-driven app from scratch, Designer will open past the “Create a New App” intro screen.
        • If you need to create separate apps in your environment for different PMOs or business units, it is as easy to create an app from scratch as it is to customize the manual install.
      • The App Designer is where you can design the layout of your model-driven app and employ the right data tables.
      Screenshot of the 'App Designer' screen in 'Power Apps'.

      The Site Map determines the navigation for your app, i.e. it is where you establish the links and pages users will navigate. We will review the basics of the sitemap on the next few slides.

      The tables that come loaded into your Project Power App environment (at this time, 37) via the manual install will appear in the Power Apps Designer in the Entity View pane at the bottom of the page. You do not have to use all of them in your design.

      Navigate the Sitemap Designer

      With the components of the previous two slides in mind, let’s walk through how to use them together in the development of a Project app.

      As addressed in the previous slide, the sitemap determines the navigation for your app, i.e. it is where you establish the links and the pages that users will navigate.

      To get to the Sitemap Designer, highlight the Project App from your list of apps on the Apps page and click “Edit” in the ribbon above. If you’re creating a model-driven app from scratch, Designer will open past the “Create a New App” intro screen.

      • To start designing your app layout, click the pencil icon beside the Site Map logo on the App Designer screen.
      • This will take you into the Sitemap Designer (see screenshot to the right). This is where you determine the layout of your app and the relevant data points (and related tables from within the Dataverse) that will factor into your Project App.
      • In the Sitemap Designer, you simply drag and drop the areas, groups, and subareas you want to see in your app’s user interface (see next slide for more details).
      Screenshot of the 'Sitemap Designer' in 'Power Apps'.

      Use Areas, Groups, and Subareas as building blocks for your App

      Screenshots of the main window and the right-hand panel in the 'Sitemap Designer', and of the subarea pop-up panel where you connect components to data tables. The first two separate elements into 'Area', 'Group', and 'Subarea'.

      Drag and drop the relevant components from the panel on the right-hand side of the screen into the main window to design the core pieces that will be present within your user interface.

      For each subarea in your design, use the pop-up panel on the right-hand side of the screen to connect your component the relevant table from within your Dataverse environment.

      How do Areas, Groups, and Subareas translate into an app?

      Screenshots of the main window in the 'Sitemap Designer' and of a left-hand panel from a published 'Project App'. There are notes defining the terms 'Area', 'Group', and 'Subarea' in the context of the screenshot.

      The names or titles for your Areas and Groups can be customized within the Sitemap Designer.

      The names or titles for your Subareas is dependent upon your table name within the Dataverse.

      Area: App users can toggle the arrows to switch between Areas.

      Group: These will change to reflect the chosen Area.

      Subarea: The tables and forms associated with each subarea.

      How to properly save and publish your changes made in the Sitemap Designer and Power Apps Designer:

      1. When you are done making changes to your components within the Sitemap Designer, and want your changes to go live, hit the “Publish” button in the top right corner; when it has successfully published, select “Save and Close.”
      2. You will be taken back to the Power App Designer homepage. Hit “Save,” then “Publish,” and then finally “Play,” to go to your app or “Save and Close.”

      How to find the right tables in the Dataverse

      While you determine which tables will play into your app in the Sitemap Designer, you use the Tables link to customize tables and forms.

      Screenshots of the tables search screen and the 'Tables' page under the 'Data' banner in 'Power Apps'.

      The Tables page under the Data banner in Power Apps houses all of the tables available in your Dataverse environment. Do not be overwhelmed or get too excited. Only a small portion of the tables in the Tables folder in Power Apps will be relevant when it comes to extending PFTW.

      Find the table you would like to customize and/or employ in your app and select it. The next slides will look at customizing the table (if you need to) and designing an app based upon the table.

      To access all the tables in your environment, you’ll need to ensure your filter is set correctly on the top right-hand corner of the screen, otherwise you will only see a small portion of the tables in your Dataverse environment.

      If you’re a novice, it will take you some time to get familiar with the table structure in the Dataverse.

      We recommend you start with the list of tables listed on slide. You can likely find something there that you can use or build from for most PPM purposes.

      How to customize a table (1 of 3)

      You won’t necessarily need to customize a table, but if you do here are some steps to help you get familiar with the basics.

      Screenshot of the 'Columns' tab, open in the 'msdyn_project table' in 'Power Apps'.

      In this screenshot, we are clicked into the msdyn_project (display name: Project) table. As you can see, there are a series of tabs below the name of the table, and we are clicked into the Columns tab. This is where you can see all of the data points included in the table.

      You are not able to customize all columns. If a column that you are not able to customize does not meet your needs, you will need to create a custom column from the “+Add column” option.

      “Required” or “Optional” status pertains to when the column or field is used within your app. For customizable or custom columns this status can be set when you click into each column.

      How to customize a table (2 of 3)

      Create a custom “Status” column.

      By way of illustrating how you might need to customize a table, we’ll highlight the “msdyn_project_statecode” (display name: Project Status) column that comes preloaded in the Project (msdyn_project) table.

      • The Project Status column only gives you a binary choice. While you are able to customize what that binary choice is (it comes preloaded with “Active” and “Inactive” as the options) you cannot add additional choices – so you cannot set it to red/yellow/green, the most universally adopted options for status in the project portfolio management world.
      • Because of this, let’s look at the effort involved in creating a choice and adding a custom column to your table based upon that choice.
      Screenshots of the '+New choice' button in the 'Choices' tab and the 'New choice' pane that opens when you click it.

      From within the Choices tab, click “+New choice” option to create a custom choice.

      A pane will appear to the right of your screen. From there you can give your choice a name, and under the “Items” header, add your list of options.

      Click save. Your custom choice is now saved to the Choices tab in the Dataverse environment and can be used in your table. Further customizations can be made to your choice if need be.

      How to customize a table (3 of 3)

      Back in the Tables tab, you can put your new choice to work by adding a column to a table and selecting your custom choice.

      Screenshots of the pop-up window that appear when you click '+Add Column', and details of what happens when you select the data type 'Choice'.

      Start by selecting “+ Add Column” at the top left-hand side of your table. A window will appear on the right-hand side of the page, and you will have options to name your column and choose the data type.

      As you can see in this screenshot to the left, data type options include text, number and date types, and many more. Because we are looking to use our custom choice for this example, we are going to choose “Choice.”

      When you select “Choice” as your data type, all of the choice options available or created in your Dataverse environment will appear. Find your custom choice – in this example the one name “RYG Status” – and click done. When the window closes, be sure to select “Save Table.”

      How to develop a Form based upon your table (1 of 3 – open the form editor)

      A form is the interface users will engage with when using your Project app.

      When the Project app is first installed in your environment, the main user form will be lacking, with only a few basic data options.

      This form can be customized and additional tabs can be added to your user interface.

      1. To do this, go to the table you want to customize.
      2. In the horizontal series of tabs at the top of the screen, below the table title select the “Forms” option.
      3. Click on the main information option or select Edit Form for the form with “Main” under its form type. A new window will open where you can customize your form.
      Screenshot of the 'Forms' tab, open in the 'msdyn_project' table in 'Power Apps'.

      Select the Forms tab.

      Start with the form that has “Main” as its Format Type.

      How to develop a Form based upon your table (2 of 3 – add a component)

      Screenshot of the 'Components' window in 'Power Apps' with a list of layouts as a window to the right of the main screen where you can name and format the chosen layout.

      You can add element like columns or sections to your form by selecting the Components window.

      In this example, we are adding a 1-Column section. When you select that option from the menu options on the left of the screen, a window will open to the right of the screen where you can name and format the section.

      Choose the component you would like to add from the layout options. Depending on the table element you are looking to use, you can also add input options like number inputs and star ratings and pull in related data elements like a project timeline.

      How to develop a Form based upon your table (3 of 3 – add table columns)

      Screenshot of the 'Table Columns' window in 'Power Apps' and instructions for adding table columns.

      If you click on the “Table Columns” option on the left-hand pane, all of the column options from within your table will appear in alphabetical order.

      When clicked within the form section you would like to add the new column to, select the column from the list of option in the left-hand pane. The new data point will appear within the section. You can order and format section elements as you would like.

      When you are done editing the form, click the “Save” icon in the top right-hand corner. If you are ready for your changes to go live within your Project App, select the “Publish” icon in the top right-hand corner. Your updated form will go live within all of the apps that use it.

      The good and the bad of extending Project for the web

      The content in this step has not instructed users how to extend PFTW; rather, it has covered three basic core pieces of Power Apps that those interesting in PFTW need to be aware of: Dataverse environments, the Power Apps and Sitemaps Designers, and Tables and associated Forms.

      Because we have only covered the very tip of the iceberg, those interested in going further and taking a DIY approach to extending PFTW will need to build upon these basics to unlock further functionality. Indeed, it takes work to develop the product into something that begins to resemble a viable enterprise project and portfolio management solution. Here are some of the good and the bad elements associated with that work:

      The Good:

      • You can right-size and purpose build: add as much or as little project management rigor as your process requires. Related, you can customize the solution in multiple ways to suit the needs of specific business units or portfolios.
      • Speed to market: it is possible to get up and running quickly with a minimum-viable product.

      The Bad:

      • Work required: to build anything beyond MVP requires independent research and trial and error.
      • Time required: to build anything beyond MVP requires time and skills that many PMOs don’t have.
      • Shadow support costs: ungoverned app creation could have negative support and maintenance impacts across IT.

      "The move to Power Platform and low code development will […increase] maintenance overhead. Will low code solution hit problems at scale? [H]ow easy will it be to support hundreds or thousands of small applications?

      I can hear the IT support desks already complaining at the thought of this. This part of the puzzle is yet to hit real world realities of support because non developers are busy creating lots of low code applications." (Ben Hosking, Software Developer and Blogger, "Why low code software development is eating the world")

      Quick start your extension with the Accelerator

      For those starting out, there is a pre-built app you can import into your environment to extend the Project for the web app without any custom development.

      • If the DIY approach in the previous slides was overwhelming, and you don’t have the budget for a MS Partner route in the near-term, this doesn’t mean that evolving your Project for the web app is unattainable.
      • Thanks to a partnership between OnePlan (one of the MS Gold Partners we detail in the next step) and Microsoft, Project for the web users have access to a free resource to help them evolve the base Project app. It’s called the “Project for the web Accelerator” (commonly referred to as “the Accelerator” for short).
      • Users interested in learning more about, and accessing, this free resource should refer to the links below:
        1. The Future of Microsoft Project Online (source: OnePlan).
        2. Introducing the Project Accelerator (source: Microsoft).
        3. Project for the web Accelerator (source: GitHub)
      Screen shot from one of the dashboards that comes with the Accelerator (image source: GitHub).

      2.1.1 Perform a feasibility test (1 of 2)

      15 mins

      As we’ve suggested, and as the material in this step indicates, extending PFTW in a DIY fashion is not small task. You need a knowledge of the Dataverse and Power Apps, and access to the requisite skills, time, and resources to develop the solution.

      To determine whether your PMO and organization are ready to go it alone in extending PFTW, perform the following activity:

      1. Convene a collection of portfolio, project, and PMO staff.
      2. Using the six-question survey on tab 5 of the Microsoft Project & M365 Licensing Tool (see screenshot to the right) as a jumping off point for a discussion, consider the readiness of your PMO or project organization to undertake a DIY approach to extending and implementing PFTW at this time.
      3. You can use the recommendations on tab 5 of the Microsoft Project & 365 Licensing Tool to inform your next steps, and input the gauge graphic in section 4 of the Microsoft Project & M365 Action Plan Template.
      Screenshots from the 'Project for the Web Extensibility Feasibility Test'.

      Go to tab 5 of the Microsoft Project & M365 Licensing Tool

      See next slide for additional activity details

      2.1.1 Perform a feasibility test (2 of 2)

      Input: The contents of this step, The Project for the Web Extensibility Feasibility Test (tab 5 in the Microsoft Project & 365 Licensing Tool)

      Output: Initial recommendations on whether to proceed and how to proceed with a DIY approach to extending Project for the web

      Materials: The Project for the Web Extensibility Feasibility Test (tab 5 in the Microsoft Project & 365 Licensing Tool)

      Participants: Portfolio Manager (PMO Director), Project Managers, Other relevant PMO stakeholders

      Step 2.2

      Assess the Microsoft Gold Partner Community

      Activities

      • Review what to look for in a Microsoft Partner
      • Determine whether your needs would benefit from reaching out to a Microsoft Partner
      • Review three key Partners from the North American market
      • Create a Partner outreach plan

      This step will walk you through the following activities:

      • Review what to look for in a Microsoft Partner.
      • Determine whether your needs would benefit from reaching out to a Microsoft Partner.
      • Review three key Partners from the North American market.

      This step usually involves the following participants:

      • Portfolio Manager (PMO Director)
      • Project Managers
      • Other relevant PMO stakeholders

      Outcomes of Step

      • A better understanding of MS Partners
      • A Partner outreach plan

      You don’t have to go it alone

      Microsoft has an established community of Partners who can help in your customizations and implementations of Project for the web and other MS Project offerings.

      If the content in the previous step seemed too technical or overly complex in a way that scared you away from a DIY approach to extending Microsoft’s latest project offering (and at some point in the near future, soon to be its only project offering), Project for the web, fear not.

      You do not have to wade into the waters of extending Project for the web alone, or for that matter, in implementing any other MS Project solution.

      Instead, Microsoft nurtures a community of Silver and Gold partners who offer hands-on technical assistance and tool implementation services. While the specific services provided vary from partner to partner, all can assist in the customization and implementation of any of Microsoft’s Project offerings.

      In this step we will cover what to look for in a Partner and how to assess whether you are a good candidate for the services of a Partner. We will also highlight three Partners from within the North American market.

      The basics of the Partner community

      What is a Microsoft Partner?

      Simply put, an MS Gold Partner is a software or professional services organization that provides sales and services related to Microsoft products.

      They’re resellers, implementors, integrators, software manufacturers, trainers, and virtually any other technology-related business service.

      • Microsoft has for decades opted out of being a professional services organization, outside of its very “leading edge” offerings from MCS (Microsoft Consulting Services) for only those technologies that are so new that they aren’t yet supported by MS Partners.
      • As you can see in the chart on the next slide, to become a silver or gold certified partner, firms must demonstrate expertise in specific areas of business and technology in 18 competency areas that are divided into four categories: applications and infrastructure, business applications, data and AI, and modern workplace and security.

      More information on what it takes to become a Microsoft Partner:

      1. Partner Center (Document Center, Microsoft)
      2. Differentiate your business by attaining Microsoft competencies (Document Center, Microsoft)
      3. Partner Network Homepage (Webpage, Microsoft)
      4. See which partner offer is right for you (Webpage, Microsoft)

      Types of partnerships and qualifications

      Microsoft Partner Network

      Microsoft Action Pack

      Silver Competency

      Gold Competency

      What is it?

      The Microsoft Partner Network (MPN) is a community that offers members tools, information, and training. Joining the MPN is an entry-level step for all partners. The Action Pack is an annual subscription offered to entry-level partners. It provides training and marketing materials and access to expensive products and licenses at a vastly reduced price. Approximately 5% of firms in the Microsoft Partner Network (MPN) are silver partners. These partners are subject to audits and annual competency exams to maintain silver status. Approximately 1% of firms in the Microsoft Partner Network (MPN) are gold partners. These partners are subject to audits and annual competency exams to maintain Gold status.

      Requirements

      Sign up for a membership Annual subscription fee While requirements can vary across competency area, broadly speaking, to become a silver partner firms must:
      • Pass regular exams and skills assessments, with at least two individuals on staff with Microsoft Certified Professional Status.
      • Hit annual customer, revenue, and licensing metrics.
      • Pay the annual subscription fee.
      While requirements can vary across competency area, broadly speaking, to become a gold partner firms must:
      • Pass regular exams and skills assessments, with at least two individuals on staff with Microsoft Certified Professional Status.
      • Hit annual customer, revenue, and licensing metrics.
      • Pay the annual subscription fee.

      Annual Fee

      No Cost $530 $1800 $5300

      When would a MS Partner be helpful?

      • Project management and portfolio management practitioners might look into procuring the services of a Microsoft Partner for a variety of reasons.
      • Because services vary from partner to partner (help to extend Project for the web, implement Project Server or Project Online, augment PMO staffing, etc.) we won’t comment on specific needs here.
      • Instead, the three most common conditions that trigger the need are listed to the right.

      Speed

      When you need to get results faster than your staff can grow the needed capabilities.

      Cost

      When the complexity of the purchase decision, implementation, communication, training, configuration, and/or customization cannot be cost-justified for internal staff, often because you’ll only do it once.

      Expertise & Skills

      When your needs cannot be met by the core Microsoft technology without significant extension or customization.

      Canadian Microsoft Partners Spotlight

      As part of our research process for this blueprint, Info-Tech asked Microsoft Canada for referrals and introductions to leading Microsoft Partners. We spent six months collaborating with them on fresh research into the underlying platform.

      These vendors are listed below and are highlighted in subsequent slides.

      Spotlighted Partners:

      Logo for One Plan. Logo for PMO Outsource Ltd. Logo for Western Principles.

      Please Note: While these vendors were referred to us by Microsoft Canada and have a footprint in the Canadian market, their footprints extend beyond this to the North American and global markets.

      A word about our approach

      Photo of Barry Cousins, Project Portfolio Management Practice Lead, Info-Tech Research Group.
      Barry Cousins
      Project Portfolio Management Practice Lead
      Info-Tech Research Group

      Our researchers have been working with Microsoft Project Online and Microsoft Project Server clients for years, and it’s fair to say that most of these clients (at some point) used a Microsoft Partner in their deployment. They’re not really software products, per se; they’re platforms. As a Microsoft Partner in 2003 when Project Server got its first big push, I heard it loud and clear: “Some assembly required. You might only make 7% on the licensing, but the world’s your oyster for services.”

      In the past few years, Microsoft froze the market for major Microsoft Project decisions by making it clear that the existing offering is not getting updates while the new offering (Project for the web) doesn’t do what the old one did. And in a fascinating timing coincidence, the market substantially adopted Microsoft 365 during that period, which enables access to Project for the web.

      Many of Info-Tech’s clients are justifiably curious, confused, and concerned, while the Microsoft Partners have persisted in their knowledge and capability. So, we asked Microsoft Canada for referrals and introductions to leading Microsoft Partners and spent six months collaborating with them on fresh research into the underlying platform.

      Disclosure: Info-Tech conducted collaborative research with the partners listed on the previous slide to produce this publication. Market trends and reactions were studied, but the only clients identified were in case studies provided by the Microsoft Partners. Info-Tech’s customers have been, and remain, anonymous. (Barry Cousins, Project Portfolio Management Practice Lead, Info-Tech Research Group)

      MS Gold Partner Spotlight:

      OnePlan

      Logo for One Plan.
      Headquarters: San Marcos, California, and Toronto, Ontario
      Number of Employees: ~80
      Active Since: 2007 (as EPMLive)
      Website: www.oneplan.ai

      Who are they?

      • While the OnePlan brand has only been the marketplace for a few years, the company has been a major player in MS Gold Partner space for well over a decade.
      • Born out of EPMLive in the mid-aughts, OnePlan Solutions has evolved through a series of acquisitions, including Upland, Tivitie, and most recently Wicresoft.

      What do they do?

      • Software: Its recent rebranding is largely because OnePlan Solutions is as much a software company as it is a professional services firm. The OnePlan software product is an impressive solution that can be used on its own to facilitate the portfolio approaches outlined on the next slide and that can also integrate with the tools your organization is already using to manage tasks (see here for a full rundown of the solutions within the Microsoft stack and beyond OnePlan can integrate with).
      • Beyond its ability to integrate with existing solutions, as a software product, OnePlan has modules for resource planning, strategic portfolio planning, financial planning, time tracking, and more.

      • PPM Consulting Services: The OnePlan team also offers portfolio management consulting services. See the next slide for a list of its approaches to project portfolio management.

      Markets served

      • US, Canada, Europe, and Australia

      Channel Differentiation

      • OnePlan scales to all the PPM needs of all industry types.
      • Additionally, OnePlan offers insights and functionality specific to the needs of BioTech-Pharma.

      What differentiates OnePlan?

      • OnePlan co-developed the Project Accelerator for Project for the web with Microsoft. The OnePlan team’s involvement in developing the Accelerator and making it free for users to access suggests it is aligned to and has expertise in the purpose-built and collaborative vision behind Microsoft’s move away from Project Online and toward the Power Platform and Teams collaboration.
      • 2021 MS Gold Partner of the Year. At Microsoft’s recent Microsoft Inspire event, OnePlan was recognized as the Gold Partner of the Year for Project and Portfolio Management as well as a finalist for Power Apps and Power Automate.
      • OnePlan Approaches: Below is a list of the services or approaches to project portfolio management that OnePlan provides. See its website for more details.
        • Strategic Portfolio Management: Align work to objectives and business outcomes. Track performance against the proposed objectives outcomes.
        • Agile Portfolio Management: Implement Agile practices across the organization, both at the team and executive level.
        • Adaptive Portfolio Management: Allow teams to use the project methodology and tools that best suit the work/team. Maintain visibility and decision making across the entire portfolio.
        • Professional Services Automation: Use automation to operate with greater efficiency.

      "OnePlan offers a strategic portfolio, financial and resource management solution that fits the needs of every PMO. Optimize your portfolio, financials and resources enterprise wide." (Paul Estabrooks, Vice President at OnePlan)

      OnePlan Case Study

      This case study was provided to Info-Tech by OnePlan.

      Brambles

      INDUSTRY: Supply Chain & Logistics
      SOURCE: OnePlan

      Overview: Brambles plays a key role in the delivery or return of products amongst global trading partners such as manufacturers, distributors and retailers.

      Challenge

      Brambles had a variety of Project Management tools with no easy way of consolidating project management data. The proliferation of project management solutions was hindering the execution of a long-term business transformation strategy. Brambles needed certain common and strategic project management processes and enterprise project reporting while still allowing individual project management solutions to be used as part of the PPM platform.

      Solution

      As part of the PMO-driven business transformation strategy, Brambles implemented a project management “operating system” acting as a foundation for core processes such as project intake, portfolio management, resource, and financial planning and reporting while providing integration capability for a variety of tools used for project execution.

      OnePlan’s new Adaptive PPM platform, combining the use of PowerApps and OnePlan, gives Brambles the desired PPM operating system while allowing for tool flexibility at the execution level.

      Results

      • Comprehensive picture of progress across the portfolio.
      • Greater adoption by allowing flexibility of work management tools.
      • Modern portfolio management solution that enables leadership to make confident decision.

      Solution Details

      • OnePlan
      • Project
      • Power Apps
      • Power Automate
      • Power BI
      • Teams

      Contacting OnePlan Solutions

      www.oneplan.ai

      Joe Larscheid: jlarscheid@oneplan.ai
      Paul Estabrooks: pestabrooks@oneplan.ai
      Contact Us: contact@oneplan.ai
      Partners: partner@oneplan.ai

      Partner Resources. OnePlan facilitates regular ongoing live webinars on PPM topics that anyone can sign up for on the OnePlan website.

      For more information on upcoming webinars, or to access recordings of past webinars, see here.

      Additional OnePlan Resources

      1. How to Extend Microsoft Teams into a Collaborative Project, Portfolio and Work Management Solution (on-demand webinar, OnePlan’s YouTube channel)
      2. What Does Agile PPM Mean To The Modern PMO (on-demand webinar, OnePlan’s YouTube channel)
      3. OnePlan is fused with the Microsoft User Experience (blog article, OnePlan)
      4. Adaptive Portfolio Management Demo – Bringing Order to the Tool Chaos with OnePlan (product demo, OnePlan’s YouTube channel)
      5. How OnePlan is aligning with Microsoft’s Project and Portfolio Management Vision (blog article, OnePlan)
      6. Accelerating Office 365 Value with a Hybrid Project Portfolio Management Solution (product demo, OnePlan’s YouTube channel)

      MS Gold Partner Spotlight:

      PMO Outsource Ltd.

      Logo for PMO Outsource Ltd.

      Headquarters: Calgary, Alberta, and Mississauga, Ontario
      Website: www.pmooutsource.com

      Who are they?

      • PMO Outsource Ltd. is a Microsoft Gold Partner and PMI certified professional services firm based in Alberta and Ontario, Canada.
      • It offers comprehensive project and portfolio management offerings with a specific focus on project lifecycle management, including demand management, resource management, and governance and communication practices.

      What do they do?

      • Project Online and Power Platform Expertise. The PMO Outsource Ltd. team has extensive knowledge in both Microsoft’s old tech (Project Server and Desktop) and in its newer, cloud-based technologies (Project Online, Project for the web, the Power Platform, and Dynamics 365). As the case study in two slides demonstrates, PMO Outsource Ltd. Uses its in-depth knowledge of the Microsoft suite to help organizations automate project and portfolio data collection process, create efficiencies, and encourage cloud adoption.
      • PPM Consulting Services: In addition to its Microsoft platform expertise, the PMO Outsource Ltd. team also offers project and portfolio management consulting services, helping organizations evolve their process and governance structures as well as their approaches to PPM tooling.

      Markets served

      • Global

      Channel Differentiation

      • PMO Outsource Ltd. scales to all the PPM needs of all industry types.

      What differentiates PMO Outsource Ltd.?

      • PMO Staff Augmentation. In addition to its technology and consulting services, PMO Outsource Ltd. offers PMO staff augmentation services. As advertised on its website, it offers “scalable PMO staffing solutions. Whether you require Project Managers, Business Analysts, Admins or Coordinators, [PMO Outsource Ltd.] can fulfill your talent search requirements from a skilled pool of resources.”
      • Multiple and easy-to-understand service contract packages. PMO Outsource Ltd. offers many prepackaged service offerings to suit PMOs’ needs. Those packages include “PMO Management, Admin, and Support,” “PPM Solution, Site and Workflow Configuration,” and “Add-Ons.” For full details of what’s included in these services packages, see the PMO Outsource Ltd. website.
      • PMO Outsource Ltd. Services: Below is a list of the services or approaches to project portfolio management that PMO Outsource Ltd. Provides. See its website for more details.
        • Process Automation, Workflows, and Tools. Facilitate line of sight by tailoring Microsoft’s technology to your organization’s needs and creating custom workflows.
        • PMO Management Framework. Receive a professionally managed PPM methodology as well as governance standardization of processes, tools, and templates.
        • Custom BI Reports. Leverage its expertise in reporting and dashboarding to create the visibility your organization needs.

      "While selecting an appropriate PPM tool, the PMO should not only evaluate the standard industry tools but also analyze which tool will best fit the organization’s strategy, budget, and culture in the long run." (Neeta Manghnani, PMO Strategist, PMO Outsource Ltd.)

      PMO Outsource Ltd. Case Study

      This case study was provided to Info-Tech by PMO Outsource Ltd.

      SAMUEL

      INDUSTRY: Manufacturing
      SOURCE: PMO Outsource Ltd.

      Challenge

      • MS Project 2013 Server (Legacy/OnPrem)
      • Out-of-support application and compliance with Office 365
      • Out-of-support third-party application for workflows
      • No capability for resource management
      • Too many manual processes for data maintenance and server administration

      Solution

      • Migrate project data to MS Project Online
      • Recreate workflows using Power Automate solution
      • Configure Power BI content packs for Portfolio reporting and resource management dashboards
      • Recreate OLAP reports from legacy environment using Power BI
      • Cut down nearly 50% of administrative time by automating PMO/PPM processes
      • Save costs on Server hardware/application maintenance by nearly 75%

      Full Case Study Link

      • For full details about how PMO Outsource Ltd. assisted Samuel in modernizing its solution and creating efficiencies, visit the Microsoft website where this case study is highlighted.

      Contacting PMO Outsource Ltd.

      www.pmooutsource.com

      700 8th Ave SW, #108
      Calgary, AB T2P 1H2
      Telephone : +1 (587) 355-3745
      6045 Creditview Road, #169
      Mississauga, ON L5V 0B1
      Telephone : +1 (289) 334-1228
      Information: info@pmooutsource.com
      LinkedIn: https://www.linkedin.com/company/pmo-outsource/

      Partner Resources. PMO Outsource Ltd.’s approach is rooted within a robust and comprehensive PPM framework that is focused on driving strategic outcomes and business success.

      For a full overview of its PPM framework, see here.

      Additional PMO Outsource Ltd. Resources

      1. 5 Benefits of PPM tools and PMO process automation (blog article, PMO Outsource Ltd.)
      2. Importance of PMO (blog article, PMO Outsource Ltd.)
      3. Meet the Powerful and Reimagined PPM tool for Everyone! (video, PMO Outsource Ltd. LinkedIn page)
      4. MS Project Tips: How to add #Sprints to an existing Project? (video, PMO Outsource Ltd. LinkedIn page)
      5. MS Project Tips: How to add a milestone to your project? (video, PMO Outsource Ltd. LinkedIn page)
      6. 5 Benefits of implementing Project Online Tools (video, PMO Outsource Ltd. LinkedIn page)

      MS Gold Partner Spotlight:

      Western Principles

      Logo for Western Principles.

      Headquarters: Vancouver, British Columbia
      Years Active: 16 Years
      Website: www.westernprinciples.com

      Who are they?

      • Western Principles is a Microsoft Gold Partner and UMT 360 PPM software provider based in British Columbia with a network of consultants across Canada.
      • In the last sixteen years, it has successfully conducted over 150 PPM implementations, helping in the implementation, training, and support of Microsoft Project offerings as well as UMT360 – a software solution provider that, much like OnePlan, enhances the PPM capabilities of the Microsoft platform.

      What do they do?

      • Technology expertise. The Western Principles team helps organizations maximize the value they are getting form the Microsoft Platform. Not only does it offer expertise in all the solutions in the MS Project ecosystem, it also helps organizations optimize their use and understanding of Teams, SharePoint, the Power Platform, and more. In addition to the Microsoft platform, Western Principles is partnered with many other technology providers, including UMT360 for strategic portfolio management, the Simplex Group for project document controls, HMS for time sheets, and FluentPro for integration, back-ups, and migrations.
      • PPM Consulting Services: In addition to its technical services and solutions, Western Principles offers PPM consulting and staff augmentation services.

      Markets served

      • Canada

      Channel Differentiation

      • Western Principles scales to all the PPM needs of all industry types, public and private sector.
      • In addition, its website offers persona-specific information based on the PPM needs of engineering and construction, new product development, marketing, and more.

      What differentiates Western Principles?

      • Gold-certified UMT 360 partner. In addition to being a Microsoft Gold Partner, Western Principles is a gold-certified UMT 360 partner. UMT 360 is a strategic portfolio management tool that integrates with many other work management solutions to offer holistic line of sight into the organization’s supply-demand pain points and strategic portfolio management needs. Some of the solutions UMT 360 integrates with include Project Online and Project for the web, Azure DevOps, Jira, and many more. See here for more information on the impressive functionality in UMT360.
      • Sustainment Services. Adoption can be the bane of most PPM tool implementations. Among the many services Western Principles offers, its “sustainment services” stand out. According to Western Principles’ website, these services are addressed to those who require “continual maintenance, change, and repair activities” to keep PPM systems in “good working order” to help maximize ROI.
      • Western Principles Services: In addition to the above, below is a list of some of the services that Western Principles offers. See its website for a full list of services.
        • Process Optimization: Determine your requirements and process needs.
        • Integration: Create a single source of truth.
        • Training: Ensure your team knows how to use the systems you implement.
        • Staff Augmentation: Provide experienced project team members based upon your needs.

      "One of our principles is to begin with the end in mind. This means that we will work with you to define a roadmap to help you advance your strategic portfolio … and project management capabilities. The roadmap for each customer is different and based on where you are today, and where you need to get to." (Western Principles, “Your Strategic Portfolio Management roadmap,” Whitepaper)

      Contacting Western Principles

      www.westernprinciples.com

      610 – 700 West Pender St.
      Vancouver, BC V6C 1G8
      +1 (800) 578-4155
      Information: info@westernprinciples.com
      LinkedIn: https://www.linkedin.com/company/western-principle...

      Partner Resources. Western Principles provides a multitude of current case studies on its home page. These case studies let you know what the firm is working on this year and the type of support it provides to its clientele.

      To access these case studies, see here.

      Additional Western Principles Resources

      1. Program and Portfolio Roll ups with Microsoft Project and Power BI (video, Western Principles YouTube Channel)
      2. Dump the Spreadsheets for Microsoft Project Online (video, Western Principles YouTube Channel)
      3. Power BI for Project for the web (video, Western Principles YouTube Channel)
      4. How to do Capacity Planning and Resource Management in Microsoft Project Online [Part 1 & Part 2] (video, Western Principles YouTube Channel)
      5. Extend & Integrate Microsoft Project (whitepaper, Western Principles)
      6. Your COVID-19 Return-to-Work Plan (whitepaper, Western Principles)

      Watch Info-Tech’s Analyst-Partner Briefing Videos to lean more

      Info-Tech was able to sit down with the partners spotlighted in this step to discuss the current state of the PPM market and Microsoft’s place within it.

      • All three partners spotlighted in this step contributed to Info-Tech’s research process for this publication.
      • For two of the partners, OnePlan and PMO Outsource Ltd., Info-Tech was able to record a conversation where our analysts and the partners discuss Microsoft’s current MS Project offerings, the current state of the PPM tool market, and the services and the approaches of each respective partner.
      • A third video briefing with Western Principles has not happened yet due to logistical reasons. We are hoping we can include a video chat with our peers at Western Principles in the near future.
      Screenshot form the Analyst-Partner Briefing Videos. In addition to the content covered in this step, you can use these videos for further information about the partners to inform your next steps.

      Download Info-Tech’s Analyst-Partner Briefing Videos (OnePlan & PMO Outsource Ltd.)

      2.2.1 Create a partner outreach plan

      1-3 hours

      Input: Contents of this step, List of additional MS Gold Partners

      Output: A completed partner outreach program

      Materials: MS Project & M365 Action Plan Template

      Participants: Portfolio Manager (PMO Director), PMO Admin Team, Project Managers, CIO

      1. With an understanding of the partner ecosystem, compile a working group of PMO peers and stakeholders to produce a gameplan for engaging the MS Gold Partner ecosystem.
        • For additional partner options see Microsoft’s Partner Page.
      2. Using slide 20 in Info-Tech’s MS Project and M365 Action Plan Template, document the Partners you would want or have scheduled briefings with.
        • As you go through the briefings and research process, document the pros and cons and areas of specialized associated with each vendor for your particular work management implementation.

      Download the Microsoft Project & M365 Action Plan Template

      2.2.2 Document your PM and PPM requirements

      1-3 hours

      Input: Project Portfolio Management Maturity Assessment, Project Management Maturity Assessment

      Output: MS Project & M365 Action Plan Template

      Materials: Project Portfolio Management Maturity Assessment, Project Management Maturity Assessment, MS Project & M365 Action Plan Template

      Participants: Portfolio Manager (PMO Director), PMO Admin Team, Project Managers, CIO

      1. As you prepare to engage the Partner Community, you should have a sense of where your project management and project portfolio management gaps are to better communicate your tooling needs.
      2. Leverage tab 4 from both your Project Portfolio Management Assessment and Project Management Assessment from step 1.3 of this blueprint to help document and communicate your requirements. Those tabs prioritize your project and portfolio management needs by highest impact for the organization.
      3. You can use the outputs of the tab to inform your inputs on slide 23 of the MS Project & M365 Action Plan Template to present to organizational stakeholders and share with the Partners you are briefing with.

      Download the Microsoft Project & M365 Action Plan Template

      Determine the Future of Microsoft Project for Your Organization

      Phase 3: Finalize Your Implementation Approach

      Phase 1: Determine Your Tool NeedsPhase 2: Weigh Your Implementation Options

      Phase 3: Finalize Your Implementation Approach

      • Step 1.1: Survey the M365 work management landscape
      • Step 1.2: Perform a process maturity assessment to help inform your M365 starting point
      • Step 1.3: Consider the right MS Project licenses for your stakeholders
      • Step 2.1: Get familiar with extending Project for the web using Power Apps
      • Step 2.2: Assess the MS Gold Partner Community
      • Step 3.1: Prepare an action plan

      Phase Outcomes

      An action plan concerning what to do with MS Project and M365 for your PMO or project organization.

      Step 3.1

      Prepare an action plan

      Activities

      • Compile the current state results
      • Prepare an Implementation Roadmap
      • Complete your presentation deck

      This step will walk you through the following activities:

      • Assess the impact of organizational change for the project
      • Develop your vision for stakeholders
      • Compile the current state results and document the implementation approach
      • Create clarity through a RACI and proposed implementation timeline

      This step usually involves the following participants:

      • Portfolio Manager (PMO Director)
      • PMO Admin Team
      • Business Analysts
      • Project Managers

      Outcomes of Step

      • Microsoft Project and M365 Action Plan

      Assess the impact of organizational change

      Be prepared to answer: “What’s in it for me?”

      Before jumping into licensing and third-party negotiations, ensure you’ve clearly assessed the impact of change.

      Tailor the work effort involved in each step, as necessary:

      1. Assess the impact
        • Use the impact assessment questions to identify change impacts.
      2. Plan for change
        • Document the impact on each stakeholder group.
        • Anticipate their response.
        • Curate a compelling message for each stakeholder group.
        • Develop a communication plan.
      3. Act according to plan
        • Identify your executive sponsor.
        • Enable the sponsor to drive change communication.
        • Coach managers on how they can drive change at the individual level.

      Impact Assessment Questions

      • Will the change impact how our clients/customers receive, consume, or engage with our products/services?
      • Will there be a price increase?
      • Will there be a change to compensation and/or rewards?
      • Will the vision or mission of the job change?
      • Will the change span multiple locations/time zones?
      • Are multiple products/services impacted by this change?
      • Will staffing levels change?
      • Will this change increase the workload?
      • Will the tools of the job be substantially different?
      • Will a new or different set of skills be needed?
      • Will there be a change in reporting relationships?
      • Will the workflow and approvals be changed?
      • Will there be a substantial change to scheduling and logistics?

      Master Organizational Change Management Practices blueprint

      Develop your vision for stakeholders

      After careful analysis and planning, it’s time to synthesize your findings to those most impacted by the change.

      Executive Brief

      • Prepare a compelling message about the current situation.
      • Outline the considerations the working group took into account when developing the action plan.
      • Succinctly describe the recommendations proposed by the working group.

      Goals

      • Identify the goals for the project.
      • Explain the details for each goal to develop the organizational rationale for the project.
      • These goals are the building blocks for the change communication that the executive sponsor will use to build a coalition of sponsors.

      Future State Vision

      • Quantify the high-level costs and benefits of moving forward with this project.
      • Articulate the future- state maturity level for both the project and project portfolio management process.
      • Reiterate the organizational rationale and drivers for change.

      "In failed transformations, you often find plenty of plans, directives, and programs, but no vision…A useful rule of thumb: If you can’t communicate the vision to someone in five minutes or less and get a reaction that signifies both understanding and interest, you are not yet done…" (John P. Kotter, Leading Change)

      Get ready to compile the analysis completed throughout this blueprint in the subsequent activities. The outputs will come together in your Microsoft Project and M365 Action Plan.

      Use the Microsoft Project & M365 Action Plan Template to help communicate your vision

      Our boardroom-ready presentation and communication template can be customized using the outputs of this blueprint.

      • Getting stakeholders to understand why you are recommending specific work management changes and then communicating exactly what those changes are and what they will cost is key to the success of your work management implementation.
      • To that end, the slides ahead walk you through how to customize the Microsoft Project & M365 Action Plan Template.
      • Many of the current-state analysis activities you completed during phase 1 of this blueprint can be directly made use of within the template as can the decisions you made and requirements you documented during phase 2.
      • By the end of this step, you will have a boardroom-ready presentation that will help you communicate your future-state vision.
      Screenshot of Info-Tech's Microsoft Project and M365 Action Plan Template with a note to 'Update the presentation or distribution date and insert your name, role, and organization'.

      Download Info-Tech’s Microsoft Project & M365 Action Plan Template

      3.1.1 Compile current state results

      1-3 hours

      Input: Force Field Analysis Tool, Tool Audit Workbook, Project Management Maturity Assessment Tool, Project Portfolio Management Maturity Assessment Tool

      Output: Section 1: Executive Brief, Section 2: Context and Constraints

      Materials: Microsoft Project and M365 Action Plan Template

      Participants: PMO Director, PMO Admin Team, Business Analysts, Project Managers

      1. As a group, review the results of the tools introduced throughout this blueprint. Use this information along with organizational knowledge to document the business context and current state.
      2. Update the driving forces for change and risks and constraints slides using your outputs from the Force Field Analysis Tool.
      3. Update the current tool landscape, tool satisfaction, and tool audit results slides using your outputs from the Tool Audit Workbook.
      4. Update the gap analysis results slides using your outputs from the Project Management and Project Portfolio Management Maturity Assessment Tools.

      Screenshots of 'Business Context and Current State' screen from the 'Force Field Analysis Tool', the 'Tool Audit Results' screen from the 'Tool Audit Workbook', and the 'Project Portfolio Management Gap Analysis Results' screen from the 'PM and PPM Maturity Assessments Tool'.

      Download the Microsoft Project & M365 Action Plan Template

      3.2.1 Option A: Prepare a DIY roadmap

      1-3 hours; Note: This is only applicable if you have chosen the DIY route

      Input: List of key PPM decision points, List of who is accountable for PPM decisions, List of who has PPM decision-making authority

      Output: Section 3: DIY Implementation Approach

      Materials: Microsoft Project and M365 Action Plan Template

      Participants: PMO Director, PMO Admin Team, Business Analysts, Project Managers

      1. As a group, review the results of the Microsoft Project and M365 Licensing Tool. Use this information along with organizational knowledge and discussion with the working group to complete Section 3: DIY Implementation Approach.
      2. Copy and paste your results from tab 5 of the Microsoft Project and M365 Licensing Tool. Update the Implementation Approach slide to detail the rationale for selecting this option.
      3. Update the Action Plan to articulate the details for total and annual costs of the proposed licensing solution.
      4. Facilitate a discussion to determine roles and responsibilities for the implementation. Based on the size, risk, and complexity of the implementation, create a reasonable timeline.
      Screenshots from the 'Microsoft Project and M365 Action Plan Template' outlining the 'DIY Implementation Approach'.

      Download the Microsoft Project and M365 Action Plan Template

      3.2.1 Option b: Prepare a Partner roadmap

      1-3 hours; Note: This is only applicable if you have chosen the Partner route

      Input: Microsoft Project and M365 Licensing Tool, Information on Microsoft Partners

      Output: Section 4: Microsoft Partner Implementation Route

      Materials: Microsoft Project and M365 Action Plan Template

      Participants: PMO Director, PMO Admin Team, Business Analysts, Project Managers

      1. As a group, review the results of the Microsoft Project and M365 Licensing Tool. Use this information along with organizational knowledge and discussion with the working group to complete Section 4: Microsoft Partner Implementation Route.
      2. Copy and paste your results from tab 5 of the Microsoft Project and M365 Licensing Tool. Update the Implementation Approach slide to detail the rationale for selecting this option.
      3. Develop an outreach plan for the Microsoft Partners you are planning to survey. Set targets for briefing dates and assign an individual to own any back-and-forth communication. Document the pros and cons of each Partner and gauge interest in continuing to analyze the vendor as a possible solution.
      4. Facilitate a discussion to determine roles and responsibilities for the implementation. Based on the size, risk, and complexity of the implementation, create a reasonable timeline.

      Screenshots from the 'Microsoft Project and M365 Action Plan Template' outlining the 'Microsoft Partner Implementation Route'.

      Microsoft Project and M365 Action Plan Template

      3.1.2 Complete your presentation deck

      1-2 hours

      Input: Outputs from the exercises in this blueprint

      Output: Section 5: Future-State Vision and Goals

      Materials: Microsoft Project and M365 Action Plan Template

      Participants: PMO Director, PMO Admin Team, Business Analysts, Project Managers

      1. Put the finishing touches on your presentation deck by documenting your future- state vision and goals.
      2. Prepare to present to your stakeholders.
        • Understand your audience, their needs and priorities, and their degree of knowledge and experiences with technology. This informs what to include in your presentation and how to position the message and goal.
      3. Review the deck beginning to end and check for spelling, grammar, and vertical logic.
      4. Practice delivering the vision for the project through several practice sessions.

      Screenshots from the 'Microsoft Project and M365 Action Plan Template' regarding finishing touches.

      Microsoft Project and M365 Action Plan Template

      Pitch your vision to key stakeholders

      There are multiple audiences for your pitch, and each audience requires a different level of detail when addressed. Depending on the outcomes expected from each audience, a suitable approach must be chosen. The format and information presented will vary significantly from group to group.

      Audience

      Key Contents

      Outcome

      Business Executives

      • Section 1: Executive Brief
      • Section 2: Context and Constraints
      • Section 5: Future-State Vision and Goals
      • Identify executive sponsor

      IT Leadership

      • Sections 1-5 with a focus on Section 3 or 4 depending on implementation approach
      • Get buy-in on proposed project
      • Identify skills or resourcing constraints

      Business Managers

      • Section 1: Executive Brief
      • Section 2: Context and Constraints
      • Section 5: Future-State Vision and Goals
      • Get feedback on proposed plan
      • Identify any unassessed risks and organizational impacts

      Business Users

      • Section 1: Executive Brief
      • Support the organizational change management process

      Summary of Accomplishment

      Problem Solved

      Knowledge Gained
      • How you work: Work management and the various ways of working (personal and team task management, strategic project portfolio management, formal project management, and enterprise project and portfolio management).
      • Where you need to go: Project portfolio management and project management current- and target-state maturity levels.
      • What you need: Microsoft Project Plans and requisite M365 licensing.
      • The skills you need: Extending Project for the web.
      • Who you need to work with: Get to know the Microsoft Gold Partner community.
      Deliverables Completed
      • M365 Tool Guides
      • Tool Audit Workbook
      • Force Field Analysis Tool
      • Project Portfolio Management Maturity Assessment Tool
      • Project Management Maturity Assessment Tool
      • Microsoft Project & M365 Action Plan Template

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information
      workshops@infotech.com
      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      Photo of Barry Cousins.
      Contact your account representative for more information
      workshops@infotech.com 1-888-670-8889

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Perform a work management tool audit

      Gain insight into the tools that drive value or fail to drive value across your work management landscape with a view to streamline the organization’s tool ecosystem.

      Prepare an action plan for your tool needs

      Prepare the right work management tool recommendations for your IT teams and/or business units and develop a boardroom-ready presentation to communicate needs and next steps.

      Research Contributors and Experts

      Neeta Manghnani
      PMO Strategist
      PMO Outsource Ltd.

      Photo of Neeta Manghnani, PMO Strategist, PMO Outsource Ltd.
      • Innovative, performance-driven executive with significant experience managing Portfolios, Programs & Projects, and technical systems for international corporations with complex requirements. A hands-on, dynamic leader with over 20 years of experience guiding and motivating cross-functional teams. Highly creative and brings a blend of business acumen and expertise in multiple IT disciplines, to maximize the corporate benefit from capital investments.
      • Successfully deploys inventive solutions to automate processes and improve the functionality, scalability and security of critical business systems and applications. Leverages PMO/PPM management and leadership skills to meet the strategic goals and business initiatives.

      Robert Strickland
      Principal Consultant & Owner
      PMO Outsource Ltd.

      Photo of Robert Strickland, Principal Consultant and Owner, PMO Outsource Ltd.
      • Successful entrepreneur, leader, and technologist for over 15 years, is passionate about helping organizations leverage the value of SharePoint, O365, Project Online, Teams and the Power Platform. Expertise in implementing portals, workflows and collaboration experiences that create business value. Strategic manager with years of successful experience building businesses, developing custom solutions, delivering projects, and managing budgets. Strong transformational leader on large implementations with a technical pedigree.
      • A digital transformation leader helping clients move to the cloud, collaborate, automate their business processes and eliminate paper forms, spreadsheets and other manual practices.

      Related Info-Tech Research

      • Develop a Project Portfolio Management Strategy
        Time is money; spend it wisely.
      • Establish Realistic IT Resource Management Practices
        Holistically balance IT supply and demand to avoid overallocation.
      • Tailor Project Management Processes to Fit Your Projects
        Spend less time managing processes and more time delivering results

      Bibliography

      “13 Reasons not to use Microsoft Project.” Celoxis, 14 Sept. 2018. Accessed 17 Sept. 2021.

      Advisicon. “Project Online vs Project for the Web.” YouTube, 13 Nov. 2013. Accessed 17 Sept. 2021.

      Branscombe, Mary. “Is Project Online ready to replace Microsoft Project?” TechRepublic, 23 Jan. 2020. Accessed 17 Sept. 2021.

      Chemistruck, Dan. “The Complete Office 365 and Microsoft 365 Licensing Comparison.” Infused Innovations, 4 April 2019. Accessed 17 Sept. 2021.

      “Compare Project management solutions and costs.” Microsoft. Accessed 17 Sept. 2021.

      Day to Day Dynamics 365. “Microsoft Project for the web - Model-driven app.” YouTube, 29 Oct. 2019. Accessed 17 Sept. 2021.

      “Deploying Project for the web.” Microsoft, 24 Aug. 2021. Accessed 17 Sept. 2021.

      “Differentiate your business by attaining Microsoft competencies.” Microsoft, 26 Jan. 2021. Accessed 17 Sept. 2021.

      “Extend & Integrate Microsoft Project.” Western Principles. Accessed 17 Sept. 2021.

      “Get Started with Project Power App.” Microsoft. Accessed 17 Sept. 2021.

      Hosking, Ben. “Why low code software development is eating the world.” DevGenius, May 2021. Accessed 17 Sept. 2021.

      “How in the World is MS Project Still a Leading PM Software?” CBT Nuggets, 12 Nov. 2018. Accessed 17 Sept. 2021.

      Integent. “Project for the Web - Create a Program Entity and a model-driven app then expose in Microsoft Teams.” YouTube, 25 Mar. 2020. Accessed 17 Sept. 2021.

      “Introducing the Project Accelerator.” Microsoft, 10 Mar. 2021. Accessed 17 Sept. 2021.

      “Join the Microsoft Partner Network.” Microsoft. Accessed 17 Sept. 2021.

      Kaneko, Judy. “How Productivity Tools Can Lead to a Loss of Productivity.” Bluescape, 2 Mar. 2018 Accessed 17 Sept. 2021.

      Kotter, John. Leading Change. Harvard Business School Press, 1996.

      Leis, Merily. “What is Work Management.” Scoro. Accessed 17 Sept. 2021.

      Liu, Shanhong. “Number of Office 365 company users worldwide as of June 2021, by leading country.” Statistica, 2021. Web.

      Manghnani, Neeta. “5 Benefits of PPM tools and PMO process automation.” PMO Outsource Ltd., 11 Apr. 2021. Accessed 17 Sept. 2021.

      “Microsoft 365 and Office 365 plan options.” Microsoft, 31 Aug. 2021. Accessed 17 Sept. 2021.

      “Microsoft 365 for enterprise.” Microsoft. Accessed 17 Sept. 2021

      “Microsoft Office 365 Usage Statistics.” Thexyz blog, 18 Sept. 2020. Accessed 17 Sept. 2021.

      “Microsoft Power Apps, Microsoft Power Automate and Microsoft Power Virtual Agents Licensing Guide.” Microsoft, June 2021. Web.

      “Microsoft Project service description.” Microsoft, 31 Aug. 2021. Accessed 17 Sept. 2021.

      “Microsoft Project Statistics.” Integent Blog, 12 Dec. 2013. Accessed 17 Sept. 2021.

      Nanji, Aadil . Modernize Your Microsoft Licensing for the Cloud Era. Info-Tech Research Group, 12 Mar. 2020. Accessed 17 Sept. 2021.

      “Number of Office 365 company users worldwide as of June 2021, by leading country.” Statista, 8 June 2021. Accessed 17 Sept. 2021.

      “Overcoming disruption in a digital world.” Asana. Accessed 17 Sept. 2021.

      Pajunen, Antti. “Customizing and extending Project for the web.” Day to Day Dynamics 365, 20 Jan. 2020. Accessed 17 Sept. 2021.

      “Partner Center Documentation.” Microsoft. Accessed 17 Sept. 2021.

      Pragmatic Works. “Building First Power Apps Model Driven Application.” YouTube, 21 June 2019. Accessed 17 Sept. 2021.

      “Project architecture overview.” Microsoft, 27 Mar. 2020. Accessed 17 Sept. 2021.

      “Project for the web Accelerator.” GitHub. Accessed 17 Sept. 2021.

      “Project for the web admin help.” Microsoft, 28 Oct. 2019. Accessed 17 Sept. 2021.

      “Project for the Web – The New Microsoft Project.” TPG. Accessed 17 Sept. 2021.

      “Project for the Web Security Roles.” Microsoft, 1 July 2021. Accessed 17 Sept. 2021.

      “Project Online: Project For The Web vs Microsoft Project vs Planner vs Project Online.” PM Connection, 30 Nov. 2020. Accessed 17 Sept. 2021.

      Redmond, Tony. “Office 365 Insights from Microsoft’s FY21 Q2 Results.” Office 365 for IT Pros, 28 Jan. 2021. Accessed 17 Sept. 2021.

      Reimagine Project Management with Microsoft. “Advanced deployment for Project for the web.” YouTube, 4 Aug. 2021. Accessed 17 Sept. 2021.

      Reimagine Project Management with Microsoft. “Overview of Microsoft Project.” YouTube, 29 July 2021. Accessed 17 Sept. 2021.

      “See which partner offer is right for you.” Microsoft. Accessed 17 Sept. 2021.

      Shalomova, Anna. “Microsoft Project for Web 2019 vs. Project Online: What’s Best for Enterprise Project Management?” FluentPro, 23 July 2020. Accessed 17 Sept. 2021.

      Speed, Richard. “One Project to rule them all: Microsoft plots end to Project Online while nervous Server looks on.” The Register, 28 Sept. 2018. Accessed 17 Sept. 2021.

      Spataro, Jared. “A new vision for modern work management with Microsoft Project.” Microsoft, 25 Sept. 2018. Accessed 17 Sept. 2021.

      Stickel, Robert. “OnePlan Recognized as Winner of 2021 Microsoft Project & Portfolio Management Partner of the Year.” OnePlan, 8 July 2021. Accessed 17 Sept. 2021.

      Stickel, Robert. “The Future of Project Online.” OnePlan, 2 Mar. 2021. Accessed 17 Sept. 2021.

      Stickel, Robert. “What It Means to be Adaptive.” OnePlan, 24 May 2021. Accessed 17 Sept. 2021.

      “The Future of Microsoft Project Online.” OnePlan. Accessed 17 Sept. 2021.

      Weller, Joe. “Demystifying Microsoft Project Licensing.” Smartsheet, 10 Mar. 2016. Accessed 17 Sept. 2021.

      Western Principles Inc. “Dump the Spreadsheets for Microsoft Project Online.” YouTube, 2 July 2020. Accessed 17 Sept. 2021.

      Western Principles Inc. “Project Online or Project for the web? Which project management system should you use?” YouTube, 11 Aug. 2020. Accessed 17 Sept. 2021.

      “What is Power Query?” Microsoft, 22 July 2021. Web.

      Wicresoft. “The Power of the New Microsoft Project and Microsoft 365.” YouTube, 29 May 2020. Accessed 17 Sept. 2021.

      Wicresoft. “Why the Microsoft Power Platform is the Future of PPM.” YouTube, 11 June 2020. Accessed 17 Sept. 2021.

      Accelerate Digital Transformation With a Digital Factory

      • Buy Link or Shortcode: {j2store}93|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $50,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Organizational challenges are hampering digital transformation (DX) initiatives.
      • The organization’s existing digital factory is failing to deliver value.
      • Designing a successful digital factory is a difficult process.

      Our Advice

      Critical Insight

      To remain competitive, enterprises must deliver products and services like a startup or a digital native enterprise. This requires enterprises to:

      • Understand how digital native enterprises are designed.
      • Understand the foundations of good design: purpose, organizational support, and leadership.
      • Understand the design of the operating model: structure and organization, management practices, culture, environment, teams, technology platforms, and meaningful metrics and KPIs.

      Impact and Result

      Organizations that implement this project will draw benefits in the following aspects:

      • Gain awareness and understanding of various aspects that hamper DX.
      • Set the right foundations by having clarity of purpose, alignment on organizational support, and the right leadership in place.
      • Design an optimal operating model by setting up the right organizational structures, management practices, lean and optimal governance, agile teams, and an environment that promotes productivity and wellbeing.
      • Finally, set the right measures and KPIs.

      Accelerate Digital Transformation With a Digital Factory Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand the importance of a well-designed digital factory.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build the case

      Collect data and stats that will help build a narrative for digital factory.

      • Digital Factory Playbook

      2. Lay the foundation

      Discuss purpose, mission, organizational support, and leadership.

      3. Design the operating model

      Discuss organizational structure, management, culture, teams, environment, technology, and KPIs.

      [infographic]

      Workshop: Accelerate Digital Transformation With a Digital Factory

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build the case

      The Purpose

      Understand and gather data and stats for factors impacting digital transformation.

      Develop a narrative for the digital factory.

      Key Benefits Achieved

      Identification of key pain points and data collected

      Narrative to support the digital factory

      Activities

      1.1 Understand the importance and urgency of digital transformation (DX).

      1.2 Collect data and stats on the progress of DX initiatives.

      1.3 Identify the factors that hamper DX and tie them to data/stats.

      1.4 Build the narrative for the digital factory (DF) using the data/stats.

      Outputs

      Identification of factors that hamper DX

      Data and stats on progress of DX

      Narrative for the digital factory

      2 Lay the foundation

      The Purpose

      Discuss the factors that impact the success of establishing a digital factory.

      Key Benefits Achieved

      A solid understanding and awareness that successful digital factories have clarity of purpose, organizational support, and sound leadership.

      Activities

      2.1 Discuss

      2.2 Discuss what organizational support the digital factory will require and align and commit to it.

      2.3 Discuss reference models to understand the dynamics and the strategic investment.

      2.4 Discuss leadership for the digital age.

      Outputs

      DF purpose and mission statements

      Alignment and commitment on organizational support

      Understanding of competitive dynamics and investment spread

      Develop the profile of a digital leader

      3 Design the operating model (part 1)

      The Purpose

      Understand the fundamentals of the operating model.

      Understand the gaps and formulate the strategies.

      Key Benefits Achieved

      Design of structure and organization

      Design of culture aligned with organizational goals

      Management practices aligned with the goals of the digital factory

      Activities

      3.1 Discuss structure and organization and associated organizational pathologies, with focus on hierarchy and silos, size and complexity, and project-centered mindset.

      3.2 Discuss the importance of culture and its impact on productivity and what shifts will be required.

      3.3 Discuss management for the digital factory, with focus on governance, rewards and compensation, and talent management.

      Outputs

      Organizational design in the context of identified pathologies

      Cultural design for the DF

      Management practices and governance for the digital factory

      Roles/responsibilities for governance

      4 Design the operating model (part 2)

      The Purpose

      Understand the fundamentals of the operating model.

      Understand the gaps and formulate the strategies.

      Key Benefits Achieved

      Discuss agile teams and the roles for DF

      Environment design that supports productivity

      Understanding of existing and new platforms

      Activities

      4.1 Discuss teams and various roles for the DF.

      4.2 Discuss the impact of the environment on productivity and satisfaction and discuss design factors.

      4.3 Discuss technology and tools, focusing on existing and future platforms, platform components, and organization.

      4.4 Discuss design of meaningful metrics and KPIs.

      Outputs

      Roles for DF teams

      Environment design factors

      Platforms and technology components

      Meaningful metrics and KPIs

      Set Meaningful Employee Performance Measures

      • Buy Link or Shortcode: {j2store}597|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Manage & Coach
      • Parent Category Link: /manage-coach
      • Despite the importance of performance measures, most organizations struggle with choosing appropriate metrics and standards of performance for their employees.
      • Performance measures are often misaligned with the larger strategy, gamed by employees, or too narrow to provide an accurate picture of employee achievements.
      • Additionally, many organizations track too many metrics, resulting in a bureaucratic nightmare with little payoff.

      Our Advice

      Critical Insight

      • Focus on what matters by aligning your departmental goals with the enterprise's mission and business goals. Break down departmental goals into specific goals for each employee group.
      • Employee engagement, which results in better performance, is directly correlated with employees’ understanding what is expected of them on the job and with their performance reviews reflecting their actual contributions.
      • Shed unnecessary metrics in favor of a lean, holistic approach to performance measurement. Include quantitative, qualitative, and behavioral dimensions in each goal and set appropriate measures for each dimension to meet simple targets. This encourages well-rounded behaviors and discourages rogue behavior.
      • Get rid of the stick-and-carrot approach to management. Use performance measurement to inspire and engage employees, not punish them.

      Impact and Result

      • Learn about and leverage the McLean & Company framework and process to effective employee performance measurement setting.
      • Plan effective communications and successfully manage departmental employee performance measurement by accurately recording goals, measures, and requirements.
      • Find your way through the maze of employee performance management with confidence.

      Set Meaningful Employee Performance Measures Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Set Meaningful Employee Performance Measures Storyboard – This deck provides a comprehensive framework for setting, communicating, and reviewing employee performance measures that will drive business results

      This research will help you choose an appropriate measurement framework, set effective measures. and communicate and review your performance measures. Use Info-Tech's process to set meaningful measures that will inspire employees and drive performance.

      • Set Meaningful Employee Performance Measures Storyboard

      2. Employee Performance Measures Goals Cascade – A tool to assist you in turning your organizational goals into meaningful individual employee performance measures.

      This tool will help you set departmental goals based on organizational mission and business goals and choose appropriate measures and weightings for each goal. Use this template to plan a comprehensive employee measurement system.

      • Employee Performance Measures Goals Cascade

      3. Employee Performance Measures Template – A template for planning and tracking your departmental goals, employee performance measures, and reporting requirements.

      This tool will help you set departmental goals based on your organizational mission and business goals, choose appropriate measures and weightings for each goal, and visualize you progress toward set goals. Use this template to plan and implement a comprehensive employee measurement system from setting goals to communicating results.

      • Employee Performance Measures Template

      4. Feedback and Coaching Guide for Managers – A tool to guide you on how to coach your team members.

      Feedback and coaching will improve performance, increase employee engagement, and build stronger employee manager relationships. Giving feedback is an essential part of a manger's job and if done timely can help employees to correct their behavior before it becomes a bigger problem.

      • Feedback and Coaching Guide for Managers

      Infographic

      Workshop: Set Meaningful Employee Performance Measures

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Source and Set Goals

      The Purpose

      Ensure that individual goals are informed by business ones.

      Key Benefits Achieved

      Individuals understand how their goals contribute to organizational ones.

      Activities

      1.1 Understand how your department contributes to larger organizational goals.

      1.2 Determine the timelines you need to measure employees against.

      1.3 Set Business aligned department, team, and individual goals.

      Outputs

      Business-aligned department and team goals

      Business-aligned individual goals

      2 Design Measures

      The Purpose

      Create holistic performance measures.

      Key Benefits Achieved

      Holistic performance measures are created.

      Activities

      2.1 Choose your employee measurement framework: generic or individual.

      2.2 Define appropriate employee measures for preestablished goals.

      2.3 Determine employee measurement weightings to drive essential behaviors.

      Outputs

      Determined measurement framework

      Define employee measures.

      Determined weightings

      3 Communicate to Implement and Review

      The Purpose

      Learn how to communicate measures to stakeholders and review measures.

      Key Benefits Achieved

      Learn how to communicate to stakeholders and coach employees through blockers.

      Activities

      3.1 Learn how to communicate selected performance measures to stakeholders.

      3.2 How to coach employees though blockers.

      3.3 Reviewing and updating measures.

      Outputs

      Effective communication with stakeholders

      Coaching and feedback

      When to update

      4 Manager Training

      The Purpose

      Train managers in relevant areas.

      Key Benefits Achieved

      Training delivered to managers.

      Activities

      4.1 Deliver Build a Better Manager training to managers.

      4.2

      Outputs

      Manager training delivered

      Further reading

      Set Meaningful Employee Performance Measures

      Set holistic measures to inspire employee performance.

      EXECUTIVE BRIEF

      Set employees up for success by implementing performance measures that inspire great performance, not irrelevant reporting.

      Executive Summary

      Your Challenge

      In today’s competitive environment, managers must assess and inspire employee performance in order to assess the achievement of business goals.

      Despite the importance of performance measures, many leaders struggle with choosing appropriate metrics.

      Performance measures are often misaligned with the larger strategy, gamed by employees, or are too narrow to provide an accurate picture of employee achievements.

      Common Obstacles

      Managers who invest time in creating more effective performance measures will be rewarded with increased employee engagement and better employee performance.

      Too little time setting holistic employee measures often results in unintended behaviors and gaming of the system.

      Conversely, too much time setting employee measures will result in overreporting and underperforming employees.

      Info-Tech’s Approach

      Info-Tech helps managers translate organizational goals to employee measures. Communicating these to employees and other stakeholders will help managers keep better track of workforce productivity, maintain alignment with the organization’s business strategy, and improve overall results.

      Info-Tech Insight

      Performance measures are not about punishing bad performance, but inspiring higher performance to achieve business goals.

      Meaningful performance measures drive employee engagement...

      Clearly defined performance measures linked to specific goals bolster engagement by showing employees the importance of their contributions.

      Significant components of employee engagement are tied to employee performance measures.

      A diagram of employee engagement survey and their implications.

      Which, in turn, drives business success.

      Improved employee engagement is proven to improve employee performance. Setting meaningful measures can impact your bottom line.

      Impact of Engagement on Performance

      A diagram that shows Percent of Positive Responses Among Engaged vs. Disengaged
      Source: McLean & Company Employee Engagement Survey Jan 2020-Jan 2023; N=5,185 IT Employees; were either Engaged or Disengaged (Almost Engaged and Indifferent were not included)

      Engaged employees don’t just work harder, they deliver higher quality service and products.

      Engaged employees are significantly more likely to agree that they regularly accomplish more than what’s expected of them, choose to work extra hours to improve results, and take pride in the work they do.

      Without this sense of pride and ownership over the quality-of-service IT provides, IT departments are at serious risk of not being able to deliver quality service, on-time and on-budget.

      Create meaningful performance measures to drive employee engagement by helping employees understand how they contribute to the organization.

      Unfortunately, many employee measures are meaningless and fail to drive high-quality performance.

      Too many ineffective performance measures create more work for the manager rather than inspire employee performance. Determine if your measures are worth tracking – or if they are lacking.

      Meaningful performance measures are:

      Ineffective performance measures are:

      Clearly linked to organizational mission, values, and objectives.

      Based on a holistic understanding of employee performance.

      Relevant to organizational decision-making.

      Accepted by employees and managers.

      Easily understood by employees and managers.

      Valid: relevant to the role and goals and within an employee’s control.

      Reliable: consistently applied to assess different employees doing the same job.

      Difficult to track, update, and communicate.

      Easily gamed by managers or employees.

      Narrowly focused on targets rather than the quality of work.

      The cause of unintended outcomes or incentive for the wrong behaviors.

      Overly complex or elaborate.

      Easily manipulated due to reliance on simple calculations.

      Negotiable without taking into account business needs, leading to lower performance standards.

      Adopt a holistic approach to create meaningful performance measurement

      A diagram that shows a holistic approach to create meaningful performance measurement, including inputs, organizational costs, department goals, team goals, individual goals, and output.

      Info-Tech’s methodology to set the stage for more effective employee measures

      1. Source and Set Goals

      Phase Steps
      1.1 Create business-aligned department and team goals
      1.2 Create business-aligned individual goals

      Phase Outcomes
      Understand how your department contributes to larger organizational goals.
      Determine the timelines you need to measure employees against.
      Set business-aligned department, team, and individual goals.

      2. Design Measures

      Phase Steps
      1.1 Choose measurement framework
      1.2 Define employee measures
      1.3 Determine weightings

      Phase Outcomes
      Choose your employee measurement framework: generic or individual.
      Define appropriate employee measures for preestablished goals.
      Determine employee measurement weightings to drive essential behaviors.
      Ensure employee measures are communicated to the right stakeholders.

      3. Communicate to Implement and Review

      Phase Steps
      1.1 Communicate to stakeholders
      1.2 Coaching and feedback
      1.3 When to update

      Phase Outcomes
      Communicate selected performance measure to stakeholders.
      Learn how to coach employees though blockers.
      Understand how to review and when to update measures.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation
      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop
      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting
      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is four to six calls over the course of two to four months.

      What does a typical GI on this topic look like?

      A diagram that shows Guided Implementation in 3 phases.

      Optimize the Mentoring Program to Build a High-Performing Learning Organization

      • Buy Link or Shortcode: {j2store}596|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Employee Development
      • Parent Category Link: /train-and-develop
      • Many organizations have introduced mentoring programs without clearly defining and communicating the purpose and goals around having a program; they simply jumped on the mentoring bandwagon.
      • As a result, these programs have little impact. They don’t add value for mentors, mentees, or the organization.
      • It can be difficult to design a program that is well-suited to your organization, will be adopted by employees, and will drive the results you are looking for.
      • In particular, it is difficult to successfully match mentors and mentees so both derive maximum value from the endeavor.

      Our Advice

      Critical Insight

      • As workforce composition shifts, there is a need for mentoring programs to move beyond the traditional senior–junior format option; organizational culture and goals will dictate the best approach.
      • An organization’s mentoring program doesn’t need to be restricted to one format; individual preferences and goals should also factor in. Be open to choosing format on a case-by-case basis.
      • Be sure to gain upper management buy-in and support early to ensure mentoring becomes a valued part of your organization.
      • Ensure that goal setting, communication, ongoing support for participants, and evaluation all play a role in your mentoring program.

      Impact and Result

      • Mentoring can have a significant positive impact on mentor, mentee, and organization.
      • Mentees gain guidance and advice on their career path and skill development. Mentors often experience re-engagement with their job and the satisfaction of helping another person.
      • Mentoring participants benefit from obtaining different perspectives of both the business and work-related problems. Participation in a mentoring program has been linked to greater access to promotions, pay raises, and increased job satisfaction.
      • Mentoring can have a number of positive outcomes for the organization, including breaking down silos, transferring institutional knowledge, accelerating leadership skills, fostering open communication and dialogue, and resolving conflict.

      Optimize the Mentoring Program to Build a High-Performing Learning Organization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Align the mentoring program with the organizational culture and goals

      Build a best-fit program that creates a learning culture.

      • Storyboard: Optimize the Mentoring Program to Build a High Performing Learning Organization

      2. Assess the organizational culture and current mentoring program

      Align mentoring practices with culture to improve the appropriateness and effectiveness of the program.

      • Mentoring Program Diagnostic

      3. Align mentoring practices with culture to improve the appropriateness and effectiveness of the program.

      Track project progress and have all program details defined in a central location.

      • Mentoring Project Plan Template
      • Peer Mentoring Guidelines
      • Mentoring Program Guidelines

      4. Gather feedback from the mentoring program participants

      Evaluate the success of the program.

      • Mentoring Project Feedback Surveys Template

      5. Get mentoring agreements in place

      Improve your mentoring capabilities.

      • Mentee Preparation Checklist
      • Mentoring Agreement Template
      [infographic]

      Security Strategy

      • Buy Link or Shortcode: {j2store}42|cart{/j2store}
      • Related Products: {j2store}42|crosssells{/j2store}
      • member rating overall impact: 9.4/10
      • member rating average dollars saved: $33,431
      • member rating average days saved: 29
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk

      The challenge

      You may be experiencing one or more of the following:

      • You may not have sufficient security resources to handle all the challenges.
      • Security threats are prevalent. Yet many businesses struggle to embed systemic security thinking into their culture.
      • The need to move towards strategic planning of your security landscape is evident. How to get there is another matter.

      Our advice

      Insight

      To have a successful information security strategy, take these three factors into account:

      • Holistic: your view must include people, processes, and technology.
      • Risk awareness: Base your strategy on the actual risk profile of your company. And then add the appropriate best practices.
      • Business-aligned: When your strategic security plan demonstrates alignment with the business goals and supports it, embedding will go much more straightforward.

      Impact and results 

      • We have developed a highly effective approach to creating your security strategy. We tested and refined this for more than seven years with hundreds of different organizations.
      • We ensure alignment with business objectives.
      • We assess organizational risk and stakeholder expectations.
      • We enable a comprehensive current state assessment.
      • And we prioritize initiatives and build out a right-sized security roadmap.

       

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get up to speed

      Read up on why you should build your customized information security strategy. Review our methodology and understand the four ways we can support you.

      Assess the security requirements

      It all starts with risk appetite, yes, but security is something you want to get right. Determine your organizations' security pressures and business goals, and then determine your security program's goals.

      • Build an Information Security Strategy – Phase 1: Assess Requirements
      • Information Security Requirements Gathering Tool (xls)
      • Information Security Pressure Analysis Tool (xls)

      Build your gap initiative

      Our best-of-breed security framework makes you perform a gap analysis between where you are and where you want to be (your target state). Once you know that, you can define your goals and duties.

      • Build an Information Security Strategy – Phase 2: Assess Gaps
      • Information Security Program Gap Analysis Tool (xls)

      Plan the implementation of your security strategy 

      With your design at this level, it is time to plan your roadmap.

      • Build an Information Security Strategy – Phase 3: Build the Roadmap

      Let it run and continuously improve. 

      Learn to use our methodology to manage security initiatives as you go. Identify the resources you need to execute the evolving strategy successfully.

      • Build an Information Security Strategy – Phase 4: Execute and Maintain
      • Information Security Strategy Communication Deck (ppt)
      • Information Security Charter (doc)

       

      Establish a Sustainable ESG Reporting Program

      • Buy Link or Shortcode: {j2store}194|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance

      Consistent, high-quality disclosure of ESG practices is the means by which organizations can demonstrate they are acting responsibly and in the best interest of their customers and society. Organizations may struggle with these challenges when implementing an ESG reporting program:

      • Narrowing down ESG efforts to material ESG issues
      • Building a sustainable reporting framework
      • Assessing and solving for data gaps and data quality issues
      • Being aware of the tools and best practices available to support regulatory and performance reporting

      Our Advice

      Critical Insight

      • A tactical approach to ESG reporting will backfire. The reality of climate change and investor emphasis is not going away. For long-term success, organizations need to design an ESG reporting program that is flexible, interoperable, and digital.
      • Implementing a robust reporting program takes time. Start early, remain focused, and make plans to continually improve data quality and collection and performance metrics.
      • The “G” in ESG may not be capturing the limelight under ESG legislation yet, but there are key factors within the governance component that are under the regulatory microscope, including data, cybersecurity, fraud, and diversity and inclusion. Be sure you stay on top of these issues and include performance metrics in your internal and external reporting frameworks.

      Impact and Result

      • Successful organizations recognize that transparent ESG disclosure is necessary for long-term corporate performance.
      • Taking the time up front to design a robust and proactive ESG reporting program will pay off in the long run.
      • Future-proof your ESG reporting program by leveraging new tools, technologies, and software applications.

      Establish a Sustainable ESG Reporting Program Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish a Sustainable ESG Reporting Program Storyboard – A comprehensive framework to define an ESG reporting program that supports your ESG goals and reporting requirements.

      This storyboard provides a three-phased approach to establishing a comprehensive ESG reporting framework to drive sustainable corporate performance. It will help you identify what to report, understand how to implement your reporting program, and review in-house and external software and tooling options.

      • Establish a Sustainable ESG Reporting Program Storyboard

      2. ESG Reporting Workbook – A tool to document decisions, rationale, and implications of key activities to support your ESG reporting program.

      The workbook allows IT and business leaders to document decisions as they work through the steps to establish a comprehensive ESG reporting framework.

      • ESG Reporting Workbook

      3. ESG Reporting Implementation Plan – A tool to document tasks required to deliver and address gaps in your ESG reporting program.

      This planning tool guides IT and business leaders in planning, prioritizing, and addressing gaps to build an ESG reporting program.

      • ESG Reporting Implementation Plan Template

      4. ESG Reporting Presentation Template – A guide to communicate your ESG reporting approach to internal stakeholders.

      Use this template to create a presentation that explains the drivers behind the strategy, communicates metrics, demonstrates gaps and costs, and lays out the timeline for the implementation plan.

      • ESG Reporting Presentation Template

      Infographic

      Workshop: Establish a Sustainable ESG Reporting Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Determine Material ESG Factors

      The Purpose

      Determine material ESG factors.

      Key Benefits Achieved

      Learn how to identify your key stakeholders and material ESG risks.

      Activities

      1.1 Create a list of stakeholders and applicable ESG factors.

      1.2 Create a materiality map.

      Outputs

      List of stakeholders and applicable ESG factors

      Materiality map

      2 Define Performance and Reporting Metrics

      The Purpose

      Define performance and reporting metrics.

      Key Benefits Achieved

      Align your ESG strategy with key performance metrics.

      Activities

      2.1 Create a list of SMART metrics.

      2.2 Create a list of reporting obligations.

      Outputs

      SMART metrics

      List of reporting obligations

      3 Assess Data and Implementation Gaps

      The Purpose

      Assess data and implementation gaps.

      Key Benefits Achieved

      Surface data and technology gaps.

      Activities

      3.1 Create a list of high-priority data gaps.

      3.2 Summarize high-level implementation considerations.

      Outputs

      List of high-priority data gaps

      Summary of high-level implementation considerations

      4 Consider Software and Tooling Options

      The Purpose

      Select software and tooling options and develop implementation plan.

      Key Benefits Achieved

      Complete your roadmap and internal communication document.

      Activities

      4.1 Review tooling and technology options.

      4.2 Prepare ESG reporting implementation plan.

      4.3 Prepare the ESG reporting program presentation.

      Outputs

      Selected tooling and technology

      ESG reporting implementation plan

      ESG reporting strategy presentation

      Further reading

      Establish a Sustainable ESG Reporting Program

      Strengthen corporate performance by implementing a holistic and proactive reporting approach.

      Analyst Perspective

      The shift toward stakeholder capitalism cannot be pinned on one thing; rather, it is a convergence of forces that has reshaped attitudes toward the corporation. Investor attention on responsible investing has pushed corporations to give greater weight to the achievement of corporate goals beyond financial performance.

      Reacting to the new investor paradigm and to the wider systemic risk to the financial system of climate change, global regulators have rapidly mobilized toward mandatory climate-related disclosure.

      IT will be instrumental in meeting the immediate regulatory mandate, but their role is much more far-reaching. IT has a role to play at the leadership table shaping strategy and assisting the organization to deliver on purpose-driven goals.

      Delivering high-quality, relevant, and consistent disclosure is the key to unlocking and driving sustainable corporate performance. IT leaders should not underestimate the influence they have in selecting the right technology and data model to support ESG reporting and ultimately support top-line growth.

      Photo of Yaz Palanichamy

      Yaz Palanichamy
      Senior Research Analyst
      Info-Tech Research Group

      Photo of Donna Bales

      Donna Bales
      Principal Research Director
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Your organization needs to define a ESG reporting strategy that is driven by corporate purpose.

      Climate-related disclosure mandates are imminent; you need to prepare for them by building a sustainable reporting program now.

      There are many technologies available to support your ESG program plans. How do you choose the one that is right for your organization?

      Common Obstacles

      Knowing how to narrow down ESG efforts to material ESG issues for your organization.

      Understanding the key steps to build a sustainable ESG reporting program.

      Assessing and solving for data gaps and data quality issues.

      Being aware of the tools and best practices available to support regulatory and performance reporting.

      Info-Tech’s Approach

      Learn best-practice approaches to develop and adopt an ESG reporting program approach to suit your organization’s unique needs.

      Understand the key features, tooling options, and vendors in the ESG software market.

      Learn through analyst insights, case studies, and software reviews on best-practice approaches and tool options.

      Info-Tech Insight

      Implementing a robust reporting program takes time. Start early, remain focused, and plan to continually improve data quality and collection and performance metrics

      Putting “E,” “S,” and “G” in context

      Corporate sustainability depends on managing ESG factors well

      Environmental, social, and governance are the components of a sustainability framework that is used to understand and measure how an organization impacts or is affected by society as a whole.

      Human activities, particularly fossil fuel burning since the middle of the twentieth century, have increased greenhouse gas concentration, resulting in observable changes to the atmosphere, ocean, cryosphere, and biosphere. The “E” in ESG relates to the positive and negative impacts an organization may have on the environment, such as the energy it takes in and the waste it discharges.

      The “S” in ESG is the most ambiguous component in the framework, as social impact relates not only to risks but also to prosocial behavior. It’s the most difficult to measure but can have significant financial and reputational impact on corporations if material and poorly managed.

      The “G” in ESG is foundational to the realization of “S” and “E.” It encompasses how well an organization integrates these considerations into the business and how well the organization engages with key stakeholders, receives feedback, and is transparent with its intentions.

      A diagram that shows common examples of ESG issues.

      The impact of ESG factors on investment decisions

      Alleviate Investment Risk

      Organizational Reputation: Seventy-four percent of those surveyed were concerned that failing to improve their corporate ESG performance would negatively impact their organization’s branding and overall reputation in the market (Intelex, 2022).

      Ethical Business Compliance: Adherence to well-defined codes of business conduct and implementation of anti-corruption and anti-bribery practices is a great way to distinguish between organizations with good/poor governance intentions.

      Shifting Consumer Preferences: ESG metrics can also largely influence consumer preferences in buying behavior intentions. Research from McKinsey shows that “upward of 70 percent” of consumers surveyed on purchases in multiple industries said they would pay an additional 5 percent for a green product if it met the same performance standards as a nongreen alternative (McKinsey, 2019).

      Responsible Supply Chain Management: The successful alignment of ESG criteria with supply chain operations can lead to several benefits (e.g. producing more sustainable product offerings, maintaining constructive relationships with more sustainability-focused suppliers).

      Environmental Stewardship: The growing climate crisis has forced companies of all sizes to rethink how they plan their corporate environmental sustainability practices.

      Compliance With Regulatory Guidelines: An increasing emphasis on regulations surrounding ESG disclosure rates may result in some institutional investors taking a more proactive stance toward ESG-related initiatives.

      Sustaining Competitive Advantage: Given today’s globalized economy, many businesses are constantly confronted with environmental issues (e.g. water scarcity, air pollution) as well as social problems (e.g. workplace wellness issues). Thus, investment in ESG factors is simply a part of maintaining competitive advantage.

      Leaders increasingly see ESG as a competitive differentiator

      The perceived importance of ESG has dramatically increased from 2020 to 2023

      A diagram that shows the perceived importance of ESG in 2020 and 2023.

      In a survey commissioned by Schneider Electric, researchers categorized the relative importance of ESG planning initiatives for global IT business leaders. ESG was largely identified as a critical factor in sustaining competitive advantage against competitors and maintaining positive investor/public relations.
      Source: S&P Market Intelligence, 2020; N=825 IT decision makers

      “74% of finance leaders say investors increasingly use nonfinancial information in their decision-making.”
      Source: EY, 2020

      Regulatory pressure to report on carbon emission is building globally

      The Evolving Regulatory Landscape

      Canada

      • Canadian Securities Administrators (CSA) NI 51-107 Disclosure of Climate-related Matters

      United States

      • Securities and Exchange Commission (SEC) 33-11042 – The Enhancement and Standardization of Climate-Related Disclosures for Investors
      • SEC 33-11038 Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
      • Nasdaq Board Diversity Rule (5605(f))

      Europe

      • European Commission Sustainable Finance Disclosure Regulation (SFDR)
      • European Commission EU Supply Chain Act
      • The German Supply Chain Act (GSCA)
      • Financial Conduct Authority UK Proposal (DP 21/4) Sustainability Disclosure Requirements and investment labels
      • UK Modern Slavery Act, 2015

      New Zealand

      • The Financial Sector (Climate-related Disclosures and Other Matters) Amendment Act 2021

      Accurate ESG reporting will be critical to meet regulatory requirements

      ESG reporting is the disclosure of environmental, social, and governance (ESG) data via qualitative and quantitative reports.

      It is how organizations make their sustainability commitments and strategies transparent to stakeholders.

      For investors it provides visibility into a company's ESG activities, enabling them to align investments to their values and avoid companies that cause damage to the environment or are offside on social and governance issues.

      Despite the growing practice of ESG reporting, reporting standards and frameworks are still evolving and the regulatory approach for climate-related disclosure is inconsistent across jurisdictions, making it challenging for organizations to develop a robust reporting program.

      “Environmental, social and governance (ESG) commitments are at the core a data problem.”

      Source: EY, 2022

      However, organizations will struggle to meet reporting requirements

      An image that shows 2 charts: How accurately can your organization report on the impact of its ESG Initiatives; and More specifically, if it was required to do so, how accurately could your organization report on its carbon footprint.

      Despite the commitment to support an ESG Initiative, less than a quarter of IT professionals say their organization can accurately report on the impact of its ESG initiatives, and 44% say their reporting on impacts is not accurate.

      Reporting accuracy was even worse for reporting on carbon footprint with 46% saying their organization could not report on its carbon footprint accurately. This despite most IT professionals saying they are working to support environmental mandates.

      Global sustainability rankings based on ESG dimensions

      Global Country Sustainability Ranking Map

      An image of Global Country Sustainability Ranking Map, with a score of 0 to 10.

      Country Sustainability Scores (CSR) as of October 2021
      Scores range from 1 (poor) to 10 (best)
      Source: Robeco, 2021

      ESG Performance Rankings From Select Countries

      Top ESG and sustainability performer

      Finland has ranked consistently as a leading sustainability performer in recent years. Finland's strongest ESG pillar is the environment, and its environmental ranking of 9.63/10 is the highest out of all 150 countries.

      Significant score deteriorations

      Brazil, France, and India are among the countries whose ESG score rankings have deteriorated significantly in the past three years.

      Increasing political tensions and risks as well as aftershock effects of the COVID-19 pandemic (e.g. high inequality and insufficient access to healthcare and education) have severely impacted Brazil’s performance across the governance and social pillars of the ESG framework, ultimately causing its overall ESG score to drop to a CSR value of 5.31.

      Largest gains and losses in ESG scores

      Canada has received worse scores for corruption, political risk, income inequality, and poverty over the past three years.

      Taiwan has seen its rankings improve in terms of overall ESG scores. Government effectiveness, innovation, a strong semiconductor manufacturing market presence, and stronger governance initiatives have been sufficient to compensate for a setback in income and economic inequality.

      Source: Robeco, 2021

      Establish a Sustainable Environmental, Social, and Governance (ESG) Reporting Program

      A diagram of establishing a sustainable ESG reporting program.

      Blueprint benefits

      Business Benefits

      • Clarity on technical and organizational gaps in the organization’s ability to deliver ESG reporting strategy.
      • Transparency on the breadth of the change program, internal capabilities needed, and accountable owners.
      • Reduced likelihood of liability.
      • Improved corporate performance and top-line growth.
      • Confidence that the organization is delivering high-quality, comprehensive ESG disclosure.

      IT Benefits

      • Understanding of IT’s role as strategic enabler for delivering high-quality ESG disclosure and sustainable corporate performance.
      • Transparency on primary data gaps and technology and tools needed to support the ESG reporting strategy.
      • Clear direction of material ESG risks and how to prioritize implementation efforts.
      • Awareness of tool selection options.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Photo of Executive Presentation.

      Key deliverable: Executive Presentation

      Leverage this presentation deck to improve corporate performance by implementing a holistic and proactive ESG reporting program.

      Photo of Workbook

      Workbook

      As you work through the activities, use this workbook to document decisions and rationale and to sketch your materiality map.

      Photo of Implementation Plan

      Implementation Plan

      Use this implementation plan to address organizational, technology, and tooling gaps.

      Photo of RFP Template

      RFP Template

      Leverage Info-Tech’s RFP Template to source vendors to fill technology gaps.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation
      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop
      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting
      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      What does a typical GI on this topic look like?

      A diagram that shows Guided Implementation in 3 phases.

      Workshop Overview

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Activities

      Determine Material ESG Factors

      1.1 Review ESG drivers.
      1.2 Identify key stakeholders and what drives their behavior.
      1.3 Discuss materiality frameworks options and select baseline model.
      1.4 Identify material risks and combine and categorize risks.
      1.5 Map material risks on materiality assessment map.

      Define Performance and Reporting Metrics

      2.1 Understand common program metrics for each ESG component.
      2.2 Consider and select program metrics.
      2.3 Discuss ESG risk metrics.
      2.4 Develop SMART metrics.
      2.5 Surface regulatory reporting obligations.

      Assess Data and Implementation Gaps

      3.1 Assess magnitude and prioritize data gaps.
      3.2 Discuss high-level implementation considerations and organizational gaps.

      Software and Tooling Options

      4.1 Review technology options.
      4.2 Brainstorm technology and tooling options and the feasibility of implementing.
      4.3 Prepare implementation plan.
      4.4 Draft ESG reporting program communication.
      4.5 Optional – Review software selection options.

      Next Steps and Wrap-Up (offsite)

      5.1 Complete in-progress deliverables from previous four days.
      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Customized list of key stakeholders and material ESG risks
      2. Materiality assessment map

      1. SMART metrics
      2. List of regulatory reporting obligations

      1. High-priority data gaps
      2. High-level implementation considerations

      1. Technology and tooling opportunities
      2. Implementation Plan
      3. ESG Reporting Communication

      1. ESG Reporting Workbook
      2. Implementation Plan

      Contact your account representative for more information.
      workshops@infotech.com
      1-888-670-8889

      Phase 1

      Explore ESG Reporting

      A diagram that shows phase 1 to 3 of establishing ESG reporting program.

      This phase will walk you through the following:

      • Define key stakeholders and material ESG factors.
      • Identify material ESG issues.
      • Develop SMART program metrics.
      • List reporting obligations.
      • Surface high-level data gaps.
      • Record high-level implementation considerations.

      This phase involves the following participants: CIO, CCO, CSO, business leaders, legal, marketing and communications, head of ESG reporting, and any dedicated ESG team members

      Practical steps for ESG disclosure

      Measuring and tracking incremental change among dimensions such as carbon emissions reporting, governance, and diversity, equity, and inclusion (DEI) requires organizations to acquire, analyze, and synthesize data from beyond their internal organizational ecosystems

      A diagram that shows 5 steps of identify, assess, implement, report & communicate, and monitor & improve.

      1.1 Ensure your reporting requirements are comprehensive

      A diagram of reporting lifecycle.

      This section will walk you through some key considerations for establishing your ESG reporting strategy. The first step in this process is to identify the scope of your reporting program.

      Defining the scope of your reporting program

      1. Stakeholder requirements: When developing a reporting program consider all your stakeholder needs as well as how they want to consume the information.
      2. Materiality assessment: Conduct a materiality assessment to identify the material ESG issues most critical to your organization. Organizations will need to report material risks to internal and external stakeholders.
      3. Purpose-driven goals: Your ESG reporting must include metrics to measure performance against your purpose-driven strategy.
      4. Regulatory requirements & industry: Work with your compliance and legal teams to understand which reporting requirements apply. Don’t forget requirements under the “S” and “G” components. Some jurisdictions require DEI reporting, and the Securities and Exchange Commission (SEC) in the US recently announced cybersecurity disclosure of board expertise and management oversight practices.

      Factor 1: Stakeholder requirements

      Work with key stakeholders to determine what to report

      A diagram that shows internal and external stakeholders.

      Evaluate your stakeholder landscape

      Consider each of these areas of the ESG Stakeholder Wheel and identify your stakeholders. Once stakeholders are identified, consider how the ESG factors might be perceived by delving into the ESG factors that matter to each stakeholder and what drives their behavior.

      A diagram of ESG impact, including materiality assessment, interviews, benchmark verses competitors, metrics and trend analysis.

      Determine ESG impact on stakeholders

      Review materiality assessment frameworks for your industry to surface ESG factors for your segment and stakeholder group(s).

      Perform research and analysis of the competition and stakeholder trends, patterns, and behavior

      Support your findings with stakeholder interviews.

      Stakeholders will prioritize ESG differently. Understanding their commitment is a critical success factor.

      Many of your stakeholders care about ESG commitments…

      27%: Support for social and environmental proposals at shareholder meetings of US companies rose to 27% in 2020 (up from 21% in 2017).
      Source: Sustainable Investments Institute, 2020.

      79%: of investors consider ESG risks and opportunities an important factor in investment decision making.
      Source: “Global Investor Survey,” PwC, 2021.

      ...Yet

      33%: of survey respondents cited that a lack of attention or support from senior leadership was one of the major barriers preventing their companies from making any progress on ESG issues.
      Source: “Consumer Intelligence Survey,” PwC, 2021.

      Info-Tech Insight

      To succeed with ESG reporting it is essential to understand who we hold ourselves accountable to and to focus ESG efforts in areas with the optimal balance between people, the planet, and profits

      Activity 1: Define stakeholders

      Input: Internal documentation (e.g. strategy, annual reports), ESG Stakeholder Wheel
      Output: List of key stakeholders and applicable ESG factors
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Head of ESG Reporting, Business leaders

      2 hours

      1. Using the ESG Stakeholder Wheel as a baseline, consider the breadth of your organization’s value chain and write down all your stakeholders.
      2. Discuss what drives their behavior. Be as detailed as you can be. For example, if it’s a consumer, delve into their age group and the factors that may drive their behavior.
      3. List the ESG factors that may be important to each stakeholder.
      4. Write down the communication channels you expect to use to communicate ESG information to this stakeholder group.
      5. Rate the priority of this stakeholder to your organization.
      6. Record this information in ESG Reporting Workbook.
      7. Optional – consider testing the results with a targeted survey.

      Download the ESG Reporting Workbook

      Activity 1: Example

      An example of activity 1 (defining stakeholders)

      Factor 2: Materiality assessments

      Conduct a materiality assessment to inform company strategy and establish targets and metrics for risk and performance reporting

      The concept of materiality as it relates to ESG is the process of gaining different perspectives on ESG issues and risks that may have significant impact (both positive and negative) on or relevance to company performance.

      The objective of a materiality assessment is to identify material ESG issues most critical to your organization by looking at a broad range of social and environmental factors. Its purpose is to narrow strategic focus and enable an organization to assess the impact of financial and non-financial risks aggregately.

      It helps to make the case for ESG action and strategy, assess financial impact, get ahead of long-term risks, and inform communication strategies.

      Organizations can use assessment tools from Sustainalytics or GRI, SASB Standards, or guidance and benchmarking information from industry associations to help assess ESG risks .

      An image of materiality matrix to understand ESG exposure

      Info-Tech Insight

      The materiality assessment informs your risk management approach. Material ESG risks identified should be integrated into your organization’s risk reporting framework.

      Supplement your materiality assessment with stakeholder interviews

      A diagram that shows steps of stakeholder interviews.

      How you communicate the results of your ESG assessment may vary depending on whether you’re communicating to internal or external stakeholders and their communication delivery preferences.

      Using the results from your materiality assessment, narrow down your key stakeholders list. Enhance your strategy for disclosure and performance measurement through direct and indirect stakeholder engagement.

      Decide on the most suitable format to reach out to these stakeholders. Smaller groups lend themselves to interviews and forums, while surveys and questionnaires work well for larger groups.

      Develop relevant questions tailored to your company and the industry and geography you are in.

      Once you receive the results, decide how and when you will communicate them.

      Determine how they will be used to inform your strategy.

      Steps to determine material ESG factors

      Step 1

      Select framework

      A diagram of framework

      Review reporting frameworks and any industry guidance and select a baseline reporting framework to begin your materiality assessment.

      Step 2

      Begin to narrow down

      A diagram of narrowing down stakeholders

      Work with stakeholders to narrow down your list to a shortlist of high-priority material ESG issues.

      Step 3

      Consolidate and group

      A diagram of ESG grouping

      Group ESG issues under ESG components, your company’s strategic goals, or the UN’s Sustainable Development Goals.

      Step 4

      Rate the risks of ESG factors

      A diagram of rating the risks of ESG factors

      Assign an impact and likelihood scale for each risk and assign your risk threshold.

      Step 5

      Map

      A diagram of material map

      Use a material map framework such as GRI or SASB or Info-Tech’s materiality map to visualize your material ESG risks.

      Materiality assessment

      The materiality assessment is a strategic tool used to help identify, refine, and assess the numerous ESG issues in the context of your organization.

      There is no universally accepted approach to materiality assessments. Although the concept of materiality is often embedded within a reporting standard, your approach to conducting the materiality assessment does not need to link to a specific reporting standard. Rather, it can be used as a baseline to develop your own.

      To arrive at the appropriate outcome for your organization, careful consideration is needed to tailor the materiality assessment to meet your organization’s objectives.

      When defining the scope of your materiality assessment consider:

      • Your corporate ESG purpose and sustainability strategy
      • Your audience and what drives their behavior
      • The relevance of the ESG issues to your organization. Do they impact strategy? Increase risk?
      • The boundaries of your materiality assessment (e.g. regions or business departments, supply chains it will cover)
      • Whether you want to assess from a double materiality perspective

      A diagram of framework

      Consider your stakeholders and your industry when selecting your materiality assessment tool – this will ensure you provide relevant disclosure information to the stakeholders that need it.

      Double materiality is an extension of the financial concept of materiality and considers the broader impact of an organization on the world at large – particularly to people and climate.

      Prioritize and categorize

      A diagram of narrowing down stakeholders

      Using internal information (e.g. strategy, surveys) and external information (e.g. competitors, industry best practices), create a longlist of ESG issues.

      Discuss and narrow down the list. Be sure to consider opportunities – not just material risks!

      A diagram of ESG grouping

      Group the issues under ESG components or defined strategic goals for your organization. Another option is to use the UN’s Sustainable Development Goals to categorize.

      Differentiate ESG factors that you already measure and report.

      The benefit of clustering is that it shows related topics and how they may positively or negatively influence one another.

      Internal risk disclosure should not be overlooked

      Bank of America estimates ESG disputes have cost S&P companies more than $600 billion in market capitalization in the last seven years alone.

      ESG risks are good predictors of future risks and are therefore key inputs to ensure long-term corporate success.

      Regardless of the size of your organization, it’s important to build resilience against ESG risks.

      To protect an organization against an ESG incident and potential liability risk, ESG risks should be treated like any other risk type and incorporated into risk management and internal reporting practices, including climate scenario analysis.

      Some regulated entities will be required to meet climate-related financial disclosure expectations, and sound risk management practices will be prescribed through regulatory guidance. However, all organizations should instill sound risk practices.

      ESG risk management done right will help protect against ESG mishaps that can be expensive and damaging while demonstrating commitment to stakeholders that have influence over all corporate performance.

      Source: GreenBiz, 2022.

      A diagram of risk landscape.

      IT has a role to play to provide the underlying data and technology to support good risk decisions.

      Visualize your material risks

      Leverage industry frameworks or use Info-Tech’s materiality map to visualize your material ESG risks.

      GRI’s Materiality Matrix

      A photo of GRI’s Materiality Matrix

      SASB’s Materiality Map

      A photo of SASB’s Materiality Map

      Info-Tech’s Materiality Map

      A diagram of material map

      Activity 2: Materiality assessment

      Input: ESG corporate purpose or any current ESG metrics; Customer satisfaction or employee engagement surveys; Materiality assessment tools from SASB, Sustainalytics, GRI, or industry frameworks; Outputs from stakeholder outreach/surveys
      Output: Materiality map, a list of material ESG issues
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Head of ESG Reporting, Business leaders, Participants from marketing and communications

      2-3 hour

      1. Begin by reviewing various materiality assessment frameworks to agree on a baseline framework. This will help to narrow down a list of topics that are relevant to your company and industry.
      2. As a group, discuss the potential impact and start listing material issues. At first the list will be long, but the group will work collectively to prioritize and consolidate the list.
      3. Begin to combine and categorize the results by aligning them to your ESG purpose and strategic pillars.
      4. Treat each ESG issue as a risk and map against the likelihood and impact of the risk.
      5. Map the topics on your materiality map. Most of the materiality assessment tools have materiality maps – you may choose to use their map.
      6. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      Case Study: Novartis

      Logo of Novartis

      • INDUSTRY: Pharmaceuticals
      • SOURCE: Novartis, 2022

      Novartis, a leading global healthcare company based in Switzerland, stands out as a leader in providing medical consultancy services to address the evolving needs of patients worldwide. As such, its purpose is to use science and technologically innovative solutions to address some of society’s most debilitating, challenging, and ethically significant healthcare issues.

      The application of Novartis’ materiality assessment process in understanding critical ESG topics important to their shareholders, stakeholder groups, and society at large enables the company to better quantify references to its ESG sustainability metrics.

      Novartis applies its materiality assessment process to better understand relevant issues affecting its underlying business operations across its entire value chain. Overall, employing Novartis’s materiality assessment process helps the company to better manage its societal, environmental, and economic impacts, thus engaging in more socially responsible governance practices.

      Novartis’ materiality assessment is a multitiered process that includes three major elements:

      1. Identifying key stakeholders, which involves a holistic analysis of internal colleagues and external stakeholders.
      2. Collecting quantitative feedback and asking relevant stakeholders to rank a set of issues (e.g. climate change governance, workplace culture, occupational health and safety) and rate how well Novartis performs across each of those identified issues.
      3. Eliciting qualitative insights by coordinating interviews and workshops with survey participants to better understand why the issues brought up during survey sessions were perceived as important.

      Results

      In 2021, Novartis had completed its most recent materiality assessment. From this engagement, both internal and external stakeholders had ranked as important eight clusters that Novartis is impacting on from an economic, societal, and environmental standpoint. The top four clusters were patient health and safety, access to healthcare, innovation, and ethical business practices.

      Factor 3: ESG program goals

      Incorporate ESG performance metrics that support your ESG strategy

      Another benefit of the materiality assessment is that it helps to make the case for ESG action and provides key information for developing a purpose-led strategy.

      An internal ESG strategy should drive toward company-specific goals such as green-house gas emission targets, use of carbon neutral technologies, focus on reusable products, or investment in DEI programs.

      Most organizations focus on incremental goals of reducing negative impacts to existing operations or improving the value to existing stakeholders rather than transformative goals.

      Yet, a strategy that is authentic and aligned with key stakeholders and long-term goals will bring sustainable value.

      The strategy must be supported by an accountability and performance measurement framework such as SMART metrics.

      A fulsome reporting strategy should include performance metrics

      A photo of SMART metrics: Specific, Measurable, Actionable, Realistic, Time-bound.

      Activity 3: SMART metrics

      Input: ESG corporate purpose or any current ESG metrics, Outputs from activities 1 and 2, Internally defined metrics (i.e. risk metrics or internal reporting requirements)
      Output: SMART metrics
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Chief Risk officer/Risk leaders, Head of ESG Reporting, Business leaders, Participants from marketing and communications

      1-2 hours

      1. Document a list of appropriate metrics to assess the success of your ESG program.
      2. Use the sample metrics listed in the table on the next slide as a starting point.
      3. Fill in the chart to indicate the:
        1. Name of the success metric
        2. Method for measuring success
        3. Baseline measurement
        4. Target measurement
        5. Actual measurements at various points throughout the process of improving the risk management program
        6. A deadline for each metric to meet the target measurement
      4. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      Sample ESG metrics

      Leverage industry resources to help define applicable metrics

      Environmental

      • Greenhouse gas emissions – total corporate
      • Carbon footprint – percent emitted and trend
      • Percentage of air and water pollution
      • Renewable energy share per facility
      • Percentage of recycled material in a product
      • Ratio of energy saved to actual use
      • Waste creation by weight
      • Circular transition indicators

      Social

      • Rates of injury
      • Lost time incident rate
      • Proportion of spend on local suppliers
      • Entry-level wage vs. local minimum wage
      • Percentage of management who identify with specific identity groups (i.e. gender and ethnic diversity)
      • Percentage of suppliers screened for accordance to ESG vs. total number of suppliers
      • Consumer responsiveness

      Governance

      • Annual CEO compensation compared to median
      • Percentage of employees trained in conflict-of-interest policy
      • Number of data breaches using personally identifiable information (PII)
      • Number of incidents relating to management corruption
      • Percentage of risks with mitigation plans in place

      Activity 3: Develop SMART project metrics

      1-3 hours

      Attach metrics to your goals to gauge the success of the ESG program.

      Sample Metrics

      An image of sample metrics

      Factor 4: Regulatory reporting obligations

      Identify your reporting obligations

      High-level overview of reporting requirements:

      An image of high-level reporting requirements in Canada, the United Kingdom, Europe, and the US.

      Refer to your legal and compliance team for the most up-to-date and comprehensive requirements.

      The focus of regulators is to move to mandatory reporting of material climate-related financial information.

      There is some alignment to the TCFD* framework, but there is a lack of standardization in terms of scope across jurisdictions.
      *TCFD is the Task Force on Climate-Related Financial Disclosures.

      Activity 4: Regulatory obligations

      Input: Corporate strategy documents; Compliance registry or internal governance, risk, and compliance (GRC) tool
      Output: A list of regulatory obligations
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Chief Legal Officer, Head of ESG Reporting, Business leaders

      1-2 hours

      1. Begin by listing the jurisdictions in which you operate or plan to operate.
      2. For each jurisdiction, list any known current or future regulatory requirements. Consider all ESG components.
      3. Log whether the requirements are mandatory or voluntary and the deadline to report.
      4. Write any details about reporting framework; for example, if a reporting framework such as TCFD is prescribed.
      5. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      1.2 Assess impact and weigh options

      A diagram of reporting lifecycle.

      Once the scope of your ESG reporting framework has been identified, further assessment is needed to determine program direction and to understand and respond to organizational impact.

      Key factors for further assessment and decisions include

      1. Reporting framework options. Consider mandated reporting frameworks and any industry standards when deciding your baseline reporting framework. Strive to have a common reporting methodology that serves all your reporting needs: regulatory, corporate, shareholders, risk reporting, etc.
      2. Perform gap analysis. The gap analysis will reveal areas where data may need to be sourced or where tools or external assistance may be needed to help deliver your reporting strategy.
      3. Organizational impact and readiness. The gap analysis will help to determine whether your current operating model can support the reporting program or whether additional resources, tools, or infrastructure will be needed.

      1.2.1 Decide on baseline reporting framework

      1. Determine the appropriate reporting framework for your organization

      Reporting standards are available to enable relevant, high-quality, and comparable information. It’s the job of the reporting entity to decide on the most suitable framework for their organization.

      The most established standard for sustainability reporting is the Global Reporting Initiative (GRI), which has supported sustainability reporting for over 20 years.

      The Task Force on Climate-Related Financial Disclosures (TCFD) was created by the Financial Stability Board to align ESG disclosure with financial reporting. Many global regulators support this framework.

      The International Sustainability Standards Board (ISSB) is developing high-quality, understandable, and enforceable global standards using the Sustainability Accounting Standards Board (SASB) as a baseline. It is good practice to use SASB Standards until the ISSB standards are available.

      2. Decide which rating agencies you will use and why they are important

      ESG ratings are provided by third-party agencies and are increasingly being used for financing and transparency to investors. ESG ratings provide both qualitative and quantitative information.

      However, there are multiple providers, so organizations need to consider which ones are the most important and how many they want to use.

      Some of the most popular rating agencies include Sustainalytics, MSCI, Bloomberg, Moody's, S&P Global, and CDP.

      Reference Appendix Below

      1.2.2 Determine data gaps

      The ESG reporting mandate is built on the assumption of consistent, good-quality data

      To meet ESG objectives, corporations are challenged with collecting non-financial data from across functional business and geographical locations and from their supplier base and supply chains.

      One of the biggest impediments to ESG implementation is the lack of high-quality data and of mature processes and tools to support data collection.

      An important step for delivering reporting requirements is to perform a gap analysis early on to surface gaps in the primary data needed to deliver your reporting strategy.

      The output of this exercise will also inform and help prioritize implementation, as it may show that new data sets need to be sourced or tools purchased to collect and aggregate data.

      Conduct a gap analysis to determine gaps in primary data

      A diagram of gap analysis to determine gaps in primary data.

      Activity 5: Gap analysis

      Input: Business (ESG) strategy, Data inventory (if exists), Output from Activity 1: Key stakeholders, Output from Activity 2: Materiality map, Output of Activity 3: SMART metrics, Output of Activity 4: Regulatory obligations
      Output: List of high-priority data gaps
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Chief Legal Officer, Head of ESG Reporting, Business leaders, Data analysts

      1-3 hours

      1. Using the outputs from activities 1-4, list your organization’s ESG issues in order of priority. You may choose to develop your priority list by stakeholder group or by material risks.
      2. List any defined SMART metric from Activity 3.
      3. Evaluate data availability and quality of the data (if existing) as well as any impediments to sourcing the data.
      4. Make note if this is a common datapoint, i.e. would you disclose this data in more than one report?
      5. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      1.3 Take a holistic implementation approach

      Currently, 84 percent of businesses don’t integrate their ESG performance with financial and risk management reporting.

      Source: “2023 Canadian ESG Reporting Insights,” PwC.

      A diagram of reporting lifecycle.

      When implementing an ESG reporting framework, it is important not to implement in silos but to take a strategic approach that considers the evolving nature of ESG and the link to value creation and sound decision making.

      Key implementation considerations include

      1. Setting clear metrics and targets. Key performance indicators (KPIs) and key risk indicators (KRIs) are used to measure ESG factor performance. It’s essential that they are relevant and are constructed using high-quality data. Your performance metrics should be continually assessed and adapted as your ESG program evolves.
      2. Data challenges. Without good-quality data it is impossible to accurately measure ESG performance, generate actionable insights on ESG performance and risk, and provide informative metrics to investors and other stakeholders. Design your data model to be flexible and digital where possible to enable data interoperability.
      3. Architectural approach. IT will play a key role in the design of your reporting framework, including the decision on whether to build, buy, or deliver a hybrid solution. Every organization will build their reporting program to suit their unique needs; however, taking a holistic and proactive approach will support and sustain your strategy long term.

      1.3.1 Metrics and targets for climate-related disclosure

      “The future of sustainability reporting is digital – and tagged.”
      Source: “XBRL Is Coming,” Novisto, 2022.

      In the last few years, global regulators have proposed or effected legislation requiring public companies to disclose climate-related information.

      Yet according to Info-Tech’s 2023 Trends and Priorities survey, most IT professionals expect to support environmental mandates but are not prepared to accurately report on their organization’s carbon footprint.

      IT groups have a critical role to play in helping organizations develop strategic plans to meet ESG goals, measure performance, monitor risks, and deliver on disclosure requirements.

      To future-proof your reporting structure, your data should be readable by humans and machines.

      eXtensible Business Reporting Language (XBRL) tagging is mandated in several jurisdictions for financial reporting, and several reporting frameworks are adopting XBRL for sustainability reporting so that non-financial and financial disclosure frameworks are aligned.

      Example environmental metrics

      • Amount of scope 1, 2, or 3 GHG emissions
      • Total energy consumption
      • Total water consumption
      • Progress toward net zero emission
      • Percentage of recycled material in a product

      1.3.1 Metrics and targets for social disclosure

      “59% of businesses only talk about their positive performance, missing opportunities to build trust with stakeholders through balanced and verifiable ESG reporting.”
      Source: “2023 Canadian ESG Reporting Insights,” PwC.

      To date, regulatory focus has been on climate-related disclosure, although we are beginning to see signals in Europe and the UK that they are turning their attention to social issues.

      Social reporting focuses on the socioeconomic impacts of an organization’s initiatives or activities on society (indirect or direct).

      The “social” component of ESG can be the most difficult to quantify, but if left unmonitored it can leave your organization open to litigation from consumers, employees, and activists.

      Although organizations have been disclosing mandated metrics such as occupational health and safety and non-mandated activities such as community involvement for years, the scope of reporting is typically narrow and hard to measure in financial terms.

      This is now changing with the recognition by companies of the value of social reporting to brand image, traceability, and overall corporate performance.

      Example social metrics

      • Rate of injury
      • Lost time incident rate
      • Proportion of spend on local suppliers
      • Entry-level wage versus local minimum wage
      • Percentage of management within specific identity groups (i.e. gender and ethnic diversity)
      • Number of workers impacted by discrimination

      Case Study: McDonald’s Corporation (MCD)

      Logo of McDonald’s

      • INDUSTRY: Food service retailer
      • SOURCE: RBC Capital Markets, 2021; McDonald’s, 2019

      McDonald’s Corporation is the leading global food service retailer. Its purpose is not only providing burgers to dinner tables around the world but also serving its communities, customers, crew, farmers, franchisees, and suppliers alike. As such, not only is the company committed to having a positive impact on communities and in maintaining the growth and success of the McDonald's system, but it is also committed to conducting its business operations in a way that is mindful of its ESG commitments.

      An image of McDonald’s Better Together

      McDonald’s Better Together: Gender Balance & Diversity strategy and Women in Tech initiative

      In 2019, MCD launched its Better Together: Gender Balance & Diversity strategy as part of a commitment to improving the representation and visibility of women at all levels of the corporate structure by 2023.

      In conjunction with the Better Together strategy, MCD piloted a “Women in Tech” initiative through its education and tuition assistance program, Archways to Opportunity. The initiative enabled women from company-owned restaurants and participating franchisee restaurants to learn skills in areas such as data science, cybersecurity, artificial intelligence. MCD partnered with Microsoft and Colorado Technical University to carry out the initiative (McDonald’s, 2019).

      Both initiatives directly correlate to the “S” of the ESG framework, as the benefits of gender-diverse leadership continue to be paramount in assessing the core strengths of a company’s overreaching ESG portfolio. Hence, public companies will continue to face pressure from investors to act in accordance with these social initiatives.

      Results

      MCD’s Better Together and Women in Tech programs ultimately helped improve recruitment and retention rates among its female employee base. After the initialization of the gender balance and diversification strategy, McDonald’s signed on to the UN Women’s Empowerment Principles to help accelerate global efforts in addressing the gender disparity problem.

      1.3.1 Metrics and targets for governance disclosure

      Do not lose sight of regulatory requirements

      Strong governance is foundational element of a ESG program, yet governance reporting is nascent and is often embedded in umbrella legislation pertaining to a particular risk factor.

      A good example of this is the recent proposal by the Securities and Exchange Commission in the US (CFR Parts 229, 232, 239, 240, and 249, Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure), which will require public companies to:

      • Disclosure of board oversight of cyber risk.
      • Disclose management’s role in managing and accessing cybersecurity-related risks.

      The "G” component includes more than traditional governance factors and acts as a catch-all for other important ESG factors such as fraud, cybersecurity, and data hygiene. Make sure you understand how risk may manifest in your organization and put safeguards in place.

      Example governance metrics

      • Annual CEO compensation compared to median
      • Percentage of employees trained in conflict-of-interest policy
      • Completed number of supplier assessments
      • Number of data breaches using PII
      • Number of material cybersecurity breaches

      Info-Tech Insight

      The "G" in ESG may not be capturing the limelight under ESG legislation yet, but there are key governance factors that are that are under regulatory radar, including data, cybersecurity, fraud, and DEI. Be sure you stay on top of these issues and include performance metrics into your internal and external reporting frameworks.

      1.3.2 Conquering data management challenges

      48% of investment decision makers, including 58% of institutional investors, say companies’ self-reported ESG performance data is “much more important” than companies’ conventional financial data when informing their investment decisions (Benchmark ESG, 2021).

      Due to the nascent nature of climate-related reporting, data challenges such as the availability, usability, comparability, and workflow integration surface early in the ESG program journey when sourcing and organizing data:

      • It is challenging to collect non-financial data across functional business and geographical locations and from supplier base and supply chains.
      • The lack of common standards leads to comparability challenges, hindering confidence in the outputs.

      In addition to good, reliable inputs, organizations need to have the infrastructure to access new data sets and convert raw data into actionable insights.

      The establishment of data model and workflow processes to track data lineage is essential to support an ESG program. To be successful, it is critical that flexibility, scalability, and transparency exist in the architectural design. Data architecture must scale to capture rapidly growing volumes of unstructured raw data with the associated file formats.

      A photo of conceptual model for data lineage.

      Download Info-Tech’s Create and Manage Enterprise Data Models blueprint

      1.3.3 Reporting architecture

      CIOs play an important part in formulating the agenda and discourse surrounding baseline ESG reporting initiatives

      Building and operating an ESG program requires the execution of a large number of complex tasks.

      IT leaders have an important role to play in selecting the right technology approach to support a long-term strategy that will sustain and grow corporate performance.

      The decision to buy a vendor solution or build capabilities in-house will largely depend on your organization’s ESG ambitions and the maturity of in-house business and IT capabilities.

      For large, heavily regulated entities an integrated platform for ESG reporting can provide organizations with improved risk management and internal controls.

      Example considerations when deciding to meet ESG reporting obligations in-house

      • Size and type of organization
      • Extent of regulatory requirements and scrutiny
      • The amount of data you want to report
      • Current maturity of data architecture, particularly your ability to scale
      • Current maturity of your risk and control program – how easy is it to enhance current processes?
      • The availability and quality of primary data
      • Data set gaps
      • In-house expertise in data, model risk, and change management
      • Current operating model – is it siloed or integrated?
      • Implementation time
      • Program cost
      • The availability of vendor solutions that may address gaps

      Info-Tech Insight

      Executive leadership should take a more holistic and proactive stance to not only accurately reporting upon baseline corporate financial metrics but also capturing and disclosing relevant ESG performance metrics to drive alternative streams of valuation across their respective organizational environments.

      Activity 6: High-level implementation considerations

      Input: Business (ESG) strategy, Data inventory (if exists), Asset inventory (if exists), Output from Activity 5
      Output: Summary of high-level implementation considerations
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Head of ESG Reporting, Business leaders, Data analysts, Data and IT architect/leaders,

      2-3 hours

      1. Review the implementation considerations on the previous slide to help determine the appropriate technology approach.
      2. For each implementation consideration, describe the current state.
      3. Discuss and draft the implications of reaching the desired future state by listing implications and organizational gaps.
      4. Discuss as a group if there is an obvious implementation approach.
      5. At this point, further analysis may be needed. Form a subcommittee or assign a leader to conduct further analysis.
      6. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      1.3.4 Ensure your implementation team has a high degree of trust and communication

      If external partners are needed, dedicate an internal resource to managing the vendor and partner relationships.

      Communication: Teams must have some type of communication strategy. This can be broken into:

      • Regularity: Having a set time each day to communicate progress and a set day to conduct retrospectives.
      • Ceremonies: Injecting awards and continually emphasizing delivery of value to encourage relationship building and constructive motivation.
      • Escalation: Voicing any concerns and having someone responsible for addressing those concerns.

      Proximity: Distributed teams create complexity as communication can break down. This can be mitigated by:

      • Location: Placing teams in proximity to close the barrier of geographical distance and time zone differences.
      • Inclusion: Making a deliberate attempt to pull remote team members into discussions and ceremonies.
      • Communication tools: Having the right technology (e.g. videoconference) to help bring teams closer together virtually.

      Trust: Members should trust other members are contributing to the project and completing their required tasks on time. Trust can be developed and maintained by:

      • Accountability: Having frequent quality reviews and feedback sessions. As work becomes more transparent, people become more accountable.
      • Role clarity: Having a clear definition of what everyone’s role is.

      1.4 Clear effective communication

      Improving investor transparency is one of the key drivers behind disclosure, so making the data easy to find and consumable is essential

      A diagram of reporting lifecycle.

      Your communication of ESG performance is intricately linked to corporate value creation. When designing your communications strategy, consider:

      • Your message – make it authentic and tell a consistent story.
      • How data will be used to support the narrative.
      • How your ESG program may impact internal and external programs and build a communication strategy that is fit for purpose. Example programs are:
        • Employee recruitment
        • New product rollout
        • New customer campaign
      • The design of the communication and how well it suits the audience. Communications may take the form of campaigns, thought leadership, infographics, etc.
      • The appropriateness of communication channels to your various audiences and the messages you want to convey. For example, social media, direct outreach, shareholder circular, etc.

      1.5 Continually evaluate

      A diagram of reporting lifecycle.

      A recent BDC survey of 121 large companies and public-sector buyers found that 82% require some disclosure from their suppliers on ESG, and that's expected to grow to 92% by 2024.
      Source: BDC, 2023

      ESG's link to corporate performance means that organizations must stay on top of ESG issues that may impact the long-term sustainability of their business.

      ESG components will continue to evolve, and as they do so will stakeholder views. It is important to continually survey your stakeholders to ensure you are optimally managing ESG risks and opportunities.

      To keep ESG on the strategy agenda, we recommend that organizations:

      • Appoint a chief sustainability officer (CSO) with a seat on executive leadership committees.
      • Embed ESG into existing governance and form a tactical ESG working group committee.
      • Ensure ESG risks are integrated into the enterprise risk management program.
      • Continually challenge your ESG strategy.
      • Regularly review risks and opportunities through proactive outreach to stakeholders.

      Download The ESG Imperative and Its Impact on Organizations

      Phase 2

      Streamline Requirements and Tool Selection

      A diagram that shows phase 1 to 3 of establishing ESG reporting program.

      This phase will walk you through the following activities:

      • Assess technology and tooling opportunities.
      • Prepare ESG reporting implementation plan.
      • Write ESG reporting presentation document.

      This phase involves the following participants: CIO, CCO, CSO, EA, IT application and data leaders, procurement, business leaders, marketing and communications, head of ESG reporting, and any dedicated ESG team members

      2.1 Streamline your requirements and tool section

      Spend the time up front to enable success and meet expectations

      Before sourcing any technology, it’s important to have a good understanding of your requirements.

      Key elements to consider:

      1. ESG reporting scope. Large enterprises will have more complex workflow requirements, but they also will have larger teams to potentially manage in-house. Smaller organizations will need easy-to-use, low-cost solutions.
      2. Industry and value chain. Look for industry-specific solutions, as they will be more tailored to your needs and will enable you to be up and running quicker.
      3. Coverage. Ensure the tool has adequate regulatory coverage to meet your current and future needs.
      4. Gap in functionality. Be clear on the problem you are trying to solve and/or the gap in workflow. Refer to the reporting lifecycle and be clear on your needs before sourcing technology.
      5. Resourcing. Factor in capacity during and after implementation and negotiate the appropriate support.

      Industry perspective

      The importance of ESG is something that will need to be considered for most, if not every decision in the future, and having reliable and available information is essential. While the industry will continue to see investment and innovation that drives operational efficiency and productivity, we will also see strong ESG themes in these emerging technologies to ensure they support both sustainable and socially responsible operations.

      With the breadth of technology Datamine already has addressing the ESG needs for the mining industry combined with our new technology, our customers can make effective and timely decisions through incorporating ESG data into their planning and scheduling activities to meet customer demands, while staying within the confines of their chosen ESG targets.

      Photo of Chris Parry

      Chris Parry
      VP of ESG, Datamine

      Photo of Datamine Photo of isystain

      Activity 7: Brainstorm tooling options

      Use the technology feature list below to identify areas along the ESG workflow where automated tools or third-party solutions may create efficiencies

      Technological Solutions Feature Bucket

      Basic Feature Description

      Advanced Feature Description

      Natural language processing (NLP) tools

      Ability to use NLP tools to track and monitor sentiment data from news and social media outlets.

      Leveraging NLP toolsets can provide organizations granular insights into workplace sentiment levels, which is a core component of any ESG strategy. A recent study by MarketPsych, a company that uses NLP technologies to analyze sentiment data from news and social media feeds, linked stock price performance to workplace sentiment levels.

      Distributed ledger technologies (DLTs)

      DLTs can help ensure greater reporting transparency, in line with stringent regulatory reporting requirements.

      DLT as an ESG enabler, with advanced capabilities such as an option to provide demand response services linked to electricity usage and supply forecasting.

      Cloud-based data management and reporting systems

      Cloud-based data management and reporting can support ESG initiatives by providing increased reporting transparency and a better understanding of diverse social and environmental risks.

      Leverage newfound toolsets such as Microsoft Cloud for Sustainability – a SaaS offering that enables organizations to seamlessly record, report, and reduce their emissions on a path toward net zero.

      IoT technologies

      Integration of IoT devices can help enhance the integrity of ESG reporting through the collection of descriptive and accurate ESG metrics (e.g. energy efficiency, indoor air quality, water quality and usage).

      Advanced management of real-time occupancy monitoring: for example, the ability to reduce energy consumption rates by ensuring energy is only used when spaces and individual cubicles are occupied.

      2.2 Vendors tools and technologies to support ESG reporting

      In a recent survey of over 1,000 global public- and private-sector leaders, 87% said they see AI as a helpful tool to fight climate change.
      Source: Boston Consulting Group

      Technology providers are part of the solution and can be leveraged to collect, analyze, disclose, track, and report on the vast amount of data.

      Increasingly organizations are using artificial intelligence to build climate resiliency:

      • AI is useful for the predictive modelling of potential climate events due to its ability to gather and analyze and synthesize large complete data sets.

      And protect organizations from vulnerabilities:

      • AI can be used to identify and assess vulnerabilities that may lead to business disruption or risks in production or the supply chain.

      A diagram of tooling, including DLT, natural language processing, cloud-based data management and IoT.

      2.3 ESG reporting software selection

      What Is ESG Reporting Software?

      Our definition: ESG reporting software helps organizations improve the transparency and accountability of their ESG program and track, measure, and report their sustainability efforts.

      Key considerations for reporting software selection:

      • While there are boutique ESG vendors in the market, organizations with existing GRC tools may first want to discuss ESG coverage with their existing vendor as it will enable better integration.
      • Ensure that the vendors you are evaluating support the requirements and regulations in your region, industry, and geography. Regulation is moving quickly – functionality needs to be available now and not just on the roadmap.
      • Determine the level of software integration support you need before meeting with vendors and ensure they will be able to provide it – when you need it!

      Adoption of ESG reporting software has historically been low, but these tools will become critical as organizations strive to meet increasing ESG reporting requirements.

      In a recent ESG planning and performance survey conducted by ESG SaaS company Diligent Corporation, it was found that over half of all organizations surveyed do not publish ESG metrics of any kind, and only 9% of participants are actively using software that supports ESG data collection, analysis, and reporting.

      Source: Diligent, 2021.

      2.3.1 Elicit and prioritize granular requirements for your ESG reporting software

      Understanding business needs through requirements gathering is the key to defining everything about what is being purchased. However, it is an area where people often make critical mistakes.

      Poorly scoped requirements

      Fail to be comprehensive and miss certain areas of scope.

      Focus on how the solution should work instead of what it must accomplish.

      Have multiple levels of detail within the requirements that are inconsistent and confusing.

      Drill all the way down into system-level detail.

      Add unnecessary constraints based on what is done today rather than focusing on what is needed for tomorrow.

      Omit constraints or preferences that buyers think are obvious.

      Best practices

      Get a clear understanding of what the system needs to do and what it is expected to produce.

      Test against the principle of MECE – requirements should be “mutually exclusive and collectively exhaustive.”

      Explicitly state the obvious and assume nothing.

      Investigate what is sold on the market and how it is sold. Use language that is consistent with that of the market and focus on key differentiators – not table stakes.

      Contain the appropriate level of detail – the level should be suitable for procurement and sufficient for differentiating vendors.

      Download Info-Tech's Improve Requirements Gathering blueprint

      2.3.1 Identify critical and nice-to-have features

      Central Data Repository: Collection of stored data from existing databases merged into one location that can then be shared, analyzed, or updated.

      Automatic Data Collection: Ability to automate data flows, collect responses from multiple sources at specified intervals, and check them against acceptance criteria.

      Automatic KPI Calculations, Conversions, and Updates: Company-specific metrics can be automatically calculated, converted, and tracked.

      Built-In Indicator Catalogs and Benchmarking: Provides common recognized frameworks or can integrate a catalog of ESG indicators.

      Custom Reporting: Ability to create reports on company emissions, energy, and asset data in company-branded templates.

      User-Based Access and Permissions: Ability to control access to specific content or data sets based on the end user’s roles.

      Real-Time Capabilities: Ability to analyze and visualize data as soon as it becomes available in underlying systems.

      Version Control: Tracking of document versions with each iteration of document changes.

      Intelligent Alerts and Notifications: Ability to create, manage, send, and receive notifications, enhancing efficiency and productivity.

      Audit Trail: View all previous activity including any recent edits and user access.

      Encrypted File Storage and Transfer: Ability to encrypt a file before transmitting it over the network to hide content from being viewed or extracted.

      Activity 7: Technology and tooling options

      Input: Business (ESG) strategy, Data inventory (if exists), Asset inventory (if exists), Output from Activity 5, Output from Activity 6,
      Output: List of tooling options
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Head of ESG Reporting, Business leaders, Data analysts, Data and IT architect/leaders

      1-2 hours

      1. Begin by listing key requirements and features for your ESG reporting program.
      2. Use the outputs from activities 5 and 6 and the technology feature list on the previous slide to help brainstorm technology and tooling options.
      3. Discuss the availability and readiness of each option. Note that regulatory requirements will have an effective date that will impact the time to market for introducing new tooling.
      4. Discuss and assign a priority.
      5. At this point, further analysis may be needed. Form a subcommittee or assign a leader to conduct further analysis.
      6. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      Activity 8: Implementation plan

      Input: Business (ESG) strategy, Output from Activity 5, Output from Activity 6, Output from Activity 7
      Output: ESG Reporting Implementation Plan
      Materials: Whiteboard/flip charts, ESG Reporting Implementation Plan Template
      Participants: Chief Sustainability Officer, Head of ESG Reporting, Business leaders, Data analysts, PMO, Data and IT architect/leaders

      1-2 hours

      1. Use the outputs from activities 5 to 7 and list required implementation tasks. Set a priority for each task.
      2. Assign the accountable owner as well as the group responsible. Larger organizations and large, complex change programs will have a group of owners.
      3. Track any dependencies and ensure the project timeline aligns.
      4. Add status as well as start and end dates.
      5. Complete in the ESG Reporting Implementation Plan Template.

      Download the ESG Reporting Implementation Plan Template

      Activity 9: Internal communication

      Input: Business (ESG) strategy, ESG Reporting Workbook, ESG reporting implementation plan
      Output: ESG Reporting Presentation Template
      Materials: Whiteboard/flip charts, ESG Reporting Presentation Template, Internal communication templates
      Participants: Chief Sustainability Officer, Head of Marketing/ Communications, Business leaders, PMO

      1-2 hours

      Since a purpose-driven ESG program presents a significant change in how organizations operate, the goals and intentions need to be understood throughout the organization. Once you have developed your ESG reporting strategy it is important that it is communicated, understood, and accepted. Use the ESG Reporting Presentation Template as a guide to deliver your story.

      1. Consider your audience and discuss and agree on the key elements you want to convey.
      2. Prepare the presentation.
      3. Test the presentation with smaller group before communicating to senior leadership/board

      Download the ESG Reporting Presentation Template

      Phase 3

      Select ESG Reporting Software

      A diagram that shows phase 1 to 3 of establishing ESG reporting program.

      This phase will provide additional material on Info-Tech’s expertise in the following areas:

      • Info-Tech’s approach to RFPs
      • Info-Tech tools for software selection
      • Example ESG software assessments

      3.1 Leverage Info-Tech’s expertise

      Develop an inclusive and thorough approach to the RFP process

      An image that a process of 7 steps.

      The Info-Tech difference:

      1. The secret to managing an RFP is to make it as manageable and as thorough as possible. The RFP process should be like any other aspect of business – with a standard process in place, you are better able to handle whatever comes your way, because you know the steps you need to follow to produce a top-notch RFP.
      2. The business then identifies the need for more information about a product/service or determines that a purchase is required.
      3. A team of stakeholders from each area impacted gather all business, technical, legal, and risk requirements. What are the expectations of the vendor relationship post-RFP? How will the vendors be evaluated?
      4. Based on predetermined requirements, either an RFI or an RFP is issued to vendors with a due date.

      Info-Tech Insight

      Review Info-Tech’s process and understand how you can prevent your organization from leaking negotiation leverage while preventing vendors from taking control of your RFP.

      Software Selection Engagement

      5 Advisory Calls Over a 5-Week Period to Accelerate Your Selection Process

      Expert Analyst Guidance over5 weeks on average to select and negotiate software.

      Save Money, Align Stakeholders, Speed Up the Process & make better decisions.

      Use a Repeatable, Formal Methodology to improve your application selection process.

      Better, Faster Results, guaranteed, included in membership.

      A diagram of selection engagement over a 5-week period.

      CLICK HERE to Book Your Selection Engagement

      Leverage the Contract Review Service to level the playing field with your shortlisted vendors

      You may be faced with multiple products, services, master service agreements, licensing models, service agreements, and more.

      Use the Contract Review Service to gain insights on your agreements.

      Consider the aspects of a contract review:

      1. Are all key terms included?
      2. Are they applicable to your business?
      3. Can you trust that results will be delivered?
      4. What questions should you be asking from an IT perspective?

      Validate that a contract meets IT’s and the business’ needs by looking beyond the legal terminology. Use a practical set of questions, rules, and guidance to improve your value for dollar spent.

      A photo of Contract Review Service.

      Click here to book The Contract Review Service

      Download blueprint Master Contract Review and Negotiation for Software Agreements

      3.2 Vendor spotlight assessments

      See above for a vendor landscape overview of key ESG reporting software providers

      The purpose of this section is to showcase various vendors and companies that provide software solutions to help users manage and prioritize their ESG reporting initiatives.

      This section showcases the core capabilities of each software platform to provide Info-Tech members with industry insights regarding some of the key service providers that operate within the ESG vendor market landscape.

      Info-Tech members who are concerned with risks stemming from the inability to sort and disseminate unstructured ESG data reporting metrics or interested in learning more about software offerings that can help automate the data collection, processing, and management of ESG metrics will find high-level insights into the ESG vendor market space.

      Vendor spotlight

      A photo of Datamine Isystain

      The establishment of the Datamine ESG unit comes at the same time the mining sector is showing an increased interest in managing ESG and its component systems as part of a single scope.

      With miners collecting and dealing with ever-increasing quantities of data and looking for ways to leverage it to make data-driven decisions that enhance risk management and increase profitability, integrated software solutions are – now more than ever – essential in supporting continuous improvement and maintaining data fidelity and data integrity across the entire mining value chain.

      An example of Datamine Isystain An example of Datamine Isystain An example of Datamine Isystain

      Key Features:

      • Discover GIS for geochemical, water, erosion, and vegetation modelling and management.
      • Qmed for workforce health management, COVID testing, and vaccine administration.
      • MineMarket and Reconcilor for traceability and auditing, giving visibility to chain of custody and governance across the value chain, from resource modelling to shipping and sales.
      • Centric Mining Systems – intelligence software for real-time transparency and governance across multiple sites and systems, including key ESG performance indicator reporting.
      • Zyght – a leading health, safety, and environment solution for high-impact industries that specializes in environment, injury, risk management, safe work plans, document management, compliance, and reporting.
      • Isystain – a cloud-based platform uniquely designed to support health, safety & environment, sustainability reporting, compliance and governance, and social investment reporting. Designed for seamless integration within an organization’s existing software ecosystems providing powerful analytics and reporting capabilities to streamline the production of sustainability and performance reporting.

      Vendor spotlight

      A logo of Benchmark ESG

      Benchmark ESG provides industry-leading ESG data management and reporting software that can assist organizations in managing operational risk and compliance, sustainability, product stewardship, and ensuring responsible sourcing across complex global operations.

      An example of Benchmark ESG An example of Benchmark ESG

      Key Features:

      Vendor spotlight

      A logo of PWC

      PwC’s ESG Management Solution provides quick insights into ways to improve reporting transparency surrounding your organization’s ESG commitments.

      According to PwC’s most recent CEO survey, the number one motivator for CEOs in mitigating climate change risks is their own desire to help solve this global problem and drive transparency with stakeholders.
      Source: “Annual Global CEO Survey,” PwC, 2022.

      An example of PWC An example of PWC

      Key Features:

      • Streamlined data mining capabilities. PwC’s ESG solution provides the means to streamline, automate, and standardize the input of sustainability data based on non-financial reporting directive (NFRD) and corporate sustainability reporting directive (CSRD) regulations.
      • Company and product carbon footprint calculation and verification modules.
      • Robust dashboarding capabilities. Option to create custom-tailored sustainability monitoring dashboards or integrate existing ESG data from an application to existing dashboards.
      • Team management functionalities that allow for more accessible cross-departmental communication and collaboration. Ability to check progress on tasks, assign tasks, set automatic notifications/deadlines, etc.

      Vendor spotlight

      A logo of ServiceNow

      ServiceNow ESG Management (ESGM) and reporting platform helps organizations transform the way they manage, visualize, and report on issues across the ESG spectrum.

      The platform automates the data collection process and the organization and storage of information in an easy-to-use system. ServiceNow’s ESGM solution also develops dashboards and reports for internal user groups and ensures that external disclosure reports are aligned with mainstream ESG standards and frameworks.

      We know that doing well as a business is about more than profits. One workflow at a time, we believe we can change the world – to be more sustainable, equitable, and ethical.
      Source: ServiceNow, 2021.

      An example of ServiceNow

      Key Features:

      1. An executive dashboard to help coherently outline the status of various ESG indicators, including material topics, goals, and disclosure policies all in one centralized hub
      2. Status review modules. Ensure that your organization has built-in modules to help them better document and monitor their ESG goals and targets using a single source of truth.
      3. Automated disclosure modules. ESGM helps organizations create more descriptive ESG disclosure reports that align with industry accountability standards (e.g. SASB, GRI, CDP).

      Other key vendors to consider

      An image of other 12 key vendors

      Related Info-Tech Research

      Photo of The ESG Imperative and Its Impact on Organizations

      The ESG Imperative and Its Impact on Organizations

      Use this blueprint to educate yourself on ESG factors and the broader concept of sustainability.

      Identify changes that may be needed in your organizational operating model, strategy, governance, and risk management approach.

      Learn about Info-Tech’s ESG program approach and use it as a framework to begin your ESG program journey.

      Photo of Private Equity and Venture Capital Growing Impact of ESG Report

      Private Equity and Venture Capital Growing Impact of ESG Report

      Increasingly, new capital has a social mandate attached to it due to the rise of ESG investment principles.

      Learn about how the growing impact of ESG affects both your organization and IT specifically, including challenges and opportunities, with expert assistance.

      Definitions

      Terms

      Definition

      Corporate Social Responsibility

      Management concept whereby organizations integrate social and environmental concerns in their operations and interactions with their stakeholders.

      Chief Sustainability Officer

      Steers sustainability commitments, helps with compliance, and helps ensure internal commitments are met. Responsibilities may extend to acting as a liaison with government and public affairs, fostering an internal culture, acting as a change agent, and leading delivery.

      ESG

      An acronym that stands for environment, social, and governance. These are the three components of a sustainability program.

      ESG Standard

      Contains detailed disclosure criteria including performance measures or metrics. Standards provide clear, consistent criteria and specifications for reporting. Typically created through consultation process.

      ESG Framework

      A broad contextual model for information that provides guidance and shapes the understanding of a certain topic. It sets direction but does not typically delve into the methodology. Frameworks are often used in conjunction with standards.

      ESG Factors

      The factors or issues that fall under the three ESG components. Measures the sustainability performance of an organization.

      ESG Rating

      An aggregated score based on the magnitude of an organization’s unmanaged ESG risk. Ratings are provided by third-party rating agencies and are increasingly being used for financing, transparency to investors, etc.

      ESG Questionnaire

      ESG surveys or questionnaires are administered by third parties and used to assess an organization’s sustainability performance. Participation is voluntary.

      Key Risk Indicator (KRI)

      A measure to indicate the potential presence, level, or trend of a risk.

      Key Performance Indicator (KPI)

      A measure of deviation from expected outcomes to help a firm see how it is performing.

      Materiality

      Material topics are topics that have a direct or indirect impact on an organization's ability to create, preserve, or erode economic, environmental, and social impact for itself and its stakeholder and society as a whole.

      Materiality Assessment

      A tool to identify and prioritize the ESG issues most critical to the organization.

      Risk Sensing

      The range of activities carried out to identify and understand evolving sources of risk that could have a significant impact on the organization (e.g. social listening).

      Sustainability

      The ability of an organization and broader society to endure and survive over the long term by managing adverse impacts well and promoting positive opportunities.

      Sustainalytics

      Now part of Morningstar. Sustainalytics provides ESG research, ratings, and data to institutional investors and companies.

      UN Guiding Principles on Business and Human Rights (UNGPs)

      An essential methodological foundation for how impacts across all dimensions should be assessed.

      Reporting and standard frameworks

      Standard

      Definition and focus

      CDP
      (Formally Carbon Disclosure Project)

      CDP has created standards and metrics for comparing sustainability impact. Focuses on environmental data (e.g. carbon, water, and forests) and on data disclosure and benchmarking.

      Audience: All stakeholders

      Dow Jones Sustainability Indices (DJSI)

      Heavy on corporate governance and company performance. Equal balance of economic, environmental, and social.

      Audience: All stakeholders

      Global Reporting Initiative (GRI)

      International standards organization that has a set of standards to help organizations understand and communicate their impacts on climate change and social responsibility. The standard has a strong emphasis on transparency and materiality, especially on social issues.

      Audience: All stakeholders

      International Sustainability Standards Board (ISSB)

      Standard-setting board that sits within the International Financial Reporting Standards (IFRS) Foundation. The IFRS Foundation is a not-for-profit, public-interest organization established to develop high-quality, understandable, enforceable, and globally accepted accounting and sustainability disclosure standards.

      Audience: Investor-focused

      United Nations Sustainable Development Goals (SDGs)

      Global partnership across sectors and industries that sets out 17 goals to achieve sustainable development for all.

      Audience: All stakeholders

      Sustainability Accounting Standards Board (SASB)
      Now part of IFSR foundation

      Industry-specific standards to help corporations select topics that may impact their financial performance. Focus on material impacts on financial condition or operating performance.

      Audience: Investor-focused

      Task Force on Climate-Related Financial Disclosures (TCFD; created by the Financial Stability Board)

      Standards framework focused on the impact of climate risk on financial and operating performance. More broadly the disclosures inform investors of positive and negative measures taken to build climate resilience and make transparent the exposure to climate-related risk.

      Audience: Investors, financial stakeholders

      Bibliography

      "2021 Global Investor Survey: The Economic Realities of ESG." PwC, Dec. 2021. Accessed May 2022.

      "2023 Canadian ESG Reporting Insights." PwC, Nov. 2022. Accessed Dec. 2022.

      Althoff, Judson. "Microsoft Cloud for Sustainability: Empowering Organizations On Their Path To Net Zero." Microsoft Blog, 14 July 2021. Accessed May 2022.

      "Balancing Sustainability and Profitability." IBM, Feb. 2022. Accessed June. 2022.

      "Beyond Compliance: Consumers and Employees Want Business to Do More on ESG." PwC, Nov. 2021. Accessed July 2022.

      Bizo, Daniel. "Multi-Tenant Datacenters and Sustainability: Ambitions and Reality." S&P Market Intelligence, Sept. 2020. Web.

      Bolden, Kyle. "Aligning nonfinancial reporting with your ESG strategy to communicate long-term value." EY, 18 Dec. 2020. Web.

      Carril, Christopher, et al. "Looking at Restaurants Through an ESG Lens: ESG Stratify – Equity Research Report." RBC Capital Markets, 5 Jan. 2021. Accessed Jun. 2022.

      "Celebrating and Advancing Women." McDonald’s, 8 March 2019. Web.

      Clark, Anna. "Get your ESG story straight: A sustainability communication starter kit." GreenBiz, 20 Dec. 2022, Accessed Dec. 2022.

      Courtnell, Jane. “ESG Reporting Framework, Standards, and Requirements.” Corporate Compliance Insights, Sept. 2022. Accessed Dec. 2022.

      “Country Sustainability Ranking. Country Sustainability: Visibly Harmed by Covid-19.” Robeco, Oct. 2021. Accessed June 2022.

      “Defining the “G” in ESG Governance Factors at the Heart of Sustainable Business.” World Economic Forum, June 2022. Web.

      “Digital Assets: Laying ESG Foundations.” Global Digital Finance, Nov. 2021. Accessed April 2022.

      “Dow Jones Sustainability Indices (DJCI) Index Family.” S&P Global Intelligence, n.d. Accessed June 2022.

      "ESG in Your Business: The Edge You Need to Land Large Contracts." BDC, March 2023, Accessed April 2023.

      “ESG Performance and Its Impact on Corporate Reputation.” Intelex Technologies, May 2022. Accessed July 2022.

      “ESG Use Cases. IoT – Real-Time Occupancy Monitoring.” Metrikus, March 2021. Accessed April 2022.

      Fanter, Tom, et al. “The History & Evolution of ESG.” RMB Capital, Dec. 2021. Accessed May 2022.

      Flynn, Hillary, et al. “A guide to ESG materiality assessments.” Wellington Management, June 2022, Accessed September 2022

      “From ‘Disclose’ to ‘Disclose What Matters.’” Global Reporting Initiative, Dec. 2018. Accessed July 2022.

      “Getting Started with ESG.” Sustainalytics, 2022. Web.

      “Global Impact ESG Fact Sheet.” ServiceNow, Dec. 2021. Accessed June 2022.

      Gorley, Adam. “What is ESG and Why It’s Important for Risk Management.” Sustainalytics, March 2022. Accessed May 2022.

      Hall, Lindsey. “You Need Near-Term Accountability to Meet Long-Term Climate Goals.” S&P Global Sustainable1, Oct. 2021. Accessed April 2022.

      Henisz, Witold, et al. “Five Ways That ESG Creates Value.” McKinsey, Nov. 2019. Accessed July 2022.

      “Integrating ESG Factors in the Investment Decision-Making Process of Institutional Investors.” OECD iLibrary, n.d. Accessed July 2022.

      “Investor Survey.” Benchmark ESG, Nov. 2021. Accessed July 2022.

      Jackson, Brian. Tech Trends 2023, Info-Tech Research Group, Dec. 2022, Accessed Dec. 2022.

      Keet, Lior. “What Is the CIO’s Role in the ESG Equation?” EY, 2 Feb. 2022. Accessed May 2022.

      Lev, Helee, “Understanding ESG risks and why they matter” GreenBiz, June 2022. Accessed Dec 2022.

      Marsh, Chris, and Simon Robinson. “ESG and Technology: Impacts and Implications.” S&P Global Market Intelligence, March 2021. Accessed April 2022.

      Martini, A. “Socially Responsible Investing: From the Ethical Origins to the Sustainable Development Framework of the European Union.” Environment, Development and Sustainability, vol. 23, Nov. 2021. Web.

      Maher, Hamid, et al. “AI Is Essential for Solving the Climate Crisis.” Boston Consulting Group, 7 July 2022. Web.

      “Materiality Assessment. Identifying and Taking Action on What Matters Most.” Novartis, n.d. Accessed June. 2022.

      Morrow, Doug, et al. “Understanding ESG Incidents: Key Lessons for Investors.” Sustainalytics, July 2017. Accessed May 2022.

      “Navigating Climate Data Disclosure.” Novisto, July 2022. Accessed Nov. 2022.

      Nuttall, Robin, et al. “Why ESG Scores Are Here to Stay.” McKinsey & Company, May 2020. Accessed July 2022.

      “Opportunities in Sustainability – 451 Research’s Analysis of Sustainability Perspectives in the Data Center Industry.” Schneider Electric, Sept. 2020. Accessed May 2022.

      Peterson, Richard. “How Can NLP Be Used to Quantify ESG Analytics?” Refinitiv, Feb. 2021. Accessed June 2022.

      “PwC’s 25th Annual Global CEO Survey: Reimagining the Outcomes That Matter.” PwC, Jan. 2022. Accessed June 2022.

      “SEC Proposes Rules on Cybersecurity, Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies.” Securities and Exchange Commission, 9 May 2022. Press release.

      Serafeim, George. “Social-Impact Efforts That Create Real Value.” Harvard Business Review, Sept. 2020. Accessed May 2022.

      Sherrie, Gonzalez. “ESG Planning and Performance Survey.” Diligent, 24 Sept. 2021. Accessed July 2022.

      “Special Reports Showcase, Special Report: Mid-Year Report on Proposed SEC Rule 14-8 Change.” Sustainable Investments Institute, July 2020. Accessed April 2022.

      “State of European Tech. Executive Summary Report.” Atomico, Nov. 2021. Accessed June 2022.

      “Top Challenges in ESG Reporting, and How ESG Management Solution Can Help.” Novisto, Sept. 2022. Accessed Nov. 2022.

      Vaughan-Smith, Gary. “Navigating ESG data sets and ‘scores’.” Silverstreet Capital, 23 March 2022. Accessed Dec. 2022.

      Waters, Lorraine. “ESG is not an environmental issue, it’s a data one.” The Stack, 20 May 2021. Web.

      Wells, Todd. “Why ESG, and Why Now? New Data Reveals How Companies Can Meet ESG Demands – And Innovate Supply Chain Management.” Diginomica, April 2022. Accessed July 2022.

      “XBRL is coming to corporate sustainability Reporting.” Novisto, Aug. 2022. Accessed Dec. 2022.

      Research Contributors and Experts

      Photo of Chris Parry

      Chris Parry
      VP of ESG, Datamine

      Chris Parry has recently been appointed as the VP of ESG at Datamine Software. Datamine’s dedicated ESG division provides specialized ESG technology for sustainability management by supporting key business processes necessary to drive sustainable outcomes.

      Chris has 15 years of experience building and developing business for enterprise applications and solutions in both domestic and international markets.

      Chris has a true passion for business-led sustainable development and is focused on helping organizations achieve their sustainable business outcomes through business transformation and digital software solutions.

      Datamine’s comprehensive ESG capability supports ESG issues such as the environment, occupational health and safety, and medical health and wellbeing. The tool assists with risk management, stakeholder management and business intelligence.

      Leverage Big Data by Starting Small

      • Buy Link or Shortcode: {j2store}201|cart{/j2store}
      • member rating overall impact: 7.0/10 Overall Impact
      • member rating average dollars saved: 3 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Big Data
      • Parent Category Link: /big-data
      • The desire for rapid decision making is increasing and the complexity of data sources is growing; business users want access to several new data sources, but in a way that is controlled and easily consumable.
      • Organizations may understand the transformative potential of a big data initiative, but struggle to make the transition from the awareness of its importance to identifying a concrete use case for a pilot project.
      • The big data ecosystem is crowded and confusing, and a lack of understanding of that ecosystem may cause a paralysis for organizations.

      Our Advice

      Critical Insight

      • Big data is simply data. With technological advances, what was once considered big data is now more approachable for all organizations irrespective of size.
      • The variety element is the key to unlocking big data value. Drill down into your specific use cases more effectively by focusing on what kind of data you should use.
      • Big data is about deep analytics. Deep doesn’t mean difficult. Visualization of data, integrating new data, and understanding associations are ways to deepen your analytics.

      Impact and Result

      • Establish a foundational understanding of what big data entails and what the implications of its different elements are for your organization.
      • Confirm your current maturity for taking on a big data initiative, and make considerations for core data management practices in the context of incorporating big data.
      • Avoid boiling the ocean by pinpointing use cases by industry and functional unit, followed by identifying the most essential data sources and elements that will enable the initiative.
      • Leverage a repeatable pilot project framework to build out a successful first initiative and implement future projects en-route to evolving a big data program.

      Leverage Big Data by Starting Small Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should leverage big data, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Undergo big data education

      Build a foundational understanding of the current big data landscape.

      • Leverage Big Data by Starting Small – Phase 1: Undergo Big Data Education

      2. Assess big data readiness

      Appraise current capabilities for handling a big data initiative and revisit the key data management practices that will enable big data success.

      • Leverage Big Data by Starting Small – Phase 2: Assess Big Data Readiness
      • Big Data Maturity Assessment Tool

      3. Pinpoint a killer big data use case

      Armed with Info-Tech’s variety dimension framework, identify the top use cases and the data sources/elements that will power the initiative.

      • Leverage Big Data by Starting Small – Phase 3: Pinpoint a Killer Big Data Use Case
      • Big Data Use-Case Suggestion Tool

      4. Structure a big data proof-of-concept project

      Leverage a repeatable framework to detail the core components of the pilot project.

      • Leverage Big Data by Starting Small – Phase 4: Structure a Big Data Proof-of-Concept Project
      • Big Data Work Breakdown Structure Template
      • Data Scientist
      • Big Data Cost/Benefit Tool
      • Big Data Stakeholder Presentation Template
      • Big Data Communication Tracking Template
      [infographic]

      Workshop: Leverage Big Data by Starting Small

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Undergo Big Data Education

      The Purpose

      Understand the basic elements of big data and its relationship to traditional business intelligence.

      Key Benefits Achieved

      Common, foundational knowledge of what big data entails.

      Activities

      1.1 Determine which of the four Vs is most important to your organization.

      1.2 Explore new data through a social lens.

      1.3 Brainstorm new opportunities for enhancing current reporting assets with big data sources.

      Outputs

      Relative importance of the four Vs from IT and business perspectives

      High-level improvement ideas to report artifacts using new data sources

      2 Assess Your Big Data Readiness

      The Purpose

      Establish an understanding of current maturity for taking on big data, as well as revisiting essential data management practices.

      Key Benefits Achieved

      Concrete idea of current capabilities.

      Recommended actions for developing big data maturity.

      Activities

      2.1 Determine your organization’s current big data maturity level.

      2.2 Plan for big data management.

      Outputs

      Established current state maturity

      Foundational understanding of data management practices in the context of a big data initiative

      3 Pinpoint Your Killer Big Data Use Case

      The Purpose

      Explore a plethora of potential use cases at the industry and business unit level, followed by using the variety element of big data to identify the highest value initiative(s) within your organization.

      Key Benefits Achieved

      In-depth characterization of a pilot big data initiative that is thoroughly informed by the business context.

      Activities

      3.1 Identify big data use cases at the industry and/or departmental levels.

      3.2 Conduct big data brainstorming sessions in collaboration with business stakeholders to refine use cases.

      3.3 Revisit the variety dimension framework to scope your big data initiative in further detail.

      3.4 Create an organizational 4-column data flow model with your big data sources/elements.

      3.5 Evaluate data sources by considering business value and risk.

      3.6 Perform a value-effort assessment to prioritize your initiatives.

      Outputs

      Potential big data use cases

      Potential initiatives rooted in the business context and identification of valuable data sources

      Identification of specific data sources and data elements

      Characterization of data sources/elements by value and risk

      Prioritization of big data use cases

      4 Structure a Big Data Proof-of-Concept Project

      The Purpose

      Put together the core components of the pilot project and set the stage for enterprise-wide support.

      Key Benefits Achieved

      A repeatable framework for implementing subsequent big data initiatives.

      Activities

      4.1 Construct a work breakdown structure for the pilot project.

      4.2 Determine your project’s need for a data scientist.

      4.3 Establish the staffing model for your pilot project.

      4.4 Perform a detailed cost/benefit analysis.

      4.5 Make architectural considerations for supporting the big data initiative.

      Outputs

      Comprehensive list of tasks for implementing the pilot project

      Decision on whether or not a data scientist is needed, and where data science capabilities will be sourced

      RACI chart for the project

      Big data pilot cost/benefit summary

      Customized, high-level architectural model that incorporates technologies that support big data

      Prepare Your Application for PaaS

      • Buy Link or Shortcode: {j2store}181|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • The application may have been written a long time ago, and have source code, knowledge base, or design principles misplaced or lacking, which makes it difficult to understand the design and build.
      • The development team does not have a standardized practice for assessing cloud benefits and architecture, design principles for redesigning an application, or performing capacity for planning activities.

      Our Advice

      Critical Insight

      • An infrastructure-driven cloud strategy overlooks application specific complexities. Ensure that an application portfolio strategy is a precursor to determining the business value gained from an application perspective, not just an infrastructure perspective.
      • Business value assessment must be the core of your decision to migrate and justify the development effort.
      • Right-size your application to predict future usage and minimize unplanned expenses. This ensures that you are truly benefiting from the tier costing model that vendors offer.

      Impact and Result

      • Identify and evaluate what cloud benefits your application can leverage and the business value generated as a result of migrating your application to the cloud.
      • Use Info-Tech’s approach to building a robust application that can leverage scalability, availability, and performance benefits while maintaining the functions and features that the application currently supports for the business.
      • Standardize and strengthen your performance testing practices and capacity planning activities to build a strong current state assessment.
      • Use Info-Tech’s elaboration of the 12-factor app to build a clear and robust cloud profile and target state for your application.
      • Leverage Info-Tech’s cloud requirements model to assess the impact of cloud on different requirements patterns.

      Prepare Your Application for PaaS Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a right-sized, design-driven approach to moving your application to a PaaS platform, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Prepare Your Application for PaaS – Phases 1-2

      1. Create your cloud application profile

      Bring the business into the room, align your objectives for choosing certain cloud capabilities, and characterize your ideal PaaS environment as a result of your understanding of what the business is trying to achieve. Understand how to right-size your application in the cloud to maintain or improve its performance.

      • Prepare Your Application for PaaS – Phase 1: Create Your Cloud Application Profile
      • Cloud Profile Tool

      2. Evaluate design changes for your application

      Assess the application against Info-Tech’s design scorecard to evaluate the right design approach to migrating the application to PaaS. Pick the appropriate cloud path and begin the first step to migrating your app – gathering your requirements.

      • Prepare Your Application for PaaS – Phase 2: Evaluate Design Changes for Your Application
      • Cloud Design Scorecard Tool

      [infographic]

       
       

      Make IT a Successful Partner in M&A Integration

      • Buy Link or Shortcode: {j2store}79|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy
      • Many organizations forget the essential role IT plays during M&A integration. IT is often unaware of a merger or acquisition until the deal is announced, making it very difficult to adequately interpret business goals and appropriately assess the target organization.
      • IT-related integration activities are amongst the largest cost items in an M&A, yet these costs are often overlooked or underestimated during due diligence.
      • IT is expected to use the M&A team’s IT due diligence report and estimated IT integration budget, which may not have been generated appropriately.
      • IT involvement in integration is critical to providing a better view of risks, improving the ease of integration, and optimizing synergies.

      Our Advice

      Critical Insight

      • Anticipate that you are going to be under pressure. Fulfill short-term, tactical operational imperatives while simultaneously conducting discovery and designing the technology end-state.
      • To migrate risks and guide discovery, select a high-level IT integration posture that aligns with business objectives.

      Impact and Result

      • Once a deal has been announced, use this blueprint to set out immediately to understand business M&A goals and expected synergies.
      • Assemble an IT Integration Program to conduct discovery and begin designing the technology end-state, while simultaneously identifying and delivering operational imperatives and quick-wins as soon as possible.
      • Following discovery, use this blueprint to build initiatives and put together an IT integration budget. The IT Integration Program has an obligation to explain the IT cost implications of the M&A to the business.
      • Once you have a clear understanding of the cost of your IT integration, use this blueprint to build a long-term action plan to achieve the planned technology end-state that best supports the business capabilities of the organization.

      Make IT a Successful Partner in M&A Integration Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should follow Info-Tech’s M&A IT integration methodology and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch the project

      Define the business’s M&A goals, assemble an IT Integration Program, and select an IT integration posture that aligns with business M&A strategy.

      • Make IT a Successful Partner in M&A Integration – Phase 1: Launch the Project
      • IT Integration Charter

      2. Conduct discovery and design the technology end-state

      Refine the current state of each IT domain in both organizations, and then design the end-state of each domain.

      • Make IT a Successful Partner in M&A Integration – Phase 2: Conduct Discovery and Design the Technology End-State
      • IT Integration Roadmap Tool

      3. Initiate operational imperatives and quick-wins

      Generate tactical operational imperatives and quick-wins, and then develop an interim action plan to maintain business function and capture synergies.

      • Make IT a Successful Partner in M&A Integration – Phase 3: Initiate Operational Imperatives and Quick-Wins

      4. Develop an integration roadmap

      Generate initiatives and put together a long-term action plan to achieve the planned technology end-state.

      • Make IT a Successful Partner in M&A Integration – Phase 4: Develop an Integration Roadmap
      [infographic]

      Workshop: Make IT a Successful Partner in M&A Integration

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Launch the Project

      The Purpose

      Identification of staffing and skill set needed to manage the IT integration.

      Generation of an integration communication plan to highlight communication schedule during major integration events.

      Identification of business goals and objectives to select an IT Integration Posture that aligns with business strategy.

      Key Benefits Achieved

      Defined IT integration roles & responsibilities.

      Structured communication plan for key IT integration milestones.

      Creation of the IT Integration Program.

      Generation of an IT Integration Posture.

      Activities

      1.1 Define IT Integration Program responsibilities.

      1.2 Build an integration communication plan.

      1.3 Host interviews with senior management.

      1.4 Select a technology end-state and IT integration posture.

      Outputs

      Define IT Integration Program responsibilities and goals

      Structured communication plan

      Customized interview guide for each major stakeholder

      Selected technology end-state and IT integration posture

      2 Conduct Discovery and Design the Technology End-State

      The Purpose

      Identification of information sources to begin conducting discovery.

      Definition of scope of information that must be collected about target organization.

      Definition of scope of information that must be collected about your own organization.

      Refinement of the technology end-state for each IT domain of the new entity. 

      Key Benefits Achieved

      A collection of necessary information to design the technology end-state of each IT domain.

      Adequate information to make accurate cost estimates.

      A designed end-state for each IT domain.

      A collection of necessary, available information to make accurate cost estimates. 

      Activities

      2.1 Define discovery scope.

      2.2 Review the data room and conduct onsite discovery.

      2.3 Design the technology end-state for each IT domain.

      2.4 Select the integration strategy for each IT domain.

      Outputs

      Tone set for discovery

      Key information collected for each IT domain

      Refined end-state for each IT domain

      Refined integration strategy for each IT domain

      3 Initiate Tactical Initiatives and Develop an Integration Roadmap

      The Purpose

      Generation of tactical initiatives that are operationally imperative and will help build business credibility.

      Prioritization and execution of tactical initiatives.

      Confirmation of integration strategy for each IT domain and generation of initiatives to achieve technology end-states.

      Prioritization and execution of integration roadmap.

      Key Benefits Achieved

      Tactical initiatives generated and executed.

      Confirmed integration posture for each IT domain.

      Initiatives generated and executed upon to achieve the technology end-state of each IT domain. 

      Activities

      3.1 Build quick-win and operational imperatives.

      3.2 Build a tactical action plan and execute.

      3.3 Build initiatives to close gaps and redundancies.

      3.4 Finalize your roadmap and kick-start integration.

      Outputs

      Tactical roadmap to fulfill short-term M&A objectives and synergies

      Confirmed IT integration strategies

      Finalized integration roadmap

      Annual CIO Survey Report 2024

      • Buy Link or Shortcode: {j2store}106|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      CIOs today face increasing pressures, disruptive emerging technologies, talent shortages, and a slew of other challenges. What are their top concerns, priorities, and technology bets that will define the future direction of IT?

      CIO responses to our Future of IT 2024 survey reveal key insights on spending projects, the potential disruptions causing the most concern, plans for adopting emerging technology, and how firms are responding to generative AI.

      See how CIOs are sizing up the opportunities and threats of the year ahead

      Map your organization’s response to the external environment compared to CIOs across geographies and industries. Learn:

      • The CIO view on continuing concerns such as cybersecurity.
      • Where they rate their IT department’s maturity.
      • What their biggest concerns and budget increases are.
      • How they’re approaching third-party generative AI tools.

      Annual CIO Survey Report 2024 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Future of IT Survey 2024 – A summary of key insights from the CIO responses to our Future of IT 2024 survey.

      Take the pulse of the IT industry and see how CIOs are planning to approach 2024.

      • Annual CIO Survey Report for 2024
      [infographic]

      Further reading

      Annual CIO Survey Report 2024

      An inaugural look at what's on the minds of CIOs.

      1. Firmographics

      • Region
      • Title
      • Organization Size
      • IT Budget Size
      • Industry

      Firmographics

      The majority of CIO responses came from North America. Contributors represent regions from around the world.

      Countries / Regions Response %
      United States 47.18%
      Canada 11.86%
      Australia 9.60%
      Africa 6.50%
      China 0.28%
      Germany 1.13%
      United Kingdom 5.37%
      India 1.41%
      Brazil 1.98%
      Mexico 0.56%
      Middle East 4.80%
      Asia 0.28%
      Other country in Europe 4.52%

      n=354

      Firmographics

      A typical CIO respondent held a C-level position at a small to mid-sized organization.

      Half of CIOs hold a C-level position, 10% are VP-level, and 20% are director level

      Pie Chart of CIO positions

      38% of respondents are from an organization with above 1,000 employees

      Pie chart of size of organizations

      Firmographics

      A typical CIO respondent held a C-level position at a small to mid-sized organization.

      40% of CIOs report an annual budget of more than $10 million

      Pie chart of CIO annual budget

      A range of industries are represented, with 29% of respondents in the public sector or financial services

      Range of industries

      2. Key Factors

      • IT Maturity
      • Disruptive Factors
      • IT Spending Plans
      • Talent Shortage

      Two in three respondents say IT can deliver outcomes that Support or Optimize the business

      IT drives outcomes

      Most CIOs are concerned with cybersecurity disruptions, and one in four expect a budget increase of above 10%

      How likely is it that the following factors will disrupt your business in the next 12 months?

      Chart for factors that will disrupt your business

      Looking ahead to 2024, how will your organization's IT spending change compared to spending in 2023?

      Chart of IT spending change

      3. Adoption of Emerging Technology

      • Fastest growing tech for 2024 and beyond

      CIOs plan the most new spend on AI in 2024 and on mixed reality after 2024

      Top five technologies for new spending planned in 2024:

      1. Artificial intelligence - 35%
      2. Robotic process automation or intelligent process automation - 24%
      3. No-code/low-code platforms - 21%
      4. Data management solutions - 14%
      5. Internet of Things (IoT) - 13%

      Top five technologies for new spending planned after 2024:

      1. Mixed reality - 20%
      2. Blockchain - 19%
      3. Internet of Things (IoT) - 17%
      4. Robotics/drones - 16%
      5. Robotic process automation or intelligent process automation - 14%

      n=301

      Info-Tech Insight
      Three in four CIOs say they have no plans to invest in quantum computing, more than any other technology with no spending plans.

      4. Adoption of AI

      • Interest in generative AI applications
      • Tasks to be completed with AI
      • Progress in deploying AI

      CIOs are most interested in industry-specific generative AI applications or text-based

      Rate your business interest in adopting the following generative AI applications:

      Chart for interest in AI

      There is interest across all types of generative AI applications. CIOs are least interested in visual media generators, rating it just 2.4 out of 5 on average.

      n=251

      Info-Tech Insight
      Examples of generative AI solutions specific to the legal industry include Litigate, CoCounsel, and Harvey.

      By the end of 2024, CIOs most often plan to use AI for analytics and repetitive tasks

      Most popular use cases for AI by end of 2024:

      1. Business analytics or intelligence - 69%
      2. Automate repetitive, low-level tasks - 68%
      3. Identify risks and improve security - 66%
      4. IT operations - 62%
      5. Conversational AI or virtual assistants - 57%

      Fastest growing uses cases for AI in 2024:

      1. Automate repetitive, low-level tasks - 39%
      2. IT operations - 38%
      3. Conversational AI or virtual assistants - 36%
      4. Business analytics or intelligence - 35%
      5. Identify risks and improve security - 32%

      n=218

      Info-Tech Insight
      The least popular use case for AI is to help define business strategy, with 45% saying they have no plans for it.

      One in three CIOs are running AI pilots or are more advanced with deployment

      How far have you progressed in the use of AI?

      Chart of progress in use of AI

      Info-Tech Insight
      Almost half of CIOs say ChatGPT has been a catalyst for their business to adopt new AI initiatives.

      5. AI Risk

      • Perceived impact of AI
      • Approach to third-party AI tools
      • AI features in business applications
      • AI governance and accountability

      Six in ten CIOs say AI will have a positive impact on their organization

      What overall impact do you expect AI to have on your organization?

      Overall impact of AI on organization

      The majority of CIOs are waiting for professional-grade generative AI tools

      Which of the following best describes your organization's approach to third-party generative AI tools (such as ChatGPT or Midjourney)?

      Third-party generative AI

      Info-Tech Insight
      Business concerns over intellectual property and sensitive data exposure led OpenAI to announce ChatGPT won't use data submitted via its API for model training unless customers opt in to do so. ChatGPT users can also disable chat history to avoid having their data used for model training (OpenAI).

      One in three CIOs say they are accountable for AI, and the majority are exploring it cautiously

      Who in your organization is accountable for governance of AI?

      Governance of AI

      More than one-third of CIOs say no AI governance steps are in place today

      What AI governance steps does your organization have in place today?

      Chart of AI governance steps

      Among organizations that plan to invest in AI in 2024, 30% still say there are no steps in place for AI governance. The most popular steps to take are to publish clear explanations about how AI is used, and to conduct impact assessments (n=170).

      Chart of AI governance steps

      Among all CIOs, including those that do not plan to invest in AI next year, 37% say no steps are being taken toward AI governance today (n=243).

      6. Contribute to Info-Tech's Research Community

      • Volunteer to be interviewed
      • Attend LIVE in Las Vegas

      It's not too late; take the Future of IT online survey

      Contribute to our tech trends insights

      If you haven't already contributed to our Future of IT online survey, we are keeping the survey open to continue to collect insights and inform our research reports and agenda planning process. You can take the survey today. Those that complete the survey will be sent a complimentary Tech Trends 2024 report.

      Complete an interview for the Future of IT research project

      Help us chart the future course of IT

      If you are receiving this for completing the Future of IT online survey, thank you for your contribution. If you are interested in further participation and would like to provide a complementary interview, please get in touch at brian.Jackson@infotech.com. All interview subjects must also complete the online survey.

      If you've already completed an interview, thank you very much, and you can look forward to seeing more impacts of your contribution in the near future.

      LIVE 2023

      Methodology

      All data in this report is from Info-Tech's Future of IT online survey 2023 edition.

      A CIO focus for the Future of IT

      Data in this report represents respondents to the Future of IT online survey conducted by Info-Tech Research Group between May 11 and July 7, 2023.

      Only CIO respondents were selected for this report, defined as those who indicated they are the most senior member of their organization's IT department.

      This data segment reflects 355 total responses with 239 completing every question on the survey.

      Further data from the Future of IT online survey and the accompanying interview process will be featured in Info-Tech's Tech Trends 2024 report this fall and in forthcoming Priorities reports including Applications, Data & EA, CIO, Infrastructure, and Security.

      Select a Security Outsourcing Partner

      • Buy Link or Shortcode: {j2store}246|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $13,739 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations
      • Most organizations do not have a clear understanding of their current security posture, their security goals, and the specific security services they require. Without a clear understanding of their needs, organizations may struggle to identify a partner that can meet their requirements.
      • Breakdowns and lack of communication can be a significant obstacle, especially when clear lines of communication with partners, including regular check-ins, reporting, and incident response protocols, have not been clearly established.
      • Ensuring that security partners’ systems and processes integrate seamlessly with existing systems can be a challenge for most organizations in addition to making sure that security partners have the necessary access and permissions to perform their services effectively.
      • Adhering to security policies is rarely a priority to users as compliance often feels like an interference to daily workflow. For a lot of organizations, security policies are not having the desired effect.

      Our Advice

      Critical Insight

      • You can outsource your responsibilities but not your accountability.
      • Be aware that in most cases, the traditional approach is more profitable to MSSPs, and they may push you toward one, so make sure you get the service you want, not what they prescribe.

      Impact and Result

      • Determine which security responsibilities can be outsourced and which should be insourced and the right procedure to outsourcing to gain cost savings, improve resource allocation, and boost your overall security posture.

      Select a Security Outsourcing Partner Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Select a Security Outsourcing Partner Storyboard – A guide to help you determine your requirements and select and manage your security outsourcing partner.

      Our systematic approach will ensure that the correct procedure for selecting a security outsourcing partner is implemented. This blueprint will help you build and implement your security policy program by following our three-phase methodology: determine what to outsource, select the right MSSP, and manage your MSSP.

      • Select a Security Outsourcing Partner – Phases 1-3

      2. MSSP RFP Template – A customizable template to help you choose the right security service provider.

      This modifiable template is designed to introduce consistency and outline key requirements during the request for proposal phase of selecting an MSSP.

      • MSSP RFP Template

      Infographic

      Further reading

      Select a Security Outsourcing Partner

      Outsource the right functions to secure your business.

      Analyst Perspective

      Understanding your security needs and remaining accountable is the key to selecting the right partner.

      The need for specialized security services is fast becoming a necessity to most organizations. However, resource challenges will always mean that organizations will still have to take practical measures to ensure that the time, quality, and service that they require from outsourcing partners have been carefully crafted and packaged to elicit the right services that cover all their needs and requirements.

      Organizations must ensure that security partners are aligned not only with their needs and requirements, but also with the corporate culture. Rather than introducing hindrances to daily operations, security partners must support business goals and protect the organization’s interests at all times.

      And as always, outsource only your responsibilities and do not outsource your accountability, as that will cost you in the long run.

      Photo of Danny Hammond
      Danny Hammond
      Research Analyst
      Security, Risk, Privacy & Compliance Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      A lack of high-skill labor increases the cost of internal security, making outsourcing more appealing.

      A lack of time and resources prevents your organization from being able to enable security internally.

      Due to a lack of key information on the subject, you are unsure which functions should be outsourced versus which functions should remain in-house.

      Having 24/7/365 monitoring in-house is not feasible for most firms.

      There is difficulty measuring the effectiveness of managed security service providers (MSSPs).

      Common Obstacles

      InfoSec leaders will struggle to select the right outsourcing partner without knowing what the organization needs, such as:

      • How to start the process to select the right service provider that will cover your security needs. With so many service providers and technology tools in this field, who is the right partner?
      • Where to obtain guidance on externalization of resources or maintaining internal posture to enable to you confidently select an outsourcing partner.

      InfoSec leaders must understand the business environment and their own internal security needs before they can select an outsourcing partner that fits.

      Info-Tech’s Approach

      Info-Tech’s Select a Security Outsourcing Partner takes a multi-faceted approach to the problem that incorporates foundational technical elements, compliance considerations, and supporting processes:

      • Determine which security responsibilities can be insourced and which should be outsourced, and the right procedure to outsourcing in order to gain cost savings, improve resource allocation, and boost your overall security posture.
      • Understand the current landscape of MSSPs that are available today and the features they offer.
      • Highlight the future financial obligations of outsourcing vs. insourcing to explain which method is the most cost-effective.

      Info-Tech Insight

      Mitigate security risks by developing an end-to-end process that ensures you are outsourcing your responsibilities and not your accountability.

      Your Challenge

      This research is designed to help organizations select an effective security outsourcing partner.

      • A security outsourcing partner is a third-party service provider that offers security services on a contractual basis depending on client needs and requirements.
      • An effective outsourcing partner can help an organization improve its security posture by providing access to more specialized security experts, tools, and technologies.
      • One of the main challenges with selecting a security outsourcing partner is finding a partner that is a good fit for the organization's unique security needs and requirements.
      • Security outsourcing partners typically have access to sensitive information and systems, so proper controls and safeguards must be in place to protect all sensitive assets.
      • Without careful evaluation and due diligence to ensure that the partner is a good fit for the organization's security needs and requirements, it can be challenging to select an outsourcing partner.

      Outsourcing is effective, but only if done right

      • 83% of decision makers with in-house cybersecurity teams are considering outsourcing to an MSP (Syntax, 2021).
      • 77% of IT leaders said cyberattacks were more frequent (Syntax, 2021).
      • 51% of businesses suffered a data breach caused by a third party (Ponemon, 2021).

      Common Obstacles

      The problem with selecting an outsourcing partner isn’t a lack of qualified partners, it’s the lack of clarity about an organization's specific security needs.

      • Most organizations do not have a clear understanding of their current security posture, their security goals, and the specific security services they require. Without a clear understanding of their needs, organizations may struggle to identify a partner that can meet their requirements.
      • Breakdowns and lack of communication can be a significant obstacle, especially when clear lines of communication with partners, including regular check-ins, reporting, and incident response protocols, have not been clearly established.
      • Ensuring that security partner's systems and processes integrate seamlessly with existing systems can be a challenge for most organizations. This is in addition to making sure that security partners have the necessary access and permissions to perform their services effectively.
      • Adhering to security policies is rarely a priority to users, as compliance often feels like an interference to daily workflow. For a lot of organizations, security policies are not having the desired effect.

      A diagram that shows Average cost of a data breach from 2019 to 2022.
      Source: IBM, 2022 Cost of a Data Breach; N=537.


      Reaching an all-time high, the cost of a data breach averaged US$4.35 million in 2022. This figure represents a 2.6% increase from 2021, when the average cost of a breach was US$4.24 million. The average cost has climbed 12.7% since 2020.

      Info-Tech’s methodology for selecting a security outsourcing partner

      Determine your responsibilities

      Determine what responsibilities you can outsource to a service partner. Analyze which responsibilities you should outsource versus keep in-house? Do you require a service partner based on identified responsibilities?

      Scope your requirements

      Refine the list of role-based requirements, variables, and features you will require. Use a well-known list of critical security controls as a framework to determine these activities and send out RFPs to pick the best candidate for your organization.

      Manage your outsourcing program

      Adopt a program to manage your third-party service security outsourcing. Trust your managed security service providers (MSSP) but verify their results to ensure you get the service level you were promised.

      Select a Security Outsourcing Partner

      A diagram that shows your organization responsibilities & accountabilities, framework for selecting a security outsourcing partner, and benefits.

      Blueprint benefits

      IT/InfoSec Benefits

      Reduces complexity within the MSSP selection process by highlighting all the key steps to a successful selection program.

      Introduces a roadmap to clearly educate about the do’s and don’ts of MSSP selection.

      Reduces costs and efforts related to managing MSSPs and other security partners.

      Business Benefits

      Assists with selecting outsourcing partners that are essential to your organization’s objectives.

      Integrates outsourcing into corporate culture, leveraging organizational requirements while maximizing value of outsourcing.

      Reduces security outsourcing risk.

      Insight summary

      Overarching insight: You can outsource your responsibilities but not your accountability.

      Determine what to outsource: Assess your responsibilities to determine which ones you can outsource. It is vital that an understanding of how outsourcing will affect the organization, and what cost savings, if any, to expect from outsourcing is clear in order to generate a list of responsibilities that can/should be outsourced.

      Select the right partner: Create a list of variables to evaluate the MSSPs and determine which features are important to you. Evaluate all potential MSSPs and determine which one is right for your organization

      Manage your MSSP: Align the MSSP to your organization. Adopt a program to monitor the MSSP which includes a long-term strategy to manage the MSSP.

      Identifying security needs and requirements = Effective outsourcing program: Understanding your own security needs and requirements is key. Ensure your RFP covers the entire scope of your requirements; work with your identified partner on updates and adaptation, where necessary; and always monitor alignment to business objectives.

      Measure the value of this blueprint

      Phase

      Purpose

      Measured Value

      Determine what to outsource Understand the value in outsourcing and determining what responsibilities can be outsourced. Cost of determining what you can/should outsource:
      • 120 FTE hours at $90K per year = $5,400
      Cost of determining the savings from outsourcing vs. insourcing:
      • 120 FTE hours at $90K per year = $5,400
      Select the right partner Select an outsourcing partner that will have the right skill set and solution to identified requirements. Cost of ranking and selecting your MSSPs:
      • 160 FTE hours at $90K per year = $7,200
      Cost of creating and distributing RFPs:
      • 200 FTE hours at $90K per year = $9,000
      Manage your third-party service security outsourcing Use Info-Tech’s methodology and best practices to manage the MSSP to get the best value. Cost of creating and implementing a metrics program to manage the MSSP:
      • 80 FTE hours at $90K per year = $3,600

      After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

      Overall Impact: 8.9 /10

      Overall Average Cost Saved: $22,950

      Overall Average Days Saved: 9

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation
      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop
      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting
      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Identify and Reduce Agile Contract Risk

      • Buy Link or Shortcode: {j2store}232|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Customer maturity levels with Agile are low, with 67% of organizations using Agile for less than five years.
      • Customer competency levels with Agile are also low, with 84% of organizations stating they are below a high level of competency.
      • Contract disputes are the number one or two types of disputes faced by organizations across all industries.

      Our Advice

      Critical Insight

      • Agile contracts require different wording and protections than traditional or waterfall contracts.
      • Agile buzzwords by themselves do not create an Agile contract.
      • There is a delicate balance between being overly prescriptive in an Agile contract and too lax.

      Impact and Result

      • Identify options for Agile contract provisions.
      • Manage Agile contract risk by selecting the appropriate level of protections for an Agile project.
      • Harness the power of Agile development and collaboration with the vendor while preserving contractual flexibility.
      • Focus on the correct contract clauses to manage Agile risk.

      Identify and Reduce Agile Contract Risk Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should treat Agile contracts differently from traditional or waterfall contracts, and review Info-Tech’s methodology, and understand the twelve contract clauses that are different for Agile contracts.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and evaluate options

      Use the information in this blueprint and Info-Tech’s Agile Contract Playbook-Checklist to review and assess your Agile contracts, ensuring that the provisions and protections are suitable for Agile contracts specifically.

      • Agile Contracts Playbook-Checklist
      [infographic]

      Workshop: Identify and Reduce Agile Contract Risk

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify and Evaluate Options

      The Purpose

      To understand Agile-specific contract clauses, to improve risk identification, and to be more effective at negotiating Agile contract terms.

      Key Benefits Achieved

      Increased awareness of how Agile contract provisions are different from traditional or waterfall contracts in 12 key areas.

      Understanding available options.

      Understanding the impact of being too prescriptive.

      Activities

      1.1 Review the Agile Contract Playbook-Checklist.

      1.2 Review 12 contract provisions and reinforce key learnings with exercises.

      Outputs

      Configured Playbook-Checklist as applicable

      Exercise results and debrief

      Service Management

      • Buy Link or Shortcode: {j2store}46|cart{/j2store}
      • Related Products: {j2store}46|crosssells{/j2store}
      • Parent Category Name: Service Planning and Architecture
      • Parent Category Link: /service-planning-and-architecture

      The challenge

      • We have good, holistic practices, but inconsistent adoption leads to chaotic service delivery and low customer satisfaction.
      • You may have designed your IT services with little structure, formalization, or standardization.
      • That makes the management of these services more difficult and also leads to low business satisfaction.

      Continue reading

      Identify and Manage Financial Risk Impacts on Your Organization

      • Buy Link or Shortcode: {j2store}218|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • As vendors become more prevalent in organizations, organizations increasingly need to understand and manage the potential financial impacts of vendors’ actions.
      • It is only a matter of time until a vendor mistake impacts your organization. Make sure you are prepared to manage the adverse financial consequences.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential financial impact requires multiple people in the organization across several functions – and those people all need educating on the potential risks.
      • Organizational leadership is often unaware of decisions on organizational risk appetite and tolerance, and they assume there are more protections in place against risk impact than there truly are.

      Impact and Result

      • Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

      Identify and Manage Financial Risk Impacts on Your Organization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Manage Financial Risk Impact on Your Organization Deck – Use the research to better understand the negative financial impacts of vendor actions.

      Use this research to identify and quantify the potential financial impacts of vendors’ poor performance. Use Info-Tech’s approach to look at the financial impact from various perspectives to better prepare for issues that may arise.

      • Identify and Manage Financial Risk Impacts on Your Organization Storyboard

      2. “What If” Financial Risk Impact Tool – Use this tool to help identify and quantify the financial impacts of negative vendor actions.

      By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Financial Risk Impact Tool
      [infographic]

      Further reading

      Identify and Manage Financial Risk Impacts on Your Organization

      Good vendor management practices help organizations understand the costs of negative vendor actions.

      Analyst Perspective

      Vendor actions can have significant financial consequences for your organization.

      Photo of Frank Sewell, Research Director, Vendor Management, Info-Tech Research Group.

      Vendors are becoming more influential and essential to the operation of organizations. Often the sole risk consideration of a business is whether the vendor meets a security standard, but vendors can negatively impact organizations’ budgets in various ways. Fortunately, though inherent risk is always present, organizations can offset the financial impacts of high-risk vendors by employing due diligence in their vendor management practices to help manage the overall risks.

      Frank Sewell
      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      As vendors become more prevalent in organizations, organizations increasingly need to understand and manage the potential financial impacts of vendors’ actions.

      It is only a matter of time until a vendor mistake impacts your organization. Make sure you are prepared to manage the adverse financial consequences.

      Common Obstacles

      Identifying and managing a vendor’s potential financial impact requires multiple people in the organization across several functions – and those people all need educating on the potential risks.

      Organizational leadership is often unaware of decisions on organizational risk appetite and tolerance, and they assume there are more protections in place against risk impact than there truly are.

      Info-Tech’s Approach

      Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

      Info-Tech Insight

      Companies without good vendor management risk initiatives will take on more risk than they should. Solid vendor management practices are imperative –organizations must evolve to ensure that vendors deliver services according to performance objectives and that risks are managed accordingly.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.

      Cube with each multiple colors on each face, similar to a Rubix cube, and individual components of vendor risk branching off of it: 'Financial', 'Reputational', 'Operational', 'Strategic', 'Security', and 'Regulatory & Compliance'.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of scope:
      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      Financial risk impact

      Potential losses to the organization due to financial risks

      In this blueprint, we’ll explore financial risks and their impacts.

      Identifying negative actions is paramount to assessing the overall financial impact on your organization, starting in the due diligence phase of the vendor assessment and continuing throughout the vendor lifecycle.

      Cube with each multiple colors on each face, similar to a Rubix cube, and the vendor risk component 'Financial' highlighted.

      Unbudgeted financial risk impact

      The costs of adverse vendor actions, such as a breach or an outage, are increasing. By knowing these potential costs, leaders can calculate how to avoid them throughout the lifecycle of the relationship.

      Loss of business represents the largest share of the breach

      38%

      Avg. $1.59M
      Global average cost of a vendor breach

      $4.2M

      Percentage of breaches in 2020 caused by business associates

      40.2%

      23.2% YoY
      (year over year)
      (Source: “Cost of a Data Breach Report 2021,” IBM, 2021) (Source: “Vendor Risk Management – A Growing Concern,” Stern Security, 2021)

      Example: Hospital IT System Outage

      Hospitals often rely on vendors to manage their data center environments but rarely understand the downstream financial impacts if that vendor fails to perform.

      For example, a vendor implements a patch out of cycle with no notice to the IT group. Suddenly all IT systems are down. It takes 12 hours for the IT teams to return systems to normal. The downstream impacts are substantial.

      • There is no revenue capture during outage (patient registration, payments).
        • The financial loss is significant, impacting cash on hand and jeopardizing future projects.
      • Clinicians cannot access the electronic health record (EHR) system and shift to downtime paper processes.
        • This can cause potential risks to patient health, such as unknown drug interactions.
        • This could also incur lawsuits, fines, and penalties.
      • Staff must manually add the paper records into the EHR after the incident is corrected.
        • Staff time is lost on creating paper records and overtime is required to reintroduce those records into EMR.
      • Staff time and overtime pay on troubleshooting and solving issues take away from normal operations and could cause delays, having downstream effects on the timing of other projects.

      Insight Summary

      Assessing financial impacts is an ongoing, educative, and collaborative multidisciplinary process that vendor management initiatives are uniquely designed to coordinate and manage for organizations.

      Insight 1 Vendors are becoming more and more crucial to organizations’ overall operations, and most organizations have a poor understanding of the potential impacts they represent.

      Is your vendor solvent? Do they have enough staff to accommodate your needs? Has their long-term planning been affected by changes in the market? Are they unique in their space?

      Insight 2 Financial impacts from other risk types deserve just as much focus as security alone, if not more.

      Examples include penalties and fines, loss of revenue due to operational impacts, vendor replacement costs, hidden costs in poorly understood contracts, and lack of contractual protections.

      Insight 3 There is always an inherent risk in working with a vendor, but organizations should financially quantify how much each risk may impact their budget.

      A significant concern for organizations is quantifying different types of risks. When a risk occurs, the financial losses are often poorly understood, with unbudgeted financial impacts.

      Three stages of vendor financial risk assessment

      Assess risk throughout the complete vendor lifecycle

      1. Pre-Relationship Due Diligence: The initial pre-relationship due diligence stage is a crucial point to establish risk management practices. Vendor management practices ensure that a potential vendor’s risk is categorized correctly by facilitating the process of risk assessment.
      2. Monitor & Manage: Once the relationship is in place, organizations should enact ongoing management efforts to ensure they are both getting their value from the vendor and appropriately addressing any newly identified risks.
      3. Termination: When the termination of the relationship arrives, the organization should validate that adequate protections that were established while forming a contract in the pre-relationship stage remain in place.

      Inherent risks from negative actions are pervasive throughout the entire vendor lifecycle. Collaboratively understanding those risks and working together to put proper management in place enables organizations to get the most value out of the relationship with the least amount of risk.

      Flowchart for 'Assessing Financial Risk Impacts', beginning with 'New Vendor' to 'Sourcing' to the six components of 'Vendor Management'. After a gamut of assessments such as ''What If' Game' one can either 'Accept' to move on to 'Pre-Relationship', 'Monitor & Manage', and eventually to 'Termination', or not accept and circle back to 'Sourcing'.

      Stage 1: Pre-relationship assessment

      Do these as part of your due diligence

      • Review and negotiate contract terms and conditions.
        • Ensure that you have the protections to make you whole in the event of an incident, in the event that another entity purchases the vendor, and throughout the entire lifecycle of your relationship with the vendor.
        • Make sure to negotiate your post-termination protections in the initial agreement.
      • Perform a due-diligence financial assessment.
        • Make sure the vendor is positioned in the market to be able to service your organization.
      • Perform an initial risk assessment.
        • Identify and understand all potential factors that may cause financial impacts to your organization.
        • Include total cost of ownership (TCO) and return of investment (ROI) as potential impact offsets.
      • Review case studies – talk to other customers.
        • Research who else has worked with the vendor to get “the good, the bad, and the ugly” stories to form a clear picture of a potential relationship with the vendor.
      • Use proofs of concept.
        • It is essential to know how the vendor and their solutions will work in the environment before committing resources and to incorporate them into organizational strategic plans.
      • Limit vendors’ ability to increase costs over the years. It is not uncommon for a long-term relationship to become more expensive than a new one over time when the increases are unmanaged.
      • Vendor audits can be costly and a significant distraction to your staff. Make sure to contractually limit them.
      • Many vendors enjoy significant revenue from unclear deliverables and vague expectations that lead to change requests at unknown rates – clarifying expectations and deliverables and demanding negotiated rate sheets before engagement will save budget and strengthen the relationship.

      Visit Info-Tech’s VMO ROI Calculator and Tracker

      The “what if” game

      1-3 hours

      Input: List of identified potential risk scenarios scored by likelihood and financial impact, List of potential management of the scenarios to reduce the risk

      Output: Comprehensive financial risk profile on the specific vendor solution

      Materials: Whiteboard/flip charts, Financial Risk Impact Tool to help drive discussion

      Participants: Vendor Management – Coordinator, IT Operations, Legal/Compliance/Risk Manager, Finance/Procurement

      Vendor management professionals are in an excellent position to collaboratively pull together resources across the organization to determine potential risks. By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      1. Break into smaller groups (or if too small, continue as a single group).
      2. Use the Financial Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potential risks but manage the overall process to keep the discussion on track.
      3. Collect the outputs and ask the subject matter experts for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Financial Risk Impact Tool

      Stage 2.1: Monitor the financial risk

      Ongoing monitoring activities

      Never underestimate the value of keeping the relationship moving forward.

      Examples of items and activities to monitor include;

      Stock photo of a worker being trained on a computer.
      • Fines
      • Data leaks
      • Performance
      • Credit monitoring
      • Viability/solvency
      • Resource capacity
      • Operational impacts
      • Regulatory penalties
      • Increases in premiums
      • Security breaches (infrastructure)

      Info-Tech Insight

      Many organizations do not have the resources to dedicate to annual risk assessments of all vendors.

      Consider timing ongoing risk assessments to align with contract renewal, when you have the most leverage with the vendor.

      Visit Info-Tech’s Risk Register Tool

      Stage 2.2: Manage the financial risk

      During the lifecycle of the vendor relationship

      • Renew risk assessments annually.
      • Focus your efforts on highly ranked risks.
      • Is there a new opportunity to negotiate?
      • Identify and classify individual vendor risk.
      • Are there better existing contracts in place?
      • Review financial health checks at the same time.
      • Monitor and schedule contract renewals and new service/module negotiations.
      • Perform business alignment meetings to reassess the relationship.
      • Ongoing operational meetings should be supplemental, dealing with day-to-day issues.
      • Develop performance metrics and hold vendors accountable to established service levels.
      Stock image of a professional walking an uneven line over the words 'Risk Management'.

      Stage 3: Termination

      An essential and often overlooked part of the vendor lifecycle is the relationship after termination

      • The risk of a vendor keeping your data for “as long as they want” is high.
        • Data retention becomes a “forever risk” in today’s world of cyber issues if you do not appropriately plan.
      • Ensure that you always know where data resides and where people are allowed to access that data.
        • If there is a regulatory need to house data only in specific locations, ensure that it is explicit in agreements.
      • Protect your data through language in initial agreements that covers what needs to happen when the relationship with the vendor terminates.
        • Typically, all the data that the vendor has retained is returned and/or destroyed at your sole discretion.
      Stock image of a sign reading 'Closure'.

      Related Info-Tech Research

      Stock photo of two co-workers laughing. Design and Build an Effective Contract Lifecycle Management Process
      • Achieve measurable savings in contract time processing, financial risk avoidance, and dollar savings
      • Understand how to identify and mitigate risk to save the organization time and money.
      Stock image of reports and file folders. Identify and Reduce Agile Contract Risk
      • Manage Agile contract risk by selecting the appropriate level of protections for an Agile project.
      • Focus on the correct contract clauses to manage Agile risk.
      Stock photo of three co-workers gathered around a computer screen. Jump Start Your Vendor Management Initiative
      • Vendor management must be an IT strategy. Solid vendor management is an imperative – IT organizations must develop capabilities to ensure that services are delivered by vendors according to service level objectives and that risks are mitigated according to the organization's risk tolerance.
      • Gain visibility into your IT vendor community. Understand how much you spend with each vendor and rank their criticality and risk to focus on the vendors you should be concentrating on for innovative solutions.

      Develop a Plan to Pilot Enterprise Service Management

      • Buy Link or Shortcode: {j2store}279|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • Many business groups in the organization are siloed and have disjointed services that lead to a less than ideal customer experience.
      • Service management is too often process-driven and is implemented without a holistic view of customer value.
      • Businesses get caught up in the legacy of their old systems and find it difficult to move with the evolving market.

      Our Advice

      Critical Insight

      • Customer experience is the new battleground. Parity between products is creating the need to differentiate via customer experience.
      • Don’t forget your employees! Enterprise service management (ESM) is also about delivering exceptional experiences to your employees so they can deliver exceptional services to your customers.
      • ESM is not driven by tools and processes. Rather, ESM is about pushing exceptional services to customers by pulling from organizational capabilities.

      Impact and Result

      • Understand ESM concepts and how they can improve customer service.
      • Use Info-Tech’s advice and tools to perform an assessment of your organization’s state for ESM, identify the gaps, and create an action plan to move towards an ESM pilot.
      • Increase business and customer satisfaction by delivering services more efficiently.

      Develop a Plan to Pilot Enterprise Service Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should move towards ESM, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand ESM and get buy-in

      Understand the concepts of ESM, determine the scope of the ESM program, and get buy-in.

      • Develop a Plan to Pilot Enterprise Service Management – Phase 1: Understand ESM and Get Buy-in
      • Enterprise Service Management Executive Buy-in Presentation Template
      • Enterprise Service Management General Communications Presentation Template

      2. Assess the current state for ESM

      Determine the current state for ESM and identify the gaps.

      • Develop a Plan to Pilot Enterprise Service Management – Phase 2: Assess the Current State for ESM
      • Enterprise Service Management Assessment Tool
      • Enterprise Service Management Assessment Tool Action Plan Guide
      • Enterprise Service Management Action Plan Tool

      3. Identify ESM pilot and finalize action plan

      Create customer journey maps, identify an ESM pilot, and finalize the action plan for the pilot.

      • Develop a Plan to Pilot Enterprise Service Management – Phase 3: Identify ESM Pilot and Finalize Action Plan
      • Enterprise Service Management Customer Journey Map Template
      [infographic]

      Workshop: Develop a Plan to Pilot Enterprise Service Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand ESM and Get Buy-In

      The Purpose

      Understand what ESM is and how it can improve customer service.

      Determine the scope of your ESM initiative and identify who the stakeholders are for this program.

      Key Benefits Achieved

      Understanding of ESM concepts.

      Understanding of the scope and stakeholders for your ESM initiative.

      Plan for getting buy-in for the ESM program.

      Activities

      1.1 Understand the concepts and benefits of ESM.

      1.2 Determine the scope of your ESM program.

      1.3 Identify your stakeholders.

      1.4 Develop an executive buy-in presentation.

      1.5 Develop a general communications presentation.

      Outputs

      Executive buy-in presentation

      General communications presentation

      2 Assess the Current State for ESM

      The Purpose

      Assess your current state with respect to culture, governance, skills, and tools.

      Identify your strengths and weaknesses from the ESM assessment scores.

      Key Benefits Achieved

      Understanding of your organization’s current enablers and constraints for ESM.

      Determination and analysis of data needed to identify strengths or weaknesses in culture, governance, skills, and tools.

      Activities

      2.1 Understand your organization’s mission and vision.

      2.2 Assess your organization’s culture, governance, skills, and tools.

      2.3 Identify the gaps and determine the necessary foundational action items.

      Outputs

      ESM assessment score

      Foundational action items

      3 Define Services and Create Custom Journey Maps

      The Purpose

      Define and choose the top services at the organization.

      Create customer journey maps for the chosen services.

      Key Benefits Achieved

      List of prioritized services.

      Customer journey maps for the prioritized services.

      Activities

      3.1 Make a list of your services.

      3.2 Prioritize your services.

      3.3 Build customer journey maps.

      Outputs

      List of services

      Customer journey maps

      Develop an IT Infrastructure Services Playbook

      • Buy Link or Shortcode: {j2store}451|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: 2 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Infrastructure and operations teams are managing deployments on- and off-premises, and across multiple infrastructure services providers.
      • Though automation tools speed up the delivery process, documentation is always pushed off so the team can meet urgent deadlines.
      • Without documented delivery processes, wait times are longer, controls are adequate but ad hoc, builds are non-standard, and errors are more likely to be introduced in production.

      Our Advice

      Critical Insight

      • Prioritize in-demand services to add to the playbook. Pilot a few services to get value from the project quickly.
      • Do not get lost in automation or tooling. You do not need a complex tool or back-end automation to get value from this project.
      • Learn, then iterate. With a few completed service processes, it is much easier to identify opportunities for service automation.

      Impact and Result

      • Prioritize in-demand services for documentation and standardization.
      • Build service workflows and document service requirements in the services playbook.
      • Create a costing model and track costs to deliver defined services.
      • Leverage data on costs and service requirements to improve service delivery.

      Develop an IT Infrastructure Services Playbook Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to find out why you should create an infrastructure services playbook, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define and prioritize infrastructure services

      Produce a prioritized list of high-demand infrastructure services.

      • Develop an IT Infrastructure Services Playbook – Phase 1: Define and Prioritize Infrastructure Services
      • Infrastructure Services Playbook

      2. Build workflows and an infrastructure services playbook

      Design workflows and create the first draft of the infrastructure services playbook.

      • Develop an IT Infrastructure Services Playbook – Phase 2: Build Workflows and an Infrastructure Services Playbook
      • Infrastructure Service Workflows (Visio)
      • Infrastructure Service Workflows (PDF)

      3. Identify costs and mature service delivery capabilities

      Build a service rate sheet to track costs and develop better service capabilities.

      • Develop an IT Infrastructure Services Playbook – Phase 3: Identify Costs and Mature Service Delivery Capabilities
      • Service Rate Sheet
      • Infrastructure Service Catalog Mind Map Example
      [infographic]

      Workshop: Develop an IT Infrastructure Services Playbook

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define and Prioritize Infrastructure Services

      The Purpose

      Define and prioritize infrastructure services.

      Key Benefits Achieved

      Identify candidate services for the Playbook.

      Activities

      1.1 Define the services you own.

      1.2 Prioritize infrastructure services.

      Outputs

      Affinity map of infrastructure services

      Service pain points and root causes

      A list of high-demand infrastructure services

      2 Build the Infrastructure Services Playbook

      The Purpose

      Build workflows and an infrastructure services playbook.

      Key Benefits Achieved

      Produce a draft infrastructure services playbook.

      Activities

      2.1 Design workflow for service delivery.

      2.2 Add steps and requirements to the Services Playbook.

      Outputs

      Documented service workflows

      Infrastructure Services Playbook

      3 Identify Costs and Mature Service Delivery Capabilities

      The Purpose

      Identify costs and mature service delivery capabilities.

      Key Benefits Achieved

      Build an infrastructure service rate sheet.

      Define next steps for infrastructure service capabilities.

      Activities

      3.1 Optimize infrastructure cost estimates.

      3.2 Mature your I&O organization into a service broker.

      Outputs

      Service Rate Sheet

      Master list of infrastructure services

      Action plan for Playbook implementation

      Further reading

      Develop an IT Infrastructure Services Playbook

      Automation, SDI, and DevOps – build a cheat sheet to manage a changing Infrastructure & Operations environment.

      Table of contents

      Analyst Perspective

      Executive Summary

      Project Overview

      Summary and Conclusion

      ANALYST PERSPECTIVE

      Technology is changing how infrastructure services are delivered.

      "Managing a hybrid infrastructure environment is challenge enough. Add to this the pressure on IT Operations to deliver services faster and more continuously – it’s a recipe for boondoggle deployments, overcommitted staff, end-user frustration, and operational gridlock.

      It’s not every service you provide that causes problems, so prioritize a few in-demand, painful services. Build and maintain durable, flexible processes that enable your team to provide consistent, repeatable services at a standard cost. Identify opportunities to improve service delivery.

      You’ll save the business time and money and your own team significant grief." (Andrew Sharp, Research Manager, Infrastructure & Operations, Info-Tech Research Group)

      Your infrastructure and operations team is a service provider; standardize, document, and communicate service capabilities

      This Research is Designed For:

      • CTOs and Infrastructure Managers
      • Service Level Managers
      • ITSM Managers and Process Owners

      This Research Will Help You:

      • Inventory services that IT Infrastructure & Operations (I&O) provides to the business (servers, storage, and network).
      • Standardize services and track costs.
      • Articulate the value of these services to business owners.
      • Develop a catalog of infrastructure services.

      This Research Will Also Assist:

      • CIOs
      • Application Development Managers
      • Security Managers
      • Auditors

      This Research Will Help Them:

      • Understand the complexities of technical service delivery.
      • Make better strategic IT infrastructure decisions.

      Executive summary

      Situation

      • Infrastructure and operations teams are managing deployments on- and off-premises and across multiple infrastructure service providers.
      • Though automation tools speed up the delivery process, documentation is always pushed off so the team can meet urgent deadlines.

      Complication

      • Cloud providers have set the bar high for ease of access to stable infrastructure services.
      • Without documented delivery processes, wait times are longer, controls are adequate but ad hoc, builds are non-standard, and errors are more likely to be introduced in production.

      Resolution

      • Prioritize in-demand services for documentation and standardization.
      • Build service workflows and document service requirements in the services playbook.
      • Create a costing model and track costs to deliver defined services.
      • Leverage data on costs and service requirements to improve service delivery.

      Info-Tech Insight

      1. Keep it simple. Work through a few in-demand services to get early value from the project.
      2. Don’t get lost in automation or tooling. You don’t need a complex tool or back-end automation to get value from standardized services.
      3. Do then iterate. With a few completed service processes, it’s much easier to identify opportunities for service automation.

      Create an infrastructure services playbook to improve efficiency, support DevOps, and streamline service delivery

      Begin building an infrastructure services playbook by defining the services you provide. This will also help your team support changes to service delivery (e.g. more use of cloud services and the shift to DevOps).

      In this blueprint, the first step will be to document infrastructure services to:

      1. Clarify infrastructure capabilities and achievable service levels.

        Document infrastructure services to clarify achievable service levels with given resources and what you will need to meet service-level requirement gaps. Establishing your ability to meet customer demands is the first step toward becoming a broker of internal or external services.
      2. Standardize infrastructure service delivery.

        Sometimes, it’s extremely important to do the exact same thing every time (e.g. server hardening). Sometimes, your team needs room to deviate from the script. Create a playbook that allows you to standardize service delivery as needed.
      3. Make good strategic infrastructure decisions.

        Knowledge is power. Defined services and capabilities will help you make important strategic infrastructure decisions around capacity planning and when outsourcing is appropriate.

      Review and optimize infrastructure service delivery as you shift to more cloud-based services

      If you can’t standardize and streamline how you support cloud services, you risk AppDev and business leaders circumventing the I&O team.

      Logo for 'vmware'.

      Example:

      Create a new server resource in a virtual environment vs. public cloud

      In a virtualized environment, provisioning processes can still be relatively siloed.

      In a software-defined environment, many steps require knowledge across the infrastructure stack. Better documentation will help your team deliver services outside their area of specialty.

      Logo for 'Microsoft Azure'.
      • Identify CPU requirements for a virtual machine (VM)
      • Calculate VM memory requirements
      • Configure the floppy drive for a VM
      • Configure IDE devices for a VM
      • Configure SCSI adapters for a VM
      • Configure network adapters for a VM
      • Configure VM priority for host CPU resources
      • Server is live

      • Complete SDI code development & review, version control, build status, etc.
      • Identify software and specifications for the instance you want to use
      • Review configuration, storage, and security settings
      • Secure the instance with an existing key pair or create a new key pair
      • Update documentation – public IP address, physical & logical connections, data flows, etc.
      • Launch and connect to instance
      • Server is live

      Strengthen DevOps with an infrastructure playbook

      The purpose behind DevOps is to reduce friction and deliver faster, more continuous, more automated services through the use of cross-functional teams.

      DevOps: bridging Applications Development and Infrastructure & Operations by embracing a culture, practices, and tools born out of Lean and Agile methodologies.

      • Create a common language across functions.
      • Ensure that all service steps are documented.
      • Move towards more standard deployments.
      • Increase transparency within the IT department.
      • Cultivate trust across teams.
      • Build the foundation for automated services.
      A colorful visualization of the DevOps cycle. On the Development side is 'Feedback', Plan', 'Build', 'Integrate', then over to the Operations side is 'Deploy', and 'Operate', then back to Dev with 'Feedback', starting the cycle over again.

      "The bar has been raised for delivering technology products and services – what was good enough in previous decades is not good enough now." (Kim, Humble, Debois, Willis (2016))

      Leverage an infrastructure services playbook to improve service delivery, one step at a time

      Crawl

      • Prioritize infrastructure services that are good candidates for standardization.
      • Document the steps and requirements to deliver the service.
      • Use the playbook and workflows internally as you gather requirements and deliver on requests.
      • Track costs internally.

      Walk

      • Provide infrastructure clients with the playbook and allow them to make requests against it.
      • Update and maintain existing documentation.
      • Automate, where possible.
      • Showback costs to the business.

      Run

      • Provide infrastructure customers with scripts to provision infrastructure resources.
      • Audit requests before fulfilling them.
      • Chargeback costs, as needed.
      A turtle smiles happily on four legs, simply content to be alive. Another turtle moves quickly on two legs, seemingly in a runner's trance, eyes closed, oblivious to the fact that another turtle has beaten him to finish line.

      Focus on in-demand infrastructure services — PHASE 1

      Standardize in-demand, repeatable services first.

      Demand for infrastructure services is usually driven by external requests or operational requirements. Prioritize services based on criticality, durability, frequency, availability, and urgency requirements.

      Scheduling Delays
      • Dealing with a slew of capital projects driven by a major funding initiative, the IT team of a major US transit system is struggling to execute on basic operational tasks.

      • Action:
      • A brainstorming and prioritization exercise identifies web server deployment as their most in-demand service.
      • Identifying breakdowns in web server deployment helps free up resources for other tasks and addresses a serious pain point.
      Think outside the box
      • On a new project for a sporting goods client, the IT department for a marketing firm deploys and supports a “locker” kiosk that users engage with for a chance to win a gift.

      • Action:
      • As the campaign proves successful, the I&O Manager creates a playbook to guide kiosk support and deployment in the future, including required skills, timelines, success metrics, and costs.
      Keep it standard, keep it safe
      • An IT audit at a higher education institution finds that no standard process for server hardening has been defined or documented by the infrastructure team.

      • Action:
      • Improving IT security is a strategic priority for the department.
      • The infrastructure team decides to standardize and document processes, guidelines, and configurations for hardening OS, SCCM, SaltStack, scripting, and patching.

      Leverage service workflows to populate the playbook — PHASE 2

      Infrastructure as Code is breaking down traditional infrastructure silos and support models.

      1. Document the workflow to deliver the service. Identify pain points and target broken processes first.
        Provision –› Configure –› Run –› Quiesce –› Destroy
      2. Define logical expected results and metrics for problematic steps in the process. Identify challenges and possible improvements to each problematic step.
        Building and deploying toolsets is taking a long time
        Start
        • Create a baseline offering for common requests.
        • Make clear that non-standard requests will take time to fulfil.
        Stop
        • Move to just one web server.
        Continue
        • Use weekly drop-ins to communicate the change.
      3. Document skills and roles, approvers, and pre-requirements to fill out the documentation, as needed. Use the documented process to guide internal process and align with external expectations.

      Cross-silo knowledge is needed: In a software-defined environment, building and launching a new server requires knowledge across the stack.

      • Complete SDI code development & review, version control, build status, etc.
      • Identify software and specifications for the instance you want to use
      • Review configuration, storage, and security settings
      • Secure the instance with an existing key pair, or create a new key pair
      • Update documentation – public IP address, physical & logical connections, data flows, etc.
      • Launch and connect to the instance
      • Server is live

      Take a progressive approach to cost tracking — PHASE 3

      Infrastructure & Operations are bound by two metrics:

      1. Are systems up?
      2. Is technology delivered as efficiently as possible?

      Because tracking cost is integral to efficiency, cost and budget management, by proxy, is one of the most important Infrastructure & Operations metrics.

      Cost management is not a numbers game. It is an indicator of how well infrastructure is managed.

      Track costs in a practical way that delivers value to your organization:

      1. Build and leverage an internal rate sheet to help estimate cost to serve.
      2. Showback rate sheet to help managers and architects make better infrastructure decisions.
      3. Chargeback costs to defined cost centers.

      Project overview

      Use Info-Tech’s methodology to get value faster from your infrastructure services playbook.

      Phases

      Phase 1: Define and prioritize infrastructure services Phase 2: Build the infrastructure services playbook Phase 3: Identify costs and mature service delivery capabilities

      Steps

      1.1 Define the services you own 2.1 Design workflows for service delivery 3.1 Estimate infrastructure service costs
      1.2 Prioritize infrastructure services 2.2 Add steps and requirements to the services playbook 3.2 Mature your I&O organization into a service broker

      Tools & Templates

      Infrastructure Services Playbook Infrastructure Service Workflows Service Rate Sheet

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation Overview

      Your Trusted Advisor is just a call away.

      Scoping
      (Call 1)

      Scope requirements, objectives, and stakeholders. Review the playbook toolset and methodology, and establish fit-for-need.

      Identify Services
      (Call 2)

      Brainstorm common infrastructure services your group provides. Consolidate the list and identify priority services.

      Create Service Workflows
      (Calls 3-4)

      Build Visio workflows for 2-3 priority services.

      Populate the Playbook
      (Calls 4-5)

      Add data to the playbook based on infrastructure service workflows

      Create a Rate Sheet for Costs
      (Call 6)

      Build a rate sheet that allows you to calculate costs for additional

      Your Guided Implementation will pair you with an advisor from our analyst team for the duration of your infrastructure services project.

      Workshop Overview

      Module 1
      (Day 1)
      Module 1
      (Day 1)
      Module 1
      (Day 1)
      Offsite deliverables wrap-up (Day 5)
      Activities
      Define and Prioritize Infrastructure Services

      1.1 Assess current maturity of services and standardization processes.

      1.2 Identify, group, and break out important infrastructure services.

      1.3 Define service delivery pain points and perform root-cause analysis.

      1.4 Prioritize services based on demand criteria.

      Build the Infrastructure Services Playbook

      2.1 Determine criteria for standard versus custom services.

      2.2 Document standard workflows for better alignment and consistent delivery.

      2.3 Build a flowchart for the identified high-demand service(s).

      2.4 Outline information as it relates to the service lifecycle in the Playbook template.

      Identify Costs and Mature Service Delivery Capabilities

      4.1 Gather information for the rate sheet.

      4.2 Choose an allocation method for overhead costs.

      4.3 Select the right approach in the crawl, walk, run model for your organization.

      4.4 Discuss the promotion plan and target revision dates for playbook and rate sheet.

      Deliverables
      1. High-demand infrastructure services list
      1. Right-sized criteria for standardization
      2. Service workflows
      3. Infrastructure Services Playbook
      1. Service Rate Sheet
      2. Deployment plan

      Develop an IT Infrastructure Services Playbook

      PHASE 1

      Define and Prioritize Infrastructure Services

      Step 1.1: Define the services you own

      PHASE 1

      Define and prioritize infrastructure services

      1.1

      Define the services you own

      1.2

      Prioritize infrastructure services

      This step will walk you through the following activities:

      • Define “infrastructure service”
      • Brainstorm service offerings
      • Consolidate services with affinity map

      This step involves the following participants:

      • Infrastructure Manager
      • I&O SMEs

      Results & Insights

      • Results: Consolidated list of end-to-end services
      • Insights: Avoid analysis paralysis by brainstorming without restrictions. It is more effective to cut down in Step 1.2 rather than risk neglecting important services for the playbook.

      Consider a range of infrastructure services

      Your infrastructure team is a service provider to the applications team – and sometimes other users as well.

      Service Requests
      • A developer requests a new web server.
      • The marketing department asks for a database to support a six-month digital marketing campaign.
      Projects
      • A new service is promoted to production.
      Operations
      • Firewall rules are updated to support server, network, or security posture changes.
      • Standard practices are followed and maintained to harden a range of different operating systems.
      • Engineers follow a standard process to integrate new tools and entitlements into Active Directory.
      • Patches and firmware updates are applied to core infrastructure components as needed.
      Problems
      • A database batch job often breaks on overnight batch jobs and requires manual intervention to check and restart.
      A visualization of the word 'Infrastructure Services' being orbited by 'Service Requests', 'Projects', 'Operations', and 'Problems'.

      IT infrastructure & operations teams deliver services that fulfil requests, support projects, resolve problems, and operate systems.

      IT Diversity & Inclusion Tactics

      • Buy Link or Shortcode: {j2store}517|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • Although inclusion is key to the success of a diversity and inclusion (D&I) strategy, the complexity of the concept makes it a daunting pursuit.
      • This is further complicated by the fact that creating inclusion is not a one-and-done exercise. Rather, it requires the ongoing commitment of employees and managers to reassess their own behaviors and to drive a cultural shift.

      Our Advice

      Critical Insight

      Realize the benefits of a diverse workforce by embedding inclusion into work practices, behaviors, and values, ensuring accountability throughout the department.

      Impact and Result

      Understand what it means to be inclusive: reassess work practices and learn how to apply leadership behaviors to create an inclusive environment

      IT Diversity & Inclusion Tactics Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Mobilize inclusion efforts

      Learn, evaluate, and understand what it means to be inclusive, examine biases, and apply inclusive leadership behaviors.

      • Diversity & Inclusion Initiatives Catalog
      • Inclusive IT Work Practices Examples
      • Inclusive Work Practices Template
      • Equip Managers to Adopt Inclusive Leadership Behaviors
      • Workbook: Equip Managers to Adopt Inclusive Leadership Behaviors
      • Standard Focus Group Guide
      [infographic]

      Create an Architecture for AI

      • Buy Link or Shortcode: {j2store}344|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $604,999 Average $ Saved
      • member rating average days saved: 49 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management

      This research is designed to help organizations who are facing these challenges:

      • Deliver on the AI promise within the organization.
      • Prioritize the demand for AI projects and govern the projects to prevent overloading resources.
      • Have sufficient data management capability.
      • Have clear metrics in place to measure progress and for decision making.

      AI requires a high level of maturity in all data management capabilities, and the greatest challenge the CIO or CDO faces is to mature these capabilities sufficiently to ensure AI success.

      Our Advice

      Critical Insight

      • Build your target state architecture from predefined best-practice building blocks.
      • Not all business use cases require AI to increase business capabilities.
      • Not all organizations are ready to embark on the AI journey.
      • Knowing the AI pattern that you will use will simplify architecture considerations.

      Impact and Result

      • This blueprint will assist organizations with the assessment, planning, building, and rollout of their AI initiatives.
        • Do not embark on an AI project with an immature data management practice. Embark on initiatives to fix problems before they cripple your AI projects.
        • Using architecture building blocks will speed up the architecture decision phase.
      • The success rate of AI initiatives is tightly coupled with data management capabilities and a sound architecture.

      Create an Architecture for AI Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand why you need an underlying architecture for AI, review Info-Tech's methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess business use cases for AI readiness

      Define business use cases where AI may bring value. Evaluate each use case to determine the company’s AI maturity in people, tools, and operations for delivering the correct data, model development, model deployment, and the management of models in the operational areas.

      • Create an Architecture for AI – Phase 1: Assess Business Use Cases for AI Readiness
      • AI Architecture Assessment and Project Planning Tool
      • AI Architecture Assessment and Project Planning Tool – Sample

      2. Design your target state

      Develop a target state architecture to allow the organization to effectively deliver in the promise of AI using architecture building blocks.

      • Create an Architecture for AI – Phase 2: Design Your Target State
      • AI Architecture Templates

      3. Define the AI architecture roadmap

      Compare current state with the target state to define architecture plateaus and build a delivery roadmap.

      • Create an Architecture for AI – Phase 3: Define the AI Architecture Roadmap
      [infographic]

      Workshop: Create an Architecture for AI

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Answer “Where To?”

      The Purpose

      Define business use cases where AI may add value and assess use case readiness.

      Key Benefits Achieved

      Know upfront if all required data resources are available in the required velocity, veracity, and variety to service the use case.

      Activities

      1.1 Review the business vision.

      1.2 Identify and classify business use cases.

      1.3 Assess company readiness for each use case.

      1.4 Review architectural principles and download and install Archi.

      Outputs

      List of identified AI use cases

      Assessment of each use case

      Data sources needed for each use case

      Archi installed

      2 Define the Required Architecture Building Blocks

      The Purpose

      Define architecture building blocks that can be used across use cases and data pipeline.

      Key Benefits Achieved

      The architectural building blocks ensure reuse of resources and form the foundation of a stepwise rollout.

      Activities

      2.1 ArchiMate modelling language overview.

      2.2 Architecture building block overview

      2.3 Identify architecture building blocks by use case.

      2.4 Define the target state architecture.

      Outputs

      A set of building blocks created in Archi

      Defined target state architecture using architecture building blocks

      3 Assess the Current State Architecture

      The Purpose

      Assess your current state architecture in the areas identified by the target state.

      Key Benefits Achieved

      Only evaluating the current state architecture that will influence your AI implementation.

      Activities

      3.1 Identify the current state capabilities as required by the target state.

      3.2 Assess your current state architecture.

      3.3 Define a roadmap and design implementation plateaus.

      Outputs

      Current state architecture documented in Archi

      Assessed current state using assessment tool

      A roadmap defined using plateaus as milestones

      4 Bridge the Gap and Create the Roadmap

      The Purpose

      Assess your current state against the target state and create a plan to bridge the gaps.

      Key Benefits Achieved

      Develop a roadmap that will deliver immediate results and ensure long-term durability.

      Activities

      4.1 Assess the gaps between current- and target-state capabilities.

      4.2 Brainstorm initiatives to address the gaps in capabilities

      4.3 Define architecture delivery plateaus.

      4.4 Define a roadmap with milestones.

      4.5 Sponsor check-in.

      Outputs

      Current to target state gap assessment

      Architecture roadmap divided into plateaus

      Implement Hardware Asset Management

      • Buy Link or Shortcode: {j2store}312|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $29,447 Average $ Saved
      • member rating average days saved: 25 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management
      • Executives are often aware of the benefits asset management offers, but many organizations lack a defined program to manage their hardware.
      • Efforts to implement hardware asset management (HAM) are stalled because organizations feel overwhelmed navigating the process or under use the data, failing to deliver value.

      Our Advice

      Critical Insight

      • Organizations often implement an asset management program as a one-off project and let it stagnate.
      • Organizations often fail to dedicate adequate resources to the HAM process, leading to unfinished processes and inconsistent standards.
      • Hardware asset management programs yield a large amount of useful data. Unfortunately, this data is often underutilized. Departments within IT become data siloes, preventing effective use of the data.

      Impact and Result

      • As the IT environment continues to change, it is important to establish consistency in the standards around IT asset management.
      • A current state assessment of your HAM program will shed light on the steps needed to safeguard your processes.
      • Define the assets that will need to be managed to inform the scope of the ITAM program before defining processes.
      • Build and involve an ITAM team in the process from the beginning to help embed the change.
      • Define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.

      Implement Hardware Asset Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should Implement Hardware Asset Management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Lay foundations

      Build the foundations for the program to succeed.

      • Implement Hardware Asset Management – Phase 1: Lay Foundations
      • HAM Standard Operating Procedures
      • HAM Maturity Assessment Tool
      • IT Asset Manager
      • IT Asset Administrator

      2. Procure & receive

      Define processes for requesting, procuring, receiving, and deploying hardware.

      • Implement Hardware Asset Management – Phase 2: Procure and Receive
      • HAM Process Workflows (Visio)
      • HAM Process Workflows (PDF)
      • Non-Standard Hardware Request Form
      • Purchasing Policy

      3. Maintain & dispose

      Define processes and policies for managing, securing, and maintaining assets then disposing or redeploying them.

      • Implement Hardware Asset Management – Phase 3: Maintain and Dispose
      • Asset Security Policy
      • Hardware Asset Disposition Policy

      4. Plan implementation

      Plan the hardware budget, then build a communication plan and roadmap to implement the project.

      • Implement Hardware Asset Management – Phase 4: Plan Implementation 
      • HAM Budgeting Tool
      • HAM Communication Plan
      • HAM Implementation Roadmap
      [infographic]

      Workshop: Implement Hardware Asset Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Lay Foundations

      The Purpose

      Build the foundations for the program to succeed.

      Key Benefits Achieved

      Evaluation of current challenges and maturity level

      Defined scope for HAM program

      Defined roles and responsibilities

      Identified metrics and reporting requirements

      Activities

      1.1 Outline hardware asset management challenges.

      1.2 Conduct HAM maturity assessment.

      1.3 Classify hardware assets to define scope of the program.

      1.4 Define responsibilities.

      1.5 Use a RACI chart to determine roles.

      1.6 Identify HAM metrics and reporting requirements.

      Outputs

      HAM Maturity Assessment

      Classified hardware assets

      Job description templates

      RACI Chart

      2 Procure & Receive

      The Purpose

      Define processes for requesting, procuring, receiving, and deploying hardware.

      Key Benefits Achieved

      Defined standard and non-standard requests for hardware

      Documented procurement, receiving, and deployment processes

      Standardized asset tagging method

      Activities

      2.1 Identify IT asset procurement challenges.

      2.2 Define standard hardware requests.

      2.3 Document standard hardware request procedure.

      2.4 Build a non-standard hardware request form.

      2.5 Make lease vs. buy decisions for hardware assets.

      2.6 Document procurement workflow.

      2.7 Select appropriate asset tagging method.

      2.8 Design workflow for receiving and inventorying equipment.

      2.9 Document the deployment workflow(s).

      Outputs

      Non-standard hardware request form

      Procurement workflow

      Receiving and tagging workflow

      Deployment workflow

      3 Maintain & Dispose

      The Purpose

      Define processes and policies for managing, securing, and maintaining assets then disposing or redeploying them.

      Key Benefits Achieved

      Policies and processes for hardware maintenance and asset security

      Documented workflows for hardware disposal and recovery/redeployment

      Activities

      3.1 Build a MAC policy, request form, and workflow.

      3.2 Design process and policies for hardware maintenance, warranty, and support documentation handling.

      3.3 Revise or create an asset security policy.

      3.4 Identify challenges with IT asset recovery and disposal and design hardware asset recovery and disposal workflows.

      Outputs

      User move workflow

      Asset security policy

      Asset disposition policy, recovery and disposal workflows

      4 Plan Implementation

      The Purpose

      Select tools, plan the hardware budget, then build a communication plan and roadmap to implement the project.

      Key Benefits Achieved

      Shortlist of ITAM tools

      Hardware asset budget plan

      Communication plan and HAM implementation roadmap

      Activities

      4.1 Generate a shortlist of ITAM tools that will meet requirements.

      4.2 Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget.

      4.3 Build HAM policies.

      4.4 Develop a communication plan.

      4.5 Develop a HAM implementation roadmap.

      Outputs

      HAM budget

      Additional HAM policies

      HAM communication plan

      HAM roadmap tool

      Further reading

      Implement Hardware Asset Management

      Build IT services value on the foundation of a proactive asset management program.

      ANALYST PERSPECTIVE

      IT asset data impacts the entire organization. It’s time to harness that potential.

      "Asset management is like exercise: everyone is aware of the benefits, but many struggle to get started because the process seems daunting. Others fail to recognize the integrative potential that asset management offers once an effective program has been implemented.

      A proper hardware asset management (HAM) program will allow your organization to cut spending, eliminate wasteful hardware, and improve your organizational security. More data will lead to better business decision-making across the organization.

      As your program matures and your data gathering and utility improves, other areas of your organization will experience similar improvements. The true value of asset management comes from improved IT services built upon the foundation of a proactive asset management program." - Sandi Conrad, Practice Lead, Infrastructure & Operations Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • Asset Managers and Service Delivery Managers tasked with developing an asset management program who need a quick start.
      • CIOs and CFOs who want to reduce or improve budgeting of hardware lifecycle costs.
      • Information Security Officers who need to mitigate the risk of sensitive data loss due to insecure assets.

      This Research Will Help You:

      • Develop a hardware asset management (HAM) standard operating procedure (SOP) that documents:
        • Process roles and responsibilities.
        • Data classification scheme.
        • Procurement standards, processes, and workflows for hardware assets.
        • Hardware deployment policies, processes, and workflows.
        • Processes and workflows for hardware asset security and disposal.
      • Identify requirements for an IT asset management (ITAM) solution to help generate a shortlist.
      • Develop a hardware asset management implementation roadmap.
      • Draft a communication plan for the initiative.

      Executive summary

      Situation

      • Executives are aware of the numerous benefits asset management offers, but many organizations lack a defined ITAM program and especially a HAM program.
      • Efforts to implement HAM are stalled because organizations cannot establish and maintain defined processes and policies.

      Complication

      • Organizations often implement an asset management program as a one- off project and let it stagnate, but asset management needs to be a dynamic, continually involving process to succeed.
      • Organizations often fail to dedicate adequate resources to the HAM process, leading to unfinished processes and inconsistent standards.
      • Hardware asset management programs yield a large amount of useful data. Unfortunately, this data is often underused. Departments within IT become data siloes, preventing effective use of the data.

      Resolution

      • As the IT environment continues to change, it is important to establish consistency in the standards around IT asset management.
      • A current state assessment of your HAM program will shed light on the steps needed to safeguard your processes.
      • Define the assets that will need to be managed to inform the scope of the ITAM program before defining processes.
      • Build and involve an ITAM team in the process from the beginning to help embed the change.
      • Define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.
      • Pace yourself; a staged implementation will make your ITAM program a success.

      Info-Tech Insight

      1. HAM is more than just tracking inventory. A mature asset management program provides data for proactive planning and decision making to reduce operating costs and mitigate risk.
      2. ITAM is not just IT. IT leaders need to collaborate with Finance, Procurement, Security, and other business units to make informed decisions and create value across the enterprise.
      3. Treat HAM like a process, not a project. HAM is a dynamic process that must react and adapt to the needs of the business.

      Implement HAM to reduce and manage costs, gain efficiencies, and ensure regulatory compliance

      Save & Manage Money

      • Companies with effective HAM practices achieve cost savings through redeployment, reduction of lost or stolen equipment, power management, and on-time lease returns.
      • The right HAM system will enable more accurate planning and budgeting by business units.

      Improve Contract Management

      • Real-time asset tracking to vendor terms and conditions allows for more effective negotiation.

      Inform Technology Refresh

      • HAM provides accurate information on hardware capacity and compatibility to inform upgrade and capacity planning

      Gain Service Efficiencies

      • Integrating the hardware lifecycle with the service desk will enable efficiencies through Install/Moves/Adds/Changes (IMAC) processes, for larger organizations.

      Meet Regulatory Requirements

      • You can’t secure organizational assets if you don’t know where they are! Meet governance and privacy laws by knowing asset location and that data is secure.

      Prevent Risk

      • Ensure data is properly destroyed through disposal processes, track lost and stolen hardware, and monitor hardware to quickly identify and isolate vulnerabilities.

      HAM is more than just inventory; 92% of organizations say that it helps them provide better customer support

      Hardware asset management (HAM) provides a framework for managing equipment throughout its entire lifecycle. HAM is more than just keeping an inventory; it focuses on knowing where the product is, what costs are associated with it, and how to ensure auditable disposition according to best options and local environmental laws.

      Implementing a HAM practice enables integration of data and enhancement of many other IT services such as financial reporting, service management, green IT, and data and asset security.

      Cost savings and efficiency gains will vary based on the organization’s starting state and what measures are implemented, but most organizations who implement HAM benefit from it. As organizations increase in size, they will find the greatest gains operationally by becoming more efficient at handling assets and identifying costs associated with them.

      A 2015 survey by HDI of 342 technical support professionals found that 92% say that HAM has helped their teams provide better support to customers on hardware-related issues. Seventy-seven percent have improved customer satisfaction through managing hardware assets. (HDI, 2015)

      HAM delivers cost savings beyond only the procurementstage

      HAM cost savings aren’t necessarily realized through the procurement process or reduced purchase price of assets, but rather through the cost of managing the assets.

      HAM delivers cost savings in several ways:

      • Use a discovery tool to identify assets that may be retired, redeployed, or reused to cut or reallocate their costs.
      • Enforce power management policies to reduce energy consumption as well as costs associated with wasted energy.
      • Enforce policies to lock down unauthorized devices and ensure that confidential information isn’t lost (and you don’t have to waste money recovering lost data).
      • Know the location of all your assets and which are connected to the network to ensure patches are up to date and avoid costly security risks and unplanned downtime.
      • Scan assets to identify and remediate vulnerabilities that can cause expensive security attacks.
      • Improve vendor and contract management to identify areas of hardware savings.

      The ROI for HAM is significant and measurable

      Benefit Calculation Sample Annual Savings

      Reduced help desk support

      • The length of support calls should be reduced by making it easier for technicians to identify PC configuration.
      # of hardware-related support tickets per year * cost per ticket * % reduction in average call length 2,000 * $40 * 20% = $16,000

      Greater inventory efficiency

      • An ITAM solution can automate and accelerate inventory preparation and tasks.
      Hours required to complete inventory * staff required * hourly pay rate for staff * number of times a year inventory required 8 hours * 5 staff * $33 per hour * 2 times a year = $2,640

      Improved employee productivity

      • Organizations can monitor and detect unapproved programs that result in lost productivity.
      # of employees * percentage of employees who encounter productivity loss through unauthorized software * number of hours per year spent using unauthorized software * average hourly pay rate 500 employees * 10% * 156 hours * $18 = $140,400

      Improved security

      • Improved asset tracking and stronger policy enforcement will reduce lost and stolen devices and data.
      # of devices lost or stolen last year * average replacement value of device + # of devices stolen * value of data lost from device (50 * $1,000) + (50 * $5,000) = $300,000
      Total Savings: $459,040
      1. Weigh the return against the annual cost of investing in an ITAM solution to calculate the ROI.
      2. Don’t forget about the intangible benefits that are more difficult to quantify but still significant, such as increased visibility into hardware, more accurate IT planning and budgeting, improved service delivery, and streamlined operations.

      Avoid these common barriers to ITAM success

      Organizations that struggle to implement ITAM successfully usually fall victim to these barriers:

      Organizational resistance to change

      Senior-level sponsorship, engagement, and communication is necessary to achieve the desired outcomes of ITAM; without it, ITAM implementations stall and fail or lack the necessary resources to deliver the value.

      Lack of dedicated resources

      ITAM often becomes an added responsibility for resources who already have other full-time responsibilities, which can quickly cause the program to lose focus. Increase the chance of success through dedicated resources.

      Focus on tool over process

      Many organizations buy a tool thinking it will do most of the work for them, but without supporting processes to define ITAM, the data within the tool can become unreliable.

      Choosing a tool or process that doesn’t scale

      Some organizations are able to track assets through manual discovery, but as their network and user base grows, this quickly becomes impossible. Choose a tool and build processes that will support the organization as it grows.

      Using data only to respond to an audit without understanding root causes

      Often, organizations implement ITAM only to the extent necessary to achieve compliance for audits, but without investigating the underlying causes of non-compliance and thus not solving the real problems.

      To help you make quick progress, Info-Tech Research Group parses hardware asset management into essential processes

      Focus on hardware asset lifecycle management essentials:

      IT Asset Procurement:

      • Define procurement standards for new hardware along with related warranties and support options.
      • Develop processes and workflows for purchasing and work out financial implications to inform budgeting later.

      IT Asset Intake and Deployment:

      • Define policies, processes, and workflows for hardware and receiving, inventory, and tracking practices.
      • Develop processes and workflows for managing imaging, change and moves, and large-scale rollouts.

      IT Asset Security and Maintenance:

      • Develop processes, policies, and workflows for asset tracking and security.
      • Maintain contracts and agreements.

      IT Asset Disposal or Recovery:

      • Manage the employee termination and equipment recovery cycle.
      • Securely wipe and dispose of assets that have reached retirement stage.

      The image is a circular graphic, with Implement HAM written in the middle. Around the centre circle are four phrases: Recover or Dispose; Plan & Procure; Receive & Deploy; Secure & Maintain. Around that circle are six words: Retire; Plan; Request; Procure; Receive; Manage.

      Follow Info-Tech’s methodology to build a plan to implement hardware asset management

      Phase 1: Assess & Plan Phase 2: Procure & Receive Phase 3: Maintain & Dispose Phase 4: Plan Budget & Build Roadmap
      1.1 Assess current state & plan scope 2.1 Request & procure 3.1 Manage & maintain 4.1 Plan budget
      1.2 Build team & define metrics 2.2 Receive & deploy 3.2 Redeploy or dispose 4.2 Communicate & build roadmap
      Deliverables
      Standard Operating Procedure (SOP)
      HAM Maturity Assessment Procurement workflow User move workflow HAM Budgeting Tool
      Classified hardware assets Non-standard hardware request form Asset security policy HAM Communication Plan
      RACI Chart Receiving & tagging workflow Asset disposition policy HAM Roadmap Tool
      Job Descriptions Deployment workflow Asset recovery & disposal workflows Additional HAM policies

      Asset management is a key piece of Info-Tech's COBIT- inspired IT Management and Governance Framework

      The image shows a graphic which is a large grid, showing Info-Tech's research, sorted into categories.

      Cisco IT reduced costs by upwards of $50 million through implementing ITAM

      CASE STUDY

      Industry IT

      Source Cisco Systems, Inc.

      Cisco Systems, Inc.

      Cisco Systems, Inc. is the largest networking company in the world. Headquartered in San Jose, California, the company employees over 70,000 people.

      Asset Management

      As is typical with technology companies, Cisco boasted a proactive work environment that encouraged individualism amongst employees. Unfortunately, this high degree of freedom combined with the rapid mobilization of PCs and other devices created numerous headaches for asset tracking. At its peak, spending on hardware alone exceeded $100 million per year.

      Results

      Through a comprehensive ITAM implementation, the new asset management program at Cisco has been a resounding success. While employees did have to adjust to new rules, the process as a whole has been streamlined and user-satisfaction levels have risen. Centralized purchasing and a smaller number of hardware platforms have allowed Cisco to cut its hardware spend in half, according to Mark Edmondson, manager of IT services expenses for Cisco Finance.

      This case study continues in phase 1

      The image shows four bars, from bottom to top: 1. Asset Gathering; 2. Asset Distribution; 3. Asset Protection; 4. Asset Data. On the right, there is an arrow pointing upwards labelled ITAM Program Maturity.

      Info-Tech delivers: Use our tools and templates to accelerate your project to completion

      HAM Standard Operating Procedures (SOP)

      HAM Maturity Assessment

      Non-Standard Hardware Request Form

      HAM Visio Process Workflows

      HAM Policy Templates

      HAM Budgeting Tool

      HAM Communication Plan

      HAM Implementation Roadmap Tool

      Measured value for Guided Implementations (GIs)

      Engaging in GIs doesn’t just offer valuable project advice, it also results in significant cost savings.

      GI Measured Value
      Phase 1: Lay Foundations
      • Time, value, and resources saved by using Info-Tech’s tools and templates to assess current state and maturity, plan scope of HAM program, and define roles and metrics.
      • For example, 2 FTEs * 14 days * $80,000/year = $8,615
      Phase 2: Procure & Receive
      • Time, value, and resources saved by using Info-Tech’s tools and templates to build processes for hardware request, procurement, receiving, and deployment.
      • For example, 2 FTEs * 14 days * $80,000/year = $8,615
      Phase 3: Maintain & Dispose
      • Time, value, and resources saved by following Info-Tech’s tools and methodology to build processes and policies for managing and maintaining hardware and disposing or redeploying of equipment.
      • For example, 2 FTE * 14 days * $80,000/year = $8,615
      Phase 4: Plan Implementation
      • Time, value, and resources saved by following Info-Tech’s tools and methodology to select tools, plan the hardware budget, and build a roadmap.
      • For example, 2 FTE * 14 days * $80,000/year = $8,615
      Total savings $25,845

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation overview

      1. Lay Foundations 2. Procure & Receive 3. Maintain & Dispose 4. Budget & Implementation
      Best-Practice Toolkit

      1.1 Assess current state & plan scope

      1.2 Build team & define metrics

      2.1 Request & procure

      2.2 Receive & deploy

      3.1 Manage & maintain

      3.2 Redeploy or dispose

      4.1 Plan budget

      4.2 Communicate & build roadmap

      Guided Implementation
      • Assess current state.
      • Define scope of HAM program.
      • Define roles and metrics.
      • Define standard and non-standard hardware.
      • Build procurement process.
      • Determine asset tagging method and build equipment receiving and deployment processing.
      • Define processes for managing and maintaining equipment.
      • Define policies for maintaining asset security.
      • Build process for redeploying or disposing of assets.
      • Discuss best practices for effectively managing a hardware budget.
      • Build communications plan and roadmap.
      Results & Outcomes
      • Evaluation of current maturity level of HAM
      • Defined scope for the HAM program including list of hardware to track as assets
      • Defined roles and responsibilities
      • Defined and documented KPIs and metrics to meet HAM reporting requirements
      • Defined standard and non- standard requests and processes
      • Defined and documented procurement workflow and purchasing policy
      • Asset tagging method and process
      • Documented equipment receiving and deployment processes
      • MAC policies and workflows
      • Policies and processes for hardware maintenance and asset security
      • Documented workflows for hardware disposal and recovery/redeployment
      • Shortlist of ITAM tools
      • Hardware asset budget plan
      • Communication plan and HAM implementation roadmap

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.comfor more information.

      Phases: Teams, Scope & Hardware Procurement Hardware Procurement and Receiving Hardware Maintenance & Disposal Budgets, Roadmap & Communications
      Duration* 1 day 1 day 1 day 1 day
      * Activities across phases may overlap to ensure a timely completion of the engagement
      Projected Activities
      • Outline hardware asset management goals
      • Review HAM maturity and anticipated milestones
      • Define scope and classify hardware assets
      • Define roles and responsibilities
      • Define metrics and reporting requirements
      • Define standard and non-standard hardware requests
      • Review and document procurement workflow
      • Discuss appropriate asset tagging method
      • Design and document workflow for receiving and inventorying equipment
      • Review/create policy for hardware procurement and receiving
      • Identify data sources and methodology for inventory and data collection
      • Define install/moves/adds/changes (MAC) policy
      • Build workflows to document user MAC processes and design request form
      • Design process and policies for hardware maintenance, warranty, and support documentation handling
      • Design hardware asset recovery and disposal workflows
      • Define budgeting process and review Info-Tech’s HAM Budgeting Tool
      • Develop a communication plan
      • Develop a HAM implementation plan
      Projected Deliverables
      • Standard operating procedures for hardware
      • Visio diagrams for all workflows
      • Workshop summary with milestones and task list
      • Budget template
      • Policy draft

      Phase 1

      Lay Foundations

      Implement Hardware Asset Management

      A centralized procurement process helped cut Cisco’s hardware spend in half

      CASE STUDY

      Industry IT

      Source Cisco Systems, Inc.

      Challenge

      Cisco Systems’ hardware spend was out of control. Peaking at $100 million per year, the technology giant needed to standardize procurement processes in its highly individualized work environment.

      Users had a variety of demands related to hardware and network availability. As a result, data was spread out amongst multiple databases and was managed by different teams.

      Solution

      The IT team at Cisco set out to solve their hardware-spend problem using a phased project approach.

      The first major step was to identify and use the data available within various departments and databases. The heavily siloed nature of these databases was a major roadblock for the asset management program.

      This information had to be centralized, then consolidated and correlated into a meaningful format.

      Results

      The centralized tracking system allowed a single point of contact (POC) for the entire lifecycle of a PC. This also created a centralized source of information about all the PC assets at the company.

      This reduced the number of PCs that were unaccounted for, reducing the chance that Cisco IT would overspend based on its hardware needs.

      There were still a few limitations to address following the first step in the project, which will be described in more detail further on in this blueprint.

      This case study continues in phase 2

      Step 1.1: Assess current state and plan scope

      Phase 1: Assess & Plan

      1.1 Assess current state & plan scope

      1.2 Build team & define metrics

      This step will walk you through the following activities:

      1.1.1 Complete MGD (optional)

      1.1.2 Outline hardware asset management challenges

      1.1.3 Conduct HAM maturity assessment

      1.1.4 Classify hardware assets to define scope of the program

      This step involves the following participants:

      • CIO/CFO
      • IT Director
      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Security (optional)
      • Operations (optional)

      Step Outcomes

      • Understand key challenges related to hardware asset management within your organization to inform program development.
      • Evaluate current maturity level of hardware asset management components and overall program to determine starting point.
      • Define scope for the ITAM program including list of hardware to track as assets.

      Complete the Management & Governance Diagnostic (MGD) to weigh the effectiveness of ITAM against other services

      1.1.1 Optional Diagnostic

      The MGD helps you get the data you need to confirm the importance of improving the effectiveness of your asset management program.

      The MGD allows you to understand the landscape of all IT processes, including asset management. Evaluate all team members’ perceptions of each process’ importance and effectiveness.

      Use the results to understand the urgency to change asset management and its relevant impact on the organization.

      Establish process owners and hold team members accountable for process improvement initiatives to ensure successful implementation and realize the benefits from more effective processes.

      To book a diagnostic, or get a copy of our questions to inform your own survey, visit Info-Tech’s Benchmarking Tools, contact your account manager, or call toll-free 1-888-670-8889 (US) or 1-844-618-3192 (CAN).

      Sketch out challenges related to hardware asset management to shape the direction of the project

      Common HAM Challenges

      Processes and Policies:

      • Existing asset management practices are labor intensive and time consuming
      • Manual spreadsheets are used, making collaboration and automation difficult
      • Lack of HAM policies and standard operating procedures
      • Asset management data is not centralized
      • Lack of clarity on roles and responsibilities for ITAM functions
      • End users don’t understand the value of asset management

      Tracking:

      • Assets move across multiple locations and are difficult to track
      • Hardware asset data comes from multiple sources, creating fragmented datasets
      • No location data is available for hardware
      • No data on ownership of assets

      Security and Risk:

      • No insight into which assets contain sensitive data
      • There is no information on risks by asset type
      • Rogue systems need to be identified as part of risk management best practices
      • No data exists for assets that contain critical/sensitive data

      Procurement:

      • No centralized procurement department
      • Multiple quotes from vendors are not currently part of the procurement process
      • A lack of formal process can create issues surrounding employee onboarding such as long lead times
      • Not all procurement standards are currently defined
      • Rogue purchases create financial risk

      Receiving:

      • No formal process exists, resulting in no assigned receiving location and no assigned receiving role
      • No automatic asset tracking system exists

      Disposal:

      • No insight into where disposed assets go
      • Formal refresh and disposal system is needed

      Contracts:

      • No central repository exists for contracts
      • No insight into contract lifecycle, hindering negotiation effectiveness and pricing optimization

      Outline hardware asset management challenges

      1.1.1 Brainstorm HAM challenges

      Participants

      • CIO/CFO
      • IT Director
      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Security
      • Operations (optional)

      A. As a group, outline the hardware asset management challenges facing the organization.

      Use the previous slide to help you get started. You can use the following headings as a guide or think of your own:

      • Processes and Policies
      • Tracking
      • Procurement
      • Receiving
      • Security and Risk
      • Disposal
      • Contracts

      B. If you get stuck, use the Hardware Asset Management Maturity Assessment Tool to get a quick view of your challenges and maturity targets and kick-start the conversation.

      To be effective with hardware asset management, understand the drivers and potential impact to the organization

      Drivers of effective HAM Results of effective HAM
      Contracts and vendor licensing programs are complex and challenging to administer without data related to assets and their environment. Improved access to accurate data on contracts, licensing, warranties, installed hardware and software for new contracts, renewals, and audit requests.
      Increased need to meet compliance requires a formal approach to tracking and managing assets, regardless of device type. Encryption, hardware tracking and discovery, software application controls, and change notifications all contribute to better asset controls and data security.
      Cost cutting is on the agenda, and management is looking to reduce overall IT spend in the organization in any possible way. Reduction of hardware spend by as much as 5% of the total budget through data for better forecasting and planning.
      Assets with sensitive data are not properly secured, go missing, or are not safely disposed of when retired. Document and enforce security policies for end users and IT staff to ensure sensitive data is properly secured, preventing costs much larger than the cost of only the device.

      Each level of HAM maturity comes with its own unique challenges

      Maturity People & Policies Processes Technology
      Chaos
      • No dedicated staff
      • No policies published
      • Procedures not documented or standardized
      • Hardware not safely secured or tagged
      • Hardware purchasing decisions not based on data
      • Minimal tracking tools in place
      Reactive
      • Semi-focused HAM manager
      • No policies published
      • Reliance on suppliers to provide reports for hardware purchases
      • Hardware standards are enforced
      • Discovery tools and spreadsheets used to manage hardware
      Controlled
      • Full-time HAM manager
      • End-user policies published
      • HAM manager involved in budgeting and planning sessions
      • Inventory tracking is in place
      • Hardware is secured and tagged
      • Discovery and inventory tools used to manage hardware
      • Compliance reports run as needed
      Proactive
      • Extended HAM team, including Help Desk, HR, Purchasing
      • Corporate hardware use policies in place and enforced
      • HAM process integrated with help desk and HR processes
      • More complex reporting and integrated financial information and contracts with asset data
      • Hardware requests are automated where possible
      • Product usage reports and alerts in place to harvest and reuse licenses
      • Compliance and usage reports used to negotiate software contracts
      Optimized
      • HAM manager trained and certified
      • Working with HR, Legal, Finance, and IT to enforce policies
      • Quarterly meetings with ITAM team to review policies, procedures, upcoming contracts, and rollouts; data is reviewed before any financial decisions made
      • Full transparency into hardware lifecycle
      • Aligned with business objectives
      • Detailed savings reports provided to executive team annually
      • Automated policy enforcement and process workflows

      Conduct a hardware maturity assessment to understand your starting point and challenges

      1.1.3 Complete HAM Maturity Assessment Tool

      Complete the Hardware Asset Management Maturity Assessment Tool to understand your organization’s overall maturity level in HAM, as well as the starting maturity level aligned with each step of the blueprint, in order to identify areas of strength and weakness to plan the project. Use this to track progress on the project.

      An effective asset management project has four essential components, with varying levels of management required

      The hardware present in your organization can be classified into four categories of ascending strategic complexity: commodity, inventory, asset, and configuration.

      Commodity items are devices that are low-cost, low-risk items, where tracking is difficult and of low value.

      Inventory is tracked primarily to identify location and original expense, which may be depreciated by Finance. Typically there will not be data on these devices and they’ll be replaced as they lose functionality.

      Assets will need the full lifecycle managed. They are identified by cost and risk. Often there is data on these devices and they are typically replaced proactively before they become unstable.

      Configuration items will generally be tracked in a configuration management database (CMDB) for the purpose of enabling the support teams to make decisions involving dependencies, configurations, and impact analysis. Some data will be duplicated between systems, but should be synchronized to improve accuracy between systems.

      See Harness Configuration Management Superpowers to learn more about building a CMDB.

      Classify your hardware assets to determine the scope and strategy of the program

      Asset: A unique device or configuration of devices that enables a user to perform productive work tasks and has a defined location and ownership attributes.

      • Hardware asset management involves tracking and managing physical components from procurement through to retirement. It provides the base for software asset management and is an important process that can lead to improved lifecycle management, service request fulfillment, security, and cost savings through harvesting and redeployment.
      • When choosing your strategy, focus on those devices that are high cost and high risk/function such as desktops, laptops, servers, and mobile devices.

      ASSET - Items of high importance and may contain data, such as PCs, mobile devices, and servers.

      INVENTORY - Items that require significant financial investment but no tracking beyond its existence, such as a projector.

      COMMODITY - Items that are often in use but are of relatively low cost, such as keyboards or mice.

      Classify your hardware assets to define the scope of the program

      1.1.4 Define the assets to be tracked within your organization

      Participants

      • Participants
      • CIO/CFO
      • IT Director
      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Security (optional)
      • Operations (optional)

      Document

      Document in the Standard Operating Procedures, Section 1 – Overview & Scope

      1. Determine value/risk threshold at which items should be tracked (e.g. over $1,000 and holding data).
      2. Divide a whiteboard or flip chart into three columns: commodity, asset, and inventory.
      3. Divide participants into groups by functional role to brainstorm devices in use within the organization. Write them down on sticky notes.
      4. Place the sticky notes in the column that best describes the role of the product in your organization.

      Align the scope of the program with business requirements

      CASE STUDY

      Industry Public Administration

      Source Client Case Study

      Situation

      A state government designed a process to track hardware worth more than $1,000. Initially, most assets consisted of end-user computing devices.

      The manual tracking process, which relied on a series of Excel documents, worked well enough to track the lifecycle of desktop and laptop assets.

      However, two changes upended the organization’s program: the cost of end-user computing devices dropped dramatically and the demand for network services led to the proliferation of expensive equipment all over the state.

      Complication

      The existing program was no longer robust enough to meet business requirements. Networking equipment was not only more expensive than end-user computing devices, but also more critical to IT services.

      What was needed was a streamlined process for procuring high-cost, high-utility equipment, tracking their location, and managing their lifecycle costs without compromising services.

      Resolution

      The organization decided to formalize, document, and automate hardware asset management processes to meet the new challenges and focus efforts on high-cost, high-utility end-user computing devices only.

      Step 1.2: Build team and define metrics

      Phase 1: Assess & Plan

      1.1 Assess current state & plan scope

      1.2 Build team and define metrics

      This step will walk you through the following activities:

      1.2.1 Define responsibilities for Asset Manager and Asset Administrator

      1.2.2 Use a RACI chart to determine roles within HAM team

      1.2.3 Further clarify HAM responsibilities for each role

      1.2.4 Identify HAM reporting requirements

      This step involves the following participants:

      • CIO/CFO
      • IT Director
      • IT Managers
      • Asset Manager
      • Asset Coordinators
      • ITAM Team
      • Service Desk
      • End-User Device Support Team

      Step Outcomes:

      • Defined responsibilities for Asset Manager and Asset Administrator
      • Documented RACI chart assigning responsibility and accountability for core HAM processes
      • Documented responsibilities for ITAM/HAM team
      • Defined and documented KPIs and metrics to meet HAM reporting requirements

      Form an asset management team to lead the project

      Asset management is an organizational change. To gain buy-in for the new processes and workflows that will be put in place, a dedicated, passionate team needs to jump-start the project.

      Delegate the following roles to team members and grow your team accordingly.

      Asset Manager

      • Responsible for setting policy and governance of process and data accuracy
      • Support budget process
      • Support asset tracking processes in the field
      • Train employees in asset tracking processes

      Asset Administrator

      • The front-lines of asset management
      • Communicates with and supports asset process implementation teams
      • Updates and contributes information to asset databases
      Service Desk, IT Operations, Applications
      • Responsible for advising asset team of changes to the IT environment, which may impact pricing or ability to locate devices
      • Works with Asset Coordinator/Manager to set standards for lifecycle stages
      • The ITAM team should visit and consult with each component of the business as well as IT.
      • Engage with leaders in each department to determine what their pain points are.
      • The needs of each department are different and their responses will assist the ITAM team when designing goals for asset management.
      • Consultations within each department also communicates the change early, which will help with the transition to the new ITAM program.

      Info-Tech Insight

      Ensure that there is diversity within the ITAM team. Assets for many organizations are diverse and the composition of your team should reflect that. Have multiple departments and experience levels represented to ensure a balanced view of the current situation.

      Define the responsibilities for core ITAM/HAM roles of Asset Manager and Asset Administrator

      1.2.1 Use Info-Tech’s job description templates to define roles

      The role of the IT Asset Manager is to oversee the daily and long-term strategic management of software and technology- related hardware within the organization. This includes:

      • Planning, monitoring, and recording software licenses and/or hardware assets to ensure compliance with vendor contracts.
      • Forming procurement strategies to optimize technology spend across the organization.
      • Developing and implementing procedures for tracking company assets to oversee quality control throughout their lifecycles.

      The role of the IT Asset Administrator is to actively manage hardware and software assets within the organization. This includes:

      • Updating and maintaining accurate asset records.
      • Planning, monitoring, and recording software licenses and/or hardware assets to ensure compliance with vendor contracts.
      • Administrative duties within procurement and inventory management.
      • Maintaining records and databases regarding warranties, service agreements, and lifecycle management.
      • Product standardization and tracking.

      Use Info-Tech’s job description templates to assist in defining the responsibilities for these roles.

      Organize your HAM team based on where they fit within the strategic, tactical, and operational components

      Typically the asset manager will answer to either the CFO or CIO. Occasionally they answer to a vendor manager executive. The hierarchy may vary based on experience and how strategic a role the asset manager will play.

      The image shows a flowchart for organizing the HAM team, structured by three components: Strategic (at the top); Tactical (in the middle); and Operational (at the bottom). The chart shows how the job roles flow together within the hierarchy.

      Determine the roles and responsibilities of the team who will support your HAM program

      1.2.2 Complete a RACI

      A RACI chart will identify who should be responsible, accountable, consulted, and informed for each key activity during the consolidation.

      Participants

      • Project Sponsor
      • IT Director, CIO
      • Project Manager
      • IT Managers and Asset Manager(s)
      • ITAM Team

      Document

      Document in the Standard Operating Procedure.

      Instructions:

      1. Write out the list of all stakeholders along the top of a whiteboard. Write out the key initiative steps for the consolidation project along the left side (use this list as a starting point).
      2. For each initiative, identify each team member’s role. Are they:
        • Responsible? The one responsible for getting the job done.
        • Accountable? Only one person can be accountable for each task.
        • Consulted? Involved through input of knowledge and information.
        • Informed? Receive information about process execution and quality.
      3. As you proceed through the initiative, continue to add tasks and assign responsibility to this RACI chart.

      A sample RACI chart is provided on the next slide

      Start with a RACI chart to determine the responsibilities

      1.2.2 Complete a RACI chart for your organization

      HAM Tasks CIO CFO HAM Manager HAM Administrator Service Desk (T1,T2, T3) IT Operations Security Procurement HR Business Unit Leaders Compliance /Legal Project Manager
      Policies and governance A I R I I C I C C I I
      Strategy A R R R R
      Data entry and quality management C I A I C C I I C C
      Risk management and asset security A R C C R C C
      Process compliance auditing A R I I I I I
      Awareness, education, and training I A I I C
      Printer contracts C A C C C R C C
      Hardware contract management A I R R I I R R I I
      Workflow review and revisions I A C C C C
      Budgeting A R C I C
      Asset acquisition A R C C C C I C C
      Asset receiving (inspection/acceptance) I A R R I
      Asset deployment A R R I I
      Asset recovery/harvesting A R R I I
      Asset disposal C A R R I I
      Asset inventory (input/validate/maintain) I I A/R R R R I I I

      Further clarify HAM responsibilities for each role

      1.2.3 Define roles and responsibilities for the HAM team

      Participants

      • Participants IT Asset Managers and Coordinators
      • ITAM Team
      • IT Managers and IT Director

      Document

      1. Discuss and finalize positions to be established within the ITAM/HAM office as well as additional roles that will be involved in HAM.
      2. Review the sample responsibilities below and revise or create responsibilities for each key position within the HAM team.
      3. Document in the HAM Standard Operating Procedures.
      Role Responsibility
      IT Manager
      • Responsible for writing policies regarding asset management and approving final documents
      • Build and revise budget, tracking actual spend vs. budget, seeking final approvals from the business
      • Process definition, communication, reporting and ensuring people are following process
      • Awareness campaign for new policy and process
      Asset Managers
      • Approval of purchases up to $10,000
      • Inventory and contract management including contract review and recommendations based on business and IT requirements
      • Liaison between business and IT regarding software and hardware
      • Monitor and improve workflows and asset related processes
      • Monitor controls, audit and recommend policies and procedures as needed
      • Validate, manage and analyze data as related to asset management
      • Provide reports as needed for decision making and reporting on risk, process effectiveness and other purposes as required
      • Asset acquisition and disposal
      Service Desk
      Desktop team
      Security
      Infrastructure teams

      Determine criteria for success: establish metrics to quantify and demonstrate the results and value of the HAM function

      HAM metrics fall in the following categories:

      HAM Metrics

      • Quantity e.g. inventory levels and need
      • Cost e.g. value of assets, budget for hardware
      • Compliance e.g. contracts, policies
      • Quality e.g. accuracy of data
      • Duration e.g. time to procure or deploy hardware

      Follow a process for establishing metrics:

      1. Identify and obtain consensus on the organization’s ITAM objectives, prioritized if possible.
      2. For each ITAM objective, select two or three metrics in the applicable categories (not all categories will apply to all objectives); be sure to select metrics that are achievable with reasonable effort.
      3. Establish a baseline measurement for each metric.
      4. Establish a method and accountability for ongoing measurement and analysis/reporting.
      5. Establish accountability for taking action on reported results.
      6. As ITAM expands and matures, change or expand the metrics as appropriate.

      Define KPIs and associated metrics

      • Identify the critical success factors (CSFs) for your hardware asset management program based on strategic goals.
      • For each success factor, identify the key performance indicators (KPIs) to measure success and specific metrics that will be tracked and reported on.
      • Sample metrics are below:
      CSF KPI Metrics
      Improve accuracy of IT budget and forecasting
      • Asset costs and value
      • Average cost of workstation
      • Total asset spending
      • Total value of assets
      • Budget vs. spend
      Identify discrepancies in IT environment
      • Unauthorized or failing assets
      • Number of unauthorized assets
      • Assets identified as cause of service failure
      Avoid over purchasing equipment
      • Number of unused and underused computers
      • Number of unaccounted-for computers
      • Money saved from harvesting equipment instead of purchasing new
      Make more-effective purchasing decisions
      • Predicted replacement time and cost of assets
      • Deprecation rate of assets
      • Average cost of maintaining an asset
      • Number of workstations in repair
      Improve accuracy of data
      • Accuracy of asset data
      • Accuracy rate of inventory data
      • Percentage improvement in accuracy of audit of assets
      Improved service delivery
      • Time to deploy new hardware
      • Mean time to purchase new hardware
      • Mean time to deploy new hardware

      Identify hardware asset reporting requirements and the data you need to collect to meet them

      1.2.4 Identify asset reporting requirements

      Participants

      • CIO/CFO
      • IT Director
      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)

      Document

      Document in the Standard Operating Procedures, Section 13: Reporting

      1. Discuss the goals and objectives of implementing or improving hardware asset management, based on challenges identified in Step 1.2.
      2. From the goals, identify the critical success factors for the HAM program
      3. For each CSF, identify one to three key performance indicators to evaluate achievement of the success factor.
      4. For each KPI, identify one to three metrics that can be tracked and reported on to measure success. Ensure that the metrics are tangible and measurable and will be useful for decision making or to take action.
      5. Determine who needs this information and the frequency of reporting.
      6. If you have existing ITAM data, record the baseline metric.
      CSF KPI Metrics Stakeholder/frequency

      Phase 1 Guided Implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Lay Foundations

      Proposed Time to Completion: 4 weeks

      Step 1.1: Assess current state and plan scope

      Start with an analyst kick-off call:

      • Review challenges.
      • Assess current HAM maturity level.
      • Define scope of HAM program.

      Then complete these activities…

      • Complete MGD (optional).
      • Outline hardware asset management challenges.
      • Conduct HAM maturity assessment.
      • Classify hardware assets to define scope of the program.

      With these tools & templates:

      HAM Maturity Assessment

      Standard Operating Procedures

      Step 1.2: Build team and define metrics

      Review findings with analyst:

      • Define roles and responsibilities.
      • Assess reporting requirements.
      • Document metrics to track.

      Then complete these activities…

      • Define responsibilities for Asset Manager and Asset Administrator.
      • Use a RACI chart to determine roles within HAM team.
      • Document responsibilities for HAM roles.
      • Identify HAM reporting requirements.

      With these tools & templates:

      RACI Chart

      Asset Manager and Asset Administrator Job Descriptions

      Standard Operating Procedures

      Phase 1 Results & Insights:

      For asset management to succeed, it needs to support the business. Engage business leaders to determine needs and build your HAM program around these goals.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.4 Classify hardware assets to define scope of the program

      Determine value/risk threshold at which assets should be tracked, then divide a whiteboard into four quadrants representing four categories of assets. Participants write assets down on sticky notes and place them in the appropriate quadrant to classify assets.

      1.2.2 Build a RACI chart to determine responsibilities

      Identify all roles within the organization that will play a part in hardware asset management, then document all core HAM processes and tasks. For each task, assign each role to be responsible, accountable, consulted, or informed.

      Phase 2

      Procure and Receive

      Implement Hardware Asset Management

      Step 2.1: Request and Procure Hardware

      Phase 2: Procure & Receive

      2.1 Request & Procure

      2.2 Receive & Deploy

      This step will walk you through the following activities:

      2.1.1 Identify IT asset procurement challenges

      2.1.2 Define standard hardware requests

      2.1.3 Document standard hardware request procedure

      2.1.4 Build a non-standard hardware request form

      2.1.5 Make lease vs. buy decisions for hardware assets

      2.1.6 Document procurement workflow

      2.1.7 Build a purchasing policy

      This step involves the following participants:

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)
      • CFO or other management representative from Finance

      Step Outcomes:

      • Definition of standard hardware requests for roles, including core vs. optional assets
      • End-user request process for standard hardware
      • Non-standard hardware request form
      • Lease vs. buy decisions for major hardware assets
      • Defined and documented procurement workflow
      • Documented purchasing policy

      California saved $40 million per year using a green procurement strategy

      CASE STUDY

      Industry Government

      Source Itassetmanagement.net

      Challenge

      Signed July 27, 2004, Executive order S-20-04, the “Green Building Initiative,” placed strict regulations on energy consumption, greenhouse gas emissions, and raw material usage and waste.

      In compliance with S-20-04, the State of California needed to adopt a new procurement strategy. Its IT department was one of the worst offenders given the intensive energy usage by the variety of assets managed under the IT umbrella.

      Solution

      A green IT initiative was enacted, which involved an extensive hardware refresh based on a combination of agent-less discovery data and market data (device age, expiry dates, power consumption, etc.).

      A hardware refresh of almost a quarter-million PCs, 9,500 servers, and 100 email systems was rolled out as a result.

      Other changes, including improved software license compliance and data center consolidation, were also enacted.

      Results

      Because of the scale of this hardware refresh, the small changes meant big savings.

      A reduction in power consumption equated to savings of over $40 million per year in electricity costs. Additionally, annual carbon emissions were trimmed by 200,000 tons.

      Improve your hardware asset procurement process to…

      Asset Procurement

      • Standardization
      • Aligned procurement processes
      • SLAs
      • TCO reduction
      • Use of centralized/ single POC

      Standardize processes: Using standard products throughout the enterprise lowers support costs by reducing the variety of parts that must be stocked for onsite repairs or for provisioning and supporting equipment.

      Align procurement processes: Procurement processes must be aligned with customers’ business requirements, which can have unique needs.

      Define SLAs: Providing accurate and timely performance metrics for all service activities allows infrastructure management based on fact rather than supposition.

      Reduce TCO: Management recognizes service infrastructure activities as actual cost drivers.

      Implement a single POC: A consolidated service desk is used where the contact understands both standards (products, processes, and practices) and the user’s business and technical environment.

      Identify procurement challenges to identify process improvement needs

      2.1.1 Identify IT asset procurement challenges

      Participants

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)
      1. As a group, brainstorm existing challenges related to IT hardware requests and procurement.
      2. If you get stuck, consider the common challenges listed below.
      3. Use the results of the discussion to focus on which problems can be resolved and integrated into your organization as operational standards.

      Document hardware standards to speed time to procure and improve communications to users regarding options

      The first step in your procurement workflow will be to determine what is in scope for a standard request, and how non-standard requests will be handled. Questions that should be answered by this procedure include:

      • What constitutes a non-standard request?
      • Who is responsible for evaluating each type of request? Will there be one individual or will each division in IT elect a representative to handle requests specific to their scope of work?
      • What additional security measures need to be taken?
      • Are there exceptions made for specific departments or high-ranking individuals?

      If your end-user device strategy requires an overhaul, schedule time with an Info-Tech analyst to review our blueprint Build an End-User Computing Strategy.

      Once you’ve answered questions like these, you can outline your hardware standards as in the example below:

      Use Case Mobile Standard Mac Standard Mobile Power User
      Asset Lenovo ThinkPad T570 iMac Pro Lenovo ThinkPad P71
      Operating system Windows 10 Pro Mac OSX Windows 10 Pro, 64 bit
      Display 15.6" 21.5" 17.3”

      Memory

      32GB 8GB 64GB
      Processor Intel i7 – 7600U Processor 2.3GHz Xeon E3 v6 Processor
      Drive 500GB 1TB 1TB
      Warranty 3 year 1 year + 2 extended 3 year

      Info-Tech Insight

      Approach hardware standards from a continual improvement frame of mind. Asset management is a dynamic process. Hardware standards will need to adapt over time to match the needs of the business. Plan assessments at routine intervals to ensure your current hardware standards align with business needs.

      Document specifications to meet environmental, security, and manageability requirements

      Determine environmental requirements and constraints.

      Power management

      Compare equipment for power consumption and ability to remotely power down machines when not in use.

      Heat and noise

      Test equipment run to see how hot the device gets, where the heat is expelled, and how much noise is generated. This may be particularly important for users who are working in close quarters.

      Carbon footprint

      Ask what the manufacturer is doing to reduce post-consumer waste and eliminate hazardous materials and chemicals from their products.

      Ensure security requirements can be met.

      • Determine if network/wireless cards meet security requirements and if USB ports can be turned off to prevent removal of data.
      • Understand the level of security needed for mobile devices including encryption, remote shut down or wipe of hard drives, recovery software, or GPS tracking.
      • Decide if fingerprint scanners with password managers would be appropriate to enable tighter security and reduce the forgotten-password support calls.

      Review features available to enhance manageability.

      • Discuss manageability goals with your IT team to see if any can be solved with added features, for example:
        • Remote control for troubleshooting and remote management of data security settings.
        • Asset management software or tags for bar coding, radio frequency identification (RFID), or GPS, which could be used in combination with strong asset management practices to inventory, track, and manage equipment.

      If choosing refurbished equipment, avoid headaches by asking the right questions and choosing the right vendor

      • Is the equipment functional and for how long is it expected to last?
      • How long will the vendor stand behind the product and what support can be expected?
        • This is typically two to five years, but will vary from vendor to vendor.
        • Will they repair or replace machines? Many will just replace the machine.
      • How big is the inventory supply?
        • What kind of inventory does the vendor keep and for how long can you expect the vendor to keep it?
        • How does the vendor source the equipment and do they have large quantities of the same make and model for easier imaging and support?
      • How complete is the refurbishment process?
        • Do they test all components, replace as appropriate, and securely wipe or replace hard drives?
        • Are they authorized to reload MS Windows OEM?
      • Is the product Open Box or used?
        • Open Box is a new product returned back to the vendor. Even if it is not used, the product cannot be resold as a new product. Open Box comes with a manufacturer’s warranty and the latest operating system.
        • If used, how old is the product?

      "If you are looking for a product for two or three years, you can get it for less than half the price of new. I bought refurbished equipment for my call center for years and never had a problem". – Glen Collins, President, Applied Sales Group

      Info-Tech Insight

      Price differences are minimal between large and small vendors when dealing with refurbished machines. The decision to purchase should be based on ability to provide and service equipment.

      Define standard hardware requests, including core and optional assets

      2.1.2 Identify standards for hardware procurement by role

      Participants

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)
      • Representatives from all other areas of the business

      Document

      Document in the Standard Operating Procedures, Section 7: Procurement.

      1. Divide a whiteboard into columns representing all major areas of the business.
      2. List the approximate number of end users present at each tier and record these totals on the board.
      3. Distribute sticky notes. Use two different sizes: large sizes represent critically important hardware and small sizes represent optional hardware.
      4. Define core hardware assets for each division as well as optional hardware assets.
      5. Focus on the small sticky notes to determine if these optional purchases are necessary.
      6. Finalize the group decision to determine the standard hardware procurement for each role in the organization. Record results in a table similar to the example below:
      Department Core Hardware Assets Optional Hardware Assets
      IT PC, tablet, monitor Second monitor
      Sales PC, monitor Laptop
      HR PC, monitor Laptop
      Marketing PC (iMac) Tablet, laptop

      Document procedures for users to make standard hardware requests

      2.1.3 Document standard hardware request procedure

      Participants

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)
      • Representatives from all other areas of the business

      Document

      Document in the Standard Operating Procedures, Section 6: End-User Request Process.

      Discuss and document the end-user request process:

      1. In which cases can users request a primary device?
      2. In which cases can users request a secondary (optional device)?
      3. What justification is needed to approve of a secondary device?
        1. E.g. The request for a secondary device should be via email to the IS Projects and Procurements Officer. This email should outline the business case for why multiple devices are required.
      4. Will a service catalog be available and integrated with an ITAM solution for users to make standard requests? If so, can users also configure their options?
      5. Document the process in the standard operating procedure. Example:

      End-User Request Process

      • Hardware and software will be purchased through the user-facing catalog.
      • Peripherals will be ordered as needed.
      • End-user devices will be routed to business managers for approval prior to fulfillment by IT.
      • Requests for secondary devices must be accompanied by a business case.
      • Equipment replacements due to age will be managed through IT replacement processes.

      Improve the process for ordering non-standard hardware by formalizing the request process, including business needs

      2.1.4 Build a non-standard hardware request form

      • Although the goal should be to standardize as much as possible, this isn’t always possible. Ensure users who are requesting non-standard hardware have a streamlined process to follow that satisfies the justifications for increased costs to deliver.
      • Use Info-Tech’s template to build a non-standard hardware request form that may be used by departments/users requesting non-standard hardware in order to collect all necessary information for the request to be evaluated, approved, and sent to procurement.
      • Ensure that the requestor provides detailed information around the equipment requested and the reason standard equipment does not suffice and includes all required approvals.
      • Include instructions for completing and submitting the form as well as expected turnaround time for the approval process.

      Info-Tech Insight

      Include non-standard requests in continual improvement assessment. If a large portion of requests are for non-standard equipment, it’s possible the hardware doesn’t meet the recommended requirements for specialized software in use with many of your business users. Determine if new standards need to be set for all users or just “power users.”

      Identify the information you need to collect to ensure a smooth purchasing process

      Categories Peripherals Desktops/Laptops Servers
      Financial
      • Operational expenses
      • Ordered for inventory with the exceptions of monitors that will be ordered as needed
      • Equipment will be purchased through IT budget
      • Capital expenses
      • Ordered as needed…
      • Inventory kept for…
      • End-user devices will be purchased through departmental budgets
      • Capital expenses
      • Ordered as needed to meet capacity or stability requirements
      • Devices will be purchased through IT budgets
      Request authorization
      • Any user can request
      • Users who are traveling can purchase and expense peripherals as needed, with manager approvals
      • Tier 3 technicians
      Required approvals
      • Manager approvals required for monitors
      • Infrastructure and applications manager up to [$]
      • CIO over [$]
      Warranty requirements
      • None
      • Three years
      • Will be approved with project plan
      Inventory requirements
      • Minimum inventory at each location of 5 of each: mice, keyboards, cables
      • Docking stations will be ordered as needed
      • Laptops (standard): 5
      • Laptops (ultra light): 1
      • Desktops: 5
      • Inventory kept in stock as per DR plan
      Tracking requirements
      • None
      • Added to ITAM database, CMDB
      • Asset tag to be added to all equipment
      • Added to ITAM database, CMDB

      Info-Tech Best Practice

      Take into account the possibility of encountering taxation issues based on where the equipment is being delivered as well as taxes imposed or incurred in the location from which the asset was shipped or sent. This may impact purchasing decisions and shipping instructions.

      Develop a procurement plan to get everyone in the business on the same page

      • Without an efficient and structured process around how IT purchases are budgeted and authorized, maverick spending and dark procurement can result, limiting IT’s control and visibility into purchases.
      • The challenge many IT departments face is that there is a disconnect between meeting the needs of the business and bringing in equipment according to existing policies and procedures.
      • The asset manager should demonstrate how they can bridge the gaps and improve tracking mechanisms at the same time.

      Improve procurement decisions:

      • Demonstrate how technology is a value-add.
      • Make a clear case for the budget by using the same language as the rest of the business.
      • Quantify the output of technology investments in tangible business terms to justify the cost.
      • Include the refresh cycle in the procurement plan to ensure mission- critical systems will include support and appropriate warranty.
      • Plan technology needs for the future and ensure IT technology will continue to meet changing needs.
      • Synchronize redundant organizational procurement chains in order to lower cost.

      Document the following in your procurement procedure:

      • Process for purchase requests
      • Roles and responsibilities, including requestors and approvers
      • Hardware assets to purchase and why they are needed
      • Timelines for purchase
      • Process for vendors

      Info-Tech Insight

      IT procurement teams are often heavily siloed from ITAM teams. The procurement team is typically found in the finance department. One way to bridge the gap is to implement routine, reliable reporting between departments.

      Determine if it makes sense to lease or buy your equipment; weigh the pros and cons of leasing hardware

      Pros

      • Keeps operational costs low in the short term by containing immediate cost.
      • Easy, predictable payments makes it easier to budget for equipment over long term.
      • Get the equipment you need to start doing business right away if you’re just starting out.
      • After the leasing term is up, you can continue the lease and update your hardware to the latest version.
      • Typical leases last 2 or 3 years, meaning your hardware can get upgrades when it needs it and your business is in a better position to keep up with technology.
      • Leasing directly from the vendor provides operational flexibility.
      • Focus on the business and let the vendor focus on equipment service and updates as you don’t have to pay for maintenance.
      • Costs structured as OPEX.

      Cons

      • In the long term, leasing is almost always more expensive than buying because there’s no equity in leased equipment and there may be additional fees and interest.
      • Commitment to payment through the entire lease period even if you’re not using the equipment anymore.
      • Early termination fees if you need to get out of the lease.
      • No option to sell equipment once you’re finished with it to make money back.
      • Maintenance is up to leasing company’s specifications.
      • Product availability may be limited.

      Recommended for:

      • Companies just starting out
      • Business owners with limited capital or budget
      • Organizations with equipment that needs to be upgraded relatively often

      Weigh the pros and cons of purchasing hardware

      Pros

      • Complete control over assets.
      • More flexible and straightforward procurement process.
      • Tax incentives: May be able to fully deduct the cost of some newly purchased assets or write off depreciation for computers and peripherals on taxes.
      • Preferable if your equipment will not be obsolete in the next two or three years.
      • You can resell the asset once you don’t need it anymore to recover some of the cost.
      • Customization and management of equipment is easier when not bound by terms of leasing agreement.
      • No waiting on vendor when maintenance is needed; no permission needed to make changes.

      Cons

      • High initial cost of investment with CAPEX expense model.
      • More paperwork.
      • You (as opposed to vendor) are responsible for equipment disposal in accordance with environmental regulations.
      • You are responsible for keeping up with upgrades, updates, and patches.
      • You risk ending up with out-of-date or obsolete equipment.
      • Hardware may break after terms of warranty are up.

      Recommended for:

      • Established businesses
      • Organizations needing equipment with long-term lifecycles

      Make a lease vs. buy decision for equipment purchases

      2.1.4 Decide whether to purchase or lease

      Participants

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)
      • Representatives from all other areas of the business

      Document

      Document policy decisions in the Standard Operating Procedures – Section 7: Procurement

      1. Identify hardware equipment that requires a purchase vs. lease decision.
      2. Discuss with Finance whether it makes sense to purchase or lease each major asset, considering the following:
      • Costs of equipment through each method
      • Tax deductions
      • Potential resale value
      • Potential revenue from using the equipment
      • How quickly the equipment will be outdated or require refresh
      • Size of equipment
      • Maintenance and support requirements
      • Overall costs
    • The leasing vs. buying decision should take considerable thought and evaluation to make the decision that best fits your organizational needs and situation.
    • Determine appropriate warranty and service-level agreements for your organization

      Determine acceptable response time, and weigh the cost of warranty against the value of service.

      • Standard warranties vary by manufacturer, but are typically one or three years.
      • Next-day, onsite service may be part of the standard offering or may be available as an uplift.
      • Four-hour, same-day service can also be added for high availability needs.
      • Extended warranties can be purchased beyond three years, although not many organizations take advantage of this offering.
      • Other organizations lower or remove the warranty and have reported savings of as much as $150 per machine.

      Speak to your partner to see how they can help the process of distributing machines.

      • Internal components change frequently with laptops and desktops. If purchasing product over time rather than buying in bulk, ensure the model will be available for a reasonable term to reduce imaging and support challenges.
      • Determine which services are important to your organization and request these services as part of the initial quote. If sending out a formal RFQ or RFP, document required services and use as the basis for negotiating SLAs.
      • Document details of SLA, including expectations of services for manufacturer, vendor, and internal team.
      • If partner will be providing services, request they stock an appropriate number of hot spares for frequently replaced parts.
      • If self-certifying, review resource capabilities, understand skill and certification requirements; for example, A+ certification may be a pre-requisite.
      • Understand DOA policy and negotiate a “lemon policy,” meaning if product dies within 15 or 30 days it can be classified as DOA. Seek clarity on return processes.

      Consider negotiation strategies, including how and when to engage with different partners during acquisition

      Direct Model

      • Dell’s primary sales model is direct either through a sales associate or through its e-commerce site. Promotions are regularly listed on the website, or if customization is required, desktops and laptops have some flexibility in configuration. Discounts can be negotiated with a sales rep on quantity purchases, but the discount level changes based on the model and configuration.
      • Other tier-one manufacturers typically sell direct only from their e-commerce sites, providing promotions based on stock they wish to move, and providing some configuration flexibility. They rely heavily on the channel for the majority of their business.

      Channel Model

      • Most tier one manufacturers have processes in place to manage a smaller number of partners rather than billing and shipping out to individual customers. Deviating from this process and dealing direct with end customers can create order processing issues.
      • Resellers have the ability to negotiate discounts based on quantities. Discounts will vary based on model, timing (quarter or year end), and quantity commitment.
      • Negotiations on large quantities should involve a manufacturer rep as well as the reseller to clearly designate roles and services, ensure processes are in place to fulfill your needs, and agree on pricing scheme. This will prevent misunderstandings and bring clarity to any commitments.
      • Often the channel partners are authorized to provide repair services under warranty for the manufacturer.
      • Dell also uses the channel model for distribution where customers demand additional services.

      Expect discounts to reflect quantity and method of purchase

      Transaction-based purchases will receive the smallest discounting.

      • Understand requirements to find the most appropriate make and model of equipment.
      • Prepare a forecast of expected purchases for the year and discuss discounting.
      • Typically initial discounts will be 3-5% off suggested retail price.
      • Once a history is in place, and the vendor is receiving regular orders, it may extend deeper discounts.

      Bulk purchases will receive more aggressive discounting of 5-15% off suggested retail price, depending on quantities.

      • Examine shipping options and costs to take advantage of bulk deliveries; in some cases vendors may waive shipping fees as an extension of the discounting.
      • If choosing end-of-line product, ensure appropriate quantity of a single model is available to efficiently roll out equipment.
      • Various pricing models can be used to obtain best price.

      Larger quantities rolled out over time will require commitments to the manufacturer to obtain deepest discounts.

      • Discuss all required services as part of negotiation to ensure there are no surprise charges.
      • Several pricing models can be used to obtain the best price.
        • Suggested retail price minus as much as 20%.
        • Cost plus 3% up to 10% or more.
        • Fixed price based on negotiating equipment availability with budget requirements.

      If sending out to bid, determine requirements and scoring criteria

      It’s nearly impossible to find two manufacturers with the exact same specifications, so comparisons between vendors is more art than science.

      New or upgraded components will be introduced into configurations when it makes the most sense in a production cycle. This creates a challenge in comparing products, especially in an RFP. The best way to handle this is to:

      • Define and document minimum technology requirements.
      • Define and document service needs.
      • Compare vendors to see if they’ve met the criteria or not; if yes, compare prices.
      • If the vendors have included additional offerings, see if they make sense for your organization. If they do, include that in the scoring. If not, exclude and score based on price.
      • Recognize that the complexity of the purchase will dictate the complexity of scoring.

      "The hardware is the least important part of the equation. What is important is the warranty, delivery, imaging, asset tagging, and if they cannot deliver all these aspects the hardware doesn’t matter." – Doug Stevens, Assistant Manager Contract Services, Toronto District School Board

      Document and analyze the hardware procurement workflow to streamline process

      The procurement process should balance the need to negotiate appropriate pricing with the need to quickly approve and fulfill requests. The process should include steps to follow for approving, ordering, and tracking equipment until it is ready for receipt.

      Within the process, it is particularly important to decide if this is where equipment is added into the database or if it will happen upon receipt.

      A poorly designed procurement workflow:

      • Includes many bottlenecks, stopping and starting points.
      • May impact project and service requests and requires unrealistic lead times.
      • May lead to lost productivity for users and lost credibility for the IT department.

      A well-designed hardware procurement workflow:

      • Provides reasonable lead times for project managers and service or hardware request fulfillment.
      • Provides predictability for technical resources to plan deployments.
      • Reduces bureaucracy and workload for following up on missing shipments.
      • Enables improved documentation of assets to start lifecycle management.

      Info-Tech Insight

      Where the Hardware Asset Manager is unable to affect procurement processes to reduce time to deliver, consider bringing inventory onsite or having your hardware vendor keep stock, ready to ship on demand. Projects, replacements, and new-user requests cannot be delayed in a service-focused IT organization due to bureaucratic processes.

      Document and analyze your procurement workflow to identify opportunities for improvement and communicate process

      Determine if you need one workflow for all equipment or multiples for small vs. large purchases.

      Occasionally large rollouts require significant changes from lower dollar purchases.

      Watch for:

      • Back and forth communications
      • Delays in approvals
      • Inability to get ETAs from vendors
      • Too many requests for quotes for small purchases
      • Entry into asset database

      This sample can be found in the HAM Process Workflows.

      The image shows a workflow, titled Procurement-Equipment-Small Quantity. On the left, the chart is separated into categories: IT Procurment; Tier 2 or Tier 3; IT Director; CIO.

      Design the process workflow for hardware procurement

      2.1.6 Illustrate procurement workflow with a tabletop exercise

      Participants

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)
      • CFO or other management representative from Finance

      Document

      Document in the Standard Operating Procedures, Section 7: Procurement

      1. In a group, distribute sticky notes or cue cards.
      2. Designate a space on the table/whiteboard to plot the workflow.
      3. Determine which individuals are responsible for handling non-standard requests. Establish any exceptions that may apply to your defined hardware standard.
      4. Gather input from Finance on what the threshold will be for hardware purchases that will require further approval.
      5. Map the procurement process for a standard hardware purchase.
      6. If applicable, map the procurement process for a non-standard request separately.
      7. Evaluate the workflow to identify any areas of inefficiency and make any changes necessary to improve the process.
      8. Be sure to discuss and include:
        • All necessary approvals
        • Time required for standard equipment process
        • Time required for non-standard equipment process
        • How information will be transferred to ITAM database

      Document and share an organizational purchasing policy

      2.1.7 Build a purchasing policy

      A purchasing policy helps to establish company standards, guidelines, and procedures for the purchase of all information technology hardware, software, and computer-related components as well as the purchase of all technical services.

      The policy will ensure that all purchasing processes are consistent and in alignment with company strategy. The purchasing policy is key to ensuring that corporate purchases are effective and the best value for money is obtained.

      Implement a purchasing policy to prevent or reduce:

      • Costly corporate conflict of interest cases.
      • Unauthorized purchases of non-standard, difficult to support equipment.
      • Unauthorized purchases resulting in non-traceable equipment.
      • Budget overruns due to decentralized, equipment acquisition.

      Download Info-Tech’s Purchasing Policytemplate to build your own purchasing policy.

      Step 2.2: Receive and Deploy Hardware

      Phase 2: Procure & Receive

      2.1 Request & Procure

      2.2 Receive & Deploy

      This step will walk you through the following activities:

      2.2.1 Select appropriate asset tagging method

      2.2.2 Design workflow for receiving and inventorying equipment

      2.2.3 Document the deployment workflow(s)

      This step involves the following participants:

      • Asset Manager
      • Purchasing
      • Receiver (optional)
      • Service Desk Manager
      • Operations (optional)

      Step Outcomes:

      • Understanding of the pros and cons of various asset tagging methods
      • Defined asset tagging method, process, and location by equipment type
      • Identified equipment acceptance, testing, and return procedures
      • Documented equipment receiving and inventorying workflow
      • Documented deployment workflows for desktop hardware and large-scale deployments

      Cisco implemented automation to improve its inventory and deployment system

      CASE STUDY

      Industry Networking

      Source Cisco IT

      Challenge

      Although Cisco Systems had implemented a centralized procurement location for all PCs used in the company, inventory tracking had yet to be addressed.

      Inventory tracking was still a manual process. Given the volume of PCs that are purchased each year, this is an incredibly labor-intensive process.

      Sharing information with management and end users also required the generation of reports – another manual task.

      Solution

      The team at Cisco recognized that automation was the key component holding back the success of the inventory management program.

      Rolling out an automated process across multiple offices and groups, both nationally and internationally, was deemed too difficult to accomplish in the short amount of time needed, so Cisco elected to outsource its PC management needs to an experienced vendor.

      Results

      As a result of the PC management vendor’s industry experience, the implementation of automated tracking and management functions drastically improved the inventory management situation at Cisco.

      The vendor helped determine an ideal leasing set life of 30 months for PCs, while also managing installations, maintenance, and returns.

      Even though automation helped improve inventory and deployment practices, Cisco still needed to address another key facet of asset management: security.

      This case study continues in phase 3.

      An effective equipment intake process is critical to ensure product is correct, documented, and secured

      Examine your current process for receiving assets. Typical problems include:

      Receiving inventory at multiple locations can lead to inconsistent processes. This can make invoice reconciliation challenging and result in untracked or lost equipment and delays in deployment.

      Equipment not received and secured quickly. Idle equipment tends to go missing if left unsupervised for too long. Missed opportunities to manage returns where equipment is incorrect or defective.

      Disconnect between procurement and receiving where ETAs are unknown or incorrect. This can create an issue where no one is prepared for equipment arrival and is especially problematic on large orders.

      How do you solve these problems? Create a standardized workflow that outlines clear steps for asset receiving.

      A workflow will help to answer questions such as:

      • How do you deal with damaged shipments? Incorrect shipments?
      • Did you reach an agreement with the vendor to replace damaged/incorrect shipments within a certain timeframe?
      • When does the product get tagged and entered into the system as received?
      • What information needs to get captured on the asset tag?

      Standardize the process for receiving your hardware assets

      The first step in effective hardware asset intake is establishing proper procedures for receiving and handling of assets.

      Process: Start with information from the procurement process to determine what steps need to follow to receive into appropriate systems and what processes will enable tagging to happen as soon as possible.

      People: Ensure anyone who may impact this process is aware of the importance of documenting before deployment. Having everyone who may be handling equipment on board is key to success.

      Security: Equipment will be secured at the loading dock or reception. It will need to be secured as inventory and be secured if delivering directly to the bench for imaging. Ensure all receiving activities are done before equipment is deployed.

      Tools: A centralized ERP system may already provide a place to receive and reconcile with purchasing and invoicing, but there may still be a need to receive directly into the ITAM and/or CMDB database rather than importing directly from the ERP system.

      Tagging: A variety of methods can be used to tag equipment to assist with inventory. Consider the overall lifecycle management when determining which tagging methods are best.

      Info-Tech Insight

      Decentralized receiving doesn’t have to mean multiple processes. Take advantage of enterprise solutions that will centralize the data and ensure everyone follows the same processes unless there is an uncompromising and compelling logistical reason to deviate.

      Evaluate the pros and cons of different asset tagging methods

      Method Cost Strengths Weaknesses Recommendation
      RFID with barcoding – asset tag with both a barcode and RFID solution $$$$
      • Secure, fast, and robust
      • Track assets in real time
      • Quick and efficient
      • Most expensive option, requiring purchase of barcode scanner with RFID reader and software)
      • Does not work as well in an environment with less control over assets
      • Requires management of asset database
      • Best in a controlled environment with mature processes and requirement for secure assets
      RFID only – small chip with significant data capacity $$$
      • Track assets from remote locations
      • RFID can be read through boxes so you don’t have to unpack equipment
      • Scan multiple RFID-tagged hardware simultaneously
      • Large data capacity on small chip
      • Expensive, requiring purchase of RFID reading equipment and software
      • Ideal if your environment is spread over multiple locations
      Barcoding only – adding tags with unique barcodes $$
      • Reasonable security
      • Report inventory directly to database
      • Relatively low cost
      • Only read one at a time
      • Need to purchase barcode scanners and software
      • Can be labor intensive to deploy with manual scanning of individual assets
      • Less secure
      • Can’t hold as much data
      • Not as secure as barcodes with RFID but works for environments that are more widely distributed and less controlled

      Evaluate the pros and cons of different asset tagging methods

      Method Cost Strengths Weaknesses Recommendation
      QR codes – two-dimensional codes that can store text, binary, image, or URL data $$
      • Easily scannable from many angles
      • Save and print on labels
      • Can be read by barcode scanning apps or mobile phones
      • Can encode more data than barcodes
      • QR codes need to be large enough to be usable, which can be difficult with smaller IT assets
      • Scanning on mobile devices takes longer than scanning barcodes
      • Ideal if you need to include additional data and information in labels and want workers to use smartphones to scan labels
      Manual tags – tag each asset with your own internal labels and naming system $
      • Most affordable
      • Manual
      • Tags are not durable
      • Labor intensive and time consuming
      • Leaves room for error, misunderstanding, and process variances between locations
      • As this is the most time consuming and resource intensive with a low payoff, it is ideal for low maturity organizations looking for a low-cost option for tagging assets
      Asset serial numbers – tag assets using their serial number $
      • Less expensive
      • Unique serial numbers identified by vendor
      • Serial numbers have to be added to database manually, which is labor intensive and leaves room for error
      • Serial numbers can rub off over time
      • Hard to track down already existing assets
      • Doesn’t help track location of assets after deployment
      • Potential for duplicates
      • Inconsistent formats of serial numbers by manufacturers makes this method prone to error and not ideal for asset management

      Select the appropriate method for tagging and tracking your hardware assets

      2.2.1 Select asset tagging method

      Participants

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)

      Document

      Document in the Standard Operating Procedures, Section 8

      1. Define your asset tagging method. For most organizations, asset tracking is done via barcoding or QR codes, either by using one method or a combination of the two. Other methods, including RFID, may be applicable based on cost or tracking complexity. Overall, barcodes embedded with RFID are the most robust and efficient method for asset tagging, but also the most expensive. Choose the best method for your organization, taking into account affordability, labor-intensiveness, data complexity needs, and ease of deployment.
      2. Define the process for tagging assets, including how soon they should receive the tag, whose responsibility it is, and whether the tag type varies depending on the asset type.
      3. Define the location of asset tags according to equipment type. Example:
      Asset Type Asset Tag Location
      PC desktop Right upper front corner
      Laptop Right corner closest to user when laptop is closed
      Server Right upper front corner
      Printer Right upper front corner
      Modems Top side, right corner

      Inspect and test equipment before accepting it into inventory to ensure it’s working according to specifications

      Upon receipt of procured hardware, validate the equipment before accepting it into inventory.

      1. Receive - Upon taking possession of the equipment, stage them for inspection before placing them into inventory or deploying for immediate use.
      2. Inspect - The inspection process should involve at minimum examining the products that have been delivered to determine conformance to purchase specifications.
      3. Test -Depending on the type and cost of hardware, some assets may benefit from additional testing to determine if they perform at a satisfactory level before being accepted.
      4. Accept - If the products conform to the requirements of the purchase order, acknowledge receipt so the supplier may be paid. Most shipments are automatically considered as accepted and approved for payment within a specific timeframe.

      Assign responsibility and accountability for inspection and acceptance of equipment, verifying the following:

      • The products conform to purchase order requirements.
      • The quantity ordered is the same as the quantity delivered.
      • There is no damage to equipment.
      • Delivery documentation is acceptable.
      • Products are operable and perform according to specifications.
      • If required, document an acceptance testing process as a separate procedure.

      Build the RMA procedure into the receiving process to handle receipt of defective equipment

      The return merchandise authorization (RMA) process should be a standard part of the receiving process to handle the return of defective materials to the vendor for either repair or replacement.

      If there is a standard process in place for all returns in the organization, you can follow the same process for returning hardware equipment:

      • Call the vendor to receive a unique RMA number that will be attached to the equipment to be returned, then follow manufacturer specifications for returning equipment within allowable timelines according to the contract where applicable.
      • Establish a lemon policy with vendors, allowing for full returns up to 30 days after equipment is deployed if the product proves defective after initial acceptance.

      Info-Tech Insight

      Make sure you’re well aware of the stipulations in your contract or purchase order. Sometimes acceptance is assumed after 60 days or less, and oftentimes the clock starts as soon as the equipment is shipped out rather than when it is received.

      Info-Tech Best Practice

      Keep in mind that the serial number on the received assed may not be the asset that ultimately ends up on the user’s desk if the RMA process is initiated. Record the serial number after the RMA process or add a correction process to the workflow to ensure the asset is properly accounted for.

      Determine what equipment should be stocked for quick deployment where demand is high or speed is crucial

      The most important feature of your receiving and inventory process should be categorization. A well-designed inventory system should reflect not only the type of asset, but also the usage level.

      A common technique employed by asset managers is to categorize your assets using an ABC analysis. Assets are classified as either A, B, or C items. The ratings are based on the following criteria:

      A

      A items have the highest usage. Typically, 10-20% of total assets in your inventory account for upwards of 70-80% of the total asset requests.

      A items should be tightly controlled with secure storage areas and policies. Avoiding stock depletion is a top priority.

      B

      B items are assets that have a moderate usage level, with around 30% of total assets accounting for 15-25% of total requests.

      B items must be monitored; B items can transition to A or C items, especially during cycles of heavier business activity.

      C

      C items are assets that have the lowest usage, with upwards of 50% of your total inventory accounting for just 5% of total asset requests.

      C items are reordered the least frequently, and present a low demand and high risk for excessive inventory (especially if they have a short lifecycle). Many organizations look to move towards an on-demand policy to mitigate risk.

      Info-Tech Insight

      Get your vendor to keep stock of your assets. If large quantities of a certain asset are required but you lack the space to securely store them onsite, ask your vendor to keep stock for you and release as you issue purchase orders. This speeds up delivery and delays warranty activation until the item is shipped. This does require an adherence to equipment standards and understanding of demand to be effective.

      Define the process for receiving equipment into inventory

      Define the following in your receiving process:

      • When will equipment be opened once delivered?
      • Who will open and validate equipment upon receipt?
      • How will discrepancies be resolved?
      • When will equipment be tagged and identified in the tracking tool?
      • When will equipment be locked in secure storage?
      • Where will equipment go if it needs to be immediately deployed?

      The image shows a workflow chart titled Receiving and Tagging. The process is split into two sections, labelled on the left as: Desktop Support Team and Procurement.

      Design the workflow for receiving and inventorying equipment

      2.2.2 Illustrate receiving workflow with a tabletop exercise

      Participants

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)
      • CFO or other management representative from Finance

      Document

      Document in the Standard Operating Procedures, Section 8: Receiving and Equipment Inventory

      Option 1: Whiteboard

      1. Discuss the workflow and draw it on the whiteboard.
      2. Assess whether you are using the best workflow. Modify it if necessary.
      3. Use the sample workflow from this step as a guide if starting from scratch.
      4. Engage the team in refining the process workflow.
      5. Transfer data to Visio and add to the SOP.

      Option 2: Tabletop Exercise

      1. Distribute index cards to each member of the team.
      2. Have each person write a single task they perform on the index card. Be granular. Include the title or the name of the person responsible.
      3. Mark cards that are decision points. Use a card of a different color or use a marker to make a colored dot.
      4. Arrange the index cards in order, removing duplicates.
      5. Assess whether you are using the best workflow. Engage the team to refine it if necessary.
      6. Transfer data to Visio and add to the SOP.

      Improve device deployment by documenting software personas for each role

      • Improve the deployment process for new users by having a comprehensive list of software used by common roles within the organization. With large variations in roles, it may be impossible to build a complete list, but as you start to see patterns in requirements, you may find less distinct personas than anticipated.
      • Consider a survey to business units to determine what they need if this will solve some immediate problems. If this portion of the project will be deferred, use the data uncovered in the discovery process to identify which software is used by which roles.
      • Replacement equipment can have the software footprint created by what was actually utilized by the user, not necessarily what software was installed on the previous device.

      The image shows 4 bubbles, representing software usage. The ARC-GIS bubble is the largest, Auto CAD the second largest, and MS Office and Adobe CS equal in size.

      A software usage snapshot for an urban planner/engineer.

      • Once software needs are determined, use this information to review the appropriate device for each persona.
        • Ensure hardware is appropriate for the type of work the user does and supports required software.
        • If it is more appropriate for a user to have a tablet, ensure the software they use can be used on any device.
      • Review deployment methods to determine if there is any opportunity to improve the imaging or software deployment process with better tools or methodologies.
      • Document the device’s location if it will be static, or if the user may be more mobile, add location information for their primary location.
      • Think about the best place to document – if this information can be stored in Active Directory and imported to the ITAM database, you can update once and use in multiple applications. But this process is built into your add/move/change workflows.

      Maintain a lean library to simplify image management

      Simplify, simplify, simplify. Use a minimal number of desktop images and automate as much as you can.

      • Embrace minimalism. When it comes to managing your desktop image library, your ultimate goal should be to minimize the manual effort involved in provisioning new desktops.
      • Less is more. Try to maintain as few standard desktop images as possible and consider a thin gold image, which can be patched and updated on a regular basis. A thin image with efficient application deployment will improve the provisioning process.
      • Standardize and repeat. System provisioning should be a repeatable process. This means it is ripe for standardization and automation. Look at balancing the imaging process with software provisioning, using group policy and deployment tools to reduce time to provision and deliver equipment.
      • Outsource where appropriate. Imaging is one of the most employed services, where the image is built in-house and deployed by the hardware vendor. As a minimum, quarterly updates should still be provided to integrate the latest patches into the operating system.

      Document the process workflow for hardware deployment

      Define the process for deploying hardware to users.

      Include the following in your workflow:

      • How will equipment be configured and imaged before deployment?
      • Which images will be used for specific roles?
      • Which assets are assigned to specific roles?
      • How will the device status be changed in the ITAM tool once deployed?

      The image shows a workflow chart titled Hardware Deployment. It is divided into two categories, listed on the left: Desktop Support Team and Procurement.

      Large-scale deployments should be run as projects, benefitting from economies of scale in each step

      Large-scale desktop deployments or data center upgrades will likely be managed as projects.

      These projects should include project plans, including resources, timelines, and detailed procedures.

      Define the process for large-scale deployment if it will differ from the regular deployment process.

      The image is a graphic of a flowchart titled Deployment-Equipment-Large Quantity Rollout. It is divided into three categories, listed on the left: IT Procurement; Desktop Rollout Team; Asset Manager.

      Document the deployment workflow(s)

      2.2.3 Document deployment workflows for desktop and large-scale deployment

      Participants

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Operations (optional)
      • CFO or other management representative from Finance

      Document

      Document in the Standard Operating Procedures, Section 9: Deployment

      Document each step in the system deployment process with notecards or on a whiteboard. Identify the challenges faced by your organization and strategize potential solutions.

      1. Outline each step in the process of desktop deployment. Be as granular as possible. On each card, describe the step as well as the individual responsible for it.
      2. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
      3. Examine each challenge or pain point. Discuss whether or not there is a clear solution to the problem. If yes, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, taking into account people, processes, and available technology.
      4. Document separately the process for large-scale deployment if required.

      Look for opportunities to improve the request and deployment process with better communication and tools

      The biggest challenge in deploying equipment is meeting expectations of the business, and without cooperation from multiple departments, this becomes significantly more difficult.

      • Work with the procurement and the services team to ensure inventory is accessible, and regularly validate that inventory levels in the ITAM database are accurate.
      • Work with the HR department to predict (where possible) anticipated new hires. Plan for inventory ebbs and flows to match the hiring timelines where there are large variations.
      • If service catalogs will be made available for communicating options and SLAs for equipment purchases, work with the service catalog administrators to automate inventory checks and notifications. Work with the end-user device managers to set standards and reduce equipment variations to a manageable amount.
      • Where deployments are part of equipment refresh, ensure data is up to date for the services team to plan the project rollouts and know which software should be redeployed with the devices.
      • Infrastructure and security teams may have specific hardware assets relating to networking, data centers, and security, which may bypass the end-user device workflows but need to be tagged and entered into inventory early in the process. Work with these teams to have their equipment follow the same receiving and inventory processes. Deployment will vary based on equipment type and location.

      Automate hardware deployment where users are dispersed and deployment volume is high

      Self-serve kiosks (vending machines) can provide cost reductions in delivery of up to 25%. Organizations that have a high distribution rate are seeing reductions in cost of peripherals averaging 30-35% and a few extreme cases of closer to 85%.

      Benefits of using vending machines:

      • Secure equipment until deployed.
      • Equipment can be either purchased by credit card or linked to employee ID cards, enabling secure transactions and reporting.
      • Access rights can be controlled in real time, preventing terminated employees from accessing equipment or managing how many devices can be deployed to each user.
      • Vending machines can be managed through a cellular or wireless network.
      • Technology partners can be tasked with monitoring and refilling vending machines.
      • Employees are able to access technology wherever a vending machine can be located rather than needing to travel to the help desk.
      • Equipment loans and new employee packages can be managed through vending machines.

      Phase 2 Guided Implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Request, Procure, Receive, and Deploy

      Proposed Time to Completion: 4 weeks

      Step 2.1: Request & Procure

      Start with an analyst kick-off call:

      • Define standard and non-standard hardware.
      • Weigh the pros and cons of leasing vs. buying.
      • Build the procurement process.

      Then complete these activities…

      • Define standard hardware requests.
      • Document standard hardware request procedure.
      • Document procurement workflow.
      • Build a purchasing policy.

      With these tools & templates:

      • Standard Operating Procedures
      • Non-Standard Hardware Request Form
      • Hardware Procurement Workflow
      • Purchasing Policy

      Step 2.2: Receive & Deploy

      Review findings with analyst:

      • Determine appropriate asset tagging method.
      • Define equipment receiving process.
      • Define equipment deployment process.

      Then complete these activities…

      • Select appropriate asset tagging method.
      • Design workflow for receiving and inventorying equipment.
      • Document the deployment workflow(s).

      With these tools & templates:

      • Standard Operating Procedures
      • Equipment Receiving & Tagging Workflow
      • Deployment Workflow

      Phase 2 Insight: Bridge the gap between IT and Finance to build a smoother request and procurement process through communication and routine reporting. If you’re unable to affect procurement processes to reduce time to deliver, consider bringing inventory onsite or having your hardware vendor keep stock, ready to ship on demand.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.2 Define standard hardware requests

      Divide whiteboard into columns representing core business areas. Define core hardware assets for end users in each division along with optional hardware assets. Discuss optional assets to narrow and define standard equipment requests.

      2.2.1 Select appropriate method for tagging and tracking assets

      Discuss the various asset tagging methods and choose the tagging method that is most appropriate for your organization. Define the process for tagging assets and document the standard asset tag location according to equipment type.

      Phase 3

      Maintain and Dispose

      Implement Hardware Asset Management

      Cisco overcame organizational resistance to change to improve asset security

      CASE STUDY

      Industry Networking

      Source Cisco IT

      Challenge

      Cisco Systems had created a dynamic work environment that prized individuality. This environment created high employee satisfaction, but it also created a great deal of risk surrounding device security.

      Cisco lacked an asset security policy; there were no standards for employees to follow. This created a surplus of not only hardware, but software to support the variety of needs amongst various teams at Cisco.

      Solution

      The ITAM team at Cisco recognized that their largest problem was the lack of standardization with respect to PCs. Variance in cost, lifecycle, and software needs/compatibility were primary issues.

      Cisco introduced a PC leasing program with the help of a PC asset management vendor to correct these issues. The primary goal was to increase on-time returns of PCs. A set life of 30 months was defined by the vendor.

      Results

      Cisco engaged employees to help contribute to improving its asset management protocols, and the approach worked.

      On-time returns increased from 60% to 80%. Costs were reduced due to active tracking and disposal of any owned assets still present.

      A reduction in hardware and software platforms has cut costs and increased security thanks to improved tracking capabilities.

      This case study continues in phase 4

      Step 3.1: Manage, Maintain, and Secure Hardware Assets

      Phase 3: Maintain & Dispose

      3.1 Manage & Maintain

      3.2 Dispose or Redeploy

      This step will walk you through the following activities:

      3.1.1 Build a MAC policy and request form

      3.1.2 Build workflows to document user MAC processes

      3.1.3 Design process and policies for hardware maintenance, warranty, and support documentation handling

      3.1.4 Revise or create an asset security policy

      This step involves the following participants:

      • Asset Manager
      • Service Desk Manager
      • Operations (optional)
      • Security Department

      Step Outcomes

      • Understanding of inventory management process best practices
      • Templates for move/add/change request policy and form
      • Documented process workflows for the user move/add/change process
      • Process and policies for hardware maintenance, warranty, and support documentation handling
      • Defined policies for maintaining asset security

      Determine methods for performing inventory audits on equipment

      Auto-discovery

      • Auto-discovery tools will be crucial to the process of understanding what equipment is connected to the network and in use.
      • The core functionality of discovery tools is to scan the environment and collect configuration data from all connected assets, but most tools can also be used to collect usage data, network monitoring, and software asset management data including software distribution, compliance, and license information.
      • These tools may not connect to peripheral devices such as monitors and external drives, will not scan devices that are turned off or disconnected from the network, may not inventory remote users, and will rarely provide location information. This often results in a need to complete physical audits as well.

      Info-Tech Insight

      One of the most common mistakes we see when it comes to asset management is to assume that the discovery tool will discovery most or all of your inventory and do all the work. It is better to assume only 80-90% coverage by the discovery tool and build ownership records to uncover the unreportable assets that are not tied into the network.

      Physical audit

      • The physical audit can be greatly improved with barcode, RFID, or QR codes, allowing items to be scanned, records opened, then updated.
      • If not everything is tagged or entered into the ITAM database, then searching closets, cabinets, and desk drawers may be required to tag and enter those devices into the database.
      • Provide the inventory team with exact instructions on what needs to be collected, verified, and recorded. Depending on the experience and thoroughness of the team, spot checks early in the process may alleviate quality issues often discovered at the end of the inventory cycle.

      Determine requirements for performing inventory audits on equipment

      Conduct an annual hardware audit to ensure hardware is still assigned to the person and location identified in your ITAM system, and assess its condition.

      Perform a quarterly review of hardware stock levels in order to ensure all equipment is relevant and usable. The table below is an example of how to organize this information.

      Item Target Stock Levels Estimated $ Value
      Desktop computers
      Standard issue laptops
      Mice
      Keyboards
      Network cables
      Phones

      Info-Tech Insight

      Don’t forget about your remotely deployed assets. Think about how you plan to inventory remotely deployed equipment. Some tools will allow data collection through an agent that will talk to the server over the internet, and some will completely ignore those assets or provide a way to manually collect the data and email back to the asset manager. Mobile device management tools may also help with this inventory process. Determine what is most appropriate based on the volume of remote workers and devices.

      Build an inventory management process to maintain an accurate view of owned hardware assets

      • Your inventory should capture which assets are on hand, where they are located, and who owns them, at minimum. Maintaining an accurate, up-to-date view of owned hardware assets allows you to see at any time the actual state of the components that make up your infrastructure across the enterprise.
      • Automated inventory practices save time and effort from doing physical inventories and also reduce the interruption to business users while improving accuracy of data.
      • If you are just starting out, define the process for conducting an inventory of deployed assets, and then define the process for regular upkeep and audit of inventory data.

      Inventory Methods

      • Electronic – captures networked asset information only and can be deployed over the network with no deskside service interaction.
      • Physical – captures environmental detail and must be performed manually by a service technician with possible disruption to users.
      • Full inventory – both physical and electronic inventory of assets.

      Internal asset information to collect electronically

      • Hardware configuration
      • Installed software
      • Operating system
      • System BIOS
      • Network configuration
      • Network drive mappings
      • Printer setups
      • System variables

      External asset information that cannot be detected electronically

      • Assigned user
      • Associated assets
      • Asset/user location
      • Usage of asset
      • Asset tag number

      IMAC (Install, Move, Add, Change) services will form the bulk of asset management work while assets are deployed

      IMAC services are usually performed at a user’s deskside by a services technician and can include:

      • Installing new desktops or peripherals
      • Installing or modifying software
      • Physically moving an end user’s equipment
      • Upgrading or adding components to a desktop

      Specific activities may include:

      Changes

      • Add new user IDs
      • Manage IDs
      • Network changes
      • Run auto-discovery scan

      Moves

      • Perform new location site survey
      • Coordinate with facilities
      • Disconnect old equipment
      • Move to new location
      • Reconnect at new location
      • Test installed asset
      • Obtain customer acceptance
      • Close request

      Installs and Adds

      • Perform site survey
      • Perform final configuration
      • Coordinate with Facilities
      • Asset tagging
      • Transfer data from old desktop
      • Wipe old desktop hard drive
      • Test installed asset
      • Initiate auto-discovery scan
      • Obtain customer acceptance
      • Close request

      A strong IMAC request process will lessen the burden on IT asset managers

      • When assets are actively in use, Asset Managers must also participate in the IMAC (Install-Move-Add-Change) process and ensure that any changes to asset characteristics or locations are updated and tracked in the asset management tool and that the value and usefulness of the asset is monitored.
      • The IMAC process should not only be reactive in response to requests, but proactive to plan for moves and relocations during any organizational change events.

      Recommendations:

      Automate. Wherever possible, use tools to automate the IMAC process.

      E-forms, help desk, ticketing, or change management software can automate the request workflow by allowing the requestor to submit a request ticket that can then be automatically assigned to a designated team member according to the established chain of command. As work is completed, the ticket can be updated, and the requestor will be able to check the status of the work at any time.

      Communicate the length of any downtime associated with execution of the IMAC request to lessen the frustration and impatience among users.

      Involve HR. When it comes to adding or removing user accounts, HR can be a valuable resource. As most new employees should be hired through HR, work with them to improve the onboarding process with enough advanced notice to set up accounts and equipment. Role changes with access rights and software modifications can benefit from improved communications. Review the termination process as well, to secure data and equipment.

      Build a MAC request policy and form for end users

      A consistent Move, Add, Change (MAC) request process is essential for lessening the burden on the IT department. MAC requests are used to address any number of tasks, including:

      • Relocation of PCs and/or peripherals.
      • New account setup.
      • Hardware or software upgrades.
      • Equipment swaps or replacements.
      • User account/access changes.
      • Document generation.
      • User acceptance testing.
      • Vendor coordination.

      Create a request form.

      If you are not using help desk or other ticketing software, create a request template that must be submitted for each MAC. The request should include:

      • The name and department of the requester.
      • The date of the request.
      • Severity of the request. For example, severity can be graded on a score of high, medium, or low where high represents a mission-critical change that could compromise business continuity if not addressed immediately, and low represents a more cosmetic change that will not negatively affect operations. The severity of the request can be determined by the service-level agreement (SLA) associated with the service.
      • Date the request must be completed by. Or at least, what would be the ideal date for completion. This will vary greatly depending on the severity of the request. For example, deleting the access of a terminated employee would be very time sensitive.
      • Item or service to be moved, added, or changed. Include location, serial number, or other designated identifier where possible.
      • If the item or service is to be moved, indicated where it is being moved.
      • It is a good idea to include a comments section where the requester can add any additional questions or details.

      Use Info-Tech’s templates to build your MAC policy and request form

      3.1.1 Build a MAC policy and request form

      Desktop Move/Add/Change Policy

      This desktop move/add/change policy should be put in place to mitigate the risk associated with unauthorized changes, minimize disruption to the business, IT department, and end users, and maintain consistent expectations.

      Move, Add, Change Request Form

      Help end users navigate the move/add/change process. Use the Move/Add/Change Request Form to increase efficiency and organization for MAC requests.

      Document the process for user equipment moves

      Include the following in your process documentation:

      • How and when will any changes to user or location information be made in the ITAM tool?
      • Will any changes in AD automatically update in the ITAM tool?
      • How should requests for equipment moves or changes be made?
      • How will resources be scheduled?

      The image shows a flowchart titled SErvice Request - User Moves. The chart of processes is split into three categories, listed on the left side of the chart: User Manager; IT Coordinator; and Tier 2 & Facilities.

      Build workflows to document user MAC processes

      3.1.2 Build MAC process workflows

      Participants

      • Asset Manager
      • Service Desk Manager
      • Operations (optional)

      Document

      Document in the Standard Operating Procedures, Section 10: Equipment Install, Adds, Moves, and Changes

      Document each step in the system deployment process using notecards or on a whiteboard. Identify the challenges faced by your organization and strategize potential solutions.

      1. Outline each step in the process of desktop deployment. Be as granular as possible. On each card, describe the step as well as the individual responsible for each step.
      2. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
      3. Examine each challenge or pain point. Discuss whether or not there is a clear solution to the problem. If so, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, taking into account people, processes, and available technology.
      4. Document separately the process for large-scale deployment if required.

      Define a policy to ensure effective maintenance of hardware assets

      Effective maintenance and support of assets provides longer life, higher employee productivity, and increased user satisfaction.

      • Your asset management documentation and database should store equipment maintenance contract information so that it can be consulted whenever hardware service is required.
      • Record who to contact as well as how, warranty information, and any SLAs that are associated with the maintenance agreement.
      • Record all maintenance that hardware equipment receives, which will be valuable for evaluating asset and supplier performance.
      • In most cases, the Service Desk should be the central point of contact for maintenance calls to all suppliers.

      Sample equipment maintenance policy terms:

      • Maintenance and support arrangements are required for all standard and non-standard hardware.
      • All onsite hardware should be covered by onsite warranty agreements with appropriate response times to meet business continuity needs.
      • Defective items under warranty should be repaired in a timely fashion.
      • Service, maintenance, and support shall be managed through the help desk ticketing system.

      Design process and policies for hardware maintenance, warranty, and support documentation handling

      3.1.3 Design process for hardware maintenance

      Participants

      • Asset Manager
      • Purchasing
      • Service Desk Manager
      • Security
      • Operations (optional)

      Document

      Document in the Standard Operating Procedures, Section 10

      1. Discuss and document the policy for hardware maintenance, warranty, and support.
      2. Key outcomes should include:
      • Who signs off on policies?
      • What is the timeline for documentation review?
      • Where are warranty and maintenance documents stored?
      • How will equipment be assessed for condition during audits?
      • How often will deployed equipment be reimaged?
      • How will equipment repair needs be requested?
      • How will repairs for equipment outside warranty be handled?
    • Document in the Standard Operating Procedure.
    • Use your HAM program to improve security and meet regulatory requirements

      ITAM complements and strengthens security tools and processes, improving the company’s ability to protect its data and systems and reduce operational risk.

      It’s estimated that businesses worldwide lose more than $221 billion per year as a result of security breaches. HAM is one important factor in securing data, equipment investment, and meeting certain regulatory requirements.

      How does HAM help keep your organization secure?

      • Educating users on best practices for securing their devices, and providing physical security such as cable locks and tracking mechanisms.
      • Best practices for reporting lost or stolen equipment for quickly removing access and remotely wiping devices.
      • Accurate location and disposal records will enable accurate reporting for HIPAA and PCI DSS audits where movement of media or hardware containing data is a requirement. Best practices for disposal will include properly wiping drives, recording information, and ensuring equipment is disposed of according to environmental regulations.
      • Secure access to data through end-user mobile devices. Use accurate records and MDM tools to securely track, remove access, and wipe mobile devices if compromised.
      • Encrypt devices that may be difficult to track such as USB drives or secure ports to prevent data from being copied to external drives.
      • Managed hardware allows software to be managed and patched on a regular basis.

      Best Practices

      1. Educate end users about traveling with equipment. Phones and laptops are regularly stolen from cars; tablets and phones are left on planes. Encourage users to consider how they store equipment on the way home from work.
      2. Cable locks used at unsecured offsite or onsite work areas should be supplied to employees.
      3. Equipment stored in IT must be secured at all times.

      Implement mobile device management (MDM) solutions

      Organizations with a formal mobile management strategy have fewer problems with their mobile devices.

      Develop a secure MDM to:

      • Provide connection and device support when the device is fully subsidized by the organization to increase device control.
      • Have loaner devices for when traveling to limit device theft or data loss.
      • Personal devices not managed by MDM should be limited to internet access on a guest network.
      • Limit personal device access to only internet access or a limited zone for data access and a subset of applications.
      • Advanced MDM platforms provide additional capabilities including containerization.

      The benefits of a deployed MDM solution:

      • Central management of a variety of devices and platforms is the most important advantage of MDM. Administrators can gain visibility into device status and health, set policies to groups of users, and control who has access to what.
      • Security features such as enforcing passcodes and remote wipe are also essential, given the increased risk of mobile devices.
        • Remote wipe should be able to wipe either the whole device or just selected areas.
      • Separation of personal data is becoming increasingly important as BYOD becomes the norm. This is a feature that vendors are approaching radically differently.
      • Device lock: Be able to lock the device itself, its container, or its SIM. Even if the SIM is replaced, the device should still remain locked. Consider remote locking a device if retrieval is possible.

      Mobile device management is constantly evolving to incorporate new features and expand to new control areas. This is a high-growth area that warrants constant up-to-date knowledge on the latest developments.

      What can be packed into an MDM can vary and be customized in many forms for what your organization needs.

      Secure endpoint devices to protect the data you cannot control

      Endpoint Encryption

      Endpoints Average None
      Desktop 73% 4%
      Laptops 65% 9%
      Smartphones 27% 28%
      Netbooks 26% 48%
      Tablets 16% 59%
      Grand average 41%

      Benefits from endpoint encryption:

      • Reduced risk associated with mobile workers.
      • Enabled sharing of data in secured workspace.
      • Enhanced end-user accountability.
      • Reduced number of data breach incidents.
      • Reduced number of regulatory violations.

      Ways to reduce endpoint encryption costs:

      • Use multiple vendors (multiple platforms): 33%
      • Use a single vendor (one platform): 40%
      • Use a single management console: 22%
      • Outsource to managed service provider: 26%
      • Permit user self-recovery: 26%

      Remote Wiping

      • If all else fails, a device can always be erased of all its data, protecting sensitive data that may have been on it.
      • Selective wipe takes it a step further by erasing only sensitive data.

      Selective wipe is not perfect.

      It is nearly impossible to keep the types of data separate, even with a sandbox approach. Selective wipe will miss some corporate data, and even a full remote wipe can only catch some of users’ increasingly widely distributed data.

      Selective wipe can erase:

      • Corporate profiles, email, and network settings.
      • Data within a corporate container or other sandbox.
      • Apps deployed across the enterprise.

      Know when to perform a remote wipe.

      Not every violation of policy warrants a wipe. Playing Candy Crush during work hours probably does not warrant a wipe, but jail breaking or removing a master data management client can open up security holes that do warrant a wipe.

      Design an effective asset security policy to protect the business

      Data security is not simply restricted to compromised software. In fact, 70% of all data breaches in the healthcare industry since 2010 are due to device theft or loss, not hacking. (California Data Breach Report – October, 2014) ITAM is not just about tracking a device, it is also about tracking the data on the device.

      Organizations often struggle with the following with respect to IT asset security:

      • IT hardware asset removal control.
      • Personal IT hardware assets (BYOD).
      • Data removal from IT hardware assets.
      • Inventory control with respect to leased hardware and software.
      • Unused software.
      • Repetitive versions of software.
      • Unauthorized software.

      Your security policy should seek to protect IT hardware and software that:

      • Have value to the business.
      • Require ongoing maintenance and support.
      • Create potential risk in terms of financial loss, data loss, or exposure.

      These assets should be documented and controlled in order to meet security requirements.

      The asset security policy should encompass the following:

      • Involved parties.
      • Hardware removal policy/documentation procedure.
      • End-user asset security responsibilities.
      • Theft/loss reporting procedure.
      • BYOD standards, procedures, and documentation requirements.
      • Data removal.
      • Software usage.
      • Software installation.

      Info-Tech Insight

      Hardware can be pricey; data is priceless. The cost of losing a device is minimal compared to the cost of losing data contained on a device.

      Revise or create an asset security policy

      3.1.4 Develop IT asset security policy

      Participants

      • CIO or IT Director
      • Asset Manager
      • Service Desk Manager
      • Security
      • Operations (optional)

      Document

      Document in the Asset Security Policy.

      1. Identify asset security challenges within your organization. Record them in a table like the one below.
      Challenge Current Security Risk Target Policy
      Hardware removal Secure access and storage, data loss Designated and secure storage area
      BYOD No BYOD policy in place N/A → phasing out BYOD as an option
      Hardware data removal Secure data disposal Data disposal, disposal vendor
      Unused software Lack of support/patching makes software vulnerable Discovery and retirement of unused software
      Unauthorized software Harder to track, less secure Stricter stance on pirated software
      1. Brainstorm the reasons for why these challenges exist.
      2. Identify target policy details that pertain to each challenge. Record the outcomes in section(s) 5.1, 5.2, or 5.3 of the Asset Security Policy.

      Poor asset security and data protection had costly consequences for UK Ministry of Justice

      CASE STUDY

      Industry Legal

      Source ICO

      Challenge

      The Ministry of Justice (MoJ) in the UK had a security problem: hard drives that contained sensitive prisoner data were unencrypted and largely unprotected for theft.

      These hard drives contained information related to health, history of drug use, and past links to organized crime.

      After two separate incidents of hard drive theft that resulted in data breaches, the Information Commissioner’s Office (ICO), stepped in.

      Solution

      It was determined that after the first hard drive theft in October 2011, replacement hard drives with encryption software were provisioned to prisons managed by the MoJ.

      Unfortunately, the IT security personnel employed by the MoJ were unaware that the encryption software required manual activation.

      When the second hard drive theft occurred, the digital encryption could not act as a backup to poor physical security (the hard drive was not secured in a locker as per protocol).

      Results

      The perpetrators were never found and the stolen hard drives were never recovered.

      As a result of the two data breaches, the MoJ had to implement costly security upgrades to its data protection system.

      The ICO fined the MoJ £180,000 for its repeated security breaches. This costly fine could have been avoided if more diligence was present in the MoJ’s asset management program.

      Step 3.2: Dispose or Redeploy Assets

      3.1 Manage & Maintain

      3.2 Dispose or Redeploy

      This step will walk you through the following activities:

      3.2.1 Identify challenges with IT asset recovery and disposal

      3.2.2 Design hardware asset recovery and disposal workflows

      3.2.3 Build a hardware asset disposition policy

      This step involves the following participants:

      • Infrastructure Director/Manager
      • Asset Manager
      • Service Desk Manager
      • Operations (optional)

      Step Outcomes:

      • Defined process to determine when to redeploy vs. dispose of hardware assets
      • Process for recovering and redeploying hardware equipment
      • Process for safely disposing of assets that cannot be redeployed
      • Comprehensive asset disposition policy

      Balance the effort to roll out new equipment against the cost to maintain equipment when building your lifecycle strategy

      The image shows two line graphs. The graph on the left is titled: Desktop Refresh Rate by Company Size (based on Revenue). The graph on the right is titled: Laptop Refresh Rate by Company Size (based on Revenue). Each graph has four lines, defined by a legend in the centre of the image: yellow is small ($25mm); dark blue is Mid ($25-500MM); light blue is large ( data-verified=$500MM); and orange is Overall.">

      (Info-Tech Research Group; N=96)

      Determining the optimal length of time to continue to use equipment will depend on use case and equipment type

      Budget profiles Refresh methods

      Stretched

      Average equipment age: 7+ years

      To save money, some organizations will take a cascading approach, using the most powerful machines for engineers or scientists to ensure processing power, video requirements and drives will meet the needs of their applications and storage needs; then passing systems down to departments who will require standard-use machines. The oldest and least powerful machines are either used as terminals or disposed.

      Generous

      Average equipment age: 3 years

      Organizations that do not want to risk user dissatisfaction or potential compatibility or reliability issues will take a more aggressive replacement approach. These organizations often have less people assigned to end-user device maintenance and will not repair equipment outside of warranty. There is little variation in processing power among devices, with major differences determined by mobility and operating system.

      Cautious

      Average equipment age: 4 to 5 years

      Organizations that fit between the other two profiles will look to stretch the budget beyond warranty years, but will keep a close eye on maintenance requirements. Repairs needed outside of warranty will require an eye to costs, efforts, and subsequent administrative work of loaning equipment to keep the end user productive while waiting on service.

      Recommendations to keep users happy and equipment in prime form is to check condition at the 2-3 year mark, reimage at least once to improve performance, and have backup machines, if equipment starts to become problematic.

      Build a process to determine when and how to redeploy or dispose of hardware assets at end of use

      • When equipment is no longer needed for the function or individual to whom it was assigned, the Hardware Asset Manager needs to use data to ensure the right decision is made as to what to do with the asset.
      • End of use involves evaluating options for either continuing to use the equipment in another capacity or by another individual or determining that the asset has no remaining value to the organization in any capacity and it is time to retire it.
      • If the asset is retired, it may still have capacity for continued use outside of the organization or it may be disposed.

      Redeployment

      • Deliver the asset to a new user if it is no longer needed by the original user but still has value and usability.
      • Redeployment saves money and prevents unnecessary purchases.
      • Common when employees leave the company or a merge or acquisition changes the asset pool.

      VS.

      Disposal

      • When an asset is no longer of use to the organization, it may be disposed of.
      • Need to consider potential financial and public relations considerations if disposal is not done according to environmental legislation.
      • Need to ensure proper documentation and data removal is built into disposition policy.

      Use persistent documentation and communication to improve hardware disposal and recovery

      Warning! Poor hardware disposal and recovery practices can be caused by the following:

      1. Your IT team is too busy and stretched thin. Data disposal is one of many services your IT team is likely to have to deal with, but this service requires undivided attention. By standardizing hardware refreshes, you can instill more predictability with your hardware life cycles and better manage disposal.
      2. Poor inventory management. Outdated data and poor tracking practices can result in lost assets during the disposal phase. It only takes a single lost asset to cause a disastrous data breach in your supply chain.
      3. Obliviousness to disposal regulations. Electronic disposal and electronically stored data are governed by strict regulation.

      How do you improve your hardware disposal and recovery process?

      • A specific, controlled process needs to be in place to wipe all equipment and verify that it’s been wiped properly. Otherwise, companies will continue to spend money to protect data while equipment is in use, but overlook the dangerous implications of careless IT asset disposal. Create a detailed documentation process to track your assets every step of the way to ensure that data and applications are properly disposed of. Detailed documentation can also help bolster sustainability reporting for organizations wishing to track such data.
      • Better communication should be required. Most decommissioning or refresh processes use multiple partners for manufacturing, warehousing, data destruction, product resale, and logistics. Setting up and vetting these networks can take years, and even then, managing them can be like playing a game of telephone; transparency is key.

      Address three core challenges of asset disposal and recovery

      Asset Disposal

      Data Security

      Sixty-five percent of organizations cite data security as their top concern. Many data breaches are a result of hardware theft or poor data destruction practices.

      Choosing a reputable IT disposal company or data removal software is crucial to ensuring data security with asset disposal.

      Environmental

      Electronics contain harmful heavy metals such as mercury, arsenic, and cadmium.

      Disposal of e-waste is heavily regulated, and improper disposal can result in hefty fines and bad publicity for organizations.

      Residual value

      Many obsolete IT assets are simply confined to storage at their end of life.

      This often imposes additional costs with maintenance or storage fees and leaves a lot of value on the table through assets that could be sold or re-purposed within the organization.

      Identify challenges with IT asset recovery and disposal with a triple bottom line scorecard

      3.2.1 Identify challenges with IT asset recovery and disposal

      Participants

      • Infrastructure Director/Manager
      • Asset Manager
      • Service Desk Manager
      • Operations (optional)
      1. Divide the whiteboard into three boxes: Social, Economic, and Environmental.
      2. Divide each box into columns like the one shown below:
      Economic
      Challenge Objectives Targets Initiatives
      No data capture during disposal Develop reporting standards 80% disposed assets recorded Work with Finance to develop reporting procedure
      Idle assets Find resale market/dispose of idle assets 50% of idle assets disposed of within the year Locate resale vendor and disposal service
      1. Ask participants to list challenges associated with each area.
      2. Once challenges facing recovery and disposal have been exhausted from the group, assign a significance of 1-5 (1 being the lowest and 5 being the highest) to each challenge.
      3. Discuss the most significant challenges and how they might be addressed through the next steps of building recovery & disposal processes.

      Build a process for recovery and redeployment of hardware

      • Having hardware standards in place makes redeploying easier by creating a larger pool of possible users for a standardized asset.
      • Most redeployment activities will be carried out by the Help Desk as a service request ticket, so it is important to have clear communication and guidelines with the Help Desk as to which tasks need to be carried out as part of the request.

      Ensure the following are addressed:

      • Where will equipment be stored before being redeployed?
      • Will shipping be required and are shipping costs factored into analysis?
      • Ensure equipment is cleaned before it is redeployed.
      • Do repairs and reconfigurations need to be made?
      • How will software be removed and licenses harvested and reported to Software Asset Manager?
      • How will data be securely wiped and protected?

      The image shows a work process in flowchart format titled Equipment Recovery. The chart is divided into two sections, listed on the left: Business Manager/HR and Desktop Support Team.

      Define the process for safely disposing of assets that cannot be redeployed

      Asset Disposal Checklist

      1. Review the data stored on the device.
      2. Determine if there has been any sensitive or confidential information stored.
      3. Remove all sensitive/confidential information.
      4. Determine if software licenses are transferable.
      5. Remove any non- transferable software prior to reassignment.
      6. Update the department’s inventory record to indicate new individual assigned custody.
      7. In the event of a transfer to another department, remove data and licensed software.
      8. If sensitive data has been stored, physically destroy the storage device.
      • Define the process for retiring and disposing of equipment that has reached replacement age or no longer meets minimum conditions or standards.
      • Clearly define the steps that need to be taken both before and after the involvement of an ITAD partner.

      The image shows a flowchart titled Equipment Disposal. It is divided into two sections, labelled on the left as: Desktop Support Team and Asset Manager.

      Design hardware asset recovery and disposal workflows

      3.2.2 Design hardware asset recovery and disposal policies and workflows

      Participants

      • Infrastructure Director/Manager
      • Asset Manager
      • Service Desk Manager
      • Operations (optional)

      Document

      Document in the Standard Operating Procedures, Sections 11 and 12

      Document each step in the recovery and disposal process in two separate workflows using notecards or on a whiteboard. Identify the challenges faced by your organization and strategize potential solutions.

      1. Keeping in mind current challenges around hardware asset recovery and disposal, design the target state for both the asset recovery and disposal processes.
      2. Outline each step of the process and be as granular as possible.
      3. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
      4. Examine each challenge or pain point. Discuss whether or not there is a clear solution to the problem. If so, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, taking into account people, processes, and available technology.
      5. Review the checklists on the previous slides to ensure all critical tasks are accounted for in your process workflows.

      Add equipment disposition to asset lifecycle decisions to meet environmental regulations and mitigate risk

      Although traditionally an afterthought in asset management, IT asset disposition (ITAD) needs to be front and center. Increase focus on data security and concern surrounding environmental sustainability and develop an awareness of the cost efficiencies possible through best-practices disposition.

      Optimized ITAD solutions:

      1. Protect sensitive or valuable data
      2. Support sustainability
      3. Focus on asset value recovery

      Info-Tech Insight

      A well-thought-out asset management program mitigates risk and is typically less costly than dealing with a large-scale data loss incident or an inappropriate disposal suit. Also, it protects your company’s reputation – which is difficult to put a price on.

      Partner with an ITAD vendor to support your disposition strategy

      Maximizing returns on assets requires knowledge and skills in asset valuation, upgrading to optimize market return, supply chain management, and packaging and shipping. It’s unlikely that the return will be adequate to justify that level of investment, so partnering with a full-service ITAD vendor is a no-brainer.

      • An ITAD vendor knows the repurpose and resale space better than your organization. They know the industry and have access to more potential buyers.
      • ITAD vendors can help your organization navigate costly environmental regulations for improper disposal of IT assets.

      Disposal doesn’t mean your equipment has to go to waste.

      Additionally, your ITAD vendor can assist with a large donation of hardware to a charitable organization or a school.

      Donating equipment to schools or non-profits may provide charitable receipts that can be used as taxable benefits.

      Before donating:

      • Ensure equipment is needed and useful to the organization.
      • Be prepared for an appraisal requirement. Receipts can only be issued for fair market value.
      • Prevent compromised data by thoroughly wiping or completely replacing drives.
      • Ensure official transfer of ownership to prevent liability if improper disposal practices follow.

      Info-Tech Insight

      Government assistance grants may be available to help keep your organization’s hardware up to date, thereby providing incentives to upgrade equipment while older equipment still has a useful life.

      Protect the organization by sufficiently researching potential ITAD partners

      Research ITAD vendors as diligently as you would primary hardware vendors.

      Failure to thoroughly investigate a vendor could result in a massive data breach, fines for disposal standards violations, or a poor resale price for your disposed assets. Evaluate vendors using questions such as the following:

      • Are you a full-service vendor or are you connected to a wholesaler?
      • Who are your collectors and processors?
      • How do you handle data wiping? If you erase the data, how many passes do you perform?
      • What do you do with the e-waste? How much is reused? How much is recycled?
      • Do you have errors and omissions insurance in case data is compromised?
      • How much will it cost to recycle or dispose of worthless equipment?
      • How much will I receive for assets that still have useful life?

      ITAD vendors that focus on recycling will bundle assets to ship to an e-waste plant – leaving money on the table.

      ITAD vendors with a focus on reuse will individually package salable assets for resale – which will yield top dollars.

      Info-Tech Insight

      To judge the success of a HAM overhaul, you need to establish a baseline with which to compare final results. Be sure to take HAM “snapshots” before ITAD partnering so it’s easy to illustrate the savings later.

      Work with ITAD partner or equipment supplier to determine most cost-effective method and appropriate time for disposal

      2-4 Two-to-four year hardware refresh cycle

      • Consider selling equipment to an ITAD partner who specializes in sales of refurbished equipment.
      • Consider donating equipment to schools or non-profits, possibly using an ITAD partner who specializes in refurbishing equipment and managing the donation process.

      5-7 Five-to-seven year hardware refresh cycle

      • At this stage equipment may still have a viable life, but would not be appropriate for school or non-profit donations, due to a potentially shorter lifespan. Consider selling equipment to an ITAD partner who has customers interested in older, refurbished equipment.

      7+ Seven or more years hardware refresh cycle

      • If keeping computers until they reach end of life, harvest parts for replacement on existing machines and budget for disposal fees.
      • Ask new computer supplier about disposal services or seek out ITAD partner who will disassemble and dispose of equipment in an environmentally responsible manner.

      Info-Tech Insight

      • In all cases, ensure hard drives are cleansed of data with no option for data recovery. Many ITAD partners will provide a drive erasure at DoD levels as part of their disposal service.
      • Many ITAD partners will provide analysts to help determine the most advantageous time to refresh.

      Ensure data security and compliance by engaging in reliable data wiping before disposition

      Failure to properly dispose of data can not only result in costly data breaches, but also fines and other regulatory repercussions. Choosing an ITAD vendor or a vendor that specializes in data erasure is crucial. Depending on your needs, there are a variety of data wiping methods available.

      Certified data erasure is the only method that leaves the asset’s hard drive intact for resale or donation. Three swipes is the bare minimum, but seven is recommended for more sensitive data (and required by the US Department of Defense). Data erasure applications may be destructive or non-destructive – both methods overwrite data to make it irretrievable.

      Physical destruction must be done thoroughly, and rigorous testing must be done to verify data irretrievability. Methods such as hand drilling are proven to be unreliable.

      Degaussing uses high-powered magnets to erase hard drives and makes them unusable. This is the most expensive option; degaussing devices can be purchased or rented.

      Info-Tech Best Practice

      Data wiping can be done onsite or can be contracted to an ITAD partner. Using an ITAD partner can ensure greater security at a more affordable price.

      Make data security a primary driver of asset disposition practices

      It is estimated that 10-15% of data loss cases result from insecure asset disposal. Protect yourself by following some simple disposition rules.

      1. Reconcile your data onsite
      • Verify that bills of landing and inventory records match before assets leave. Otherwise, you must take the receiver’s word on shipment contents.
    • Wipe data at least once onsite
      • Do at least one in-house data wipe before the assets leave the site for greater data security.
    • Transport promptly after data wiping
      • Prompt shipment will minimize involvement with the assets, and therefore, cost. Also, the chance of missing assets will drop dramatically.
    • Avoid third-party transport services
      • Reputable ITAD companies maintain strict chain of custody control over assets. Using a third party introduces unnecessary risk.
    • Keep detailed disposition records
      • Records will protect you in the event of an audit, a data loss incident, or an environmental degradation claim. They could save you millions.
    • Wipe all data-carrying items
      • Don’t forget cell phones, fax machines, USB drives, scanners, and printers – they can carry sensitive information that can put the organization at risk.
    • Only partner with insured ITAD vendors
      • You are never completely out of danger with regards to liability, but partnering with an insured vendor is potent risk mitigation.
    • Work these rules into your disposition policy to mitigate data loss risk.

      Support your HAM efforts with a comprehensive disposition policy

      3.2.3 Build a Hardware Asset Disposition Policy

      Implementation of a HAM program is a waste of time if you aren’t going to maintain it. Maintenance requires the implementation of detailed policies, training, and an ongoing commitment to proper management.

      Use Info-Tech’s Hardware Asset Disposition Policy to:

      1. Establish and define clear standards, procedures, and restrictions surrounding disposition.
      2. Ensure continual compliance with applicable data security and environmental legislation.
      3. Assign specific responsibilities to individuals or groups to ensure ongoing adherence to policy standards and that costs or benefits are in line with expectations.

      Phase 3 Guided Implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Maintain & Dispose

      Proposed Time to Completion: 4 weeks

      Start with an analyst kick-off call:

      • Discuss inventory management best practices.
      • Build process for moves, adds, and changes.
      • Build process for hardware maintenance.
      • Define policies for maintaining asset security.

      Then complete these activities…

      • Build a MAC policy and request form.
      • Build workflows to document user MAC processes.
      • Design processes and policies for hardware maintenance, warranty, and support documentation handling.
      • Build an asset security policy.

      With these tools & templates:

      • Standard Operating Procedures
      • Asset Security Policy

      Step 3.2: Dispose or Redeploy Assets

      Review findings with analyst:

      • Discuss when to dispose vs. redeploy assets.
      • Build process for redeploying vs. disposing of assets.
      • Review ITAD vendors.

      Then complete these activities…

      • Identify challenges with IT asset recovery and disposal.
      • Design hardware asset recovery and disposal workflows.
      • Build a hardware asset disposition policy.

      With these tools & templates:

      • Standard Operating Procedures
      • Asset Recovery Workflow
      • Asset Disposal Workflow
      • Hardware Asset Disposition Policy

      Phase 3 Insight: Not all assets are created equal. Taking a blanket approach to asset maintenance and security is time consuming and costly. Focus on the high-cost, high-use, and data-sensitive assets first.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.4 Revise or create an asset security policy

      Discuss asset security challenges within the organization; brainstorm reasons the challenges exist and process changes to address them. Document a new asset security policy.

      3.2.2 Design hardware asset recovery and disposal workflows

      Document each step in the hardware asset recovery and disposal process, including all decision points. Examine challenges and amend the workflow to address them.

      Phase 4

      Plan Budget Process and Build Roadmap

      Implement Hardware Asset Management

      Cisco deployed an enterprise-wide re-education program to implement asset management

      CASE STUDY

      Industry Networking

      Source Cisco IT

      Challenge

      Even though Cisco Systems had designed a comprehensive asset management program, implementing it across the enterprise was another story.

      An effective solution, complete with a process that could be adopted by everyone within the organization, would require extensive internal promotion of cost savings, efficiencies, and other benefits to the enterprise and end users.

      Cisco’s asset management problem was as much a cultural challenge as it was a process challenge.

      Solution

      The ITAM team at Cisco began discussions with departments that had been tracking and managing their own assets.

      These sessions were used as an educational tool, but also as opportunities to gather internal best practices to deploy across the enterprise.

      Eventually, Cisco introduced weekly meetings with global representation to encourage company-wide communication and collaboration.

      Results

      By establishing a process for managing PC assets, we have cut our hardware costs in half.” – Mark Edmonson, Manager – IT Services Expenses

      Cisco reports that although change was difficult to adopt, end-user satisfaction has never been higher. The centralized asset management approach has resulted in better contract negotiations through better data access.

      A reduced number of hardware and software platforms has streamlined tracking and support, and will only drive down costs as time goes on.

      Step 4.1: Plan Hardware Asset Budget

      Phase 4: Plan Budget & Build Roadmap

      4.1 Plan Budget

      4.2 Communicate & Build Roadmap

      This step will walk you through the following activities:

      4.1 Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget

      This step involves the following participants:

      • IT Director
      • Asset Manager
      • Finance Department

      Step Outcomes

      • Know where to find data to budget for hardware needs accurately
      • Learn how to manage a hardware budget
      • Plan hardware asset budget with a budgeting tool

      Gain control of the budget to increase the success of HAM

      A sophisticated hardware asset management program will be able to uncover hidden costs, identify targets for downsizing, save money through redistributing equipment, and improve forecasting of equipment to help control IT spending.

      While some asset managers may not have experience managing budgets, there are several advantages to ITAM owning the hardware budget:

      • Be more involved in negotiating pricing with suppliers.
      • Build better relationships with stakeholders across the business.
      • Forecast requirements more accurately.
      • Inform benchmarks for hardware performance.
      • Gain more responsibility and have a greater influence on purchasing decisions.
      • Directly impact the reduction in IT spend.
      • Manage the asset database more easily and have a greater understanding of hardware needs.
      • Build a continuous rolling refresh.

      Use ITAM data to forecast hardware needs accurately and realistically

      Your IT budget should be realistic, accounting for business needs, routine maintenance, hardware replacement costs, unexpected equipment failures, and associated support and warranty costs. Know where to find the data you need and who to work with to forecast hardware needs as accurately as possible.

      What type of data should I take into account?

      Plan for:

      • New hardware purchases required
        • Planned refreshes based on equipment lifecycle
        • Inventory for break and fix
        • Standard equipment for new hires
        • Non-standard equipment required
        • Hardware for planned projects
        • Implementation and setup costs
        • Routine hardware implementation
        • Large hardware implementation for projects
        • Support and warranty costs

      Take into account:

      • Standard refresh cycle for each hardware asset
      • Amount of inventory to keep on hand
      • Length of time from procurement to inventory
      • Current equipment costs and equipment price increases
      • Equipment depreciation rates and resale profits

      Where do I find the information I need to budget accurately?

      • Work with HR to forecast equipment needs for new hires.
      • Work with the Infrastructure Manager to forecast devices and equipment needed for approved and planned projects.
      • Use the asset management database to forecast hardware refresh and replacement needs based on age and lifecycle.
      • Work with business stakeholders to ensure all new equipment needs are accounted for in the budget.

      Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget

      4.1.1 Build HAM budget

      This tool is designed to assist in developing and justifying the budget for hardware assets for the upcoming year. The tool will allow you to budget for projects requiring hardware asset purchases as well as equipment requiring refresh and to adjust the budget as needed to accommodate both projects and refreshes. Follow the instructions on each tab to complete the tool.

      The hardware budget should serve as a planning and communications tool for the organization

      The most successful relationships have a common vocabulary. Thus, it is important to translate “tech speak” into everyday language and business goals and initiatives as you plan your budget.

      One of the biggest barriers that infrastructure and operations team face with regards to equipment budgeting is the lack of understanding of IT infrastructure and how it impacts the rest of the organization. The biggest challenge is to help the rest of the organization overcome this barrier.

      There are several things you can do to overcome this barrier:

      • Avoid using technical terms or jargon. Terms many would consider common knowledge, such as “WLAN,” are foreign to many.
      • Don’t assume the business knows how the technology you’re referring to will impact their day-to-day work. You will need to demonstrate it to them.
      • Help the audience understand the business impact of not implementing each initiative. What does this mean for them?
      • Discuss the options on the table in terms of the business value that the hardware can enable. Review how deferring refresh projects can impact user-facing applications, systems, and business unit operations.
      • Present options. If you can’t implement everything on the project list, present what you can do at different levels of funding.

      Info-Tech Insight

      Err on the side of inviting more discussion. Your budgeting process relies on business decision makers and receiving actionable feedback requires an ongoing exchange of information.

      Help users understand the importance of regular infrastructure refreshes

      Getting business users to support regular investments in maintenance relies on understanding and trust. Present the facts in plain language. Provide options, and clearly state the impact of each option.

      Example: Your storage environment is nearing capacity.

      Don’t:

      Explain the project exclusively in technical terms or slang.

      We’re exploring deduping technology as well as cheap solid state, SATA, and tape storage to address capacity.”

      Do:

      • Explain impact in terms that the business can understand.

      Deduplication technology can reduce our storage needs by up to 50%, allowing us to defer a new storage purchase.”

      • Be ready to present project alternatives and impacts.

      Without implementing deduplication technology, we will need to purchase additional storage by the end of the year at an estimated cost of $25,000.”

      • Connect the project to business initiatives and strategic priorities.

      This is a cost-effective technique to increase storage capacity to manage annual average data growth at around 20% per year.

      Step 4.2: Build Communication Plan and Roadmap

      Phase 4: Plan Budget & Build Roadmap

      4.1 Plan Budget

      4.2 Communicate & Build Roadmap

      This step will walk you through the following activities:

      4.2 Develop a HAM implementation roadmap

      This step involves the following participants:

      • CIO
      • IT Director
      • Asset Manager
      • Service Desk Manager

      Step Outcomes

      • Documented end-user hardware asset management policies
      • Communications plan to achieve support from end users and other business units
      • HAM implementation roadmap

      Educate end users through ITAM training to increase program success

      As part of your communication plan and overall HAM implementation, training should be provided to end users within the organization.

      All facets of the business, from management to new hires, should be provided with ITAM training to help them understand their role in the project’s success.

      ITAM solutions are complex by nature with both business process and technical knowledge required to use them correctly. Keep the message appropriate to the audience – end users don’t need to know the complete process, but will need to know policy and how to request.

      Management may have priorities that appear to clash with new processes. Engage management by making them aware of the benefits and importance of ITAM. Include the benefits and consequences of not implementing ITAM in your education approach. Encourage them to support efforts by reinforcing your messages to end users.

      New hires should have ITAM training bundled into their onboarding process. Fresh minds are easier to train and the ITAM program will be seen as an organizational standard, not merely a change.

      Policy documents can help summarize end users’ obligations and clarify processes. Consider an IT Resources Acceptable UsePolicy.

      "The lowest user is the most important user in your asset management program. New employees are your most important resource. The life cycle of the assets will go much smoother if new employees are brought on board." – Tyrell Hall, ITAM Program Coordinator

      Info-Tech Insight

      During training, you should present the material through the lens of “what’s in it for me?” Otherwise, you risk alienating end users through implementing organizational change viewed as low value.

      Include policy design and enforcement in your communication plan

      • Hardware asset management policies should define the actions to be taken to protect and preserve technology assets from failure, loss, destruction, theft, or damage.
      • Implementing asset management policies enforces the notion that the organization takes its IT assets and the management of them seriously, and will help ensure the benefits of ITAM are achieved.
      • Designing, approving, documenting, and adopting one set of standard ITAM policies for each department to follow will ensure the processes are enforced equally across the organization.
      • Good ITAM policies answer the “what, how, and why” of IT asset management, provide the means for ITAM governance, and provide a basis for strategy and decision making.

      Info-Tech Insight

      Use policy templates to jumpstart your policy development and ensure policies are comprehensive, but be sure to modify and adapt policies to suit your corporate culture or they will not gain buy-in from employees. For a policy to be successful, it must be a living document and have participation and involvement from the committees and departments to whom it will pertain.

      Use Info-Tech’s policy templates to build HAM policies

      4.2.1 Build HAM policies

      Use these HAM policy templates to get started:

      Information Technology Standards Policy

      This policy establishes standards and guidelines for a company’s information technology environment to ensure the confidentiality, integrity, and availability of company computing resources.

      Desktop Move/Add/Change Policy

      This desktop move/add/change policy is put in place for users to request to change their desktop computing environments. This policy applies configuration changes within a company.

      Purchasing Policy

      The purchasing policy helps to establish company standards, guidelines, and procedures for the purchase of all information technology hardware, software, and computer-related components as well as the purchase of all technical services.

      Hardware Asset Disposition Policy

      This policy assists in creating guidelines around disposition in the last stage of the asset lifecycle.

      Additional policy templates

      Info-Tech Insight

      Use policy templates to jumpstart your policy development and ensure policies are comprehensive, but modify and adapt them to suit your corporate culture or they will not gain buy-in from employees. For a policy to be successful, it must be a living document and have participation from the committees and departments to whom it will pertain.

      Create a communication plan to achieve end-user support and adherence to policies

      Communication is crucial to the integration and overall implementation of your ITAM program. An effective communication plan will:

      • Gain support from management at the project proposal phase.
      • Create end-user buy-in once the program is set to launch.
      • Maintain the presence of the program throughout the business.
      • Instill ownership throughout the business from top-level management to new hires.

      Use the variety of components as part of your communication plan in order to reach the organization.

      1. Advertise successes.
      • Regularly demonstrate the value of the ITAM program with descriptive statistics focused on key financial benefits.
      • Share data with the appropriate personnel; promote success to obtain further support from senior management.
    • Report and share asset data.
      • Sharing detailed asset-related reports frequently gives decision makers useful data to aid in their strategy.
      • These reports can help your organization prepare for audits, adjust asset budgeting, and detect unauthorized assets.
    • Communicate the value of ITAM.
      • Educate management and end users about how they fit into the bigger picture.
      • Individuals need to know that their behaviors can adversely affect data quality and, ultimately, lead to better decision making.
    • Develop a communication plan to convey the right messages

      4.2.2 Develop a communication plan to convey the right messages

      Participants

      • CIO
      • IT Director
      • Asset Manager
      • Service Desk Manager

      Document

      Document in the HAM Communication Plan

      1. Identify the groups that will be affected by the HAM program as those who will require communication.
      2. For each group requiring a communication plan, identify the following:
      • Benefits of HAM for that group of individuals (e.g. better data, security).
      • The impact the change will have on them (e.g. change in the way a certain process will work).
      • Communication method (i.e. how you will communicate).
      • Timeframe (i.e. when and how often you will communicate the changes).
    • Complete this information in a table like the one below and document in the Communication Plan.
    • Group Benefits Impact Method Timeline
      Service Desk Improve end-user device support Follow new processes Email campaign 3 months
      Executives Mitigate risks, better security, more data for reporting Review and sign off on policies
      End Users Smoother request process Adhere to device security and use policies
      Infrastructure Faster access to data and one source of truth Modified processes for centralized procurement and inventory

      Implement ITAM in a phased, constructive approach

      • One of the most difficult decisions to make when implementing ITAM is: “where do we start?”
      • The pyramid to the right mirrors Maslow’s hierarchy of needs. The base is the absolute bare minimum that should be in place, and each level builds upon the previous one.
      • As you track up the pyramid, your ITAM program will become more and more mature.

      Now that your asset lifecycle environment has been constructed in full, it’s time to study it. Gather data about your assets and use the results to create reports and new solutions to continually improve the business.

      • Asset Data
      • Asset Protection: safely protect and dispose of assets once they are mass distributed throughout your organization.
      • Asset Distribution: determine standards for asset provisioning and asset inventory strategy.
      • Asset Gathering: define what assets you will procure, distribute, and track. Classifying your assets by tier will allow you to make decisions as you progress up the pyramid.

      ↑ ITAM Program Maturity

      Integrate your HAM program into the organization to assist its implementation

      The HAM program cannot perform on its own – it must be integrated with other functional areas of the organization in order to maintain its stability and support.

      • Effective IT asset management is supported by a comprehensive set of processes as part of its implementation.
      • For example, integration with the purchasing/procurement team is required to gather hardware and software purchase data to control asset costs and mitigate software license compliance risk.
      • Integration with Finance is required to support internal cost allocations and charge backs.

      To integrate your ITAM program into your organization effectively, a clear implementation roadmap needs to be designed. Prioritize “quick wins” in order to demonstrate success to the business early and gain buy-in from your team. Long-term goals should be designed that will be supported by the outcomes of the short-term gains of your ITAM program.

      Short-term goal Long-term goal
      Identify inventory classification and tool (hardware first) Hardware contract data integration (warranty, maintenance, lease)
      Create basic ITAM policies and processes Continual improvement through policy impact review and revision
      Implement ITAM auto-discovery tools Software compliance reports, internal audits

      Info-Tech Insight

      Installing an ITAM tool does not mean you have an effective asset management program. A complete solution needs to be built around your tool, but the strength of ITAM comes from processes embedded in the organization that are shaped and supported by your ITAM data.

      Develop an IT hardware asset management implementation roadmap

      4.2.3 Develop a HAM implementation roadmap

      Participants

      • CIO
      • IT Director
      • Asset Manager
      • Service Desk Manager

      Document

      Document in the IT Hardware Asset Management Implementation Roadmap

      1. Identify up to five streams to work on initiatives for the hardware asset management project.
      2. Fill out key tasks and objectives for each process. Assign responsibility for each task.
      3. Select a start date and end date for each task. See tab 1 of the tool for instructions on which letters to input for each stage of the process.
      4. Once your list is complete, open tab 3 of the tool to see your completed sunshine diagram.
      5. Keep this diagram visible for your team and use it as a guide to task completion as you work towards your future-state value stream.

      Focus on continual improvement to sustain your ITAM program

      Periodically review the ITAM program in order to achieve defined goals, objectives, and benefits.

      Act → Plan → Do → Check

      Once ITAM is in place in your organization, a focus on continual improvement creates the following benefits:

      • Remain in sync with the business: your asset management program reflects the current and desired future states of your organization at the time of its creation. But the needs of the business change. As mentioned previously, asset management is a dynamic process, so in order for your program to keep pace, a focus on continual improvement is needed.
        • For example, imagine if your organization had designed your ITAM program before cloud-based solutions were an option. What if your asset classification scheme did not include personal devices or tablets or your asset security policy lacked a section on BYOD?
      • Create funding for new projects through ITAM continual improvement: one of the goals is to save money through more efficient use of your assets by “sweating” out underused hardware and software.
        • It may be tempting to simply present the results to Finance as savings, but instead, describe the results as “available funds for other projects.” Otherwise, Finance may view the savings as a nod to restrict IT’s budget and allocate funds elsewhere. Make it clear that any saved funds are still required, albeit in a different capacity.

      Info-Tech Best Practice

      Look for new uses for ITAM data. Ask management what their goals are for the next 12-18 months. Analyze the data you are gathering and determine how your ITAM data can assist with achieving these goals.

      Phase 4 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Step 4.1: Plan Budget

      Start with an analyst kick-off call:

      • Know where to find data to budget for hardware needs accurately.
      • Learn how to manage a hardware budget.

      Then complete these activities…

      • Plan hardware asset budget.

      With these tools & templates:

      HAM Budgeting Tool

      Step 4.2: Communicate & Roadmap

      Review findings with analyst:

      • Develop policies for end users.
      • Build communications plan.
      • Build an implementation roadmap.

      Then complete these activities…

      • Build HAM policies.
      • Develop a communication plan.
      • Develop a HAM implementation roadmap.

      With these tools & templates:

      HAM policy templates

      HAM Communication Plan

      HAM Implementation Roadmap

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.1.1 Build a hardware asset budget

      Review upcoming hardware refresh needs and projects requiring hardware purchases. Use this data to forecast and budget equipment for the upcoming year.

      4.2.2 Develop a communication plan

      Identify groups that will be affected by the new HAM program and for each group, document a communications plan.

      Insight breakdown

      Overarching Insights

      HAM is more than just tracking inventory. A mature asset management program provides data for proactive planning and decision making to reduce operating costs and mitigate risk.

      ITAM is not just IT. IT leaders need to collaborate with Finance, Procurement, Security, and other business units to make informed decisions and create value across the enterprise.

      Treat HAM like a process, not a project. HAM is a dynamic process that must react and adapt to the needs of the business.

      Phase 1 Insight

      For asset management to succeed, it needs to support the business. Engage business leaders to determine needs and build your HAM program around these goals.

      Phase 2 Insight

      Bridge the gap between IT and Finance to build a smoother request and procurement process through communication and routine reporting. If you’re unable to affect procurement processes to reduce time to deliver, consider bringing inventory onsite or having your hardware vendor keep stock, ready to ship on demand.

      Phase 3 Insight

      Not all assets are created equal. Taking a blanket approach to asset maintenance and security is time consuming and costly. Focus on the high-cost, high-use, and data-sensitive assets first.

      Phase 4 Insight

      Deploying a fancy ITAM tool will not make hardware asset management implementation easier. Implementation is a project that requires you focus on people and process first – the technology comes after.

      Related Info-Tech research

      Implement Software Asset Management

      Build an End-User Computing Strategy

      Find the Value – and Remain Valuable – With Cloud Asset Management

      Consolidate IT Asset Management

      Harness Configuration Management Superpowers

      IT Asset Management Market Overview

      Bibliography

      Chalkley, Martin. “Should ITAM Own Budget?” The ITAM Review. 19 May 2011. Web.

      “CHAMP: Certified Hardware Asset Management Professional Manual.” International Association of Information Technology Asset Managers, Inc. 2008. Web.

      Foxen, David. “The Importance of Effective HAM (Hardware Asset Management).” The ITAM Review. 19 Feb. 2015. Web.

      Foxen, David. “Quick Guide to Hardware Asset Tagging.” The ITAM Review. 5 Sep. 2014. Web.

      Galecki, Daniel. “ITAM Lifecycle and Savings Opportunities – Mapping out the Journey.” International Association of IT Asset Managers, Inc. 16 Nov. 2014. Web.

      “How Cisco IT Reduced Costs Through PC Asset Management.” Cisco IT Case Study. 2007. Web.

      Irwin, Sherry. “ITAM Metrics.” The ITAM Review. 14 Dec. 2009. Web.

      “IT Asset and Software Management.” ECP Media LLC, 2006. Web.

      Rains, Jenny. “IT Hardware Asset Management.” HDI Research Brief. May 2015. Web.

      Riley, Nathan. “IT Asset Management and Tagging Hardware: Best Practices.” Samanage Blog. 5 March 2015. Web.

      “The IAITAM Practitioner Survey Results for 2016 – Lean Toward Ongoing Value.” International Association of IT Asset Managers, Inc. 24 May 2016. Web.

      2021 IT Talent Trend Report

      • Buy Link or Shortcode: {j2store}516|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $9,919 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Lead
      • Parent Category Link: /lead
      • In March 2020, many organizations were forced to switch to a virtual working world. IT enabled organizations to be successful while working from home. Ultimately, this shift changed the way that we all work, and in turn, the way IT leaders manage talent.
      • Many organizations are considering long-term remote work (Kelly, 2020).
      • Change is starting but is lagging.

      Our Advice

      Critical Insight

      • Increase focus on employee experience to navigate new challenges.
      • A good employee experience is what is best for the IT department.

      Impact and Result

      • The data shows IT is changing in the area of talent management.
      • IT has a large role in enabling organizations to work from home, especially from a technological and logistics perspective. There is evidence to show that they are now expanding their role to better support employees when working from home.
      • Survey respondents identified efforts already underway for IT to improve employee experience and subsequently, IT effectiveness.

      2021 IT Talent Trend Report Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should focus on the employee experience and get an overview of what successful IT leaders are doing differently heading into 2021 – the five new talent management trends.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. DEI: A top talent objective

      The focus on diversity, equity, and inclusion (DEI) initiatives spans the entire organization beyond just HR. Learn which DEI efforts are underway with IT.

      • 2021 IT Talent Trend Report – Trend 1: DEI: A Top Talent Objective

      2. Remote work is here to stay

      Forced work-from-home demonstrated to organizations that employees can be productive while working away from the physical office. Learn more about how remote work is changing work.

      • 2021 IT Talent Trend Report – Trend 2: Remote Work Is Here to Stay

      3. A greater emphasis on wellbeing

      When the pandemic hit, organizations were significantly concerned about how employees were doing. Learn more about wellbeing.

      • 2021 IT Talent Trend Report – Trend 3: A Greater Emphasis on Wellbeing

      4. A shift in skills priorities

      Upskilling and finding sought after skills were challenging before the pandemic. How has it changed since? Learn more about skills priorities.

      • 2021 IT Talent Trend Report – Trend 4: A Shift in Skills Priorities

      5. Uncertainty unlocks performance

      The pandemic and remote work has affected performance. Learn about how uncertainty has impacted performance management.

      • 2021 IT Talent Trend Report – Trend 5: Uncertainty Unlocks Performance
      [infographic]

      Plan Your Digital Transformation on a Page

      • Buy Link or Shortcode: {j2store}81|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $34,649 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy
      • Digital investments often under deliver on expectations of return, and there is no cohesive approach to managing the flow of capital into digital.
      • The focus of the business has historically been to survive technological disruption rather than to thrive in it.
      • Strategy is based mostly on opinion rather than an objective analysis of the outcomes customers want from the organization.
      • Digital is considered a buzzword – nobody has a clear understanding of what it is and what it means in the organization’s context.

      Our Advice

      Critical Insight

      • The purpose of going digital is getting one step closer to the customer. The mark of a digital organization lies in how they answer the question, “How does what we’re doing contribute to what the customer wants from us?”
      • The goal of digital strategy is digital enablement. An organization that is digitally enabled no longer needs a digital strategy, it’s just “the strategy.”

      Impact and Result

      • Focus strategy making on delivering the digital outcomes that customers want.
        • Leverage the talent, expertise, and perspectives within the organization to build a customer-centric digital strategy.
      • Design a balanced digital strategy that creates value across the five digital value pools:
        • Digital marketing, digital channels, digital products, digital supporting capabilities, and business model innovation.
      • Ask how disruption can be leveraged, or even become the disruptor.
        • Manage disruption through quick-win approaches and empowering staff to innovate.
      • Use a Digital Strategy-on-a-Page to spark the digital transformation.
        • Drive awareness and alignment on the digital vision and spark your organization’s imagination around digital.

      Plan Your Digital Transformation on a Page Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand how digital disruption is driving the need for transformation, and how Info-Tech’s methodology can help.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Scope the digital transformation

      Learn how to apply the Digital Value Pools thought model and scope strategy around them.

      • Plan Your Digital Transformation on a Page – Phase 1: Scope the Digital Transformation

      2. Design the digital future state vision

      Identify business imperatives, define digital outcomes, and define the strategy’s guiding principles.

      • Plan Your Digital Transformation on a Page – Phase 2: Design the Digital Future State Vision
      • Digital Strategy on a Page

      3. Define the digital roadmap

      Define, prioritize, and roadmap digital initiatives and plan contingencies.

      • Plan Your Digital Transformation on a Page – Phase 3: Define the Digital Roadmap

      4. Sustain digital transformation

      Create, polish, and socialize the Digital Strategy-on-a-Page.

      • Plan Your Digital Transformation on a Page – Phase 4: Sustain Digital Transformation
      [infographic]

      Workshop: Plan Your Digital Transformation on a Page

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Scope the Digital Transformation

      The Purpose

      Identify the need for and use of digital strategy and determine a realistic scope for the digital strategy.

      Key Benefits Achieved

      The digital strategy project is planned and scoped around a subset of the five digital value pools.

      Activities

      1.1 Introduction to digital strategy.

      1.2 Establish motivation for digital.

      1.3 Discuss in-flight digital investments.

      1.4 Define the scope of digital.

      1.5 Identify stakeholders.

      1.6 Perform discovery interviews.

      1.7 Select two value pools to focus day 2, 3, and 4 activities.

      Outputs

      Business model canvas

      Stakeholder power map

      Discovery interview results

      Two value pools for focus throughout the workshop

      2 Design the Digital Future State Vision

      The Purpose

      Create guiding principles to help define future digital initiatives. Generate the target state with the help of strategic goals.

      Key Benefits Achieved

      Establish the basis for planning out the initiatives needed to achieve the target state from the current state.

      Activities

      2.1 Identify digital imperatives.

      2.2 Define key digital outcomes.

      2.3 Create a digital investment thesis.

      2.4 Define digital guiding principles.

      Outputs

      Corporate strategy analysis, PESTLE analysis, documented operational pain points (value streams)

      Customer needs assessment (journey maps)

      Digital investment thesis

      Digital guiding principles

      3 Define the Digital Roadmap

      The Purpose

      Understand the gap between the current and target state. Create transition options and assessment against qualitative and quantitative metrics to generate a list of initiatives the organization will pursue to reach the target state. Build a roadmap to plan out when each transition initiative will be implemented.

      Key Benefits Achieved

      Finalize the initiatives the organization will use to achieve the target digital state. Create a roadmap to plan out the timing of each initiative and generate an easy-to-present document for digital strategy approval.

      Activities

      3.1 Identify initiatives to achieve digital outcomes.

      3.2 Align in-flight initiatives to digital initiatives.

      3.3 Prioritize digital initiatives.

      3.4 Document architecturally significant requirements for high-priority initiatives.

      Outputs

      Digital outcomes and KPIs

      Investment/value pool matrix

      Digital initiative prioritization

      Architecturally significant requirements for high-priority initiatives

      4 Define the Digital Roadmap

      The Purpose

      Plan your approach to socializing the digital strategy to help facilitate the cultural changes necessary for digital transformation.

      Key Benefits Achieved

      Plant the seed of digital and innovation to start making digital a part of the organization’s DNA.

      Activities

      4.1 Review and refine Digital Strategy on a Page.

      4.2 Assess company culture.

      4.3 Define high-level cultural changes needed for successful transformation.

      4.4 Define the role of the digital transformation team.

      4.5 Establish digital transformation team membership and desired outcomes.

      Outputs

      Digital Strategy on a Page

      Strategyzer Culture Map

      Digital transformation team charter

      Elevate Your Vendor Management Initiative

      • Buy Link or Shortcode: {j2store}223|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • As cloud vendors, managed service providers, and other IT vendors continue to play a larger role in IT operations, the VMI must evolve to meet new challenges. Maximizing the VMI's impact requires it to keep pace with the IT landscape and transforming from tactical to strategic.
      • Increased spend with and reliance on vendors leads to less control and more risk for IT organizations. The VMI must mature on multiple fronts to continue adding value; staying stagnant is not an option.

      Our Advice

      Critical Insight

      • An organization’s vendor management initiative must continue to evolve and mature to reach its full strategic value. In the early stages, the vendor management initiative may be seen as transactional, focusing on the day-to-day functions associated with vendor management. The real value of a VMI comes from becoming strategic partner to other functional groups (departments) within your organization.
      • Developing vendor management personnel is critical to the vendor management initiative’s evolution and maturation. For the VMI to mature, its personnel must mature as well. Their professional skills, competencies, and knowledge must increase over time. Failure to accentuate personal growth within the team limits what the team is able to achieve and how the team is perceived.
      • Vendor management is not about imposing your will on vendors; it is about understanding the multi-faceted dynamics between your organization and your vendors and charting the appropriate path forward. Resource allocation and relationship expectations flow from these dynamics. Each critical vendor requires an individual plan to build the best possible relationship and to leverage that relationship. What works with one vendor may not work or even be possible with another vendor…even if both vendors are critical to your success.

      Impact and Result

      • Evolve the VMI from tactical to strategic
      • Improve the VMI’s brand and brand awareness
      • Develop the VMI’s team members to increase the VMI’s impact
      • Take relationships to the next level with your critical vendors
      • Understand how your vendors view your organization as a customer
      • Create and implement plans to improve relationships with critical vendors
      • Create and implement plans to improve underperforming vendors

      Elevate Your Vendor Management Initiative Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should continue to evolve and mature your vendor management initiative and to understand the additional elements of Info-Tech’s four-step cycle to running your vendor management initiative.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Elevate Your Vendor Management Initiative – Executive Brief
      • Elevate Your Vendor Management Initiative – Phases 1-4

      1. Plan

      This phase helps the VMI stay focused and aligned by reviewing existing materials, updating the existing maturity assessment, and ensuring that the foundational elements of the VMI are up to date. The main outcomes from this phase are a current maturity assessment and updated or revised Plan documents.

      • Elevate Your Vendor Management Initiative – Phase 1

      2. Build

      This phase helps you configure, create, and understand the tools and templates used to elevate the VMI. The main outcomes from this phase are a clear understanding of the tools that identify which vendors are important to you, tools and concepts to help you take key vendor relationships to the next level, and tools to help you evaluate and improve the VMI and its personnel.

      • Elevate Your Vendor Management Initiative – Phase 2
      • Elevate – COST Model Vendor Classification Tool
      • Elevate – MVP Model Vendor Classification Tool
      • Elevate – OPEN Model Customer Positioning Tool
      • Elevate – Relationship Assessment and Improvement Tool
      • Elevate – Tools and Templates Compendium

      3. Run

      This phase helps you begin integrating the new tools and templates into the VMI’s operations. The main outcomes from this phase are guidance and the steps required to continue your VMI’s maturation and evolution.

      • Elevate Your Vendor Management Initiative – Phase 3

      4. Review

      This phase helps the VMI stay aligned with the overall organization, stay current, and improve its strategic value as it evolves. The main outcomes from this phase are ways to advance the VMI’s strategic impact.

      • Elevate your Vendor Management Initiative – Phase 4

      Infographic

      Workshop: Elevate Your Vendor Management Initiative

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Plan and Build

      The Purpose

      Review existing tools and templates and configure new tools and templates.

      Key Benefits Achieved

      Updated Maturity Assessment and configured tools and templates.

      Activities

      1.1 Existing Plan document review and new maturity assessment.

      1.2 Optional classification models.

      1.3 Customer positioning model.

      1.4 Two-way scorecards.

      Outputs

      Updated Plan documents.

      New maturity assessment.

      Configured classification model.

      Customer positioning for top five vendors.

      Configured scorecard and feedback form.

      2 Build and Run

      The Purpose

      Configure VMI Tools and Templates.

      Key Benefits Achieved

      Configured Tools and Templates for the VMI.

      Activities

      2.1 Performance improvement plans (PIPs).

      2.2 Relationship improvement plans (RIPs).

      2.3 Vendor-at-a-Glance reports.

      2.4 VMI Personnel Competency Evaluation Tool.

      Outputs

      Configured Performance Improvement Plan.

      Configured Relationship Assessment and Relationship Improvement Plan.

      Configured 60-Second Report and completed Vendor Calendar for one vendor.

      Configured VMI Personnel Competency Evaluation Tool.

      3 Build and Run

      The Purpose

      Continue configuring VMI Tools and Templates and enhancing VM competencies.

      Key Benefits Achieved

      Configured Tools and Templates for the VMI and market intelligence to gather.

      Activities

      3.1 Internal feedback tool.

      3.2 VMI ROI calculation.

      3.3 Vendor recognition program.

      3.4 Assess the Relationship Landscape.

      3.5 Gather market intelligence.

      3.6 Improve professional skills.

      Outputs

      Configured Internal Feedback Tool.

      General framework for a vendor recognition program.

      Completed Relationship Landscape Assessment (representative sample).

      List of market intelligence to gather for top five vendors.

      4 Run and Review

      The Purpose

      Improve the VMI’s brand awareness and impact on the organization; continue to maintain alignment with the overall organization.

      Key Benefits Achieved

      Raising the organization’s awareness of the VMI, and ensuring the VMI Is becoming more strategic.

      Activities

      4.1 Expand professional knowledge.

      4.2 Create brand awareness.

      4.3 Investigate potential alliances.

      4.4 Continue increasing the VMI’s strategic value.

      4.5 Review and update (governances, policies and procedures, lessons learned, internal alignment, and leading practices).

      Outputs

      Branding plan for the VMI.

      Branding plan for individual VMI team members.

      Further reading

      Elevate Your Vendor Management Initiative

      Transform Your VMI From Tactical to Strategic to Maximize Its Impact and Value

      EXECUTIVE BRIEF

      Analyst Perspective

      Transform your VMI into a strategic contributor to ensure its longevity.

      The image contains a picture of Phil Bode.

      By the time you start using this blueprint, you should have established a solid foundation for your vendor management initiative (VMI) and implemented many or all of the principles outlined in Info-Tech’s blueprint Jump Start Your Vendor Management (the Jump Start blueprint). This blueprint (the Elevate blueprint) is meant to continue the evolutionary or maturation process of your VMI. Many of the items presented here will build on and refer to the elements from the Jump Start blueprint. The goal of the Elevate blueprint is to assist in the migration of your VMI from transactional to strategic. Why? Simply put, the more strategic the VMI, the more value it adds and the more impact it has on the organization as a whole.

      While the day-to-day, transactional aspect of running a VMI will never go away, getting stuck in transactional mode is a horrible place for the VMI and its team members:

      • The VMI will never live up to its potential.
      • The work won’t be enjoyable or rewarding for most people.
      • The VMI will be seen paper pushers, gatekeepers, and other things that don’t add value or should be avoided.
      • Being reactive (i.e. putting out fires all day) is exhausting and provides little or no control over the work and workflow.
      • Lastly, the VMI’s return on investment will be low, and unless it was established due to regulatory, audit, or other influences, the VMI could be disbanded. Minimal resources will be available to the VMI…just enough to keep it alive and obtain whatever checkmark needs to be earned to satisfy the original need for its creation.

      To prevent these tragic things from happening, transform the VMI into a strategic contributor and partner internally. This Elevate blueprint provides a roadmap and guidance to get your journey started. Focus on expanding your understanding of customer/vendor dynamics, improving the skills, competencies, and knowledge of the VMI’s team members, contributing value beyond the savings aspect, and building a solid brand internally and with your vendors. This requires a conscious effort and a proactive approach to vendor management…not to mention treating your internal “clients” with respect and providing great customer service.

      At the end of the day, ask yourself one question: If your internal clients had to pay for your services, would they? If you can answer yes, you are well on your way to being strategic. If not, you still have some work to do. Long live the strategic VMI!

      Phil Bode
      Principal Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      Each year, IT organizations “outsource” tasks, activities, functions, and other items. During 2021:

      • Spend on as-a-service providers increased 38% over 2020.*
      • Spend on managed service providers increased 16% over 2020.*
      • IT service providers increased their merger and acquisition numbers by 47% over 2020.*

      This leads to more spend, less control, and more risk for IT organizations. Managing this becomes a higher priority for IT, but many IT organizations are ill-equipped to do this proactively.

      As new contracts are negotiated and existing contracts are renegotiated or renewed, there is a perception that the contracts will yield certain results, output, performance, solutions, or outcomes. The hope is that these will provide a measurable expected value to IT and the organization. Often, much of the expected value is never realized. Many organizations don’t have a VMI to help:

      • Ensure at least the expected value is achieved.
      • Improve on the expected value through performance management.
      • Significantly increase the expected value through a proactive VMI.

      Vendor Management is a proactive, cross-functional lifecycle. It can be broken down into four phases:

      • Plan
      • Build
      • Run
      • Review

      The Info-Tech process addresses all four phases and provides a step-by-step approach to configure and operate your VMI. The content in this blueprint helps you and the VMI evolve to add value and impact to the organization that was started with the Info-Tech blueprint Jump Start Your VMI.

      Info-Tech Insight

      The VMI must continue to mature and evolve, or it will languish, atrophy, and possibly be disbanded.

      • A transactional approach to vendor management ignores the multi-faceted dynamics in play and limits the VMI’s potential value.
      • Improving the VMI’s impact starts with the VMI’s personnel – their skills, knowledge, competencies, and relationships.
      • Adding value to the organization requires time to build trust and understand the landscape (internal and external).
      *Source: Information Services Group, Inc., 2022.

      Executive Summary

      Your Challenge

      Spend on managed service providers and as-a-service providers continues to increase. In addition, IT services vendors continue to be active in the mergers and acquisitions arena. This increases the need for a VMI to help with the changing IT vendor landscape.

      38%

      2021

      16%

      2021

      47%

      2021

      Spend on

      As-a-Service Providers

      Spend on

      Managed Services

      Providers

      IT Services

      Merger & Acquisition

      Growth

      (Transactions)

      Source: Information Services Group, Inc., 2022.

      Executive Summary

      Common Obstacles

      When organizations execute, renew, or renegotiate a contract, there is an “expected value” associated with that contract. Without a robust VMI, most of the expected value will never be realized. With a robust VMI, the realized value significantly exceeds the expected value during the contract term.

      The image contains a screenshot of a diagram that demonstrates the expected value of a contract with and without a vmi.

      Source: Based on findings from Geller & Company, 2003.

      Executive Summary

      Info-Tech’s Approach

      A sound, cyclical approach to vendor management will help ensure your VMI meets your needs and stays in alignment with your organization as they both change (i.e. mature and evolve).

      Vendor Management Process

      1. Plan
      • Review and Update Existing Plan Materials
    • Build
      • Vendor Classification Models
      • Customer Positioning Model
      • 2-Way Scorecards
      • Performance Improvement Plan (PIP)
      • Relationship Improvement Plan (RIP)
      • Vendor-at-a-Glance Reports
      • VMI Personnel Competency Evaluation Tool
      • Internal Feedback Tool
      • VMI ROI Calculation Tools
      • Vendor Recognition Program
    • Run
      • Classify Vendors and Identify Customer Position
      • Assess the Relationship Landscape
      • Leverage 2-Way Scorecards
      • Implement PIPs and RIPS
      • Gather Market Intelligence
      • Generate Vendor-at-a-Glance Reports
      • Evaluate VMI Personnel
      • Improve Professional Skills
      • Expand Professional Knowledge
      • Create Brand Awareness
      • Survey Internal Clients
      • Calculate VMI ROI
      • Implement Vendor Recognition Program
    • Review
      • Investigate Potential Alliances
      • Continue Increasing the VMI's Strategic Value
      • Review and Update Governances
      • Outcomes
        • Better Allocation of VMI Resources
        • Measurable Impact of the VMI
        • Increased Awareness of the VMI
        • Improved Vendor Performance
        • Improved Vendor Relationships
        • VMI Team Member Development
        • Strategic Relationships Internally

      Info-Tech’s Methodology for Elevating Your VMI

      Phase 1 - Plan

      Phase 2 - Build

      Phase 3 - Run

      Phase 4 – Review

      Phase Steps

      1.1 Review and Update Existing Plan Materials

      2.1 Vendor Classification Models

      2.2 Customer Positioning Model

      2.3 Two-Way Scorecards

      2.4 Performance Improvement Plan (PIP)

      2.5 Relationship Improvement Plan (RIP)

      2.6 Vendor-at-a-Glance Reports

      2.7 VMI Personnel Competency Evaluation Tool

      2.8 Internal Feedback Tool

      2.9 VMI ROI Calculation

      2.10 Vendor Recognition Program

      3.1 Classify Vendors & Identify Customer Position

      3.2 Assess the Relationship Landscape

      3.3 Leverage Two-Way Scorecards

      3.4 Implement PIPs and RIPs

      3.5 Gather Market Intelligence

      3.6 Generate Vendor-at-a-Glance Reports

      3.7 Evaluate VMI Personnel

      3.8 Improve Professional Skills

      3.9 Expand Professional Knowledge

      3.10 Create Brand Awareness

      3.11 Survey Internal Clients

      3.12 Calculate VMI ROI

      3.13 Implement Vendor Recognition Program

      4.1 Investigate Potential Alliances

      4.2 Continue Increasing the VMI’s Strategic Value

      4.3 Review and Update

      Phase Outcomes

      This phase helps the VMI stay focused and aligned by reviewing existing materials, updating the existing maturity assessment, and ensuring that the foundational elements of the VMI are up-to-date.

      This phase helps you configure, create, and understand the tools and templates used to elevate the VMI.

      This phase helps you begin integrating the new tools and templates into the VMI’s operations.

      This phase helps the VMI stay aligned with the overall organization, stay current, and improve its strategic value as it evolves.

      Insight Summary

      Insight 1

      An organization’s vendor management initiative must continue to evolve and mature to reach its full strategic value. In the early stages, the vendor management initiative may be seen as transactional, focusing on the day-to-day functions associated with vendor management. The real value of a VMI comes from becoming strategic partner to other functional groups (departments) within your organization.

      Insight 2

      Developing vendor management personnel is critical to the vendor management initiative’s evolution and maturation. For the VMI to mature, its personnel must mature as well. Their professional skills, competencies, and knowledge must increase over time. Failure to accentuate personal growth within the team limits what the team can achieve and how the team is perceived.

      Insight 3

      Vendor management is not about imposing your will on vendors; it is about understanding the multifaceted dynamics between your organization and your vendors and charting the appropriate path forward. Resource allocation and relationship expectations flow from these dynamics. Each critical vendor requires an individual plan to build the best possible relationship and to leverage that relationship. What works with one vendor may not work or even be possible with another vendor – even if both vendors are critical to your success.

      Blueprint Deliverables

      The four phases of maturing and evolving your vendor management initiative are supported with configurable tools, templates, and checklists to help you stay aligned internally and achieve your goals.

      VMI Tools and Templates

      Continue building your foundation for your VMI and configure tools and templates to help you manage your vendor relationships.

      The image contains screenshots of the VMI Tools and Templates.

      Key Deliverables:

      Info-Tech’s

      1. Elevate – COST Model Vendor Classification Tool
      2. Elevate – MVP Model Vendor Classification Tool
      3. Elevate – OPEN Model Customer Positioning Tool
      4. Elevate – Relationship Assessment and Improvement Plan Tool
      5. Elevate – Tools and Templates Compendium

      A suite of tools and templates to help you upgrade and evolve your vendor management initiative.

      Blueprint benefits

      IT Benefits

      Business Benefits

      • Improve VMI performance and value.
      • Improve VMI team member performance.
      • Build better relationships with critical vendors.
      • Measure the impact and contributions provided by the VMI.
      • Establish realistic and appropriate expectations for vendor interactions.
      • Understand customer positioning to allocate vendor management resources more effectively and more efficiently.
      • Improve vendor accountability.
      • Increase collaboration between departments.
      • Improve working relationships with your vendors.
      • Create a feedback loop to address vendor/customer issues before they get out of hand or are more costly to resolve.
      • Increase access to meaningful data and information regarding important vendors.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phases 2 and 3 Phase 4

      Call #1: Review status of existing plan materials.

      Call #2: Conduct a new maturity assessment.

      Call #3: Review optional classification models.

      Call #4: Determine customer positioning for top vendors.

      Call #5: Configure vendor Scorecards and vendor feedback forms.

      Call #6: Discuss PIPs, RIPs, and vendor-at-a-glance reports.

      Call #7: VMI personnel competency evaluation tool.

      Call #8: Create internal feedback tool and discuss ROI.

      Call #9: Identify vendor recognition program attributes and assess the relationship landscape.

      Call #10: Gather market intelligence and create brand awareness.

      Call #11: Identify potential vendor alliances, review the components of a strategic VMI, and discuss the continuous improvement loop.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 12 calls over the course of 3 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Plan/Build Run

      Build/Run

      Build/Run

      Run/Review

      Activities

      1.1 Existing Plan document review and new maturity assessment.

      1.2 Optional classification models.

      1.3 Customer positioning model.

      1.4 Two-way scorecards.

      2.1 Performance improvement plans (PIPs).

      2.2 Relationship improvement plans (RIPs).

      2.3 Vendor-at-a-glance reports.

      2.4 VMI personnel competency evaluation tool.

      3.1 Internal feedback tool.

      3.2 VMI ROI calculation.

      3.3 Vendor recognition program.

      3.4 Assess the relationship landscape.

      3.5 Gather market intelligence.

      3.6 Improve professional skills.

      4.1 Expand professional knowledge.

      4.2 Create brand awareness.

      4.3 Investigate potential alliances.

      4.4 Continue increasing the VMI’s strategic value.

      4.5 Review and update (governances, policies and procedures, lessons learned, internal alignment, and leading practices).

      Deliverables

      1. Updated plan documents.
      2. New maturity assessment.
      3. Configured classification model.
      4. Customer positioning for top 5 vendors.
      5. Configured scorecard and feedback form.
      1. Configured performance improvement plan.
      2. Configured relationship assessment and relationship improvement plan.
      3. Configured 60-second report and completed vendor calendar for one vendor.
      4. Configured VMI personnel competency evaluation tool.
      1. Configured internal feedback tool.
      2. General framework for a vendor recognition program.
      3. Completed relationship landscape assessment (representative sample).
      4. List of market intelligence to gather for top 5 vendors.
      1. Roadmap/plan for improving skills and knowledge for VMI personnel.
      2. Action plan for creating brand awareness for the VMI.
      3. Action plan for creating brand awareness for each VMI team member.

      Using complementary vendor management blueprints

      Jump Start Your VMI and Elevate Your VMI

      The image contains a screenshot to demonstrate using complementary vendor management blueprints.

      Phase 1 – Plan

      Look to the Future and Update Existing Materials

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Review and update existing Plan materials

      2.1 Vendor classification models

      2.2 Customer positioning model

      2.3 Two-way scorecards

      2.4 Performance improvement plan (PIP)

      2.5 Relationship improvement plan (RIP)

      2.6 Vendor-at-a-glance reports

      2.7 VMI personnel competency evaluation tool

      2.8 Internal feedback tool

      2.9 VMI ROI calculation

      2.10 Vendor recognition program

      3.1 Classify vendors and identify customer position

      3.2 Assess the relationship landscape

      3.3 Leverage two-way scorecards

      3.4 Implement PIPs and RIPs

      3.5 Gather market intelligence

      3.6 Generate vendor-at-a-glance reports

      3.7 Evaluate VMI personnel

      3.8 Improve professional skills

      3.9 Expand professional knowledge

      3.10 Create brand awareness

      3.11 Survey internal clients

      3.12 Calculate VMI ROI

      3.13 Implement vendor recognition program

      4.1 Investigate potential alliances

      4.2 Continue increasing the VMI’s strategic value

      4.3 Review and update

      This phase will walk you through the following activities:

      This phase helps the VMI stay focused and aligned by reviewing existing materials, updating the existing maturity assessment, and ensuring that the foundational elements of the VMI are up-to-date. The main outcomes from this phase are a current maturity assessment and updated or revised Plan documents.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Procurement/Sourcing
      • IT
      • Others as needed

      Phase 1 – Plan

      Phase 1 – Plan revisits the foundational elements from the Info-Tech blueprint Jump Start Your Vendor Management Initiative. As the VMI continues to operate and mature, looking backward periodically provides a new perspective and helps the VMI move forward:

      • Has anything changed (mission statement, goals, scope, strengths and obstacles, roles and responsibilities, and process mapping)?
      • What progress was made against the maturity assessment?
      • What is next in the maturity process for the VMI?
      • Were some foundational elements overlooked or not done thoroughly due to time constraints, a lack of knowledge, or other factors?

      Keep an eye on the past as you begin looking toward the future.

      Step 1.1 – Review and update existing Plan materials

      Ensure existing materials are current

      At this point, the basic framework for your VMI should be in place. However, now is a good time to correct any oversights in your foundational elements. Have you:

      • Drafted a mission statement for the VMI and listed its goals, answering the questions “why does the VMI exist” and “what will it achieve”?
      • Determined the VMI’s scope, establishing what is in and outside the purview of the VMI?
      • Listed the VMI’s strengths and obstacles, identifying what you can leverage and what needs to be managed to ensure smooth sailing?
      • Established roles and responsibilities (OIC Chart) for the vendor management lifecycle, defining each internal party’s place in the process?
      • Documented process maps, delineating (at a minimum) what the VMI is doing for each step of the vendor management lifecycle?
      • Created a charter, establishing an operational structure for the VMI?
      • Completed a vendor inventory, identifying the major vendors included in the VMI?
      • Conducted a VMI maturity assessment, establishing a baseline and desired future state to work toward?
      • Defined the VMI’s structure, documenting the VMI’s place in the organization, its services, and its clients?

      If any of these elements is missing, revisit the Info-Tech blueprint Jump Start Your Vendor Management Initiative to complete these components. If they exist, review them and make any required modifications.

      Download the Info-Tech blueprint Jump Start Your Vendor Management Initiative

      1.1.1 – Review and update existing Plan materials

      1 – 6 Hours

      1. Meet with the participants and review existing documents and tools created or configured during Phase 1 of the Info-Tech blueprint Jump Start Your Vendor Management Initiative: mission statement and goals, scope, strengths and obstacles, OIC chart, process maps, charter, vendor inventory, maturity assessment, and structure.
      2. Update the documents as needed.
      3. Redo the maturity assessment if more than 12 months have passed since the initial assessment was conducted.
      Input Output
      • Documents and tools from Phase 1 of the Info-Tech blueprint Jump Start Your Vendor Management Initiative
      • Updated documents and tools from Phase 1 of the Info-Tech blueprint Jump Start Your Vendor Management Initiative
      Materials Participants
      • Documents and tools from Phase 1 of the Info-Tech blueprint Jump Start Your Vendor Management Initiative
      • Whiteboard or flip charts (as needed)
      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech blueprint Jump Start Your Vendor Management Initiative

      Download the Jump - Phase 1 Tools and Templates Compendium

      Phase 2 – Build

      Create New Tools and Consider Alternatives to Existing Tools

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Review and update existing Plan materials

      2.1 Vendor classification models

      2.2 Customer positioning model

      2.3 Two-way scorecards

      2.4 Performance improvement plan (PIP)

      2.5 Relationship improvement plan (RIP)

      2.6 Vendor-at-a-glance reports

      2.7 VMI personnel competency evaluation tool

      2.8 Internal feedback tool

      2.9 VMI ROI calculation

      2.10 Vendor recognition program

      3.1 Classify vendors and identify customer position

      3.2 Assess the relationship landscape

      3.3 Leverage two-way scorecards

      3.4 Implement PIPs and RIPs

      3.5 Gather market intelligence

      3.6 Generate vendor-at-a-glance reports

      3.7 Evaluate VMI personnel

      3.8 Improve professional skills

      3.9 Expand professional knowledge

      3.10 Create brand awareness

      3.11 Survey internal clients

      3.12 Calculate VMI ROI

      3.13 Implement vendor recognition program

      4.1 Investigate potential alliances

      4.2 Continue increasing the VMI’s strategic value

      4.3 Review and update

      This phase will walk you through the following activities:

      This phase helps you configure, create, and understand the tools and templates used to elevate the VMI. The main outcomes from this phase are a clear understanding of the tools that identify which vendors are important to you, tools and concepts to help you take key vendor relationships to the next level, and tools to help you evaluate and improve the VMI and its personnel.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Legal
      • Marketing
      • Others as needed

      Phase 2 – Build

      Create and configure tools, templates, and processes

      Phase 2 – Build is similar to its counterpart in the Info-Tech blueprint Jump Start Your Vendor Management Initiative; this phase focuses on tools, templates, and concepts that help the VMI increase its strategic value and impact. The items referenced in this phase will require your customization or configuration to integrate them within your organization and culture for maximum effect.

      One goal of this phase is to provide new ways of looking at things and alternate approaches. (For example, two methods of classifying your vendors are presented for your consideration.) You don’t live in a one-size-fits-all world, and options allow you (or force you) to evaluate what’s possible rather than running with the herd. As you review this phase, keep in mind that some of the concepts presented may not be applicable in your environment…or it may be that they just aren’t applicable right now. Timing, evolution, and maturity will always be factors in how the VMI operates.

      Another goal of this phase is to get you thinking about the value the VMI brings to the organization, and just as important, how to capture and report it. Money alone may be at the forefront of most people’s minds when return on investment is brought up, but there are many ways to measure a VMI’s value and impact. This Phase will help you in your pursuit.

      Lastly, a VMI must focus on its internal clients, and that starts with the VMI’s personnel. The VMI is a reflection of its team members – what they do, say, and know will determine how the VMI is perceived…and used.

      Step 2.1 – Vendor classification model

      Determine which classification model works best for your VMI

      The classification model in the Info-Tech blueprint Jump Start Your Vendor Management Initiative is simple and easy to use. It provides satisfactory results for the first one or two years of the VMI’s life. After that, a more sophisticated model should be used, one with more parameters or flexibility to accommodate the VMI’s new maturity.

      Two models are presented on the following pages. The first is a variation of the COST model used in the Jump Start Your Vendor Management Initiative blueprint. The second is the MVP model, which segments vendors into three categories instead of four and eliminates the 50/50 allocation constraint inherent in a 2x2 model.

      Step 2.1 – Vendor classification model

      Configure the COST Vendor Classification Tool

      The image contains a screenshot of the COST classification model.

      If you used the COST classification model in the Jump Start Your Vendor Management Initiative blueprint, you are familiar with its framework: vendors are plotted into a 2x2 matrix based on their spend and switching costs and their value to your operation. The simple variation of this model uses three variables to assess the vendor’s value to your operation and two variables to determine the vendor’s spend and switching cost implications.

      The COST classification model presented here sticks to the same basic tenets but adds to the number of variables used to plot a vendor’s position within the matrix. Six variables are used to define a vendor’s value and three variables are used to set the spend and switching cost. This provides greater latitude in identifying what makes a vendor important to you.

      Step 2.1 – Vendor classification model

      Configure the MVP Vendor Classification Tool

      The image contains a screenshot example of the MVP clsssification tool.

      Another option for classifying vendors is the MVP classification model. In this model, vendors fall into one of three categories: minor, valued, or principal. Similar to the COST vendor classification model, the MVP classification model requires a user to evaluate statements or questions to assess a vendor’s importance to the organization. In the MVP approach, each question/statement is weighted, and the potential responses to each question/statement are assigned points (100, 33, or 10) based on their impact. Multiplying the weight (expressed as a percentage) for each question/statement by the response points for each question/statement yields a line-item score. The total number of points obtained by a vendor determines its classification category. A vendor receiving a score of 75 or greater would be a principal vendor (similar to a strategic vendor under the COST model); 55 to 74 points would be a valued vendor (similar to operational or tactical vendor); less than 55 points would be a minor vendor (similar to a commodity vendor).

      Step 2.1 – Vendor classification model

      Which classification model is best?

      By now, you may be asking yourself, “Which model should I use? What is the advantage of the MVP model?” Great questions! Both models work well, but the COST model has a limitation inherent in any basic 2x2 model. Since two axes are used in a 2x2 approach, the effective weighting for each axis is 50%. As a result, the weights assigned to an individual element are reduced by 50%. A simple but extreme example will help clarify this issue (hopefully).

      Suppose you wanted to use an element such as How integrated with our business processes are the vendor's products/services? and weighted it 100%. Under the 2x2 matrix approach, this element only moves the X-axis score; it has no impact on the Y-axis score. The vendor in this hypothetical could max out the X-axis under the COST model, but additional elements would be needed for the vendor to rise from the tactical quadrant to the strategic quadrant. In the MVP model, if the vendor maxed out the score on that one element (at 100%), the vendor would be at the top of the pyramid and would be a principal vendor.

      One model is not necessarily better than the other. Both provide an objective way for you to determine the importance of your vendors. However, if you are using elements that don’t fit neatly into the two axes of the COST model, consider using the MVP model. Play with each and see which one works best in your environment, knowing you can always switch at a later point.

      2.1.1 – COST Model Vendor Classification Tool

      15 – 45 Minutes

      1. Meet with the participants to decide whether you want to use this model or the MVP model (see next page); if you choose this model, configure it for your environment by reviewing Elevate – COST Model Vendor Classification Tool – Tab 2. Set Parameters.
        1. Review the questions in column C for each axis (items 1-9), the weights in column D, and the answers/descriptors for each question (columns E, F, G, and H). Make any adjustments necessary to fit your culture, environment, and goals.
        2. Using the Jump Start Your Vendor Management blueprint tool Jump - Phase 1 Tools and Templates Compendium – Tab 1.7 Vendor Inventory, sort your vendors by spend; if you used multiple line items for a vendor in the Vendor Inventory Tool, aggregate the spend data for this activity.
        3. Adjust the descriptors and values in row 16 (Item 7) to match your actual data. General guidance for establishing the spend ranges is provided in the tool itself.
      2. No other modifications should be made to the parameters.
      Input Output
      • Jump - Phase 1 Tools and Templates Compendium – Tab 1.7 Vendor Inventory from the blueprint Jump Start Your Vendor Management Initiative
      • Configured COST Model Vendor Classification Tool
      Materials Participants
      • Elevate – Cost Model Vendor Classification Tool – Tab 2. Set Parameters
      • VMI team

      Download the Info-Tech Elevate - COST Model Vendor Classification Tool

      2.1.2 – MVP Model Vendor Classification Tool

      15 – 45 Minutes

      1. Meet with the Participants to decide whether you want to use this model or the COST Model (see previous page); if you choose this model, configure it for your environment by reviewing Elevate – MVP Model Vendor Classification Tool – Tab 2. Set Parameters.
      2. Review the questions in column C (Items 1 - 7 ), the answers/descriptors for each question (columns D, E, and F), and the weights in column G. Make any adjustments necessary to fit your culture, environment, and goals.
      3. For the answers/descriptors use words and phrases that resonate with your audience and are as intuitive as possible.
      4. If you use annualized spend as an element, general guidance for establishing the spend ranges is provided in the tool itself.
      5. When assigning a weight value to a question, refrain from going below 5%; weights below this threshold will have minimal to no impact on a vendor's score.
      InputOutput
      • Jump - Phase 1 Tools and Templates Compendium – Tab 1.7 Vendor Inventory from the Info-Tech blueprint Jump Start Your Vendor Management Initiative
      • Configured MVP Model Vendor Classification Tool
      MaterialsParticipants
      • Elevate – MVP Model Vendor Classification Tool – Tab 2. Set Parameters
      • VMI team

      Download the Info-Tech Elevate – MVP Model Vendor Classification Tool

      Step 2.2 – Customer positioning model

      Identify how the vendors view your organization

      The image contains a screenshot of the customer positioning model.

      Now that you have configured your choice of vendor classification model (or decided to stick with your original model), it’s time to think about the other side of the coin: How do your vendors view your organization. Why is this important? Because the VMI will have only limited success if you are trying to impose your will on your vendors without regard for how they view the relationship from their perspective. For example, if the vendor is one of your strategic (COST Model) or principal (MVP Model) vendors, but you don’t spend much money with them, you are difficult to work with, and there is no opportunity for future growth, you may have a difficult time getting the vendor to show up for BAMs (business alignment meetings), caring about scorecards, or caring about the relationship period.

      Our experience at Info-Tech interacting with our members through vendor management workshops, guided implementations, and advisory calls has led us to a significant conclusion on this topic: Most customers tend to overvalue their importance to their vendors. To open your eyes about how your vendors actually view your account, use Info-Tech’s OPEN Model Customer Positioning Tool. (It is based on the supplier preferencing model pioneered by Steele & Court in 1996 in which the standard 2x2 matrix tool for procurement [and eventually vendor management] was repurposed to provide insights from the vendor’s perspective.) For our purposes, think of the OPEN model for customer positioning as a mirror’s reflection of the COST model for vendor classification. The OPEN model provides a more objective way to determine your importance to your vendors. Ultimately, your relationship with each vendor will be plotted into the 2x2 grid, and it will indicate whether your account is viewed as an opportunity, preferred, exploitable, or negligible.

      *Adapted from Profitable Purchasing Strategies by Paul T. Steele and Brian H. Court

      Step 2.3 – Two-way scorecards

      Design a two-way feedback loop with your vendors

      The image contains a screenshot example of the otwo-way feedback loop with vendors.

      As with the vendor classification models discussed in Step 2.1, the two-way scorecards presented here are an extension of the scorecard and feedback material from the Jump Start Your Vendor Management Initiative blueprint.

      The vendor scorecard in this blueprint provides additional flexibility and sophistication for your scorecarding approach by allowing the individual variables (or evidence indicators) within each measurement category to be evaluated and weighted. (The prior version only allowed the evaluation and weighting at the category level.)

      On the vendor feedback side, the next evolution is to formalize the feedback and document it in its own scorecard format rather than continuing to list questions in the BAM agenda. The vendor feedback template included with this blueprint provides a sample approach to quantifying the vendor’s feedback and tracking the information.

      The fundamentals of scorecarding remain the same:

      • Keep your eye on what is important to you.
      • Limit the number of measurement categories and evidence indicators to a reasonable and manageable number.
      • Simple is almost always better than complicated.

      2.3.1 – Two-way scorecards (vendor scorecard)

      15 – 60 Minutes

      1. Meet with the participants to configure the scorecard from Elevate – Tools and Templates Compendium – Tab 2.3.1 Vendor Scorecard to meet your needs:
        1. Review the measurement categories and criteria and modify as needed.
        2. Weight the measurement categories (Column E) according to their relative importance to each other; make sure the total adds up to 100%.
        3. Weight the measurement criteria (Column D) within each measurement category according to their relative importance to each other; make sure the total adds up to 100%.
      2. As a reminder, the vendor scorecard is for the vendor overall, not for a specific contract.
      3. You can create variations of the scorecard based on vendor categories (e.g. hardware, software, cloud, security, telecom), but avoid the temptation of creating vendor-specific scorecards unless the vendor is unique; conversely, you may want to create two or more scorecards for a vendor that crosses categories (one for each category).
      InputOutput
      • Elevate – Tools and Templates Compendium – Tab 2.3.1 Vendor Scorecard
      • Brainstorming
      • Configured vendor scorecards
      MaterialsParticipants
      • Elevate – Tools and Templates Compendium – Tab 2.3.1 Vendor Scorecard
      • VMI team

      Download the Info-Tech Elevate – Tools and Templates Compendium

      2.3.2 – Two-way scorecards (vendor feedback form)

      15 – 60 Minutes

      1. Meet with the participants to configure the feedback form from Elevate – Tools and Templates Compendium – Tab 2.3.2 Vendor Feedback Form to meet your needs:
        1. Review the measurement categories and criteria and modify as needed.
        2. Weight the measurement categories (Column E) according to their relative importance to each other; make sure the total adds up to 100%.
        3. Weight the measurement criteria (Column D) within each measurement category according to their relative importance to each other; make sure the total adds up to 100%.
      2. As a reminder, the vendor feedback form is for the relationship overall and not for a specific contract.
      3. You can create variations of the feedback form based on vendor categories (e.g. hardware, software, cloud, security, telecom), but avoid the temptation of creating vendor-specific feedback forms unless the vendor is unique; conversely, you may want to create two or more feedback forms for a vendor that crosses categories and you work with different account management teams (one for each team).
      InputOutput
      • Elevate – Tools and Templates Compendium – Tab 2.3.2 Vendor Feedback Form
      • Brainstorming
      • Configured vendor feedback forms
      MaterialsParticipants
      • Elevate – Tools and Templates Compendium – Tab 2.3.2 Vendor Feedback Form
      • VMI team

      Download the Info-Tech Elevate – Tools and Templates Compendium

      Step 2.4 – Performance improvement plan (PIP)

      Design your template to help underperforming vendors

      It is not uncommon to see performance dips from even the best vendors. However, when poor performance becomes a trend, the vendor manager can work with the vendor to create and implement a performance improvement plan (PIP).

      Performance issues can come from a variety of sources:

      • Contractual obligations.
      • Scorecard items.
      • Compliance issues not specified in the contract.
      • Other areas/expectations not covered by the scorecard or contract (e.g. vendor personnel showing up late for meetings, vendor personnel not being adequately trained, vendor personnel not being responsive).

      PIPs should focus on at least a few key areas:

      • The stated performance in the contract or the expected performance.
      • The actual performance provided by the vendor.
      • The impact of the vendor’s poor performance on the customer.
      • A corrective action plan, including steps to be taken by the vendor and due dates and/or review dates.
      • The consequences for not improving the performance level.

      Info-Tech Insight

      PIPs are most effective when the vendor is an operational, strategic, or tactical vendor (COST model) or a principal or valued vendor (MVP model) and when you are an opportunity or preferred customer (OPEN model).

      2.4.1 – Performance improvement plan (PIP)

      15 – 30 Minutes

      1. Meet with the participants to review the two options for PIPs: Elevate – Tools and Templates Compendium – Tabs 2.4.1 and 2.4.2. Decide whether you want to use one or both options.
      2. Modify, add, or delete elements from either or both options to meet your needs.
      3. If you want to add signature lines for acknowledgement by the parties or other elements that may have legal implications, check with your legal advisors.
      InputOutput
      • Elevate – Tools and Templates Compendium - Tabs 2.4.1 and 2.4.2
      • Brainstorming
      • Configured performance improvement plan templates
      MaterialsParticipants
      • Elevate – Tools and Templates Compendium - Tabs 2.4.1 and 2.4.2
      • VMI team

      Download the Info-Tech Elevate – Tools and Templates Compendium

      Step 2.5 – Relationship improvement plan (RIP)

      Identify key relationship indicators for your vendors

      Relationships are often taken for granted, and many faulty assumptions are made by both parties in the relationship: good relationships will stay good, bad relationships will stay bad, and relationships don’t require any work. In the vendor management space, these assumptions can derail the entire VMI and diminish the value added to your organization by vendors.

      To complicate matters, relationships are multi-faceted. They can occur:

      • On an organization-to-organization, working level.
        • Do your roadmaps align with the vendors?
        • Do the parties meet their contractual obligations?
        • Do the parties meet their day-to-day requirements (meetings, invoices, responses to inquiries)?
      • On an individual, personnel-to-personnel basis.
        • Do you have a good relationship with the account manager?
        • Does your project manager work well with the vendor’s project manager?
        • Do your executives have good relationships with their counterparts at the vendor?

      Improving or maintaining a relationship will not happen by accident. There must be a concerted effort to achieve the desired results (or get as close as possible). A relationship improvement plan can be used to improve or maintain a relationship with the vendor and the individuals who make up the vendor’s organization.

      Step 2.5 – Relationship improvement plan (RIP)

      Identify key relationship indicators for your vendors (continued)

      Improving relationships (or even maintaining them) requires a plan. The first step is to understand the current situation: Is the relationship good, bad, or somewhere in between? While the analysis will be somewhat subjective, it can be made more objective than merely thinking about relationships emotionally or intuitively. Relationships can be assessed based on the presence and quality of certain traits, factors, and elements. For example, you may think communication is important in a relationship. However, that is too abstract and subjective; to be more objective, you would need to identify the indicators or qualities of good communication. For a vendor relationship, they might include (but wouldn’t necessarily be limited to):

      • Vendor communication is accurate and complete.
      • Vendor personnel respond to inquiries on a timely basis.
      • Vendor personnel communications are easy to understand.
      • Vendor personnel communicate with you in your preferred manner (text, email, phone).
      • Vendor personnel discuss the pros and cons of vendor products/services being presented.

      Evaluating these statements on a predefined and consistent scale establishes the baseline necessary to conduct a gap analysis. The second half of the equation is the future state. Using the same criteria, what would or should the communication component look like a year from now? After that is determined, a plan can be created to improve the deficient areas and maintain the acceptable areas.

      Although this example focused on one category, the same methodology can be used for additional categories. It all starts with the simple question that requires a complex answer, “What traits are important to you and are indicators of a good relationship?”

      2.5.1 – Relationship Improvement Plan (RIP)

      15 – 60 Minutes

      1. Meet with the participants to configure the relationship indicators in Elevate – Relationship Assessment and Improvement Plan tool – Tab 2. Set Parameters.
      2. Review the 60 relationship indicators in column E of Tab 2. Set Parameters.
      3. Identify any relationship indicators that are important to you but that are missing from the prepopulated list.
      4. Add the relationship indicators you identified in step 3 above in the space provided at the end of column E of Tab 2. Set Parameters. There is space for up to 15 additional relationship indicators.
      InputOutput
      • Elevate – Relationship Assessment and Improvement Plan Tool
      • Brainstorming
      • Configured Relationship Assessment and Improvement Plan tool
      MaterialsParticipants
      • Elevate – Relationship Assessment and Improvement Plan tool
      • Whiteboard of flip chart
      • VMI team

      Download the Info-Tech Elevate – Relationship Assessment and Improvement Plan tool

      Step 2.6 – Vendor-at-a-glance reports

      Configure executive and stakeholder reports

      Executives and stakeholders (“E&S”) discuss vendors during internal meetings and often meet directly with vendors as well. Having a solid working knowledge of all the critical vendors used by an organization is nearly impossible for E&S. Without situational awareness, though, E&S can appear uninformed, can be at the mercy of others with better information, and can be led astray by misinformation. To prevent these and other issues from derailing the E&S, two essential vendor-at-a-glance reports can be used.

      The first report is the 60-Second Report. As the name implies, the report can be reviewed and digested in roughly a minute. The report provides a lot of information on one page in a combination of graphics, icons, charts, and words.

      The second report is a vendor calendar. Although it is a simple document, the Vendor Calendar is a powerful communication tool to keep E&S informed of upcoming events with a vendor. The purpose is not to replace the automated calendaring systems (e.g. Outlook), but to supplement them.

      Combined, the 60-Second Report and the Vendor Calendar provide E&S with an overview of the information required for any high-level meeting with a vendor or to discuss a vendor.

      2.6.1 – Vendor-at-a-glance reports (60-Second Report)

      30 – 90 Minutes

      1. Meet with the participants to review the sample 60-Second Report and the Checklist of Potential Topics in Elevate – Tools and Templates Compendium – Tab 2.6.1 V-at-a-G 60-Second Report.
      2. Identify topics of interest and ways to convey the data/information. (Make sure the data sources are valid and the data are easy to obtain.)
      3. Create a framework for the report and populate the fields with sample data. Use one printed page as a guideline for the framework; if it doesn’t fit on one page, adjust the amount of content until it does. If you adjust the margins, font, size of the graphic content, and other items, make sure you don’t reduce the size too much. The brain needs white space to more easily absorb the content, and people shouldn’t have to squint to read the content!
      4. Share the mockup with the intended audience and get their feedback. Use an iterative approach until you are satisfied that no further changes are necessary (or reasonable). Keep in mind that you will not be able to please everyone!
      InputOutput
      • Elevate – Tools and Templates Compendium – Tab 2.6.1 V-at-a-G 60-Second Report
      • Design elements and framework for 60-Second Reports
      MaterialsParticipants
      • Elevate – Tools and Templates Compendium – Tab 2.6.1. V-at-a-G 60-Second Report
      • Whiteboard or flip chart
      • VMI team

      Download the Info-Tech Elevate – Tools and Templates Compendium

      2.6.2 – Vendor-at-a-glance reports (vendor calendar)

      15 – 30 Minutes

      1. Meet with the participants to review the sample Vendor Calendar format in Elevate – Tools and Templates Compendium – Tab 2.6.2 V-at-a-G Vendor Calendar.
      2. Brainstorm as a team to identify items to include in the calendar (e.g. business alignment meeting dates, conference dates, contract renewals).
      3. Determine whether you want the Vendor Calendar to be:
        1. A calendar year or a fiscal year (if they are different in your organization)
        2. A rolling twelve-month calendar or a fixed calendar.
      4. Decide whether the fill color for each month should change based on your answers in 3, above. For example, you might want a color scheme by quarter or by year (if you choose a rolling twelve-month calendar).
      5. Share the mockup with the intended audience to get their feedback. Use an iterative approach until you are satisfied that no further changes are necessary (or reasonable). Keep in mind you will not be able to please everyone!
      InputOutput
      • Elevate – Tools and Templates Compendium – Tab 2.6.2 V-at-a-G Vendor Calendar
      • Brainstorming
      • Framework and topics for Vendor Calendar Reports
      MaterialsParticipants
      • Elevate – Tools and Templates Compendium – Tab 2.6.2 V-at-a-G Vendor Calendar
      • Whiteboard or flip chart
      • VMI team

      Download the Info-Tech Elevate – Tools and Templates Compendium

      Step 2.7 – VMI personnel competency evaluation tool

      Identify skills, competencies, and knowledge required for success

      The image contains a screenshot of the VMI personnel competency evaluation tool.

      By now, you have built and begun managing the VMI’s 3-year roadmap and 90-day plans to help you navigate the VMI’s day-to-day operational path. To complement these plans, it is time to build a roadmap for the VMI’s personnel as well. It doesn’t matter whether VMI is just you, you and some part-time personnel, a robust and fully staffed vendor management office, or some other point on the vendor management spectrum. The VMI is a reflection of its personnel, and they must improve their skills, competencies, and knowledge (“S/C/K”) over time for the VMI to reach its potential. As the adage says, “What got you here won’t get you there.”

      To get there requires a plan that starts with creating an inventory of the VMI’s team members’ S/C/K. Initially, focus on two items:

      • What S/C/K does the VMI currently have across its personnel?
      • What S/C/K does the VMI need to get to the next level?

      Conducting an assessment of and developing an improvement plan for each team member will be addressed later in this blueprint. (See steps 3.7 – Evaluate VMI Personnel, 3.8 – Improve Professional Skills, and 3.9 - Expand Professional Knowledge.)

      2.7.1 – VMI Personnel Competency Evaluation Tool

      15 – 60 Minutes

      1. Review the two options of the competency matrix found in Elevate – Tools and Templates Compendium tabs 2.7.1 and 2.7.2 and decide which format you want to use.
      2. Review and modify as needed the prepopulated list of skills, competencies, knowledge, and other intellectual assets found in section 1 of the template option you selected in step 1. The list you use should reflect items that are important to your VMI's mission, goals, scope, charter, and operations.
      3. No changes are required to Sections 2 and 3. They are dashboards and will be updated automatically based on any changes you make to the skills, competencies, knowledge, and other intellectual assets elements in section 1.
      Input Output
      • Elevate – Tools and Templates Compendium – Tabs 2.7.1 and 2.7.2
      • Current job descriptions
      • A list of competencies, skills, and knowledge VMI personnel
        • Should have
        • Do have

      An assessment and inventory of competencies, skills, knowledge, and other intellectual assets by VMI team member

      Materials Participants
      • Elevate – Tools and Templates Compendium – Tabs 2.7.1 and 2.7.2
      • VMI team lead
      • VMI team members as needed

      Download the Info-Tech Elevate – Tools and Templates Compendium.

      Step 2.8 – Internal feedback tool

      Create a user-friendly survey to learn about the VMI’s impact on the organization

      The image contains a screenshot of the internal feedback tool.

      *Adapted from “Best Practices for Every Step of Survey Creation” from surveymonkey.com and “The 9 Most Important Survey Design Tips & Best Practices” by Swetha Amaresan.

      As part of the vendor management lifecycle, the VMI conducts an annual review to assesses compliance with policies and procedures, to incorporate changes in leading practices, to ensure that lessons learned are captured and leveraged, to validate that internal alignment is maintained, and to update governances as needed. As the VMI matures, the annual review process should incorporate feedback from those the VMI serves and those directly impacted by the VMI’s efforts. Your internal clients and others will be able to provide insights on what the VMI does well, what needs improvement, what challenges arise when using the VMI’s services, and other issues.

      A few best practices for creating surveys are set out below:*

      1. Start by establishing a clearly defined, attainable, and high-level goal by filling in the blank: "I want to better understand [blank] (e.g. how the VMI impacts our clients and the executives/stakeholders)." From there, you can begin to derive questions that will help you meet your stated goal.
      2. Use mostly “closed-ended” questions in the survey – responses selected from a list provided. Do ask some “open-ended” questions at the end of the survey to obtain specific examples, anecdotes, or compliments by providing space for the respondent to provide a narrative.
      3. Avoid using biased and leading questions, for example, “Would you say the VMI was great or merely fabulous?” The goal is to get real feedback that helps the VMI improve. Don’t ask the respondents to tell you what you want to hear…listen to what they have to say.

      Step 2.8 – Internal feedback tool

      Create a user-friendly survey to learn about the VMI’s impact on the organization (continued)

      The image contains a screenshot of the internal feedback tool.

      4. Pay attention to your vocabulary and phrasing; use simple words. The goal is to communicate effectively and solicit feedback, and that all starts with the respondents being able to understand what you are asking or seeking.

      5. Use response scales and keep the answer choices balanced. You want the respondents to find an answer that matches their feedback. For example, potential answers such as “strongly agree, agree, neutral, disagree, strongly disagree” are better than “strongly agree, agree, other.”

      6. To improve your response rate, keep your survey short. Most people don’t like surveys, but they really hate long surveys. Make every question count, and keep the average response time to a maximum of a couple of minutes.

      7. Watch out for “absolutes;” they can hurt the quality of your responses. Avoid using language such as always, never, all, and every in your questions or statements. They tend to polarize the evaluation and make it feel like an all-or-nothing situation.

      8. Ask one question at a time or request evaluation of one statement at a time. Combining two topics into the same question or statement (double-barreled questions or statements) makes it difficult for the respondent to determine how to answer if both parts require different answers, for example, “During your last interaction with the VMI, how would you rate our assistance and friendliness?”

      2.8.1 – Internal Feedback Tool

      15 – 60 Minutes

      1. Meet with the participants and review the information in Elevate – Phase 2 Tools and Templates Compendium – Tab 2.8.
      2. Two types of surveys are referenced in tab 2.8: a general awareness survey and a specific interaction survey. Decide whether you want to create one or both for your VMI.
        1. For a general awareness survey, review the questions in part 1 of tab 2.8 and make any changes required to meet your needs. Try to keep the number of questions to seven or less. Determine who will receive the survey and how often it will be used.
        2. For a specific interaction survey, review the questions in Part 2 of Tab 2.8. Select up to 7 questions you want to use, making changes to existing questions or creating your own. The goal of this survey is to solicit feedback immediately after one of your internal clients has used the VMI’s services. You may need multiple variations of the survey based on the types of interactions or services the VMI provides.
      3. Balance the length of the surveys against the information you are seeking and the time required for the respondents to complete the survey.
      InputOutput
      • Elevate – Phase 2 Tools and Templates Compendium – Tab 2.8
      • Brainstorming
      • Configured internal surveys
      MaterialsParticipants
      • Elevate – Phase 2 Tools and Templates Compendium – Tab 2.8
      • VMI team

      Download the Info-Tech Elevate –Tools and Templates Compendium

      Step 2.9 – VMI ROI calculation

      Identify ROI variables to track

      After the VMI has been operating for a year or two, questions may begin to surface about the value the VMI provides. “We’re making an investment in the VMI. What are we getting in return?” “Does the VMI provide us with any tangible benefits, or is it another mandatory area like Internal Audit?” To keep the naysayers at bay, start tracking the value the VMI adds to the organization or the return on investment (ROI) provided.

      The easy thing to focus on is money: hard-dollar savings, soft-dollar savings, and cost avoidance. However, the VMI often plays a critical role in vendor-facing activities that lead to saving time, improving performance, and managing risk. All of these are quantifiable and trackable. In addition, internal customer satisfaction (step 2.8 and step 3.11) can provide examples of the VMI’s impact beyond the four pillars of money, time, performance, and risk.

      VMI ROI is a multifaceted and complex topic that is beyond the scope of this blueprint. However, you can do a deep (or shallow) dive on this topic by downloading and reading Info-Tech’s blueprint Capture and Market the ROI of Your VMO to plot your path for tracking and reporting the VMI’s ROI or value.

      Download the Info-Tech blueprint Capture and Market the ROI of Your VMO

      2.9.1 – VMI ROI calculation

      2 – 4 Hours

      1. Meet with the participants to review the Info-Tech blueprint Capture and Market the ROI of Your VMO.
      2. Identify your ROI maturity level using the tools from that blueprint.
      3. Develop a game plan for measuring and reporting your ROI.
      4. Configure the tools to meet your needs.
      5. Gain approval from applicable stakeholders or executives.
      Input Output
      • The tools and materials from the Info-Tech blueprint Capture and Market the ROI of Your VMO
      • Brainstorming
      • Game plan for measuring and reporting ROI
      Materials Participants
      • The Info-Tech blueprint Capture and Market the ROI of Your VMO and its tools
      • VMI team
      • Executives and stakeholders as needed

      Download the Info-Tech blueprint Capture and Market the ROI of Your VMO

      Step 2.10 – Vendor recognition program

      Address the foundational elements of your program

      A vendor recognition program can provide many benefits to your organization. Obtaining those benefits requires a solid plan and the following foundational elements:

      • Internal alignment: The program must align with your organization’s principles and culture. A vendor recognition program that accentuates value and collaboration will not succeed in a customer environment that operates with a “lowest cost wins/price is the only thing we care about” mentality.
      • Funding: Not every program requires extensive funding (or any funding), but more formal vendor recognition programs do require some investment. Underfunding will make your program look cheap and unimpressive. For example, a certificate of appreciation printed on plain paper using a Word template doesn’t send the same message as a nice plaque engraved with the winner’s name.
      • Support: Executive buy-in and support are essential. Without this, only the most informal vendor recognition programs stand a chance of surviving. Executives and stakeholders are often directly involved in formal programs, and this broadens the appeal of the program from the vendor’s perspective.
      • Designated leader: Someone needs to be in charge of the vendor recognition program. This doesn’t mean only one person is doing all the work, but it does require one person to lead the effort and drive the program forward. Much like the VMI itself, there are things the leader will be able to do themselves and things that will require the input, assistance, and participation from others throughout the organization.

      Step 2.10 – Vendor recognition program

      Leverage the advantages of recognizing vendors

      As with any project, there are advantages and disadvantages with implementing and operating a vendor recognition program.

      Advantages:

      • The Pygmalion effect may come into play; the vendors’ performance can be influenced by your expectations as conveyed through the program.
      • There may be some prestige for the vendor associated with winning one of your awards or receiving recognition.
      • Vendor recognition programs can be viewed as a competition, and this can improve vendor performance as it relates to the program and program categories.
      • The program can provide additional feedback to the vendor on what's important to you and help the vendor focus on those items.
      • The vendors’ executives may have an increased awareness of your organization, which can help build relationships.
      • Performance gains can be maintained or increased. Vendors are competitive by nature. Once a vendor wins an award or receives the recognition, it will strive to win again the following year (or measurement period).

      Step 2.10 – Vendor recognition program

      Manage the disadvantages of recognizing vendors

      Just as a coin has two sides, there are two sides to a vendor recognition program. Advantages must be weighed against disadvantages, or at the very least, you must be aware of the potential disadvantages.

      Disadvantages:

      • The program may require funding, depending upon the scope and type of awards, rewards, and recognition being provided.
      • Some vendors who don’t qualify for the program or who fail to win may get hurt feelings. This may alienate them.
      • In addition to hurt feelings from being excluded or finishing outside of the winner’s circle, some vendors may believe the program shows favoritism to certain vendors or is too subjective.
      • Some vendors may not “participate” in the program; they may not understand the WIIFM (what’s in it for me). You may have to “sell” the benefits and advantages of participation to the vendors.
      • Participation may vary by size of vendor. The award, reward, or recognition may mean more to small and mid-sized companies than large companies.

      Step 2.10 – Vendor recognition program

      Create your program’s framework

      There is no one-size-fits-all approach to creating a vendor recognition program. Your program should align with your goals. For example, do you want to drive performance and collaboration, or do you want to recognize vendors that exceed your expectations? While these are not mutually exclusive, the first step is to identify your goals. Next, focus on whether you want a formal or informal program. An informal program could consist of sending thank-you emails or notes to vendor personnel who go above and beyond; a formal program could consist of objective criteria announced and measured annually, with the winners receiving plaques, publicity, and/or recognition at a formal award ceremony with your executives. Once you have determined the type of program you want, you can begin building the framework.

      Take a “crawl, walk, run” approach to designing, implementing, and running your vendor recognition program. Start small and build on your successes. If you try something and it doesn’t work the way you intended, regroup and try again.

      The vendor recognition program may or may not end up residing in the VMI. Regardless, the VMI can be instrumental in creating the program and reinforcing it with the vendors. Even if the program is run and operated by the VMI, other departments will need to be involved. Seek input from the legal and marketing departments to build a durable program that works for your environment and maximizes its impact.

      Lastly, don’t overlook the simple gestures…they go a long way to making people feel appreciated in today’s impersonal world. A simple (but specific) thank-you can have a lasting impact, and not everything needs to be about the vendor’s organization. People make the organization “go,” not the other way around.

      2.10.1 – Vendor recognition program

      30 – 90 Minutes

      1. Meet with the participants to review the checklist in Elevate – Tools and Templates Compendium, Tab 2.10 Vendor Recognition.
        1. Decide whether you want to create a program that recognizes individual vendor personnel. If so, review part 1 of tab 2.10 and select the elements you are interested in using to build your program.
        2. Decide whether you want to create a program that recognizes vendors at the company level. If so, review part 2 of tab 2.10.
          1. The first section lists elements of an informal and a formal approach. Decide which approach you want to take.
          2. The second section focuses on creating a formal recognition program. Review the checklist and identify elements that you want to include or issues that must be addressed in creating your program.
      2. Create a draft framework of your programs and work with other areas to finalize the program elements, timeline, marketing, budget, and other considerations.
      Input Output
      • Elevate – Tools and Templates Compendium – Tab 2.10 Vendor Recognition
      • Brainstorming
      • A framework for a vendor recognition program
      Materials Participants
      • Elevate – Tools and Templates Compendium – Tab 2.10. Vendor Recognition
      • Whiteboard or flip chart
      • VMI team
      • Executives and stakeholders as needed
      • Marketing and legal as needed

      Download the Info-Tech Elevate – Tools and Templates Compendium

      Phase 3 – Run

      Use New and Updated Tools and Increase the VMI’s Impact

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Review and update existing Plan materials

      2.1 Vendor classification models

      2.2 Customer positioning model

      2.3 Two-way scorecards

      2.4 Performance improvement plan (PIP)

      2.5 Relationship improvement plan (RIP)

      2.6 Vendor-at-a-glance reports

      2.7 VMI personnel competency evaluation tool

      2.8 Internal feedback tool

      2.9 VMI ROI calculation

      2.10 Vendor recognition program

      3.1 Classify vendors and identify customer position

      3.2 Assess the relationship landscape

      3.3 Leverage two-way scorecards

      3.4 Implement PIPs and RIPs

      3.5 Gather market intelligence

      3.6 Generate vendor-at-a-glance reports

      3.7 Evaluate VMI personnel

      3.8 Improve professional skills

      3.9 Expand professional knowledge

      3.10 Create brand awareness

      3.11 Survey internal clients

      3.12 Calculate VMI ROI

      3.13 Implement vendor recognition program

      4.1 Investigate potential alliances

      4.2 Continue increasing the VMI’s strategic value

      4.3 Review and update

      This phase will walk you through the following activities:

      This phase helps you begin integrating the new tools and templates into the VMI’s operations. The main outcomes from this phase are guidance and the steps required to continue your VMI’s maturation and evolution.

      This phase involves the following participants:

      • VMI team
      • IT
      • Legal
      • Marketing
      • Human resources
      • Applicable stakeholders and executives
      • Others as needed

      Phase 3 – Run

      Implement new processes, tools, and templates and leverage new concepts

      The review and assessment conducted in Phase 1 – Plan and the tools and templates created and configured during Phase 2 – Build are ready for use and incorporation into your operations. As you trek through Phase 3 – Run, a couple of familiar concepts will be reviewed (vendor classification and scorecarding), and additional details on previously introduced concepts will be provided (customer positioning, surveying internal clients); in addition, new ideas will be presented for your consideration:

      • Assessing the relationship landscape
      • Gathering market intelligence
      • Improving professional skills
      • Expanding professional knowledge
      • Creating brand awareness

      Step 3.1 – Classify vendors & identify customer position

      Classify your top 25 vendors by spend

      The methodology used to classify your vendors in the blueprint Jump Start Your Vendor Management Initiative applies here as well, regardless of whether you use the COST model or the MVP model. Info-Tech recommends using an iterative approach initially to validate the results from the model you configured in step 2.1.

      1. Start with your top 25 vendors by spend. From this pool, select 10 vendors: choose your top three vendors by spend, three from the middle of the pack (e.g. numbers 14, 15, and 16 by spend), and the bottom four by spend. Run all 10 vendors through the classification model and review the results.
      2. If the results are what you expected and do not contain any significant surprises, run the rest of the top 25 vendors through the model.
      3. If the results are not what you expected or do contain significant surprises, look at the configuration page of the tool (tab 2) and adjust the weights slightly. Be cautious in your evaluation of the results before modifying the configuration page – some legitimate results are unexpected or surprises based on biases or subjective expectations. Proceed to point 1 above and repeat this process as needed.

      Remember to share the results with executives and stakeholders. Switching from one classification model to another may lead to concerns or questions. As always, obtain their buy-in on the final results.

      Step 3.1 – Classify vendors and identify customer position

      Translate terminology and processes if you use the MVP vendor classification model

      If you use the MVP model, the same features will be applicable and the same processes will be followed after classifying your vendors, despite the change in nomenclature. (Strategic vendors are the equivalent of principal vendors; high operational and high tactical vendors are the equivalent of valued vendors; and all other vendors are the equivalent of minor vendors.)

      • Roughly 5% (max) of your total vendor population will be classified as principal.
      • Approximately 10% (max) of your total vendor population will be classified as valued.
      • About 80% of your total vendor population will be classified as minor.
      • Business alignment meetings should be conducted and scorecards should be compiled quarterly for your principal vendors and at least every six months for your valued vendors; business alignment meetings are not necessary for your minor vendors.
      • All other activities will be based on the criteria you used in your MVP model. For example, risk measuring, monitoring, and reporting might be done quarterly for principal and valued vendors if risk is a significant component in your MVP model; if risk is a lesser component, measuring, monitoring, and reporting might be done less frequently (every six or 12 months).

      Step 3.1 – Classify vendors and identify customer position

      Determine your customer position for your top 25 vendors using the OPEN model

      The image contains a screenshot of the customer positioning model.

      After classifying your vendors, run your top 25 vendors through the OPEN Model Customer Positioning Tool. The information you need can come from multiple sources, including:

      • Talking to internal personnel to determine responses to the OPEN model assessment statements.
      • Compiling spend information.
      • Looking at the vendors’ financial statements.
      • Talking with the vendors to glean additional information.

      At first blush, the results can run the emotional and logical gamut: shocking, demeaning, degrading, comforting, insightful, accurate, off-kilter, or a combination of these and other reactions. To a certain extent, that is the point of the activity. As previously stated, customers often overestimate their importance to a vendor. To be helpful, your perspective must be as objective as possible rather than the subjective view painted by the account team and others within the vendor (e.g. “You’re my favorite client,” “We love working with you,” “You’re one of our key accounts,” or “You’re one of our best clients.”) The vendor often puts customers on a pedestal that is nothing more than sales puffery. How a vendor treats you is more important than them telling you how great you are.

      Use the OPEN model results and the material on the following pages to develop a game plan as you move forward with your vendor-facing VMI activities. The outcomes of the OPEN model will impact your business alignment meetings, scorecards, relationships, expectations, and many other facets of the VMI.

      Info-Tech Insight

      The OPEN Model Customer Positioning Tool can be adapted for use at the account manager level to determine how important your account is to the account manager.

      *Adapted from Profitable Purchasing Strategies by Paul T. Steele and Brian H. Court

      Step 3.1 – Classify vendors and identify customer position

      Learn how each quadrant of the open model impacts your organization (continued)

      Opportunity

      Low value and high attractiveness

      Characteristics and potential actions by the vendor

      • Higher level of service provided.
      • Higher level of attention.
      • Nurture the customer.1
      • Expand the business and relationship.1
      • Seek new opportunities.2
      • Provide proactive service.
      • Demonstrate added value.

      Customer strategies

      • Leverage the position – the vendor may be willing (at least in the short term) to meet your requirements in order to win more business.3
      • Look for ways to improve your value to the vendor and to grow the relationship and business if it works to your advantage.
      1. Procurement Cube, 2020. 2. Accuity Consultants, 2012. 3. New Zealand Ministry of Business, Innovation & Employment, 2021.

      Step 3.1 – Classify vendors and identify customer position

      Learn how each quadrant of the OPEN model impacts your organization (continued)

      Preferred

      High value and high attractiveness

      Characteristics and potential actions by the vendor

      • High level of service provided.
      • High level of attention, service, and response.1
      • The supplier actively seeks longer-term commitments.2
      • Retain and expand the business and relationship.3
      • Look after and pamper the customer.4
      • Fight to keep the account.
      • There is a dedicated account manager2 (you are the account manager’s only account).

      Customer strategies

      • Establish a rewarding business relationship in which both parties continually seek to add value.3
      • Leverage the relationship to gain better access to innovation, collaborate to eliminate waste, and work together to maintain or increase your competitive advantages.1
        1. Procurement Cube, 2020. 2. Comprara, 2015. 3. New Zealand Ministry of Business, Innovation & Employment, 2021. 4. Accuity Consultants, 2012.

      Step 3.1 – Classify vendors and identify customer position

      Learn how each quadrant of the OPEN model impacts your organization (continued)

      Exploitable

      High value and low attractiveness

      Characteristics and potential actions by the vendor

      • Lower level of service provided.
      • Lower level of attention.
      • Strive for best price from the customer (i.e. premium pricing).1
      • Seek short-term advantage and consistent price increases.
      • Accept risk of losing the customer.
      • Focus on maximizing profits.2
      • Provide reactive service.

      Customer strategies

      • Look for alternative vendors or try to make the relationship more attractive by considering more efficient ways to do business2 or focusing on issues other than pricing.
      • Identify ways to improve your organization’s attractiveness to the vendor or the account manager.
      1. Accuity Consultants, 2012. 2. New Zealand Ministry of Business, Innovation & Employment, 2021.

      Step 3.1 – Classify vendors and identify customer position

      Learn how each quadrant of the open model impacts your organization

      Negligible

      Low value and low attractiveness

      Characteristics and potential actions by the vendor

      • Lower level of service provided.
      • Lower level of attention.1
      • Loss of interest and enthusiasm for customer’s business.
      • Loss of customer will not cause any pain.1
      • Terminate the relationship.2
      • Terms and conditions are the “standard” terms and are non-negotiable.3
      • There is a standard price list and discounts are in line with industry norms.3

      Customer strategies

      • You may wish to consider sourcing from other suppliers who value your business more highly.2
      • Identify the root cause of your position and determine whether it is worthwhile (or possible) to improve your position.
      1. Procurement Cube, 2020. 2. New Zealand Ministry of Business, Innovation & Employment, 2021. 3 Comprara, 2015.

      Step 3.1 – Classify vendors and identify customer position

      Think like a vendor to increase situational awareness

      In summary, vendor actions are understandable and predictable. Learning about how they think and act is invaluable. As some food for thought, consider this snippet from an article aimed at vendors:

      “The [customer positioning] grid or matrix is, in itself, a valuable snapshot of the portfolio of customers. However, it is what we do with this information that governs how effective the tool is. It can be used in many ways:

      • It helps in the allocation of resources to specific customers, and whether the right resources are being allocated to the right customers.
      • It can determine the style of relationship that is appropriate to have with this client – and whether the real relationship truly reflects this.
      • It can influence the amount of time spent with these clients. Interestingly, we often find that a disproportionate amount of management time is spent on [Negligible] Customers (at the expense of spending more time with [Preferred] Accounts)!
      • It should significantly influence the price and profitability targets for specific customers.
      • And, last but by no means least, it should determine our negotiation style for different customers.”1
      1 “Rule No. 5: All Customers/Suppliers Have a Different Value to You,” New Dawn Partners.

      Step 3.2 – Assess the relationship landscape

      Identify key relationships and relationship risks

      After classifying your vendors (COST or MVP model) and identifying your positioning for the top vendors via the OPEN Model Customer Positioning Tool, the next step is to assess the relationship landscape. For key vendors (strategic, high operational, and high tactical under the COST model and principal and valued under the MVP model), look closer at the relationships that currently exist:

      • What peer-to-peer relationships exist between your organization and the vendor (e.g. your project manager works closely with the vendor’s project manager)? Look across executives, mid-level management, and frontline employees.
      • What politically charged relationships exist between employees of the two organizations and the organizations themselves? Examples include:
        • Friendships, neighbors, and relationships fostered by children on the same sports team or engaged in other activities.
        • Serving on third-party boards of directors or working with the same charities in an active capacity.
        • Reciprocity relationships where each organization is a customer and vendor to the other (e.g. a bank buys hardware from the vendor and the vendor uses the customer for its banking needs).
      • How long has the contract relationship been in place?

      This information will provide a more holistic view of the dynamics at work (or just beneath the surface) beyond the contract and operational relationships. It will also help you understand any relationship leverage that may be in play…now or in the future…from each party’s perspective.

      3.2.1 – Assess the relationship landscape

      10 - 30 Minutes per vendor

      1. Decide whether to meet with the participants in small groups or as a large group.
      2. Using Elevate – Tools and Templates Compendium – Tab 3.2 Relationship Landscape, for each important vendor (strategic, tactical, and operational under the COST model or principal and valued under the MVP model), identify and evaluate the relationships that exist for the following categories:
        1. Professional: relationships your personnel have with the vendor’s executives, mid-level management, and frontline employees.
        2. Political: personal relationships between customer and vendor personnel, any professional connections, and any reciprocity between your organization and the vendor.
      Input Output
      • Relationship information
      • Vendor classification categories for each vendor being assessed
      • A list of customer-vendor relationships
      • Potential reciprocity issues to manage
      Materials Participants
      • Elevate – Tools and Templates Compendium – Tab 3.2 Relationship Landscape
      • VMI team
      • Stakeholders
      • Others with knowledge of customer/vendor relationships

      Download the Info-Tech Elevate – Tools and Templates Compendium

      Step 3.3 – Leverage two-way scorecards

      Roll out your new vendor scorecards and feedback forms

      As you roll out your new, enhanced scorecards, the same principles apply. Only a couple of modifications need to be made to your processes.

      For the vendor scorecards, the VMI will still be driving the process, and internal personnel will still be completing the scorecards. An email or short orientation meeting for those involved will ease the transition from the old format to the new format. Consider creating a FAQ (frequently asked questions) for the new template, format, and content; you’ll be able to leverage it via the email or meeting to answer questions such as: What changed? Why did it change? Why are we doing this? In addition, making a change to the format and content may generate a need for new or additional internal personnel to be part of the scorecarding process. A scorecarding kick-off meeting or orientation meeting will ensure that the new participants buy into the process and acclimate to the process quickly.

      For the vendor feedback, the look and feel is completely new. The feedback questions that were part of the BAM agenda have been replaced by a more in-depth approach that mirrors the vendor scorecards. Consider conducting a kick-off meeting with each participating vendor to ensure they understand the importance of the feedback form and the process for completing it. Remember to update your process to remind the vendors to submit the feedback forms three to five business days prior to the BAM (and update your BAM agenda). You will want time to review the feedback and identify any questions or items that need to be clarified. Lastly, set aside some extra time to review the feedback form in the first BAM after you shift to the formal format.

      Step 3.4 – Implement PIPs and RIPs

      Improve vendor performance

      Underperforming vendors are similar to underperforming employees. There can be many reasons for the lackluster performance, and broaching the subject of a PIP may put the vendor on the defensive. Consider working with the human resources department (or whatever it is called in your organization) to learn some of the subtle nuances and best practices from the employee PIP realm that can be used in the vendor PIP realm.

      When developing the PIP, make sure you:

      • Work with legal to ensure compliance with the contract and applicable laws.
      • Adequately convey the expected performance to the vendor; it is unfair to hold a vendor accountable for unreasonable and unconveyed expectations.
      • Work with the vendor on the PIP rather than imposing the PIP on the vendor.
      • Remain objective and be realistic about timelines and improvement.

      Not all performance issues require a PIP; some can be addressed one-on-one with the vendor’s account manager, project manager, or other personnel. The key is to identify meaningful problems and use a PIP to resolve them when other measures have failed or when more formality is required.

      A PIP is a communication tool, not a punishment tool. When used properly, PIPs can improve relationships, help avoid lawsuits, and prevent performance issues from having a significant impact on your organization.

      Step 3.4 – Implement PIPs and RIPs

      Improve vendor relationships

      After assessing the relationship landscape in step 3.2 and configuring the Relationship Assessment and Improvement Plan Tool in step 2.5, the next step is to leverage that information: 1) establish a relationship baseline for each critical vendor; and 2) develop and implement a plan for each to maintain or improve those relationships.

      The Relationship Assessment and Improvement Plan Tool provides insights into the actual status of your relationships. It allows you to quantify and qualify those relationships rather than relying on intuition or instinct. It also pinpoints areas that are strong and areas that need improvement. Identify your top seven relationship priorities and build your improvement/maintenance plan around those to start. (This number can be expanded if some of your priorities are low effort or if you have several people who can assist with the implementation of the plan.) Decide which relationship indicators need a formal plan, which ones require only an informal plan, and which ones involve a hybrid approach. Remember to factor in the maintenance aspect of the relationship – if something is going well, it can still be a top priority to ensure that the relationship component remains strong.

      Similar to a PIP, your RIP can be very formal with action items and deadlines. Unlike a PIP, the RIP is typically not shared with the vendor. (It can be awkward to say, “Here are the things we’re going to do to improve our relationship, vendor.”)

      The level of formality for your plan will vary. Customize your plan for each vendor. Relationships are not formulaic, although they can share traits. Keep in mind what works with one person or one vendor may not work for another. It’s okay to revisit the plan if it is not working and make adjustments.

      Step 3.5 – Gather market intelligence

      Determine the nature and scope of your market intelligence

      What is market intelligence?

      Market intelligence is a broad umbrella that covers a lot of topics, and the breadth and depth of those topics depend on whether you sit on the vendor or customer side of the equation. Even on the customer side, the scope and meaning of market intelligence are defined by the role served by those gathering market intelligence. As a result, the first step for the VMI is to set the boundaries and expectations for its role in the process. There can be some overlap between IT, procurement/sourcing, and the VMI, for example. Coordinating with other functional areas is a good idea to avoid stepping on each other’s toes or expending duplicate resources unnecessarily.

      For purposes of this blueprint, market intelligence is defined as gathering, analyzing, interpreting, and synthesizing data and information about your critical vendors (high operational, high tactical, and strategic under the COST model or valued and principal under the MVP model), their competitors, and the industry. Market intelligence can be broken into two basic categories: individual vendors and the industry as a whole. For vendors, it generally encompasses data and information about products and services available, each vendor’s capabilities, reputation, costs, pricing, advantages, disadvantages, finances, location, risks, quality ratings, standard service level agreements (SLAs) and other metrics, supply chain risk, total cost of ownership, background information, and other points of interest. For the industry, it can include the market drivers, pressures, and competitive forces; each vendor’s position in the industry; whether the industry is growing, stable, or declining; whether the industry is competitive or led by one or two dominant players; and the potential for disruption, trends, volatility, and risk for the industry. This represents some of the components of market intelligence; it is not intended to be an exhaustive list.

      Market intelligence is an essential component of a VMI as it matures and strives to be strategic and to provide significant value to the organization.

      Step 3.5 – Gather market intelligence

      Determine the nature and scope of your market intelligence

      What are the benefits of gathering market intelligence?

      Depending on the scope of your research, there are many potential uses, goals, and benefits that flow from gathering market intelligence:

      • Identify potential alternate vendors.
      • Learn more about the vendors and market in general.
      • Identify trends, innovations, and what’s available in the industry.
      • Improve contract protections and mitigate contract/performance risk.
      • Identify more comprehensive requirements for RFPs and negotiations.
      • Identify the strengths, weaknesses, opportunities, and threats for vendors.
      • Assist with minority/women/veteran-owned business or small business use initiatives.
      • Improve the pool of potential vendors for future RFPs, which can improve competition for your business.
      • Leverage information gained when negotiating or renegotiating at renewal (better terms and conditions).
      • Ensure ongoing alignment or identify gaps/risks between your current vendor’s capabilities and your needs.

      Step 3.5 – Gather market research and intelligence

      Begin collecting data and information

      What are some potential sources of information for market intelligence?

      For general information, there are many places to obtain market intelligence. Here are some common resources:

      • User groups
      • The internet
      • Vendor demos
      • Vendor marketing materials and websites
      • Internal personnel interviews and meetings
      • Industry publications and general periodicals
      • Trade shows and conferences (hosted or attended by vendors)
      • Requests for information (RFIs) and requests for proposal (RFPs)
      • Vendor financial filings for publicly held companies (e.g. annual reports, 10-K, 10-Q)

      Keep in mind the source of the information may be skewed in favor of the vendor. For example, vendor marketing materials may paint a rosier picture of the vendor than reality. Using multiple sources to validate the data and information is a leading practice (and common sense).

      For specific information, many VMIs use a third-party service. Third-party services can dedicate more resources to research since that is their core function. However, the information obtained from any third party should be used as guidance and not as an absolute. No third-party service has access to every deal, and market conditions can change often and quickly.

      Step 3.5 – Gather market research and intelligence

      Resolve storage and access issues

      Some additional thoughts on market intelligence

      • Market intelligence is another tool in the VMI’s toolbox. How you use it and what you do with the results of your efforts is critical. Collecting information and passing it on without analysis or insights is close to being a capital offense.
      • As previously mentioned, defining the scope and nature of market intelligence is the first step. In conjunction with that, remember to identify where the information will be stored. Set up a system that allows for searching by relevance and easy retrieval. You can become overwhelmed with information.
      • Periodically update the scope and reach of your market intelligence efforts. Do you need to expand, contract, or maintain the breadth and depth of your research? Do new vendors and industries need to be added to the mix?
      • Information can grow stale. Review your market intelligence repository at least annually and purge unneeded or outdated information. Be careful though – some historical information is helpful to show trends and evolution. Decide whether old information should be deleted completely or moved to an archive.
      • Determine who should have access to your repository and what level of access they should have. Do you want to share outside of the VMI? Do you want others to contribute to or modify/edit the material in the repository or only be able to read from the repository?

      Step 3.6 – Generate vendor-at-a-glance reports

      Keep executives and stakeholders informed about critical vendors

      Much of the guidance provided on reports in the blueprint Jump Start Your Vendor Management Initiative holds true for the 60-Second Report and the Vendor Calendar.

      • Determine who will be responsible for updating the reports, knowing that the VMI will be mainly coordinating the process and assembling the data/information rather than obtaining the data firsthand.
      • Determine the frequency. Most likely it will be periodic and ad hoc; for example, you may decide to update the 60-Second Report in whole or in part each quarter, but you may need to update it in the middle of the quarter if an executive has a meeting with one of your critical vendors at that time.
      • Even though you obtained feedback and “approval” from executives and stakeholders during step 2.6, you will still want to seek their input periodically. Their needs may change from time to time with respect to data, information, and formatting. Avoid the temptation to constantly make changes to the format, though. After the initial review cycle, try to make changes only annually as part of your ongoing review process.
      • Unfortunately, these reports require a manual approach; some parts may be automated, but that will depend on your format and systems.

      These reports should be kept confidential. Consider using a “confidential” stamp, header, watermark, or other indicator to highlight that the materials are sensitive and should not be disclosed outside of your organization without approval.

      Step 3.7 – Evaluate VMI personnel

      Compare skills, competencies, and knowledge needed to current levels

      Using the configured VMI personnel assessment tool (Elevate – Tools and Templates Compendium tab 2.7.1 or 2.7.2), evaluate each VMI employee’s skills, competencies, and knowledge (S/C/K) against the established minimum level required/desired field for each. Use this tool for full-time and part-time team members to obtain a complete inventory of the VMI’s S/C/K.

      After completing the assessment, you will be able to identify areas where personnel exceed, meet, or fail to meet the minimum level required/desired using the included dashboards. This information can be used to create a development plan for areas of deficiency or areas where improvement is desired for career growth.

      As an alternative, you can assess VMI personnel using their job descriptions. Tab 2.7.3 of the Tools and Templates Compendium is set up to perform this type of analysis and create a plan for improvement when needed. Unlike Tabs 2.7.1 and 2.7.2, however, the assessment does not provide a dashboard for all employee evaluations. Tab 2.7.3 is intended to focus on the different roles and responsibilities for each employee versus the VMI as a whole.

      Lastly, you can use Tab 2.7.4 to evaluate potential VMI personnel during the interview process. Load the roles and responsibilities into the template, and evaluate all the candidates on the same criteria. A dashboard at the bottom of the template quantifies the number of instances each candidate exceeds, meets, and fails to meet the criteria. Used together, the evaluation matrix and dashboard will make it easier to identify each candidate’s strengths and weaknesses (and ultimately select the best new VMI team member).

      Step 3.8 – Improve professional skills

      Increase proficiency in a few key areas

      The image contains an a screenshot example to demonstrate how to increase proficiency in a few key areas.

      To be an effective member of the VMI requires proficiency in many areas. Some basic skills like computer skills, writing, and time management are straightforward. Others are more nebulous. The focus of this step is on a few of the often-overlooked skills lurking in the shadows:

      • Communication
      • Running a meeting
      • Diplomacy
      • Emotional intelligence quotient (EQ)
      • Influence and persuasion
      • Building and maintaining relationships

      For the VMI to be viewed as a strategic and integral part of the organization, these skills (and others) are essential. Although this blueprint cannot cover all of them, some leading practices, tips, and techniques for each of the skills listed above will be shared over the next several pages.

      Step 3.8 – Improve professional skills

      Communicate more effectively

      Communication is the foundational element for the other professional skills covered in this Step 3.8. By focusing on seven key areas, you can improve your relationships, influence, emotional intelligence quotient, diplomacy, and impact when interacting with others. The concepts for the seven focal points presented here are the proverbial tip of the iceberg. Continue learning about these areas, and recognize that mastering each will require time and practice.

      1. Writing.
        1. Stick with simple words;1 you’re trying to communicate, not impress people with your vocabulary.
        2. Keep your sentences simple;1 use short words, short sentences, and short paragraphs.2
        3. Read your writing aloud;1 If you have to take a breath while reading a sentence out loud, the sentence is too long.
        4. Use a tool like Grammarly or the built-in functionality of Word to determine readability; aim for a score of 60 to 70 or a seventh- or eighth-grade level.3
        5. When reviewing your writing: consider your word choice and the implications of your words; look for unintended interpretations, ambiguities, and implied-tone issues.
      1 Grammarly, 2017. 2 Elna Cain, 2018. 3 Forbes, 2016.

      Step 3.8 – Improve professional skills

      Communicate more effectively (continued)

      2. Speaking

      1. Similar to writing, focus on short words and sentences. Avoid run-on sentences.
      2. Think before speaking and work on eliminating “ums,” “uhs,” and “you knows.” These detract from your message.
      3. Choose words that are “comfortable” for the other person/people. Rule number one in public speaking is to know your audience, and that rule applies beyond public speaking and to groups of all sizes (1 to 1,000+).
      4. Don’t confuse the words with the message.
      5. Pay attention to your tone, pace, and volume. Try to match your counterpart in one-on-one settings.

      3. Body Language.

      1. Understand body language’s limitations; it is part art and part science…not an absolute.
      2. Individual movements and movement clusters can provide information regarding the spoken message – look for consistencies and inconsistencies. A baseline for the person is needed to interpret the body language “accurately.”
      3. Pay attention to your own body language. Does it match the message being conveyed by your words or those of your teammates (in group settings)?

      Step 3.8 – Improve professional skills

      Communicate more effectively (continued)

      4. Personality.

      1. Identify your counterpart’s personality: Are they extroverted or introverted? Are they effusive or reserved? Are they diplomatic or offensive? Are they collaborative or looking to blame someone?
      2. Appeal to their personality type when possible, but avoid the blame game. For example, don’t be loud and “over the top” with someone who is reserved and quiet.

      5. Style.

      1. Determine your counterpart’s style for both written and spoken communications: Are they direct or indirect? Are they bottom-line or do they prefer descriptions and build-ups? Are they into empirical data or anecdotal examples?
      2. To maximize the connection and communication effectiveness, match their style…even if it means getting out of your comfort zone a little. For example, if you have an indirect style, you will have to be more direct when dealing with someone who is direct; otherwise, you run the risk of alienating your counterpart (i.e. they will get frustrated or bored, or their mind will wander).

      Step 3.8 – Improve professional skills

      Communicate more effectively (continued)

      6. Learning

      1. People absorb information in three ways:
        1. Visually: These learners need to see things for them to make sense and be retained.
        2. Auditory: These learners need to hear things for them to make sense and be retained.
        3. Kinesthetic/experiential: These learners need to do something or experience it to understand and retain it.
      2. While some people are dominant in one area, most are a combination of one or more methods.
      3. If you can identify a person’s preferred method of learning, you can enhance your ability to communicate. For example, talking (exclusively) with a visual learner will be minimally effective; showing that person a picture or graph while talking will increase your effectiveness.

      7. Actions and inactions.

      1. Communication goes beyond words, messages, body language, and other issues. Your actions or inactions following a communication can undo your hard work to communicate effectively.
      2. Follow through on promises, action items, or requests.
      3. Meet any deadlines or due dates that result from communications. This helps build trust.
      4. Make sure your follow-through items are complete and thorough. Half-way is no way!
      5. Communicate any delays in meeting the deadlines or due dates to avoid

      Step 3.8 – Improve professional skills

      Tap into your inner diplomat

      Diplomacy can be defined many ways, but this one seems to fit best for the purposes of vendor management: The ability to assert your ideas or opinions, knowing what to say and how to say it without damaging the relationship by causing offense.1 At work, diplomacy can be about getting internal or external parties to work together, influencing another party, and conveying a message tactfully. As a vendor manager, diplomacy is a necessary skill for working with your team, your organization, and vendors.

      To be diplomatic, you must be in tune with others and understand many things about them such as their feelings, opinions, ideas, beliefs, values, positions, preferences, and styles. To achieve this, consider the following guidance:2

      • Modify your communication style: Communication is about getting someone to understand and evaluate your message so they can respond. Approach people the way they want to be approached. For example, sending an email to a person who prefers phone calls may create a communication issue.
      • Choose your words carefully: Use words as an artist uses a brush, paint, and a canvas. Paint a picture through word selection. Similar words can portray different scenes (e.g. the child ran to the store quickly vs. the child raced to the store). Make sure your image is relatable for your counterpart.
      1 “The Art of Tact and Diplomacy,” SkillsYouNeed 2 Communiqué PR, 2020.

      Step 3.8 – Improve professional skills

      Tap into your inner diplomat (continued)

      • Slow down a speak concisely: Say what you have to say…and stop. No one likes a communicator who rambles on and on. Once your message has been conveyed, go into silent mode. Get comfortable with silence; there is no need to fill the void with more meaningless words. Let your counterpart contemplate in peace.
      • Listen to understand: Be an active listener rather than biding your time until you can talk again. Avoid interrupting the other party (whenever possible, but sometimes it is needed!). Show interest in what the other person is saying and ask clarifying questions. Make eye contact, nod your head periodically, and summarize what you hear from time to time. Use your ears and mouth in proportion: listen twice as much as you talk.
      • Consider nonverbals: Read the facial expressions of the speaker and be aware of your own. Faces tend to be expressive; sometimes we are aware of it…and sometimes we aren’t. Try relaxing your face and body to minimize the involuntary expressions that may betray you. Adopt a diplomatic facial expression and practice using it; find the right mix of interest and neutrality.

      Whenever things get tense, take a deep breath, take a break, or stop the communication (based on the situation and what is appropriate). Being diplomatic can be taxing, and it is better to step back than to continue down a wrong path due to stress, emotion, being caught off guard, etc.

      Step 3.8 – Improve professional skills

      Build and maintain relationships

      Relationship building and networking cannot be overvalued. VMI personnel interact with many areas and people throughout the organization, and good relationships are essential. Building and maintaining relationships requires hard work and focusing on the right items. Although there isn’t a scientific formula or a mathematical equation to follow, key elements are present in all durable relationships.

      Focus on building relationships at all levels within your organization. People at every level may have data or information you need, and your relationship with them may be the deciding factor in whether you get the information or not. At other times, you will have data and information to give, and the relationship may determine how receptive others are to your message. Some relationship fundamentals are provided below and continue on the next page.1,2

      • Trust: be honest and ethical and follow through on your commitments.
      • Diversity: build relationships with people who aren’t just like you to expand your mindset.
      • Interrelatedness: understand how what you do impacts others you have relationships with.
      • Varied interaction: a good relationship will incorporate work-related interactions with personal interactions.
      • Effective communication: combine methods of communication but focus on the other person’s preferred method.
      1 ”Seven Characteristics of Successful Work Relationships,” 2006. 2 Success.com, 2022.

      Step 3.8 – Improve professional skills

      Build and maintain relationships (continued)

      • Empathy – understand where the other person is coming from through active listening.
      • Vulnerability – create a judgment-free zone.
      • Respect – this must be given and earned.
      • Real face time – meeting in the offline world signals to the person that they are important (but this is not always possible today).
      • A giving-first mentality – provide something of value before asking for something in return.
      • Unique perspective – tap into what the other person believes and values.
      • Intent – start with genuine interest in the other person and the relationship.
      • Hard work – active engagement and a commitment to the relationship are required.
      • Honesty – be honest in your communications.
      • Challenge – be open to thinking differently and trying new things.
      • Value – identify what you add to the relationship.
      • Conscientiousness – be aware of the relationship’s status and react accordingly.

      Step 3.8 – Improve professional skills

      Run meetings more efficiently and effectively

      Most people don’t get excited about meetings, but they are an important tool in the toolbox. Unfortunately, many meetings are unnecessary and unproductive. As a result, meeting invites often elicit an audible groan from invitees. Eliminating meetings completely is not a practical solution, which leaves one other option: improving them.

      You may not be in charge of every meeting, but when you are, you can improve their productivity and effectiveness by making a few modifications to your approach. Listed below are ten ideas for getting the most out of your meetings:*

      1. Begin with the mindset that you are a steward or protector of the meeting attendees’ time, and you never want attendees to feel that you wasted their time.
      2. Keep the attendee list to essential personnel only. Everyone attending the meeting should be able to justify their attendance (or you should be able to justify it).
      3. Set an appropriate time limit for the meeting. Don’t default to the 60-minute meeting; right-size the meeting time (e.g. 15, 30, or 45 minutes or some other number). Shorter meeting times force participants to focus.
      4. Create and use an agenda. To help you stay focused and to determine who to invite, set up the agenda as a list of questions rather than a list of topics.
      *Adapted from “The Surprising Science Behind Successful Remote Meetings” by Steven G. Rogelberg

      Step 3.8 – Improve professional skills

      Run meetings more efficiently and effectively (continued)

      5. Use video when anyone is attending virtually. This helps prevent anonymity and increases engagement.

      6. Start and end meetings on time. Running over impacts other meetings and commitments; it also makes you look ineffective and increases stress levels for attendees.

      7. If longer meetings are necessary, build in a short break or time for people to stand up and stretch. Don’t say, “If you need a break or to stand up during the meeting, feel free.” Make it a planned activity.

      8. Keep others engaged by facilitating and drawing specific people into the conversation; however, don’t ask people to contribute on topics that they know nothing about or ask generally if anyone has any comments.

      9. Leverage technology to help with the meeting; have someone monitor the chat for questions and concerns. However, the chat should not be for side conversations, memes, and other distractions.

      10. End the meeting with a short recap, and make sure everyone knows what was decided/accomplished, what next steps are, and which action items belong to which people.

      Step 3.8 – Improve professional skills

      Increase emotional intelligence

      Emotional intelligence (otherwise known as emotional intelligence quotient or EQ) is the ability to understand, use, and manage your own emotions in positive ways to relieve stress, communicate effectively, empathize with others, overcome challenges and defuse conflict.1 This is an important set of skills for working with vendors and internal personnel. Increasing your EQ will help you build better relationships and be seen as a valuable teammate…at all levels within your organization.

      Improving this skill dovetails with other skills discussed in this step 3.8, such as communication and diplomacy. Being well versed in the concepts of EQ won’t be enough. To improve requires a willingness to be open – open to feedback from others and open to new ideas. It also requires practice and patience. Change won’t happen overnight, but with some hard work and perseverance, your EQ can improve.

      There are many resources that can help you on your journey, and here are some tips to improve your EQ:2

      • Practice observing how you feel.
      • Pay attention to how you behave.
      • Learn to look at yourself objectively.
      • Understand what motivates you.
      • Acknowledge your emotional triggers.
      • Be interested in the subject matter.
      1 HelpGuide, 2022. 2 RocheMartin, 2022.

      Step 3.8 – Improve professional skills

      Increase emotional intelligence (continued)

      Tips to improve your EQ (continued from previous page):

      • It’s your choice how you react to a situation.
      • Listen without interruption, preconceptions, or skepticism; absorb their situation and consider how they are feeling before you react.
      • Try to be approachable and accessible.
      • Think about what’s happening from their perspective.
      • Cultivate a curiosity about strangers to understand different opinions, views, and values.
      • Acknowledge what people are saying to show you are actively listening.
      • Think about how you’re physically coming across with your body language, tone of voice, eye contact, and facial expressions.

      Things to avoid:1

      • Drama – don’t let others’ emotions affect or rule yours.
      • Complaining – don’t be a victim; do look for solutions.
      • Dwelling on the past – learn from the past and live in the present.
      • Selfishness – consider others’ needs, not just your own.
      • Being overly critical – understand the other person, then communicate the change you want to see.
      1 RocheMartin, 2022.

      Step 3.8 – Improve Professional Skills

      Use Influence and Persuasion to Benefit the VMI

      Skills such as influence and persuasion are important (even necessary) for vendor managers. (Don’t confuse this with the dark arts version – manipulation.) A good working definition is provided by the Center for Creative Leadership: Influence is the ability to affect the behavior of others in a particular direction, leveraging key tactics that involve, connect, and inspire them.* Influence and persuasion are not about strongarming or blackmailing someone to get your way. Influence and persuasion are about presenting issues, facts, examples, and other items in a way that moves people to align with your position. Sometimes you will be attempting to change a person’s mind, and other times you will be moving them from a neutral stance to agreeing to support your position.

      Building upon the basic communication skills discussed at the start of this step, there are some ways to improve your ability to influence and persuade others. Here are some suggestions to get you started:*

      1. Develop organizational intelligence – learn how your organization truly operates; identify the power brokers and their spheres of control and influence. Many failures to persuade and influence stem from not understanding who can help and how they can help (or hinder) your efforts. The most influential person in your organization may not be the person with the fancy title.
      2. Promote yourself and the team – don’t be afraid to step into the spotlight and demonstrate your knowledge and expertise. To be able to persuade and influence as and individual or a team, credibility must be established.
      * Center for Creative Leadership, 2020.

      Step 3.8 – Improve professional skills

      Use influence and persuasion to benefit the VMI (continued)

      3. Build and maintain trust – trust has two main components: competency and character. In item 2 on the previous page, competency trust was discussed from the perspective of knowledge and expertise. For character trust, you need to be viewed as being above reproach. You are honest and ethical; you follow through and honor your commitments. Once both types of trust are in place, eyes and ears will be open and more receptive to your messages. Bottom line: You can’t influence or persuade people if they don’t trust you.

      4. Grow and leverage networks – the workplace is a dynamic atmosphere, and it requires almost constant networking to ensure adequate contacts throughout the organization are maintained. Leveraging your network is an artform, and it must be used wisely. You don’t want to wear out your welcome by asking for assistance too often.

      As you prepare your plan to influence or persuade someone, ask yourself the following questions:*

      • Who am I attempting to influence?
      • What is the situation and how much support do I need?
      • Why do I need this person’s support for my idea?
      • What tactics can I use, and how can I establish rapport?
      • What responses do I anticipate?
      • What mutual points of agreement can I use?
      • How can I end on a positive note no matter what the outcome is?
      * Center for Creative Leadership, 2020.

      Step 3.9 – Expand professional knowledge

      Learn more about departments and functions tangential to the VMI

      To function in their roles, VMI personnel must be well versed in the concepts and terminology associated with vendor management. To be strategic and to develop relationships with other departments, divisions, agencies, and functional groups, VMI personnel must also be familiar with the concepts and terminology for functions outside the VMI. Although a deep dive is beyond the scope of this blueprint, understanding basic concepts within each of the topics below is critical:

      • Finance and accounting
      • Project management
      • Contracts and contract management
      • Procurement/sourcing
      • Change management
      • Conflict management
      • Account team dynamics

      It isn’t necessary to be an expert in these subjects, but VMI personnel must be able to talk with their peers intelligently. For example, a vendor manager needs to have a general background in contract terms and conditions to be able to discuss issues with legal, finance, procurement, and project management groups. A well-rounded and well-versed VMI team member can rise to the level of trusted advisor and internal strategic partner rather than wallowing in the operational or transactional world.

      Step 3.9 – Expand professional knowledge

      Understand finance and accounting basics

      Finance and accounting terms and concepts are commonplace in every organization. They are the main language of business – they are the way for-profit businesses keep score. Regardless of whether your organization is a for-profit, non-profit, governmental, or other entity, finance and accounting run through the veins of your organization as well. In addition to the customer side of the equation, there is the vendor side of the equation: Every vendor you deal with will be impacted financially by working with you.

      Having a good grasp of finance and accounting terms and concepts will improve your ability to negotiate, talk to finance and accounting personnel (internal and external), conduct ongoing due diligence on your critical vendors, review contracts, and evaluate vendor options, to name just a few of the benefits.

      The concepts listed on the following pages are some of the common terms applicable to finance and accounting. It is not intended to be an exhaustive list. Continue to learn about these concepts and identify others that allow you to grow professionally.

      Step 3.9 – Expand professional knowledge

      Understand finance and accounting basics (continued)

      Finance and accounting terms and concepts

      • Cash accounting vs. accrual accounting.
      • Fiscal year vs. calendar year.
      • Profit vs. cash flow.
      • Fixed expenses vs. variable expenses.
      • Capital expense (CapEx) vs. operating expense (OpEx).
      • Depreciation vs. amortization.
      • Payment upfront vs. payment in arrears.
      • Favorable (positive) variance vs. unfavorable (negative) variance.
      • Discretionary expense (cost/expenditure) vs. non-discretionary expense (cost/expenditure).
      • Income statement and its components.
      • Balance sheet and its components.

      Step 3.9 – Expand professional knowledge

      Understand finance and accounting basics (continued)

      Finance and accounting terms and concepts (cont’d)

      • Operating profit margin.
      • Net profit margin.
      • Return on assets.
      • Current ratio.
      • Quick ratio.
      • Debt-to-asset ratio.
      • Interest coverage.
      • Total asset turnover.
      • Receivables turnover.
      • Average collection period.
      • Inventory turnover.
      • Time value of money concept.
      • Future value (FV).
      • Present value (PV).
      • Net present value (NPV).
      • Cost of capital.
      • Internal rate of return (IRR).
      • Return on investment (ROI).
      • Payback (payback period or break even).

      Step 3.9 – Expand professional knowledge

      Understand project management basics

      The image contains a screenshot example of expanding professional knowledge.

      Whether your organization has a formal project management office (PMO) or not, project management practices are being used by those tasked with making sure software and software as a service implementations go smoothly, technology refreshes are rolled out without a hitch, and other major activities are successful. Listed below are some common competencies/skills used by project managers to make sure the job gets done right.

      1. Requirements – define the project’s goals, objectives, and requirements.
      2. Scope – develop, monitor, and manage the project’s scope.
      3. Time – develop and manage the timeline and determine the order (parallel and sequential) for the tasks and activities.
      4. Budget – create and manage the project budget and report on any variances.
      5. Resources – manage space, people, software, equipment, services, etc.
      6. Risk – identify, evaluate, monitor, and manage project risk.
      7. Change – manage updated requirements, changes to the scope, and modifications to the contract.
      8. Documentation – work with the project charter, open issue logs, meeting minutes, and various reports.
      9. Communication – communicate with vendor personnel and internal personnel, including stakeholders and executives as needed.
      10. Quality – ensure the deliverables and other work are acceptable and coordinate/conduct acceptance tests.

      Step 3.9 – Expand professional knowledge

      Understand project management basics (continued)

      The image contains a screenshot of understanding project management basics.

      The concepts listed below are common project management terms and concepts.1, 2 This list is not intended to be exhaustive. Look internally at your project management processes and operations to identify the concepts applicable in your environment and any that are missing from this list.
      • Project plan
      • Work breakdown structure (WBS)
      • Critical path
      • Project manager
      • Project stakeholder
      • Agile project
      • Waterfall project
      • Milestone
      • Deliverable
      • Dependency
      • Phase
      • Kickoff meeting
      • Project budget
      • Project timeline
      • Resource allocation
      • Project risk
      • Risk management
      • Risk owner
      • Issue log
      • Gantt chart
      1 nTask, 2019. 2 Whiz Labs, 2018.

      Step 3.9 – Expand professional knowledge

      Understand contracts and contract lifecycle management basics

      Contracts and contract lifecycle management (CLM) are two separate but related topics. It is possible to have contracts without a formal CLM process, but you can’t have CLM without contracts. This portion of step 3.9 provides some general background on each topic and points you to blueprints that cover each subject in more detail.

      IT contracts tend to be more complicated than other types of contracts due to intellectual property (IP) rights being associated with most IT contracts. As a result, it is necessary to have a basic understanding of IP and common IT contract provisions.

      There are four main areas of IP: copyrights, patents, trademarks, and trade secrets. Each has its own nuances, and people who don’t work with IP often mistake one for another or use the terms interchangeably. They are not interchangeable, and each affords a different type of protection when available (e.g. something may not be capable of being patented, but it can be copyrighted).

      For contract terms and conditions, vendor managers are best served by understanding both the business side and the legal side of the provisions. In addition, a good contract checklist will act as a memory jogger whether you are reviewing a contract or discussing one with legal or a vendor. For more information on contract provisions, checklists, and playbooks, download the Info-Tech blueprints identified to the left.

      Download the Info-Tech blueprint Understand Common IT Contract Provisions to Negotiate More Effectively

      Download the Info-Tech blueprint Improve Your Statements of Work to Hold Your Vendors Accountable

      Step 3.9 – Expand professional knowledge

      Understand contracts and contract lifecycle management basics (continued)

      CLM is a process that helps you manage your agreements from cradle to grave. A robust CLM process eases the challenges of managing hundreds or even thousands of contracts that affect the day-to-day business and could expose your organization to various types of vendor-related risk.

      Managing a few contracts through the contracting process is easy, but as the number of contracts grows, managing each step of the process for each contract becomes increasingly difficult and time consuming. That’s where CLM and CLM tools can help. Here is a high-level overview of the CLM process:

      1. Request – a request for a contract is initiated.
      2. Create contract – the contract is drafted by the customer or provided by the vendor.
      3. Review risk – areas of risk in the contract are identified.
      4. Approve – base agreement and attachments are approved and readied for negotiations.
      5. Negotiate – the agreement is negotiated and finalized.
      6. Sign – the agreement is signed or executed by the parties.
      7. Capture – the agreement is stored in a centralized repository.
      8. Manage – actively manage the operational and commitment aspects of the agreement.
      9. Monitor compliance – ensure that each party is honoring and complying with its obligations.
      10. Optimize – review the process and the contracts for potential improvements.

      For more information on CLM, download the Info-Tech blueprint identified to the left.

      Download the Info-Tech Blueprint Design and Build an Effective Contract Lifecycle Management Process

      Step 3.9 – Expand professional knowledge

      Understand procurement/sourcing basics

      Almost every organization has a procurement or sourcing department. Procurement/sourcing is often the gatekeeper of the processes used to buy equipment and services, lease equipment, license software, and acquire other items. There are many different types of procurement/sourcing departments and several points of maturity within each type. As a result, the general terms listed on the next page may or may not be applicable within your organization. (Or your organization may not have a procurement/sourcing department at all!)

      Identifying your organization’s procurement/sourcing structure is the best place to start. From there, you can determine which terms are applicable in your environment and dive deeper on the appropriate concepts as needed.

      Step 3.9 – Expand professional knowledge

      Understand procurement/sourcing basics (continued)

      Procurement sourcing terms and concepts

      • Hard dollar savings
      • Soft dollar savings
      • Cost avoidance
      • Value creation
      • Value created
      • Addressable spend
      • Spend addressed
      • Revenue creation
      • Category management
      • Category manager
      • Targeted negotiations
      • Indirect procurement/sourcing
      • Direct procurement/sourcing
      • Sourcing/procurement processes
      • Sourcing/procurement drivers and metrics
      • RFX (RFP, RFI, RFQ) processes
      • Forecasting value creation
      • Percentage of value creation to spend addressed
      • Category opportunity
      • Category plans
      • Center-led procurement/sourcing
      • Centralized procurement/sourcing
      • Decentralized procurement/sourcing

      Step 3.9 – Expand professional knowledge

      Understand conflict management basics

      Whether you consider conflict management a skill, knowledge, or something in between, there is no denying that vendor managers are often engaged to resolve conflicts and disputes. At times, the VMI will be a “disinterested third party,” sitting somewhere between the vendor and an internal department, line of business, agency, or other functional designation. The VMI also may be one of the parties involved in the dispute or conflict. As a result, a little knowledge and a push in the right direction will help you learn more about how to handle situations where two parties don’t agree.

      To begin with, there are four levels of “formal” dispute resolution. You may be intimately aware of all of them or only have cursory knowledge of how they work and the purpose they serve:

      • Negotiation
      • Mediation
      • Arbitration
      • Litigation

      Their use often can be controlled or limited either contractually or by your organization’s preferences. They may be exclusive or used in combination with one another (e.g. negotiation first, and if things aren’t resolved, arbitration). Look at your contracts and legal department for guidance. It’s important to understand when and how these tools are used and what is expected (if anything) from the VMI.

      Step 3.9 – Expand professional knowledge

      Understand conflict management basics (continued)

      The image contains a screenshot of The Thomas-Kilman Conflict Resolution Model.

      Another factor in the conflict management and informal dispute resolution process is the people component. Perhaps the most famous or well-known model on this topic is the Thomas-Kilmann conflict resolution model. It attempts to bring clarity to the five different personality types you may encounter when resolving differences. As the graphic indicates, it is not purely a black-and-white endeavor; it is comprised of various shades of grey.

      The framework presented by Mr. Thomas and Mr. Kilmann provides insights into how people behave and how to engage them based on personality characteristics and attributes. The model sorts people into one of five categories:

      • Avoiders.
      • Competitors.
      • Collaborators.
      • Accommodators.
      • Compromisers.

      Although it is not an absolute science since people are unpredictable at times, the Thomas-Kilmann model provides great insights into human behavior and ways to work with the personality types listed.

      *Kilmann Diagnostics, 2018.

      Step 3.9 – Expand professional knowledge

      Understand conflict management basics (continued)

      Although the topic is vastly greater than being presented here, the last consideration is a sound process to follow when the conflict or dispute will be handled informally (at least to start). The simple process presented below works with vendors, but it can be adapted to work with internal disputes as well. The following process assumes that the VMI is attempting to facilitate a dispute between an internal party and a vendor.

      Step 1. Validate the person and the issue being brought to you; don’t discount the person, their belief, or their issue. Show genuine interest and concern.

      Step 2. Gather and verify data; not all issues brought forward can be pursued or pursued as presented. For example, “The vendor is always late with its reports” may or may not be 100% accurate as presented.

      Step 3. Convert data gathered into useful and relatable information. To continue the prior example, you may find that the vendor was late with the reports on specified dates, and this can be converted into “the vendor was late with its reports 50% of the time during the last three months.”

      Step 3.9 – Expand professional knowledge

      Understand conflict management basics (continued)

      Step 4. Escalate findings internally to the appropriate stakeholders and executives as necessary so they are not blindsided if a vendor complains or goes around you and the process. In addition, they may want to get involved if it is a big issue, or they may tell you to get rid of it if it is a small issue.

      Step 5. Engage the vendor once you have your facts and present the issues without judgment. Ask the vendor to do its own fact gathering.

      Step 6. Schedule a meeting to review of the situation and hear the vendor’s version of the facts…they may align, or they may not.

      Step 7. Resolve any differences between your facts/information and the vendor’s. There may be extenuating circumstances, oversights, different data, or other items that come to light.

      Step 8. Attempt to resolve the problem and prevent further occurrences through root cause analysis and collaborative problem-solving techniques.

      Develop your own process and make sure it stays neutral. The process should not put the vendor (or any party) on the defensive. The process is to help the parties reach resolution…not to assign blame.

      Step 3.9 – Expand professional knowledge

      Understand account team management basics

      Working with the account or sales team from your critical vendors can be challenging. A basic understanding of account team operations and customer/vendor dynamics will go a long way to improving your interactions (and even vendor performance) over time.

      Sales basics

      • Salespeople are typically paid a base salary and a commission on each sale.
      • Salespeople have quotas that must be met; failure to meet the quota results in probation (at a minimum) or termination.
      • Salespeople sell what they are motivated to sell; the motivation comes in the way of contests, commissions, and recognition. The commission structure is not the same for every service or product sold by the vendor. In addition, incentives may be created to move old product, overstock, or new product (to name a few).
      • Salespeople have multiple goals when interacting with customers:
        • Sell
        • Gather information
        • Build a relationship
        • Get a reference
        • Obtain a reference
        • Increase the vendor’s footprint

      Step 3.9 – Expand professional knowledge

      Understand account team management basics (continued)

      Improving sales and account team dynamics with your organization

      • Conduct due diligence on your account team. Are they “qualified” to work with your account?
      • Set expectations with the account team for the ongoing relationship. Don’t leave it to chance.
      • Evaluate the sales and account teams at least annually. Get feedback from those who work closely with the salespeople and account managers, including stakeholders and executives.
      • Educate people internally about the sales process. At a minimum, counsel them to avoid giving away leverage, answering “damaging” questions, and disclosing confidential information.
      • Try to get involved early in the sales cycle. Sell your value to internal personnel.
      • Work to convert your account manager into your champion within the vendor. The salesperson can benefit by going to bat for you even though they work for the vendor. The commission structure often creates a split loyalty issue. Capitalize on it!
      • Watch out for high turnover. This can indicate a problem at the vendor OR your account is not that attractive/profitable. (See steps 2.2 and 3.1 regarding customer positioning.)

      Step 3.9 – Expand professional knowledge

      Understand account team management basics (continued)

      Improving sales and account team dynamics with your organization (continued)

      • Support effective sales reps by educating them on your organization, the best way to work with you, and the benefits of working with your processes. If they do something above and beyond, consider sending them a thank-you and copying their boss. Little things go a long way.
      • Control the sales process. Require qualified people from your organization to be invited to meetings; require an agenda for those meetings; and avoid “surprise” meetings (those meetings with limited notice and no agenda… "My boss is in town today, and I wanted to stop by and introduce her to you").
      • Don’t be afraid to request a new account manager. For your critical vendors, you should always be dealing with competent account teams. They should have the requisite knowledge of their products and services to be able to answer basic through intermediate questions; they should be ethical; and they should be responsive.
      • Build relationships beyond the salesperson or account manager. Develop a network that extends throughout the sales organization. (For example, the sales manager, sales director, and sales vice president at a minimum.) These people generally have more sway within the vendor organization and can get things done when the need arises.

      For more information on this topic, download the Info-Tech blueprint Evaluate Your Vendor Account Team to Optimize Vendor Relations.

      Step 3.10 – Create brand awareness

      Determine whether a brand makes sense for the VMI

      Branding isn’t just for companies. It is for departments (or whatever you call them at your place of employment) and individuals working in those departments. With a little work and even less money, you can create a meaningful brand for the VMI. While you are at it, you may want to encourage the VMI’s team members to focus a little attention on their personal brands since the VMI and its personnel are intertwined. First, let's define “brand.”

      Ask 50 people, “How do you define ‘brand’?” and you are likely to get 50 different answers. For the purposes of this blueprint, the following definition provides some guiderails by describing what a brand is and isn’t: “A brand is not a logo. A brand is not an identity. A brand is not a product. A brand is a person’s gut feeling about a product, service, or organization.”1 Let’s expand the definition of “a brand is…” to include departments and individuals since that’s the focus of this step, and it doesn’t violate the spirit of the original definition. A further expansion could include the goodwill associated with the product, service, organization, department, or individual.

      Dedicating time and other resources to proactively creating and nurturing the VMI’s brand has many advantages:

      • “If you don’t define your brand, others will.”2 This is your chance to define the VMI’s narrative and influence the perception others have of it.
      • It allows VMI team members to feel connected to the VMI’s vision and goals during their day-to-day activities.
      • It helps form an emotional connection between the VMI and your internal “clients.”
      • “Branding is a way of establishing and consistently reinforcing who you are and what you [do]…”2 Your brand helps you promote the VMI’s value and impact.
      1 Emotive Brand, 2019. 2 Forbes, 2018.

      Step 3.10 – Create brand awareness

      Establish the VMI’s brand and monitor it

      As you embark on creating a brand for the VMI and raising awareness, here are a few considerations to keep in mind:

      • Identify your mission.* Review the VMI’s mission statement and goals. Translate them into statements that connect with your internal clients.
      • Establish your unique value proposition.* What does the VMI provide to your internal clients that would make them go out of their way to use your services? How can you help them in ways others can’t?
      • Create your brand’s visual identity.* Can you create a logo for the VMI? Can you provide a consistent look and feel for the reports you generate and information you provide?
      • Increase brand recognition.* It takes time to build trust and establish a reputation. The same is true of creating a brand and increasing its recognition. Develop a plan for this rather than leaving it to chance.
      • Be consistent. Make sure your brand is consistent with the organization’s brand or at least doesn’t contradict it. The VMI’s brand is based on its values, mission, goals, and other items; these should complement the organization’s values, mission, goals, and other items.
      • Spread the word. Attend internal clients’ staff meetings, conduct lunch & learn sessions, send out a newsletter to ensure that your internal clients know who you are, what you do, and the impact you can make or have made. Make personal connections whenever possible.
      • Monitor your brand. It is not enough to create a brand and turn it loose unsupervised. Seek feedback on the VMI and its brand beyond the internal survey (step 3.11), and adjust your brand periodically as needed.
      * Stevens & Tate, 2019.

      Step 3.10 – Create brand awareness

      Enhance the brand of VMI team members

      As previously mentioned, brands are for individuals as well. In fact, everybody has a brand associated with them…for better or worse...whether they have consciously created and molded it or not. Focusing on the individual brand at this point offers the VMI and its team members the opportunity to enhance the brand for both. After all, the VMI is a reflection of its personnel.

      Here are some things VMI team members can do to enhance their brand:

      • Network internally beyond your immediate team.1 Get to know people and build relationships with others even if you don’t work directly or indirectly with them.
      • Say yes to relevant opportunities.1 Volunteer for projects where you can make an impact and let others see your value; it’s also a good way to build relationships beyond your immediate team.
      • Speak at a conference. According to Jeff Butler (author and TEDx speaker), “Speaking gets you that immediate credibility not only internally but also externally where other companies are now seeing you as an expert.” He also states that “speaking at … conferences is not only good for you but also good for your [organization].”1
      • Share your voice.1 Become a resource for bloggers, authors, and podcasters; consider blogging, writing, and podcasting. Remember not to disclose any proprietary or confidential information, though! Work with your legal and marketing departments before embarking on this path.
      • Set goals and monitor your progress. Track the number of times you are asked to speak or contribute to a blog, podcast, event, or article, and track the number of times you are mentioned or referenced in social media, blogs, articles, and podcasts.2
      1 Forbes, 2018. 2 Oberlo, 2022.

      3.10.1 – Create brand awareness

      30 – 90 Minutes

      1. Meet with the participants to review the information in Elevate – Tools and Templates Compendium – Tab 3.10. The worksheet is divided into two parts.
        1. Part 1 is for the VMI to use to create a brand, and
        2. Part 2 is for an individual VMI team member to create a brand.
      2. For Part 1, work as a team to answer the questions to begin identifying components of your brand awareness and building a strategy for the VMI's brand.
      3. For Part 2, individuals can work by themselves or with the team leader to answer the questions and set goals to help build an individual brand (if it is desirable).
      InputOutput
      • Elevate – Tools and Templates Compendium – Tab 3.10
      • Brainstorming
      • VMI brand framework
      • Individual VMI personnel brand framework
      MaterialsParticipants
      • Elevate – Tools and Templates Compendium – Tab 3.10
      • VMI team

      Download the Info-Tech Elevate - Tools and Templates Compendium

      Step 3.11 – Survey internal clients

      Gain insights and feedback from internal sources

      As you deploy your surveys, timing must be considered. For annual surveys, avoid busy seasons such as mid to late December (especially if your organization’s fiscal year is a calendar year). Give people time to recover from any November holidays, and survey them before they become distracted by December holidays (if possible). You may want to push the annual survey until January or February when things have settled back into a normal routine. Your needs for timing and obtaining the results must be balanced against the time constraints and other issues facing the potential respondents.

      For recency surveys, timing can work to your advantage or disadvantage. Send the survey almost immediately after providing assistance. If you wait more than a week or two, memories will begin to fade, and the results will trend toward the middle of the road.

      Regardless of whether it is an annual survey or a recency survey, distributing the surveys to a big enough sample size will be tough. Combine that with low response rates and the results may be skewed. Take what you can get and look for trends over time. Some people may be tough critics; if possible, send the survey to the same people (and incorporate new ones) to see if the tough graders’ responses are remaining true over time. Another way to mitigate some of the tough critics is to review their answers to the open-ended questions. For example, a tough grader may respond with a “4 – helpful” when you were expecting a “5 – very helpful;” the narrative portion of the survey may be consistent with that answer, or it may provide what you were looking for: “The VMI was great to work with on this project.” When confined to a scale, some respondents won’t give the top value/assessment no matter what, but they will sing your praises in a question that requires a narrative response. Taken together, you may get a slightly different picture – one that often favors you.

      Step 3.11 – Survey internal clients

      Gain insights and feedback from internal sources (continued)

      The image contains a screenshot of an example survey.

      After you have received a few responses to your surveys (recency and annual), review the results against your expectations and follow up with some of the respondents. Were the questions clear? Were the answer choices appropriate? Ultimately, you have to decide if the survey provided the meaningful feedback you were looking for. If not, revise the questions and answers choices as needed. (Keep in mind, you are not looking for “feelgood fluff.” You are looking for feedback that will reinforce what you are doing well and show areas for improvement.)

      Once you have the results, it’s time to share them with the executives and stakeholders. When creating a report, consider the following guidance:

      • Don’t just list the data; convert it to usable information.
      • When needed, provide some context and interpretation for the results. For example, if you have an internal goal or service level, indicate this and show how the results compare to the target (e.g. in a bar chart, insert a horizontal line and label it “target”).
      • Present the results on a question-by-question basis, but you may want to combine or aggregate results to provide meaningful information. For example, combine 21% responding with “doing a great job” and 62% responding with “doing a good job” into one statement of “83% of those surveyed said the VMI is doing a good job or doing a great job.”
      • Use an executive summary as an overview or to highlight the key findings, with the detailed data and information on subsequent pages for people who want to dive deeper.

      Step 3.12 – Calculate VMI ROI

      Identify and report the VMI’s value and impact on the organization

      Calculating ROI begins with establishing baselines: what is the current situation? Once those are established, you can begin tracking the impact made by the VMI by looking at the differences between the baseline and the end result. For example, if the VMI is tracking money saved, it is critical to know the baseline amounts (e.g. the initial quote from the vendor, the budgeted amount). If time is being measured, it is important to understand how much time was previously spent on items (e.g. vendor meetings to address concerns, RFPs).

      The blueprint Capture and Market the ROI of Your VMO will lead you through the process, but there are a couple of key things to remember: 1) some results will be quick and easy – the low-hanging fruit, things that have been ignored or not done well, eliminating waste, and streamlining inefficiencies; and 2) other things may take time to come to fruition. Be patient and make sure you work with finance or others to bring credibility to your calculations.

      When reporting the ROI, remember to include the results of the survey from step 3.11. They are not always quantifiable, but they help executives and stakeholders see the complete picture, and the stories or examples make the ROI “personal” to the organization.

      Reporting can be a challenge. VMIs often underestimate their value and don’t like self-promotion. While you don’t want to feel like you operate in justification mode, many eyes will be on the VMI. The ROI report helps validate and promote the VMI, and it helps build brand awareness for the VMI.

      Step 3.13 – Implement vendor recognition program

      Set your plan in motion

      As indicated in step 2.10, take a “crawl, walk, run” approach to your vendor recognition program. Start off small and grow the program over time. Based on the scope of the program, decide how you’ll announce and promote it. Work with marketing, IT, and others to ensure a consistent message, to leverage technology (e.g. your website), and to maximize awareness.

      For a formal program, you may want to hold a kickoff meeting to introduce the program internally and externally. The external kickoff can be handled in a variety of ways depending on available resources and the extent of the program. For example, a video can be produced and shared with eligible vendors, an email from the VMI or an executive can be used, or the program can be rolled out through BAMs if only BAM participants are eligible for the program. If you are taking an informal approach to the vendor recognition program, you may not need an external kickoff at all.

      For a formal program, collect information periodically throughout the year rather than waiting until the end of the year; however, some data may not be available or relevant until the end of the measurement period. For subjective criteria, the issue of recency may be an issue, and memories will fade over time. (Be careful the subjective portion doesn’t turn into a popularity contest.)

      If the vendor recognition program is not meeting your goals adequately, don’t be afraid to modify it or even scrap it. At some point, you may have to do a partial or total reboot of the program. Creating and maintaining a “lessons learned” document will make a reboot easier and better if it is necessary. Remember: While a vendor recognition program has many potential benefits, your main goals must be achieved or the program adds little or no value.

      Phase 4 - Review

      Ensure Your VMI Continues to Evolve

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Review and update existing Plan materials

      2.1 Vendor classification models

      2.2 Customer positioning model

      2.3 Two-way scorecards

      2.4 Performance improvement plan (PIP)

      2.5 Relationship improvement plan (RIP)

      2.6 Vendor-at-a-glance reports

      2.7 VMI personnel competency evaluation tool

      2.8 Internal feedback tool

      2.9 VMI ROI calculation

      2.10 Vendor recognition program

      3.1 Classify vendors and identify customer position

      3.2 Assess the relationship landscape

      3.3 Leverage two-way scorecards

      3.4 Implement PIPs and RIPs

      3.5 Gather market intelligence

      3.6 Generate vendor-at-a-glance reports

      3.7 Evaluate VMI personnel

      3.8 Improve professional skills

      3.9 Expand professional knowledge

      3.10 Create brand awareness

      3.11 Survey internal clients

      3.12 Calculate VMI ROI

      3.13 Implement vendor recognition program

      4.1 Investigate potential alliances

      4.2 Continue increasing the VMI’s strategic value

      4.3 Review and update

      This phase will walk you through the following activities:

      This phase helps the VMI stay aligned with the overall organization, stay current, and improve its strategic value as it evolves. The main outcomes from this phase are ways to advance the VMI’s strategic impact.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Others as needed

      Phase 4 – Review

      Continue evolving the VMI and keep it up to date

      The emphasis of this final phase is on the VMI’s continued evolution.

      • First up is the concept of alliances. For a small number of vendors, your relationship has the ability to transcend to a different level. A collaborative, synergistic relationship can be achieved under the right circumstances.
      • Next, additional material on transforming the VMI from purely transactional to strategic is provided (along with some reminders from prior phases). To reach its full potential, the VMI must mature and evolve, but this won’t happen without the active management of a well-crafted plan. What got the VMI to this point won’t necessarily work to get you to the next point on the evolution scale.
      • Lastly, remember to stay vigilant about the review process. What is the VMI doing well? Where can it improve? What needs to change?

      Step 4.1 – Investigate potential alliances

      Understand what separates an alliance from a regular relationship

      Chances are you’ve seen a marketing or business alliance at work in your personal life. If you’ve visited a Target store or a Barnes and Noble store, you’ve more than likely walked past the Starbucks counter. The relationship is about more than the landlord-tenant agreement, and the same business concept can exist in non-retail settings. Although they may not be as common in the customer-IT vendor space, alliances can work here as well.

      Definition

      For vendor management purposes, an alliance is a symbiotic relationship between two parties where both benefit beyond the traditional transactional (i.e. buyer-seller) relationship.

      Characteristics

      • Each party remains independent; this is not a true partnership or joint venture from a legal perspective.
      • Each party obtains benefits they wouldn’t be able to obtain by themselves (or, at a minimum, the timeline is accelerated significantly).
      • The relationship is geared toward the long term, and each party contributes resources to achieve synergies.

      Step 4.1 – Investigate potential alliances

      Analyze benefits and risks for the alliance

      Benefits

      • Synergies
      • Innovations
      • Use of pooled resources
      • Access to different areas of expertise
      • Quicker development or improvement of products or services
      • Competitive advantages, new revenue streams, and new markets

      Risks

      • Cultural fit
      • Departing executives/sponsors
      • Return on investment pressures
      • Different interests or expectations
      • Failure to address intellectual property issues adequately
      • Lack of experience and process to manage the relationship

      Step 4.1 – Investigate potential alliances

      Set up the alliance for success

      Keys to success

      • Communicate transparently.
      • Ensure executive participation from both parties.
      • Establish a joint steering committee and alliance governances.
      • Set clear expectations and define what each party wants out of the alliance.
      • Create “alliance managers” in addition to vendor managers and project mangers.
      • Start with a small alliance; don’t go all-in on a big alliance the first time you try it.
      • Create an environment of trust and collaboration; the alliance goes beyond the contract.
      • Make sure both parties are happy with their contributions to and rewards from the alliance.

      The purpose of this step is not to make you an expert on alliances or to encourage you to rush out of your office, cubicle, bedroom, or other workspace looking for opportunities. The purpose is to familiarize you with the concepts, to encourage you to keep your eyes open, and to think about relationships from different angles. How will you make the most of your vendors’ expertise, resources, market, and other things they bring to the table?

      Step 4.2 – Continue increasing the VMI’s strategic value

      Grow the VMI’s impact over time

      Although they are not synonymous concepts, increasing the VMI’s maturity and increasing the VMI’s strategic value can go hand in hand. Evolving the VMI to be strategic allows the organization to receive the greatest benefit for its investment. This isn’t to say that all work the VMI does will be strategic. It will always live in two places – the transactional world and the strategic world – even when it is fully mature and operating strategically. Just like any job, there are transactional tasks and activities that must be done, and some of them are foundational elements for being strategic (e.g. conducting research, preparing reports, and classifying vendors). The VMI must evolve and become strategic for many reasons: staying in the transactional world limits the VMI’s contributions, results, influence and impact; team members will have less job satisfaction and enjoyment and lower salaries; ultimately, the justification for the VMI could disappear.

      To enhance the VMI’s (and, as applicable, its personnel’s) strategic value, continue:

      • Maturing the VMI and its personnel.
      • Building relationships internally and with the critical vendors (typically, high operational, high tactical, and strategic vendors under the COST model and valued and principal vendors under the MVP model).
      • Increasing your knowledge about vendor management and your critical vendors and their industries.
      • Saying yes to opportunities or volunteering for cross-functional teams that allow the VMI to showcase its abilities.
      • Increasing your knowledge of your organization, how it operates, the political environment, and anything else that will help the VMI provide information, insight, and guidance.
      • Learning about your industry and competitors (if applicable).

      Step 4.2 – Continue increasing the VMI’s strategic value

      Shift from transactional to strategic as much as possible

      Indicators of a transactional VMI:

      Indicators of a strategic VMI:

      • Exclusively reactive approach to operations
      • Focused exclusively on day-to-day operations
      • Internal clients are obligated to use the VMI due to policy
      • No perceived value-add; perceived as an administrative function
      • Left out of the RFP process or only have a limited role
      • Left out of the negotiation process or only have a limited role
      • VMI has a narrow reach and impact within the organization
      • Measure of value for the VMI is only quantitative
      • Metrics gathering without analysis and influential use
      • Personnel have limited skills, competencies, and knowledge
      • Proactive approach to operations
      • Focused on the big picture
      • Internal clients seek out or voluntarily consult the VMI
      • VMI is valued for its contributions and impact
      • Good relationships exist with vendors and stakeholders
      • Personnel possess high levels of skill, competency, and knowledge
      • VMI processes are integrated into the organization
      • VMI participates in business strategy development
      • VMI leads or is heavily involved in the RFP & negotiation processes
      • Relationship managers are assigned to all critical vendors
      • Measure of value for the VMI is quantitative and qualitative
      • Metrics are used to make and influence decisions/strategy

      Step 4.3 – Review and update

      Tap into the collective wisdom and experience of your team members

      The vendor management lifecycle is continuous and more chaotic than linear, but the chaos mostly stays within the boundaries of the “plan, build, run, and review” framework outlined in this blueprint and the blueprint Jump Start Your Vendor Management Initiative. Two of the goals of managing the lifecycle are: 1) to adapt to a changing world; and 2) to improve the VMI and its impact over time. To do this, keep following the guidance in this phase, but don’t forget about the direction provided in phase 4 of the blueprint Jump Start Your Vendor Management Initiative:

      • Review and assess compliance.
      • Compile and leverage lessons learned.
      • Focus on maintaining alignment internally.
      • Identify and incorporate leading practices.
      • Update governances.

      Info-Tech Insight

      Continue reviewing and updating the VMI’s risk footprint. Add risk categories and scope as needed (measurement, monitoring, and reporting). Review Info-Tech’s vendor management-based series of risk blueprints for further information (Identify and Manage Reputational Risk Impacts on Your Organization and others).

      Summary of Accomplishment

      Problem Solved

      It is easy for business owners to lose sight of things. There is a saying among entrepreneurs about remembering to work on the business rather than working exclusively in the business. For many entrepreneurs, it is easy to get lost in the day-to-day grind and to forget to look at the bigger picture. A VMI is like a business in that regard – it is easy to focus on the transactional work and lose sight of maturing or evolving the VMI. Don’t let this happen!

      Leverage the tools and templates from this blueprint and adapt them to your environment as needed. Unlike the blueprint Jump Start Your Vendor Management Initiative, some of the concepts presented here may take more time, resources, and evolution before you are ready to deploy them. Continue using the three-year roadmap and 90-day plans from the Jump Start Your Vendor Management Initiative blueprint, and add components from this blueprint when the time is right. The two blueprints are designed to work in concert as you move forward on your VMI journey.

      Lastly, focus on getting a little better each day, week, month, or year: better processes, better policies and procedures, better relationships with vendors, better relationships with internal clients, better planning, better anticipation, better research, better skills, competencies, and knowledge for team members, better communication, better value, and better impact. A little “better” goes a long way, and over time it becomes a lot better.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Jump Start Your Vendor Management Initiative

      IT (and the organization as a whole) are more reliant on vendors than ever before, and vendor management has become increasingly necessary to manage the relationships and manage the risks. Implementing a vendor management initiative is no longer a luxury...it is a necessity.

      Capture and Market the ROI of Your VMO

      Calculating the impact or value of a vendor management office (VMO) can be difficult without the right framework and tools. Let Info-Tech’s tools and templates help you account for the contributions made by your VMO.

      Evaluate Your Vendor Account Team to Optimize Vendor Relations

      Understanding your vendor team’s background, experience, and strategic approach to your account is key to the management of the relationship, the success of the vendor agreement, and, depending on the vendor, the success of your business.

      Identify and Manage Financial Risk Impacts on Your Organization

      Vendors’ failure to perform, including security and compliance violations, can have significant financial consequences. Good vendor management practices help organizations understand the costs of those actions.

      Bibliography

      Amaresan, Swetha. “The 9 Most Important Survey Design Tips & Best Practices.” HubSpot. Accessed 13 July 2022.
      “Best Practices for Every Step of Survey Creation.” Survey Monkey. Accessed 13 July 2022.
      Brevig, Armand. ”Here Is a Quicker Way of Getting Better Supply Market Insights.” Procurement Cube, 30 July 2020. Accessed 19 May 2022.
      Cain, Elna. “9 Simple Ways on How to Improve Your Writing Skills.” Elna Cain, 20 Nov. 2018. Accessed 5 June 2020.
      Colwell, Tony. “How to Select Strategic Suppliers Part 1: Beware the Supplier's Perspective.” Accuity Consultants, 7 Feb 2012. Accessed 19 May 2022.
      “50 Tips for Improving Your Emotional Intelligence.” RocheMartin, 12 Jan. 2022. Accessed 25 July 2022.
      “4 Ways to Strengthen Your Ability to Influence Others.” Center for Creative Leadership, 24 Nov. 2020. Accessed 20 July 2022.
      Ferreira, Nicole Martins. “10 Personal Branding Tips That’ll Elevate Your Business In 2022.” Oberlo, 21 Mar. 2022. Accessed 24 May 2022.
      Gartlan, Dan. “4 Essential Brand Components.” Stevens & Tate, 25 Nov. 2019. Accessed 24 May 2022.
      Geller & Company. “World-Class Procurement — Increasing Profitability and Quality.” Spend Matters, 2003. Accessed 4 March 2022.
      Gumaste, Pavan. “50 Project Management Terms You Should Know.” Whiz Labs, 2018. Accessed 22 July 2022.
      Hertzberg, Karen. “How to Improve Writing Skills in 15 Easy Steps.” Grammarly, 15 June 2017. Accessed 5 June 2020.
      “Improving Emotional Intelligence (EQ).” HelpGuide, 2022. Accessed 25 July 2022.
      “ISG Index 4Q 2021.” Information Services Group, Inc., 2022. Web.
      Lehoczky, Etelka. “How To Improve Your Writing Skills At Work.” Forbes, 9 Mar. 2016. Accessed 5 June 2020.
      Liu, Joseph. “5 Ways To Build Your Personal Brand At Work.” Forbes, 30 Apr. 2018. Accessed 24 May 2022.
      Lloyd, Tracy. “Defining What a Brand Is: Why Is It So Hard?” Emotive Brand, 18 June 2019. Accessed 28 July 2022.
      Nielson, Megan. “The Basic Tenants of Diplomatic Communication.” Communiqué PR, 22 October 2020. Accessed 23 May 2022
      “Positioning Yourself in the Market.” New Zealand Ministry of Business, Innovation & Employment, 2021. Accessed 19 May 2022.
      Rogelberg, Steven G. “The Surprising Science Behind Successful Remote Meetings.” sloanreview.mit.edu. 21 May 2020. Accessed 19 July 2022.
      “Rule No 5: All Customers/Suppliers Have a Different Value to You.” newdawnpartners.com. Accessed 19 May 2022.

      Bibliography

      Shute, Benjamin. “Supplier Relationship Management: Is Bigger Always Better?” Comprara, 24 May 2015. Accessed 19 May 2022.
      Steele, Paul T. and Brian H. Court. Profitable Purchasing Strategies: A Manager's Guide for Improving Organizational Competitiveness Through the Skills of Purchasing. ‎ McGraw-Hill, 1996.
      “Take the Thomas-Kilmann Conflict Mode Instrument (TKI).” Kilmann Diagnostics, 2018. Accessed 20 Aug. 2020.
      Tallia, Alfred F. MD, MPH, et al. ”Seven Characteristics of Successful Work Relationships.” Fam Pract Manag. 2006 Jan;13(1):47-50.
      “The Art of Tact and Diplomacy.” skillsyouneed.com. Accessed 23 May 2022.
      “13 Key Traits of Strong Professional Relationships.” success.com. Accessed 4 Feb. 2022.
      Wilson, Fred. “Top 40 Project Management Terms and Concepts of 2022.” nTask, 25 Feb. 2019. Accessed 24 July 2022.

      Switching Software Vendors Overwhelmingly Drives Increased Satisfaction

      • Buy Link or Shortcode: {j2store}612|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation

      Organizations risk being locked in a circular trap of inertia from auto-renewing their software. With inertia comes complacency, leading to a decrease in overall satisfaction. Indeed, organizations are uniformly choosing to renew their software – even if they don’t like the vendor!

      Our Advice

      Critical Insight

      Renewal is an opportunity cost. Switching poorly performing software substantially drives increased satisfaction, and it potentially lowers vendor costs in the process. To realize maximum gains, it’s essential to have a repeatable process in place.

      Impact and Result

      Realize the benefits of switching by using Info-Tech’s five action steps to optimize your vendor switching processes:

      1. Identify switch opportunities.
      2. Evaluate your software.
      3. Build the business case.
      4. Optimize selection method.
      5. Plan implementation.

      Switching Software Vendors Overwhelmingly Drives Increased Satisfaction Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Why you should consider switching software vendors

      Use this outline of key statistics to help make the business case for switching poorly performing software.

      • Switching Existing Software Vendors Overwhelmingly Drives Increased Satisfaction Storyboard

      2. How to optimize your software vendor switching process

      Optimize your software vendor switching processes with five action steps.

      [infographic]

      Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management

      • Buy Link or Shortcode: {j2store}209|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      • Moreso than at any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.
      • It is increasingly likely that one of an organization's vendors, or their n-party support vendors, will cause an incident. Organizations must protect themselves by creating better mechanisms to hold their n-party vendors accountable and validate that they comply.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential risk impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect your organization.
      • Organizational leadership is often taken unaware by changes, and their plans lack the flexibility to adjust to significant regulatory upheavals.

      Impact and Result

      • Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks with our Comprehensive Risk Impact Tool to manage potential impacts.

      Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management – Use the research to better understand the negative impacts of vendor actions to your organization

      Use this research to identify and quantify the potential risk impacts caused by vendors. Utilize Info-Tech's approach to look at the impact from various perspectives to better prepare for issues that may arise.

      • Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management Storyboard

      2. Comprehensive Risk Impact Tool – Use this tool to help identify and quantify the impacts of negative vendor actions.

      By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Comprehensive Risk Impact Tool
      [infographic]

      Further reading

      Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management

      Approach vendor risk impact assessments from all perspectives.

      Analyst Perspective

      Organizations must comprehensively understand the impacts vendors may cause through different potential actions.

      Frank Sewell

      The risks from the vendor market have become more prevalent as the technologies and organizational strategies shift to a global direction. With this shift in risk comes a necessary perspective change to align with the greater likelihood of an incident occurring from vendors' (or one of their downstream support vendor's) negative actions.

      Organizational leadership must become more aware of the increasing risks that engaging vendors impose. To do so, they need to make informed decisions, which can only be provided by engaging expert resources in their organizations to compile a comprehensive look at potential risk impacts.

      Frank Sewell

      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      More so than at any other time, our world is changing. As a result organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.

      It is increasingly likely that one of your vendors, or their n-party support vendors, will cause an incident. Organizations must protect themselves by creating better mechanisms to hold their n-party vendors accountable and validate that they comply.

      Common Obstacles

      Identifying and managing a vendor’s potential risk impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect your organization.

      Organizational leadership is often taken unaware by changes, and their plans lack the flexibility to adjust to significant regulatory upheavals.

      Info-Tech's Approach

      Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks with our Comprehensive Risk Impact Tool to manage potential impacts.

      Info-Tech Insight

      Organizations must evolve their risk assessments to be more adaptive to respond to changes in the global market. Ongoing monitoring and continual assessment of vendors’ risks is crucial to avoiding negative impacts.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.`

      6 components of vendor risk beyond cybersecurity.  Financial, Reputational, Operational, Strategic, Security, Regulatory & Compliance.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of Scope:
      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      The world is constantly changing

      The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

      When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

      Below are some things no one expected to happen in the last few years:

      62%

      of IT professionals are more concerned about being a victim of ransomware than they were a year ago.

      Info-Tech Tech Trends Survey 2022

      82%

      of Microsoft non-essential employees shifted to working from home in 2020, joining the 18% already remote.

      Info-Tech Tech Trends Survey 2022

      89%

      of organizations invested in web conferencing technology to facilitate collaboration.

      Info-Tech Tech Trends Survey 2022

      Looking at Risk in a New Light:

      the 6 Pillars of Vendor Risk Management

      Vendor Risk

      • Financial

      • Strategic

      • Operational

      • Security

      • Reputational

      • Regulatory

      • Organizations must review their risk appetite and tolerance levels, considering their complete landscape.
      • Changing regulations, acquisitions, and events that affect global supply chains are current realities, not unlikely scenarios.
      • Prepare your vendor risk management for success using due diligence and scenario- based “What If” discussions to bring all the relevant parties to the table and educate your whole organization on risk factors.
      Assessing Financial Risk Impacts

      Strategic risks on a global scale

      Odds are at least one of these is currently affecting your strategic plans

      • Vendor Acquisitions
      • Global Pandemic
      • Global Shortages
      • Gas Prices
      • Poor Vendor Performance
      • Travel Bans
      • War
      • Natural Disasters
      • Supply Chain Disruptions
      • Security Incidents

      Make sure you have the right people at the table to identify and plan to manage impacts.

      Assess internal and external operational risk impacts

      Two sides of the same coin

      Internal

      • Poorly vetted supplemental staff
      • Bad system configurations
      • Lack of relevant skills
      • Poor vendor performance
      • Failure to follow established processes
      • Weak contractual accountability
      • Unsupportable or end-of-life system components

      External

      • Cyberattacks
      • Supply Chain Issues
      • Geo-Political Disruptions
      • Vendor Acquisitions
      • N-Party Non-Compliance
      • Vendor Fraud

      Operational risk is the risk of losses caused by flawed or failed processes, policies, systems, or events that disrupt business operations.

      Identify and manage security risk impacts on your organization

      Due diligence will enable successful outcomes

      • Poor vendor performance
      • Vendor acquisition
      • Supply chain disruptions and shortages
      • N-party risk
      • Third-party risk

      What your vendor associations say about you

      Reputations that affect your brand: Bad customer reviews, breach of data, poor security posture, negative news articles, public lawsuits, poor performance.

      Regulatory compliance

      Consider implementing vendor management initiatives and practices in your organization to help gain compliance with your expanding vendor landscape.

      Your organizational risks may be monitored but are your n-party vendors?

      6 components of vendor risk beyond cybersecurity.  Financial, Reputational, Operational, Strategic, Security, Regulatory & Compliance.

      Review your expectations with your vendors and hold them accountable

      Regulatory entities are looking beyond your organization’s internal compliance these days. Instead, they are more and more diving into your third-party and downstream relationships, particularly as awareness of downstream breaches increases globally.

      • Are you assessing your vendors regularly?
      • Are you validating those assessments?
      • Do your vendors have a map of their downstream support vendors?
      • Do they have the mechanisms to hold those downstream vendors accountable to your standards?

      Identify and manage risks

      Regulatory

      Regulatory agencies are putting more enforcement around ESG practices across the globe. As a result, organizations will need to monitor the changing regulations and validate that their vendors and n-party support vendors are adhering to these regulations or face penalties for non-compliance.

      Security-Data protection

      Data protection remains an issue. Organizations should ensure that the data their vendors obtain remains protected throughout the vendor’s lifecycle, including post-termination. Otherwise, they could be monitoring for a data breach in perpetuity.

      Mergers and acquisitions

      More prominent vendors continuously buy smaller companies to control the market in the IT industry. Organizations should put protections in their contracts to ensure that an IT vendor’s acquisition does not put them in a relationship with someone that could cause them an issue.

      Identify and manage risks

      Poor vendor performance

      Consider the impact of a vendor that fails to perform midway through the implementation. Organizations need to be able to manage the impact of replacing that vendor and cutting their losses rather than continuing to throw good money away after bad performance.

      Supply chain disruptions and global shortages

      Geopolitical disruptions and natural disasters have caused unprecedented interruptions to business. Incorporate forecasting of product and ongoing business continuity planning into your strategic plans to adapt as events unfold.

      Poorly configured systems

      Failing to ensure that your vendor-supported systems are properly configured and that your vendors are meeting your IT change control and configuration standards is more commonplace than expected. Proper oversight and management of your support vendors is crucial to ensure they are meeting expectations in this regard.

      What to look for

      Identify potential risk impacts

      • Is there a record of complaints against the vendor from their employees or customers?
      • Is the vendor financially sound, with the resources to support your needs?
      • Has the vendor been cited for regulatory compliance issues in the past?
      • Does the vendor have a comprehensive list of their n-party vendor partners?
        • Are they willing to accept appropriate contractual protections regarding them?
      • Does the vendor self-audit, or do they use a vetted third-party audit firm to issue a SOC report annually?
      • Does the vendor operate in regions known for instability?
      • Is the vendor willing to make concessions on contractual protections, or are they only offering one-sided agreements with as-is warranties?

      Prepare your vendor risk management for success

      Due diligence will enable successful outcomes.

      1. Obtain top-level buy-in; it is critical to success.
      2. Build enterprise risk management (ERM) through incremental improvement.
      3. Focus initial efforts on the “big wins” to prove the process works.
      4. Use existing resources.
      5. Build on any risk management activities that already exist in the organization.
      6. Socialize ERM throughout the organization to gain additional buy-in.
      7. Normalize the process long term with ongoing updates and continuing education for the organization.
      8. (Adapted from COSO)

      How to assess third-party risk

      1. Review organizational risks

        Understand the organizations risks to prepare for the “What If” game exercise.
      2. Identify and understand potential risks

        Play the “What If” game with the right people at the table.
      3. Create a risk profile packet for leadership

        Pull all the information together in a presentation document.
      4. Validate the risks

        Work with leadership to ensure that the proposed risks are in line with their thoughts.
      5. Plan to manage the risks

        Lower the overall risk potential by putting mitigations in place.
      6. Communicate the plan

        It is important not only to have a plan but also to socialize it in the organization for awareness.
      7. Enact the plan

        Once the plan is finalized and socialized, put it in place with continued monitoring for success.

      Adapted from Harvard Law School Forum on Corporate Governance

      Insight summary

      Risk impacts often come from unexpected places and have significant consequences.

      Knowing who your vendors are using for their support and supply chain could be crucial in eliminating the risk of non-compliance for your organization.

      Having a plan to identify and validate the regulatory compliance of your vendors is a must for any organization to avoid penalties.

      Insight 1

      Organizations’ strategic plans need to be adaptable to avoid vendors’ negative actions causing an expedited shift in priorities.

      For example, Philips’ recall of ventilators impacted its products and the availability of its competitors’ products as demand overwhelmed the market.

      Insight 2

      Organizations often fail to understand how n-party vendors could place them in non-compliance.

      Even if you know your complete third-party vendor landscape, you may not be aware of the downstream vendors in play. Ensure that you get visibility into this space as well, and hold your direct vendors accountable for the actions of their vendors.

      Insight 3

      Organizations need to know where their data lives and ensure it is protected.

      Make sure you know which vendors are accessing/storing your data, where they are keeping it, and that you can get it back and have the vendors destroy it when the relationship is over. Without adequate protections throughout the lifecycle of the vendor, you could be monitoring for breaches in perpetuity.

      Insight summary

      Assessing financial impacts is an ongoing, educative, and collaborative multidisciplinary process that vendor management initiatives are uniquely designed to coordinate and manage for organizations.

      Operational risk impacts often come from unexpected places and have unforeseen impacts. Knowing where your vendors place in critical business processes and those vendors' business continuity plans concerning your organization should be a priority for those managing the vendors.

      Insight 4

      Organizations need to learn how to assess the likelihood of potential risks in the rapidly changing online environments and recognize how their partnerships and subcontractors’ actions can affect their brand.

      For example, do you understand how a simple news article raises your profile for short-term and long-term adverse events?

      Insight 5

      Organizations fail to plan for vendor acquisitions appropriately.

      Vendors routinely get acquired in the IT space. Does your organization have appropriate safeguards from inadvertently entering a negative relationship? Do you have plans for replacing critical vendors purchased in such a manner?

      Insight 6

      Vendors are becoming more and more crucial to organizations’ overall operations, and most organizations have a poor understanding of the potential impacts they represent.

      Is your vendor solvent? Do they have enough staff to accommodate your needs? Has their long-term planning been affected by changes in the market? Are they unique in their space?

      Identifying vendor risk

      Who should be included in the discussion?

      • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make informed decisions.
      • Getting input from operational experts at your organization will enhance your business's long-term potential for success.
      • Involving those who directly manage vendors and understand the market will aid operational experts in determining the forward path for relationships with your current vendors and identifying emerging potential strategic partners.
      • Make sure security, risk, and compliance are all at the table. These departments all look at risk from different angles for the business and give valuable insight collectively.
      • Organizations have a wealth of experience in their marketing departments that can help identify real-world scenarios of negative actions.

      See the blueprint Build an IT Risk Management Program

      Review your risk management plans for new risks on a regular basis.

      Keep in mind Risk =
      Likelihood x Impact

      (R=L*I).

      Impact (I) tends to remain the same, while Likelihood (L) is becoming closer to 100% as threat actors become more prevalent.

      Managing vendor risk impacts

      How could your vendors impact your organization?

      • Review vendors’ downstream connections to understand thoroughly who you are in business with
      • Institute continuous vendor lifecycle management
      • Develop IT risk governance and change control
      • Introduce continual risk assessment to monitor the relevant vendor markets
      • Monitor and schedule contract renewals and new service/module negotiations
      • Perform business alignment meetings to reassess relationships
      • Ensure strategic alignment in contracts
      • Review vendors’ business continuity plans and disaster recovery testing
      • Re-evaluate corporate policies frequently
      • Monitor your company’s and associated vendors’ online presence
      • Be adaptable and allow for innovations that arise from the current needs
        • Capture lessons learned from prior incidents to improve over time, and adjust your plans accordingly

      Organizations must review their risk appetite and tolerance levels, considering their complete landscape.

      Changing regulations, acquisitions, new security issues, and events that affect global supply chains are current realities, not unlikely scenarios.

      Ongoing Improvement

      Incorporating lessons learned.

      • Over time, despite everyone’s best observations and plans, incidents will catch us off guard.
      • When that happens, follow your incident response plans and act accordingly.
      • An essential step is to document what worked and what did not – collectively known as the “lessons learned.”
      • Use the lessons learned document to devise, incorporate, and enact a better risk management process.

      Sometimes disasters occur despite our best plans to manage them.

      When this happens, it is important to document the lessons learned and improve our plans going forward.

      The "what if" game

      1-3 hours

      Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      1. Break into smaller groups (if too small, continue as a single group).
      2. Use the Comprehensive Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potentials but manage the overall process to keep the discussion pertinent and on track.
      3. Collect the outputs and ask the subject matter experts (SMEs) for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Comprehensive Risk Impact Tool

      Input

      • List of identified potential risk scenarios scored by impact
      • List of potential mitigations of the scenarios to reduce the risk

      Output

      • Comprehensive risk profile on the specific vendor solution

      Materials

      • Whiteboard/flip charts
      • Comprehensive Risk Impact Tool to help drive discussion

      Participants

      • Vendor Management – Coordinator
      • Organizational Leadership
      • Operations Experts (SMEs)
      • Business Process Experts
      • Legal/Compliance/Risk Manager

      High risk example from tool

      High risk example from Tool.  Shows sample questions to ask to identify impacts, their associated score, weight, and comments or notes.

      Note: Even though a few items are “scored” they have not been added to the overall weight, signaling that the company has noted but does not necessarily hold them against the vendor.

      How to mitigate:

      • Contractually insist that the vendor have a third-party security audit performed annually with the stipulation that they will not denigrate below your acceptable standards.
      • At renewal negotiate better contractual terms and protections for your organization.

      Low risk example from tool

      Low risk example from Tool.  Shows sample questions to ask to identify impacts, their associated score, weight, and comments or notes.

      Summary

      Seek to understand all potential risk impacts to better prepare your organization for success.

      • Organizations need to understand and map out their entire vendor landscape.
      • Understand where all your data lives and how you can control it throughout the vendor lifecycle.
      • Organizations need to be realistic about the likelihood of potential risks in the changing global world.
      • Those organizations that consistently follow their established risk-assessment and due-diligence processes are better positioned to avoid penalties.
      • Understand how your vendors prioritize your organization in their business continuity processes.
      • Bring the right people to the table to outline potential risks in the market and your organization.
      • Socialize the third-party vendor risk management process throughout the organization to heighten awareness and enable employees to help protect the organization.
      • Organizations need to learn how to assess the likelihood of potential risks in the changing global markets and recognize how their partnerships and subcontracts affect their brand.
      • Incorporate lessons learned from prior incidents into your risk management process to build better plans for future issues.

      Organizations must evolve their risk assessments to be more meaningful to respond to global changes in the market.

      Organizations should increase the resources dedicated to monitoring the market as regulatory agencies continue to hold them more and more accountable.

      Bibliography

      Olaganathan, Rajee. “Impact of COVID-19 on airline industry and strategic plan for its recovery with special reference to data analytics technology.” Global Journal of Engineering and Technology Advances, vol 7, no 1, 2021, pp. 033-046.

      Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012.

      Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.

      Weak Cybersecurity is taking a toll on Small Businesses (tripwire.com)

      SecureLink 2022 White Paper SL_Page_EA+PAM (rocketcdn.me)

      Shared Assessments Member Poll March 2021 "Guide: Evolving Work Environments Impact of Covid-19 on Profile and Management of Third Parties“

      “Cybersecurity only the tip of the iceberg for third-party risk management”. Help Net Security, April 21, 2021. Accessed: 2022-07-29.

      “Third-Party Risk Management (TPRM) Managed Services”. Deloitte, 2022. Accessed: 2022-07-29.

      “The Future of TPRM: Third Party Risk Management Predictions for 2022”. OneTrust, December 20th2021. Accessed 2022-07-29.

      “Third Party Vendor definition”. Law Insider, Accessed 2022-07-29.

      “Third Party Risk”. AWAKE Security, Accessed 2022-07-29.

      Glidden, Donna. "Don't Underestimate the Need to Protect Your Brand in Publicity Clauses", Info-Tech Research Group, June 2022.

      Greenaway, Jordan. "Managing Reputation Risk: A start-to-finish guide", Transmission Private, July 2022. Accessed June 2022.

      Jagiello, Robert D, and Thomas T Hills. “Bad News Has Wings: Dread Risk Mediates Social Amplification in Risk Communication. ”Risk analysis : an official publication of the Society for Risk Analysis vol. 38,10 (2018): 2193-2207.doi:10.1111/risa.13117

      Kenton, Will. "Brand Recognition", Investopedia, August 2021. Accessed June 2022. Lischer, Brian. "How Much Does it Cost to Rebrand Your Company?", Ignyte, October 2017. Accessed June 2022.

      "Powerful Examples of How to Respond to Negative Reviews", Review Trackers, February 2022. Accessed June 2022.

      "The CEO Reputation Premium: Gaining Advantage in the Engagement Era", Weber Shadwick, March 2015. Accessed on June 2022.

      "Valuation of Trademarks: Everything You Need to Know",UpCounsel, 2022. Accessed June 2022.

      Related Info-Tech Research

      Identify and Manage Financial Risk Impacts on Your Organization

      • Vendor management practices educate organizations on potential financial impacts that vendors may incur and suggest systems to help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

      Identify and Manage Reputational Risk Impacts on Your Organization

      • Vendor management practices educate organizations on potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your reputation and brand with our Reputational Risk Impact Tool.

      Identify and Manage Strategic Risk Impacts on Your Organization

      • Vendor management practices educate organizations on potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Risk Impact Tool.

      Regulatory guidance and industry standards

      Reduce Manual Repetitive Work With IT Automation

      • Buy Link or Shortcode: {j2store}458|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $34,099 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • IT staff are overwhelmed with manual repetitive work.
      • You have little time for projects.
      • You cannot move as fast as the business wants.

      Our Advice

      Critical Insight

      • Optimize before you automate.
      • Foster an engineering mindset.
      • Build a process to iterate.

      Impact and Result

      • Begin by automating a few tasks with the highest value to score quick wins.
      • Define a process for rolling out automation, leveraging SDLC best practices.
      • Determine metrics and continually track the success of the automation program.

      Reduce Manual Repetitive Work With IT Automation Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand why you should reduce manual repetitive work with IT automation.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify automation candidates

      Select the top automation candidates to score some quick wins.

      • Reduce Manual Repetitive Work With IT Automation – Phase 1: Identify Automation Candidates
      • IT Automation Presentation
      • IT Automation Worksheet

      2. Map and optimize process flows

      Map and optimize process flows for each task you wish to automate.

      • Reduce Manual Repetitive Work With IT Automation – Phase 2: Map & Optimize Process Flows

      3. Build a process for managing automation

      Build a process around managing IT automation to drive value over the long term.

      • Reduce Manual Repetitive Work With IT Automation – Phase 3: Build a Process for Managing Automation

      4. Build automation roadmap

      Build a long-term roadmap to enhance your organization's automation capabilities.

      • Reduce Manual Repetitive Work With IT Automation – Phase 4: Build Automation Roadmap
      • IT Automation Roadmap
      [infographic]

      Workshop: Reduce Manual Repetitive Work With IT Automation

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Automation Candidates

      The Purpose

      Identify top candidates for automation.

      Key Benefits Achieved

      Plan to achieve quick wins with automation for early value.

      Activities

      1.1 Identify MRW pain points.

      1.2 Drill down pain points into tasks.

      1.3 Estimate the MRW involved in each task.

      1.4 Rank the tasks based on value and ease.

      1.5 Select top candidates and define metrics.

      1.6 Draft project charters.

      Outputs

      MRW pain points

      MRW tasks

      Estimate of MRW involved in each task

      Ranking of tasks for suitability for automation

      Top candidates for automation & success metrics

      Project charter(s)

      2 Map & Optimize Processes

      The Purpose

      Map and optimize the process flow of the top candidate(s).

      Key Benefits Achieved

      Requirements for automation of the top task(s).

      Activities

      2.1 Map process flows.

      2.2 Review and optimize process flows.

      2.3 Clarify logic and finalize future-state process flows.

      Outputs

      Current-state process flows

      Optimized process flows

      Future-state process flows with complete logic

      3 Build a Process for Managing Automation

      The Purpose

      Develop a lightweight process for rolling out automation and for managing the automation program.

      Key Benefits Achieved

      Ability to measure and to demonstrate success of each task automation, and of the program as a whole.

      Activities

      3.1 Kick off your test plan for each automation.

      3.2 Define process for automation rollout.

      3.3 Define process to manage your automation program.

      3.4 Define metrics to measure success of your automation program.

      Outputs

      Test plan considerations

      Automation rollout process

      Automation program management process

      Automation program metrics

      4 Build Automation Roadmap

      The Purpose

      Build a roadmap to enhance automation capabilities.

      Key Benefits Achieved

      A clear timeline of initiatives that will drive improvement in the automation program to reduce MRW.

      Activities

      4.1 Build a roadmap for next steps.

      Outputs

      IT automation roadmap

      Further reading

      Reduce Manual Repetitive Work With IT Automation

      Free up time for value-adding jobs.

      ANALYST PERSPECTIVE

      Automation cuts both ways.

      Automation can be very, very good, or very, very bad.
      Do it right, and you can make your life a whole lot easier.
      Do it wrong, and you can suffer some serious pain.
      All too often, automation is deployed willy-nilly, without regard to the overall systems or business processes in which it lives.
      IT professionals should follow a disciplined and consistent approach to automation to ensure that they maximize its value for their organization.

      Derek Shank,
      Research Analyst, Infrastructure & Operations
      Info-Tech Research Group

      Executive summary

      Situation

      • IT staff are overwhelmed with manual repetitive work.
      • You have little time for projects.
      • You cannot move as fast as the business wants.

      Complication

      • Automation is simple to say, but hard to implement.
      • Vendors claim automation will solve all your problems.
      • You have no process for managing automation.

      Resolution

      • Begin by automating a few tasks with the highest value to score quick wins.
      • Define a process for rolling out automation, leveraging SDLC best practices.
      • Determine metrics and continually track the success of the automation program.

      Info-Tech Insight

      1. Optimize before you automate.The current way isn’t necessarily the best way.
      2. Foster an engineering mindset.Your team members may not be process engineers, but they should learn to think like one.
      3. Build a process to iterate.Effective automation can't be a one-and-done. Define a lightweight process to manage your program.

      Infrastructure & operations teams are overloaded with work

      • DevOps and digital transformation initiatives demand increased speed.
      • I&O is still tasked with security and compliance and audit.
      • I&O is often overloaded and unable to keep up with demand.

      Manual repetitive work (MRW) sucks up time

      • Manual repetitive work is a fact of life in I&O.
      • DevOps circles refer to this type of work simply as “toil.”
      • Toil is like treading water: it must be done, but it consumes precious energy and effort just to stay in the same place.
      • Some amount of toil is inevitable, but it's important to measure and cap toil, so it does not end up overwhelming your team's whole capacity for engineering work.

      Info-Tech Insight

      Follow our methodology to focus IT automation on reducing toil.

      Manual hand-offs create costly delays

      • Every time there is a hand-off, we lose efficiency and productivity.
      • In addition to the cost of performing manual work itself, we must also consider the impact of lost productivity caused by the delay of waiting for that work to be performed.

      Every queue is a tire fire

      Queues create waste and are extremely damaging. Like a tire fire, once you get started, they’re almost impossible to stamp out!

      Increase queues if you want

      • “More overhead”
      • “Lower quality”
      • “More variability”
      • “Less motivation”
      • “Longer cycle time”
      • “Increased risk”

      (Source: Edwards, citing Donald G. Reinersten: The Principles of Product Development Flow: Second Generation Lean Product Development )

      Increasing complexity makes I&O’s job harder

      Every additional layer of complexity multiplies points of failure. Beyond a certain level of complexity, troubleshooting can become a nightmare.

      Today, Operations is responsible for the outcomes of a full stack of a very complex, software-defined, API-enabled system running on infrastructure they may or may not own.
      – Edwards

      Growing technical debt means an ever-rising workload

      • Enterprises naturally accumulate technical debt.
      • All technology requires care and feeding.
      • I&O cannot control how much technology it’s expected to support.
      • I&O faces a larger and larger workload as technical debt accumulates.

      The systems built under each new technology paradigm never fully replace the systems built under the old paradigms. It’s not uncommon for an enterprise to have an accumulation of systems built over 10-15 years and have no budget, risk appetite, or even a viable path to replace them all. With each shift, who bares [SIC] the brunt of the responsibility for making sure the old and the new hang together? Operations, of course. With each new advance, Operations juggles more complexity and more layers of legacy technologies than ever before.
      – Edwards

      Most IT shops can’t have a dedicated engineering team

      • In most organizations, the team that builds things is best equipped to support them.
      • Often the knowledge to design systems and the knowledge to run those systems naturally co-exists in the same personnel resources.
      • When your I&O team is trying to do engineering work, they can end up frequently interrupted to perform operational tasks.
      A Venn Diagram is depicted which compares People who build things with People who run things. the two circles are almost completely overlapping, indicating the strong connection between the two groups.

      Personnel resources in most IT organizations overlap heavily between “build” and “run.”

      IT operations must become an engineering practice

      • Usually you can’t double your staff or double their hours.
      • IT professionals must become engineers.
      • We do this by automating manual repetitive work and reducing toil.
      Two scenarios are depicted. The first scenario is found at a hypothetical work camp, in which one employee performs the task of manually splitting firewood with an axe. In order to split twice as much firewood, the employee would need to spend twice the time. The second scenario is Engineering Operations. in this scenario, a wood processor is used to automate the task, allowing far more wood to be split in same amount of time.

      Build your Sys Admin an Iron Man suit

      Some CIOs see a Sys Admin and want to replace them with a Roomba. I see a Sys Admin and want to build them an Iron Man suit.
      – Deepak Giridharagopal, CTO, Puppet

      Two Scenarios are depicted. In one, an employee is replaced by automation, represented by a Roomba, reducing costs by laying off a single employee. In the second scenario, the single employee is given automated tools to do their job, represented by an iron-man suit, leading to a 10X boost in employee productivity.

      Use automation to reduce risk

      Consistency

      When we automate, we can make sure we do something the same way every time and produce a consistent result.

      Auditing and Compliance

      We can design an automated execution that will ship logs that provide the context of the action for a detailed audit trail.

      Change

      • Enterprise environments are continually changing.
      • When context changes, so does the procedure.
      • You can update your docs all you want, but you can't make people read them before executing a procedure.
      • When you update the procedure itself, you can make sure it’s executed properly.

      Follow Info-Tech’s approach: Start small and snowball

      • It’s difficult for I&O to get the staffing resources it needs for engineering work.
      • Rather than trying to get buy-in for resources using a “top down” approach, Info-Tech recommends that I&O score some quick wins to build momentum.
      • Show success while giving your team the opportunity to build their engineering chops.

      Because the C-suite relies on upwards communication — often filtered and sanitized by the time it reaches them — executives don’t see the bottlenecks and broken processes that are stalling progress.
      – Andi Mann

      Info-Tech’s methodology employs a targeted approach

      • You aren’t going to automate IT operations end-to-end overnight.
      • In fact, such a large undertaking might be more effort than it’s worth.
      • Info-Tech’s methodology employs a targeted approach to identify which candidates will score some quick wins.
      • We’ll demonstrate success, gain momentum, and then iterate for continual improvement.

      Invest in automation to reap long-term rewards

      • All too often people think of automation like a vacuum cleaner you can buy once and then forget.
      • The reality is you need to perform care and feeding for automation like for any other process or program.
      • To reap the greatest rewards you must continually invest in automation – and invest wisely.

      To get the full ROI on your automation, you need to treat it like an employee. When you hire an employee, you invest in that person. You spend time and resources training and nurturing new employees so they can reach their full potential. The investment in a new employee is no different than your investment in automation.– Edwards

      Measure the success of your automation program

      Example of How to Estimate Dollar Value Impact of Automation
      Metric Timeline Target Value
      Hours of manual repetitive work 12 months 20% reduction $48,000/yr.(1)
      Hours of project capacity 18 months 30% increase $108,000/yr.(2)
      Downtime caused by errors 6 months 50% reduction $62,500/yr.(3)

      1 15 FTEs x 80k/yr.; 20% of time on MRW, reduced by 20%
      2 15 FTEs x 80k/yr.; 30% project capacity, increased by 30%
      3 25k/hr. of downtime.; 5 hours per year of downtime caused by errors

      Automating failover for disaster recovery

      CASE STUDY

      Industry Financial Services
      Source Interview

      Challenge

      An IT infrastructure manager had established DR failover procedures, but these required a lot of manual work to execute. His team lacked the expertise to build automation for the failover.

      Solution

      The manager hired consultants to build scripts that would execute portions of the failover and pause at certain points to report on outcomes and ask the human operator whether to proceed with the next step.

      Results

      The infrastructure team reduced their achievable RTOs as follows:
      Tier 1: 2.5h → 0.5h
      Tier 2: 4h → 1.5h
      Tier 3: 8h → 2.5h
      And now, anyone on the team could execute the entire failover!

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Reduce Manual Repetitive Work With IT Automation – project overview

      1. Select Candidates 2. Map Process Flows 3. Build Process 4. Build Roadmap
      Best-Practice Toolkit

      1.1 Identify MRW pain points

      1.2 Drill down pain points into tasks

      1.3 Estimate the MRW involved in each task

      1.4 Rank the tasks based on value and ease

      1.5 Select top candidates and define metrics

      1.6 Draft project charters

      2.1 Map process flows

      2.2 Review and optimize process flows

      2.3 Clarify logic and finalize future-state process flows

      3.1 Kick off your test plan for each automation

      3.2 Define process for automation rollout

      3.3 Define process to manage your automation program

      3.4 Define metrics to measure success of your automation program

      4.1 Build automation roadmap

      Guided Implementations

      Introduce methodology.

      Review automation candidates.

      Review success metrics.

      Review process flows.

      Review end-to-end process flows.

      Review testing considerations.

      Review automation SDLC.

      Review automation program metrics.

      Review automation roadmap.

      Onsite Workshop Module 1:
      Identify Automation Candidates
      Module 2:
      Map and Optimize Processes
      Module 3:
      Build a Process for Managing Automation
      Module 4:
      Build Automation Roadmap
      Phase 1 Results:
      Automation candidates and success metrics
      Phase 2 Results:
      End-to-end process flows for automation
      Phase 3 Results:
      Automation SDLC process, and automation program management process
      Phase 4 Results:
      Automation roadmap

      Design Data-as-a-Service

      • Buy Link or Shortcode: {j2store}129|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $1,007 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Lack of a consistent approach in accessing internal and external data within the organization and sharing data with third parties.
      • Data consumed by most organizations lacks proper data quality, data certification, standards tractability, and lineage.
      • Organizations are looking for guidance in terms of readily accessible data from others and data that can be shared with others or monetized.

      Our Advice

      Critical Insight

      • Despite data being everywhere, most organizations struggle to find accurate, trustworthy, and meaningful data when required.
      • Connecting to data should be as easy as connecting to the internet. This is achievable if all organizations start participating in the data marketplace ecosystem by leveraging a Data-as-a-Service (DaaS) framework.

      Impact and Result

      • Data marketplaces facilitate data sharing between the data producer and the data consumer. The data product must be carefully designed to truly benefit in today’s connected data ecosystem.
      • Follow Info-Tech’s step-by-step approach to establish your DaaS framework:
        1. Understand Data Ecosystem
        2. Design Data Products
        3. Establish DaaS framework

      Design Data-as-a-Service Research & Tools

      Start here – Read the Executive Brief

      Read our concise Executive Brief to find out why you should design Data-as-a-Service (DaaS), review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand data ecosystem

      Provide clear benefits of adopting the DaaS framework and solid rationale for moving towards a more connected data ecosystem and avoiding data silos.

      • Design Data-as-a-Service – Phase 1: Understand Data Ecosystem

      2. Design data product

      Leverage design thinking methodology and templates to document your most important data products.

      • Design Data-as-a-Service – Phase 2: Design Data Product

      3. Establish a DaaS framework

      Capture internal and external data sources critical to data products success for the organization and document an end-to-end DaaS framework.

      • Design Data-as-a-Service – Phase 3: Establish a DaaS Framework
      [infographic]

      Workshop: Design Data-as-a-Service

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Data Marketplace and DaaS Explained

      The Purpose

      The purpose of this module is to provide a clear understanding of the key concepts such as data marketplace, data sharing, and data products.

      Key Benefits Achieved

      This module will provide clear benefits of adopting the DaaS framework and solid rationale for moving towards a more connected data ecosystem and avoiding data silos.

      Activities

      1.1 Review the business context

      1.2 Understand the data ecosystem

      1.3 Draft products ideas and use cases

      1.4 Capture data product metrics

      Outputs

      Data product ideas

      Data sharing use cases

      Data product metrics

      2 Design Data Product

      The Purpose

      The purpose of this module is to leverage design thinking methodology and templates to document the most important data products.

      Key Benefits Achieved

      Data products design that incorporates end-to-end customer journey and stakeholder map.

      Activities

      2.1 Create a stakeholder map

      2.2 Establish a persona

      2.3 Data consumer journey map

      2.4 Document data product design

      Outputs

      Data product design

      3 Assess Data Sources

      The Purpose

      The purpose of this module is to capture internal and external data sources critical to data product success.

      Key Benefits Achieved

      Break down silos by integrating internal and external data sources

      Activities

      3.1 Review the conceptual data model

      3.2 Map internal and external data sources

      3.3 Document data sources

      Outputs

      Internal and external data sources relationship map

      4 Establish a DaaS Framework

      The Purpose

      The purpose of this module is to document end-to-end DaaS framework.

      Key Benefits Achieved

      End-to-end framework that breaks down silos and enables data product that can be exchanged for long-term success.

      Activities

      4.1 Design target state DaaS framework

      4.2 Document DaaS framework

      4.3 Assess the gaps between current and target environments

      4.4 Brainstorm initiatives to develop DaaS capabilities

      Outputs

      Target DaaS framework

      DaaS initiative

      Improve Email Security

      • Buy Link or Shortcode: {j2store}272|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Secure Cloud & Network Architecture
      • Parent Category Link: /secure-cloud-network-architecture

      As the sophistication of malicious attacks increases, it has become more difficult to ensure applications such as email software are properly protected and secured. The increase in usage and traffic of email exacerbates the security risks to the organization.

      Our Advice

      Critical Insight

      Email has changed. Your email security needs to evolve as well to ensure you are protecting your organization’s communication.

      Impact and Result

      • Gain an understanding of the importance of email security and steps to secure your corporate email.
      • Develop holistic guidelines on implementing best practices to modernize your organization’s email security.

      Improve Email Security Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Improve Email Security Storyboard – A guide to best practices for improving an organization’s email security.

      This research provides guidelines to assist organizations in identifying controls to secure their emails along with recommendations on the most common and effective controls to secure and protect corporate emails.

      • Improve Email Security Storyboard

      2. Email Security Checklist – A checklist tool that enables organizations to monitor their progress in implementing controls to improve their email security.

      This checklist of common email security categories and their associated controls helps ensure organizations are following best practices.

      • Email Security Checklist
      [infographic]

      Further reading

      Improve Email Security

      Follow the latest best practices for email security to mitigate evolving threats.

      Analyst Perspective

      Protecting your organization’s digital assets begins with securing your email communication.

      As organizations increasingly rely on email communication for day-to-day business operations, threat actors are exploiting the increased traction to develop and implement more sophisticated email-based attacks. Furthermore, the lack of investment in measures, tools, and technologies for an organization’s email security exacerbates the vulnerabilities at hand.

      Effective use of security procedures and techniques can mitigate and minimize email-based threats have been shown to reduce the ability of these attacks to infiltrate the email inbox. These guidelines and best practices will help your organization conduct due diligence to protect the contents of the email, its transit, and its arrival to the authorized recipient.

      Ahmad Jowhar, Research Specialist, Security & Privacy

      Ahmad Jowhar
      Research Specialist, Security & Privacy
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech’s Approach
      • As malicious attacks get increasingly sophisticated, it has become more difficult to ensure applications such as email software are properly protected and secured.
      • The increased usage and traffic of emails, as well as their contents, exacerbates security risks to the organization.
      • Given the variety of email security controls, it can be complicated to identify the most important techniques for improving your organization’s email security.
      • Understand the importance of implementing email security for your organization.
      • Develop a holistic guideline for implementing best practices to secure your organization’s emails.

      Info-Tech Insight
      Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

      Your Challenge

      As a security leader, you need to modernize your email security services so you can protect business communications and prevent security incidents.

      • Various factors must be considered when deciding how best to safeguard your organization’s communication chain. This includes the frequency of email traffic and the contents of emails.
      • The increased number of email-based cyberattacks reveals the sophistication of threat actors in leveraging an organization’s lack of email security to infiltrate their business.
      • As organizations continue to rely heavily on email communication, email-based threats will become increasingly prevalent.

      75% of organizations have experienced an increase in email-based threats.

      97% of security breaches are due to phishing attacks.

      82% of companies reported a higher volume of email in 2022.

      Source: Mimecast, 2023.

      Modern email security controls framework for security leaders

      Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

      Modern email security controls framework for security leaders

      Understand the best practices in securing your organization’s emails

      Enhance your security posture by modernizing your email security
      Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

      Deploy an added layer of defense by preventing the contents of your email from being intercepted.

      Encrypting your email communication will provide an additional layer of protection which only allows authorized users to read the email.

      Leverage triple-threat authentication controls to strengthen your email security.

      Leveraging SPF, DKIM, and DMARC enables you to have the proper authentication controls in place, ensuring that only legitimate users are part of the email communication.

      Protect the contents of your email through data classification and data loss prevention.

      Having tools and technologies in place to ensure that data is classified and backed up will enable better storage, analysis, and processing of the email.

      Implement email policies for a holistic email security protection.

      Policies ensure acceptable standards are in place to protect the organization’s assets, including the creation, attachment, sending, and receiving of emails.

      User awareness and training
      Training employees on protecting their corporate emails adds an extra layer of defense by ensuring end users are aware of various email-based threats and can confidently safeguard their organizations from attacks.

      Email encryption

      Deploy an added layer of defense by preventing the contents of your email from being intercepted.

      • Protecting your organization’s emails begins by ensuring only the appropriate recipients can receive and read the email’s contents.
      • This process includes encrypting the email’s contents to protect sensitive information from being read by unauthorized recipients.
      • This protects the contents even if the email is intercepted by anyone besides the intended recipient.
      • Other benefits of email encryption include:
        • Reducing any risks associated with regulatory violations.
        • Enabling business to confidently communicate sensitive information via email.
        • Ensuring protective measures taken to prevent data loss and corporate policy violations.

      Along with the increased use of emails, organizations are seeing an increase in the number of attacks orchestrating from emails. This has resulted in 74% of organizations seeing an increase in email-based threats.

      Source: Mimecast, 2023.

      Info-Tech Insight
      Encrypting your email communication will provide an additional layer of protection which only allows authorized users to read the email.

      Implementing email encryption

      Leverage these protocols and tools to help encrypt your email.

      • The most common email encryption protocols and tools include:
        • Transport Layer Security (TLS): A cryptographic protocol designed to securely deliver data via the internet, which prevents third parties from intercepting and accessing the data.
        • Secure/Multipurpose Internet Mail Extension (S/MIME): A protocol for sending digitally signed and encrypted messages by leveraging public key encryption to provide at-rest and in-transit data protection.
        • Secure Email Gateway: An email security solution that inspects emails for malicious content prior to it reaching the corporate system. The solution is positioned between the public internet and corporate email servers. An email gateway solution would be provided by a third-party vendor and can be implemented on-premises, through the cloud, or hybrid.
      • Email encryption policies can also be implemented to ensure processes are in place when sending sensitive information through emails.
      • Email encryption ensures end-to-end privacy for your email and is especially important when the email requires strict content privacy.

      Email authentication

      Three authentication controls your organization should leverage to stay secure.

      • Along with content encryption, it’s important to authenticate both the sender and recipient of an email to ensure that only legitimate users are able to send and receive it.
      • Implementing email authentication techniques prevents unsolicited email (e.g. spam) from entering your mailbox.
      • This also prevents unauthorized users from sending email on your organization’s behalf.
      • Having these standards in place would safeguard your organization from spam, spoofing, and phishing attacks.
      • The three authentication controls include:
        • Sender Policy Framework (SPF): Email validation control that verifies that the incoming email is from an authorized list of IP addresses provided by the sender’s domain administrator.
        • DomainKeys Identified Mail (DKIM): Enables recipients to verify that an email from a specific domain was authorized by the domain’s owner. This is conducted through cryptographic authentication by adding a digital signature to the message headers of outbound emails.
        • Domain Message Authentication Reporting & Conformance (DMARC): Provides domain-level protection of email channel by publishing DMARC records in the organization’s domain name system (DNS) and creates policies which prompts actions to take if an email fails authentication.

      Although these authentication controls are available for organizations to leverage, the adoption rate remains low. 73% of survey respondents indicated they didn’t deploy email authentication controls within their organization.

      Source: Mimecast, 2023.

      Email authentication controls

      All three authentication controls should be implemented to effectively secure your organization’s email. They ensure the emails you send and receive are securely authorized and legitimate.

      SPF DKIM DMARC

      Creating an SPF record identifies which IP addresses are allowed to send emails from your domain. Steps to implement SPF include the following:

      1. Create an SPF record by identifying the IP addresses that are authorized to send emails.
      2. Publish your SPF record into your DNS by creating a TXT record on your domain.

      Implementing DKIM helps prevent attackers from sending emails that pretend to come from your domain. Steps to implement DKIM include the following:

      1. Identify and enable domains you wish to configure DKIM to create DKIM keys.
      2. Copy the canonical names (CNAMEs) that are provided.
      3. Publish the CNAME records to your DNS service provider.

      Setting up DMARC ensures emails are validated and defines actions to take if an email fails authentication. These include:

      • None: Message is delivered to recipient and a DMARC report is sent to domain owner.
      • Quarantine: Message moved to quarantine folder and recipient is notified.
      • Reject: Message is not delivered to the recipient.
      • Steps to implement DMARC include:
      1. Create a DMARC record by including your organization’s email domain and IP addresses.
      2. Form a DMARC TXT record for your domain to include policies and publish it to your DNS.

      For more information:

      Data classification

      Ensure sensitive data is securely processed, analyzed, and stored.

      • Besides authenticating the legitimacy of an email and its traffic to the recipient, it’s important to have procedures in place to protect the contents of an email.
      • Data classification is found not only in databases and spreadsheets, but also in the email messages being communicated. Examples of data most commonly included in emails:
        • Personal identifiable information (PII): social security number, financial account number, passcodes/passwords
      • Applying data classification to your email can help identify the sensitivity of the information it contains. This ensures any critical data within an email message is securely processed and protected against unauthorized use, theft, and loss.
      • Emails can be classified based on various sensitivity levels. such as:
        • Top secret, public, confidential, internal

      Discover and Classify Your Data

      Leverage this Info-Tech blueprint for guidelines on implementing a data classification program for your organization.

      Info-Tech Insight
      Having tools and technologies in place to ensure that data is classified and backed up will enable better storage, analysis, and processing of the email.

      Data loss prevention (DLP)

      Protect your data from being lost/stolen.

      • Protecting an email’s contents through data classification is only one approach for improving email security. Having a data loss prevention solution would further increase security by minimizing the threat of sensitive information leaving your organization’s email network.
      • Examples of tools embedded in DLP solutions that help monitor an organization's email communication:
        • Monitoring data sent and received from emails: This ensures the data within an email communication is protected with the necessary encryption based on its sensitivity.
        • Detecting suspicious email activity: This includes analyzing users’ email behavior regarding email attachments and identifying irregular behaviors.
        • Flagging or blocking email activities which may lead to data loss: This prevents highly sensitive data from being communicated via email and reduces the risk of information being intercepted.
      • The types of DLP technologies that can be leveraged include:
        • Rule-based: Data that has been tagged by admins as sensitive can be blocklisted, which would flag and/or block data from being sent via email.
        • Machine learning: Data on users’ email behavior is collected, processed, and trained to understand the employee’s normal email behavior and detect/flag suspicious activities.
      • Implementing DLP solutions would complement your data classification techniques by ensuring proper measures are in place to secure your organization’s assets through policies, technology, and tools.

      48% of employees have accidently attached the wrong file to an email.

      39% of respondents have accidently sent emails that contained security information such as passwords and passcodes.

      Source: Tessian, 2021.

      User awareness & training

      A strong security awareness & training program is an important element of strengthening your email security.

      • Having all these tools and techniques in place to improve your email security will not be effective unless you also improve your employees’ awareness.
      • Employees should participate in email security training, especially since the majority utilize this channel of communication for day-to-day operations.
      • User awareness and training should go beyond phishing campaigns and should highlight the various types of email-based threats, the characteristics of these threats, and what procedures they can follow to minimize these threats.
      • 95% of data breaches are caused by human error. It can take nine months to discover and contain them, and they are expected to cost $8 trillion this year (Mimecast, 2023).
      • Investments in employee awareness and training would mitigate these risks by ensuring employees recognize and report suspicious emails, remain mindful of what type of data to share via email, and improve their overall understanding of the importance of email security.

      Develop a Security Awareness and Training Program That Empowers End Users

      Leverage this Info-Tech blueprint for assistance on creating various user training materials and empower your employees to become a main line of defense for your organization.

      64% of organizations conduct formal training sessions (in-person or computer-based).

      74% of organizations only focus on providing phishing-based training.

      Source: Proofpoint, 2021.

      Examples of email-based threats

      Phishing
      Email sent by threat actors designed to manipulate end user into providing sensitive information by posing as a trustworthy source

      Business Email Compromise
      Attackers trick a user into sending money or providing confidential information

      Spam
      Users receive unsolicited email, usually in bulk, some of which contains malware

      Spear Phishing
      A type of phishing attack where the email is sent to specific and targeted emails within the organization

      Whaling
      A type of phishing attack similar to spear phishing, but targeting senior executives within the organization

      Password/Email Exposure
      Employees use organizational email accounts and passwords to sign up for social media, leaving them susceptible to email and/or password exposure in a social media breach

      Email policies

      Having policies in place will enable these controls to be implemented.

      Developing security policies that are reasonable, auditable, enforceable, and measurable ensures proper procedures are followed and necessary measures are implemented to protect the organization. Policies relating to email security can be categorized into two groups:

      • User policy: Policies employees must adhere to when using their corporate email. Examples:
        • User acceptance of technology: Acknowledgment of legitimate and restrictive actions when using corporate email
        • Security awareness and training: Acknowledging completion of email security training
      • Administrator-set policy: Policies that are implemented by IT and/or security admins. Examples:
        • Email backup: Policy on how long emails should be archived and processes for disposing of them
        • Log retention: Policy on how to retain, process, and analyze logs created from email servers
        • Throttling: Policies that limit the number of emails sent by a sender and the number of recipients per email and per day depending on the employee’s grouping

      Develop and Deploy Security Policies

      Leverage this Info-Tech blueprint for assistance on developing and deploying actionable policies and creating an overall policy management lifecycle to keep your policies current, effective, and compliant.

      Info-Tech Insight
      Policies ensure acceptable standards are in place to protect the organization’s assets, including the creation, attachment, sending, and receiving of emails.

      Email security technologies & tools (SoftwareReviews)

      SoftwareReviews, a division of Info-Tech Research Group, provides enterprise software reviews to help organizations make more efficient decisions during the software selection process. Reviews are provided by authenticated IT professionals who have leveraged the software and provide unbiased insights on different vendors and their products.

      Learn from the collective knowledge of real IT professionals.

      • Know the products and features available.
      • Explore modules and detailed feature-level data.
      • Quickly understand the market.

      Evaluate market leaders through vendor rankings and awards.

      • Convince stakeholders with professional reports.
      • Avoid pitfalls with unfiltered data from real users.
      • Choose software with confidence.

      Cut through misleading marketing material.

      • Negotiate contracts based on data.
      • Know what to expect before you sign.
      • Effectively manage the vendor.

      Email security technologies & tools

      Leverage these tools for an enhanced email security solution.

      Email Security Checklist

      Follow these guidelines to ensure you are implementing best practices for securing your organization’s emails.

      • The Email Security Checklist is a tool to assess the current and future state of your organization’s email security and provides a holistic understanding on monitoring your progress within each category and associated controls.
      • The status column allows you to select the feature’s current implementation status, which includes the following options:
        • Enabled: The feature is deployed within the organization’s network.
        • Implemented: The feature is implemented within the organization’s network, but not yet deployed.
        • Not implemented: The feature has not been enabled or implemented.
      • Comments can be added for each feature to provide details such as indicating the progress on enabling/implementing a feature and why certain features are not yet implemented.

      Email Security Checklist

      Download the Email Security Checklist tool

      Related Info-Tech Research

      Discover and Classify Your Data
      Leverage this Info-Tech blueprint for guidelines on implementing a data classification program for your organization.

      Develop a Security Awareness and Training Program That Empowers End Users
      Leverage this Info-Tech blueprint for assistance on creating various user training materials and empower your employees to become a main line of defense for your organization.

      Develop and Deploy Security Policies
      Leverage this Info-Tech blueprint for assistance on developing and deploying actionable policies and creating an overall policy management lifecycle to keep your policies current, effective, and compliant.

      Bibliography

      “10 Best Practices for Email Security in 2022.” TitanFile, 22 Sept. 2022. Web.

      “2021 State of the Phish.” Proofpoint, 2021. Web.

      Ahmad, Summra. “11 Email Security Best Practices You Shouldn't Miss (2023).” Mailmunch, 9 Mar. 2023. Web.

      “Blumira's State of Detection and Response.” Blumira, 18 Jan. 2023. Web.

      Clay, Jon. “Email Security Best Practices for Phishing Prevention.” Trend Micro, 17 Nov. 2022. Web.

      Crane, Casey. “6 Email Security Best Practices to Keep Your Business Safe in 2019.” Hashed Out by The SSL Store™, 7 Aug. 2019. Web.

      Hateb, Seif. “Basic Email Security Guide.” Twilio Blog, Twilio, 5 Dec. 2022. Web.

      “How DMARC Advances Email Security.” CIS, 9 July 2021. Web.

      Pal, Suryanarayan. “10 Email Security Best Practices You Should Know in 2023.” Mailmodo, 9 Feb. 2023. Web.

      Pitchkites, Max. “Email Security: A Guide to Keeping Your Inbox Safe in 2023.” Cloudwards, 9 Dec. 2022. Web.

      Rudra, Ahona. “Corporate Email Security Checklist.” PowerDMARC, 4 July 2022. Web.

      “Sender Policy Framework.” Mimecast, n.d. Web.

      Shea, Sharon, and Peter Loshin. “Top 15 Email Security Best Practices for 2023: TechTarget.” TechTarget, 14 Dec. 2022. Web.

      “The Email Security Checklist: Upguard.” UpGuard, 16 Feb. 2022. Web.

      “The State of Email Security 2023.” Mimecast, 2023. Web.

      Wetherald, Harry. “New Product - Stop Employees Emailing the Wrong Attachments.” Tessian, 16 Sept. 2021. Web.

      “What Is DMARC? - Record, Verification & More: Proofpoint Us.” Proofpoint, 9 Mar. 2023. Web.

      “What Is Email Security? - Defining Security of Email: Proofpoint Us.” Proofpoint, 3 Mar.2023. Web.

      Wilton, Laird. “How to Secure Email in Your Business with an Email Security Policy.” Carbide, 31 Jan. 2022. Web.

      Learn the right way to manage metrics

      • Parent Category Name: Improve Your Processes
      • Parent Category Link: /improve-your-processes

      Learn to use metrics in the right way. Avoid staff (subconciously) gaming the numbers, as it is only natural to try to achieve the objective. This is really a case of be careful what you wish for, you may just get it.

      Register to read more …

      IT Management and Policies

      • Buy Link or Shortcode: {j2store}23|cart{/j2store}
      • Related Products: {j2store}23|crosssells{/j2store}
      • InfoTech Academy Title: IT management and policies videos
      • InfoTech Academy Excerpt: More videos are available once you join. Contact us for more information.
      • Teaser Video: Visit Website
      • Teaser Video Title: Policies Academy Overview
      • member rating overall impact: 9.5/10
      • member rating average dollars saved: $23101
      • member rating average days saved: 11
      • Parent Category Name: Strategy and Governance
      • InfotechAcademy-Executivebrief: Visit Website
      • Parent Category Link: /strategy-and-governance
      Create policies that matter most to your organization.

      Management, policy, policies

      Modernize Data Architecture for Measurable Business Results

      • Buy Link or Shortcode: {j2store}387|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Data architecture projects have often failed in the past, causing businesses today to view the launch of a new project as a costly initiative with unclear business value.
      • New technologies in big data and analytics are requiring organizations to modernize their data architecture, but most organizations have failed to spend the time and effort refining the appropriate data models and blueprints that enable them to do so.
      • As the benefits for data architecture are often diffused across an organization’s information management practice, it can be difficult for the business to understand the value and necessity of data architecture.

      Our Advice

      Critical Insight

      • At the heart of tomorrow’s insights-driven enterprises is a modern data environment anchored in fit-for-purpose data architectures.
      • The role of traditional data architecture is transcending beyond organizational boundaries and its focus is shifting from “keeping the lights on” (i.e. operational data and BI) to providing game-changing insights gleaned from untapped big data.

      Impact and Result

      • Perform a diagnostic assessment of your present day architecture and identify the capabilities of your future “to be” environment to position your organization to capitalize on new opportunities in the data space.
      • Use Info-Tech’s program diagnostic assessment and guidance for developing a strategic roadmap to support your team in building a fit-for purpose data architecture practice.
      • Create a data delivery architecture that harmonizes traditional and modern architectural opportunities.

      Modernize Data Architecture for Measurable Business Results Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should modernize your data architecture, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop a data architecture vision

      Plan your data architecture project and align it with the business and its strategic vision.

      • Modernize Data Architecture for Measurable Business Results – Phase 1: Develop a Data Architecture Vision
      • Modernize Data Architecture Project Charter
      • Data Architecture Strategic Planning Workbook

      2. Assess data architecture capabilities

      Evaluate the current and target capabilities of your data architecture, using the accompanying diagnostic assessment to identify performance gaps and build a fit-for-purpose practice.

      • Modernize Data Architecture for Measurable Business Results – Phase 2: Assess Data Architecture Capabilities
      • Data Architecture Assessment and Roadmap Tool
      • Initiative Definition Tool

      3. Develop a data architecture roadmap

      Translate your planned initiatives into a sequenced roadmap.

      • Modernize Data Architecture for Measurable Business Results – Phase 3: Develop a Data Architecture Roadmap
      • Modernize Data Architecture Roadmap Presentation Template
      [infographic]

      Workshop: Modernize Data Architecture for Measurable Business Results

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Develop a Data Architecture (DA) Vision

      The Purpose

      Discuss key business drivers and strategies.

      Identify data strategies.

      Develop a data architecture vision.

      Assess data architecture practice capabilities. 

      Key Benefits Achieved

      A data architecture vision aligned with the business.

      A completed assessment of the organization’s current data architecture practice capabilities.

      Identification of "to be" data architecture practice capabilities.

      Identification of key gaps. 

      Activities

      1.1 Explain approach and value proposition

      1.2 Discuss business vision and key drivers

      1.3 Discover business pain points and needs

      1.4 Determine data strategies

      1.5 Assess DA practice capabilities

      Outputs

      Data strategies

      Data architecture vision

      Current and target capabilities for the modernized DA practice

      2 Assess DA Core Capabilities (Part 1)

      The Purpose

      Assess the enterprise data model (EDM).

      Assess current and target data warehouse, BI/analytics, and big data architectures.

      Key Benefits Achieved

      A completed assessment of the organization’s current EDM, data warehouse, BI and analytics, and big data architectures.

      Identification of "to be" capabilities for the organization’s EDM, data warehouse, BI and analytics, and big data architectures.

      Identification of key gaps.

      Activities

      2.1 Present an overarching DA capability model

      2.2 Assess current and target EDM capabilities

      2.3 Assess current/target data warehouse, BI/analytics, and big data architectures

      2.4 Identify gaps and high level strategies

      Outputs

      Target capabilities for EDM

      Target capabilities for data warehouse architecture, BI architecture, and big data architecture

      3 Assess DA Core Capabilities (Part 2)

      The Purpose

      Assess EDM.

      Assess current/target MDM, metadata, data integration, and content architectures.

      Assess dynamic data models.

      Key Benefits Achieved

      A completed assessment of the organization’s current MDM, metadata, data integration, and content architectures.

      Identification of “to be” capabilities for the organization’s MDM, metadata, data integration, and content architectures.

      Identification of key gaps.

      Activities

      3.1 Present an overarching DA capability model

      3.2 Assess current and target MDM, metadata, data integration, and content architectures

      3.3 Assess data lineage and data delivery model

      3.4 Identify gaps and high level strategies

      Outputs

      Target capabilities for MDM architecture, metadata architecture, data integration architecture, and document & content architecture

      Target capabilities for data lineage/delivery

      4 Analyze Gaps and Formulate Strategies

      The Purpose

      Map performance gaps and document key initiatives from the diagnostic assessment.

      Identify additional gaps and action items.

      Formulate strategies and initiatives to address priority gaps. 

      Key Benefits Achieved

      Prioritized gap analysis.

      Improvement initiatives and related strategies.

      Activities

      4.1 Map performance gaps to business vision, pain points, and needs

      4.2 Identify additional gaps

      4.3 Consolidate/rationalize/prioritize gaps

      4.4 Formulate strategies and actions to address gaps

      Outputs

      Prioritized gaps

      Data architecture modernization strategies

      5 Develop a Data Architecture Roadmap

      The Purpose

      Plot initiatives and strategies on a strategic roadmap.

      Key Benefits Achieved

      A roadmap with prioritized and sequenced initiatives.

      Milestone plan.

      Executive report. 

      Activities

      5.1 Transform strategies into a plan of action

      5.2 Plot actions on a prioritized roadmap

      5.3 Identify and discuss next milestone plan

      5.4 Compile an executive report

      Outputs

      Data architecture modernization roadmap

      Data architecture assessment and roadmap report (from analyst team)

      Data Architecture

      • Buy Link or Shortcode: {j2store}17|cart{/j2store}
      • Related Products: {j2store}17|crosssells{/j2store}
      • member rating overall impact: 9.5/10
      • member rating average dollars saved: $30,159
      • member rating average days saved: 5
      • Parent Category Name: Data and Business Intelligence
      • Parent Category Link: /data-and-business-intelligence
      Enable the business to achieve operational excellence, client intimacy, and product leadership with an innovative, agile, and fit-for-purpose data architecture practice

      Build a Service Desk Consolidation Strategy

      • Buy Link or Shortcode: {j2store}479|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Incompatible technologies. Organizations with more than one service desk are likely to have many legacy IT service management (ITSM) solutions. These come with a higher support cost, costly skill-set maintenance, and the inability to negotiate volume licensing discounts.
      • Inconsistent processes. Organizations with more than one service desk often have incompatible processes, which can lead to inconsistent service support across departments, less staffing flexibility, and higher support costs.
      • Lack of data integration. Without a single system and consistent processes, IT leaders often have only a partial view of service support activities. This can lead to rigid IT silos, limit the ability to troubleshoot problems, and streamline process workflows.

      Our Advice

      Critical Insight

      • Every step should put people first. It’s tempting to focus the strategy on designing processes and technologies for the target architecture. However, the most common barrier to success is workforce resistance to change.
      • A consolidated service desk is an investment, not a cost-reduction program. Focus on efficiency, customer service, and end-user satisfaction. There will be many cost savings, but viewing them as an indirect consequence of the pursuit of efficiency and customer service is the best approach.

      Impact and Result

      • Conduct a comprehensive assessment of existing service desk people, processes, and technology.
      • Identify and retire resources and processes that are no longer meeting business needs, and consolidate and modernize resources and processes that are worth keeping.
      • Identify logistic and cost considerations and create a roadmap of consolidation initiatives.
      • Communicate the change and garner support for the consolidation initiative.

      Build a Service Desk Consolidation Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a service desk consolidation strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop a shared vision

      Engage stakeholders to develop a vision for the project and perform a comprehensive assessment of existing service desks.

      • Build a Service Desk Consolidation Strategy – Phase 1: Develop a Shared Vision
      • Stakeholder Engagement Workbook
      • Consolidate Service Desk Executive Presentation
      • Consolidate Service Desk Assessment Tool
      • IT Skills Inventory and Gap Assessment Tool

      2. Design the consolidated service desk

      Outline the target state of the consolidated service desk and assess logistics and cost of consolidation.

      • Build a Service Desk Consolidation Strategy – Phase 2: Design the Consolidated Service Desk
      • Consolidate Service Desk Scorecard Tool
      • Consolidated Service Desk SOP Template
      • Service Desk Efficiency Calculator
      • Service Desk Consolidation TCO Comparison Tool

      3. Plan the transition

      Build a project roadmap and communication plan.

      • Build a Service Desk Consolidation Strategy – Phase 3: Plan the Transition
      • Service Desk Consolidation Roadmap
      • Service Desk Consolidation Communications and Training Plan Template
      • Service Desk Consolidation News Bulletin & FAQ Template
      [infographic]

      Workshop: Build a Service Desk Consolidation Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Engage Stakeholders to Develop a Vision for the Service Desk

      The Purpose

      Identify and engage key stakeholders.

      Conduct an executive visioning session to define the scope and goals of the consolidation.

      Key Benefits Achieved

      A list of key stakeholders and an engagement plan to identify needs and garner support for the change.

      A common vision for the consolidation initiative with clearly defined goals and objectives.

      Activities

      1.1 Identify key stakeholders and develop an engagement plan.

      1.2 Brainstorm desired service desk attributes.

      1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk.

      1.4 Define project goals, principles, and KPIs.

      Outputs

      Stakeholder Engagement Workbook

      Executive Presentation

      2 Conduct a Full Assessment of Each Service Desk

      The Purpose

      Assess the overall maturity, structure, organizational design, and performance of each service desk.

      Assess current ITSM tools and how well they are meeting needs.

      Key Benefits Achieved

      A robust current state assessment of each service desk.

      An understanding of agent skills, satisfaction, roles, and responsibilities.

      An evaluation of existing ITSM tools and technology.

      Activities

      2.1 Review the results of diagnostics programs.

      2.2 Map organizational structure and roles for each service desk.

      2.3 Assess overall maturity and environment of each service desk.

      2.4 Assess current information system environment.

      Outputs

      Consolidate Service Desk Assessment Tool

      3 Design Target Consolidated Service Desk

      The Purpose

      Define the target state for consolidated service desk.

      Identify requirements for the service desk and a supporting solution.

      Key Benefits Achieved

      Detailed requirements and vision for the consolidated service desk.

      Gap analysis of current vs. target state.

      Documented standardized processes and procedures.

      Activities

      3.1 Identify requirements for target consolidated service desk.

      3.2 Build requirements document and shortlist for ITSM tool.

      3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state.

      3.4 Document standardized processes for new service desk.

      Outputs

      Consolidate Service Desk Scorecard Tool

      Consolidated Service Desk SOP

      4 Plan for the Transition

      The Purpose

      Break down the consolidation project into specific initiatives with a detailed timeline and assigned responsibilities.

      Plan the logistics and cost of the consolidation for process, technology, and facilities.

      Develop a communications plan.

      Key Benefits Achieved

      Initial analysis of the logistics and cost considerations to achieve the target.

      A detailed project roadmap to migrate to a consolidated service desk.

      A communications plan with responses to anticipated questions and objections.

      Activities

      4.1 Plan the logistics of the transition.

      4.2 Assess the cost and savings of consolidation to refine business case.

      4.3 Identify initiatives and develop a project roadmap.

      4.4 Plan communications for each stakeholder group.

      Outputs

      Consolidation TCO Tool

      Consolidation Roadmap

      Executive Presentation

      Communications Plan

      News Bulletin & FAQ Template

      Further reading

      Build a Service Desk Consolidation Strategy

      Manage the dark side of growth.

      ANALYST PERSPECTIVE

      A successful service desk consolidation begins and ends with people.

      "It’s tempting to focus strategic planning on the processes and technology that will underpin the consolidated service desk. Consistent processes and a reliable tool will cement the consolidation, but they are not what will hold you back.

      The most common barrier to a successful consolidation is workforce resistance to change. Cultural difference, perceived risks, and organizational inertia can hinder data gathering, deter collaboration, and impede progress from the start.

      Building a consolidated service desk is first and foremost an exercise in organizational change. Garner executive support for the project, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often. The key is to create a shared vision for the project and engage those who will be most affected."

      Sandi Conrad

      Senior Director, Infrastructure Practice

      Info-Tech Research Group

      Our understanding of the problem

      This Research is Designed For:

      • CIOs who need to reduce support costs and improve customer service.
      • IT leaders tasked with the merger of two or more IT organizations.
      • Service managers implementing a shared service desk tool.
      • Organizations rationalizing IT service management (ITSM) processes.

      This Research Will Help You:

      • Develop a shared vision for the consolidated service desk.
      • Assess key metrics and report on existing service desk architecture.
      • Design a target service desk architecture and assess how to meet the new requirements.
      • Deploy a strategic roadmap to build the consolidated service desk architecture.

      Executive summary

      Situation

      Every organization must grow to survive. Good growth makes an organization more agile, responsive, and competitive, which leads to further growth.

      The proliferation of service desks is a hallmark of good growth when it empowers the service of diverse end users, geographies, or technologies.

      Complication

      Growth has its dark side. Bad growth within a business can hinder agility, responsiveness, and competitiveness, leading to stagnation.

      Supporting a large number of service desks can be costly and inefficient, and produce poor or inconsistent customer service, especially when each service desk uses different ITSM processes and technologies.

      Resolution

      Manage the dark side of growth. Consolidating service desks can help standardize ITSM processes, improve customer service, improve service desk efficiency, and reduce total support costs. A consolidation is a highly visible and mission critical project, and one that will change the public face of IT. Organizations need to get it right.

      Building a consolidated service desk is an exercise in organizational change. The success of the project will hinge on how well the organization engages those who will be most affected by the change. Build a guiding coalition for the project, create a shared vision, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often.

      Use a structured approach to facilitate the development of a shared strategic vision, design a detailed consolidated architecture, and anticipate resistance to change to ensure the organization reaps project benefits.

      Info-Tech Insight

      1. Every step should put people first. It’s tempting to focus the strategy on designing processes and technologies for the target architecture. However, the most common barrier to success is workforce resistance to change.
      2. A consolidated service desk is an investment, not a cost-reduction program. Focus on efficiency, customer service, and end-user satisfaction. Cost savings, and there will be many, should be seen as an indirect consequence of the pursuit of efficiency and customer service.

      Focus the service desk consolidation project on improving customer service to overcome resistance to change

      Emphasizing cost reduction as the most important motivation for the consolidation project is risky.

      End-user satisfaction is a more reliable measure of a successful consolidation.

      • Too many variables affect the impact of the consolidation on the operating costs of the service desk to predict the outcome reliably.
      • Potential reductions in costs are unlikely to overcome organizational resistance to change.
      • Successful service desk consolidations can increase ticket volume as agents capture tickets more consistently and increase customer service.

      The project will generate many cost savings, but they will take time to manifest, and are best seen as an indirect consequence of the pursuit of customer service.

      Info-Tech Insight

      Business units facing a service desk consolidation are often concerned that the project will lead to a loss of access to IT resources. Focus on building a customer-focused consolidated service desk to assuage those fears and earn their support.

      End users, IT leaders, and process owners recognize the importance of the service desk.

      2nd out of 45

      On average, IT leaders and process owners rank the service desk 2nd in terms of importance out of 45 core IT processes. Source: Info-Tech Research Group, Management and Governance Diagnostic (2015, n = 486)

      42.1%

      On average, end users who were satisfied with service desk effectiveness rated all other IT services 42.1% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey 2015, n = 133)

      38.0%

      On average, end users who were satisfied with service desk timeliness rated all other IT services 38.0% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey (2015, n = 133)

      Overcome the perceived barriers from differing service unit cultures to pursue a consolidated service desk (CSD)

      In most organizations, the greatest hurdles that consolidation projects face are related to people rather than process or technology.

      In a survey of 168 service delivery organizations without a consolidated service desk, the Service Desk Institute found that the largest internal barrier to putting in place a consolidated service desk was organizational resistance to change.

      Specifically, more than 56% of respondents reported that the different cultures of each service unit would hinder the level of collaboration such an initiative would require.

      The image is a graph titled Island cultures are the largest barrier to consolidation. The graph lists Perceived Internal Barriers to CSD by percentage. The greatest % barrier is Island cultures, with executive resistance the next highest.

      Service Desk Institute (n = 168, 2007)

      Info-Tech Insight

      Use a phased approach to overcome resistance to change. Focus on quick-win implementations that bring two or three service desks together in a short time frame and add additional service desks over time.

      Avoid the costly proliferation of service desks that can come with organizational growth

      Good and bad growth

      Every organization must grow to survive, and relies heavily on its IT infrastructure to do that. Good growth makes an organization more agile, responsive, and competitive, and leads to further growth.

      However, growth has its dark side. Bad growth hobbles agility, responsiveness, and competitiveness, and leads to stagnation.

      As organizations grow organically and through mergers, their IT functions create multiple service desks across the enterprise to support:

      • Large, diverse user constituencies.
      • Rapidly increasing call volumes.
      • Broader geographic coverage.
      • A growing range of products and services.

      A hallmark of bad growth is the proliferation of redundant and often incompatible ITSM services and processes.

      Project triggers:

      • Organizational mergers
      • ITSM tool purchase
      • Service quality or cost-reduction initiatives
      Challenges arising from service desk proliferation:
      Challenge Impact
      Incompatible Technologies
      • Inability to negotiate volume discounts.
      • Costly skill set maintenance.
      • Increased support costs.
      • Increased shadow IT.
      Inconsistent Processes
      • Low efficiency.
      • High support costs.
      • Inconsistent support quality.
      • Less staffing flexibility.
      Lack of Data Integration
      • Only partial view of IT.
      • Inefficient workflows.
      • Limited troubleshooting ability.
      Low Customer Satisfaction
      • Fewer IT supporters.
      • Lack of organizational support.

      Consolidate service desks to integrate the resources, processes, and technology of your support ecosystem

      What project benefits can you anticipate?

      • Consolidated Service Desk
        • End-user group #1
        • End-user group #2
        • End-user group #3
        • End-user group #4

      A successful consolidation can significantly reduce cost per transaction, speed up service delivery, and improve the customer experience through:

      • Single point of contact for end users.
      • Integrated ITSM solution where it makes sense.
      • Standardized processes.
      • Staffing integration.
      Project Outcome

      Expected Benefit

      Integrated information The capacity to produce quick, accurate, and segmented reports of service levels across the organization.
      Integrated staffing Flexible management of resources that better responds to organizational needs.
      Integrated technology Reduced tool procurement costs, improved data integration, and increased information security.
      Standardized processes Efficient and timely customer service and a more consistent customer experience.

      Standardized and consolidated service desks will optimize infrastructure, services, and resources benefits

      • To set up a functioning service desk, the organization will need to invest resources to build and integrate tier 1, tier 2, and tier 3 capabilities to manage incidents and requests.
      • The typical service desk (Figure 1) can address a certain number of tickets from all three tiers. If your tickets in a given tier are less than that number, you are paying for 100% of service costs but consuming only a portion of it.
      • The consolidated model (Figure 2) reduces the service cost by reducing unused capacity.
      • Benefits of consolidation include a single service desk solution, a single point of contact for the business, data integration, process standardization, and consolidated administration, reporting, and management.

      The image is a graphic showing 2 figures. The first shows ring graphs labelled Service Desk 1 and Service Desk 2, with the caption Service provisioning with distinct service desks. Figure 2 shows one graphic, captioned Service provisioning with Consolidated service providers. At the bottom of the image, there is a legend.

      Info-Tech’s approach to service desk consolidation draws on key metrics to establish a baseline and a target state

      The foundation of a successful service desk consolidation initiative is a robust current state assessment. Given the project’s complexity, however, determining the right level of detail to include in the evaluation of existing service desks can be challenging.

      The Info-Tech approach to service desk consolidation includes:

      • Envisioning exercises to set project scope and garner executive support.
      • Surveys and interviews to identify the current state of people, processes, technologies, and service level agreements (SLAs) in each service desk, and to establish a baseline for the consolidated service desk.
      • Service desk comparison tools to gather the results of the current state assessment for analysis and identify current best practices for migration to the consolidated service desk.
      • Case studies to illustrate the full scope of the project and identify how different organizations deal with key challenges.

      The project blueprint walks through a method that helps identify which processes and technologies from each service desk work best, and it draws on them to build a target state for the consolidated service desk.

      Inspiring your target state from internal tools and best practices is much more efficient than developing new tools and processes from scratch.

      Info-Tech Insight

      The two key hurdles that a successful service desk consolidation must overcome are organizational complexity and resistance to change.

      Effective planning during the current state assessment can overcome these challenges.

      Identify existing best practices for migration to the consolidated service desk to foster agent engagement and get the consolidated service desk up quickly.

      A consolidation project should include the following steps and may involve multiple transition phases to complete

      Phase 1: Develop a Shared Vision

      • Identify stakeholders
      • Develop vision
      • Measure baseline

      Phase 2: Design the Consolidation

      • Design target state
      • Assess gaps to reach target
      • Assess logistics and cost

      Phase 3: Plan the Transition

      • Develop project plan and roadmap
      • Communicate changes
      • Make the transition
        • Evaluate and prepare for next transition phase (if applicable)
        • Evaluate and stabilize
          • CSI

      Whether or not your project requires multiple transition waves to complete the consolidation depends on the complexity of the environment.

      For a more detailed breakdown of this project’s steps and deliverables, see the next section.

      Follow Info-Tech’s methodology to develop a service desk consolidation strategy

      Phases Phase 1: Develop a Shared Vision Phase 2: Design the Consolidated Service Desk Phase 3: Plan the Transition
      Steps 1.1 - Identify and engage key stakeholders 2.1 - Design target consolidated service desk 3.1 - Build the project roadmap
      1.2 - Develop a vision to give the project direction
      1.3 - Conduct a full assessment of each service desk 2.2 - Assess logistics and cost of consolidation 3.2 - Communicate the change
      Tools & Templates Executive Presentation Consolidate Service Desk Scorecard Tool Service Desk Consolidation Roadmap
      Consolidate Service Desk Assessment Tool Consolidated Service Desk SOP Communications and Training Plan Template
      Service Desk Efficiency Calculator News Bulletin & FAQ Template
      Service Desk Consolidation TCO Comparison Tool

      Service desk consolidation is the first of several optimization projects focused on building essential best practices

      Info-Tech’s Service Desk Methodology aligns with the ITIL framework

      Extend

      Facilitate the extension of service management best practices to other business functions to improve productivity and position IT as a strategic partner.

      Standardize

      Build essential incident, service request, and knowledge management processes to create a sustainable service desk that meets business needs.

      Improve

      Build a continual improvement plan for the service desk to review and evaluate key processes and services, and manage the progress of improvement initiatives.

      Adopt Lean

      Build essential incident, service request, and knowledge management processes to create a sustainable service desk that boosts business value.

      Select and Implement

      Review mid-market and enterprise service desk tools, select an ITSM solution, and build an implementation plan to ensure your investment meets your needs.

      Consolidate

      Build a strategic roadmap to consolidate service desks to reduce end-user support costs and sustain end-user satisfaction.

      Our Approach to the Service Desk

      Service desk optimization goes beyond the blind adoption of best practices.

      Info-Tech’s approach focuses on controlling support costs and making the most of IT’s service management expertise to improve productivity.

      Complete the projects sequentially or in any order.

      Info-Tech draws on the COBIT framework, which focuses on consistent delivery of IT services across the organization

      The image shows Info-Tech's IT Management & Governance Framework. It is a grid of boxes, which are colour-coded by category. The framework includes multiple connected categories of research, including Infrastructure & Operations, where Service Desk is highlighted.

      Oxford University IT Service Desk successfully undertook a consolidation project to merge five help desks into one

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Background

      Until 2011, three disparate information technology organizations offered IT services, while each college had local IT officers responsible for purchasing and IT management.

      ITS Service Desk Consolidation Project

      Oxford merged the administration of these three IT organizations into IT Services (ITS) in 2012, and began planning for the consolidation of five independent help desks into a single robust service desk.

      Complication

      The relative autonomy of the five service desks had led to the proliferation of different tools and processes, licensing headaches, and confusion from end users about where to acquire IT service.

      Oxford University IT at a Glance

      • One of the world’s oldest and most prestigious universities.
      • 36 colleges with 100+ departments.
      • Over 40,000 IT end users.
      • Roughly 350 ITS staff in 40 teams.
      • 300 more distributed IT staff.
      • Offers more than 80 services.

      Help Desks:

      • Processes → Business Services & Projects
      • Processes → Computing Services
      • Processes → ICT Support Team

      "IT Services are aiming to provide a consolidated service which provides a unified and coherent experience for users. The aim is to deliver a ‘joined-up’ customer experience when users are asking for any form of help from IT Services. It will be easier for users to obtain support for their IT – whatever the need, service or system." – Oxford University, IT Services

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Build a Service Desk Consolidation Strategy – project overview

      1. Develop shared vision 2. Design consolidation 3. Plan transition
      Best-Practice Toolkit

      1.1 Identify and engage key stakeholders

      1.2 Develop a vision to give the project direction

      1.3 Conduct a full assessment of each service desk

      2.1 Design target consolidated service desk

      2.2 Assess logistics and cost of consolidation

      3.1 Build project roadmap

      3.2 Communicate the change

      Guided Implementations
      • Build the project team and define their roles and responsibilities, then identify key stakeholders and formulate an engagement plan
      • Develop an executive visioning session plan to formulate and get buy-in for the goals and vision of the consolidation
      • Use diagnostics results and the service desk assessment tool to evaluate the maturity and environment of each service desk
      • Define the target state of the consolidated service desk in detail
      • Identify requirements for the consolidation, broken down by people, process, technology and by short- vs. long-term needs
      • Plan the logistics of the consolidation for process, technology, and facilities, and evaluate the cost and cost savings of consolidation with a TCO tool
      • Identify specific initiatives for the consolidation project and evaluate the risks and dependencies for each, then plot initiatives on a detailed project roadmap
      • Brainstorm potential objections and questions and develop a communications plan with targeted messaging for each stakeholder group
      Onsite Workshop

      Module 1: Engage stakeholders to develop a vision for the service desk

      Module 2: Conduct a full assessment of each service desk

      Module 3: Design target consolidated service desk Module 4: Plan for the transition

      Phase 1 Outcomes:

      • Stakeholder engagement and executive buy-in
      • Vision for the consolidation
      • Comprehensive assessment of each service desk’s performance

      Phase 2 Outcomes:

      • Defined requirements, logistics plan, and target state for the consolidated service desk
      • TCO comparison

      Phase 3 Outcomes:

      • Detailed consolidation project roadmap
      • Communications plan and FAQs

      Info-Tech delivers: Use our tools and templates to accelerate your project to completion

      • Service Desk Assessment Tool (Excel)
      • Executive Presentation (PowerPoint)
      • Service Desk Scorecard Comparison Tool (Excel)
      • Service Desk Efficiency Calculator (Excel)
      • Service Desk Consolidation Roadmap (Excel)
      • Service Desk Consolidation TCO Tool (Excel)
      • Communications and Training Plan (Word)
      • Consolidation News Bulletin & FAQ Template (PowerPoint)

      Measured value for Guided Implementations (GIs)

      Engaging in GIs doesn’t just offer valuable project advice, it also results in significant cost savings.

      GI Measured Value
      Phase 1:
      • Time, value, and resources saved by using Info-Tech’s methodology to engage stakeholders, develop a project vision, and assess your current state.
      • For example, 2 FTEs * 10 days * $80,000/year = $6,200
      Phase 2:
      • Time, value, and resources saved by using Info-Tech’s tools and templates to design the consolidated service desk and evaluate cost and logistics.
      • For example, 2 FTEs * 5 days * $80,000/year = $3,100
      Phase 3:
      • Time, value, and resources saved by following Info-Tech’s tools and methodology to build a project roadmap and communications plan.
      • For example, 1 FTE * 5 days * $80,000/year = $1,500
      Total savings $10,800

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Pre-Workshop Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
      Activities

      Module 0: Gather relevant data

      0.1 Conduct CIO Business Vision Survey

      0.2 Conduct End-User Satisfaction Survey

      0.3 Measure Agent Satisfaction

      Module 1: Engage stakeholders to develop a vision for the service desk

      1.1 Identify key stakeholders and develop an engagement plan

      1.2 Brainstorm desired service desk attributes

      1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk

      1.4 Define project goals, principles, and KPIs

      Module 2: Conduct a full assessment of each service desk

      2.1 Review the results of diagnostic programs

      2.2 Map organizational structure and roles for each service desk

      2.3 Assess overall maturity and environment of each service desk

      2.4 Assess current information system environment

      Module 3: Design target consolidated service desk

      3.1 Identify requirements for target consolidated service desk

      3.2 Build requirements document and shortlist for ITSM tool

      3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state

      3.4 Document standardized processes for new service desk

      Module 4: Plan for the transition

      4.1 Plan the logistics of the transition

      4.2 Assess the cost and savings of consolidation to refine business case

      4.3 Identify initiatives and develop a project roadmap

      4.4 Plan communications for each stakeholder group

      Deliverables
      1. CIO Business Vision Survey Diagnostic Results
      2. End-User Satisfaction Survey Diagnostic Results
      1. Stakeholder Engagement Workbook
      2. Executive Presentation
      1. Consolidate Service Desk Assessment Tool
      1. Consolidate Service Desk Scorecard Tool
      2. Consolidated Service Desk SOP
      1. Consolidation TCO Tool
      2. Executive Presentation
      3. Consolidation Roadmap
      4. Communications Plan
      5. News Bulletin & FAQ Template

      Insight breakdown

      Phase 1 Insight

      Don’t get bogged down in the details. A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting and evaluating unnecessary information that will only distract and slow down the project, losing management interest and buy-in.

      How we can help

      Leverage the Consolidate Service Desk Assessment Tool to gather the data you need to evaluate your existing service desks.

      Phase 2 Insight

      Select the target state that is right for your organization. Don’t feel pressured to move to a complete consolidation with a single point of contact if it wouldn’t be compatible with your organization’s needs and abilities, or if it wouldn’t be adopted by your end users. Design an appropriate level of standardization and centralization for the service desk and reinforce and improve processes moving forward.

      How we can help

      Leverage the Consolidate Service Desk Scorecard Tool to analyze the gap between your existing processes and your target state.

      Phase 3 Insight

      Getting people on board is key to the success of the consolidation, and a communication plan is essential to do so. Develop targeted messaging for each stakeholder group, keeping in mind that your end users are just as critical to success as your staff. Know your audience, communicate to them often and openly, and ensure that every communication has a purpose.

      How we can help

      Leverage the Communications Plan and Consolidation News Bulletin & FAQ Template to plan your communications.

      Phase 1

      Develop a Shared Vision

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Develop shared vision

      Proposed Time to Completion (in weeks): 4-8

      Step 1.1: Identify and engage key stakeholders

      Discuss with an analyst:

      • Build the project team and define their roles and responsibilities
      • Identify key stakeholders and formulate an engagement plan

      Then complete these activities…

      • Assign project roles and responsibilities
      • Identify key stakeholders
      • Formalize an engagement plan and conduct interviews

      With these tools & templates:

      Stakeholder Engagement Workbook

      Step 1.2: Develop a vision to give the project direction

      Discuss with an analyst:

      • Develop an executive visioning session plan to formulate and get buy-in for the goals and vision of the consolidation

      Then complete these activities…

      • Host an executive visioning exercise to define the scope and goals of the consolidation

      With these tools & templates:

      Consolidate Service Desk Executive Presentation

      Step 1.3: Conduct a full assessment of each service desk

      Discuss with an analyst:

      • Use diagnostics results and the service desk assessment tool to evaluate the maturity and environment of each service desk
      • Assess agent skills, satisfaction, roles and responsibilities

      Then complete these activities…

      • Analyze organizational structure
      • Assess maturity and environment of each service desk
      • Assess agent skills and satisfaction

      With these tools & templates:

      Consolidate Service Desk Assessment Tool

      IT Skills Inventory and Gap Assessment Tool

      Phase 1 Outcome:

      • A common vision for the consolidation initiative, an analysis of existing service desk architectures, and an inventory of existing best practices.

      Step 1.1: Get buy-in from key stakeholders

      Phase 1

      Develop a shared vision

      1.1 Identify and engage key stakeholders

      1.2 Develop a vision to give the project direction

      1.3 Conduct a full assessment of each service desk

      This step will walk you through the following activities:
      • 1.1.1 Assign roles and responsibilities
      • 1.1.2 Identify key stakeholders for the consolidation
      • 1.1.3 Conduct stakeholder interviews to understand needs in more depth, if necessary
      This step involves the following participants:
      • Project Sponsor
      • CIO or IT Director
      • Project Manager
      • IT Managers and Service Desk Manager(s)
      Step Outcomes:
      • A project team with clearly defined roles and responsibilities
      • A list of key stakeholders and an engagement plan to identify needs and garner support for the change

      Oxford consulted with people at all levels to ensure continuous improvement and new insights

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Motivation

      The merging of Oxford’s disparate IT organizations was motivated primarily to improve end-user service and efficiency.

      Similarly, ITS positioned the SDCP as an “operational change,” not to save costs, but to provide better service to their customers.

      "The University is quite unique in the current climate in that reduction in costs was not one of the key drivers behind the project. The goal was to deliver improved efficiencies and offer a single point of contact for their user base." – Peter Hubbard, ITSM Consultant Pink Elephant

      Development

      Oxford recognized early that they needed an open and collaborative environment to succeed.

      Key IT and business personnel participated in a “vision workshop” to determine long- and short-term objectives, and to decide priorities for the consolidated service desk.

      "Without key support at this stage many projects fail to deliver the expected outcomes. The workshop involved the key stakeholders of the project and was deemed a successful and positive exercise, delivering value to this stage of the project by clarifying the future desired state of the Service Desk." – John Ireland, Director of Customer Service & Project Sponsor

      Deployment

      IT Services introduced a Service Desk Consolidation Project Blog very early into the project, to keep everyone up-to-date and maintain key stakeholder buy-in.

      Constant consultation with people at all levels led to continuous improvement and new insights.

      "We also became aware that staff are facing different changes depending on the nature of their work and which toolset they use (i.e. RT, Altiris, ITSM). Everyone will have to change the way they do things at least a little – but the changes depend on where you are starting from!" – Jonathan Marks, Project Manager

      Understand and validate the consolidation before embarking on the project

      Define what consolidation would mean in the context of your organization to help validate and frame the scope of the project before proceeding.

      What is service desk consolidation?

      Service desk consolidation means combining multiple service desks into one centralized, single point of contact.

      • Physical consolidation = personnel and assets are combined into a single location
      • Virtual consolidation = service desks are combined electronically

      Consolidation must include people, process, and technology:

      1. Consolidation of some or all staff into one location
      2. Consolidation of processes into a single set of standardized processes
      3. One consolidated technology platform or ITSM tool

      Consolidation can take the form of:

      1. Merging multiple desks into one
      2. Collapsing multiple desks into one
      3. Connecting multiple desks into a virtual desk
      4. Moving all desks to one connected platform

      Service Desk 1 - Service Desk 2 - Service Desk 3

      Consolidated Service Desk

      Info-Tech Insight

      Consolidation isn’t for everyone.

      Before you embark on the project, think about unique requirements for your organization that may necessitate more than one service desk, such as location-specific language. Ask yourself if consolidation makes sense for your organization and would achieve a benefit for the organization, before proceeding.

      1.1 Organize and build the project team to launch the project

      Solidify strong support for the consolidation and get the right individuals involved from the beginning to give the project the commitment and direction it requires.

      Project Sponsor
      • Has direct accountability to the executive team and provides leadership to the project team.
      • Legitimatizes the consolidation and provides necessary resources to implement the project.
      • Is credible, enthusiastic, and understands the organization’s culture and values.
      Steering Committee
      • Oversees the effort.
      • Ensures there is proper support from the organization and provides resources where required.
      • Resolves any conflicts.
      Core Project Team
      • Full-time employees drawn from roles that are critical to the service desk, and who would have a strong understanding of the consolidation goals and requirements.
      • Ideal size: 6-10 full-time employees.
      • May include roles defined in the next section.

      Involve the right people to drive and facilitate the consolidation

      Service desk consolidations require broad support and capabilities beyond only those affected in order to deal with unforeseen risks and barriers.

      • Project manager: Has primary accountability for the success of the consolidation project.
      • Senior executive project sponsor: Needed to “open doors” and signal organization’s commitment to the consolidation.
      • Technology SMEs and architects: Responsible for determining and communicating requirements and risks of the technology being implemented or changed, especially the ITSM tool.
      • Business unit leads: Responsible for identifying and communicating impact on business functions, approving changes, and helping champion change.
      • Product/process owners: Responsible for identifying and communicating impact on business functions, approving changes, and helping champion change.
      • HR specialists: Most valuable when roles and organizational design are affected, i.e. the consolidation requires staff redeployment or substantial training (not just using a new system or tool but acquiring new skills and responsibilities) or termination.
      • Training specialists: If you have full-time training staff in the organization, you will eventually need them to develop training courses and material. Consulting them early will help with scoping, scheduling, and identifying the best resources and channels to deliver the training.
      • Communications specialists (internal): Valuable in crafting communications plan, required if communications function owns internal communications.

      Use a RACI table (e.g. in the following section) to clarify who is to be accountable, responsible, consulted, and informed.

      Info-Tech Insight

      The more transformational the change, the more it will affect the organizational chart – not just after the implementation but through the transition.

      Take time early in the project to define the reporting structure for the project/transition team, as well as any teams and roles supporting the transition.

      Assign roles and responsibilities

      1.1.1 Use a RACI chart to assign overarching project responsibilities

      Participants
      • Project Sponsor
      • IT Director, CIO
      • Project Manager
      • IT Managers and Service Desk Manager(s)
      What You'll Need
      • RACI chart

      RACI = Responsible, Accountable, Consulted, Informed

      The RACI chart will provide clarity for overarching roles and responsibilities during the consolidation.

      1. Confirm and modify the columns to match the stakeholders in your organization.
      2. Confirm and modify the roles listed as rows if there are obvious gaps or opportunities to consolidate rows.
      3. Carefully analyze and document the roles as a group.
      Task Project Sponsor Project Manager Sr. Executives SMEs Business Lead Service Desk Managers HR Trainers Communications
      Meeting project objectives A R A R R
      Identifying risks and opportunities R A A C C C C I I
      Assessing current state I A I R C R
      Defining target state I A I C C R
      Planning logistics I A I R R C R
      Building the action plan I A C R R R R R R
      Planning and delivering communications I A C C C C R R A
      Planning and delivering training I A C C C C R R C
      Gathering and analyzing feedback and KPIs I A C C C C C R R

      Identify key stakeholders to gather input from the business, get buy-in for the project, and plan communications

      Identify the key stakeholders for the consolidation to identify the impact consolidation will have on them and ensure their concerns don’t get lost.

      1. Use a stakeholder analysis to identify the people that can help ensure the success of your project.
      2. Identify an Executive Sponsor
        • A senior-level project sponsor is someone who will champion the consolidation project and help sell the concept to other stakeholders. They can also ensure that necessary financial and human resources will be made available to help secure the success of the project. This leader should be someone who is credible, tactful, and accessible, and one who will not only confirm the project direction but also advocate for the project.

      Why is a stakeholder analysis essential?

      • Ignoring key stakeholders is an important cause of failed consolidations.
      • You can use the opinions of the most influential stakeholders to shape the project at an early stage.
      • Their support will secure resources for the project and improve the quality of the consolidation.
      • Communicating with key stakeholders early and often will ensure they fully understand the benefits of your project.
      • You can anticipate the reaction of key stakeholders to your project and plan steps to win their support.

      Info-Tech Insight

      Be diverse and aware. When identifying key stakeholders for the project, make sure to include a rich diversity of stakeholder expertise, geography, and tactics. Also, step back and add silent members to your list. The loudest voices and heaviest campaigners are not necessarily your key stakeholders.

      Identify key stakeholders for the consolidation

      1.1.2 Identify project stakeholders, particularly project champions

      Participants
      • CIO/IT Director
      • Project Sponsor
      • Project Manager
      • IT Managers
      What You’ll Need
      • Whiteboard or flip chart and markers

      Goal: Create a prioritized list of people who are affected or can affect your project so you can plan stakeholder engagement and communication.

      • Use an influence/commitment matrix to determine where your stakeholders lie.
      • High influence, high commitment individuals should be used in conjunction with your efforts to help bring others on board. Identify these individuals and engage with them immediately.
      • Beware of the high influence, low commitment individuals. They should be the first priority for engagement.
      • High commitment, low influence individuals can be used to help influence the low influence, low commitment individuals. Designate a few of these individuals as “champions” to help drive engagement on the front lines.

      Outcome: A list of key stakeholders to include on your steering committee and your project team, and to communicate with throughout the project.

      The image is a matrix, with Influence on the Y-axis and Commitment to change on the X-axis. It is a blank template.

      Overcome the value gap by gathering stakeholder concerns

      Simply identifying and engaging your stakeholders is not enough. There needs to be feedback: talk to your end users to ensure their concerns are heard and determine the impact that consolidation will have on them. Otherwise, you risk leaving value on the table.

      • Talk to the business end users who will be supported by the consolidated service desk.
      • What are their concerns about consolidation?
      • Which functions and services are most important to them? You need to make sure these won't get lost.
      • Try to determine what impact consolidation will have on them.

      According to the Project Management Institute, only 25% of individuals fully commit to change. The remaining 75% either resist or simply accept the change. Gathering stakeholder concerns is a powerful way to gain buy-in.

      The image is a graph with Business Value on the Y-Axis and Time on the X-Axis. Inside the graph, there is a line moving horizontally, separated into segments: Installation, Implementation, and Target Value. The line inclines during the first two segments, and is flat during the last. Emerging from the space between Installation and Implementation is a second line marked Actual realized value. The space between the target value line and the actual realized value line is labelled: Value gap.

      Collect relevant quantitative and qualitative data to assess key stakeholders’ perceptions of IT across the organization

      Don’t base your consolidation on a hunch. Gather reliable data to assess the current state of IT.

      Solicit direct feedback from the organization to gain critical insights into their perceptions of IT.

      • CIO Business Vision: Understanding the needs of your stakeholders is the first and most important step in building a consolidation strategy. Use the results of this survey to assess the satisfaction and importance of different IT services.
      • End-User Satisfaction: Solicit targeted department feedback on core IT service capabilities, IT communications, and business enablement. Use the results to assess the satisfaction of end users with each service broken down by department and seniority level.

      We recommend completing at least the End-User Satisfaction survey as part of your service desk consolidation assessment and planning. An analyst will help you set up the diagnostic and walk through the report with you.

      To book a diagnostic, or get a copy of our questions to inform your own survey, visit Info-Tech’s Benchmarking Tools, contact your account manager, or call toll-free 1-888-670-8889 (US) or 1-844-618-3192 (CAN).

      Data-Driven Diagnostics:

      End-User Satisfaction Survey

      CIO Business Vision

      Review the results of your diagnostics in step 1.3

      Formalize an engagement plan to cultivate support for the change from key stakeholders

      Use Info-Tech’s Stakeholder Engagement Workbook to formalize an engagement strategy

      If a more formal engagement plan is required for this project, use Info-Tech’s Stakeholder Engagement Workbook to document an engagement strategy to ensure buy-in for the consolidation.

      The engagement plan is a structured and documented approach for gathering requirements by eliciting input and validating plans for change and cultivating sponsorship and support from key stakeholders early in the project lifecycle.

      The Stakeholder Engagement Workbook situates stakeholders on a grid that identifies which ones have the most interest in and influence on your project, to assist you in developing a tailored engagement strategy.

      You can also use this analysis to help develop a communications plan for each type of stakeholder in step 3.2.

      Conduct stakeholder interviews to understand needs in more depth, if necessary

      1.1.3 Interview key stakeholders to identify needs

      • If the consolidation will be a large and complex project and there is a need to understand requirements in more depth, conduct stakeholder interviews with “high-value targets” who can help generate requirements and promote communication around requirements at a later point.
      • Choose the interview method that is most appropriate based on available resources.
      Method Description Assessment and Best Practices Stakeholder Effort Business Analyst Effort
      Structured One-on-One Interview In a structured one-on-one interview, the business analyst has a fixed list of questions to ask the stakeholder and follows up where necessary. Structured interviews provide the opportunity to quickly hone in on areas of concern that were identified during process mapping or group elicitation techniques. They should be employed with purpose – to receive specific stakeholder feedback on proposed requirements or help identify systemic constraints. Generally speaking, they should be 30 minutes or less. Low

      Medium

      Unstructured One-on-One Interview In an unstructured one-on-one interview, the business analyst allows the conversation to flow freely. The BA may have broad themes to touch on, but does not run down a specific question list. Unstructured interviews are most useful for initial elicitation, when brainstorming a draft list of potential requirements is paramount. Unstructured interviews work best with senior stakeholders (sponsors or power users), since they can be time consuming if they’re applied to a large sample size. It’s important for BAs not to stifle open dialog and allow the participants to speak openly. They should be 60 minutes or less. Medium Low

      Step 1.2: Develop a vision to give the project direction

      Phase 1

      Develop a shared vision

      1.1 Get buy-in from key stakeholders

      1.2 Develop a vision to give the project direction

      1.3 Conduct a full assessment of each service desk

      This step will walk you through the following activities:
      • 1.2.1 Brainstorm desired attributes for the consolidated service desk to start formulating a vision
      • 1.2.2 Develop a compelling vision and story of change
      • 1.2.3 Create a vision for the consolidated service desk
      • 1.2.4 Identify the purpose, goals, and guiding principles of the consolidation project
      • 1.2.5 Identify anticipated benefits and associated KPIs
      • 1.2.6 Conduct a SWOT analysis on the business
      This step involves the following participants:
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Business Executives
      Step outcomes

      A shared vision for the consolidated service desk that:

      • Defines the scope of the consolidation
      • Encompasses the goals and guiding principles of the project
      • Identifies key attributes of the consolidated service desk and anticipated benefits it will bring
      • Is documented in an executive presentation

      Hold an executive visioning session to kick off the project

      A major change such as service desk consolidation requires a compelling vision to engage staff and motivate them to comprehend and support the change.

      After identifying key stakeholders, gather them in a visioning session or workshop to establish a clear direction for the project.

      An executive visioning session can take up to two days of focused effort and activities with the purpose of defining the short and long-term view, objectives, and priorities for the new consolidated service desk.

      The session should include the following participants:

      • Key stakeholders identified in step 1.1, including:
        • IT management and CIO
        • Project sponsor
        • Business executives interested in the project

      The session should include the following tasks:

      • Identify and prioritize the desired outcome for the project
      • Detail the scope and definition of the consolidation
      • Identify and assess key problems and opportunities
      • Surface and challenge project assumptions
      • Clarify the future desired state of the service desk
      • Determine how processes, functions, and systems are to be included in a consolidation analysis
      • Establish a degree of ownership by senior management

      The activities throughout this step are designed to be included as part of the visioning session

      Choose the attributes of your desired consolidated service desk

      Understand what a model consolidated service desk should look like before envisioning your target consolidated service desk.

      A consolidated service desk should include the following aspects:

      • Handles all customer contacts – including internal and external users – across all locations and business units
      • Provides a single point of contact for end users to submit requests for help
      • Handles both incidents and service requests, as well as any additional relevant ITIL modules such as problem, change, or asset management
      • Consistent, standardized processes and workflows
      • Single ITSM tool with workflows for ticket handling, prioritization, and escalations
      • Central data repository so that staff have access to all information needed to resolve issues quickly and deliver high-quality service, including:
        • IT infrastructure information (such as assets and support contracts)
        • End-user information (including central AD, assets and products owned, and prior interactions)
        • Knowledgebase containing known resolutions and workarounds

      Consolidated Service Desk

      • Service Desk 1
      • Service Desk 2
      • Service Desk 3
      • Consolidated staff
      • Consolidated ITSM tool
      • Consolidated data repository

      Brainstorm desired attributes for the consolidated service desk to start formulating a vision

      1.2.1 Identify the type of consolidation and desired service desk attributes

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Other interested business executives
      What You'll Need
      • Whiteboard or flip chart and markers
      Document

      Document in the Consolidate Service Desk Executive Presentation, slide 6.

      Brainstorm the model and attributes of the target consolidated service desk. You will use this to formulate a vision and define more specific requirements later on.
      1. Identify the type of consolidation: virtual, physical, or hybrid (both)
      2. Identify the level of consolidation: partial (some service desks consolidated) or complete (all service desks consolidated)
      Consolidated Service Desk Model Level of Consolidation
      Partial Complete
      Type of Consolidation Virtual
      Physical
      Hybrid

      3. As a group, brainstorm and document a list of attributes that the consolidated service desk should have.

      Examples:

      • Single point of contact for all users
      • One ITSM tool with consistent built-in automated workflows
      • Well-developed knowledgebase
      • Self-serve portal for end users with ability to submit and track tickets
      • Service catalog

      Develop a compelling vision and story of change

      1.2.2 Use a vision table to begin crafting the consolidation vision

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Other interested business executives
      What You'll Need
      • Whiteboard or flip chart and markers
      Document

      Document in the Consolidate Service Desk Executive Presentation, slide 7.

      Build desire for change.

      In addition to standard high-level scope elements, consolidation projects that require organizational change also need a compelling story or vision to influence groups of stakeholders.

      Use the vision table below to begin developing a compelling vision and story of change.

      Why is there a need to consolidate service desks?
      How will consolidation benefit the organization? The stakeholders?
      How did we determine this is the right change?
      What would happen if we didn’t consolidate?
      How will we measure success?

      Develop a vision to inspire and sustain leadership and commitment

      Vision can be powerful but is difficult to craft. As a result, vision statements often end up being ineffective (but harmless) platitudes.

      A service desk consolidation project requires a compelling vision to energize staff and stakeholders toward a unified goal over a sustained period of time.

      Great visions:

      • Tell a story. They describe a journey with a beginning (who we are and how we got here) and a destination (our goals and expected success in the future).
      • Convey an intuitive sense of direction (or “spirit of change”) that helps people act appropriately without being explicitly told what to do.
      • Appeal to both emotion and reason to make people want to be part of the change.
      • Balance abstract ideas with concrete facts. Without concrete images and facts, the vision will be meaninglessly vague. Without abstract ideas and principles, the vision will lack power to unite people and inspire broad support.
      • Are concise enough to be easy to communicate and remember in any situation.

      Info-Tech Insight

      Tell a story. Stories pack a lot of information into few words. They are easy to write, remember, and most importantly – share. It’s worth spending a little extra time to get the details right.

      Create a vision for the consolidated service desk

      1.2.3 Tell a story to describe the consolidated service desk vision

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      What You'll Need
      • Whiteboard or flip chart and markers
      • Document in the Executive Presentation, slide 8.

      Craft a vision of the future state of the service desk.

      Tell a story.

      Stories serve to give the consolidation real-world context by describing what the future state will mean for both staff and users of the service desk. The story should sum up the core of the experience of using the consolidated service desk and reflect how the service desk will fit into the life of the user.

      Stories should include:

      • Action describing the way things happen.
      • Contextual detail that helps readers relate to the person in the story.
      • Challenging ideas that contradict common belief and may be disruptive, but help suggest new directions.
      Example:

      Imagine if…

      … users could access one single online service that allows them to submit a ticket through a self-service portal and service catalog, view the status of their ticket, and receive updates about organization-wide outages and announcements. They never have to guess who to contact for help with a particular type of issue or how to contact them as there is only one point of contact for all types of incidents and service requests.

      … all users receive consistent service delivery regardless of their location, and never try to circumvent the help desk or go straight to a particular technician for help as there is only one way to get help by submitting a ticket through a single service desk.

      … tickets from any location could be easily tracked, prioritized, and escalated using standardized definitions and workflows to ensure consistent service delivery and allow for one set of SLAs to be defined and met across the organization.

      Discuss the drivers of the consolidation to identify the goals the project must achieve

      Identifying the reasons behind the consolidation will help formulate the vision for the consolidated service desk and the goals it should achieve.

      The image is a graph, titled Deployment Drivers for Those Planning a Consolidated Service Desk. From highest to lowest, they are: Improved Service Delivery/Increased Productivity; Drive on Operational Costs; and Perceived Best Practice.

      Service Desk Institute (n = 20, 2007)

      A survey of 233 service desks considering consolidation found that of the 20 organizations that were in the planning stages of consolidation, the biggest driver was to improve service delivery and/or increase productivity.

      This is in line with the recommendation that improved service quality should be the main consolidation driver over reducing costs.

      This image is a graph titled Drivers Among Those Who Have Implemented a Consolidated Service Desk. From highest to lowest, they are: Improved Service Delivery/Increased Productivity; Best Practice; Drive on Operational Costs; Internal vs Outsourcing; and Legacy.

      Service Desk Institute (n = 43, 2007)

      The drivers were similar among the 43 organizations that had already implemented a consolidated service desk, with improved service delivery and increased productivity again the primary driver.

      Aligning with best practice was the second most cited driver.

      Identify the purpose, goals, and guiding principles of the consolidation project

      1.2.4 Document goals of the project

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      What You'll Need
      • Whiteboard or flip chart and markers
      • Document in the Executive Presentation, slide 9.

      Use the results of your stakeholder analysis and interviews to facilitate a discussion among recommended participants and document the purpose of the consolidation project, the goals the project aims to achieve, and the guiding principles that must be followed.

      Use the following example to guide your discussion:

      Purpose The purpose of consolidating service desks is to improve service delivery to end users and free up more time and resources to achieve the organization’s core mission.
      Goals
      • Align IT resources with business strategies and priorities
      • Provide uniform quality and consistent levels of service across all locations
      • Improve the end-user experience by reducing confusion about where to get help
      • Standardize service desk processes to create efficiencies
      • Identify and eliminate redundant functions or processes
      • Combine existing resources to create economies of scale
      • Improve organizational structure, realign staff with appropriate job duties, and improve career paths
      Guiding Principles

      The consolidated service desk must:

      1. Provide benefit to the organization without interfering with the core mission of the business
      2. Balance cost savings with service quality
      3. Increase service efficiency without sacrificing service quality
      4. Not interfere with service delivery or the experience of end users
      5. Be designed with input from key stakeholders

      Identify the anticipated benefits of the consolidation to weigh them against risks and plan future communications

      The primary driver for consolidation of service desks is improved service delivery and increased productivity. This should relate to the primary benefits delivered by the consolidation, most importantly, improved end-user satisfaction.

      A survey of 43 organizations that have implemented a consolidated service desk identified the key benefits delivered by the consolidation (see chart at right).

      The image is a bar graph titled Benefits Delivered by Consolidated Service Desk. The benefits, from highest to lowest are: Increased Customer Satisfaction; Optimised Resourcing; Cost Reduction; Increased Productivity/Revenue; Team Visibility/Ownership; Reporting/Accountability.

      Source: Service Desk Institute (n = 43, 2007)

      Info-Tech Insight

      Cost reduction may be an important benefit delivered by the consolidation effort, but it should not be the most valuable benefit delivered. Focus communications on anticipated benefits for improved service delivery and end-user satisfaction to gain buy-in for the project.

      Identify anticipated outcomes and benefits of consolidation

      1.2.5 Use a “stop, start, continue” exercise to identify KPIs

      What You'll Need
      • Whiteboard or flip chart and markers
      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      Document

      Document in the Executive Presentation, slide 10

      1. Divide the whiteboard into 3 columns: stop, start, and continue
      2. Identify components of your service desk that:
      • Are problematic and should be phased out (stop)
      • Provide value but are not in place yet (start)
      • Are effective and should be sustained, if not improved (continue)
    • For each category, identify initiatives or outcomes that will support the desired goals and anticipated benefits of consolidation.
    • Stop Start Continue
      • Escalating incidents without following proper protocol
      • Allowing shoulder taps
      • Focusing solely on FCR as a measure of success
      • Producing monthly ticket trend reports
      • Creating a self-serve portal
      • Communicating performance to the business
      • Writing knowledgebase articles
      • Improving average TTR
      • Holding weekly meetings with team members

      Use a SWOT analysis to assess the service desk

      • A SWOT analysis is a structured planning method that organizations can use to evaluate the strengths, weaknesses, opportunities, and threats involved in a project or business venture.
      • Use a SWOT analysis to identify the organization’s current IT capabilities and classify potential disruptive technologies as the first step toward preparing for them.
      Review these questions...
      Strengths (Internal) Weaknesses (Internal)
      • What Service Desk processes provide value?
      • How does the Service Desk align with corporate/IT strategy?
      • How does your Service Desk benefit end users?
      • Does the Service Desk produce reports or data that benefit the business?
      • Does your Service Desk culture offer an advantage?
      • What areas of your service desk require improvement?
      • Are there gaps in capabilities?
      • Do you have budgetary limitations?
      • Are there leadership gaps (succession, poor management, etc.)?
      • Are there reputational issues with the business?
      Opportunities (External) Threats (External)
      • Are end users adopting hardware or software that requires training and education for either themselves or the Service Desk staff?
      • Can efficiencies be gained by consolidating our Service Desks?
      • What is the most cost-effective way to solve the user's technology problems and get them back to work?
      • How can we automate Service Desk processes?
      • Are there obstacles that the Service Desk must face?
      • Are there issues with respect to sourcing of staff or technologies?
      • Could the existing Service Desk metrics be affected?
      • Will the management team need changes to their reporting?
      • Will SLAs need to be adjusted?

      …to help you conduct your SWOT analysis on the service desk.

      Strengths (Internal) Weaknesses (Internal)
      • End user satisfaction >80%
      • Comprehensive knowledgebase
      • Clearly defined tiers
      • TTR on tickets is <1 day
      • No defined critical incident workflow
      • High cost to solve issues
      • Separate toolsets create disjointed data
      • No root cause analysis
      • Ineffective demand planning
      • No clear ticket categories
      Opportunities (External) Threats (External)
      • Service catalog
      • Ticket Templates
      • Ticket trend analysis
      • Single POC through the use of one tool
      • Low stakeholder buy-in
      • Fear over potential job loss
      • Logistics of the move
      • End user alienation over process change

      Conduct a SWOT analysis on the business

      1.2.6 Conduct SWOT analysis

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      What You'll Need
      • Whiteboard or flip chart and markers
      Document
      • Document in the Executive Presentation, slide 11
      1. Break the group into two teams:
      • Assign team A strengths and weaknesses.
      • Assign team B opportunities and threats.
    • Have the teams brainstorm items that fit in their assigned areas.
      • Refer to the questions on the previous slide to help guide discussion
    • Choose someone from each group to fill in the grid on the whiteboard.
    • Conduct a group discussion about the items on the list.
    • Helpful to achieving the objective Harmful to achieving the objective
      Internal origin attributes of the organization Strengths Weaknesses

      External Origin attributes of the environment

      Opportunities Threats

      Frame your project in terms of people, process, technology

      A framework should be used to guide the consolidation effort and provide a standardized basis of comparison between the current and target state.

      Frame the project in terms of the change and impact it will have on:

      • People
      • Process
      • Technology

      Service desk consolidation will likely have a significant impact in all three categories by standardizing processes, implementing a single service management tool, and reallocating resources. Framing the project in this way will ensure that no aspect goes forgotten.

      For each of the three categories, you will identify:

      • Current state
      • Target state
      • Gap and actions required
      • Impact, risks, and benefits
      • Communication and training requirements
      • How to measure progress/success

      People

      • Tier 1 support
      • Tier 2 support
      • Tier 3 support
      • Vendors

      Process

      • Incident management
      • Service request management
      • SLAs

      Technology

      • ITSM tools
      • Knowledgebase
      • CMDB and other databases
      • Technology supported

      Complete the Consolidate Service Desk Executive Presentation

      Complete an executive presentation using the decisions made throughout this step

      Use the Consolidate Service Desk Executive Presentation to deliver the outputs of your project planning to the business and gain buy-in for the project.

      1. Use the results of the activities throughout step 1.2 to produce the key takeaways for your executive presentation.
      2. At the end of the presentation, include 1-2 slides summarizing any additional information specific to your organization.
      3. Once complete, pitch the consolidation project to the project sponsor and executive stakeholders.
        • This presentation needs to cement buy-in for the project before any other progress is made.

      Step 1.3: Conduct a full assessment of each service desk

      Phase 1

      Develop a shared vision

      1.1 Get buy-in from key stakeholders

      1.2 Develop a vision to give the project direction

      1.3 Conduct a full assessment of each service desk

      This step will walk you through the following activities:
      • 1.3.1 Review the results of your diagnostic programs
      • 1.3.2 Analyze the organizational structure of each service desk
      • 1.3.3 Assess the overall maturity of each service desk
      • 1.3.4 Map out roles and responsibilities of each service desk using organizational charts
      • 1.3.5 Assess and document current information system environment
      This step involves the following participants:
      • CIO
      • IT Directors
      • Service Desk Managers
      • Service Desk Technicians
      Step outcomes
      • A robust current state assessment of each service desk, including overall maturity, processes, organizational structure, agent skills, roles and responsibilities, agent satisfaction, technology and ITSM tools.

      Oxford saved time and effort by sticking with a tested process that works

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Oxford ITS instigated the service desk consolidation project in the fall of 2012.

      A new ITSM solution was formally acquired in the spring 2014, and amalgamated workflows designed.

      Throughout this period, at least 3 detailed process analyses occurred in close consultation with the affected IT units.

      Responsibility for understanding each existing process (incident, services, change management, etc.) were assigned to members of the project team.

      They determined which of the existing processes were most effective, and these served as the baseline – saving time and effort in the long run by sticking with tested processes that work.

      Reach out early and often.

      Almost from day one, the Oxford consolidation team made sure to consult closely with each relevant ITS team about their processes and the tools they used to manage their workflows.

      This was done both in structured interviews during the visioning stage and informally at periodic points throughout the project.

      The result was the discovery of many underlying similarities. This information was then instrumental to determining a realistic baseline from which to design the new consolidated service desk.

      "We may give our activities different names or use different tools to manage our work but in all cases common sense has prevailed and it’s perhaps not so surprising that we have common challenges that we choose to tackle in similar ways." – Andrew Goff, Change Management at Oxford ITS

      Review the results of your diagnostic programs to inform your current state assessment

      1.3.1 Understand satisfaction with the service desk

      Participants
      • CIO/IT Director
      • IT Manager
      • Service Manager(s)
      Document
      1. Set up an analyst call through your account manager to review the results of your diagnostic.
      • Whatever survey you choose, ask the analyst to review the data and comments concerning:
        • Assessments of service desk timeliness/effectiveness
        • IT business enablement
        • IT innovation leadership
    • Book a meeting with recommended participants. Go over the results of your diagnostic survey.
    • Facilitate a discussion of the results. Focus on the first few summary slides and the overall department results slide.
      • What is the level of IT support?
      • What are stakeholders’ perceptions of IT performance?
      • How satisfied are stakeholders with IT?
      • Does the department understand and act on business needs?
      • What are the business priorities and how well are you doing in meeting these priorities?
      • How can the consolidation project assist the business in achieving goals?
      • How could the consolidation improve end-user satisfaction and business satisfaction?
    • A robust current state assessment is the foundation of a successful consolidation

      You can’t determine where you’re going without a clear idea of where you are now.

      Before you begin planning for the consolidation, make sure you have a clear picture of the magnitude of what you plan on consolidating.

      Evaluate the current state of each help desk being considered for consolidation. This should include an inventory of:

      • Process:
        • Processes and workflows
        • Metrics and SLAs
      • People:
        • Organizational structure
        • Agent workload and skills
        • Facility layout and design
      • Technology:
        • Technologies and end users supported
        • Technologies and tools used by the service desk

      Info-Tech Insight

      A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting unnecessary information that will only distract and slow down the project.

      Review ticket handling processes for each service desk to identify best practices

      Use documentation, reports, and metrics to evaluate existing processes followed by each service desk before working toward standardized processes.

      Poor Processes vs. Optimized Processes

      Inconsistent or poor processes affect the business through:

      • Low business satisfaction
      • Low end-user satisfaction
      • High cost to resolve
      • Delayed progress on project work
      • Lack of data for reporting due to ineffective ticket categorization, tools, and logged tickets
      • No root cause analysis leads to a reactive vs. proactive service desk
      • Lack of cross-training and knowledge sharing result in time wasted troubleshooting recurring issues
      • Lack of trend analysis limits the effectiveness of demand planning

      Standardized service desk processes increase user and technician satisfaction and lower costs to support through:

      • Improved business satisfaction Improved end-user satisfaction Incidents prioritized and escalated accurately and efficiently
      • Decreased recurring issues due to root cause analysis and trends
      • Increased self-sufficiency of end users
      • Strengthened team and consistent delivery through cross-training and knowledge sharing
      • Enhanced demand planning through trend analysis and reporting

      The image is a graphic of a pyramid, with categories as follows (from bottom): FAQ/Knowledgebase; Users; Tier 1-75-80%; Tier 2-15%; Tier 3 - 5%. On the right side of the pyramid is written Resolution, with arrows extending from each of the higher sections down to Users. On the left is written Escalation, with arrows from each lower category up to the next highest. Inside the pyramid are arrows extending from the bottom to each level and vice versa.

      Analyze the organizational structure of each service desk

      1.3.2 Discuss the structure of each service desk

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Consolidate Service Desk Assessment Tool

      1. Facilitate a discussion among recommended participants to discuss the structure of each service desk. Decide which model best describes each service desk:

      • The Gatekeeper Model: All calls are routed through a central call group whose sole responsibility is to link the customer to the right individual or group.
      • The Call Sorting Model: All calls are sorted into categories using technology and forwarded to the right 2nd level specialist group.
      • Tiered Structure (Specialist Model): All calls are sorted through a single specialist group, such as desktop support. Their job is to log the interaction, attempt resolution, and escalate when the problem is beyond their ability to resolve.
      • Tiered Structure (Generalist Model): All calls are sorted through a single generalist group, whose responsibility is to log the interaction, attempt a first resolution, and escalate when the problem is beyond their ability to resolve.

      2. Use a flip chart or whiteboard to draw the architecture of each service desk, using the example on the right as a guide.

      The image is a graphic depicting the organizational structure of a service desk, from Users to Vendor. The graphic shows how a user request can move through tiers of service, and the ways that Tiers 2 and 3 of the service desk are broken down into areas of specialization.

      Assess the current state of each service desk using the Consolidate Service Desk Assessment Tool

      Assess the current state of each service desk

      The Consolidate Service Desk Assessment Tool will provide insight into the overall health of each existing service desk along two vectors:

      1. Process Maturity (calculated on the basis of a comprehensive survey)
      2. Metrics (calculated on the basis of entered ticket and demographic data)

      Together these answers offer a snapshot of the health, efficiency, performance, and perceived value of each service desk under evaluation.

      This tool will assist you through the current state assessment process, which should follow these steps:

      1. Send a copy of this tool to the Service Desk Manager (or other designated party) of each service desk that may be considered as part of the consolidation effort.
        • This will collect key metrics and landscape data and assess process maturity
      2. Analyze the data and discuss as a group
      3. Ask follow-up questions
      4. Use the information to compare the health of each service desk using the scorecard tool

      These activities will be described in more detail throughout this step of the project.

      Gather relevant data to assess the environment of each service desk

      Assess each service desk’s environment using the assessment tool

      Send a copy of the Consolidate Service Desk Assessment Tool to the Service Desk Manager (or other designated party) of each service desk that will be considered as part of the consolidation.

      Instruct them to complete tab 2 of the tool, the Environment Survey:

      • Enter Profile, Demographic, Satisfaction, Technology, and Ticket data into the appropriate fields as accurately as possible. Satisfaction data should be entered as percentages.
      • Notes can be entered next to each field to indicate the source of the data, to note missing or inaccurate data, or to explain odd or otherwise confusing data.

      This assessment will provide an overview of key metrics to assess the performance of each service desk, including:

      • Service desk staffing for each tier
      • Average ticket volume and distribution per month
      • # staff in IT
      • # service desk staff
      • # supported devices (PC, laptops, mobiles, etc.)
      • # desktop images

      Assess the overall maturity of each service desk

      1.3.3 Use the assessment tool to measure the maturity of each service desk

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Consolidate Service Desk Assessment Tool
      1. Assemble the relevant team for each service desk: process owners, functional managers, service desk manager, and relevant staff and technicians who work with the processes to be assessed. Each service desk team should meet to complete the maturity assessment together as a group.
      2. Go to tab 3 (Service Desk Maturity Survey) of the Consolidate Service Desk Assessment Tool and respond to the questions in the following categories:
      • Prerequisites (general questions)
      • People
      • Process
      • Technology
      • SLAs
    • Rate each element. Be honest. The goal is to end up with as close a representation as possible to what really exists. Only then can you identify realistic improvement opportunities. Use the maturity definitions as guides.
    • Evaluate resource utilization and satisfaction to allocate resources effectively

      Include people as part of your current state assessment to evaluate whether your resources are appropriately allocated to maximize effectiveness and agent satisfaction.

      Skills Inventory

      Use the IT Skills Inventory and Gap Assessment Tool to assess agent skills and identify gaps or overlaps.

      Agent Satisfaction

      Measure employee satisfaction and engagement to identify strong teams.

      Roles and Responsibilities

      Gather a clear picture of each service desk’s organizational hierarchy, roles, and responsibilities.

      Agent Utilization

      Obtain a snapshot of service desk productivity by calculating the average amount of time an agent is handling calls, divided by the average amount of time an agent is at work.

      Conduct a skills inventory for each service desk

      Evaluate agent skills across service desks

      After evaluating processes, evaluate the skill sets of the agents tasked with following these processes to identify gaps or overlap.

      Send the Skills Coverage Tool tab to each Service Desk Manager, who will either send it to the individuals who make up their service desk with instructions to rate themselves, or complete the assessment together with individuals as part of one-on-one meetings for discussing development plans.

      IT Skills Inventory and Gap Assessment Tool will enable you to:

      • List skills required to support the organization.
      • Document and rate the skills of the existing IT staffing contingent.
      • Assess the gaps to help determine hiring or training needs, or even where to pare back.
      • Build a strategy for knowledge sharing, transfer, and training through the consolidation project.

      Map out roles and responsibilities of each service desk using organizational charts

      1.3.4 Obtain or draw organizational charts for each location

      Clearly document service desk roles and responsibilities to rationalize service desk architecture.
      Participants
      • CIO, IT Director
      • Service Desk Manager(s)
      • Tier/Specialist Manager(s)
      What You’ll Need
      • Org. charts
      • Flip chart or whiteboard and markers
      1. Obtain or draw (on a whiteboard or flip chart) the organizational chart for each service desk to get a clear picture of the roles that fulfill each service desk. If there is any uncertainty or disagreement, discuss as a group to come to a resolution.
      2. Discuss the roles and reporting relationships within the service desk and across the organization to establish if/where inefficiencies exist and how these might be addressed through consolidation.
      3. If an up-to-date organizational chart is not in place, use this time to define the organizational structure as-is and consider future state.
      IT Director
      Service Desk Manager
      Tier 1 Help Desk Lead Tier 2 Help Desk Lead Tier 2 Apps Support Lead Tier 3 Specialist Support Lead
      Tier 1 Specialist Name Title Name Title Name Title
      Tier 1 Specialist Name Title Name Title Name Title
      Name Title Name Title Name Title
      Name Title Name Title

      Conduct an agent satisfaction survey to compare employee engagement across locations

      Evaluate agent satisfaction

      End-user satisfaction isn’t the only important satisfaction metric.

      Agent satisfaction forms a key metric within the Consolidate Service Desk Assessment Tool, and it can be evaluated in a variety of ways. Choose the approach that best suits your organization and time restraints for the project.

      Determine agent satisfaction on the basis of a robust (and anonymous) survey of service desk agents. Like the end-user satisfaction score, this measure is ideally computed as a percentage.

      There are several ways to measure agent satisfaction:

      1. If your organization runs an employee engagement survey, use the most recent survey results, separating them by location and converting them to a percentage.
      2. If your organization does not currently measure employee engagement or satisfaction, consider one of Info-Tech and McLean & Company’s two engagement diagnostics:
        • Full Engagement Diagnostic – 81 questions that provide a comprehensive view into your organization's engagement levels
        • McLean & Company’s Pulse Survey – 15 questions designed to give a high-level view of employee engagement
      3. For smaller organizations, a survey may not be feasible or make sense. In this case, consider gathering informal engagement data through one-on-one meetings.
      4. Be sure to discuss and document any reasons for dissatisfaction, including pain points with the current tools or processes.
      Document
      • Document on tab 2 of the Consolidate Service Desk Assessment Tool

      Assess the service management tools supporting your service desks

      Identify the different tools being used to support each service desk in order to assess whether and how they can be consolidated into one service management tool.

      Ideally, your service desks are already on the same ITSM platform, but if not, a comprehensive assessment of current tools is the first step toward a single, consolidated solution.

      Include the following in your tools assessment:

      • All automated ITSM solutions being used to log and track incidents and service requests
      • Any manual or other methods of tracking tickets (e.g. Excel spreadsheets)
      • Configurations and any customizations that have been made to the tools
      • How configuration items are maintained and how mature the configuration management databases (CMDB) are
      • Pricing and licensing agreements for tools
      • Any unique functions or limitations of the tools

      Info-Tech Insight

      Document not only the service management tools that are used but also any of their unique and necessary functions and configurations that users may have come to rely upon, such as remote support, self-serve, or chat support, in order to inform requirements in the next phase.

      Assess the IT environment your service desks support

      Even if you don’t do any formal asset management, take this opportunity for discovery and inventory to gain a complete understanding of your IT environment and the range of devices your service desks support.

      Inventory your IT environment, including:

      User Devices

      • Device counts by category Equipment/resources by user

      Servers

      • Server hardware, CPU, memory
      • Applications residing on servers

      Data centers

      • Including location and setup

      In addition to identifying the range of devices you currently support, assess:

      • Any future devices, hardware, or software that the service desk will need to support (e.g. BYOD, mobile)
      • How well each service desk is currently able to support these devices
      • Any unique or location-specific technology or devices that could limit a consolidation

      Info-Tech Insight

      The capabilities and configuration of your existing infrastructure and applications could limit your consolidation plans. A comprehensive technology assessment of not only the service desk tools but also the range of devices and applications your service desks supports will help you to prepare for any potential limitations or obstacles a consolidated service desk may present.

      Assess and document current information system environment

      1.3.5 Identify specific technology and tool requirements

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Consolidate Service Desk Assessment Tool, tab 2.
      Document

      Document information on number of devices supported and number of desktop images associated with each service desk in the section on “Technology Data” of the Consolidate Service Desk Assessment Tool.

      1. Identify and document the service management tools that are used by each service desk.
      2. For each tool, identify and document any of the following that apply:
      • Integrations
      • Configurations that were made during implementation
      • Customizations that were made during implementation
      • Version, licenses, cost
    • For each service desk, document any location-specific or unique technology requirements or differences that could impact consolidation, including:
      • Devices and technology supported
      • Databases and configuration items
      • Differing applications or hardware needs
    • If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.1 Assign roles and responsibilities

      Use a RACI chart to assign overarching responsibilities for the consolidation project.

      1.3.2 Analyze the organizational structure of each service desk

      Map out the organizational structure and flow of each service desk and discuss the model that best describes each.

      Phase 2

      Design the Consolidated Service Desk

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Design consolidated service desk

      Proposed Time to Completion (in weeks): 2-4

      Step 2.1: Model target consolidated service desk

      Start with an analyst kick-off call:

      • Define the target state of the consolidated service desk in detail
      • Identify requirements for the consolidation, broken down by people, process, technology and by short- vs. long-term needs

      Then complete these activities…

      • Set project metrics to measure success of the consolidation
      • Brainstorm people, process, technology requirements for the service desk
      • Build requirements documents and RFP for a new tool
      • Review results of the scorecard comparison tool

      With these tools & templates:

      Consolidate Service Desk Scorecard Tool

      Step 2.2: Assess logistics and cost of consolidation

      Review findings with analyst:

      • Plan the logistics of the consolidation for process, technology, and facilities
      • Evaluate the cost and cost savings of consolidation using a TCO tool

      Then complete these activities…

      • Plan logistics for process, technology, facilities, and resource allocation
      • Review the results of the Service Desk Efficiency Calculator to refine the business case for the consolidation project

      With these tools & templates:

      Service Desk Efficiency Calculator

      Service Desk Consolidation TCO Comparison Tool

      Phase 2 Results:

      • Detailed requirements and vision for the consolidated service desk, gap analysis of current vs. target state, and an initial analysis of the logistical considerations to achieve target.

      Step 2.1: Model target consolidated state

      Phase 2

      Design consolidation

      2.1 Design target consolidated service desk

      2.2 Assess logistics and cost of consolidation

      This step will walk you through the following activities:
      • 2.1.1 Determine metrics to measure the value of the project
      • 2.1.2 Set targets for each metric to measure progress and success of the consolidation
      • 2.1.3 Brainstorm process requirements for consolidated service desk
      • 2.1.4 Brainstorm people requirements for consolidated service desk
      • 2.1.5 Brainstorm technology requirements for consolidated service desk
      • 2.1.6 Build a requirements document for the service desk tool
      • 2.1.7 Evaluate alternative tools, build a shortlist for RFPs, and arrange web demonstrations or evaluation copies
      • 2.1.8 Set targets for key metrics to identify high performing service desks
      • 2.1.9 Review the results of the scorecard to identify best practices
      This step involves the following participants:
      • CIO
      • IT Director
      • Service Desk Managers
      • Service Desk Technicians
      Step Outcomes
      • A list of people, process, and technology requirements for the new consolidated service desk
      • A clear vision of the target state
      • An analysis of the gaps between existing and target service desks

      Ensure the right people and methods are in place to anticipate implementation hurdles

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      "Since our last update, a review and re-planning exercise has reassessed the project approach, milestones, and time scales. This has highlighted some significant hurdles to transition which needed to be addressed, resulting primarily from the size of the project and the importance to the department of a smooth and well-planned transition to the new processes and toolset." – John Ireland, Director of Customer Service & Project Sponsor

      Initial hurdles led to a partial reorganization of the project in Fall 2014

      Despite careful planning and its ultimate success, Oxford’s consolidation effort still encountered some significant hurdles along the way – deadlines were sometimes missed and important processes overlooked.

      These bumps can be mitigated by building flexibility into your plan:

      • Adopt an Agile methodology – review and revise groups of tasks as the project progresses, rather than waiting until near the end of the project to get approval for the complete implementation.
      • Your Tiger Team or Project Steering Group must include the right people – the project team should not just include senior or high-level management; members of each affected IT group should be consulted, and junior-level employees can provide valuable insight into existing and potential processes and workflows.

      Info-Tech Insight

      Ensure that the project lead is someone conversant in ITSM, so that they are equipped to understand and react to the unique challenges and expectations of a consolidation and can easily communicate with process owners.

      Use the consolidation vision to define the target service desk in more detail

      Use your baseline assessment and your consolidation vision as a guide to figure out exactly where you’re going before planning how to get there.

      With approval for the project established and a clear idea of the current state of each service desk, narrow down the vision for the consolidated service desk into a specific picture of the target state.

      The target state should provide answers to the following types of questions:

      Process:

      • Will there be one set of SLAs across the organization?
      • What are the target SLAs?
      • How will ticket categories be defined?
      • How will users submit and track their tickets?
      • How will tickets be prioritized and escalated?
      • Will a knowledgebase be maintained and accessible by both service desk and end users?

      People:

      • How will staff be reorganized?
      • What will the roles and responsibilities look like?
      • How will tiers be structured?
      • What will the career path look like within the service desk?

      Technology:

      • Will there be one single ITSM tool to support the service desk?
      • Will an existing tool be used or will a new tool be selected?
      • If a new tool is needed, what are the requirements?

      Info-Tech Insight

      Select the target state that is right for your organization. Don’t feel pressured to select the highest target state or a complete consolidation. Instead select the target state that is most compatible with your organization’s current needs and capabilities.

      Determine metrics to measure the value of the project

      2.1.1 Identify KPIs to measure the success of the consolidation

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You’ll Need
      • Whiteboard or flip chart and markers

      Identify three primary categories where the consolidation project is expected to yield benefits to the business. Use the example on the right to guide your discussion.

      Efficiency and effectiveness are standard benefits for this project, but the third category may depend on your organization.

      • Examples include: improved resourcing, security, asset management, strategic alignment, end-user experience, employee experience

      Identify 1-3 key performance indicators (KPIs) associated with each benefit category, which will be used to measure the success of the consolidation project. Ensure that each has a baseline measure that can be reassessed after the consolidation.

      Efficiency

      Streamlined processes to reduce duplication of efforts

      • Reduced IT spend and cost of delivery
      • One ITSM tool Improved reliability of service
      • Improved response time

      Resourcing

      Improved allocation of human and financial resources

      • Improved resource sharing
      • Improved organizational structure of service desk

      Effectiveness

      Service delivery will be more accessible and standardized

      • Improved responsive-ness to incidents and service requests
      • Improved resolution time
      • Single point of contact for end users
      • Improved reporting

      Set targets for each metric to measure progress and success of the consolidation

      2.1.2 Identify specific metrics for each KPI and targets for each

      Participants
      • IT Director
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You’ll Need
      • KPIs from previous step
      • Whiteboard or flip chart and markers
      1. Select one core KPI for each critical success factor, which will be used to measure progress and success of the consolidation effort down the road.
      2. For each KPI, document the average baseline metric the organization is achieving (averaged across all service desks).
      3. Discuss and document a target metric that the project will aim to reach through the single consolidated service desk.
      4. Set a short and long-term target for each metric to encourage continuous improvement. Examples:
      Efficiency
      Business Value KPI Current Metric Short-Term (6 month) Target Long-Term (1 year) Target
      Streamlined processes to reduce duplication of efforts Improved response time 2 hours 1 hour 30 minutes
      Effectiveness
      Business Value KPI Current Metric Short-Term (6 month) Target Long-Term (1 year) Target
      Service delivery will be more accessible and standardized Improved first call resolution (% resolved at Tier 1) 50% 60% 70%

      If poor processes were in place, take the opportunity to start fresh with the consolidation

      If each service desk’s existing processes were subpar, it may be easier to build a new service desk from the basics rather than trying to adapt existing processes.

      You should have these service management essentials in place:

      Service Requests:

      • Standardize process to verify, approve, and fulfill service requests.
      • Assign priority according to business criticality and service agreements.
      • Think about ways to manage service requests to better serve the business long term.

      Incident Management:

      • Set standards to define and record incidents.
      • Define incident response actions and communications.

      Knowledgebase:

      • Define standards for knowledgebase.
      • Introduce creation of knowledgebase articles.
      • Create a knowledge-sharing and cross-training culture.

      Reporting:

      • Select appropriate metrics.
      • Generate relevant insights that shed light on the value that IT creates for the organization.

      The image is a circle comprised of 3 concentric circles. At the centre is a circle labelled Standardized Service Desk. The ring outside of it is split into 4 sections: Incident Management; Service Requests; Structure and Reporting; and Knowledgebase. The outer circle is split into 3 sections: People, Process, Technologies.

      Evaluate how your processes compare with the best practices defined here. If you need further guidance on how to standardize these processes after planning the consolidation, follow Info-Tech’s blueprint, Standardize the Service Desk.

      Even optimized processes will need to be redefined for the target consolidated state

      Your target state doesn’t have to be perfect. Model a short-term, achievable target state that can demonstrate immediate value.

      Consider the following elements when designing service desk processes:
      • Ticket input (i.e. how can tickets be submitted?)
      • Ticket classification (i.e. how will tickets be categorized?)
      • Ticket prioritization (i.e. how will critical incidents be defined?)
      • Ticket escalation (i.e. how and at what point will tickets be assigned to a more specialized resource?)
      • Ticket resolution (i.e. how will resolution be defined and how will users be notified?)
      • Communication with end users (i.e. how and how often will users be notified about the status of their ticket or of other incidents and outages?)

      Consider the following unique process considerations for consolidation:

      • How will knowledge sharing be enabled in order for all technicians to quickly access known errors and resolve problems?
      • How can first contact resolution levels be maintained through the transition?
      • How will procedures be clearly documented so that tickets are escalated properly?
      • Will ticket classification and prioritization schemes need to change?
      • Will new services such as self-serve be introduced to end users and how will this be communicated?

      Info-Tech Insight

      Don’t do it all at once. Consolidation will lead to some level of standardization. It will be reinforced and improved later through ongoing reengineering and process improvement efforts (continual improvement management).

      Brainstorm process requirements for consolidated service desk

      2.1.3 Identify process-related requirements for short and long term

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Whiteboard, sticky notes, markers
      • Vision and goals for the consolidation from step 1.2
      Document
      • Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.
      1. Review the questions in the previous section to frame a discussion on process considerations and best practices for the target consolidated service desk.
      2. Use your responses to the questions to brainstorm a list of process requirements or desired characteristics for the target state, particularly around incident management and service request management.
      3. Write each requirement onto a sticky note and categorize it as one of the following:
        1. Immediate requirement for consolidated service desk
        2. Implement within 6 months
        3. Implement within 1 year

      Example:

      Whiteboard:

      • Immediate
        • Clearly defined ticket prioritization scheme
        • Critical incident process workflow
      • 6 months
        • Clearly defined SOP, policies, and procedures
        • Transactional end-user satisfaction surveys
      • 1 year
        • Change mgmt.
        • Problem mgmt.

      Define the target resource distribution and utilization for the consolidated service desk

      Consolidation can sound scary to staff wondering if there will be layoffs. Reduce that by repurposing local staff and maximizing resource utilization in your organizational design.

      Consider the following people-related elements when designing your target state:

      • How will roles and responsibilities be defined for service desk staff?
      • How many agents will be required to deal with ticket demand?
      • What is the target agent utilization rate?
      • How will staff be distributed among tiers?
      • What will responsibilities be at each tier?
      • Will performance goals and rewards be established or standardized?

      Consider the following unique people considerations for consolidation:

      • Will staffing levels change?
      • Will job titles or roles change for certain individuals?
      • How will staff be reorganized?
      • Will staff need to be relocated to one location?
      • Will reporting relationships change?
      • How will this be managed?
      • How will performance measurements be consolidated across teams and departments to focus on the business goals?
      • Will there be a change to career paths?
      • What will consolidation do to morale, job interest, job opportunities?

      Info-Tech Insight

      Identify SMEs and individuals who are knowledgeable about a particular location, end-user base, technology, or service offering. They may be able to take on a different, greater role due to the reorganization that would make better use of their skills and capabilities and improve morale.

      Brainstorm people requirements for consolidated service desk

      2.1.4 Identify people-related requirements for short and long term

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Whiteboard, sticky notes, markers
      • Vision and goals for the consolidation from step 1.2
      Document

      Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.

      1. Review the questions in the previous section to frame a discussion on people considerations and best practices for the target consolidated service desk.
      2. Use your responses to the questions to brainstorm a list of requirements for the allocation and distribution of resources, including roles, responsibilities, and organizational structure.
      3. When thinking about people, consider requirements for both your staff and your end users.
      4. Write each requirement onto a sticky note and categorize it as one of the following:
        1. Immediate requirement for consolidated service desk
        2. Implement within 6 months
        3. Implement within 1 year

      Example:

      Whiteboard:

      • Immediate
        • Three tier structure with SMEs at Tier 2 and 3
        • All staff working together in one visible location
      • 6 months
        • Roles and responsibilities well defined and documented
        • Appropriate training and certifications available to staff
      • 1 year
        • Agent satisfaction above 80%
        • End-user satisfaction above 75%

      Identify the tools that will support the service desk and those the service desk will support

      One of the biggest technology-related decisions you need to make is whether you need a new ITSM tool. Consider how it will be used by a single service desk to support the entire organization.

      Consider the following technology elements when designing your target state:
      • What tool will be used to support the service desk?
      • What processes or ITIL modules can the tool support?
      • How will reports be produced? What types of reports will be needed for particular audiences?
      • Will a self-service tool be in place for end users to allow for password resets or searches for solutions?
      • Will the tool integrate with tools for change, configuration, problem, and asset management?
      • Will the majority of manual processes be automated?
      Consider the following unique technology considerations for consolidation:
      • Is an existing service management tool extensible?
      • If so, can it integrate with essential non-IT systems?
      • Can the tool support a wider user base?
      • Can the tool support all areas, departments, and technologies it will need to after consolidation?
      • How will data from existing tools be migrated to the new tool?
      • What implementation or configuration needs and costs must be considered?
      • What training will be required for the tool?
      • What other new tools and technologies will be required to support the consolidated service desk?

      Info-Tech Insight

      Talk to staff at each service desk to ask about their tool needs and requirements to support their work. Invite them to demonstrate how they use their tools to learn about customization, configuration, and functionality in place and to help inform requirements. Engaging staff in the process will ensure that the new consolidated tool will be supported and adopted by staff.

      Brainstorm technology requirements for consolidated service desk

      2.1.5 Identify technology-related requirements for short and long term

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You’ll Need
      • Whiteboard, sticky notes, markers
      • Vision and goals for the consolidation from step 1.2
      Document

      Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.

      1. Review the questions in the previous section to frame a discussion on technology considerations and best practices for the target consolidated service desk.
      2. Use your responses to the questions to brainstorm a list of requirements for the tools to support the consolidated service desk, along with any other technology requirements for the target state.
      3. Write each requirement onto a sticky note and categorize it as one of the following:
        1. Immediate requirement for consolidated service desk
        2. Implement within 6 months
        3. Implement within 1 year

      Example:

      Whiteboard:

      • Immediate
        • Single ITSM tool
        • Remote desktop support
      • 6 months
        • Self-service portal
        • Regular reports are produced accurately
      • 1 year
        • Mobile portal
        • Chat integration

      Identify specific requirements for a tool if you will be selecting a new ITSM solution

      Service desk software needs to address both business and technological needs. Assess these needs to identify core capabilities required from the solution.

      Features Description
      Modules
      • Do workflows integrate seamlessly between functions such as incident management, change management, asset management, desktop and network management?

      Self-Serve

      • Does the existing tool support self-serve in the form of web forms for incident reporting, forms for service requests, as well as FAQs for self-solve?
      • Is a service catalog available or can one be integrated painlessly?
      Enterprise Service Management Needs
      • Integration of solution to all of IT, Human Resources, Finance, and Facilities for workflows and financial data can yield great benefits but comes at a higher cost and greater complexity. Weigh the costs and benefits.
      Workflow Automation
      • If IT has advanced beyond simple workflows, or if extending these workflows beyond the department, more power may be necessary.
      • Full business process management (BPM) is part of a number of more advanced service desk/service management solutions.
      License Maintenance Costs
      • Are license and maintenance costs still reasonable and appropriate for the value of the tool?
      • Will the vendor renegotiate?
      • Are there better tools out there for the same or better price?
      Configuration Costs
      • Templates, forms, workflows, and reports all take time and skills but bring big benefits. Can these changes be done in-house? How much does it cost to maintain and improve?
      Speed / Performance
      • Data growth and volume may have reached levels beyond the current solution’s ability to cope, despite database tuning.
      Vendor Support
      • Is the vendor still supporting the solution and developing the roadmap? Has it been acquired? Is the level of support still meeting your needs?

      Build a requirements document for the service desk tool

      2.1.6 Create a requirements list and demo script for an ITSM tool (optional)

      Participants
      • CIO/IT Director
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Flip charts and markers
      • Templates:
        • IT Service Management Demo Script Template
        • Service Desk Software and RFP Evaluation Tool

      Create a requirements list for the service desk tool.

      1. Break the group into smaller functional groups.
      2. Brainstorm features that would be important to improving efficiencies, services to users, and visibility to data.
      3. Document on flip chart paper, labelling each page with the functional group name.
      4. Prioritize into must-have and nice-to-have items.
      5. Reconvene and discuss each list with the group.
      6. Info-Tech’s Service Desk Software and RFP Evaluation Tool can also be used to document requirements for an RFI.

      Create a demo script:

      Using information from the requirements list, determine which features will be important for the team to see during a demo. Focus on areas where usability is a concern, for example:

      • End-user experience
      • Workflow creation and modification
      • Creating templates
      • Creating service catalog items
      • Knowledgebase

      Evaluate alternative tools, build a shortlist for RFPs, and arrange web demonstrations or evaluation copies

      2.1.7 Identify an alternative tool and build an RFP (optional)

      Participants
      • CIO (optional)
      • Service Desk Manager
      • Service Desk Technician(s)
      • Service Desk Tool Administrator
      What You'll Need
      • Whiteboard or flip chart and markers
      • Service Desk RFP Template

      Evaluate current tool:

      • Investigate to determine if these features are present and just not in use.
      • Contact the vendor if necessary.
      • If enough features are present, determine if additional training is required.
      • If tool is proven to be inadequate, investigate options.

      Consider alternatives:

      Use Info-Tech’s blueprints for further guidance on selecting and implementing an ITSM tool

      1. Select a tool

      Info-Tech regularly evaluates ITSM solution providers and ranks each in terms of functionality and affordability. The results are published in the Enterprise and Mid-Market Service Desk Software Vendor Landscapes.

      2. Implement the tool

      After selecting a solution, follow the Build an ITSM Tool Implementation Plan project to develop an implementation plan to ensure the tool is appropriately designed, installed, and tested and that technicians are sufficiently trained to ensure successful deployment and adoption of the tool.

      Compare your existing service desks with the Consolidate Service Desk Scorecard Tool

      Complete the scorecard tool along with the activities of the next step

      The Consolidate Service Desk Scorecard Tool will allow you to compare metrics and maturity results across your service desks to identify weak and poor performers and processes.

      The purpose of this tool is to organize the data from up to six service desks that are part of a service desk consolidation initiative. Displaying this data in an organized fashion, while offering a robust comparative analysis, should facilitate the process of establishing a new baseline for the consolidated service desk.

      Use the results on tab 4 of the Consolidate Service Desk Assessment Tool. Enter the data from each service desk into tab “2. InfoCards” of the Consolidate Service Desk Scorecard Tool.

      Data from up to six service desks (up to six copies of the assessment tool) can be entered into this tool for comparison.

      Set targets for key metrics to identify high performing service desks

      2.1.8 Use the scorecard tool to set target metrics against which to compare service desks

      Participants
      • CIO or IT Director
      • Service Desk Manager(s)
      What You’ll Need
      • Consolidate Service Desk Scorecard Tool
      1. Review the explanations of the six core metrics identified from the service desk assessment tool. These are detailed on tab 3 of the Consolidate Service Desk Scorecard Tool.
        1. End-user satisfaction
        2. Agent satisfaction
        3. Cost per ticket
        4. Agent utilization rate
        5. First contact resolution rate
        6. First tier resolution rate
      2. For each metric (except agent utilization), define a “worst” and “best” target number. These numbers should be realistic and determined only after some consideration.
      • Service desks scoring at or above the “best” threshold for a particular metric will receive 100% on that metric; while service desks scoring at or below the “worst” threshold for a particular metric will receive 0% on that metric.
      • For agent utilization, only a “best” target number is entered. Service desks hitting this target number exactly will receive 100%, with scores decreasing as a service desk’s agent utilization gets further away from this target.
    • Identify the importance of each metric and vary the values in the “weighting” column accordingly.
    • The values entered on this tab will be used in calculating the overall metric score for each service desk, allowing you to compare the performance of existing service desks against each other and against your target state.

      Review the results of the scorecard to identify best practices

      2.1.9 Discuss the results of the scorecard tool

      Participants
      • CIO or IT Director (optional)
      • Service Desk Manager(s)
      What You'll Need
      • Consolidate Service Desk Scorecard Tool
      1. Facilitate a discussion on the results of the scorecard tool on tabs 4 (Overall Results), 5 (Maturity Results), and 6 (Metrics Results).
      2. Identify the top performing service desks(s) (SD Champions) as identified by the average of their metric and maturity scores.
      3. Identify the top performing service desk by maturity level (tab 5; Level 3 – Integrated or Optimized), paying particular attention to high scorers on process maturity and maturity in incident & service request management.
      4. Identify the top performing service desk by metric score (tab 6), paying particular attention to the metrics that tie into your KPIs.
      5. For those service desks, review their processes and identify what they are doing well to glean best practices.
        1. Incorporate best practices from existing high performing service desks into your target state.
        2. If one service desk is already performing well in all areas, you may choose to model your consolidated service desk after it.

      Document processes and procedures in an SOP

      Define the standard operating procedures for the consolidated service desk

      Develop one set of standard operating procedures to ensure consistent service delivery across locations.

      One set of standard operating procedures for the new service desk is essential for a successful consolidation.

      Info-Tech’s Consolidated Service Desk SOP Template provides a detailed example of documenting procedures for service delivery, roles and responsibilities, escalation and prioritization rules, workflows for incidents and service requests, and resolution targets to help ensure consistent service expectations across locations.

      Use this template as a guide to develop or refine your SOP and define the processes for the consolidated service desk.

      Step 2.2: Assess logistics and cost of consolidation

      Phase 2

      Design consolidation

      2.1 Design target consolidated state

      2.2 Assess logistics and cost

      This step will walk you through the following activities:
      • 2.2.1 Plan logistics for process, technology, and facilities
      • 2.2.2 Plan logistics around resource allocation
      • 2.2.3 Review the results of the Service Desk Efficiency Calculator to refine the business case for the consolidation project
      This step involves the following participants:
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      Step outcomes
      • An understanding and list of tasks to accomplish to ensure all logistical considerations for the consolidation are accounted for
      • An analysis of the impact on staffing and service levels using the Service Desk Efficiency Calculator
      • An assessment of the cost of consolidation and the cost savings of a consolidated service desk using a TCO tool

      The United States Coast Guard’s consolidation saved $20 million in infrastructure and support costs

      CASE STUDY

      Industry: US Coast Guard

      Source: CIO Rear Adm. Robert E. Day, Jr. (retired)

      Challenges

      The US Coast Guard was providing internal IT support for 42,000 members on active duty from 11 distinct regional IT service centers around the US.

      Pain Points

      1. Maintaining 11 disparate IT architectures was costly and time consuming.
      2. Staffing inefficiencies limited the USCG’s global IT service operations to providing IT support from 8am to 4pm.
      3. Individual sites were unable to offload peak volume during heavier call loads to other facilities.
      4. Enforcing adherence to standard delivery processes, procedures, and methods was nearly impossible.
      5. Personnel didn’t have a single point of contact for IT support.
      6. Leadership has limited access to consolidated analytics.

      Outcomes

      • Significant reduction in infrastructure, maintenance, and support costs.
      • Reduced risk through comprehensive disaster recovery.
      • Streamlined processes and procedures improved speed of incident resolution.
      • Increased staffing efficiencies.
      • Deeper analytical insight into service desk performance.

      Admiral Day was the CIO from 2009 to 2014. In 2011, he lead an initiative to consolidate USCG service desks.

      Selecting a new location communicated the national mandate of the consolidated service desk

      Site Selection - Decision Procedures

      • Determine location criteria, including:
        • Access to airports, trains, and highways
        • Workforce availability and education
        • Cost of land, real estate, taxes
        • Building availability Financial incentives
      • Review space requirements (i.e. amount and type of space).
      • Identify potential locations and analyze with defined criteria.
      • Develop cost models for various alternatives.
      • Narrow selection to 2-3 sites. Analyze for fit and costs.
      • Conduct site visits to evaluate each option.
      • Make a choice and arrange for securing the site.
      • Remember to compare the cost to retrofit existing space with the cost of creating a space for the consolidated service desk.

      Key Decision

      Relocating to a new location involved potentially higher implementation costs, which was a significant disadvantage.

      Ultimately, the relocation reinforced the national mandate of the consolidated service desk. The new organization would act as a single point of contact for the support of all 42,000 members of the US Coast Guard.

      "Before our regional desks tended to take on different flavors and processes. Today, users get the same experience whether they’re in Alaska or Maryland by calling one number: (855) CG-FIX IT." – Rear Adm. Robert E. Day, Jr. (retired)

      Plan the logistics of the consolidation to inform the project roadmap and cost assessment

      Before proceeding, validate that the target state is achievable by evaluating the logistics of the consolidation itself.

      A detailed project roadmap will help break down the project into manageable tasks to reach the target state, but there is no value to this if the target state is not achievable or realistic.

      Don’t forget to assess the logistics of the consolidation that can be overlooked during the planning phase:

      • Service desk size
      • Location of the service desk
      • Proximity to company management and facilities
      • Unique applications, platforms, or configurations in each location/region
      • Distribution of end-user population and varying end-user needs
      • Load balancing
      • Call routing across locations
      • Special ergonomic or accessibility requirements by location
      • Language requirements

      Info-Tech Insight

      Language barriers can form significant hurdles or even roadblocks for the consolidation project. Don’t overlook the importance of unique language requirements and ensure the consolidated service desk will be able to support end-user needs.

      Plan logistics for process, technology, and facilities

      2.2.1 Assess logistical and cost considerations around processes, technology, and facilities

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You'll Need
      • Whiteboard or flip chart and markers
      • Consolidate roadmap
      Document

      Identify tasks that should form part of the roadmap and document in the roadmap tool.

      Identify costs that should be included in the TCO assessment and document in the TCO tool.

      Discuss and identify any logistic and cost considerations that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.

      Logistic considerations

      • Impact of ticket intake process changes on end users
      • Process change impact on SLAs and productivity standards
      • Call routing changes and improvements
      • Workstations and workspace – is there enough and what will it look like for each agent?
      • Physical access to the service desk – will walk-ups be permitted? Is it accessible?
      • Security or authorization requirements for specific agents that may be impacted by relocation
      • Layout and design of new location, if applicable
      • Hardware, platform, network, and server implications
      • Licensing and contract limitations of the service desk tool

      Cost considerations

      • Cost savings from ITSM tool consolidation
      • Cost of new ITSM tool purchase, if applicable
      • Efficiencies gained from process simplification
      • New hardware or software purchases
      • Cost per square foot of new physical location, if applicable

      Develop a staffing plan that leverages the strengths you currently have and supplement where your needs require

      Your staff are your greatest assets; be sensitive to their concerns as you plan the consolidation.

      Keep in mind that if your target state involves reorganization of resources and the creation of resources, there will be additional staffing tasks that should form part of the consolidation plan. These include:

      • Develop job descriptions and reporting relationships
      • Evaluate current competencies Identify training and hiring needs
      • Develop migration strategy (including severance and migration packages)

      If new positions will be created, follow these steps to mitigate risks:

      1. Conduct skills assessments (a skills inventory should have been completed in phase 1)
      2. Re-interview existing staff for open positions before considering hiring outside staff
      3. Hire staff from outside if necessary

      For more guidance on hiring help desk staff, see Info-Tech’s blueprint, Manage Help Desk Staffing.

      Be sensitive to employee concerns.

      Develop guiding principles for the consolidation to ensure that employee satisfaction remains a priority throughout the consolidation.

      Examples include:

      1. Reconcile existing silos and avoid creating new silos
      2. Keep current systems where it makes sense to avoid staff having to learn multiple new systems to do their jobs and to reduce costs
      3. Repurpose staff and allocate according to their knowledge and expertise as much as possible
      4. Remain open and transparent about all changes and communicate change regularly

      Info-Tech Insight

      The most talented employees can be lost in the migration to a consolidated service desk, resulting in organizational loss of core knowledge. Mitigate this risk using measurement strategies, competency modeling, and knowledge sharing to reduce ambiguity and discomfort of affected employees.

      Plan logistics around resource allocation

      2.2.2 Assess logistical and cost considerations around people

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You’ll Need
      • Whiteboard or flip chart and markers
      • Consolidate roadmap
      Document

      Identify tasks that should form part of the roadmap and document in the roadmap tool.

      Identify costs that should be included in the TCO assessment and document in the TCO tool.

      Discuss and identify any logistic and cost considerations surrounding resources and staffing that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.

      Logistic considerations

      • Specialized training requirements for staff moving to new roles
      • Enablement of knowledge sharing across agents
      • Potential attrition of staff who do not wish to relocate or be reallocated
      • Relocation of staff – will staff have to move and will there be incentives for moving?
      • Skills requirements, recruitment needs, job descriptions, and postings for hiring

      Cost considerations

      • Existing and future salaries for employees
      • Potential attrition of employees
      • Retention costs and salary increases to keep employees
      • Hiring costs
      • Training needs and costs

      Assess impact on staffing with the Service Desk Efficiency Calculator

      How do organizations calculate the staffing implications of a service desk consolidation?

      The Service Desk Efficiency Calculator uses the ITIL Gross Staffing Model to think through the impact of consolidating service desk processes.

      To estimate the impact of the consolidation on staffing levels, estimate what will happen to three variables:

      • Ticket volume
      • Average call resolution
      • Spare capacity

      All things being equal, a reduction in ticket volume (through outsourcing or the implementation of self-serve options, for example), will reduce your staffing requirements (all things being equal). The same goes for a reduction in the average call resolution rate.

      Constraints:

      Spare capacity: Many organizations are motivated to consolidate service desks by potential reductions in staffing costs. However, this is only true if your service desk agents have spare capacity to take on the consolidated ticket volume. If they don’t, you will still need the same number of agents to do the work at the consolidated service desk.

      Agent capabilities: If your agents have specialised skills that you need to maintain the same level of service, you won’t be able to reduce staffing until agents are cross-trained.

      Review the results of the Service Desk Efficiency Calculator to refine the business case for the consolidation project

      2.2.3 Discuss the results of the efficiency calculator in the context of consolidation

      Participants
      • CIO or IT Director
      • Service Desk Manager(s)
      What You’ll Need
      • Completed Service Desk Efficiency Calculator

      The third tab of the Service Desk Efficiency Calculator will quantify:

      • Service Desk Staffing: The impact of different ticket distribution on service desk staffing levels.
      • Service Desk Ticket Resolution Cost: The impact of different ticket distributions on ticket resolution costs.
      • Service Management Efficiency: The business impact of service management initiatives, specifically, the time lost or captured in service management processes relative to an average full-time employee equivalent.

      Facilitate a discussion around the results.

      Evaluate where you are now and where you hope to be. Focus on the efficiency gains expected from the outsourcing project. Review the expected gains in average resolution time, the expected impact on service desk ticket volume, and the associated productivity gains.

      Use this information to refine the business case and project plan for the consolidation, if needed.

      Assess consolidation costs and cost savings to refine the business case

      While cost savings should not be the primary driver of consolidation, they should be a key outcome of the project in order to deliver value.

      Typical cost savings for a service desk consolidation are highlighted below:

      People 10-20% savings (through resource pooling and reallocation)

      Process 5-10% savings (through process simplification and efficiencies gained)

      Technology 10-15% savings (through improved call routing and ITSM tool consolidation)

      Facilities 5-10% savings (through site selection and redesign)

      Cost savings should be balanced against the costs of the consolidation itself (including hiring for consolidation project managers or consultants, moving expenses, legal fees, etc.)

      Evaluate consolidation costs using the TCO Comparison Tool described in the next section.

      Analyze resourcing and budgeting to create a realistic TCO and evaluate the benefits of consolidation

      Use the TCO tool to assess the cost and cost savings of consolidation

      • The tool compares the cost of operating two service desks vs. one consolidated service desk, along with the cost of consolidation.
      • If your consolidation effort involves more than two facilities, then use multiple copies of the tool.
        • E.g. If you are consolidating four service desks (A, B, C, and D) into one service desk (X), then use two copies of the tool. We encourage you to book an analyst call to help you get the most out of this tool and process.

      Service Desk Consolidation TCO Comparison Tool

      Refine the business case and update the executive presentation

      Check in with executives and project sponsor before moving forward with the transition

      Since completing the executive visioning session in step 1.2, you should have completed the following activities:

      • Current state assessment
      • Detailed target state and metrics
      • Gap analysis between current and target state
      • Assessment of logistics and cost of consolidation

      The next step will be to develop a project roadmap to achieve the consolidation vision.

      Before doing this, check back in with the project sponsor and business executives to refine the business case, obtain necessary approvals, and secure buy-in.

      If necessary, add to the executive presentation you completed in step 1.2, copying results of the deliverables you have completed since:

      • Consolidate Service Desk Assessment Tool (current state assessment)
      • Consolidate Service Desk Scorecard Tool
      • Service Desk Consolidation TCO Comparison Tool

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.3 Brainstorm process requirements for consolidated service desk

      Identify process requirements and desired characteristics for the target consolidated service desk.

      2.1.9 Review the results of the scorecard to identify best practices

      Review the results of the Consolidate Service Desk Scorecard Tool to identify top performing service desks and glean best practices.

      Phase 3

      Plan the Transition

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Plan the transition

      Proposed Time to Completion (in weeks): 2-4

      Step 3.1: Build project roadmap

      Discuss with an analyst:

      • Identify specific initiatives for the consolidation project and evaluate the risks and dependencies for each
      • Plot initiatives on a detailed project roadmap with assigned responsibilities

      Then complete these activities…

      • Break the consolidation project down into specific initiatives
      • Identify and document risks and dependencies
      • Plot your initiatives onto a detailed project roadmap
      • Select transition date for consolidation

      With these tools & templates:

      Service Desk Consolidation Roadmap

      Step 3.2: Communicate the change

      Discuss with an analyst:

      • Identify the goals of communication, then develop a communications plan with targeted messaging for each stakeholder group to achieve those goals
      • Brainstorm potential objections and questions as well as responses to each

      Then complete these activities…

      • Build the communications delivery plan
      • Brainstorm potential objections and questions and prepare responses
      • Complete the news bulletin to distribute to your end users

      With these tools & templates:

      Service Desk Consolidation Communications and Training Plan Template

      Service Desk Consolidation News Bulletin & FAQ Template

      Phase 3 Results:
      • A detailed project roadmap toward consolidation and a communications plan to ensure stakeholders are on board

      Step 3.1: Build the project roadmap

      Phase 3

      Plan the consolidation

      3.1 Build the project roadmap

      3.2 Communicate the change

      This step will walk you through the following activities:
      • 3.1.1 Break the consolidation project down into a series of specific initiatives
      • 3.1.2 Identify and document risks and dependencies
      • 3.1.3 Plot your initiatives onto a detailed project roadmap
      • 3.1.4 Select transition date based on business cycles
      This step involves the following participants:
      • CIO
      • IT Directors
      • Service Desk Managers
      • Consolidation Project Manager
      • Service Desk Technicians
      Step outcomes

      A detailed roadmap to migrate to a single, consolidated service desk, including:

      • A breakdown of specific tasks groups by people, process, and technology
      • Identified risks and dependencies for each task
      • A timeline for completion of each task and the overall consolidation
      • Assigned responsibility for task completion

      Failure to engage stakeholders led to the failure of a large healthcare organization’s consolidation

      CASE STUDY

      Industry: Healthcare

      Source: Organizational insider

      A large US healthcare facilities organization implemented a service desk consolidation initiative in early 2013. Only 18 months later, they reluctantly decided to return to their previous service desk model.

      Why did this consolidation effort fail?

      1. Management failed to communicate the changes to service-level staff, leading to agent confusion and pushback. Initially, each desk became part of the other’s overflow queue with no mention of the consolidation effort. Next, the independent desks began to share a basic request queue. Finally, there was a complete virtual consolidation – which came as a shock to service agents.
      2. The processes and workflows of the original service desks were not integrated, requiring service agents to consult different processes and use different workflows when engaging with end users from different facilities, even though all calls were part of the same queue.
      3. Staff at the different service centers did not have a consistent level of expertise or technical ability, even though they all became part of the same queue. This led to a perceived drop in end-user satisfaction – end users were used to getting a certain level of service and were suddenly confronted with less experienced agents.

      Before Consolidation

      Two disparate service desks:

      • With distinct geographic locations.
      • Servicing several healthcare facilities in their respective regions.
      • With distinct staff, end users, processes, and workflows.

      After Consolidation

      One virtually-consolidated service desk servicing many facilities spread geographically over two distinct locations.

      The main feature of the new virtual service desk was a single, pooled ticket queue drawn from all the end users and facilities in the new geographic regions.

      Break the consolidation project down into a series of specific initiatives

      3.1.1 Create a list of specific tasks that will form the consolidation project

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You’ll Need
      • Whiteboard and markers
      • List of prioritized target state requirements
      • Consolidation roadmap
      Document

      Document the list of initiatives in the Service Desk Consolidation Roadmap.

      In order to translate your newly made decisions regarding the target state and logistical considerations into a successful consolidation strategy, create an exhaustive list of all the steps and sub-steps that will lead you from your current state to your target state.

      Use the next few steps to finish brainstorming the initiative list, identify risks and dependencies, and construct a detailed timeline populated with specific project steps.

      Instructions

      Start with the list you have been curating throughout the current and future state assessments. If you are completing this project as a workshop, add to the initiative list you have been developing on the whiteboard.

      Try to organize your initiatives into groups of related tasks. Begin arranging your initiatives into people, process, technology, or other categories.

      Whiteboard People Process Technology Other

      Evaluate the impact of potential risks and develop a backup plan for high risk initiatives

      A service desk consolidation has a high potential for risks. Have a backup plan prepared for when events don’t go as planned.

      • A consolidation project requires careful planning as it is high risk and not performed often.
      • Apply the same due diligence to the consolidation plan as you do in preparing your disaster recovery plan. Establish predetermined resolutions to realistic risks so that the team can think of solutions quickly during the consolidation.

      Potential Sources of Risk

      • Service desk tool or phone line downtime prevents ability to submit tickets
      • Unable to meet SLAs through the transition
      • Equipment failure or damage through the physical move
      • Lost data through tool migration
      • Lost knowledge from employee attrition
      Risk - degree of impact if activities do not go as planned High

      A – High Risk, Low Frequency

      Tasks that are rarely done and are high risk. Focus attention here with careful planning (e.g. consolidation)

      B – High Risk, High Frequency

      Tasks that are performed regularly and must be watched closely each time (e.g. security authorizations)

      C – Low Risk, Low Frequency

      Tasks that are performed regularly with limited impact or risk (e.g. server upgrades)

      D – Low Risk, High Frequency

      Tasks that are done all the time and are not risky (e.g. password resets)

      Low High
      Frequency - how often the activity has been performed

      Service desk consolidations fit in category A

      Identify risks for people, processes, tools, or data to ensure the project plan will include appropriate mitigations

      Each element of the consolidation has an inherent risk associated with it as the daily service flow is interrupted. Prepare in advance by anticipating these risks.

      The project manager, service desk managers, and subject matter experts (SMEs) of different areas, departments, or locations should identify risks for each of the processes, tools, resource groups (people), and any data exchanges and moves that will be part of the project or impacted by the project.

      Process - For each process, validate that workflows can remain intact throughout the consolidation project. If any gaps may occur in the process flows, develop a plan to be implemented in parallel with the consolidation to ensure service isn’t interrupted.

      Technology - For a tool consolidation, upgrade, or replacement, verify that there is a plan in place to ensure continuation of service delivery processes throughout the change.

      Make a plan for if and how data from the old tool(s) will be migrated to the new tool, and how the new tool will be installed and configured.

      People - For movement of staff, particularly with termination, identify any risks that may occur and involve your HR and legal departments to ensure all movement is compliant with larger processes within the organization.

      Info-Tech Insight

      Don’t overlook the little things. Sometimes the most minor-seeming components of the consolidation can cause the greatest difficulty. For example, don’t assume that the service desk phone number can simply roll over to a new location and support the call load of a combined service desk. Verify it.

      Identify and document risks and dependencies

      3.1.2 Risks, challenges, and dependencies exercise - Estimated Time: 60 minutes

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      • SMEs
      What You'll Need
      • Whiteboard and markers
      • List of initiatives identified in previous activities
      • Consolidation roadmap
      Document

      Use the outcome of this activity to complete your consolidation roadmap.

      Instructions
      • Document risks and challenges, as well as dependencies associated with the initiatives identified earlier, using a different color sticky note from your initiatives.
      • See example below.
      Combine Related Initiatives
      • Look for initiatives that are highly similar, dependent on each other, or occurring at the same time. Consolidate these initiatives into a single initiative with several sub-steps in order to better organize your roadmap and reduce redundancy.
      • Create hierarchies for dependent initiatives that could affect the scheduling of initiatives on a roadmap, and reorganize the whiteboard where necessary.
      Optional:
      • Use a scoring method to categorize risks. E.g.:
        • High: will stop or delay operations, radically increase cost, or significantly reduce consolidation benefits
        • Medium: would cause some delay, cost increase, or performance shortfall, but would not threaten project viability
        • Low: could impact the project to a limited extent, causing minor delays or cost increases
      • Develop contingency plans for high risks or adjust to avoid the problem entirely
      Implement new ISTM tool:
      • Need to transition from existing tools
      • Users must be trained
      • Data and open tickets must be migrated

      Plot your initiatives onto a detailed project roadmap

      3.1.3 Estimated Time: 45 minutes

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      Document

      Document your initiatives on tab 2 of the Service Desk Consolidation Roadmap or map it out on a whiteboard.

      Determine the sequence of initiatives, identify milestones, and assign dates.
      • The purpose of this exercise is to define a timeline and commit to initiatives to reach your goals.
      • Determine the order in which previously identified consolidation initiatives will be implemented, document previously identified risks and dependencies, assign ownership for each task, and assign dates for pilots and launch.

      Select transition date based on business cycles

      3.1.4

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You'll Need
      • Consolidation roadmap
      Document

      Adjust initiatives in the consolidation roadmap if necessary.

      The transition date will be used in communications in the next step.

      1. Review the initiatives in the roadmap and the resulting sunshine diagram on tab 3.
      2. Verify that the initiatives will be possible within the determined time frame and adjust if necessary.
      3. Based on the results of the roadmap, select a target transition date for the consolidation by determining:
        1. Whether there are dates when a major effort of this kind should not be scheduled.
        2. Whether there are merger and acquisition requirements that dictate a specific date for the service desk merger.
      4. Select multiple measurable checkpoints to alert the team that something is awry and mitigate risks.
      5. Verify that stakeholders are aware of the risks and the proposed steps necessary to mitigate them, and assign the necessary resources to them.
      6. Document or adjust the target transition date in the roadmap.

      Info-Tech Insight

      Consolidating service desks doesn’t have to be done in one shot, replacing all your help desks, tools, and moving staff all at the same time. You can take a phased approach to consolidating, moving one location, department, or tool at a time to ease the transition.

      Step 3.2: Communicate the change

      Phase 3

      Design consolidation

      3.1 Build the project roadmap

      3.2 Communicate the change

      This step will walk you through the following activities:
      • 3.2.1 Build the communications delivery plan
      • 3.2.2 Brainstorm potential objections and questions and prepare responses
      This step involves the following participants:
      • IT Director
      • Project Manager
      • Service Desk Manager(s)
      • Service Desk Agents
      Step outcomes
      • A detailed communications plan with key messages, delivery timeline, and spokesperson responsibility for each key stakeholder audience
      • A set of agreed-upon responses to anticipated objections and questions to ensure consistent message delivery
      • A news bulletin and list of FAQs to distribute to end users to prepare them for the change

      Create your communication plan with everyone in mind, from the CIO to end users

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Oxford implemented extremely innovative initiatives as part of its robust communications plan.

      ITS ran a one-day ITSM “business simulation” for the CIO and direct reports, increasing executive buy-in.

      The business simulation was incredibly effective as a way of getting management buy-in – it really showed what we are driving at. It’s a way of making it real, bringing people on board. ” – John Ireland, Director of Customer Service

      Detailed use cases were envisioned referencing particular ITIL processes as the backbone of the process framework.

      The use cases were very helpful, they were used […] in getting a broad engagement from teams across our department and getting buy-in from the distributed IT staff who we work with across the wider University. ” – John Ireland, Director of Customer Service

      The Oxford ITS SDCP blog was accessible to everyone.

      • Oxford’s SDCP blog acted as a project touchstone not only to communicate updates quickly, but also to collect feedback, enable collaboration, and set a project tone.
      • An informal tone and accessible format facilitated the difficult cultural shifts required of the consolidation effort.

      We in the project team would love to hear your view on this project and service management in general, so please feel free to comment on this blog post, contact us using the project email address […] or, for further information visit the project SharePoint site […] ” – Oxford ITS SDCP blog post

      Plan for targeted and timely communications to all stakeholders

      Develop a plan to keep all affected stakeholders informed about the changes consolidation will bring, and more importantly, how they will affect them.

      All stakeholders must be kept informed of the project plan and status as the consolidation progresses.
      • Management requires frequent communication with the core project group to evaluate the success of the project in meeting its goals.
      • End users should be informed about changes that are happening and how these changes will affect them.

      A communications plan should address three elements:

      1. The audience and their communication needs
      2. The most effective means of communicating with this audience
      3. Who should deliver the message

      Goals of communication:

      1. Create awareness and understanding of the consolidation and what it means for each role, department, or user group
      2. Gain commitment to the change from all stakeholders
      3. Reduce and address any concerns about the consolidation and be transparent in responding to any questions
      4. Communicate potential risks and mitigation plan
      5. Set expectations for service levels throughout and after the consolidation

      Plan the method of delivery for your communications carefully

      Plan the message, test it with a small audience, then deliver to your employees and stakeholders in person to avoid message avoidance or confusion.

      Message Format

      Email and Newsletters

      Email and newsletters are convenient and can be transmitted to large audiences easily, but most users are inundated with email already and may not notice or read the message.

      • Use email to make large announcements or invite people to meetings but not as the sole medium of communication.

      Face-to-Face Communication

      Face-to-face communication helps to ensure that users are receiving and understanding a clear message, and allows them to voice their concerns and clarify any confusion or questions.

      • Use one-on-ones for key stakeholders and team meetings for groups.

      Internal Website/Drive

      Internal sites help sustain change by making knowledge available after the consolidation, but won’t be retained beforehand.

      • Use for storing policies, how-to-guides, and SOPs.
      Message Delivery
      1. Plan your message
        1. Emphasize what the audience really needs to know, that is, how the change will impact them.
      2. Test your message
        1. Run focus groups or test your communications with a small audience (2-3 people) first to get feedback and adjust messages before delivering them more broadly.
      3. Deliver and repeat your message
        1. “Tell them what you’re going to tell them, then tell them, then tell them what you told them.”
      4. Gather feedback and evaluate communications
        1. Evaluate the effectiveness of the communications (through surveys, focus groups, stakeholder interviews, or metrics) to ensure the message was delivered and received successfully and communication goals were met.

      Address the specific concerns of the business vs. employees

      Focus on alleviating concerns from both sides of the communication equation: the business units and employees.

      Business units:

      Be attentive to the concerns of business unit management about loss of power. Appease worries about the potential risk of reduced service quality and support responsiveness that may have been experienced in prior corporate consolidation efforts.

      Make the value of the consolidation clear, and involve business unit management in the organizational change process.

      Focus on producing a customer-focused consolidated service desk. It will assuage fears over the loss of control and influence. Business units may be relinquishing control of their service desk, but they should retain the same level of influence.

      Employees:

      Employees are often fearful of the impact of a consolidation on their jobs. These fears should be addressed and alleviated as soon as possible.

      Design a communication plan outlining the changes and the reasons motivating it.

      Put support programs in place for displaced and surviving employees.

      Motivate employees during the transition and increase employee involvement in the change.

      Educate and train employees who make the transition to the new structure and new job demands.

      Info-Tech Insight

      Know your audience. Be wary of using technical jargon or acronyms that may seem like common knowledge within your department but would not be part of the vocabulary of non-technical audiences. Ensure your communications are suitable for the audience. If you need to use jargon or acronyms, explain what you mean.

      Build the communications delivery plan

      3.2.1 Develop a plan to deliver targeted messages to key stakeholder groups

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You'll Need
      • Communications plan template
      • Whiteboard and markers
      Document

      Document your decisions in the communications plan template

      1. Define the goals of the communications in section 1 of the Service Desk Consolidation Communications and Training Plan Template.
      2. Determine when communication milestones/activities need to be delivered by completing the Communications Schedule in section 2.
      3. Determine the key stakeholder groups or audiences to whom you will need to deliver communications.
      4. Identify the content of the key messages that need to be delivered and select the most appropriate delivery method for each (i.e. email, team meeting, individual meetings). Designate who will be responsible for delivering the messages.
      5. Document a plan for gathering feedback and evaluating the effectiveness of the communications in section 5 (i.e. stakeholder interviews and surveys).

      Section 4 of the communications plan on objections and question handling will be completed in activity 3.2.2.

      Optional Activity

      If you completed the Stakeholder Engagement Workbook in step 1.1, you may also complete the Communications tab in that workbook to further develop your plan to engage stakeholders.

      Effectively manage the consolidation by implementing change management processes

      Implement change management processes to ensure that the consolidation runs smoothly with limited impact on IT infrastructure.

      Communicate and track changes: Identify and communicate changes to all stakeholders affected by the change to ensure they are aware of any downtime and can plan their own activities accordingly.

      Isolate testing: Test changes within a safe non-production environment to eliminate the risk of system outages that result from defects discovered during testing.

      Document back-out plans: Documented back-out/backup plans enable quick recovery in the event that the change fails.

      The image is a horizontal bar graph, titled Unplanned downtime due to change versus change management maturity. The graph shows that for a Change Management Maturity that is Informal, the % Experiencing Unplanned Downtime due to Failed Change is 41%; for Defined, it is 25%; and for Optimized, it is 19%.

      Organizations that have more mature and defined change management processes experience less unplanned downtime when implementing change across the organization.

      Sustain changes by adapting people, processes, and technologies to accept the transition

      Verify that people, process, and technologies are prepared for the consolidation before going live with the transition.

      What?

      1. Adapt people to the change

      • Add/change roles and responsibilities.
      • Move people to different roles/teams.
      • Change compensation and incentive structures to reinforce new goals, if applicable.

      2. Adapt processes to the change

      • Add/change supporting processes.
      • Eliminate or consolidate legacy processes.
      • Add/change standard operating procedures.

      3. Adapt technologies to the change

      • Add/change/update supporting technologies.
      • Eliminate or consolidate legacy technologies
      How? Work with HR on any changes involving job design, personnel changes, or compensation. Work with enterprise architects or business analysts to manage significant changes to processes that may impact the business and service levels.

      See Info-Tech’s Optimize the Change Management Processblueprint to use a disciplined change control process for technology changes.

      Info-Tech Insight

      Organizational change management (OCM) is widely recognized as a key component of project success, yet many organizations struggle to get adoption for new tools, policies, and procedures. Use Info-Tech’s blueprint on driving organizational change to develop a strategy and toolkit to achieve project success.

      Manage people by addressing their specific concerns based on their attitude toward change

      Avoid high turnover and resistance to change by engaging both the enthusiasts and the skeptics with targeted messaging.

      • Clearly articulate and strongly champion the changes that will result from the consolidation for those willing to adapt to the change.
      • Make change management practices integral to the entire project.
      • Provide training workshops on new processes, new goals or metrics, new technologies and tools, and teamwork as early as possible after consolidation.
      1. Enthusiasts - Empower them to stay motivated and promote the change
      2. Fence-Sitters/Indifferent - Continually motivate them by example but give them time to adapt to the change
      3. Skeptics - Engage them early and address their concerns and doubts to convert them to enthusiasts
      4. Saboteurs - Prevent them from spreading dissent and rumors, thus undermining the project, by counteracting negative claims early

      Leverage the Stakeholder Engagement Workbook from step 1.1 as well as Info-Tech’s blueprint on driving organizational change for more tactics on change management, particularly managing and engaging various personas.

      Prepare ahead of time for questions that various stakeholder groups may have

      Anticipate questions that will arise about the consolidation so you can prepare and distribute responses to frequently asked questions. Sample questions from various stakeholders are provided below.

      General
      1. Why is the organization moving to a consolidated service desk?
      2. Where is the consolidated service desk going to be located?
      3. Are all or only some service desks consolidating?
      4. When is the consolidation happening?
      5. What are the anticipated benefits of consolidation?

      Business

      1. What is the budget for the project?
      2. What are the anticipated cost savings and return on investment?
      3. When will the proposed savings be realized?
      4. Will there be job losses from the consolidation and when will these occur?
      5. Will the organization subsidize moving costs?

      Employees

      1. Will my job function be changing?
      2. Will my job location be changing?
      3. What will happen if I can’t relocate?
      4. Will my pay and benefits be the same?
      5. Will reporting relationships change?
      6. Will performance expectations and metrics change?

      End Users

      1. How do I get help with IT issues?
      2. How do I submit a ticket?
      3. How will I be notified of ticket status, outages?
      4. Where will the physical service desk be located?
      5. Will I be able to get help in my language?
      6. Will there be changes for levels of service?

      Brainstorm likely objections/questions to prepare responses

      3.2.2 Prepare responses to likely questions to ensure consistent messaging

      Participants
      • IT Director
      • Project Manager
      • Service Desk Manager(s)
      • Service Desk Agents
      Document

      Document your questions and responses in section 4 of the communications plan template. This should be continually updated.

      1. Brainstorm anticipated objections and questions you may hear from various stakeholder groups: service desk employees, end users, and management or executives.
      2. For each objection or question, prepare a response that will be delivered to ensure consistent messaging. Use a table like the example below.
      Group Objection/Question Response
      Service desk staff I’m comfortable with the service desk tool we’ve been using here and won’t know how to use the new one. We carefully evaluated the new solution against our requirements and selected it as the one that will provide the best service to our users and be user friendly. We tested the solution through user-acceptance testing to ensure staff will be comfortable using it, and we will provide comprehensive training to all users of the tool before launching it.
      End user I’m used to going to my favorite technician for help. How will I get service now? We are initiating a single point of contact so that you will know exactly where to go to get help quickly and easily, so that we can more quickly escalate your issue to the appropriate technician, and so that we can resolve it and notify you as soon as possible. This will make our service more effective and efficient than you having to find one individual who may be tied up with other work or unavailable.

      Keep the following in mind when formulating your responses:

      • Lead with the benefits
      • Be transparent and honest
      • Avoid acronyms, jargon, and technical terms
      • Appeal to both emotion and reason
      • Be concise and straightforward
      • Don’t be afraid to be repetitive; people need repetition to remember the message
      • Use concrete facts and images wherever possible

      Complete the Service Desk Consolidation News Bulletin & FAQ Template to distribute to your end users

      Customize the template or use as a guide to develop your own

      The Service Desk Consolidation News Bulletin & FAQ Template is intended to be an example that you can follow or modify for your own organization. It provides a summary of how the consolidation project will change how end users interact with the service desk.

      1. What the change means to end users
      2. When they should contact the service desk (examples)
      3. How to contact the service desk (include all means of contact and ticket submission)
      4. Answers to questions they may have
      5. Links to more information

      The bulletin is targeted for mass distribution to end users. A similar letter may be developed for service desk staff, though face-to-face communication is recommended.

      Instructions:

      1. Use the template as a guide to develop your own FAQ news bulletin and adjust any sections or wording as you see fit.
      2. You may wish to develop separate letters for each location, referring more specifically to their location and where the new service desk will be located.
      3. Save the file as a PDF for print or email distribution at the time determined in your communications plan.

      Keeping people a priority throughout the project ensured success

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Oxford’s new consolidated service desk went live April 20, 2015.

      They moved from 3 distinct tools and 5 disparate help desks to a single service desk with one robust ITSM solution, all grounded by a unified set of processes and an integrated workflow.

      The success of this project hinged upon:

      • A bold vision, formulated early and in collaboration with all stakeholders.
      • Willingness to take time to understand the unique perspective of each role and help desk, then carefully studying existing processes and workflows to build upon what works.
      • Constant collaboration, communication, and the desire to listen to feedback from all interested parties.

      "We have had a few teething issues to deal with, but overall this has been a very smooth transition given the scale of it." – ICTF Trinity Term 2015 IT Services Report

      Beyond the initial consolidation.
      • Over the summer of 2015, ITS moved to full 24/7 support coverage.
      • Oxford’s ongoing proposition with regard to support services is to extend the new consolidated service desk beyond its current IT role:
        • Academic Admissions
        • Case Management
        • IT Purchasing
      • To gradually integrate those IT departments/colleges/faculties that remain independent at the present time.
      • Info-Tech can facilitate these goals in your organization with our research blueprint, Extend the Service Desk to Enterprise.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1 Break the consolidation project down into a series of specific initiatives

      Create a list of specific tasks that will form the consolidation project on sticky notes and organize into people, process, technology, and other categories to inform the roadmap.

      3.2.2 Brainstorm likely objections/questions to prepare responses

      Brainstorm anticipated questions and objections that will arise from various stakeholder groups and prepare consistent responses to each.

      Related Info-Tech research

      Standardize the Service Desk - Provide timely and effective responses to user requests and resolutions of all incidents.

      Extend the Service Desk to the Enterprise - Position IT as an innovator.

      Build a Continual Improvement Plan for the Service Desk - Teach your old service desk new tricks.

      Adopt Lean IT to Streamline the Service Desk - Turn your service desk into a Lean, keen, value-creating machine.

      Vendor Landscape: Enterprise Service Desk Software - Move past tickets to proactive, integrated service.

      Vendor Landscape: Mid-Market Service Desk Software - Ensure the productivity of the help desk with the right platform.

      Build an ITSM Tool Implementation Plan - Nail your ITSM tool implementation from the outset.

      Drive Organizational Change from the PMO - Don’t let bad change happen to good projects.

      Research contributors and experts

      Stacey Keener - IT Manager for the Human Health and Performance Directorate, Johnson Space Center, NASA

      Umar Reed - Director of IT Support Services US Denton US LLP

      Maurice Pryce - IT Manager City of Roswell, Georgia

      Ian Goodhart - Senior Business Analyst Allegis Group

      Gerry Veugelaers - Service Delivery Manager New Zealand Defence Force

      Alisa Salley Rogers - Senior Service Desk Analyst HCA IT&S Central/West Texas Division

      Eddie Vidal - IS Service Desk Managers University of Miami

      John Conklin - Chief Information Officer Helen of Troy LP

      Russ Coles - Senior Manager, Computer Applications York Region District Schoolboard

      John Seddon - Principal Vanguard Consulting

      Ryan van Biljon - Director, Technical Services Samanage

      Rear Admiral Robert E. Day Jr. (ret.) - Chief Information Officer United States Coast Guard

      George Bartha - Manager of Information Technology Unifrax

      Peter Hubbard - IT Service Management Consultant Pink Elephant

      Andre Gaudreau - Manager of School Technology Operations York Region District School Board

      Craig Nekola - Manager, Information Technology Anoka County

      Bibliography and Further Reading

      Hoen, Jim. “The Single Point of Contact: Driving Support Process Improvements with a Consolidated IT Help-Desk Approach.” TechTeam Global Inc. September 2005.

      Hubbard, Peter. “Leading University embarks on IT transformation programme to deliver improved levels of service excellence.” Pink Elephant. http://pinkelephant.co.uk/about/case-studies/service-management-case-study/

      IBM Global Services. “Service Desk: Consolidation, Relocation, Status Quo.” IBM. June 2005.

      Keener, Stacey. “Help Desks: a Problem of Astronomical Proportions.” Government CIO Magazine. 1 February 2015.

      McKaughan, Jeff. “Efficiency Driver.” U.S. Coast Guard Forum Jul. 2013. Web. http://www.intergraphgovsolutions.com/documents/CoastGuardForumJuly2013.pdf

      Numara Footprints. “The Top 10 Reasons for Implementing a Consolidated Service Desk.” Numara Software.

      Roy, Gerry, and Frederieke Winkler Prins. “How to Improve Service Quality through Service Desk Consolidation.” BMC Software.

      Smith, Andrew. “The Consolidated Service Desk – An Achievable Goal?” The Service Desk Institute.

      Wolfe, Brandon. “Is it Time for IT Service Desk Consolidation?” Samanage. 4 August 2015.

      Review and Improve Your IT Policy Library

      • Buy Link or Shortcode: {j2store}193|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $34,724 Average $ Saved
      • member rating average days saved: 14 Average Days Saved
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • Your policies are out of date, disorganized, and complicated. They don’t reflect current regulations and don’t actually mitigate your organization’s current IT risks.
      • Your policies are difficult to understand, aren’t easy to find, or aren’t well monitored and enforced for compliance. As a result, your employees don’t care about your policies.
      • Policy issues are taking up too much of your time and distracting you from the real issues you need to address.

      Our Advice

      Critical Insight

      A dynamic and streamlined policy approach will:

      1. Right-size policies to address the most critical IT risks.
      2. Clearly lay out a step-by-step process to complete daily tasks in compliance.
      3. Obtain policy adherence without having to be “the police.”

      To accomplish this, the policy writer must engage their audience early to gather input on IT policies, increase policy awareness, and gain buy-in early in the process.

      Impact and Result

      • Develop more effective IT policies. Clearly express your policy goals and objectives, standardize the approach to employee problem solving, and write policies your employees will actually read.
      • Improve risk coverage. Ensure full coverage on the risk landscape, including legal regulations, and establish a method for reporting, documenting, and communicating risks.
      • Improve employee compliance. Empathize with your employees and use policy to educate, train, and enable them instead of restricting them.

      Review and Improve Your IT Policy Library Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to write better policies that mitigate the risks you care about and get the business to follow them, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess

      Assess your risk landscape and design a plan to update your policy network based on your most critical risks.

      • Review and Improve Your IT Policy Library – Phase 1: Assess
      • Policy Management RACI Chart Template
      • Policy Management Tool
      • Policy Action Plan

      2. Draft and implement

      Use input from key stakeholders to write clear, consistent, and concise policies that people will actually read and understand. Then publish them and start generating policy awareness.

      • Review and Improve Your IT Policy Library – Phase 2: Draft and Implement
      • Policy Template
      • Policy Communication Plan Template

      3. Monitor, enforce, revise

      Use your policies to create a compliance culture in your organization, set KPIs, and track policy effectiveness.

      • Review and Improve Your IT Policy Library – Phase 3: Monitor, Enforce, Revise
      [infographic]

      Workshop: Review and Improve Your IT Policy Library

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish & Assess

      The Purpose

      Identify the pain points associated with IT policies.

      Establish the policy development process.

      Begin formulating a plan to re-design the policy network.

      Key Benefits Achieved

      Establish the policy process.

      Highlight key issues and pain points regarding policy.

      Assign roles and responsibilities.

      Activities

      1.1 Introduce workshop.

      1.2 Identify the current pain points with policy management.

      1.3 Establish high-level goals around policy management.

      1.4 Select metrics to measure achievement of goals.

      1.5 Create an IT policy working group (ITPWG).

      1.6 Define the scope and purpose of the ITPWG.

      Outputs

      List of issues and pain points for policy management

      Set of six to ten goals for policy management

      Baseline and target measured value

      Amended steering committee or ITPWG charter

      Completed RACI chart

      Documented policy development process

      2 Assess Your Risk Landscape & Map Policies to Risks; Create a Policy Action Plan

      The Purpose

      Identify key risks.

      Develop an understanding of which risks are most critical.

      Design a policy network that best mitigates those risks.

      Key Benefits Achieved

      Use a risk-driven approach to decide which policies need to be written or updated first.

      Activities

      2.1 Identify risks at a high level.

      2.2 Assess each identified risk scenario on impact and likelihood.

      2.3 Map current and required policies to risks.

      2.4 Assess policy effectiveness.

      2.5 Create a policy action plan.

      2.6 Select policies to be developed during workshop.

      Outputs

      Ranked list of IT’s risk scenarios

      Prioritized list of IT risks (simplified risk register)

      Policy action plan

      3 Develop Policies

      The Purpose

      Outline what key features make a policy effective and write policies that mitigate the most critical IT risks.

      Key Benefits Achieved

      Write policies that work and get them approved.

      Activities

      3.1 Define the policy audience, constraints, and in-scope and out-of-scope requirements for a policy.

      3.2 Draft two to four policies

      Outputs

      Drafted policies

      4 Create a Policy Communication and Implementation Plan and Monitor & Reassess the Portfolio

      The Purpose

      Build an understanding of how well the organization’s value creation activities are being supported.

      Key Benefits Achieved

      Identify an area or capability that requires improvement.

      Activities

      4.1 Review draft policies and update if necessary.

      4.2 Create a policy communication plan.

      4.3 Select KPIs.

      4.4 Review root-cause analysis techniques.

      Outputs

      Final draft policies

      Policy communications plan

      KPI tracking log

      Build IT Capabilities to Enable Digital Marketing Success

      • Buy Link or Shortcode: {j2store}553|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Misalignment: Even if IT builds the capabilities to pursue digital channels, the channels will underperform in realizing organizational goals if the channels and the goals are misaligned.
      • Ineffective analytics: Failure to integrate and analyze new data will undermine organizational success in influencer and sentiment identification.
      • Missed opportunity: If IT does not develop the capabilities to support these channels, then lead generation, brand promotion, and engagement opportunities will be lost.
      • Lack of control: Marketing is developing and depending on internal power users and agencies. This practice can isolate IT from digital marketing technology decision making.

      Our Advice

      Critical Insight

      • Identify and understand the digital marketing channels that can benefit your organization.
      • Get stakeholder buy-in to facilitate collaboration between IT and product marketing groups to identify necessary IT capabilities.
      • Build IT capability by purchasing software, outsourcing, and training or hiring individuals with necessary skillsets.
      • Become transformational: use IT capabilities to support analytics that identify new customer segments, key influencers, and other invaluable insights.
      • Time is of the essence! It is easier to begin strengthening the relationship between marketing and IT today then it will be at any point in the future.
      • Being transformational means more than just enabling the channels marketing wants to pursue; IT must assist in identifying new segments and digital marketing opportunities, such as enabling influencer management.

      Impact and Result

      • IT is involved in decision making and has a complete understanding of the digital channels the organization is going to migrate to or phase out if unused.
      • IT has the necessary capabilities to support and enable success in all relevant digital channel management technologies.
      • IT is a key player in ensuring that all relevant data from new digital channels is managed and analyzed in order to maintain a 360 degree view of customers and feed real-time campaigns.
      • This enables the organization to not only target existing segments effectively, but also to identify and pursue new opportunities not presented before.
      • These opportunities include: identifying new segments among social networks, identifying key influencers as a new target, identifying proactive service and marketing opportunities from the public social cloud, and conducting new competitive analyses on the public social cloud.

      Build IT Capabilities to Enable Digital Marketing Success Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the case for building IT capabilities

      Identify the symptoms of inadequate IT support of digital marketing to diagnose the problems in your organization.

      • Storyboard: Build IT Capabilities to Enable Digital Marketing Success

      2. Identify digital marketing opportunities to understand the need for action in your organization

      Identify the untapped digital marketing value in your organization to understand where your organization needs to improve.

      • Digital Marketing Capability Builder Tool

      3. Mobilize for action: get stakeholder buy-in

      Develop a plan for communicating with stakeholders to ensure buy-in to the digital marketing capability building project.

      • Digital Marketing Communication Deck

      4. Identify the product/segment-specific digital marketing landscape to identify required IT capabilities

      Assess how well each digital channel reaches target segments. Identify the capabilities that must be built to enable digital channels.

      5. Create a roadmap for building capabilities to enable digital marketing

      Assess the people, processes, and technologies required to build required capabilities and determine the best fit with your organization.

      [infographic]

      Workshop: Build IT Capabilities to Enable Digital Marketing Success

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Digital Marketing Opportunities

      The Purpose

      Determine the fit of each digital channel with your organizational goals.

      Determine the fit of digital channels with your organizational structure and business model.

      Compare the fit of digital channels with your organization’s current levels of use to:Identify missed opportunities your organization should capitalize on.Identify digital channels that your organization is wasting resources on.

      Identify missed opportunities your organization should capitalize on.

      Identify digital channels that your organization is wasting resources on.

      Key Benefits Achieved

      IT department achieves consensus around which opportunities need to be pursued.

      Understanding that continuing to pursue excellent-fit digital channels that your organization is currently active on is a priority.

      Identification of the channels that stopping activity on could free up resources for.

      Activities

      1.1 Define and prioritize organizational goals.

      1.2 Assess digital channel fit with goals and organizational characteristics.

      1.3 Identify missed opportunities and wasted resources in your digital channel mix.

      1.4 Brainstorm creative ways to pursue untapped digital channels.

      Outputs

      Prioritized list of organizational goals.

      Assigned level of fit to digital channels.

      List of digital channels that represent missed opportunities or wasted resources.

      List of brainstormed ideas for pursuing digital channels.

      2 Identify Your Product-Specific Digital Marketing Landscape

      The Purpose

      Identify the digital channels that will be used for specific products and segments.

      Identify the IT capabilities that must be built to enable digital channels.

      Prioritize the list of IT capabilities.

      Key Benefits Achieved

      IT and marketing achieve consensus around which digital channels will be pursued for specific product-segment pairings.

      Identification of the capabilities that IT must build.

      Activities

      2.1 Assess digital channel fit with specific products.

      2.2 Identify the digital usage patterns of target segments.

      2.3 Decide precisely which digital channels you will use to sell specific products to specific segments.

      2.4 Identify and prioritize the IT capabilities that need to be built to succeed on each digital channel.

      Outputs

      Documented channel fit with products.

      Documented channel usage by target segments.

      Listed digital channels that will be used for each product-segment pairing.

      Listed and prioritized capabilities that must be built to enable success on necessary digital channels.

      3 Enable Digital Marketing Capabilities and Leverage Analytics

      The Purpose

      Identification of the best possible way to build IT capabilities for all channels.

      Creation of a plan for leveraging transformational analytics to supercharge your digital marketing strategy.

      Key Benefits Achieved

      IT understanding of the costs and benefits of capability building options (people, process, and technology).

      Information about how specific technology vendors could fit with your organization.

      IT identification of opportunities to leverage transformational analytics in your organization.

      Activities

      3.1 Identify the gaps in your IT capabilities.

      3.2 Evaluate options for building capabilities.

      3.3 Identify opportunities for transformational analytics.

      Outputs

      A list of IT capability gaps.

      An action plan for capability building.

      A plan for leveraging transformational analytics.

      Optimize Applications Release Management

      • Buy Link or Shortcode: {j2store}406|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $44,874 Average $ Saved
      • member rating average days saved: 21 Average Days Saved
      • Parent Category Name: Testing, Deployment & QA
      • Parent Category Link: /testing-deployment-and-qa
      • The business demands high service and IT needs to respond. Rapid customer response through efficient release and deployment is critical to maintain high business satisfaction.
      • The lack of process ownership leads to chaotic and uncoordinated releases, resulting in costly rework and poor hand-offs.
      • IT emphasizes tools but release tools and technologies alone will not fix the problem. Tools are integrated into the processes they support – if the process challenges aren’t addressed first, then the tool won’t help.
      • Releases are traditionally executed in silos with limited communication across the entire release pipeline. Culturally, there is little motivation for cross-functional collaboration and holistic process optimization.

      Our Advice

      Critical Insight

      • Release management is not solely driven by tools. It is about delivering high quality releases on time through accountability and governance aided by the support of tools.
      • Release management is independent of your software development lifecycle (SDLC). Release management practices sit as an agnostic umbrella over your chosen development methodology.
      • Ownership of the entire process is vital. Release managers ensure standards are upheld and the pipeline operates efficiently.

      Impact and Result

      • Acquire release management ownership. Ensure there is appropriate accountability for speed and quality of the releases passing through the entire pipeline. A release manager has oversight over the entire release process and facilitates the necessary communication between business stakeholders and various IT roles.
      • Instill holistic thinking. Release management includes all steps required to push release and change requests to production along with the hand-off to Operations and Support. Increase the transparency and visibility of the entire pipeline to ensure local optimizations do not generate bottlenecks in other areas.
      • Standardize and lay a strong release management foundation. Optimize the key areas where you are experiencing the most pain and continually improve.

      Optimize Applications Release Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize release management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review your release management objectives

      Assess the current state and define the drivers behind your release management optimizations.

      • Optimize Applications Release Management – Phase 1: Review Your Release Management Objectives
      • Release Management Process Standard Template
      • Release Management Maturity Assessment

      2. Standardize release management

      Design your release processes, program framework, and release change management standards, and define your release management team.

      • Optimize Applications Release Management – Phase 2: Standardize Release Management
      • Release Manager

      3. Roll out release management enhancements

      Create an optimization roadmap that fits your context.

      • Optimize Applications Release Management – Phase 3: Roll Out Release Management Enhancements
      [infographic]

      Workshop: Optimize Applications Release Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Review Your Release Management Objectives

      The Purpose

      Reveal the motivators behind the optimization of release management.

      Identify the root causes of current release issues and challenges.

      Key Benefits Achieved

      Ensure business alignment of optimization efforts.

      Firm grasp of why teams are facing release issues and the impacts they have on the organization.

      Activities

      1.1 Identify the objectives for application release.

      1.2 Conduct a current state assessment of release practices.

      Outputs

      Release management business objectives and technical drivers

      Current state assessment of release processes, communication flows, and tools and technologies

      2 Standardize Release Management

      The Purpose

      Alleviate current release issues and challenges with best practices.

      Standardize a core set of processes, tools, and roles & responsibilities to achieve consistency, cadence, and transparency.

      Key Benefits Achieved

      Repeatable execution of the same set of processes to increase the predictability of release delivery.

      Defined ownership of release management.

      Adaptable and flexible release management practices to changing business and technical environments.

      Activities

      2.1 Strengthen your release process.

      2.2 Coordinate releases with a program framework.

      2.3 Manage release issues with change management practices.

      2.4 Define your release management team.

      Outputs

      Processes accommodating each release type and approach the team is required to complete

      Release calendars and program framework

      Release change management process

      Defined responsibilities and accountabilities of release manager and release management team

      3 Roll Out Release Management Enhancements

      The Purpose

      Define metrics to validate release management improvements.

      Identify the degree of oversight and involvement of the release management team.

      Prioritize optimization roadmap against business needs and effort.

      Key Benefits Achieved

      Easy-to-gather metrics to measure success that can be communicated to stakeholders.

      Understanding of how involved release management teams are in enforcing release management standards.

      Practical and achievable optimization roadmap.

      Activities

      3.1 Define your release management metrics.

      3.2 Ensure adherence to standards.

      3.3 Create your optimization roadmap.

      Outputs

      List of metrics to gauge success

      Oversight and reporting structure of release management team

      Release management optimization roadmap

      Modernize and Transform Your End-User Computing Strategy

      • Buy Link or Shortcode: {j2store}308|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $34,982 Average $ Saved
      • member rating average days saved: 25 Average Days Saved
      • Parent Category Name: End-User Computing Strategy
      • Parent Category Link: /end-user-computing-strategy

      IT needs to answer these questions:

      • What types of computing devices, provisioning models, and operating systems should be offered to end users?
      • How will IT support devices?
      • What are the policies and governance surrounding how devices are used?
      • What actions are we taking and when?
      • How do end-user devices support larger corporate priorities and strategies?

      Your answers need to balance choice, risk, and cost.

      Our Advice

      Critical Insight

      • Even if a user has a prestigious tablet, if the apps aren’t built well, they can’t get support on it, or they can’t connect, then that device is useless. Focus on supportability, use cases, connection, and policy – and the device.

      Impact and Result

      • Identify desired benefits that align to IT and corporate priorities and strategies.
      • Perform a persona analysis.
      • Define a vision for end-user computing.
      • Define the standard device and app offerings.
      • Improve the supporting services surrounding devices.
      • Develop a roadmap for implementing your strategy.

      Modernize and Transform Your End-User Computing Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. End-User Computing Strategy Deck – A step-by-step document to walk you through end-user computing trends and processes to improve customer satisfaction.

      This storyboard will help you identify your goals, build standard offerings for users, define governance and policies around offerings, and develop a roadmap for your EUC program.

      • Modernize and Transform Your End-User Computing Strategy – Phases 1-3

      2. End-User Computing Strategy Template – A repository for your current-state and persona analysis to identify technology requirements for each user group.

      Use these templates to document your end-user computing strategy. Follow the guidelines in the blueprint and record activity results in the template. The findings will be presented to the management team.

      • End-User Computing Strategy Template
      • User Group Analysis Workbook

      3. End-User Computing Ideas Catalog and Standard Offering Guide – Templates that guide you to document the outcome from persona analysis to define standard offerings and policies.

      The Ideas Catalog introduces provisioning models, form factors, and supported operating systems. Use the Standard Offering Template to document provisioning models and define computing devices along with apps and peripherals according to the outcome of the user group analysis.

      • Standard End-User Entitlements and Offerings Template
      • End-User Computing Ideas Catalog

      4. End-User Computing Policies – Policies that establish requirements for end-user computing.

      Use these policy templates to communicate the purposes behind each end-user computing decision and establish company standards, guidelines, and procedures for the purchase of technologies. The policies will ensure purchasing, reimbursement, security, and remote wiping enforcements are consistent and in alignment with the company strategy.

      • Mobile Device Connectivity & Allowance Policy
      • Purchasing Policy
      • Mobile Device Reimbursement Agreement
      • Mobile Device Reimbursement Policy
      • BYOD Acceptable Use Policy
      • Mobile Device Remote Wipe Waiver Template
      • General Security – User Acceptable Use Policy
      • Device Entitlement Policy Template

      Infographic

      Workshop: Modernize and Transform Your End-User Computing Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Set the Direction

      The Purpose

      Dig into the current state and build user persona.

      Key Benefits Achieved

      Determine your challenges and strengths.

      Delineate user IT requirements.

      Activities

      1.1 Assess the current state of end-user computing.

      1.2 Perform SWOT analysis.

      1.3 Map benefits to stakeholder drivers and priorities.

      1.4 Identify user groups.

      1.5 Identify supporting technology.

      1.6 Identify opportunities to provide value.

      Outputs

      SWOT analysis of current state

      Goals cascade

      Persona analysis

      2 Define the Offering

      The Purpose

      Define your EUC vision and standard offerings.

      Key Benefits Achieved

      Brainstorm EUC vision and mission.

      Find out the standard offerings.

      Set the direction for end-user computing to support shift-left enablement.

      Activities

      2.1 Prioritize benefits.

      2.2 Craft a vision and mission statement.

      2.3 Identify goals.

      2.4 Define guiding principles for your strategy.

      2.5 Select a provisioning model for each persona.

      2.6 Define the standard device offerings.

      2.7 Document each persona's entitlements.

      Outputs

      Vision statement, mission statement, and guiding principles

      Goals and indicators

      End-user device entitlements standard

      3 Support the Offering

      The Purpose

      Outline supporting practices and define policies for each use case.

      Key Benefits Achieved

      Document supporting practices.

      Document EUC policies.

      Activities

      3.1 Define device management tools and approach.

      3.2 Identify groups involved in supporting practices.

      3.3 Identify opportunities to improve customer service.

      3.4 Define acceptable use.

      3.5 Define BYOD policies.

      3.6 Define procurement and entitlement policies.

      3.7 Define security policies.

      Outputs

      List of management tools for end-user computing

      Roles and responsibilities for maintaining the end-user computing environment

      Opportunities to improve customer service

      End-user computing policy templates

      4 Bridge the Gap and Create the Roadmap

      The Purpose

      Build a user migration roadmap.

      Key Benefits Achieved

      Make the project a reality by documenting initiatives and building a roadmap.

      Activities

      4.1 Identify the gaps in devices, user support, use cases, policy & governance, and fitness for use.

      4.2 Plan the deployment and user migration journey.

      4.3 Document initiatives in the roadmap.

      Outputs

      Initiatives mapped to practice areas

      User migration journey map

      Further reading

      Modernize and Transform Your End-User Computing Strategy

      Support the workforce of the future.

      EXECUTIVE BRIEF

      Analyst Perspective

      Focus beyond the device

      It’s easy to think that if we give end users nice devices, then they will be more engaged and they will be happy with IT. If only it were that easy.

      Info-Tech Research Group has surveyed over 119,000 people through its CIO Business Vision diagnostic. The results show that a good device is necessary but not enough for high satisfaction with IT. Once a user has a decent device, the other aspects of the user’s experience has a higher impact on their satisfaction with IT.

      After all, if a person is trying to run apps designed in the 1990s, if they are struggling to access resources through an underperforming VPN connection, or if they can’t get help when their devices and apps aren’t working, then it doesn’t matter that you gave them a state-of-the-art MacBook or Microsoft Surface.

      As you build out your end-user computing strategy to reflect the new reality of today’s workforce, ensure you focus on shifting user support left, modernizing apps to support how users need to work, and ensuring that your network and collaboration tools can support the increased demands. End-user computing teams need to focus beyond the device.

      Ken Weston, ITIL MP, PMP, Cert.APM, SMC

      Research Director, Infrastructure and Operations Info-Tech Research Group

      Mahmoud Ramin, PhD

      Senior Research Analyst, Infrastructure and Operations Info-Tech Research Group

      Executive Summary

      Your Challenge

      IT needs to answer these questions:

      • What types of computing devices, provisioning models, and operating systems (OSes) should be offered to end users?
      • How will IT support devices?
      • What are the policies and governance surrounding how devices are used?
      • What actions are we taking and when?
      • How do end-user devices support larger corporate priorities and strategies?

      Your answers need to balance choice, risk, and cost.

      Common Obstacles

      Management paradigms have shifted:

      • OSes, device management, and IT asset management (ITAM) practices have changed.
      • Users expect full capabilities on any personal device.
      • Virtual desktops are switching to the cloud.
      • Low-code/no-code platforms allow the business to manage their own apps or comanage with IT.
      • Work-from-anywhere is the default.
      • Users have higher customer service expectations.

      Take end-user computing beyond the OS.

      Info-Tech's Approach

      This blueprint will help you:

      • Identify desired benefits that align to IT and corporate priorities and strategies.
      • Perform a persona analysis.
      • Define a vision for end-user computing.
      • Define the standard device and app offerings.
      • Improve the supporting services surrounding devices.
      • Develop a roadmap for implementing your strategy.

      A good device is necessary for satisfaction with IT but it’s not enough.

      If a user has a prestigious tablet but the apps aren’t built well, they can’t get support on it, or they can’t connect to the internet, then that device is useless. Focus on supportability, use cases, connection, policy – and device.

      Your challenge

      This blueprint will help you build a strategy that answers these questions:

      • What types of computing devices should be offered to end users?
      • What provisioning models will be used?
      • What operating systems are supported?
      • How will IT support devices?
      • What are the policies and governance surrounding how devices are used?
      • What actions are we taking and when?
      • How do end-user devices support larger corporate priorities and strategies?

      Definition: End-User Computing (EUC)

      End-user computing (EUC) is the domain of information and technology that deals with the devices used by workers to do their jobs. EUC has five focus areas: devices, user support, use cases, policy & governance, and fitness for use.

      A good end-user computing strategy will effectively balance:

      User Choice

      Cost

      Risk

      The right balance will be unique for every organization.

      Strike the right balance

      The discussion is larger than desktop support

      If IT is an influencer, then you get to drive this conversation. If IT is not an influencer, then you need to support whatever option the business wants.

      Cost Risk Choice Result
      Higher Education High importance Low importance High importance Full BYOD for professors. Standardized offerings for administration.
      Software Development Firms Low importance Medium/High importance High importance Standardized offerings for developers. Virtual desktops for users on BYOD.
      Legal Firm Medium importance High importance Low importance Partners offered prestigious devices. Everyone else uses Windows PCs. Virtual desktops and apps for remote access.

      Healthcare

      High importance High importance Low importance Nurses, janitors, and other frontline staff use shared tablets. Doctors are provisioned their own tablet. Admin staff and doctors are provisioned virtual desktops to maintain security and compliance.
      Government High importance High importance Low importance Standardized PC offerings for all employees. MacBooks are provided with justification. Devices managed with Intune and ConfigMgr.

      Good devices are necessary for overall IT satisfaction

      BUT

      Good devices are not enough for high satisfaction

      A bad device can ruin a person’s satisfaction with IT

      Info-Tech’s CIO Business Vision has shown that when someone is dissatisfied with their device, their satisfaction with IT overall is only 40.92% on average.

      When a person is satisfied with their device, their average satisfaction increases by approximately 30 percentage points to 70.22%. (Info-Tech Research Group, CIO Business Vision, 2021; N=119,383)

      The image is a bar graph, with the Y-axis labelled Overall IT Satisfaction. There are two bars, one labelled Satisfied With Devices, which is at 70.22%, and the other labelled Dissatisfied With Devices, which is at 40.92%.

      Improvements in the service desk, business apps, networks and communication infrastructure, and IT policy all have a higher impact on increasing satisfaction.

      For every one-point increase in satisfaction in those areas, respondents’ overall satisfaction with IT increased by the respective percentage of a point. (Info-Tech Research Group, CIO Business Vision, 2021; N=119,409)

      The image shows a graphic of five arrows pointing upwards. They are labelled (from right to left): Devices--42.20%; IT Policy--45.90%; Network & Comms Infra--59.49%; Business Apps--63.89%; Service Desk--65.19%, 1.54 times the impact of devices.

      End-User Paradigms Have Shifted

      Take end-user computing beyond the device

      Operating System - OS

      Only Windows

      • More choices than ever before

      Endpoint Management System - UEM

      Group Policy & Client Management

      • Modern & Unified Endpoint Management

      Personal Devices - BYOD

      Limited to email on phones

      • Full capabilities on any device

      IT Asset Management - ITAM

      Hands-on with images

      • Zero-touch with provisioning packages

      Virtual Desktops - DaaS

      Virtual Desktop Infrastructure in the Data Center

      • Desktop-as-a-Service in the cloud

      Business-Managed Apps - BMA

      Performed by IT

      • Performed by the Business and IT

      Work-From-Anywhere - WFA

      Rare

      • Default

      Customer Satisfaction - C Sat

      Phone calls and transactional interactions

      • Self-serve & managing entire experience

      Don’t limit your focus to only Windows and Macs

      Android is the OS with the largest market share

      Users and IT have more choices than ever before

      Operating System - OS

      Only Windows

      • More choices than ever before

      Microsoft is still the dominant player in end-user computing, but Windows has only a fraction of the share it once had.

      IT needs to revisit their device management practices. Modern management tools such as unified endpoint management (UEM) tools are better suited than traditional client management tools (CMT) for a cross-platform world.

      IT must also revisit their application portfolios. Are business apps supported on Android and iOS or are they only supported on Windows? Is there an opportunity to offer more options to end users? Are end users already running apps and handling sensitive data on Android and iOS through software-as-a-service and bring-your-own-device (BYOD) capabilities in Office 365 and Google apps?

      The image shows a bar graph titled OS Market Share, 2011-2021. On the x-axis are OS names with a bar in blue representing their market share in 2011, and a bar in purple showing their market share in 2021. The data shown is as follows: Windows--85.98% (2011), 31.62% (2021); Android--1.22% (2011), 40.85% (2021); iOS--2.1% (2011), 16.42% (2021); Mac OS X--6.19% (2011); 6.8% (2021); Other--4.51% (2011), 4.31% (2021). Source: StatCounter Global Stats.

      OS market share is partly driven by the digital divide

      If someone must choose between a smartphone and a computer, they go with a smartphone

      IT can’t expect everyone to be fluent on Windows and Mac, have a computer at home, or even have home broadband.

      Of US adults aged 18-29:

      • 96% have a smartphone (the rest have cellphones).
      • Only 70% of US adults aged 18-29 have a home broadband connection.

      Further, only 59% of US adults making less than $30,000/year have a laptop or desktop. (“Mobile Technology” and “Digital Divide,” Pew Research, 2021.)

      Globally, people are likelier to have a cell subscription than they are to have access to broadband.

      The image is a bar graph, with a list of countries on the X-axis, with each having two bars: blue indicating Fixed Broadband Subscriptions per 100 people and purple indicating Mobile Cellular Subscriptions per 100 people. In all listed countries, the number of Mobile Cellular Subscriptions per 100 people is higher than Fixed Broadband Subscriptions. Source: The World Bank, 2020. Most recent data for USA mobile cellular subscriptions is from 2019.

      Embrace new device management paradigms

      Endpoint Management System - UEM

      Group Policy & Client Management

      • Modern & Unified Endpoint Management

      Evaluate enterprise mobility management and unified endpoint management to better support a remote-first, cross-platform reality.

      Client Management Tool (CMT)

      CMTs such as Microsoft Endpoint Configuration Manager (ConfigMgr, aka SCCM) can be used to distribute apps, apply patches, and enforce group policy.

      Enterprise Mobility Management (EMM)

      EMM tools allow you to manage multiple device platforms through mobile device management (MDM) protocols. These tools enforce security settings, allow you to push apps to managed devices, and monitor patch compliance through reporting.

      EMM tools often support mobile application management (MAM) and mobile content management (MCM). Most EMM tools can manage devices running Windows, Mac OS, iOS, and Android, although there are exceptions.

      Unified Endpoint Management (UEM)

      UEM solutions combine CMT and EMM for better control of remote computers running Windows or Macs. Examples include:

      • Windows devices comanaged by Intune and ConfigMgr.
      • Mac devices managed by Jamf Pro.
      • Mac devices comanaged by Jamf Pro and Intune.

      Most UEM tools can manage devices running Windows, Mac OS, iOS, and Android, allowing IT to manage all end-user devices from a unified tool set (although there are exceptions).

      Mobile Application Management (MAM)

      MAM provides the ability to package an app with security settings, distribute app updates, and enforce app updates. Some capabilities do not require apps to be enrolled in an EMM or UEM solution.

      Mobile Content Management (MCM)

      MCM tools distribute files to remote devices. Many MCM solutions allow for security settings to be applied, such as encrypting the files or prohibiting data from leaving the secure container. Examples include OneDrive, Box, and Citrix ShareFile.

      Adopt modern management with EMM and UEM – better toolsets for today’s state of EUC

      Sacrifice your Group Policy Objects to better manage Windows computers

      Windows Management Features Traditional CMT Hybrid UEM Cloud-Based EMM
      Group Policy ✔ Primary management approach ✔ Available alongside configuration service providers X Replaced by configuration service providers
      Manage remote devices without VPN X X
      No longer manage and maintain images X ✔ Images are still available ✔ Images replaced by provisioning packages
      Secure and support BYOD X (Certain tools may offer limited MDM capabilities)
      Support remote zero-touch provisioning X (Only available via PXE boot)
      App, patch, update deployments Via defined distribution points Via defined distribution points or MAM Via MAM

      IT asset management practices are shifting

      IT Asset Management - ITAM

      Hands-on with images

      • Zero-touch with provisioning packages

      Supply chain issues are making computers longer to procure, meaning users are waiting longer for computers (Cision, 2021). The resulting silicon chip shortage is expected to last until at least 2023 (Light Reading, 2021).

      IT departments are delaying purchases, delaying refreshes, and/or purchasing more to reserve devices before they need them.

      Remote work has increased by 159% over the past 12 years (NorthOne, 2021). New hires and existing users can’t always go into the office to get a new computer.

      IT departments are paying vendors to hold onto computers and then drop-ship them directly to the end user. The devices are provisioned using zero touch (e.g. Autopilot, Apple Device Manager, or another tool). Since zero-touch provisioning tools do not support images, teams have had to switch to provisioning packages.

      The pandemic saw an increase in spending on virtual desktops

      Virtual desktops offered powerful tools for supporting remote devices and personal computers without compromising sensitive data

      Virtual Desktops - DaaS

      Virtual Desktop Infrastructure in the Data Center

      • Desktop-as-a-Service in the cloud

      The pandemic helped cloud-based virtual desktop infrastructure (VDI)

      Citrix saw subscription revenue increase 71% year over year in 2020 (Citrix 2020 Annual Report, p. 4). VMware saw subscription and SaaS revenue increase 38% from January 2020 to 2021 – while on-premises licensing revenue decreased by 5% (VMware Annual Report 2021, p. 40).

      IT no longer needs to manage the underlying infrastructure

      Microsoft and AWS are offering desktops as a service (i.e. cloud-based virtual desktops). IT needs to manage only the device, not the underlying virtual desktop infrastructure. This is in addition to Citrix’s and VMware’s cloud offerings, where IT doesn’t need to manage the underlying infrastructure that supports VDI.

      Visit the blueprint Implement Desktop Virtualization and Transition to Everything as a Service to get started.

      Work-from-anywhere (WFA) is now the default

      COVID-19 forced this shift

      Work-From-Anywhere - WFA

      Rare

      • Default

      Be prepared to support a hybrid workforce, where people are sometimes working remotely and sometimes working in the office.

      • Device provisioning and deployment need to be rethought. In-person deployment is not always possible. IT should evaluate tools such as zero-touch provisioning.
      • Service desks need better monitoring and management tools. End-user experience management (EUEM) can allow you to better identify where network issues are occurring – in your data center, at the user’s house, in the cloud, or somewhere in between. Remote control tools can then allow your tier 1 to remediate issues on the user’s device.
      • Apps and devices need to be usable from anywhere. Environments that rely on desktops and on-premises apps need to be rearchitected for a remote-first workforce.
      • Users are living inside video conferencing tools. With the impact of the COVID-19 pandemic, there are about 145 million daily users of Microsoft Teams, almost twice the number of users in 2020 (MUO, 2021). Ensure they have the training and expertise to effectively use these tools.

      “More technical troubleshooting due to users working from home a lot more. It can be more difficult to talk users through fixes when they are off site if you cannot remotely assist so more emphasis on the communication skill which was already important.” (Service Desk Institute, 2021)

      Visit the Hybrid Workplace Research Center to better support a hybrid workforce.

      BYOD fully includes personal computers

      It’s no longer about whether IT will allow BYOD

      Stop pretending BYOD doesn’t happen

      Personal Devices - BYOD

      Limited to email on phones

      • Full capabilities on any device
      • BYOD (including BYOPC) is turned on by default. SaaS tools like Office 365 are built to be used on multiple devices, including multiple computers. Further, the pandemic saw 47% of organizations significantly increase their use of BYOD (Cybersecurity Insiders, 2021; N=271).
      • BYOD can boost productivity. When employees can use smartphones for work, they report that it increases their productivity by 34 percent (Samsung Insights, 2016).
      • BYOD is hard to support, so most organizations don’t. Only 22% of organizations provide full support for mobile devices, while 20% provide no support, 25% provide ad hoc support, and 26% provide limited support (Cybersecurity Insiders, 2021). If smartphones and tablets are heavily ingrained in business processes, then migrating to BYOD can overload the service desk.
      • Securely enable employees. Mobile application management (MAM), mobile content management (MCM), and Office 365 have gotten smarter at protecting corporate data.

      Action Item: Identify how IT can provide more support to personally owned computers, tablets, and smartphones.

      58% of working Americans say their work devices are “awful to work on." (PCMag, 2021)

      But only 22% of organizations provide full support to BYOD. (Cybersecurity Insiders, 2021)

      IT must either provide better devices or start fully supporting users on personal PCs.

      Build governance practices for low-code development platforms

      Managing 1,000 different apps built out on low-code business process management platforms is hard, but it’s not nearly as hard as managing 1,000 unique SaaS apps or access databases

      Business-Managed Apps - BMA

      Performed by IT

      • Performed by the Business and IT

      Pros - Opportunities

      • Offers DIY to users
      • Business can build them quickly
      • IT has central visibility
      • IT can focus on the platform

      Cons - Threats

      • Sensitive data can get exposed
      • Users may have issues with continuity and backup
      • Responding to platform changes will be potentially challenging
      • Support may be difficult after the app creator leaves

      Action Item: Build a governance framework that describes the roles and responsibilities involved in business-owned apps. Identify the user’s role and end-user computing’s role in supporting low-code apps.

      Visit the blueprint Embrace Business-Managed Apps to learn how to build a governance framework for low-code development platforms.

      Visit the Low-Code Business Process Management SoftwareReviews category to compare different platforms.

      Update your customer service practices

      End users expect self-service and help from tier 1

      Re-evaluate how you support both corporate-issued and personal-owned computers and mobile devices

      Customer Satisfaction - C Sat

      Phone calls and transactional interactions

      • Self-serve & managing entire experience

      Microsoft’s 2019 “Global State of Customer Service” report shows that people have high expectations:

      • 31% of people expect call agents to have a “deep understanding of the caller’s relationship with the company”
      • 11% expect self-service capabilities

      End users have the same expectations of IT, the service desk, and end-user computing teams:

      • Users expect any IT person with whom they are talking to have a deep understanding of their devices, apps, open tickets, and closed tickets.
      • Users expect tier 1 to be able to resolve their incidents and requests without escalating to tier 2 or tier 3 end-user computing specialists.

      Most Important Aspects of Customer Service

      Resolving issue in one interaction - 35%

      Knowledgeable agent - 31%

      Finding information myself - 11%

      Not repeating information - 20%

      (Microsoft, 2019)

      Desktop engineering needs to shift left

      Revisit what work can only be done by tier 2 and tier 3 teams

      Shifting left involves shifting resolution of incidents and service requests down from more costly resources to the first line of support and to end users themselves through self-service options

      • Tier 1 needs up-to-date information on the end users’ devices and open tickets.
      • Users should be able to request apps and download those apps through a self-service portal, a software catalog, or an app store.
      • Tier 1 needs to be empowered to remote wipe devices, see troubleshooting and diagnostics information, and resolve incidents without needing to escalate.

      Action Item: Apply shift-left enablement to train tier 1 agents on troubleshooting more incidents and fulfilling more service requests. Build top-notch self-service capabilities for end users.

      The image is a graphic titled Shift-Left Strategy. At the top, it lists Auto-Fix; User, Tier 1, Tier 2/3, and Vendor. On the left, it lists Metrics vertically: Cost, Time, Satisfaction. A bar displays how high or low the metric is based on the categories listed at the top.

      Work with your service desk on the blueprint Optimize the Service Desk with a Shift-Left Strategy.

      Windows 11 is coming

      Prepare to make the jump

      The sooner you start, the easier the migration will be

      • Begin planning hardware refreshes. Old computers that do not have a TPM 2.0 chip are not currently supported on Windows 11 (“Enable TPM 2.0,” Microsoft, 2021). If you have old computers that will not support the jump to Windows 11– especially given the supply chain disruptions and silicon chip shortages – it is time to consider computer upgrades.
      • The end of Windows 10 is coming. Windows 10’s retirement date is currently October 14, 2025 (“Windows 10 Home and Pro,” Microsoft, 2021). If you want to continue running Windows 10 on older computers beyond that time, you will need to pay for extended support or risk those computers being more easily breached.
      • Begin testing your apps internally. Run Windows 11 within IT and test whether your apps will work on Windows 11.
      • Pilot Windows 11 with IT-friendlies. Find users that are excited for Windows 11 and will not mind a bit of short-term pain.
      • What is your risk appetite? Risk-averse organizations will want to wait until Microsoft, DISA, and/or Center for Internet Security have published security configuration best practices.

      Info-Tech’s approach

      Master the ever-expanding puzzle of end-user computing

      User Group Analysis

      Supported Devices and Apps

      Fitness for Use

      Device Support

      The Info-Tech difference:

      1. Balance user choice, risk mitigation, and cost optimization. The right balance will be unique for every organization.
      2. Standardize the nonstandard. Anticipate your users’ needs by having power options and prestigious options ready to offer.
      3. Consider multiple personas when building your standards, training, and migrations. Early Adopters, Late Adopters, VIP Users, Road Warriors, and Hoarders – these five personas will exist in one form or another throughout your user groups.

      Modernize and Transform Your End-User Computing Strategy

      Focus on the Big Picture

      End-User Paradigms Have Shifted

      Take end-user computing beyond the device

      Operating System - OS

      Only Windows

      • More choices than ever before

      Endpoint Management System - UEM

      Group Policy & Client Management

      • Modern & Unified Endpoint Management

      Personal Devices - BYOD

      Limited to email on phones

      • Full capabilities on any device

      IT Asset Management - ITAM

      Hands-on with images

      • Zero-touch with provisioning packages

      Virtual Desktops - DaaS

      Virtual Desktop Infrastructure in the Data Center

      • Desktop-as-a-Service in the cloud

      Business-Managed Apps - BMA

      Performed by IT

      • Performed by the Business and IT

      Work-From-Anywhere - WFA

      Rare

      • Default

      Customer Satisfaction - C Sat

      Phone calls and transactional interactions

      • Self-serve & managing entire experience

      Don't just focus on the device!

      Improvements in the service desk, business apps, networks and communication infrastructure, and IT policy have a higher impact on increasing satisfaction.

      Impact of End-User Satisfaction of IT by Area Compared to Devices

      Devices (x1.0)

      IT Policy (x1.09)

      Network & Communications Infrastructure (x1.41)

      Business Apps (x1.51)

      Service Desk (x1.54)

      (Info-Tech Research Group, CIO Business Vision, 2021; n=119,409)

      Build your strategy with these components...

      End-User Group Analysis

      • Work location
      • Information interactions
      • Apps
      • Data and files
      • Business capabilities
      • Current offering
      • Pain points
      • Desired gains

      Supported Devices & Apps

      • Primary computing device offerings
      • Power computing device offering
      • Prestigious device offerings
      • Secondary computing device offerings
      • Provisioning models
      • Standard apps
      • Peripherals

      Device Support

      • Self-service
      • Service Desk
      • Specialists

      Fitness for Use

      • Organizational policies
      • Security policies

      Vision

      ...to answer these questions:

      1. What devices will people have?
      2. How will you support these devices?
      3. How will you govern these devices?

      Balance choice, risk, and cost

      The right balance will be unique for every organization. Get the balance right by aligning your strategy's goals to senior leadership’s most important priorities.

      • User choice
      • Risk
      • Cost

      + Standardize the non-standard

      Have a more prestigious option ready for users, such as VIPs, who want more than the usual offerings. This approach will help you to proactively anticipate your users' needs.

      +Consider multiple personas when building your standards, training, and migrations

      These five personas will exist in one form or another throughout your user groups.

      • Early Adopters
      • Late Adopters
      • VIP Users
      • Road Warriors
      • Hoarders

      Use our approach to answer these questions:

      What computers will people have?

      Types of computing devices

      • Power desktop
      • Power laptop
      • Desktop
      • Laptop
      • Virtual Desktop
      • Thin Client Device
      • Pro Tablet
      • Tablet
      • Smartphone

      Corporate-Issued Approaches

      • Kiosk – Shared, Single Purpose
      • Pooled – Shared, Multipurpose
      • Persistent – Individual
      • Personally Owned

      Supported Operating Systems

      • Windows
      • Mac
      • Chrome OS
      • Linux
      • iOS/iPad OS
      • Android

      How will you support these devices?

      Device Management

      • Manual
      • CMT
      • EMM
      • UEM
      • Pooled Virtual Desktop Manager

      Supporting Practices

      • Self-Service
      • Tier 1 Support
      • Specialist Support

      How will you govern these devices?

      Corporate Policies

      • Personal Use Allowed?
      • Management and Security Policies
      • Personal Device Use Allowed?
      • Supported Apps and Use Cases
      • Who Is Allowed to Purchase?
      • Prohibited Apps and Use Cases
      • Device Entitlement
      • Stipends and/or Reimbursement to Users

      Use our blueprint to improve your EUC practices

      1. Devices
        • Corporate-issued devices
        • Standard offerings
      2. User Support
        • Self-service
        • Tier 1 support
      3. Use Cases
        • Providing value
        • Business apps
      4. Policy & Governance
        • Personal device use
        • IT policy
      5. Fitness for Use
        • Securing devices
        • Patching

      Info-Tech’s methodology for end-user computing strategy

      1. Set the Direction 2. Define the Offering 3. Build the Roadmap
      Phase Steps

      1.1 Identify Desired Benefits

      1.2 Perform a User Group Analysis

      1.3 Define the Vision

      2.1 Define the Standard Offerings

      2.2 Outline Supporting Services

      2.3 Define Governance and Policies

      3.1 Develop Initiatives
      Phase Outcomes

      Current-State Assessment

      Goals Cascade

      User Group Assessment

      Vision Statement

      Mission Statement

      Guiding Principles

      Standard Offerings by User Group

      Device Management Model

      Technical Support Model

      Device Entitlement Policy

      Acceptable Use Policy

      Remote Wipe Policy & Waiver

      Personal Device Reimbursement Policy

      End-User Migration Journey Map

      Strategy and Roadmap

      Insight summary

      Once users are satisfied with devices, focus on the bigger picture

      If end users are dissatisfied with devices, they will also be dissatisfied with IT. But if you don’t also focus on apps and supportability, then giving users better devices will only marginally increase satisfaction with IT.

      Bring it back to stakeholder priorities

      Before you build your vision statement, make sure it resonates with the business by identifying senior leadership’s priorities and aligning your own goals to them.

      Balance choice, risk, and cost

      The balance of user choice, risk mitigation, and cost optimization is unique for each company. Get the balance right by aligning your strategy’s goals to senior leadership’s most important priorities.

      Communicate early and often with users

      Expect users to become anxious when you start targeting their devices. Address this anxiety by bringing them into the conversation early in the planning – they will see that their concerns are being addressed and may even feel a sense of ownership over the strategy.

      Standardize the nonstandard

      When users such as VIP users want more than the standard offering, have a more prestigious option available. This approach will help you to proactively anticipate your users’ needs.

      Consider multiple personas when building your standards, training, and migrations

      Early Adopters, Late Adopters, VIP Users, Road Warriors, and Hoarders – these five personas will exist in one form or another throughout your user groups.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      User Group Analysis Workbook

      Use these worksheets to guide your analysis.

      End-User Computing Ideas Catalog

      Compare options for your end-user computing environment.

      Standard End-User Entitlements and Offerings

      Define your supported offerings and publish this document in your service catalog.

      Policy Templates

      Use these templates as a starting point for addressing policy gaps.

      Key deliverable:

      End-User Computing Strategy

      Document your strategy using this boardroom-ready template.

      Blueprint benefits

      IT Benefits

      • Deliver immediate value to end users.
      • Provide the best service based on the user persona.
      • Provide better device coverage.
      • Use fewer tools to manage a less diverse but equally effective array of end-user computing devices.
      • Provide more managed devices that will help to limit risk.
      • Have better visibility into the end-user computing devices and apps.

      Business Benefits

      • Conduct corporate business under one broad strategy.
      • Provide support to IT for specific applications and devices.
      • Take advantage of more scalable economies for providing more advantageous technologies.
      • Experience less friction between end users and the business and higher end-user satisfaction.

      Measure the value of this blueprint

      Your end-user computing strategy is an investment

      Track the returns on your investment, even if those returns are soft benefits and not cost reductions

      User Satisfaction

      • Satisfaction with device
      • Satisfaction with business apps
      • Satisfaction with service desk timeliness
      • Satisfaction with service desk effectiveness
      • Satisfaction with IT Employee engagement

      Total Cost

      • Spend on each type of device
      • Cost of licenses for management tools, operating systems, and apps
      • Cost of support agreements # of support tickets per device per employee
      • Time spent supporting devices per tier or support team
      • Time spent per OS/app release

      Risk Mitigation

      • # of devices that are end-of-life
      • % of devices in compliance
      • # of unmanaged devices
      • # of devices that have not checked in to management tool

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 10 calls over the course of 4 to 6 months.

      Phase 1: Set the Direction

      • Call #1: Review trends in end-user computing and discuss your current state.
      • Call #2: Perform a user group analysis.
      • Call #3: Identify desired benefits and map to stakeholder drivers.

      Phase 2: Define the Offering

      • Call #4: Define standard offerings.
      • Call #5: Select provisioning models.
      • Call #6: Outline supporting services and opportunities to shift end-user computing support left.
      • Call #7: Identify gaps in governance and policies.

      Phase 3: Build the Roadmap

      • Call #8: Develop initiatives.
      • Call #9: Plan migration and build roadmap.

      EUC Strategy Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Set the Direction Define the Offering Support the Offering Bridge the Gap and Create the Roadmap Next Steps and Wrap-Up (offsite)
      Activities

      1.1 Identify desired benefits.

      1.1.1 Assess the current state of end-user computing.

      1.1.2 Perform a SWOT analysis.

      1.1.3 Map benefits to stakeholder drivers and priorities.

      1.2 Analyze user groups.

      1.2.1 Identify user groups.

      1.2.2 Identify supporting technology.

      1.2.3 Record use cases.

      1.2.4 Identify opportunities to provide value.

      1.3 Define the vision.

      1.3.1 Prioritize benefits.

      1.3.2 Craft a vision and mission statement.

      1.3.3 Identify goals.

      1.3.4 Define guiding principles for your strategy.

      2.1 Define the standard offerings.

      2.1.1 Select a provisioning model for each persona.

      2.1.2 Define the standard device offerings.

      2.1.3 Document each personas’ entitlements.

      2.2 Outline supporting practices.

      2.2.1 Define device management tools and approach.

      2.2.2 Identify groups involved in supporting practices.

      2.2.4 Identify opportunities to improve customer service.

      2.3 Define policies. 2.3.1 Define acceptable use. 2.3.2 Define BYOD policies. 2.3.3 Define procurement and entitlement policies. 2.3.4 Define security policies.

      3.1 Develop initiatives.

      3.1.1 Identify the gaps in devices, user support, use cases, policy & governance, and fitness for use.

      3.1.2 Plan the deployment and user migration journey.

      3.1.3 Document initiatives in the roadmap .

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up time to review workshop deliverables and discuss next steps

      Deliverables
      1. SWOT analysis of current state
      2. Goals cascade
      3. Persona analysis
      1. Vision statement, mission statement, and guiding principles
      2. Goals and indicators
      3. End-user device entitlements standard
      1. List of management tools for end-user computing
      2. Roles and responsibilities for maintaining the end-user computing environment
      3. Opportunities to improve customer service
      4. End-user computing policy templates
      1. Initiatives mapped to practice areas
      2. User’s migration journey map
      1. End-user computing strategy template
      2. End-user computing roadmap

      Phase 1

      Set the Direction

      Set the Direction

      1.1 Identify Desired Benefits

      1.2 Perform a User Group Analysis

      1.3 Define the Vision

      Define the Offering

      2.1 Define the Standard Offerings

      2.2 Outline Supporting Services

      2.3 Define Governance and Policies

      Build the Roadmap

      3.1 Develop Initiatives

      This phase will walk you through the following activities:

      • Current-state analysis
      • Goals cascade
      • Persona analysis

      This phase involves the following participants:

      • End-User Computing Team
      • IT Leadership

      Set a direction that will create value for IT, stakeholders, and end users

      Use your insights to build your strategy

      Start by downloading Info-Tech’s End-User Computing Strategy Template

      1. Perform a stop-start-continue exercise for how IT supports end-user devices.
      2. Perform a goals cascade to identify how the end-user computing strategy can align with and support senior leaders’ priorities and strategic objectives.
      3. Perform a user group analysis to identify what IT can do to provide additional value to end users.
      4. Use the results to define a vision for your end-user computing strategy and in-scope benefits.

      Download the End-User Computing Strategy Template.

      Step 1.1

      Identify Desired Benefits

      Activities

      1.1.1 Assess the current state of end-user computing

      1.1.2 Perform a SWOT analysis

      1.1.3 Map benefits to stakeholder drivers and priorities

      Optional: Identify current total cost of ownership

      This step requires the following inputs:

      • Current approach for end-user computing
      • List of strengths and weaknesses of the current approach

      This step involves the following participants:

      • CIO
      • End-User Computing Team
      • IT Leadership
      • End-User Computing Manager

      Outcomes of this step

      • Defined success metrics that are tied to business value
      • Vision statement, mission statement, and guiding principles

      Review your current state for each end-user computing practice

      1. Devices
        • Corporate-issued devices
        • Standard offerings
      2. User Support
        • Self-service
        • Tier 1 support
      3. Use Cases
        • Providing value
        • Business apps
      4. Policy & Governance
        • Personal device use
        • IT policy
      5. Fitness for Use
        • Securing devices
        • Patching

      1.1.1 Assess the current state of end-user computing

      Discuss IT’s strengths and challenges

      Review your success in responding to the trends highlighted in the executive brief.

      • Start by reviewing the trends in the executive brief. Identify which trends you would like to focus on.
      • Review the domains below. Discuss:
        • Your current approach
        • Strengths about this approach
        • Challenges faced with this approach
      • Document the results in the “Current-State Assessment” section of your End-User Computing Strategy.
      1. Devices
        • Corporate-issued devices
        • Standard offerings
      2. User Support
        • Self-service
        • Tier 1 support
      3. Use Cases
        • Providing value
        • Business apps
      4. Policy & Governance
        • Personal device use
        • IT policy
      5. Fitness for Use
        • Securing devices
        • Patching

      Download the End-User Computing Strategy Template.

      Consider these aspects of end-user computing in your assessment

      Devices: As shown in the executive brief, devices are necessary for satisfaction in IT. In your current-state assessment, outline the principal means by which users are provided with a desktop and computing.

      • Corporate-issued devices: Document the types of devices (e.g. laptops, desktops, smartphones) and operating systems that IT currently supports.
        • Strengths: Highlight user satisfaction with your current offerings by referencing recent relationship surveys.
        • Challenges: Document corporate-issued devices where stakeholders and users are not satisfied, platforms that stakeholders would like IT to support, etc.
      • Standard offerings: Name the high-level categories of devices that you offer to end users (e.g. standard device, power device).
        • Strengths: Outline steps that IT has taken to improve the portfolio of standard offerings and to communicate the offerings.
        • Challenges: Identify areas to improve the standard offerings.

      User support: Examine how the end-user computing team enables a high-quality customer service experience. Especially consider self-service and tier 1 support.

      • Self-service: Describe the current state of your self-service capabilities (e.g. name of the self-service portal, number of apps in the app store).
        • Strengths: Outline successes with your self-service capabilities (e.g. use of self-service tools, recently deployed tools, newly supported platforms).
        • Challenges: Identify gaps in self-service capabilities.
      • Tier 1 support: Document the number of end-user computing incidents and service requests that are resolved at tier 1 as well as the number of incidents and service requests that are resolvable without escalation.
        • Strengths: Identify technologies that make first contact resolution possible. Outline other items that support tier 1 resolution of end-user computing tickets, such as knowledgebase articles and training programs.
        • Challenges: Document areas in which tier 1 resolution of end-user computing tickets is not feasible.

      Considerations (cont’d.)

      Use cases: Reflect on how IT and end-user computing supports users’ most important use cases. Consider these aspects:

      • Providing value: Identify the number of user groups for which you have completed a user group analysis. Outline your major approaches for capturing feedback, such as relationship surveys.
        • Strengths: Document any successful initiatives around stakeholder relationships and requirements gathering. You can also highlight successful metrics, such as high satisfaction scores from a team, department, or division.
        • Challenges: Identify where there are dissatisfied stakeholders and gaps in product offerings and where additional work around value generation is required.
      • Business apps: Outline your major business apps and your approach to improvement for these apps. If you need assistance gathering feedback from end users and stakeholders, you can use Info-Tech’s Application Portfolio Assessment.
        • Strengths: Show the EUC team’s successes in supporting critical business apps (e.g. facilitating user acceptance testing, deploying via endpoint management tool).
        • Challenges: Name business apps that are not meeting stakeholder needs. Consider if end users are dissatisfied with an app, if IT is unable to adequately monitor and support a business app, etc.

      Policy and governance: Document the current state of policies governing the use of end-user computing devices, both corporate-issued and personally owned. Review Step 2.3 for a list of policy questions to address and for links to policy templates.

      • Personal device use: Explain which users are allowed to use personally owned devices, what use cases are supported, and which types of devices are supported. Also, highlight explicit prohibitions.
        • Strengths: Highlight major accomplishments with BYOD, utilization metrics, etc. Consider including any platforms or apps that support BYOD (e.g. Microsoft Office 365).
        • Challenges: Identify where there are gaps in your support for personal devices. Examples can include insufficient management tools, lack of feedback from end users on BYOD support, undefined policies and governance, and inadequate support for personal devices.

      Considerations (cont’d.)

      IT policies: List your current policy documents. Include policies that relate to end-user computing, such as security policy documents; acceptable use policy documents; purchasing policies; documents governing entitlements to computers, tablets, smartphones, and prestigious devices; and employee monitoring policy documents.

      • Strengths: Outline the effectiveness of these policies, user compliance to these policies, and your success in enforcing these policies.
      • Challenges: Identify where you have gaps in user compliance, gaps in enforcing policies, many exceptions to a policy, etc.

      Fitness for use: Reflect on your ability to secure users, enterprise data, and computers. Document your current capabilities to ensure devices are adequately secured and risks adequately mitigated.

      • Securing devices: Describe your current approach to implementing security baselines, protecting data, and ensuring compliance.
        • Strengths: Highlight your accomplishments with ensuring devices meet your security standards and are adequately managed.
        • Challenges: Identify areas that are not adequately protected, where IT does not have enough visibility, and devices on which IT cannot enforce security standards.
      • Patching: Describe your current approach to distributing OS patches, distributing app patches, and ensuring patch compliance.
        • Strengths: Outline steps that IT has taken to improve release and deployment practices (e.g. user acceptance testing, deployment rings).
        • Challenges: When is IT unable to push a patch to a device? Outline when devices cannot receive a patch, when IT is unable to ensure patches are installed, and when patches are disruptive to end users.

      1.1.2 Perform a SWOT analysis

      Summarize your current-state analysis

      To build a good strategy, you need to clearly understand the challenges you face and opportunities you can leverage.

      • Summarize IT’s strengths. These are positive aspects internal to IT.
      • Summarize IT’s challenge. What internal IT weakness should the strategy address?
      • Identify high-level opportunities. Summarize positive factors that are external to IT (e.g. within the larger organization, strong vendor relationships).
      • Document threats. What external factors present a risk to the strategy?

      Record your SWOT analysis in the “Current-State Assessment” section of your End-User Computing Strategy Template.

      Download the End-User Computing Strategy Template.

      1.1.3 Map benefits to stakeholder drivers and priorities

      Use a goals cascade to identify benefits that will resonate with the business

      Identify how end-user computing will support larger organizational strategies, drivers, and priorities

      1. Identify stakeholders. Focus on senior leaders – user groups will be addressed in Step 1.2.
      2. For each stakeholder, identify three to five drivers or strategic priorities. Use the drivers as a starting point to:
        1. Increase productivity
        2. Mitigate risks
        3. Optimize costs
      3. Map the benefits you brainstormed in Step 1.1 to the drivers. It’s okay to have benefits map to multiple drivers.
      4. Re-evaluate benefits that don’t map to any drivers. Consider removing them.
      Stakeholder Drivers and Strategic Priorities End-User Computing Benefits
      CEO Ensure service continuity with remote work
      • Customers can still be served by remote workers
      Respond to COVID-19 changes with agility
      • Workers can transition seamlessly between working remotely and working in the office
      Reduce unnecessary costs
      • Standardize computer models to reduce spend on devices
      COO Business continuity: being able to work from home
      • Workers can transition seamlessly between working remotely and working in the office

      Record this table on the “Goals Cascade” slide in the “Vision and Desired Benefits” section of your End-User Computing Strategy Template.

      Use the CEO-CIO Alignment Program to identify which business benefits are most important.

      Sample end-user computing benefits

      Business Goals End-User Computing Benefits
      Manage risk Controls are effectively enforced on remote devices Sensitive data is secured Devices and data are accounted for
      Ensure service continuity Business processes can still function with remote personnel Customers can still be served by remote workers Personnel can be productive from anywhere IT practices can still operate remotely
      Comply with external regulation Improved ability to demonstrate compliance
      Respond to change with agility Personnel can be productive from anywhere More business processes can be performed remotely
      Improve operational efficiency More efficient sales practices More efficient customer service practices Increased number of digitized business processes Increased use of IT and HR self-service tools
      Offer competitive products and services Increased customer satisfaction with online services Number of piloted new products
      Manage people Increased employee productivity Increased employee engagement Increased talent attraction Increased workforce retention
      Make data-driven decisions Increased workforce retention Improved understanding of customers Access to accurate data on services and spending Improved IT cost forecasting
      Improve customer experience Increased customer satisfaction with online services Ability to scale up capacity to meet increased demand Customers can still be served by remote workers Improved customer self-service options
      Maximize stakeholder value Transition to OpEx spend and reduce CapEx investments Access to accurate data on services and spending Improved IT cost forecasting

      Optional: Identify current total cost of ownership

      Be mindful of hidden costs, such as those associated with supporting multiple devices and maintaining a small fleet of corporate devices to ensure business continuity with BYOD.

      • Use the Hardware Asset Management Budgeting Tool to forecast spend on devices (and infrastructure) based on project needs and devices nearing end of life.
      • Use the Mobile Strategy TCO Calculator to estimate the total cost of all the different aspects of your mobile strategy, including:
        • Training
        • Management platforms
        • Custom app development
        • Travel and roaming
        • Stipends and taxes
        • Support
      • Revisit these calculators in Phase 2. Use the TCO calculator when considering different approaches to mobility and end-user computing.

      Insert the results into your End-User Computing Strategy Template.

      Download the HAM Budgeting Tool.

      Download the Mobile Strategy TCO Calculator.

      Step 1.2

      Perform a User Group Analysis

      Activities

      1.2.1 Organize roles based on how they work

      1.2.2 Organize users into groups

      1.2.3 Document the current offerings

      1.2.4 Brainstorm pain points and desired gains for each user group

      This step requires the following inputs:

      • List of roles and technologies
      • User feedback
      • List of personas

      This step involves the following participants:

      • End-User Computing Team
      • IT Leadership
      • End-User Computing Manager

      Outcomes of this step

      • List of user groups and use cases for each group
      • List of current offerings for each user group
      • Value analysis for each user group

      Gather the information you need

      Use the Application Portfolio Assessment to run a relationship survey.

      Dive deeper with the blueprint Improve Requirements Gathering.

      List of Roles and Technology

      Organization chart: Consult with HR or department leaders to provide a list of the different roles that exist in each department.

      Identity access management tools: You can consult tools like Active Directory, but only if the data is clean.

      Apps and devices used: Run a report from your endpoint management tool to see what devices and apps are used by one another. Supplement this report with a report from a network management tool to identify software as a service that are in use and/or consult with department leaders.

      User Feedback

      Relationship surveys: Tools like the End-User Application Satisfaction Diagnostic allow you to assess overall satisfaction with IT.

      Focus groups and interviews: Gather unstructured feedback from users about their apps and devices.

      User shadowing: Observe people as they use technology to identify improvement opportunities (e.g. shadow meetings, review video call recordings).

      Ticket data: Identify apps or systems that users submit the most incidents about as well as high-volume requests that could be automated.

      1.2.1 Organize roles based on how they work

      Start by organizing roles into categories based on where they work and how they interact with information.

      1. Define categories of where people work. Examples include:
        1. In office, at home, at client sites
        2. Stationary, sometimes mobile, always mobile
        3. Always in same location, sometimes in different locations, always in different locations within a site, mobile between sites
      2. Define categories of how people interact with information. Examples include:
        1. Reads information, reads and writes information, creates information
        2. Cases, projects, relationships
      3. Build a matrix. Use the location categories on one axis and the interaction categories on the other axis.
      4. Place unique job roles on the matrix. Review each functional group’s organizational chart. It is okay if you don’t fill every spot. See the diagram on this page for an example.
      Always Works in the Same Location Sometimes Works in Different Locations Always Works in Different Locations
      Predominantly Reads Information
      • Janitor
      • Receptionist
      • Receiving
      • Accounts Payable Clerk
      Reads and Writes Information
      • Sales Rep
      • Sales Manager
      • Director of Sales
      • Developer
      • Scrum Master
      • Customer Service Agent
      • CS Manager
      • Call Center Director
      • Accountant
      • Controller
      • HR Specialist
      • Business Analyst
      • VP, Sales
      • Product Manager
      • Project Manager
      • Director of Engineering
      • VP, HR
      • CFO
      • Director of PMO
      • Field Sales Rep
      • CEO
      • CIO
      • COO
      Predominantly Creates Information
      • External Consultants
      • Design
      • Marketing
      • Copywriting

      1.2.2 Organize users into groups

      Populate a user group worksheet for each in-scope group.

      1. Within each quadrant, group similar roles together into “User Groups.” Consider similarities such as:
        1. Applications they use
        2. Data and files with which they interact
        3. Business capabilities they support
      2. Document their high-level profile:
        1. Where they work
        2. Sensitivity of data they access
        3. Current device and app entitlements
      3. Document the resulting user groups. Record each user group on a separate worksheet in the User Group Analysis Workbook.

      Download the User Group Analysis Workbook.

      1.2.3 Document the current offerings

      For each user group, document:

      • Primary and secondary computing devices: Their most frequently used computing devices.
      • Acceptable use: Whether corporate-issued devices are personally enabled.
      • BYOD: Whether this persona is authorized to use their personal devices.
      • Standard equipment provided: Equipment that is offered to everyone in this persona.
      • Additional devices and equipment offered: Equipment that is offered to a subset of this user group. These items can include more prestigious computers, additional monitors, and office equipment for users allowed to work remotely. This category can include items that require approval from budget owners.
      • Top apps: What apps are most commonly used by this user group? What common nonstandard apps are used by this user group?

      Standardize the nonstandard

      When users such as VIP users want more than the standard offering, have a more prestigious option available. This approach will help you to proactively anticipate your users’ needs.

      1.2.4 Brainstorm pain points and desired gains for each user group

      Don’t focus only on their experiences with technology

      Reference the common personas listed on the next page to help you brainstorm additional pain points and desired gains.

      1. Brainstorm pain points. Answer these questions for each role:
        1. What do people find tedious about their day-to-day jobs?
        2. What takes the most effort for them to do?
        3. What about their current toolset makes this user frustrated?
        4. What makes working difficult? Consider their experiences working from a home office, attending meetings virtually or in person, and working in the office.
        5. What challenges does that role have with each process?
      2. Brainstorm desired gains from their technology. Answer these questions for each role:
        1. For your end-user computing vision to become a reality for this persona, what outcomes or benefits are required?
        2. What benefits will this persona expect an end-user computing strategy to have?
        3. What improvements does this role desire?
        4. What unexpected benefits or outcomes would surprise this role?
        5. What would make this role’s day-to-day easier?
        6. What location-specific benefits are there (e.g. outcomes specific to working in the office or at home)?

      Record each user group’s pain points and desired gains on their respective worksheet.

      For additional questions you can ask, visit this Strategyzer blog post by Alexander Osterwalder.

      Info-Tech Insight

      Identify out-of-scope benefits?

      If that desired gain is required for the vision to be achieved for a specific role, you have two options:

      • Bring the benefit in scope. Ensure your metrics are updated.
      • Bring this user group out of scope. End-user computing improvements will not be valuable to this role without that benefit.

      Forcing a user group to use an unsatisfactory tool will severely undermine your chance of success, especially in the project’s early stages.

      Consider these common personas when brainstorming challenges and desired gains

      What unique challenges will these personas face within each of your user groups? What improvements would each of these personas expect out of an end-user computing strategy?

      Early Adopters

      • Like trying new ways of working and using the latest technology.
      • Very comfortable solving their own issues.
      • Enjoy exploring and creating new ways of handling challenges.

      Late Adopters

      • Prefer consistent ways of working, be it tech or business processes.
      • React to tech issues with anxiety and need assistance to get issues fixed.

      VIP

      • Has a prestigious job and would like to use technology that communicates their status.
      • Does not like to resolve their own issues.

      Road Warriors

      • Always on the go, running between work meetings and appointments.
      • Value flexibility and want devices, apps, and tech support that can be used anywhere at any time.

      Hoarders

      • Want to keep all their devices, data, and apps.
      • Will stall when they need to migrate devices or uninstall apps and become unresponsive any time there is a risk of losing something.

      Step 1.3

      Define the Vision

      Activities

      1.3.1 Prioritize which benefits you want to achieve

      1.3.2 Identify how you will track performance

      1.3.3 Craft a vision statement that demonstrates what you’re trying to create

      1.3.4 Craft a mission statement for your end-user computing team

      1.3.5 Define guiding principles

      This step requires the following inputs:

      • Goals cascade
      • List of benefits
      • List of critical success factors (CSFs)

      This step involves the following participants:

      • End-User Computing Manager
      • CIO
      • Help Desk Manager
      • Infrastructure Manager

      Outcomes of this step

      • End-User computing KPIs and metrics
      • Vision statement
      • Mission statement

      1.3.1 Prioritize which benefits you want to achieve

      Use the MoSCoW sorting technique

      Select benefits that appear multiple times in the goals cascade from Activity 1.1.3 as well as your challenges from your current-state assessment.

      1. Record which benefits are “Must Haves.” Select benefits that are most important to your highest-priority stakeholders.
      2. Record which benefits are “Should Haves.” These benefits are important but not critical.
      3. Record which benefits are “Could Haves.” These are low-priority benefits.
      4. Record the remaining benefits under “Won’t Have.” These benefits are out-of-scope but can be revisited in the future.

      Record the output in your End-User Computing Strategy Template under “Benefit Prioritization” in the “Vision and Desired Benefits” section.

      Sample output:

      Must Have Should Have Could Have Won't Have
      • Customers can still be served by remote workers.
      • Easier to work in multiple locations.
      • More options for provisioning computers to new workers.
      • Improved patching and security compliance checking of remote devices.
      • Self-service app installs on Windows.
      • More consistent experience across all devices and platforms, including BYOD.
      • Improved visibility into and manageability of BYOD.
      • Ability for users to create their own low-code apps (e.g. in Microsoft Power Apps).
      • Improved guidelines for running hybrid/remote meetings.
      • BYOD support for workers handling sensitive data.
      • Support for any type of Android smartphone or tablet.

      1.3.2 Identify how you will track performance

      1. List each unique high-priority benefit from Activity 1.3.1 as a critical success factor (CSF).
      2. For each CSF, identify key performance indicators (KPIs) that you can use to track how well you’re progressing on the CSF.
        1. Articulate that KPI as a SMART goal (specific, measurable, achievable, realistic, and timebound).
      3. For each KPI, identify the metrics you will use to calculate it.
      4. Identify how and when you will:
        1. Capture the current state of these metrics.
        2. Update changes to the metrics.
        3. Re-evaluate the CSFs.
        4. Communicate the progress to the project team and to stakeholders.

      Record this information in your End-User Computing Strategy Template.

      Sample output:

      Critical Success Factor Key Performance Indicator Metrics
      Improve remote worker productivity Increase employee engagement by 10% in two years
      • McLean Employee Engagement Score
      • Gallup Q Score
      Integrate relevant information sources into one spot for sales Integrate three information sources that will be useful to sales in one year
      • # of sales-specific apps integrated into a dashboard, portal, or workspace
      • Sales satisfaction scores
      Reduce real-estate costs Reduce office space by 50% in two cities over three years
      • $ spent on office leases
      Securely deliver all apps, information, and data to any device, anywhere, at any time Build the apps and information sources into a digital workspace for three business processes over one year
      • # of business processes supported in the workspace

      1.3.3 Craft a vision statement that demonstrates what you’re trying to create

      The vision statement communicates a desired future state of the IT organization. The statement is expressed in the present tense. It seeks to articulate the desired role of IT and how IT will be perceived.

      Strong IT vision statements have the following characteristics:

      • Describes a desired future
      • Focuses on ends, not means
      • Communicates promise
      • Is:
        • Concise; no unnecessary words
        • Compelling
        • Achievable
        • Inspirational
        • Memorable

      Sample IT Vision Statements:

      • To support an exceptional employee experience by providing best-in-class end-user devices.
      • Securely enable access to corporate apps and data from anywhere, at any time, on any device.
      • Enable business and digital transformation through secure and powerful virtualization technology.
      • IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset.

      1.3.4 Craft a mission statement for your end-user computing team

      The IT mission statement specifies the function’s purpose or reason for being. The mission should guide each day’s activities and decisions. The mission statement should use simple and concise terminology and speak loudly and clearly, generating enthusiasm for the organization.

      Strong IT mission statements have the following characteristics:

      • Articulate the IT function’s purpose and reason for existence
      • Describe what the IT function does to achieve its vision
      • Define the customers of the IT function
      • Can be described as:
        • Compelling
        • Easy to grasp
        • Sharply focused
        • Inspirational
        • Memorable
        • Concise

      Sample IT Mission Statements:

      • To provide infrastructure, support, and innovation in the delivery of secure, enterprise-grade information technology products and services that enable and empower the workforce at [Company Name].
      • To help fulfill organizational goals, the IT department is committed to empowering business stakeholders with technology and services that facilitate effective processes, collaboration, and communication.
      • The mission of the information technology (IT) department is to build a solid, comprehensive technology infrastructure; to maintain an efficient, effective operations environment; and to deliver high-quality, timely services that support the business goals and objectives of [Company Name].
      • The IT group is customer-centered and driven by its commitment to management and staff. It oversees services in computing, telecommunications, networking, administrative computing, and technology training.

      1.3.5 Define guiding principles

      Select principles that align with your stakeholders’ goals and objectives

      Use these examples as a starting point:

      IT Principle Name IT Principle Statement
      1. Enterprise value focus We aim to provide maximum long-term benefits to the enterprise as a whole while optimizing total costs of ownership and risks.
      2. Fit for purpose We maintain capability levels and create solutions that are fit for purpose without over-engineering them.
      3. Simplicity We choose the simplest solutions and aim to reduce operational complexity of the enterprise.
      4. Reuse > buy > build We maximize reuse of existing assets. If we can’t reuse, we procure externally. As a last resort, we build custom solutions.
      5. Managed data We handle data creation, modification, and use enterprise-wide in compliance with our data governance policy.
      6. Controlled technical diversity We control the variety of technology platforms we use.
      7. Managed security We manage, support, and assist in the implementation of security enterprise-wide in collaboration with our security governance team.
      8. Compliance to laws and regulations We operate in compliance with all applicable laws and regulations.
      9. Innovation We seek innovative ways to use technology for business advantage.
      10. Customer centricity We deliver best experiences to our end users by aligning to customer service best practices.

      Phase 2

      Define the Offering

      Set the Direction

      1.1 Identify Desired Benefits

      1.2 Perform a User Group Analysis

      1.3 Define the Vision

      Define the Offering

      2.1 Define the Standard Offerings

      2.2 Outline Supporting Services

      2.3 Define Governance and Policies

      Build the Roadmap

      3.1 Develop Initiatives

      This phase will walk you through the following activities:

      • Defining standard device entitlements and provisioning models for end-user devices and equipment
      • Shifting end-user computing support left
      • Identifying policy gaps

      This phase involves the following participants:

      • End-User Computing Team
      • IT Leadership

      Step 2.1

      Define the Standard Offerings

      Activities

      2.1.1 Identify the provisioning models for each user group

      2.1.2 Define the standard device offerings

      2.1.3 Document each user group’s entitlements

      This step requires the following inputs:

      • Standard End-User Entitlements and Offerings Template
      • List of persona groups
      • Primary computing devices
      • Secondary computing devices
      • Supporting operating systems
      • Applications and office equipment

      This step involves the following participants:

      • End-User Computing Manager
      • CIO
      • Help Desk Manager
      • Infrastructure Manager

      Outcomes of this step

      • End-user device entitlements and offerings standard

      This step will walk you through defining standard offerings

      You will define the base offering for all users in each user group as well as additional items that users can request (but that require additional approvals).

      1. Primary Computing Device
        • The main device used by a worker to complete their job (e.g. laptop for knowledge workers, kiosk or shared tablet for frontline workers).
      2. Secondary Computing Devices
        • Additional devices that supports a worker (e.g. a smartphone, tablet, personal computer).
      3. Provisioning Models
        • Whether the equipment is corporate-issued versus personally owned and whether personal use of corporate resources is allowed.
      4. Apps
        • The software used by the worker. Apps can be locally installed, cloud-based (e.g. SaaS), and/or virtualized and running remotely.
      5. Peripherals
        • Additional equipment provisioned to the end user (e.g. monitors, docking station, mice, keyboards).

      There is always a challenge of determining who gets what and when

      The goal is balancing cost, risk, and employee engagement

      The right balance will be different for every organization

      • IT can’t always say no to new ideas from the business. For example, if the organization wants to adopt Macs, rather than resisting IT should focus on identifying how Macs can be safely implemented.
      • Smartphones may not be necessary for a job, but they can be a valid employee perk. Not every employee may be entitled to the perk. There may be resentment between employees of the same level if one of the employees has a corporate-issued, business-only phone for their job function.
      • The same laptop model may not work for everyone. Some employees may need more powerful computers. Some employees may want more prestigious devices. Other employees may require a suite of apps that is only available on non-Windows operating systems.

      Action Item: Provide a defined set of standard options to the business to proactively address different needs.

      A good end-user computing strategy will effectively balance:

      • User Choice
      • Risk
      • Cost

      Your standard offerings need to strike the right balance for your organization.

      Review the End-User Computing Ideas Catalog

      Compare pros and cons of computing devices and operating systems for better decision making

      The catalog provides information about choices in:

      • Provisioning models
      • Operating systems
      • Device form factors

      Review the catalog to learn about items that can help your organization to achieve the desired vision from Phase 1.

      As you review the catalog, think about these questions:

      • What primary and secondary devices can you provide?
      • What operating systems do these devices support?
      • What are the provisioning models you will use, considering each model’s weaknesses and strengths?
      • How can you more effectively balance user choice, risk, and cost?

      Download the End-User Computing Ideas Catalog.

      2.1.1 Identify the provisioning models for each user group

      1. Review the definitions in the End-User Computing Ideas Catalog.
      2. Build a table. List the major user groups along the top of the table and applications down the rows.
      3. Brainstorm provisioning models that will be used for primary and secondary devices for each persona group.
      4. Record your provisioning models in the Standard End-User Entitlements and Offerings Template.

      Download the End-User Computing Ideas Catalog.

      Download the Standard End-User Entitlements and Offerings Template.

      Persona Primary Computing Device Secondary Laptops or Computers Smartphone Tablet
      Sales COPE BYOD BYOD BYOD
      Field Sales CYOD BYOD COBO COBO
      Customer Service COBO None None None
      Knowledge Worker COPE BYOD BYOD BYOD
      App Dev CYOPED None CYOD CYOD
      VIP CYOPED CYOPED CYOPE BYOD

      Identify multiple device options

      Offer standard, power, and prestigious offerings

      Prioritize offering models and align them with your user groups.

      • Standard device: This offering will work for most end users.
      • Power device: This offering will provide additional RAM, processor speed, storage, etc., for users that require it. It is usually offered as an additional option that requires approval.
      • Prestigious device: This offering will be provided to VIP users.
      • Portable device: This offering is for employees within a user group that moves around more often than others. This type of offering is optional – consider having a separate user group for these users that get a more portable laptop as their standard device.

      Standardize the nonstandard

      When users such as VIP users want more than the standard offering, have a more prestigious option ready to offer. This approach will help you to proactively anticipate your users’ needs.

      Who approves?

      Generally, if it is a supported device, then the budget owner determines whether to allow the user to receive a more powerful or more prestigious device.

      This decision can be based on factors such as:

      • Business need – does the user need the device to do their job?
      • Perk or benefit – is the device being offered to the end user as a means of increasing their engagement?

      If IT gets this answer wrong, then it can result in shadow IT

      Document your answer in the Device Entitlement Policy Template.

      2.1.2 Define the standard device offerings

      Consider all devices and their supporting operating systems.

      1. On a flip chart or whiteboard, build a matrix of the supported form factors and operating systems.
      2. For each cell, document the supported vendor and device model.
      3. Identify where you will provide additional options.
      Windows Mac OS iOS Android
      Laptops Lenovo T15 Gen 2 MacBook Pro 14” N/A N/A
      Power Laptops Lenovo ThinkPad X1 Carbon MacBook Pro 16” N/A N/A
      Prestigious Laptops Lenovo ThinkPad X1 Yoga Gen 6 MacBook Pro 16” N/A N/A
      Tablets Microsoft Surface N/A iPad Pro Samsung Galaxy Tab
      Smartphones N/A N/A iPhone 13 Samsung Galaxy S21

      2.1.3 Document each user groups’ entitlements

      Not every persona needs to be entitled to every supported option

      Use the Standard End-User Entitlements and Offerings Template as a starting point.

      • Create a separate section in the document for each persona. Start by documenting the provisioning models for each type of device.
      • Record the standard offering provided to members of each persona as well as additional items that can be provided with approval. Record this information for:
        • Primary computing devices
        • Secondary computing devices
      • Optional: Document additional items that will be provided to members of each persona as well as additional items they can request, such as:
        • Apps
        • Office equipment

      Download the Standard End-User Entitlements and Offerings Template.

      Step 2.2

      Outline Supporting Services

      Activities

      2.2.1 Review device management tools and capabilities

      2.2.2 Identify common incidents and requests for devices

      2.2.3 Record how you want to shift resolution

      2.2.4 Define which IT groups are involved in supporting practices

      Define the Offering

      This step requires the following inputs:

      • Standard End-User Entitlements and Offerings Template
      • List of supporting devices
      • Common incidents and requests
      • List of supporting practices

      This step involves the following participants:

      • End-User Computing Manager
      • CIO
      • Help Desk Manager
      • Infrastructure Manager

      Outcomes of this step

      • List of IT groups who are involved in supporting devices
      • Responsibilities of each group for requests and incidents

      2.2.1 Review device management tools and capabilities

      Document the tools that you use to manage each OS and identify gaps

      If there are different approaches to managing the same OS (e.g. Windows devices that are co-managed versus Windows devices that are only managed by Intune), then list those approaches on separate rows.

      Provision Protect from loss/theft Deploy/update apps Backup & protect Protect from injections Complies with policies Track Decommission
      Windows 10 & 11 (co-managed) Autopilot Gap ConfigMgr Gap Windows Security ConfigMgr ConfigMgr Intune Intune and Autopilot
      Windows 10 & 11 (Intune) Autopilot Intune (remote wipe) Intune OneDrive for Business Windows Security Microsoft Advanced Threat Protection Intune Intune and Autopilot
      Mac OS Jamf Pro Intune (remote wipe) Jamf Pro OneDrive for Business Gap Jamf Pro Intune Jamf Pro

      Document the results on the “IT Management Tools” slide in the “IT Support” section of your End-User Computing Strategy Template.

      2.2.2 Identify common incidents and requests for devices

      Analyze your service desk ticket data. Look for the following information:

      • The most common incidents and service requests around end-user devices and business apps
      • Incident categories and service requests that almost always involve escalations

      Record the level at which these tickets can be resolved today. Ensure you include these groups:

      • Tier 0 (i.e. end-user self-service)
      • Tier 1 (i.e. user’s first point of contact at the service desk)
      • Desk-side support and field-support groups
      • End-user computing specialist teams (e.g. desktop engineering, mobile device management teams)
      • Other specialist teams (e.g. security, enterprise applications, DevOps)

      Record the desired state. For each incident and request, to where do you want to shift resolution?

      Record this chart on the “Current State of IT Support” slide in the “IT Support” section of your End-User Computing Strategy Template.

      Most Common Incidents & Requests Self-Service Service Desk Tier 1 Desk-Side or Field Support End-User Computing
      Connect/fix a printer X
      Web conferencing issue X
      Bluetooth issues X
      Outlook issues X
      Install standard app X
      Install app requiring approval X
      Install nonstandard app X
      Enroll personal iOS/Android device X
      Enroll personal Mac/Windows computer X
      Perform a factory reset on a lost or stolen device X
      Unenroll device X

      2.2.3 Record how you want to shift resolution

      Identify opportunities to improve self-service and first contact resolution.

      Starting with the chart you created in Activity 2.2.2, record the desired state. For each incident and request, to where do you want to shift resolution?

      • Identify quick wins. Where will it take low effort to shift resolution? Denote these items with a “QW” for quick win.
      • Identify high-value, high-effort shifts. Where do you want to prioritize shifting resolution? Base this decision on the desired benefits, guiding principles, and vision statement built in Phase 1. Denote these items with an “H” for high.
      • Identify low-value areas. Where would shifting provide low value to end users and/or would have low alignment to the benefits identified in Phase 1? Denote these items with an “L” for low.
      • Identify where no shift can occur. Some items cannot be shifted to self-service or to tier 1 due to governance considerations, security factors, or technical complexity. Denote these items with an “OoS” for out of scope.

      Use the “Opportunities to Provide Self-Service and Articles” and “Desired State” slides in the “IT Support” section of your End-User Computing Strategy Template to document quick wins and high-value, high-effort shifts.

      Most Common Incidents & Requests Self-Service Service Desk Tier 1 Desk-Side or Field Support End-User Computing
      Connect/fix a printer H QW X
      Web conferencing issue H X
      Bluetooth issues L X
      Outlook issues H H X
      Install standard app X
      Install app requiring approval H X
      Install nonstandard app OoS X
      Enroll personal iOS/Android device QW QW X
      Enroll personal Mac/Windows computer QW QW X
      Perform a factory reset on a lost or stolen device QW QW X
      Unenroll device QW QW X

      2.2.4 Define which IT groups are involved in supporting practices

      Repeat activities 2.2.2 and 2.2.3 with the following list of tasks

      IT Asset Management

      • Purchasing devices
      • Purchasing software licenses
      • Imaging devices
      • Deploying devices
      • Deploying software
      • Recovering devices
      • Recovering software

      Release Management

      • Testing patches
      • Testing app updates
      • Testing OS updates
      • User acceptance testing

      Managing Service Catalogs

      • Defining standard device offerings
      • Defining standard software offerings
      • Defining device and software entitlements
      • Updating published catalog entries

      Knowledge Management

      • Writing internal KB articles
      • Writing user-facing articles
      • Training specialists
      • Training service desk agents
      • Training users

      Portfolio Management

      • Prioritizing app upgrades or migrations
      • Prioritizing OS migrations
      • Prioritizing end-user computing projects

      Step 2.3

      Define Governance and Policies

      Activities

      2.3.1 Answer these organizational policy questions

      2.3.2 Answer these security policy questions

      Define the Offering

      This step requires the following inputs:

      • List of supporting devices
      • List of persona groups
      • List of use cases

      This step involves the following participants:

      • End-User Computing Manager
      • CIO
      • Help Desk Manager
      • Infrastructure Manager

      Outcomes of this step

      • End-user computing organizational and security policies

      Focus on organizational policies and enforcement

      Policies set expectations and limits for mobile employees

      Enforcement refers to settings on the devices, management and security tools, and process steps.

      • Policies define what should and should not be done with user-facing technology. These policies define expectations about user and IT behavior.
      • Enforcement ensures that policies are followed. User policies must often be enforced through human intervention, while technology policies are often enforced directly through infrastructure before any people get involved.

      Use the “Policies” section in the End-User Computing Strategy Template to document the answers in this section. Activities 2.3.2 and 2.3.3 present links to policy templates. Use these templates to help address any gaps in your current policy suite.

      2.3.1 Answer these organizational policy questions

      Identify if there are different expectations for certain user groups, where exceptions are allowed, and how these policies will be enforced.

      Entitlements

      • Who is entitled to receive and use prestigious computers?
      • Who is entitled to receive and use a smartphone?
      • What users are entitled to a stipend for personal device use?

      Personal Device Use

      • What use cases are supported and are not supported on personal devices?
      • What level of visibility and control does IT need over personal devices?

      Acceptable Use

      • Are people allowed to use corporate resources for personal use?
      • What are the guidelines around personal use?
      • Are users allowed to install personal apps on their corporate-issued computers and/or mobile devices?

      Purchasing and Reimbursement

      • Who is allowed to purchase devices? Apps?
      • When can users file a reimbursement request?

      Employee Monitoring

      • What user information is monitored?
      • When can that information be used and when can it not be used?

      Use the “Policies” section of the End-User Computing Strategy Template to document these answers.

      Identify organizational policy gaps

      Use these templates as a starting point

      Entitlements

      Download the Mobile Device Connectivity & Allowance Policy template.

      Purchasing & Reimbursement

      Download the Purchasing Policy template.

      Download the Mobile Device Reimbursement Policy template.

      Download the Mobile Device Reimbursement Agreement template.

      Acceptable Use

      Download the General Security – User Acceptable Use Policy template.

      Personal Device Use

      Download the BYOD Acceptable Use Policy template.

      Download the Mobile Device Remote Wipe Waiver template.

      Employee Monitoring

      Download the General Security – User Acceptable Use Policy template.

      Visit the Reduce and Manage Your Organization’s Insider Threat Risk blueprint to address this gap.

      2.3.2 Answer these security policy questions

      Identify if there are different expectations for certain user groups, where exceptions are allowed, and how these policies will be enforced.

      Use Cases

      • What data and use cases are subject to stricter security measures?
      • Are certain use cases or data prohibited on personal devices?
      • Are there restrictions around where certain use cases are performed and by whom?

      Patching

      • Are users expected to apply OS and app updates and patches? Or does IT automate patching?

      Physical Security

      • What does the user need to do to secure their equipment?
      • If a device is lost or stolen, who does the user contact to report the lost or stolen device?

      Cybersecurity

      • How will IT enforce security configuration baselines?
      • What does the user need to do (or not do) to secure their device?
      • Are certain users allowed to have local admin rights?
      • What happens when a device doesn’t comply with the required security configuration baseline?

      Use the “Policies” section of the End-User Computing Strategy Template to document these answers.

      Identify security policy gaps

      Use these templates as a starting point

      Use Cases

      Download the General Security – User Acceptable Use Policy template.

      Visit the Discover and Classify Your Data blueprint to address this gap.

      Patching

      Download the General Security – User Acceptable Use Policy template.

      Physical and Cyber Security

      Download the General Security – User Acceptable Use Policy template.

      Visit the Develop and Deploy Security Policies blueprint to address this gap.

      For help defining your own security configuration baselines for each operating system, reference best practice documentation such as:

      National Institute of Standards and Technology’s National Checklist Program.

      Center for Internet Security’s solutions.

      Microsoft’s security baseline settings for Windows 10 and 11 Configuration Service Providers.

      Phase 3

      Build the Roadmap

      Set the Direction

      1.1 Identify Desired Benefits

      1.2 Perform a User Group Analysis

      1.3 Define the Vision

      Define the Offering

      2.1 Define the Standard Offerings

      2.2 Outline Supporting Services

      2.3 Define Governance and Policies

      Build the Roadmap

      3.1 Develop Initiatives

      This phase will walk you through the following activities:

      • Defining initiatives for each EUC domain
      • Building a customer journey map for any end-user computing migrations
      • Building a roadmap for EUC initiatives

      This phase involves the following participants:

      • End-User Computing Team

      Step 3.1

      Develop Initiatives

      Activities

      3.1.1 Identify initiatives for each EUC practice

      3.1.2 Build out the user’s migration journey map

      3.1.3 Build out a list of initiatives

      Build the Roadmap

      This step requires the following inputs:

      • User group workbook
      • Migration initiatives

      This step involves the following participants:

      • Infrastructure Director
      • Head of End-User Computing
      • End-User Computing Team
      • Project Manager (if applicable)

      Outcomes of this step

      • End-user computing roadmap
      • Migration plan

      3.1.1 Identify the gaps in each EUC area

      Build a high-level profile of the changes you want to make

      For each of the five areas, build a profile for the changes you want to implement. Record:

      1. The owner of the area
      2. The objective that you want to accomplish
      3. The desired benefits from focusing on that area
      4. Any dependencies to the work
      5. Risks that can cause the objective and benefits to not be achieved

      Identify the initiatives involved in each area.

      Document these profiles and initiatives in the “Roadmap” section of your End-User Computing Strategy Template.

      1. Devices
        • Corporate-issued devices
        • Standard offerings
      2. User Support
        • Self-service
        • Tier 1 support
      3. Use Cases
        • Providing value
        • Business apps
      4. Policy & Governance
        • Personal device use
        • IT policy
      5. Fitness for Use
        • Securing devices
        • Patching

      Your initiatives may require a user migration

      Plan the user’s migration journey

      Consider each user group’s and each persona’s unique needs and challenges throughout the migration.

      1. Preparing to migrate: The user may need to schedule the migration with IT and back up files.
      2. Migrating: IT executes the migration (e.g. updates the OS, changes management tools).
      3. Getting assistance: When a user experiences an error during the migration, how will they get help from IT?
      4. Post-migration: How will IT and the user know that the migration was successful one week later?

      Understand the three migration approaches

      Online

      Users execute the migrate on their own (e.g. Microsoft’s consumer migration to Windows 10).

      In person

      Users come in person, select a device, and perform the migration with a specialist. If the device needs support, they return to the same place (e.g. buying a computer from a store).

      Hybrid

      Users select a device. When the device is ready, they can schedule time to pick up the device and perform the migration with a specialist (e.g. purchasing an iPhone in advance from Apple’s website with in-store pick-up).

      Be prepared to support remotely

      Migrations to the new tool may fail. IT should check in with the user to confirm that the device successfully made the migration.

      3.1.2 Build out the user’s migration journey map

      Contemplate a roadmap to plan for end-user computing initiatives

      • As a group, brainstorm migration initiatives.
      • For each of the four phases, identify:
        • User activities: actions we need the user to do
        • IT activities: actions and processes that IT will perform internally
        • User touchpoints with IT: how the user will interact with the IT group
        • Opportunities: ideas for how IT can provide additional value to the end user in this phase.
      • Use the example in the End-User Computing Strategy Template as a starting point.

      Download the End-User Computing Strategy Template.

      Embed requirements gathering throughout your roadmap

      Use a combination of surveys, focus groups, and interviews

      You’re doing more than eliciting opinions – you’re performing organizational change management.

      • Use surveys to profile the demand for specific requirements. When a project is announced, develop surveys to gauge what users consider must-have, should-have, and could-have requirements.
      • Interviews should be used with high-value targets. Those who receive one-on-one face time can help generate good requirements and allow for effective communication around requirements.
      • Focus groups are used to get input from multiple people in a similar role. This format allows you to ask a few open-ended questions to groups of about five people.

      The benefits of interviews and focus groups:

      • Foster direct engagement: IT is able to hear directly from stakeholders about what they are looking to do with a solution and the level of functionality that they expect from it.
      • Offer greater detail: With interviews, greater insight can be gained by leveraging information that traditional surveys wouldn’t uncover. Face-to-face interactions provide thorough answers and context that helps inform requirements.
      • Remove ambiguity: Face-to-face interactions allow opportunities to follow up on ambiguous answers. Clarify what stakeholders are looking for and expect in a project.
      • Enable stakeholder management: Interviews are a direct line of communication with project stakeholders. They provide input and insight and help to maintain alignment, plan next steps, and increase awareness within the IT organization.

      Activity instructions:

      1. Early requirements ideation: Identify who you want to interview through one-on-one meetings and focus groups.
      2. Requirements validation and prioritization: Identify which user groups you plan to survey and when.
      3. Usability testing: Plan to include usability testing during each phase. Build it into your release practices.

      3.1.3 Build out a list of initiatives

      Download a copy of the Roadmap Tool

      On tab “1. Setup”:

      • Update category 1 to be all the EUC areas (i.e. Devices, User Support).
      • Update category 2 and category 3 with meaningful items (e.g. operating system, device model, persona group).

      Use tab “2. Data Entry” to record your list of initiatives.

      • Each initiative should have its own row. Write a high-level summary under “Roadmap Item” and include more detail under “Description and Rationale.”
      • Enter each initiative’s effort, priority, and timeline for beginning. These are mandatory fields for tab “3. Roadmap” to work properly.

      Use tab “3. Roadmap” to visualize your data. You will have to press “Refresh All” under Data in the ribbon for the PivotChart to update.

      Copy the roadmap visual on tab “3. Roadmap” into your End-User Computing Strategy Template. You can also copy the list of initiatives over into the document.

      Download the Roadmap Tool.

      Summary of Accomplishment

      Problem Solved

      You built a strategy to improve the balance between user enablement, risk mitigation, and cost optimization. Throughout the blueprint, you identified opportunities to provide additional value to end users and stakeholders during these activities:

      • Goals cascade
      • User group analysis
      • Definition of standard device types and platforms
      • IT support shift-left analysis
      • Policy gap analysis
      • Roadmapping

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Identify User Groups

      Identify each user group based on the business processes, tasks, and applications they use.

      Define Standard Device Offerings

      Record your provisioning models for each user group and the primary and secondary devices, apps, and peripherals that each group receives.

      Related Info-Tech Research

      Simplify Remote Deployment With Zero-Touch Provisioning

      This project helps you align your zero-touch approach with stakeholder priorities and larger IT strategies. You will be able to build your zero-touch provisioning and patching plan from both the asset lifecycle and the end-user perspective to create a holistic approach that emphasizes customer service. Tailor deployment plans to more easily scope and resource deployment projects.

      Implement Hardware Asset Management

      This project will help you analyze the current state of your HAM program, define assets that will need to be managed, and build and involve the ITAM team from the beginning to help embed the change. It will also help you define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.

      Govern Office 365

      This project will help you conduct a goals exercise and capability assessment for Office 365. You will be able to refine governance objectives, build out controls, formalize governance, build out one pagers, and finalize a communication plan.

      Research Contributors and Experts

      • Steve Fox, Deputy IT Director, Virginia State Corporation Commission
      • Mazen Joukhadar, TransForm Shared Service Organization
      • Nathan Schlaud, PMO Senior Director, RPC Inc.
      • Rebecca Mountjoy, Infrastructure Systems Manager, BlueScope Buildings
      • DJ Robins, Director of Information Technology, Mohawk MedBuy
      • Jason Jenkins, Tech. Specialist, Michal Baker Corp.
      • Brad Wells, IT Infrastructure Solutions Architect, London Police Service
      • Danelle Peddell, Director, Project Management Office, Emco Corporation
      • John Annand, Principal Research Director, Info-Tech Research Group
      • Allison Kinnaird, Research Director and Research Lead, Info-Tech Research Group
      • Sandi Conrad, Principal Research Director, Info-Tech Research Group
      • Andrew Kum-Seun, Senior Research Analyst, Info-Tech Research Group
      • Mark Tauschek, Vice President IT Infrastructure & Operations Research, Info-Tech Research Group

      A special thank-you to 6 anonymous contributors

      Bibliography

      “2020 Annual Report and Proxy.” Citrix, 2020. Accessed Oct. 2021.

      “2021 BYOD Security Report.” Cybersecurity Insiders, 2021. Web.

      Anderson, Arabella. “12 Remote Work Statistics to Know in 2022.” NorthOne, 2021. Accessed Oct. 2021.

      Bayes, Scarlett. “ITSM: 2021 & Beyond.” Service Desk Institute, 14 April 2021, p. 14. Web.

      Belton, Padraig. “Intel: Chip shortage will extend to at least 2023.” Light Reading, 22 Oct. 2021. Web.

      Beroe Inc. “Demand for PC Components Saw a Surge Due to COVID-19, Says Beroe Inc.” Cision PR Newswire, 2 Sept. 2021. Web.

      Devaraj, Vivekananthan. “Reference Architecture: Remote PC Access.” Citrix, 2021. Accessed Aug. 2021.

      “Elements of the Project Charter and Project Scope Statement.” A Guide to PMBOK, 7th edition, PMI, 2021. Accessed Sept. 2021.

      Elliott, Christopher. “This Is How The Pandemic Improved Customer Service.” Forbes, 2021. Accessed Oct. 2021.

      “Enable TMP 2.0 on your PC.” Microsoft, Support, Aug. 2021. Web.

      “End User Computing Trends to Look Out for in 2021.” Stratodesk, 30 Oct. 2020. Accessed September 2021.

      “Global State of Customer Service: The Transformation of Customer Service from 2015 to Present Day.” Microsoft, 2019. Web.

      Goodman, Elizabeth et al. “Observing the User Experience” A Practitioner's Guide to User Research, 2nd edition. Elsevier, 2012. Accessed Sept. 2021.

      Govindarajulu, Chittibabu. “An Instrument to Classify End-Users Based On the User Cube” Informing Science, June 2002. Accessed September 2021.

      Griffith, Eric. “Remote Employees to Bosses: Our PCs Suck!” PCMag, 11 Oct. 2021. Web.

      Hutchings, Jeffrey D., and Craig A. de Ridder. “Impact of Remote Working on End User Computing Solutions and Services.” Pillsbury, 2021. Accessed Sept. 2021

      “ITIL4 Create, Deliver, and Support.” Axelos, 2020. Accessed Sept. 2021.

      “ITIL4 Drive Stakeholder Value” Axelos, 2020. Accessed Sept. 2021.

      Mcbride, Neil, and Trevor Wood-Harper. “Towards User-Oriented Control of End-User Computing in Large Organizations” Journal of Organizational and End User Computing, vol. 14, no. 1, pp. 33-41, 2002. Accessed September 2021.

      ““Microsoft Endpoint Configuration Manager Documentation.” Microsoft Docs, Microsoft, 2021. Accessed Sept. 2021.

      “Microsoft Intune documentation.” Microsoft Docs, Microsoft. Accessed Sept. 2021.

      “Mobile Cellular Subscriptions (per 100 People).” The World Bank, International Telecommunication Union (ITU) World Telecommunication/ICT Indicators Database, 2020. Web.

      Morgan, Jacob. “The Employee Experience Advantage: How to Win the War for Talent by Giving Employees the Workspaces they Want, the Tools they Need, and a Culture They Can Celebrate.” Wiley, 2017. Accessed Sept. 2021.

      Murphy, Anna. “How the pandemic has changed customer support forever.” Intercom, 2021. Accessed Sept. 2021.

      “Operating System Market Share Worldwide, Jan 2021-Jan 2022.” StatCounter GlobalStats, 2022. Web.

      “Operating System Market Share Worldwide, Jan-Dec 2011.” StatCounter GlobalStats, 2012. Web.

      Pereira, Karla Susiane, et al. “A Taxonomy to Classify Risk End-User Profile in Interaction with the Computing Environment.” In: Tryfonas T. (eds.) Human Aspects of Information Security, Privacy, and Trust. HAS 2016. Lecture Notes in Computer Science, vol. 9750. Accessed Sept. 2021.

      Perrin, Andrew. “Mobile Technology and Home Broadband 2020.” Pew Research Center, 3 June 2021. Web.

      Quan-Haase, Anabel. “Technology and Society: Social Networks, Power, and Inequality” Oxford University Press, 2012. Accessed Aug. 2021.

      Reed, Karin, and Joseph Allen. “Suddenly Virtual: Making Remote Meetings Work.” Wiley, 2021. Accessed Aug. 2021.

      Rockart, John F., and Lauren S. Flannery. “The management of end user computing.” Communications of the ACM, vol. 26, no. 10, Oct. 1983. Accessed September 2021.

      Turek, Melanie. “Employees Say Smartphones Boost Productivity by 34 Percent: Frost & Sullivan Research.” Samsung Insights, 3 Aug. 2016. Web.

      Vladimirskiy, Vadim. “Windows 365 vs. Azure Virtual Desktop (AVD) – Comparing Two DaaS Products.” Nerdio, 2021. Accessed Aug. 2021.

      “VMware 2021 Annual Report.” VMware, Financial Document Library, 2021. Web.

      VMworld 2021, Oct. 2021.

      Vogels, Emily A. “Digital divide persists even as americans with lower incomes make gains in tech adoption.” Pew Research Center, 22 June 2021. Web.

      “What is End-User computing?” VMware, 2021. Accessed Aug. 2021.

      “Windows 10 Home and Pro.” Microsoft, Docs, 2021. Web.

      Zibreg, Christian. “Microsoft 365 Now Boasts Over 50 Million Subscribers.” MUD, 29 April 2021. Web.

      Activate Your Augmented Reality Initiative

      • Buy Link or Shortcode: {j2store}465|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Augmented reality is a new technology and use cases are still emerging. Organizations have to work hard to stay ahead of the curve and predict how they will be impacted.
      • There are limited off-the-shelf augmented reality solutions in terms of business applications. IT not only needs to understand the emerging augmented reality hardware, but also the plethora of development platforms.

      Our Advice

      Critical Insight

      • Augmented reality presents a new avenue to solve problems that cannot be addressed efficiently with existing technology. It is a new tool that will impact the way you work.
      • Beyond addressing existing problems, augmented reality will provide the ability to differently execute business processes. Current processes have been designed with existing systems and capabilities in mind. Augmented reality impacts organizational design processes that are more complex.
      • As a technology with an evolving set of use cases, IT and the business must anticipate some of the challenges that may arise with the use of augmented reality (e.g. health and safety, application development, regulatory).

      Impact and Result

      • Our methodology addresses the possible issues by using a case-study approach to demonstrate the “art of the possible” for augmented reality.
      • With an understanding of augmented reality, it is possible to find applicable use cases for this emerging technology and get a leg up on competitors.
      • By utilizing Info-Tech’s Augmented Reality Use Case Picklist and the Augmented Reality Stakeholder Presentation Template, the IT team and their business stakeholders can confidently approach augmented reality adoption.

      Activate Your Augmented Reality Initiative Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why your organization should care about augmented reality’s potential to transform the workplace and how Info-Tech will support you as you identify and build your augmented reality use case.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand augmented reality

      Analyze the four key benefits of augmented reality to understand how the technology can resolve industry issues.

      • Activate Your Augmented Reality Initiative – Phase 1: Understand Augmented Reality
      • Augmented Reality Glossary

      2. Finding space for augmented reality

      Develop and prioritize use cases for augmented reality using Info-Tech’s AR Initiative Framework.

      • Activate Your Augmented Reality Initiative – Phase 2: Finding Space for Augmented Reality
      • Augmented Reality Use Case Picklist

      3. Communicate project decisions to stakeholders

      Present the augmented reality initiative to stakeholders and understand the way forward for the AR initiative.

      • Activate Your Augmented Reality Initiative – Phase 3: Communicate Project Decisions to Stakeholders
      • Augmented Reality Stakeholder Presentation Template
      [infographic]

      Workshop: Activate Your Augmented Reality Initiative

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Augmented Reality and Its Use Cases

      The Purpose

      Understand the fundamentals of augmented reality technology and its real-world business applications.

      Key Benefits Achieved

      A prioritized list of augmented reality use cases.

      Activities

      1.1 Introduce augmented reality technology.

      1.2 Understand augmented reality use cases.

      1.3 Review augmented reality case studies.

      Outputs

      An understanding of the history and current state of augmented reality technology.

      An understanding of “the art of the possible” for augmented reality.

      An enhanced understanding of augmented reality.

      2 Conduct an Environmental Scan and Internal Review

      The Purpose

      Examine where the organization stands in the current competitive environment.

      Key Benefits Achieved

      Understanding of what is needed from an augmented reality initiative to differentiate your organization from its competitors.

      Activities

      2.1 Environmental analysis (PEST+SWOT).

      2.2 Competitive analysis.

      2.3 Listing of interaction channels and disposition.

      Outputs

      An understanding of the internal and external propensity for augmented reality.

      An understanding of comparable organizations’ approach to augmented reality.

      A chart with the disposition of each interaction channel and its applicability to augmented reality.

      3 Parse Critical Technology Drivers

      The Purpose

      Determine which business processes will be affected by augmented reality.

      Key Benefits Achieved

      Understanding of critical technology drivers and their KPIs.

      Activities

      3.1 Identify affected process domains.

      3.2 Brainstorm impacts of augmented reality on workflow enablement.

      3.3 Distill critical technology drivers.

      3.4 Identify KPIs for each driver.

      Outputs

      A list of affected process domains.

      An awareness of critical technology drivers for the augmented reality initiative.

      Select and Implement a Social Media Management Platform

      • Buy Link or Shortcode: {j2store}554|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • The proliferation of social media networks, customer data, and use cases has made ad hoc social media management challenging.
      • Many organizations struggle with shadow IT when it comes to technology enablement for social media; SMMP fragmentation leads to increased costs and no uniformity in enterprise social media management capabilities.

      Our Advice

      Critical Insight

      • SMMP selection must be driven by your overall customer experience management strategy; link your SMMP selection to your organization’s CXM framework.
      • Shadow IT will dominate if IT does not step in. Even more so than other areas, SMMP selection is rife with shadow IT.
      • Ensure strong points of integration between SMMP and other software such as CRM. SMMPs can contribute to a unified, 360-degree customer view.

      Impact and Result

      • The value proposition of SMMPs revolves around enhancing the effectiveness and efficiency of social media. Using an SMMP to manage social media is considerably more cost effective than ad hoc (manual) management.
      • IT must partner with other departments (e.g. Marketing) to successfully evaluate, select, and implement an SMMP. Before selecting an SMMP, the organization must have a solid overall strategy for leveraging social media in place. If IT does not work as a trusted advisor to the business, shadow IT in social media management will be rampant.

      Select and Implement a Social Media Management Platform Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement an SMMP, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop a technology enablement approach

      Conduct a maturity assessment to determine whether a dedicated SMMP is right for your organization.

      • Select and Implement a Social Media Management Platform – Phase 1: Develop a Technology Enablement Approach for Social Media
      • Social Media Maturity Assessment Tool
      • Social Media Opportunity Assessment Tool
      • SMMP Use-Case Fit Assessment Tool

      2. Select an SMMP

      Use the Vendor Landscape findings and project guidance to develop requirements for your SMMP RFP, and evaluate and shortlist vendors based on your expressed requirements.

      • Select and Implement a Social Media Management Platform – Phase 2: Select an SMMP
      • SMMP Vendor Shortlist & Detailed Feature Analysis Tool
      • SMMP Vendor Demo Script
      • SMMP RFP Template
      • SMMP RFP Evaluation and Scoring Tool
      • Vendor Response Template

      3. Review implementation considerations

      Even a solution that is a perfect fit for an organization will fail to generate value if it is not properly implemented or measured. Conduct the necessary planning before implementing your SMMP.

      • Select and Implement a Social Media Management Platform – Phase 3: Review Implementation Considerations
      • Social Media Steering Committee Charter Template
      [infographic]

      Workshop: Select and Implement a Social Media Management Platform

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Launch Your SMMP Selection Project

      The Purpose

      Discuss the general project overview for the SMMP selection.

      Key Benefits Achieved

      Determine your organization’s readiness for SMMP.

      Activities

      1.1 Identify organizational fit for the technology.

      1.2 Evaluate social media opportunities within your organization.

      1.3 Determine the best use-case scenario for your organization.

      Outputs

      Organizational maturity assessment

      SMMP use-case fit assessment

      2 Plan Your Procurement and Implementation Process

      The Purpose

      Plan the procurement and implementation of the SMMP.

      Key Benefits Achieved

      Select an SMMP.

      Review implementation considerations.

      Activities

      2.1 Review use-case scenario results, identify use-case alignment

      2.2 Review the SMMP Vendor Landscape vendor profiles and performance.

      2.3 Create a custom vendor shortlist and investigate additional vendors for exploration in the marketplace.

      2.4 Meet with the project manager to discuss results and action items.

      Outputs

      Vendor shortlist

      SMMP RFP

      Vendor evaluations

      Selection of an SMMP

      Framework for SMMP deployment and integration

      Further reading

      Select and Implement a Social Media Management Platform

      Rein in social media by choosing a management platform that’s right for you.

      ANALYST PERSPECTIVE

      Enterprise use of social media for customer interaction has exploded. Select the right management platform to maximize the value of your social initiatives.

      Social media has rapidly become a ubiquitous channel for customer interaction. Organizations are using social media for use cases from targeted advertising, to sales prospecting, to proactive customer service. However, the growing footprint of social media initiatives – and the constant proliferation of new social networks – has created significant complexity in effectively capturing the value of social.

      Organizations that are serious about social manage this complexity by leveraging dedicated social media management platforms. These platforms provide comprehensive capabilities for managing multiple social media networks, creating engagement and response workflows, and providing robust social analytics. Selecting a best-fit SMMP allows for standardized, enterprise-wide capabilities for managing all aspects of social media.

      This report will help you define your requirements for social media management and select a vendor that is best fit for your needs, as well as review critical implementation considerations such as CRM integration and security.

      Ben Dickie
      Research Director, Enterprise Applications
      Info-Tech Research Group

      Executive summary

      Situation

      • Social media has reached maturity as a proven, effective channel for customer interaction across multiple use cases, from customer analytics to proactive customer service.
      • Organizations are looking to IT to provide leadership with social media technology enablement and integration with other enterprise systems.

      Complication

      • The proliferation of social media networks, customer data, and use cases has made ad hoc social media management challenging.
      • Many organizations struggle with shadow IT when it comes to technology enablement for social media; SMMP fragmentation leads to increased costs and no uniformity in enterprise social media management capabilities.

      Resolution

      • Social media management platforms (SMMPs) reduce complexity and increase the results of enterprise social media initiatives. SMMPs integrate with a variety of different social media services, including Facebook, Twitter, LinkedIn, and YouTube. The platforms offer a variety of tools for managing social media, including account management, in-band response and engagement, and social monitoring and analytics.
      • The value proposition of SMMPs revolves around enhancing the effectiveness and efficiency of social media. Using an SMMP to manage social media is considerably more cost effective than ad hoc (manual) management.
      • IT must partner with other departments (e.g. Marketing) to successfully evaluate, select, and implement an SMMP. Before selecting an SMMP, the organization must have a solid overall strategy for leveraging social media in place. If IT does not work as a trusted advisor to the business, shadow IT in social media management will be rampant.

      Info-Tech Insight

      1. SMMP selection must be driven by your overall customer experience management strategy: link your SMMP selection to your organization’s CXM framework.
      2. Shadow IT will dominate if IT does not step in: even more so than other areas, SMMP selection is rife with shadow IT.
      3. Ensure strong points of integration between SMMP and other software such as customer relationship management (CRM). SMMPs can contribute to a unified, 360-degree customer view.

      Framing the SMMP selection and implementation project

      This Research Is Designed For:
      • IT directors advising the business on how to improve the effectiveness and efficiency of social media campaigns through technology.
      • IT professionals involved in evaluating, selecting, and deploying an SMMP.
      • Business analysts tasked with collection and analysis of SMMP business requirements.
      This Research Will Help You:
      • Clearly link your business requirements to SMMP selection criteria.
      • Select an SMMP vendor that meets your organization’s needs across marketing, sales, and customer service use cases.
      • Adopt standard operating procedures for SMMP deployment that address issues such as platform security and CRM integration.
      This Research Will Also Assist:
      • Executive-level stakeholders in the following roles:
        • Vice-president of Sales, Marketing, or Customer Service.
        • Business unit managers tasked with ensuring strong end-user adoption of an SMMP.
      This Research Will Help Them
      • Understand what’s new in the SMMP market.
      • Evaluate SMMP vendors and products for your enterprise needs.
      • Determine which products are most appropriate for particular use cases and scenarios.

      Social media management platforms augment social capabilities within a broader customer experience ecosystem

      Customer Experience Management (CXM)

      'Customer Relationship Management Platform' surrounded by supporting capabilities, one of which is highlighted, 'Social Media Management Platform'.

      Social Media Management Platforms are one piece of the overall customer experience management ecosystem, alongside tools such as CRM platforms and adjacent point solutions for sales, marketing, and customer service. Review Info-Tech’s CXM blueprint to build a complete, end-to-end customer interaction solution portfolio that encompasses SMMP alongside other critical components. The CXM blueprint also allows you to develop strategic requirements for SMMP based on customer personas and external market analysis.

      SMMPs reduce complexity and increase the effectiveness of enterprise social media programs

      • SMMPs are solutions (typically cloud based) that offer a host of features for effectively monitoring the social cloud and managing your organization’s presence in the social cloud. SMMPs give businesses the tools they need to run social campaigns in a timely and cost-effective manner.
      • The typical SMMP integrates with two or more social media services (e.g. Facebook, Twitter) via the services’ API or a dedicated connector. SMMPs are not simply a revised “interface layer” for a single social media service. They provide layers for advanced management and analytics across multiple services.
      • The unique value of SMMPs comes from their ability to manage and track multiple social media services. Aggregating and managing data from multiple services gives businesses a much more holistic view of their organization’s social initiatives and reputation in the social cloud.
      Diagram with 'End Users (e.g. marketing managers)' at the top and social platforms like Facebook and Twitter at the bottom; in between them are 'SMMPs’: 'Account & Campaign Management', 'Social Engagement', and 'Social Monitoring/Analytics'.
      SMMPs mediate interactions between end users and the social cloud.

      Info-Tech Best Practice

      The increasing complexity of social media, coupled with the rising importance of social channels, has led to a market for formal management platforms. Organizations with an active presence in social media (i.e. multiple services or pages) should strongly consider selecting and deploying an SMMP.

      Failing to rein in social media initiatives leads to more work, uninformed decisions, and diminishing returns

      • The growth of social media services has made manually updating pages and feeds an ineffective and time-consuming process. The challenge is magnified when multiple brands, product lines, or geographic subsidiaries are involved.
        • Use the advanced account management features of an SMMP to reduce the amount of time spent updating social media services.
      • Engaging customers through social channels can be a delicate task – high volumes of social content can easily overwhelm marketing and service representatives, leading to missed selling opportunities and unacceptable service windows.
        • Use the in-band engagement capabilities of an SMMP to create an orderly queue for social interactions.
      • Consumer activity in the social cloud has been increasing exponentially. As the volume of content grows, separating the signal from the noise becomes increasingly difficult.
        • Use the advanced social analytics of an SMMP to ensure critical consumer insights are not overlooked.
      Ad Hoc Management vs. SMMPs:
      What’s the difference?

      Ad Hoc Social Media Management

      Social media initiatives are managed directly through the services themselves. For example, a marketing professional would log in to multiple corporate Twitter accounts to post the same content for a promotional campaign.

      Social Media Management Platform

      Social media initiatives are managed through a third-party software platform. For example, a marketing professional would update all social account simultaneously with just a couple clicks. SMMPs also provide cross-service social analytics – highly valuable for decision makers!

      Info-Tech Best Practice

      Effectively managing a social media campaign is not a straightforward exercise. If you have (or plan to have) a large social media footprint, now is the time to procure formal software tools for social media management. Continuing to manage social media in an ad hoc manner is sapping time and money.

      Review the critical success factors for SMMP across the project lifecycle, from planning to post-implementation

      Info-Tech Insight

      Executive management support is crucial. The number one overall critical success factor for an SMMP strategy is top management support. This emphasizes the importance of sales, service, and marketing and prudent corporate strategic alignment. A strategic objective in SMMP projects is to position top management as an enabler rather than a barrier.

      Planning Implementation Post-Implementation Overall
      1 Appropriate Selection Project Management Top Management Support Top Management Support
      2 Clear Project Goals Top Management Support Project Management Appropriate Selection
      3 Top Management Support Training Training Project Management
      4 Business Mission and Vision Effective Communication Effective Communication Training
      5 Project Management Supplier Supports Appropriate Selection Clear Project Goals

      (Source: Information Systems Frontiers)

      Dell uses a dedicated social media management platform to power a comprehensive social command center

      CASE STUDY

      Industry: High-Tech | Source: Dell
      With a truly global customer base, Dell gets about 22,000 mentions on the social web daily, and does not sit idly by. Having established a physical Social Media Command Center powered by Salesforce’s Social Studio, Dell was one of the companies that pioneered the command center concept for social response.

      The SMMP carries out the following activities:

      • Tracking mentions of Dell in the social cloud
      • Sentiment analysis
      • Connecting customers who need assistance with experts who can help them
      • Social media training
      • Maintenance of standards for social media interactions
      • Spreading best social media practices across the organization

      Today the company claims impressive results, including:

      • “Resolution rate” of 99% customer satisfaction
      • Boosting its customer reach with the same number of employees
      • One third of Dell’s former critics are now fans

      Logo for Dell.

      Tools:
      • Salesforce Social Studio
      • Three rows of monitors offering instant insights into customer sentiment, share of voice, and geography.
      Staff:
      • The center started with five people; today it is staffed by a team of 15 interacting with customers in 11 languages.
      • Dell values human interaction; the center is not running on autopilot, and any ambiguous activity is analyzed (and dealt with) manually on an individual basis.

      Follow Info-Tech’s methodology for selection and implementation of enterprise applications

      Prior to embarking on the vendor selection stage, ensure you have set the right building blocks and completed the necessary prerequisites.

      Diagram with 'Enterprise Applications' at the center surrounded by a cycle of 'conceptual', 'consensus', 'concrete', and 'continuous'. The outer circle has three categories with three actions each, 'Governance and Optimization: Process Optimization, Support/ Maintenance, Transition to Operations', 'Strategy and Alignment: Foundation, Assessment, Strategy/ Business Case', and 'Implementation: System Implementation, Business Process Management, Select and Implement'. Follow Info-Tech’s enterprise applications program that covers the application lifecycle from the strategy stage, through selection and implementation, and up to governance and optimization.

      The implementation and execution stage entails the following steps:

      1. Define the business case.
      2. Gather and analyze requirements.
      3. Build the RFP.
      4. Conduct detailed vendor evaluations.
      5. Finalize vendor selection.
      6. Review implementation considerations.

      Info-Tech Insight

      A critical preceding task to selecting a social media management platform is ensuring a strategy is in place for enterprise social media usage. Use our social media strategy blueprint to ensure the foundational elements are in place prior to proceeding with platform selection.

      Use this blueprint to support your SMMP selection and implementation

      Launch the SMMP Project and Collect Requirements — Phase 1

      Benefits — Use the project steps and activity instructions outlined in this blueprint to streamline your selection process and implementation planning. Save time and money, and improve the impact of your SMMP selection by leveraging Info-Tech’s research and project steps.

      Select Your SMMP Solution — Phase 2

      Use Info-Tech’s SMMP Vendor Landscape contained in Phase 2 of this project to support your vendor reviews and selection. Refer to the use-case performance results to identify vendors that align with the requirements and solution needs identified by your earlier project findings.

      Get Ready for Your SMMP Implementation — Phase 3

      Info-Tech Insight — Not everyone’s connection and integration needs are the same. Understand your own business’s integration environment and the unique technical and functional requirements that accompany them to create criteria and select a best-fit SMMP solution.

      Use Info-Tech’s use-case scenario approach to select a best-fit solution for your business needs

      Readiness

      Determine where you are right now and where your organization needs to go with a social media strategy.

      Three stages eventually leading to shapes in a house, 'Distributed Stage', 'Loosely Coupled Stage', and 'Command Center Stage'.
      Use-Case Assessment

      Identify the best-fit use-case scenario to determine requirements that best align with your strategy.

      Three blocks labelled 'Social Listening & Analytics', 'Social Customer Care', and 'Social Publishing & Campaign Management'.
      Selection

      Approach vendor selection through a use-case centric lens to balance the need for different social capabilities.

      Logos for vendors including Adobe, Hootsuite, CISION, and more.

      Info-Tech walks you through the following steps to help you to successfully select and implement your SMMP

      Steps of this blueprint represented by circles of varying colors and sizes, labelled by text of different sizes.

      Locate your starting point in the research based on the current stage of your project.

      Legend for the diagram above: lines represent Major Milestones, size of circles represent Low or High effort, size of text represents Average or Greater importance, and color of the circles represents the phase.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Select and Implement a Social Media Management Platform – project overview

      1. Develop a Technology Enablement Approach 2. Select an SMMP 3. Review Implementation Considerations
      Supporting Tool icon

      Best-Practice Toolkit

      1.1 Determine if a dedicated SMMP is right for your organization

      • Social Media Maturity Assessment Tool
      • Social Media Opportunity Assessment Tool

      1.2 Use an SMMP to enable marketing, sales, and service use cases

      • SMMP Use-Case Fit Assessment Tool

      2.1 SMMP Vendor Landscape

      • CRM Suite Evaluation and RFP Scoring Tool

      2.2 Select your SMMP

      • SMMP Vendor Demo Script Template
      • SMMP RFP Template

      3.1 Establish best practices for SMMP implementation

      • Social Media Steering Committee

      3.2 Assess the measured value from the project

      Guided Implementations

      • Identify organizational fit for the technology.
      • Evaluate social media opportunities within your organization.
      • Evaluate which SMMP use-case scenario is best fit for your organization
      • Discuss the use-case fit assessment results and the Vendor Landscape.
      • Review contract.
      • Determine what is the right governance structure to overlook the SMMP implementation.
      • Identify the right deployment model for your organization.
      • Identify key performance indicators for business units using an SMMP.
      Associated Activity icon

      Onsite Workshop

      Module 1:
      Launch Your SMMP Selection Project
      Module 2:
      Plan Your Procurement and Implementation Process
      Phase 1 Outcome:
      • Social Media Maturity Assessment
      • SMMP Use-Case Assessment
      Phase 2 Outcome:
      • Selection of an SMMP
      Phase 3 Outcome:
      • A plan for implementing the selected SMMP

      SMMP selection and implementation workshop overview

      Associated Activity icon Contact your account representative or email Workshops@InfoTech.com for more information.

      Day 1

      Preparation

      Day 2

      Workshop Day

      Day 3

      Workshop Day

      Day 4

      Workshop Day

      Day 5

      Working Session

      Workshop Preparation
      • Facilitator meets with the project manager and reviews the current project plans and IT landscape of the organization.
      • A review of scheduled meetings and engaged IT and business staff is performed.
      Morning Itinerary
      • Conduct activities from Develop a technology enablement approach for social media phase, including social media maturity and readiness assessment.
      • Conduct overview of the market landscape, trends, and vendors.
      Afternoon Itinerary
      • Interview business stakeholders.
      • Prioritize SMMP requirements.
      Morning Itinerary
      • Perform a use-case scenario assessment.
      Afternoon Itinerary
      • Review use-case scenario results; identify use-case alignment.
      • Review the SMMP Vendor Landscape vendor profiles and performance.
      Morning Itinerary
      • Continue review of SMMP Vendor Landscape results and use-case performance results.
      Afternoon Itinerary
      • Create a custom vendor shortlist.
      • Investigate additional vendors for exploration in the market.
      Workshop Debrief
      • Meet with project manager to discuss results and action items.
      • Wrap up outstanding items from workshop.
      (Post-Engagement): Procurement Support
      • The facilitator will support the project team to outline the RFP contents and evaluation framework.
      • Planning of vendor demo script. Input: solution requirements and use-case results.
      Example of a light blue slide. The light blue slides at the end of each section highlight the key activities and exercises that will be completed during the engagement with our analyst team.

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members who will come onsite to facilitate a workshop for your organization.

      A small monochrome icon depicting a descending bar graph.

      This icon denotes a slide that pertains directly to the Info-Tech vendor profiles on marketing management technology. Use these slides to support and guide your evaluation of the MMS vendors included in the research.

      Select and Implement a Social Media Management Platform

      PHASE 1

      Develop a Technology Enablement Approach for Social Media

      Phase 1: Develop a technology enablement approach for social media

      Steps of this blueprint represented by circles of varying colors and sizes, labelled by text of different sizes. Only Phase 1 is highlighted.
      Estimated Timeline: 1-3 Months

      Info-Tech Insight

      Before an SMMP can be selected, the organization must have a strategy in place for enterprise social media. Implementing an SMMP before developing a social media strategy would be akin to buying a mattress without knowing the size of the bed frame.

      Major Milestones Reached
      • Project launch
      • Completion of requirements gathering and documentation

      Key Activities Completed

      • Readiness assessment
      • Project plan / timeline
      • Stakeholder buy-in
      • Technical assessment
      • Functional assessment

      Outcomes from This Phase

      Social Media Maturity Assessment

      Phase 1 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Develop a technology enablement approach for social media

      Proposed Time to Completion: 2 weeks
      Step 1.1: Determine if a dedicated SMMP is right for your organization Step 1.2: Use an SMMP to enable marketing, sales, and service use cases
      Start with an analyst kick-off call:
      • Assess your readiness for the SMMP project.
      • Evaluate social media opportunities within your organization.
      Review findings with analyst:
      • Discuss how an SMMP can assist with marketing, sales, and customer service.
      • Evaluate which SMMP use case scenario is best fit for your organization.
      Then complete these activities…
      • Assess your social media maturity.
      • Inventory social media networks to be supported by the SMMP.
      Then complete these activities…
      • Assess best-fit use-case scenario.
      • Build the metrics inventory.
      With these tools & templates:
      • Social Media Maturity Assessment Tool
      • Social Media Opportunity Assessment Tool
      With these tools & templates:
      • SMMP Use-Case Fit Assessment Tool
      Phase 1 Results & Insights:
      • Social Media Maturity Assessment
      • SMMP Use-Case Assessment

      Phase 1, Step 1: Determine if a dedicated SMMP is right for your organization

      1.1

      1.2

      Determine if a dedicated SMMP is right for your organization Use an SMMP to enable marketing, sales, and service use cases

      This step will walk you through the following activities:

      • Assess where your organization sits on the social media maturity curve.
      • Inventory the current social media networks that must be supported by the SMMP.
      • Go/no-go assessment on SMMP.

      This step involves the following participants:

      • Digital Marketing Executive
      • Digital Strategy Executive
      • Business stakeholders

      Outcomes of this step

      • Social media maturity assessment
      • Inventory of enterprise social media
      • SMMP Go/no-go decision

      Before selecting an SMMP, start with the fundamentals: build a comprehensive strategy for enterprise social media

      Why build a social media strategy?

      • Social media is neither a fad nor a phenomenon; it is simply another tool in the business process. Social channels do not necessitate a radical departure from the organization’s existing customer interaction strategy. Rather, social media should be added to your channel mix and integrated within the existing CRM strategy.
      • Social media allows organizations to form direct and indirect connections through the Friend-of-a-Friend (FOAF) model, which increases the credibility of the information in the eyes of the consumer.
      • Social media enables organizations to share, connect, and engage consumers in an environment where they are comfortable. Having a social media presence is rapidly becoming a pre-requisite for successful business-to-consumer enterprises.

      Important considerations for an enterprise social media strategy:

      • Determine how social media will complement existing customer interaction goals.
      • Assess which social media opportunities exist for your organization.
      • Consider the specific goals you want to achieve using social channels and pick your services accordingly.
      • Not all social media services (e.g. Facebook, Twitter, LinkedIn) are equal. Consider which services will be most effective for goal achievement.
      For more information on developing a strategy for enterprise social media, please refer to Info-Tech’s research on Social Media.

      Implement a social media strategy by determining where you are right now and where your organization needs to go

      Organizations pass through three main stages of social media maturity: distributed, loosely coupled, and command center. As you move along the maturity scale, the business significance of the social media program increases. Refer to Info-Tech’s Implement a Social Media Program for guidance on how to execute an ongoing social media program.
      The y-axis 'Business Significance'.

      Distributed Stage

      Shapes labelled 'Sales', 'Customer Service', and 'Marketing'.

      • Open-source or low-cost solutions are implemented informally by individual depts. for specific projects.
      • Solutions are deployed to fulfill a particular function without an organizational vision. The danger of this stage is lack of consistent customer experience and wasted resources.

      Loosely Coupled Stage

      Same shapes with the addition of 'PR' and surrounded by a dotted-line house.

      • More point solutions are implemented across the organization. There is a formal cross-departmental effort to integrate some point solutions.
      • Risks include failing to put together an effective steering committee and not including IT in the decision-making process.

      Command Center Stage

      Same shapes with a solid line house.

      • There’s enterprise-level steering committee with representation from all areas: execution of social programs is handled by a fully resourced physical (or virtual) center.
      • Risks include improper resource allocation and lack of end-user training.
      The x-axis 'Maturity Stages'.
      Optimal stages for SMMP purchase

      Assess where your organization sits on the social media maturity curve

      Associated Activity icon 1.1.1 30 Minutes

      INPUT: Social media initiatives, Current status

      OUTPUT: Current State Maturity Assessment

      MATERIALS: Whiteboard, Markers, Sticky notes

      PARTICIPANTS: Digital Strategy Executive, Business stakeholders

      Before you can move to an objective assessment of your social media program’s maturity, take an inventory of your current efforts across different departments (e.g. Marketing, PR, Sales, and Customer Service). Document the results in the Social Media Maturity Assessment Tool to determine your social media readiness score.

      Department Social Media Initiative(s) Current Status
      Marketing Branded Facebook page with updates and promotions Stalled: insufficient resources
      Sales LinkedIn prospecting campaign for lead generation, qualification, and warm open Active: however, new reps are poorly trained on LinkedIn prospect best practices
      Customer Service Twitter support initiative: mentions of our brand are paired with sentiment analysis to determine who is having problems and to reach out and offer support Active: program has been highly successful to date
      HR Recruitment campaign through LinkedIn and Branch Out Stalled: insufficient technology support for identifying leading candidates
      Product Development Defect tracking for future product iterations using social media Partially active: Tracked, but no feedback loop present
      Social Media Maturity Level Distributed

      Determine your organization’s social media maturity with Info-Tech’s Maturity Assessment Tool

      Supporting Tool icon 1.1 Social Media Maturity Assessment Tool

      Assessing where you fit on the social media maturity continuum is critical for setting the future direction of your social media program. We’ll work through a short tool that assesses the current state of your social media program, then discuss the results.

      Info-Tech’s Social Media Maturity Assessment Tool will help you determine your company’s level of maturity and recommend steps to move to the next level or optimize the status quo of your current efforts.

      INFO-TECH TOOL Sample of the Social Media Current State Assessment.

      The social cloud is a dominant point of interaction: integrate social channels with existing customer interaction channels

      • Instead of thinking of customers as an island, think of them interacting with each other and with organizations in the social cloud. As a result, the social cloud itself becomes a point of interaction, not just individual customers.
      • The social cloud is accessible with services like social networks (e.g. Facebook) and micro-blogs (Twitter).
      • Previous lessons learned from the integration of Web 1.0 e-channels should be leveraged as organizations add the social media channel into their overall customer interaction framework:
        • Do not design exclusively around a single channel. Design hybrid-channel solutions that include social channels.
        • Balance customer segment goals and attributes, product and service goals and attributes, and channel capabilities.
      The 'Web 2.0 Customer Interaction Framework' with 'Social Cloud' above, connected to the below through 'Conversations & Information'. Below are two categories with their components interconnected, 'Communication Channels: Face to Face, Phone, E-mail, Web, and Social Media' and 'Customer Experience Management: Marketing, Sales, and Service'.

      Info-Tech Best Practice

      Don’t believe that social channel integration will require an entire rebuild of your CXM strategy. Social channels are just new interaction channels that need to be integrated – as you’ve done in the past with Web 1.0 e-channels.

      Understand the different types of social media services and how they link to social media strategy and SMMP selection

      Before adopting an SMMP, it’s important to understand the underlying services they manage. Social media services facilitate the creation and dissemination of user-generated content, and can be grouped according to their purpose and functionality:
      • Social Networking: Social networking services use the Friend-of-a-Friend model to allow users to communicate with their personal networks. Users can share a wide variety of information and media with one another. Social networking sites include Facebook and LinkedIn.
      • Blogging: Blogs are websites that allow users to upload text and media entries, typically displayed in reverse-chronological order. Prominent blogging services include Blogger and WordPress.
      • Micro-Blogging: Micro-blogging is similar to blogging, with the exception that written content is limited to a set number of characters. Twitter, the most popular service, allows users to post messages up to 140 characters.
      • Social Multimedia: Social multimedia sites provide an easy way for users to upload and share multimedia content (e.g. pictures, video) with both their personal contacts as well as the wider community. YouTube is extremely popular for video sharing, while Instagram is a popular option for sharing photos and short videos.

      Info-Tech Best Practice

      In many cases, services do not fit discretely within each category. With minor exceptions, creating an account on a social media service is free, making use of these services extremely cost effective. If your organization makes extensive use of a particular service, ensure it is supported by your SMMP vendor.

      Four categories of social media company logos: 'Social multimedia', 'Micro-blogging', 'Blogging', and 'Social Networking'.

      Inventory the current social media networks that must be supported by the SMMP

      Associated Activity icon 1.1.2

      INPUT: Social media services

      OUTPUT: Inventory of enterprise social media

      MATERIALS: Whiteboard, Markers

      PARTICIPANTS: Project team

      1. List all existing social media networks used by your organization.
      2. For each network, enumerate all the accounts that are being used for organizational objectives.
      3. Identify the line of business that administers and manages each service.
      Network Use Case Account Ownership
      Facebook
      • Branding
      • Marketing
      • Social Monitoring
      • Facebook recruitment
      • Corporate Communications
      • Marketing
      Twitter
      • Social monitoring
      • Customer response
      • Corporate
      • Customer Service
      ... ... ...

      An explosion of social media services and functionality has made effectively managing social interactions a complex task

      • Effectively managing social channels is an increasingly complicated task. Proliferation of social media services and rapid end-user uptake has made launching social interactions a challenge for small and large organizations.
      • Using multiple social media services can be a nightmare for account management (particularly when each brand or product line has its own set of social accounts).
      • The volume of data generated by the social cloud has also created barriers for successfully responding in-band to social stakeholders (social engagement), and for carrying out social analytics.
      • There are two methods for managing social media: ad hoc management and platform-based management.
        • Ad hoc social media management is accomplished using the built-in functionality and administrative controls of each social media service. It is appropriate for small organizations with a very limited scope for social media interaction, but poses difficulties once “critical mass” has been reached.
      Comparison of 'Ad Hoc Management' with each social media platform managed directly by the user and 'Platform-Based Management' with social platforms managed by a 'SMMP' which is managed by the user.
      Ad hoc management results in a number of social media touch points. SMMPs serve as a single go-to point for all social media initiatives

      Info-Tech Best Practice

      Managing social media is becoming increasingly difficult to do through ad hoc methods, particularly for larger organizations and those with multiple brand portfolios. Ad hoc management is best suited for small organizations with an institutional client base who only need a bare bones social media presence.

      Select social media services that will achieve your specific objectives – and look for SMMPs that integrate with them

      What areas are different social media services helpful in?
      Domain Opportunity Consumer Social Networks (Facebook) Micro-Blogging (Twitter) Professional Social Networks (LinkedIn) Consumer Video Sharing Networks (YouTube)
      Marketing Building Positive Brand Image Green circle 'Proven Useful'. Green circle 'Proven Useful'. Dark Blue circle 'Potentially Useful'.
      Increase Mind Share Green circle 'Proven Useful'. Green circle 'Proven Useful'. Dark Blue circle 'Potentially Useful'.
      Gaining Customer Insights Green circle 'Proven Useful'. Green circle 'Proven Useful'. Green circle 'Proven Useful'. Dark Blue circle 'Potentially Useful'.
      Sales Gaining Sales Insights Dark Blue circle 'Potentially Useful'. Green circle 'Proven Useful'. Dark Blue circle 'Potentially Useful'.
      Increase Revenue Dark Blue circle 'Potentially Useful'. Green circle 'Proven Useful'. Dark Blue circle 'Potentially Useful'.
      Customer Acquisition Green circle 'Proven Useful'. Green circle 'Proven Useful'. Green circle 'Proven Useful'.
      Service Customer Satisfaction Green circle 'Proven Useful'. Green circle 'Proven Useful'. Green circle 'Proven Useful'. Green circle 'Proven Useful'.
      Increase Customer Retention Green circle 'Proven Useful'. Green circle 'Proven Useful'. Dark Blue circle 'Potentially Useful'.
      Reducing Cost of Service Dark Blue circle 'Potentially Useful'. Dark Blue circle 'Potentially Useful'. Dark Blue circle 'Potentially Useful'. Green circle 'Proven Useful'.

      Green circle 'Proven Useful'. Proven Useful*

      Dark Blue circle 'Potentially Useful'. Potentially Useful

      *Proven useful by Info-Tech statistical analysis carried out on a cross-section of real-world implementations.

      Social media is invaluable for marketing, sales, and customer service. Some social media services have a higher degree of efficacy than others for certain functions. Be sure to take this into account when developing a social media strategy.

      Info-Tech Best Practice

      Different social media services are more effective than others for different goals. For example, YouTube is useful as an avenue for marketing campaigns, but it’s of substantially less use for sales functions like lead generation. The services you select while planning your social media strategy must reflect concrete goals.

      Ad hoc social media management results in manual, resource-intensive processes that are challenging to measure

      • Most organizations that have pursued social media initiatives have done so in an ad hoc fashion rather than outlining a formal strategy and deploying software solutions (e.g. SMMP).
      • Social media is often a component of Customer Experience Management (CXM); Info-Tech’s research shows many organizations are handling CRM without a strategy in place, too.
      • Social media management platforms reduce the resource-intensive processes required for ongoing social media involvement and keep projects on track by providing reporting metrics.
      Social media and CRM are often being done without a defined strategy in place.

      Four-square matrix titled 'Strategy' presenting percentages with y-axis 'CRM', x-axis 'Social Media', both having two sections 'Ad hoc' and 'Defined'.
      Source: Info-Tech Survey, N=64

      Many processes related to social media are being done manually, despite the existence of SMMPs.

      Four-square matrix titled 'technology' presenting percentages with y-axis 'CRM', x-axis 'Social Media', both having two sections 'Ad hoc' and 'Defined'.

      “When we started our social media campaign, it took 34 man-hours a week. An SMMP that streamlines these efforts is absolutely an asset.” (Edie May, Johnson & Johnson Insurance Company)

      SMMPs provide functionality for robust account management, in-band customer response, and social monitoring/analytics

      • Features such as unified account management and social engagement capabilities boost the efficiency of social campaigns. These features reduce duplication of effort (e.g. manually posting the same content to multiple services). Leverage account management functionality and in-band response to “do more with less.”
      • Features such as comprehensive monitoring of the social cloud and advanced social analytics (i.e. sentiment analysis, trends and follower demographics) allow organizations to more effectively use social media. These features empower organizations with the information they need to make informed decisions around messaging and brand positioning. Use social analytics to zero in on your most important brand advocates.

      The value proposition of SMMPs revolves around enhancing the effectiveness and efficiency of social media initiatives.

      Three primary use cases for social media management:

      Social Listening & Analytics — Monitor and analyze a variety of social media services: provide demographic analysis, frequency analysis, sentiment analysis, and content-centric analysis.

      Social Publishing & Campaign Management — Executing marketing campaigns through social channels (e.g. Facebook pages).

      Social Customer Care — Track customer conversations and provide the ability to respond in-platform to social interactions.

      Info-Tech Best Practice

      SMMPs are a technology platform, but this alone is insufficient to execute a social media program. Organization and process must be integrated as well. See Info-Tech’s research on developing a social media strategy for a step-by-step guide on how to optimize your internal organization and processes.

      Social analytics vary: balance requirements among monitoring goals and social presence/property management

      Segment your requirements around common SMMP vendor product design points. Current market capabilities vary between two primary feature categories: social cloud monitoring and social presence and property management.

      Cloud-Centric

      Social Monitoring

      Content-Centric

      Social cloud monitoring enables:
      • Brand and product monitoring
      • Reputation monitoring
      • Proactive identification of service opportunities
      • Competitive intelligence
      Social presence and property management enables:
      • Monitor and manage discussions on your social properties (e.g. Twitter feeds, Facebook Pages, YouTube channels)
      • Execute marketing campaigns within your social properties

      Social Analytics

      Social analytics provide insights to both dimensions of social media monitoring.

      Some firms only need social cloud monitoring, some need to monitor their own social media properties, and others will need to do both. Some vendors do both while other vendors excel in only one feature dimension. If you are NOT prepared to act on results from social cloud monitoring, then don’t expand your reach into the social cloud for no reason. You can always add cloud monitoring services later. Likewise, if you only need to monitor the cloud and have no or few of your own social properties, don’t buy advanced management and engagement features.

      Use social analytics to gain the most value from your SMMP

      Research indicates successful organizations employ both social cloud monitoring and management of their own properties with analytical tools to enhance both or do one or the other well. Few vendors excel at both larger feature categories. But the market is segmented into vendors that organizations should be prepared to buy more than one product from to satisfy all requirements. However, we expect feature convergence over the next 1–3 years, resulting in more comprehensive vendor offerings.

      Most sought social media analytics capabilities

      Bar Chart of SM analytics capabilities, the most sought after being 'Demographic analysis', 'Geographic analysis', 'Semantic analysis', 'Automated identification of subject and content', and 'Predictive modeling'.
      (Source: The State of Social Media Analytics (2016))

      Value driven from social analytics comes in the form of:
      • Improved customer service
      • Increased revenue
      • Uncovered insights for better targeted marketing
      • A more personalized customer experience offered
      Social analytics is integral to the success of the SMMP – take advantage of this functionality!

      Cost/Benefit Scenario: A mid-sized consumer products company wins big by adopting an SMMP

      The following example shows how an SMMP at a mid-sized consumer products firm brought in $36 000 a year.

      Before: Manual Social Media Management

      • Account management: a senior marketing manager was responsible for updating all twenty of the firm’s social media pages and feeds. This activity consumed approximately 20% of her time. Her annual salary was $80,000. Allocated cost: $16,000 per year.
      • In-band response: Customer service representatives manually tracked service requests originating from social channels. Due to the use of multiple Twitter feeds, several customers were inadvertently ignored and subsequently defected to competitors. Lost annual revenue due to customer defections: $10,000.
      • Social analytics: Analytics were conducted in a crude, ad hoc fashion using scant data available from the services themselves. No useful insights were discovered. Gains from social insights: $0.

      Ad hoc management is costing this organization $26,000 a year.

      After: Social Media Management Platform

      • Account management: Centralized account controls for rapidly managing several social media services meant the amount of time spent updating social media was cut 75%. Allocated cost savings: $12,000 per year.
      • In-band response: Using an SMMP provided customer service representatives with a console for quickly and effectively responding to customer service issues. Service window times were significantly reduced, resulting in increased customer retention. Revenue no longer lost due to defections: $10,000.
      • Social analytics: The product development group used keyword-based monitoring to assist with designing a successful new product. Social feedback noticeably boosted sales. Gains from social insights: $20,000
      • Cost of SMMP: $6,000 per year.

      The net annual benefit of adopting an SMMP is $36,000.

      Go with an SMMP if your organization needs a heavy social presence; stick with ad hoc management if it doesn’t

      The value proposition of acquiring an SMMP does not resonate the same for all organizations: in some cases, it is more cost effective to forego an SMMP and stick with ad hoc social media management.

      Follow these guidelines for determining if an SMMP is a natural fit for your organization.

      Go with an SMMP if…

      • Your organization already has a large social footprint: you manage multiple feeds/pages on three or more social media services.
      • Your organization’s primary activity is B2C marketing; your target consumers are social media savvy. Example: consumer packaged goods.
      • The volume of marketing, sales and service inquiries received over social channels has seen a sharp increase in the last 12 months.
      • Your firm or industry is the topic of widespread discussion in the social cloud.

      Stick with ad hoc management if…

      • Regulatory compliance prohibits the extensive use of social media in your organization.
      • Your organization is focused on a small number of institutional clients with well-defined organizational buying behaviors.
      • Your target market is antipathetic towards using social channels to interact with your organization.
      • Your organization is in a market space where only a bare-bones social media presence is seen as a necessity (for example, only a basic informational Facebook page is maintained).

      Info-Tech Best Practice

      Using an SMMP is definitively superior to ad hoc social media management for those organizations with multiple brands and product portfolios (e.g. consumer packaged goods). Ad hoc management is best for small organizations with an institutional client base who only need a bare bones social media presence.

      Assess which social media opportunities exist for your organization with Info-Tech’s tool

      Supporting Tool icon 1.2 Social Media Opportunity Assessment Tool

      Use Info-Tech’s Social Media Opportunity Assessment Tool to determine, based on your unique criteria, where social media opportunities exist for your organization in marketing, sales, and service.

      Info-Tech Best Practice

      1. Remember that departmental goals will overlap; gaining customer insight is valuable to marketing, sales, and customer service.
      2. The social media benefits you can expect to achieve will evolve as your processes mature.
      3. Often, organizations jump into social media because they feel they have to. Use this assessment to identify early on what your drivers should be.
      Sample of the Social Media Opportunity Assessment Tool.

      Go/no-go assessment on SMMP

      Associated Activity icon 1.1.3

      INPUT: Social Media Opportunity Questionnaire

      OUTPUT: SMMP go/no-go decision

      MATERIALS: Whiteboard, Opportunity Assessment Tool

      PARTICIPANTS: Digital Strategy Executive, Business stakeholders

      Identify whether an SMMP will help you achieve your goals in sales, marketing, and customer service.

      1. Complete the questionnaire in the Social Media Opportunity Assessment Tool. Ensure all relevant stakeholders are present to answer questions pertaining to their business area.
      2. Evaluate the results to better understand whether your organization has the opportunity to achieve each established goal in marketing, sales, and customer service with an SMMP or you are not likely to benefit from investing in a social media management solution.

      Phase 1, Step 2: Use an SMMP to enable marketing, sales, and service use cases

      1.1

      1.2

      Determine if a dedicated SMMP is right for your organization Use an SMMP to enable marketing, sales, and service use cases

      This step will walk you through the following activities:

      • Profile and rank your top use cases for social media management
      • Build the metrics inventory

      This step involves the following participants:

      • Project Manager
      • Project Team

      Outcomes of this step

      • Use case suitability
      • SMMP metrics inventory

      SMMPs equip front-line sales staff with the tools they need for effective social lead generation

      • Content-centric social analytics allow sales staff to see click-through details for content posted on social networks. In many cases, these leads are warm and ready for immediate follow-up.
      • A software development firm uses an SMMP to post a whitepaper promoting its product to multiple social networks.
        • The whitepaper is subsequently downloaded by a number of potential prospects.
        • Content-centric analytics within the SMMP link the otherwise-anonymous downloads to named social media accounts.
        • Leads assigned to specific account managers, who use existing CRM software to pinpoint contact information and follow-up in a timely manner.
      • Organizations that intend to use their SMMP for sales purposes should ensure their vendor of choice offers integration with LinkedIn. LinkedIn is the business formal of social networks, and is the network with the greatest proven efficacy from a sales perspective.

      Using an SMMP to assist the sales process can…

      • Increase the number of leads generated through social channels as a result of social sharing.
      • Increase the quality of leads generated through social channels by examining influence scores.
      • Increase prospecting efficiency by finding social leads faster.
      • Keep account managers in touch with prospects and clients through social media.

      Info-Tech Best Practice

      Social media is on the rise in sales organizations. Savvy companies are using social channels at all points in the sales process, from prospecting to account management. Organizations using social channels for sales will want an SMMP to manage the volume of information and provide content-centric analytics.

      Incorporate social media into marketing workflows to gain customer insights, promote your brand, and address concerns

      While most marketing departments have used social media to some extent, few are using it to its full potential. Identify marketing workflows that can be enhanced through the use of social channel integration.
      • Large organizations must define separate workflows for each stakeholder organization if marketing’s duties are divided by company division, brand, or product lines.
      • Inquiries stemming from marketing campaigns and advertising must be handled by social media teams. For example, if a recent campaign sparks customer questions on the company’s Facebook page, be ready to respond!
      • Social media can be used to detect issues that may indicate product defects, provided defect tracking is not already incorporated into customer service workflows. If defect tracking is part of customer service processes, then such issues should be routed to the customer service organization.
      • If social listening is employed, in addition to monitoring the company's own social properties, marketing teams may elect to receive notices of major trends concerning the company's products or those of competitors.
      Word jumble of different sized buzz words around 'Brand Building'.

      I’m typically using my social media team as a proactive marketing team in the social space, whereas I’m using my consumer relations team as a reactive marketing and a reactive consumer relations taskforce. So a little bit different perspective.” (Greg Brickl, IT Director, Organic Valley)

      SMMPs allow marketers to satisfy all of their needs with one solution

      • Have a marketing manager jointly responsible for the selection of an SMMP to realize higher overall success. This will significantly improve customer acquisition approval and competitive intelligence, as well as the overall SMMP success.
      • The marketing manager should be involved in fleshing out the business requirements of the SMMP in order to select the most appropriate solution.
      • Once selected, the SMMP has multiple benefits for marketing professionals. One pivotal benefit of SMMPs for marketing is the capability for centralized account management. Multiple social pages and feeds can be rapidly managed at pre-determined times, through an easy-to-use dashboard delivered from one source.
      • Centralized account management is especially pertinent for organizations with a wide geographic client base, as they can manage wide social media campaigns within multiple time zones, delivering their messaging appropriately. (e.g. contests, product launches, etc.)
      Bar Chart comparing 'Average Success Scores' of different goals based on whether the 'Marketing Manager [was] Responsible' or not. Scores are always higher when they were.
      (Source: Info-Tech Research Group N = 37)

      Info-Tech Best Practice

      Managing multiple social media accounts on an ad hoc basis is time consuming and costs money. Lower costs and get the best results out of your social media campaigns by involving the marketing team in the SMMP selection process and knowing their functional requirements.

      Leverage SMMPs to proactively identify and respond to customer service issues occurring in the social cloud

      • SMMPs are an invaluable tool in customer service organizations. In-band response capabilities allow customer service representatives to quickly and effectively address customer service issues – either reactively or proactively.
      • Reactive customer service can be provided through SMMPs by providing response capabilities for private messages or public mentions (e.g. “@AcmeCo” on Twitter). Many SMMPs provide a queue of social media messages directed at the organization, and also give the ability to assign specific messages to an individual service representative or product expert. Responding to a high-volume of reactive social media requests can be time consuming without an SMMP.
      • Proactive customer service uses the ability of SMMPs to monitor the social cloud for specific keywords in order to identify customers having issues. Forward-thinking companies actively monitor the social cloud for customer service opportunities, to protect and improve their image.
      Illustration of reactive service where the customer initiates the process and then receives service.
      Reactive service is customer-initiated.

      Illustration of proactive service with a complaint through Twitter monitored by an SMMP allowing an associate to provide a 'Proactive Resolution'.
      SMMPs enable organizations to monitor the social cloud for service opportunities and provide proactive service in-band.

      Info-Tech Best Practice

      Historically, customer service has been “reactive” (i.e. customer initiated) and solely between the customer and supplier. Social media forces proactive service interactions between customer, supplier, and the entire social cloud. Using an SMMP significantly improves reactive and proactive service. The ability to integrate with customer service applications is essential.

      Customer service is a vital department to realize value from leveraging an SMMP

      Info-Tech’s research shows that the more departments get involved with social media implementation, the higher the success score (calculated based on respondents’ report of the positive impact of social media on business objectives). On average, each additional department involved in social media programs increases the overall social media success score by 5%. For example, organizations that leveraged social media within the customer service department, achieved a higher success score than those that did not.

      The message is clear: encourage broad participation in coordinated social media efforts to realize business goals.

      Line graph comparing 'Social Media Success Score' with the 'Number of Departments Involved'. The line trends upward on both axes.
      (Source: Info-Tech Research Group N=65)
      Bar chart comparing 'Social Media Success Scores' if 'Customer Service Involvement' was Yes or No. 'Yes' has a higher score.

      Our research indicates that the most important stakeholder to ensure steering committee success is Customer Service. This has a major impact on CRM integration requirements – more on this later.

      SMMPs are indispensable for allowing PR managers to keep tabs on the firm and its brands

      • Public relations is devoted to relationship management; as such, it is critical for savvy PR departments to have a social media presence.
      • SMMPs empower PR professionals with the ability to track the sentiment of what is said about their organization. Leverage keyword searches and heuristic analysis to proactively mitigate threats and capitalize on positive opportunities. For example, sentiment analysis can be used to identify detractors making false claims over social channels. These claims can then be countered by the Public Relations team.
      • Sentiment analysis can be especially important to the PR professional through change and crisis management situations. These tools allow an organization to track the flow of information, as well as the balance of positive and negative postings and their influence on others in the social cloud.
      • Social analytics provided by SMMPs also serve as a goldmine for competitive intelligence about rival firms and their products.

      Benefits of Sentiment Analysis for PR

      • Take the pulse of public perception of your brands (and competitors).
      • Mitigate negative comments being made and respond immediately.
      • Identify industry and consumer thought leaders to follow on social networks.

      Illustration of sentiment analysis.
      Use sentiment analysis to monitor the social cloud.

      Info-Tech Best Practice

      Leaving negative statements unaddressed can cause harm to an organization’s reputation. Use an SMMP to track what is being said about your organization; take advantage of response capabilities to quickly respond and mitigate PR risk.

      SMMPs for recruiting is an emerging talent recruitment technique and will lead to stronger candidates

      • Social media provides more direct connections between employer and applicant. It’s faster and more flexible than traditional e-channels.
      • SMMPs should be deployed to the HR silo to aid with recruiting top-quality candidates. Account management functionality can dramatically reduce the amount of time HR managers spend synchronizing content between various social media services.
      • In-band response capabilities flag relevant social conversations and allow HR managers to rapidly respond to prospective employee inquiries. Rapid response over social channels gives candidates a positive impression of the organization.
      • Analytics give HR managers insight into hiring trends and the job market at large – sentiment analysis is useful for gauging not just candidate interests, but also anonymous employee engagement.

      A social media campaign managed via SMMP can…

      • Increase the size of the applicant pool by “fishing where the fish are.”
      • Increase the quality of applicants by using monitoring to create targeted recruitment materials.
      • Increase recruiting efficiency by having a well-managed, standing presence on popular social media sites – new recruiting campaigns require less “awareness generation” time.
      • Allow HR/recruiters to be more in-touch with hiring trends via social analytics.
      Horizontal bar chart of social media platforms that recruiters use. LinkedIn is at the top with 87%. Only 4% of recruiters are NOT using social media for recruitment, while 50% of recruiters plan to increase their investment in SMR in the coming year. (Source: Jobvite, 2015)

      Collapse your drivers for SMMP and link them to Info-Tech’s Vendor Landscape use cases

      Vendor Profiles icon

      USE CASES

      Social Listening and Analytics

      What It Looks Like
      Functionality for capturing, aggregating, and analyzing social media content in order to create actionable customer or competitive insights.

      How It Works
      Social listening and analytics includes features such as sentiment and contextual analysis, workflow moderation, and data visualization.

      Social Publishing and Campaign Management

      What It Looks Like
      Functionality for publishing content to multiple networks or accounts simultaneously, and managing social media campaigns in-depth (e.g. social property management and post scheduling).

      How It Works
      Social publishing and campaign management include features such as campaign execution, social post integration, social asset management, and post time optimization.

      Social Customer Care

      What It Looks Like
      Functionality for management of the social customer service queue as well as tools for expedient resolution of customer issues.

      How It Works
      Social customer care use case primarily relies on strong social moderation and workflow management.

      Identify the organizational drivers for social media management – whether it is recruiting, public relations, customer service, marketing, or sales – and align them with the most applicable use case.

      Profile and rank your top use cases for social media management using the Use-Case Fit Assessment Tool

      Associated Activity icon 1.2.1 1 Hour

      INPUT: Project Manager, Core project team

      OUTPUT: Use-case suitability

      MATERIALS: Whiteboard, Markers

      PARTICIPANTS: Project Manager, Core project team

      1. Download your own version of the tool and complete the questionnaire on tab 2, Assessment.
        • Use the information gathered from your assessments and initial project scoping to respond to the prompts to identify the business and IT requirements for the tool.
        • Answer the prompts for each statement from a range of strongly disagree to strongly agree.
      2. Review the outcomes on tab 3, Results.
        • This tab provides a qualitative measure assessing the strength of your fit against the industry use-case scenarios.
      3. If not completed as a team, debrief the results and implications to your core project team.

      Use the SMMP Use-Case Fit Assessment Tool to identify which areas you should focus on

      Supporting Tool icon 1.3 Use Case Fit Assessment Tool
      Use the Use-Case Fit Assessment Tool to understand how your unique requirements map into a specific SMMP use case.

      This tool will assess your answers and determine your relative fit against the use-case scenarios.

      Fit will be assessed as “Weak,” “Moderate,” or “Strong.”

      Consider the common pitfalls, which were mentioned earlier, that can cause IT projects to fail. Plan and take clear steps to avoid or mitigate these concerns.

      Note: These use-case scenarios are not mutually exclusive. Your organization can align with one or more scenarios based on your answers. If your organization shows close alignment to multiple scenarios, consider focusing on finding a more robust solution and concentrate your review on vendors that performed strongly in those scenarios or meet the critical requirements for each.

      INFO-TECH DELIVERABLE

      Sample of the SMMP Use-Case Fit Assessment Tool.

      Identify the marketing, sales, and customer service metrics that you will target for improvement using an SMMP

      Create measurable S.M.A.R.T. goals for the project.

      Consider the following questions when building your SMMP metrics:
      1. What are the top marketing objectives for your company? For example, is building initial awareness or driving repeat customers more important?
      2. What are the corresponding social media goals for this business objective?
      3. What are some of the metrics that could be used to determine if business and social media objectives are being attained?
      Use Case Sample Metric Descriptions Target Metric
      Social Listening and Analytics Use a listening tool to flag all mentions of our brands or company on social Increase in mentions with neutral or positive sentiment, decrease in mentions with negative sentiment
      Social Publishing and Campaign Management Launch a viral video campaign showcasing product attributes to drive increased YT traffic Net increase in unaided customer recall
      Social Customer Care Create brand-specific social media pages to increase customer sentiment for individual brand extensions Net increase in positive customer sentiment (i.e. as tracked by an SMMP)

      Build the metrics inventory

      Associated Activity icon 1.2.2 45 Minutes

      INPUT: Marketing, sales, and customer service objectives

      OUTPUT: Metrics inventory

      MATERIALS: Whiteboard, Markers

      PARTICIPANTS: Project Manager, Core project team

      1. Identify the top marketing, sales, and customer service objectives for your company? For example, is building initial awareness or driving repeat customers more important?
      2. What are the corresponding social media goals for each business objective?
      3. What are some of the metrics that could be used to determine if business and social media objectives are being attained?
      Marketing/PR Objectives Social Media Goals Goal Attainment Metrics
      E.g. build a positive brand image
      • Create brand-specific social media pages to increase customer sentiment for individual brand extensions
      Net increase in positive customer sentiment (i.e. as tracked by an SMMP)
      E.g. increase customer mind share
      • Launch a viral video campaign showcasing product attributes to drive increased YT traffic
      Net increase in unaided customer recall
      E.g. monitor public mentions
      • Use a listening tool to flag all mentions of our brands or company on social
      Increase in mentions with neutral or positive sentiment, decrease in mentions with negative sentiment

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.1

      Sample of activity 1.1.1 'Assess where your organization sits on the social media maturity curve'. Assess your organization’s social media maturity

      An Info-Tech analyst will facilitate a discussion to assess the maturity of your organization’s social media program and take an inventory of your current efforts across different departments (e.g. Marketing, PR, Sales, and Customer Service).

      1.1.2

      Sample of activity 1.1.2 'Inventory the current social media networks that must be supported by SMMP'. Inventory your current social media networks

      The analyst will facilitate an exercise to catalog all social media networks used in the organization.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      1.1.3

      Sample of activity 1.1.3 'Go/no-go assessment on SMMP'. Go/no go assessment on SMMP

      Based on the maturity assessment, the analyst will help identify whether an SMMP will help you achieve your goals in sales, marketing, and customer service.

      1.2.1

      Sample of activity 1.2.1 'Profile and rank your top use cases for social media management using the Use Case Fit Assessment Tool'. Rank your top use cases for social media management

      An analyst will facilitate the exercise to answer a series of questions in order to determine best-fit scenario for social media management for your organization.

      1.2.2

      Sample of activity 1.2.2 'Build the metrics inventory'. Build the metrics inventory

      An analyst will lead a whiteboarding exercise to brainstorm and generate metrics for your organization’s social media goals.

      Select and Implement a Social Media Management Platform

      PHASE 2

      Select an SMMP

      This phase also includes Info-Tech’s SMMP Vendor Landscape Title icon for vendor slides.

      Phase 2: Select an SMMP

      Steps of this blueprint represented by circles of varying colors and sizes, labelled by text of different sizes. Only Phase 2 is highlighted.
      Estimated Timeline: 1-3 Months

      Info-Tech Insight

      Taking a use-case-centric approach to vendor selection allows you to balance the need for different social capabilities between analytics, campaign management and execution, and customer service.

      Major Milestones Reached
      • Vendor Selection
      • Finalized and Approved Contract

      Key Activities Completed

      • RFP Process
      • Vendor Evaluations
      • Vendor Selection
      • Contract Negotiation

      Outcomes from This Phase

      The completed procurement of an SMMP solution.

      • Selected SMMP solution
      • Negotiated and finalized contract

      Phase 2 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Select an SMMP

      Proposed Time to Completion: 4 weeks
      Step 2.1: Analyze and shortlist SMMP vendors Step 2.2: Evaluate vendor responses
      Start with an analyst kick-off call:
      • Evaluate the SMMP marketspace.
      • Re-evaluate best-fit use case.
      Review findings with analyst:
      • Determine your SMMP procurement strategy.
      • Reach out to SMMP vendors.
      Then complete these activities…
      • Review vendor profiles and analysis.
      • Create your own evaluation framework and shortlisting criteria.
      Then complete these activities…
      • Prioritize your requirements.
      • Create an RFP for SMMP procurement.
      • Evaluate vendor responses.
      • Set up product demonstrations.
      With these tools & templates:
      • SMMP Vendor Landscape (included here)
      • SMMP Vendor Shortlist Tool
      With these tools & templates:
      • SMMP RFP Template
      • SMMP Vendor Demo Script Template
      • SMMP Evaluation and RFP Scoring Tool
      Phase 1 Results & Insights:
      • Finalize vendor and product selection

      Phase 2, Step 1: Analyze and shortlist vendors in the space

      2.1

      2.2

      Analyze and shortlist vendors in the space Select your SMMP solution

      This step will walk you through the following activities:

      • Review vendor landscape methodology
      • Shortlist SMMP vendors

      This step involves the following participants:

      • Core team
      • Representative stakeholders from Digital Marketing, Sales, and IT

      The SMMP Vendor Landscape includes the following sections:

      VENDOR LANDSCAPE

      Info-Tech's Methodology

      Vendor title icon.

      Vendor Landscape use-case scenarios are evaluated based on weightings of features and vendor/product considerations

      Vendor Profiles icon

      Use cases were scored around the features from the general scoring identified as being relevant to the functional considerations and drivers for each scenario.

      Calculation Overview
      Advanced Features Score X Vendor Multiplier = Vendor Performance for Each Scenario
      Pie Chart of Product and Vendor Weightings.
      Product and Vendor Weightings
      Pie Chart of Advanced Features Weightings.
      Advanced Features Weightings

      Please note that both advanced feature scores and vendor multipliers are based on the specific weightings calibrated for each scenario.

      Vendor performance for each use-case scenario is documented in a weighted bar graph

      Vendor Profiles icon
      Sample of the 'Vendor performance for the use-case scenario' slide. Vendor Performance

      Vendors qualify and rank in each use-case scenario based on their relative placement and scoring for the scenario.

      Vendor Ranking

      Champion: The top vendor scored in the scenario

      Leaders: The vendors who placed second and third in the scenario

      Players: Additional vendors who qualified for the scenarios based on their scoring

      Sample of the 'Value Index for the use case scenario' slide. Value ScoreTM

      Each use-case scenario also includes a Value Index that identifies the Value Score for a vendor relative to their price point. This additional framework is meant to help price-conscious organizations identify vendors who provide the best “bang for the buck.”

      VENDOR LANDSCAPE

      Review the SMMP Vendor Evaluation

      Vendor title icon.

      SMMP market overview

      Vendor Profiles icon

      How It Got Here

      • The SMMP market was created in response to the exploding popularity of social media and the realization that it can be harnessed for a wide variety of enterprise purposes (from consumer intelligence to marketing campaigns and customer service).
      • As the number of social media services has expanded, and as the volume of content generated via social networks has ballooned, it became increasingly difficult to mine insights and manage social campaigns. A number of vendors (mostly start-ups) began offering platforms that attempted to streamline and harness social media processes.
      • As usage of social media expanded beyond just the marketing and PR function, being able to successfully scale a social strategy to a large number of customer care and sales interactions became paramount: SMMPs filled a niche by offering large-scale response and workflow management capabilities.

      Where It’s Going

      • The market is segmented into two broad camps: SMMPs focused on social listening and analytics, and SMMPs focused on social engagement. Although the two have begun to converge, there continues to be a clear junction in the market between the two, with a surprising lack of vendors that are equally adept at both sides.
      • With the rise of SMMPs, the expectation was that CRM vendors would offer feature sets similar to those of standalone SMMPS. However, CRM vendors have been slow in incorporating the functionality directly into their products. While some major vendors have made ground in this direction in the last year, organizations that are serious about social will still need a best-of-breed SMMP.
      • Other major trends include using application integration to build a 360-degree view of the customer, workflow automation, and competitive benchmarking.

      Info-Tech Insight

      As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. Supporting multiple social media services and accounts has become a Table Stakes capability and should no longer be used to differentiate solutions. Instead focus on an SMMP’s social listening, campaign management, and customer care to help you find a solution that best fits your requirements.

      Review Info-Tech’s Vendor Landscape of the SMMP market to identify vendors that meet your requirements

      Vendors Evaluated

      Various logos of the vendors who were evaluated.

      Each vendor in this landscape was evaluated based on their features, product considerations, and vendor considerations. Each vendor was profiled using these evaluations and, based on their performance, qualified and placed in specific use-case scenarios.

      These vendors were included due to consideration of their market share, mind share, and platform coverage

      Vendor Profiles icon

      Vendors included in this report provide a comprehensive, innovative, and functional solution for integrating applications and automating their messaging.

      Included in this Vendor Landscape:

      Adobe: Adobe Social is a key pillar of Adobe’s ecosystem that is heavily focused on social analytics and engagement.

      Hootsuite: A freemium player with strong engagement and collaboration tools, particularly well suited for SMBs.

      Salesforce: Social Studio is a leading social media management solution and is a key channel of Salesforce Marketing Cloud.

      Sendible: A fairly new entrant to the social media management space, Sendible offers robust campaign management capability that is well suited for agencies and SMBs.

      Sprinklr: A leading solution that focuses on social customer care, offering strong ability to prioritize, route, and categorize high-volume social messaging.

      Sprout Social: A great choice for mid-sized companies looking to provide robust social engagement and customer care.

      Sysomos: Their MAP and Heartbeat products offer customers in-depth analysis of a wide array of social channels.

      Viralheat (Cision): Now a Cision product, Viralheat is an excellent option for analytics, social response workflow management, and in-band social engagement.

      Table Stakes represent the minimum standard; without these, a product doesn’t even get reviewed

      Vendor Profiles icon

      The Table Stakes

      Feature: What it is:
      Multiple Services Supported The ability to mange or analyze at least two or more social media services.
      Multiple Accounts Supported The ability to manage or analyze content from at least two or more social media accounts.
      Basic Engagement The ability to post status updates to multiple social media sites.
      Basic Analytics The ability to display inbound feeds and summary info from multiple social media sites.

      What does this mean?

      The products assessed in this Vendor Landscape meet, at the very least, the requirements outlined as Table Stakes.

      Many of the vendors go above and beyond the outlined Table Stakes, some even do so in multiple categories. This section aims to highlight the products’ capabilities in excess of the criteria listed here.

      Info-Tech Insight

      If Table Stakes are all you need from your SMMP solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs.

      Advanced Features are the capabilities that allow for granular differentiation of market players and use-case performance

      Vendor Profiles icon

      Scoring Methodology

      Info-Tech scored each vendor’s features on a cumulative four-point scale. Zero points are awarded to features that are deemed absent or unsatisfactory, one point is assigned to features that are partially present, two points are assigned to features that require an extra purchase in the vendor’s product portfolio or through a third party, three points are assigned to features that are fully present and native to the solution, and four points are assigned to the best-of-breed native feature.

      For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix.

      Feature: What we looked for:
      Social Media Channel Integration - Inbound Ability to monitor social media services, such as Facebook, Twitter, LinkedIn, YouTube, and more.
      Social Media Channel Integration - Outbound Ability to publish to social media services such as Facebook, Twitter, LinkedIn, YouTube, and more.
      Social Response Management Ability to respond in-band to social media posts.
      Social Moderation and Workflow Management Ability to create end-to-end routing and escalation workflows from social content.
      Campaign Execution Ability to manage social and media assets: tools for social campaign execution, reporting, and analytics.
      Social Post Archival Ability to archive social posts and platform activity to create an audit trail.
      Trend Analysis Ability to monitor trends and traffic on multiple social media sites.
      Sentiment Analysis Ability to analyze and uncover insights from attitudes and opinions expressed on social media.
      Contextual Analysis Ability to use NLP, deep learning and semantic analysis to extract meaning from social posts.
      Social Asset Management Ability to access visual asset library with access permissions and expiry dates to be used on social media.
      Post Time Optimization Ability to optimize social media posts by maximizing the level of interaction and awareness around the posts.
      Dashboards and Visualization Ability to visualize data and create analytics dashboards.

      Vendor scoring focused on overall product attributes and vendor performance in the market

      Vendor Profiles icon

      Scoring Methodology

      Info-Tech Research Group scored each vendor’s overall product attributes, capabilities, and market performance.

      Features are scored individually as mentioned in the previous slide. The scores are then modified by the individual scores of the vendor across the product and vendor performance features.

      Usability, overall affordability of the product, and the technical features of the product are considered, and scored on a five-point scale. The score for each vendor will fall between worst and best in class.

      The vendor’s performance in the market is evaluated across four dimensions on a five-point scale. Where the vendor places on the scale is determined by factual information, industry position, and information provided by customer references and/or available from public sources.

      Product Evaluation Features

      Usability The end-user and administrative interfaces are intuitive and offer streamlined workflow.
      Affordability Implementing and operating the solution is affordable given the technology.
      Architecture Multiple deployment options, platform support, and integration capabilities are available.

      Vendor Evaluation Features

      Viability Vendor is profitable, knowledgeable, and will be around for the long term.
      Focus Vendor is committed to the space and has a future product and portfolio roadmap.
      Reach Vendor offers global coverage and is able to sell and provide post-sales support.
      Sales Vendor channel partnering, sales strategies, and process allow for flexible product acquisition.

      Balance individual strengths to find the best fit for your enterprise

      Vendor Profiles icon

      A list of vendors with ratings for their 'Product: Overall, Usability, Affordability, and Architecture' and their 'Vendor: Overall, Viability, Focus, Reach, and Sales'. It uses a quarters rating system where 4 quarters of a circle is Exemplary and 0 quarters is Poor.

      For an explanation of how the Info-Tech Harvey Balls are calculated, see Information Presentation – Criteria Scores (Harvey Balls) in the Appendix.

      Balance individual strengths to find the best fit for your enterprise

      Vendor Profiles icon

      A list of vendors with ratings for their 'Evaluated Features'. Rating system uses Color coding with green being 'Feature is fully present...' and red being 'Feature is absent', and if a star is in the green then 'Feature is best in its class'.

      For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix.

      Vendor title icon.

      USE CASE 1

      Social Listening and Analytics

      Seeking functionality for capturing, aggregating, and analyzing social media content in order to create actionable customer or competitive insights.

      Feature weightings for the social listening and analytics use-case scenario

      Vendor Profiles icon

      Core Features

      Sentiment Analysis Uncovering attitudes and opinions expressed on social media is important for generating actionable customer insights.
      Dashboards and Visualization Capturing and aggregating social media insights is ineffective without proper data visualization and analysis.
      Trend Analysis The ability to monitor trends across multiple social media services is integral for effective social listening.
      Contextual Analysis Understanding and analyzing language and visual content on social media is important for generating actionable customer insights.

      Additional Features

      Social Media Channel Integration – Inbound

      Social Moderation and Workflow Management

      Social Post Archival

      Feature Weightings

      Pie chart of feature weightings.

      Vendor considerations for the social listening and analytics use-case scenario

      Vendor Profiles icon

      Product Evaluation Features

      Usability A clean and intuitive user interface is important for users to fully leverage the benefits of an SMMP.
      Affordability Affordability is an important consideration as the price of SMMPs can vary significantly depending on the breadth and depth of capability offered.
      Architecture SMMP is more valuable to organizations when it can integrate well with their applications, such as CRM and marketing automation software.

      Vendor Evaluation Features

      Viability Vendor viability is critical for long-term stability of an application portfolio.
      Focus The vendor is committed to the space and has a future product and portfolio roadmap.
      Reach Companies with processes that cross organizational and geographic boundaries require effective and available support.
      Sales Vendors need to demonstrate flexibility in terms of industry and technology partnerships to meet evolving customer needs.

      Pie chart for Product and Vendor Evaluation Features.

      Vendor performance for the social listening and analytics use-case scenario

      Vendor Profiles icon
      Champion badge.

      Champions for this use case:

      Salesforce: Salesforce Social Studio offers excellent trend and in-depth contextual analysis and is among the best vendors in presenting visually appealing and interactive dashboards.
      Leader badge.

      Leaders for this use case:

      Sysomos: Sysomos MAP and Heartbeat are great offerings for conducting social media health checks using in-depth contextual analytics.

      Adobe: Adobe Social is a great choice for digital marketers that need in-depth sentiment and longitudinal analysis of social data – particularly when managing social alongside other digital channels.

      Best Overall Value badge.

      Best Overall Value Award

      Sysomos: A strong analytics capability offered in Sysomos MAP and Heartbeat at a relatively low cost places Sysomos as the best bang for your buck in this use case.

      Players in the social listening and analytics scenario

      • Sprinklr
      • Hootsuite
      • Sprout Social

      Vendor performance for the social listening and analytics use-case scenario

      Vendor Profiles icon

      Stacked bar chart comparing vendors' use-case performance in multiple areas of 'Social Listening and Analytics'.

      Value Index for the social listening and analytics scenario

      Vendor Profiles icon
      What is a Value Score?

      The Value Score indexes each vendor’s product offering and business strength relative to its price point. It does not indicate vendor ranking.

      Vendors that score high offer more bang-for-the-buck (e.g. features, usability, stability) than the average vendor, while the inverse is true for those that score lower.

      Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.

      On a relative basis, Sysomos maintained the highest Info-Tech Value ScoreTM of the vendor group for this use-case scenario. Vendors were indexed against Sysomos’ performance to provide a complete, relative view of their product offerings.

      Bar chart of vendors' Value Scores in social listening and analytics. Sysomos has the highest and the Average Score is 66.8.

      For an explanation of how price is determined, see Information Presentation – Price Evaluation in the Appendix.

      For an explanation of how the Info-Tech Value Index is calculated, see Information Presentation – Value Index in the Appendix.

      Vendor title icon.

      USE CASE 2

      Social Publishing and Campaign Management

      Seeking functionality for publishing content to multiple networks or accounts simultaneously, and managing social media campaigns in-depth (e.g. social property management and post scheduling).

      Feature weightings for the social publishing and campaign management use-case scenario

      Vendor Profiles icon

      Core Features

      Campaign Execution The ability to manage multiple social media services simultaneously is integral for carrying out social media campaigns.
      Social Response Management Creating response workflows is equally important to publishing capability for managing social campaigns.

      Additional Features

      Social Media Channel Integration – Outbound

      Social Moderation and Workflow Management

      Social Post Archival

      Social Asset Management

      Post Time Optimization

      Social Media Channel Integration – Inbound

      Trend Analysis

      Sentiment Analysis

      Dashboards and Visualization

      Feature Weightings

      Pie chart of feature weightings.

      Vendor considerations for the social publishing and campaign management use-case scenario

      Vendor Profiles icon

      Product Evaluation Features

      Usability A clean and intuitive user interface is important for users to fully leverage the benefits of an SMMP.
      Affordability Affordability is an important consideration as the price of SMMPs can vary significantly depending on the breadth and depth of capability offered.
      Architecture SMMP is more valuable to organizations when it can integrate well with their applications, such as CRM and marketing automation software.

      Vendor Evaluation Features

      Viability Vendor viability is critical for long-term stability of an application portfolio.
      Focus The vendor is committed to the space and has a future product and portfolio roadmap.
      Reach Companies with processes that cross organizational and geographic boundaries require effective and available support.
      Sales Vendors need to demonstrate flexibility in terms of industry and technology partnerships to meet evolving customer needs.

      Pie chart of Product and Vendor Evaluation Features.

      Vendor performance for the social publishing and campaign management use-case scenario

      Vendor Profiles icon

      Champion badge.

      Champions for this use case:

      Adobe: Adobe has the best social campaign execution capability in the market, enabling marketers to manage and auto-track multiple campaigns. It also offers a strong asset management feature that allows users to leverage Marketing Cloud content.
      Leader badge.

      Leaders for this use case:

      Salesforce: SFDC has built a social marketing juggernaut, offering top-notch response workflows and campaign execution capability.

      Hootsuite: Hootsuite has good response capabilities backed up by a strong team collaboration feature set. It offers simplified cross-platform posting and post-time optimization capabilities.

      Best Overall Value badge.

      Best Overall Value Award

      Sendible: Sendible offers the best value for your money in this use case with good response workflows and publishing capability.

      Players in the social publishing and campaign management scenario

      • Sprout Social
      • Sprinklr
      • Sendible

      Vendor performance for the social publishing and campaign management use-case scenario

      Vendor Profiles icon

      Stacked bar chart comparing vendors' use-case performance in multiple areas of 'Social publishing and campaign management'.

      Value Index for the social publishing and campaign management scenario

      Vendor Profiles icon

      What is a Value Score?

      The Value Score indexes each vendor’s product offering and business strength relative to its price point. It does not indicate vendor ranking.

      Vendors that score high offer more bang-for-the-buck (e.g. features, usability, stability) than the average vendor, while the inverse is true for those that score lower.

      Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.

      On a relative basis, Sendible maintained the highest Info-Tech Value ScoreTM of the vendor group for this use-case scenario. Vendors were indexed against Sendible’s performance to provide a complete, relative view of their product offerings.

      Bar chart of vendors' Value Scores in social publishing and campaign management. Sendible has the highest and the Average Score is 72.9.

      For an explanation of how Price is determined, see Information Presentation – Price Evaluation in the Appendix.

      For an explanation of how the Info-Tech Value Index is calculated, see Information Presentation – Value Index in the Appendix.

      Vendor title icon.

      USE CASE 3

      Social Customer Care

      Seeking functionality for management of the social customer service queue as well as tools for expedient resolution of customer issues.

      Feature weightings for the social customer care use-case scenario

      Vendor Profiles icon

      Core Features

      Social Moderation and Workflow Management Creating escalation workflows is important for triaging customer service, managing the social customer service queue and offering expedient resolution to customer complaints.

      Additional Features

      Social Media Channel Integration – Outbound

      Social Moderation and Workflow Management

      Social Response Management

      Social Post Archival

      Sentiment Analysis

      Dashboards and Visualization

      Campaign Execution

      Trend Analysis

      Post Time Optimization

      Feature Weightings

      Pie chart with Feature Weightings.

      Vendor considerations for the social customer case use-case scenario

      Vendor Profiles icon

      Product Evaluation Features

      Usability A clean and intuitive user interface is important for users to fully leverage the benefits of an SMMP.
      Affordability Affordability is an important consideration as the price of SMMPs can vary significantly depending on the breadth and depth of capability offered.
      Architecture SMMP is more valuable to organizations when it can integrate well with their applications, such as CRM and marketing automation software.

      Vendor Evaluation Features

      Viability Vendor viability is critical for long-term stability of an application portfolio.
      Focus The vendor is committed to the space and has a future product and portfolio roadmap.
      Reach Companies with processes that cross organizational and geographic boundaries require effective and available support.
      Sales Vendors need to demonstrate flexibility in terms of industry and technology partnerships to meet evolving customer needs.

      Pie chart with Product and Vendor Evaluation Features.

      Vendor performance for the social customer care use-case scenario

      Vendor Profiles icon

      Champion badge.

      Champions for this use case:

      Salesforce: Salesforce offers exceptional end-to-end social customer care capability with strong response escalation workflows.
      Leader badge.

      Leaders for this use case:

      Sprinklr: Sprinklr’s offering gives users high flexibility to configure escalation workflows and role-based permissions for managing the social customer service queue.

      Hootsuite: Hootsuite’s strength lies in the breadth of social networks that the platform supports in offering expedient resolution to customer complaints.

      Best Overall Value badge.

      Best Overall Value Award

      Sysomos: Sysomos is the best bang for your buck in this use case, offering essential response and workflow capabilities.

      Players in the social listening and analytics scenario

      • Sendible
      • Sysomos
      • Viralheat (Cision)

      Vendor performance for the social customer care use-case scenario

      Vendor Profiles icon

      Stacked bar chart comparing vendors' use-case performance in multiple areas of 'Social customer care'.

      Value Index for the social customer care scenario

      Vendor Profiles icon

      What is a Value Score?

      The Value Score indexes each vendor’s product offering and business strength relative to its price point. It does not indicate vendor ranking.

      Vendors that score high offer more bang-for-the-buck (e.g. features, usability, stability) than the average vendor, while the inverse is true for those that score lower.

      Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.

      On a relative basis, Sendible maintained the highest Info-Tech Value ScoreTM of the vendor group for this use-case scenario. Vendors were indexed against Sendible’s performance to provide a complete, relative view of their product offerings.

      Bar chart of vendors' Value Scores in social customer care. Sysomos has the highest and the Average Score is 79.6.

      For an explanation of how Price is determined, see Information Presentation – Price Evaluation in the Appendix.

      For an explanation of how the Info-Tech Value Index is calculated, see Information Presentation – Value Index in the Appendix.

      VENDOR LANDSCAPE

      Vendor Profiles and Scoring

      Vendor title icon.

      Use the information in the SMMP Vendor Landscape analysis to streamline your own vendor analysis process

      Vendor Profiles icon

      This section of the Vendor Landscape includes the profiles and scoring for each vendor against the evaluation framework previously outlined.

      Sample of the SMMP Vendor Landscape analysis. Vendor Profiles
      • Include an overview for each company.
      • Identify the strengths and weaknesses of the product and vendor.
      • Identify the three-year TCO of the vendor’s solution (based on a ten-tiered model).
      Sample of the Vendor Landscape profiles slide.
      Vendor Scoring

      Use the Harvey Ball scoring of vendor and product considerations to assess alignment with your own requirements.

      Review the use-case scenarios relevant to your organization’s Use-Case Fit Assessment results to identify a vendor’s fit to your organization's SMMP needs. (See the following slide for further clarification on the use-case assessment scoring process.)

      Review the stoplight scoring of advanced features to identify the functional capabilities of vendors.

      Sample of the Vendor Scoring slide.

      Adobe Social is a powerhouse for digital marketers, with extremely well-developed analytics capabilities

      Vendor Profiles icon
      Product Adobe Social
      Employees 15,000+
      Headquarters San Jose, CA
      Website Adobe.com
      Founded 1982
      Presence NASDAQ: ADBE

      Logo for Adobe.

      3 year TCO for this solution falls into pricing tier 8 between $500,000 and $1,000,000.

      Pricing tier for Adobe, tier 8.
      Pricing provided by vendor

      OVERVIEW
      • Adobe Social is a strong offering included within the broader Adobe Marketing Cloud. The product is tightly focused on social analytics and social campaign execution. It’s particularly well-suited to dedicated digital marketers or social specialists.
      STRENGTHS
      • Adobe Social provides broad capabilities across social analytics and social campaign management; its integration with Adobe Analytics is a strong selling point for organizations that need a complete, end-to-end solution.
      • It boasts great archiving capabilities (up to 7 years for outbound posts), meeting the needs of compliance-centric organizations and providing for strong longitudinal analysis capabilities.
      CHALLENGES
      • The product plays well with the rest of the Adobe Marketing Cloud, but the list of third-party CRM and CSM integrations is shorter than some other players in the market.
      • While the product is unsurprisingly geared towards marketers, organizations that want a scalable platform for customer service use cases will need to augment the product due to its focus on campaigns and analytics – service-related workflow and automation capabilities are not a core focus for the company.

      Adobe Social

      Vendor Profiles icon
      'Product' and 'Vendor' scores for Adobe. Overall product is 3/4; overall vendor is 4/4.
      'Scenario Performance' awards and 'Value Index' in the three previous scenarios. Adobe earned 'Leader' in Social Listening & Analytics and 'Champion' in Social Publishing & Campaign Management.
      Info-Tech Recommends

      Adobe Social provides impressive features, especially for companies that position social media within a larger digital marketing strategy. Organizations that need powerful social analytics or social campaign execution capability should have Adobe on their shortlist, though the product may be an overbuy for social customer care use cases.

      Scores for Adobe's individual features, color-coded as they were previously.

      Hootsuite is a capable vendor that offers a flexible solution for monitoring many different social media services

      Vendor Profiles icon
      Product Hootsuite
      Employees 800
      Headquarters Vancouver, BC
      Website Hootsuite.com
      Founded 2007
      Presence Privately held

      Logo for Hootsuite.

      3 year TCO for this solution falls into pricing tier 6, between $100,000 and $250,000.

      Pricing tier for Hootsuite, tier 6.
      Pricing derived from public information

      OVERVIEW
      • In the past, Hootsuite worked on the freemium model by providing basic social account management features. The company has since expanded its offering and put a strong focus on enterprise feature sets, such as collaboration and workflow management.
      STRENGTHS
      • Hootsuite is extremely easy to use, having one of the most straightforward interfaces of vendors evaluated.
      • It has extensive monitoring capabilities for a wide variety of social networks as well as related services, which are supported through an app store built into the Hootsuite platform.
      • The product provides a comprehensive model for team-based collaboration and workflow management, demonstrated through nice cross-posting and post-time optimization capabilities.
      CHALLENGES
      • Hootsuite’s reporting and analytics capabilities are relatively basic, particularly when contrasted with more analytics-focused vendors in the market.
      • Running cross-channel campaigns is challenging without integration with third-party applications.

      Hootsuite

      Vendor Profiles icon
      'Product' and 'Vendor' scores for Hootsuite. Overall product is 3/4; overall vendor is 4/4.
      'Scenario Performance' awards and 'Value Index' in the three previous scenarios. Hootsuite earned 5th out of 6 in Social Listening & Analytics, 'Leader' in Social Publishing & Campaign Management, and 'Leader' in Social Customer Care.
      Info-Tech Recommends

      The free version of Hootsuite is useful for getting your feet wet with social management. The paid version is a great SMMP for monitoring and engaging your own social properties with good account and team management at an affordable price. This makes it ideal for SMBs. However, organizations that need deep social analytics may want to look elsewhere.

      Scores for Hootsuite's individual features, color-coded as they were previously.

      Salesforce Marketing Cloud continues to be a Cadillac solution; it’s a robust platform with a host of features

      Vendor Profiles icon
      Product Salesforce Social Studio
      Employees 24,000+
      Headquarters San Francisco, CA
      Website Salesforce.com
      Founded 1999
      Presence NASDAQ: CRM

      Logo for Salesforce.

      3 year TCO for this solution falls into pricing tier 7, between $250,000 and $500,000

      Pricing tier for Salesforce, tier 7.
      Pricing provided by vendor

      OVERVIEW
      • Social Studio is a powerful solution fueled by Salesforce’s savvy acquisitions in the marketing automation and social media management marketspace. The product has rapidly matured and is adept at both marketing and customer service use cases.
      STRENGTHS
      • Salesforce continues to excel as one of the best SMMP vendors in terms of balancing inbound analytics and outbound engagement. The recent addition of Salesforce Einstein to the platform bolsters deep learning capabilities and enhances the product’s value proposition to those that want a tool for robust customer intelligence.
      • Salesforce’s integration of Marketing Cloud, with its Sales and Service Clouds, also creates a good 360-degree customer view.
      CHALLENGES
      • Salesforce’s broad and deep feature set comes at a premium: the solution is priced materially higher than many other vendors. Before you consider Marketing Cloud, it’s important to evaluate which social media capabilities you want to develop: if you only need basic response workflows or dashboard-level analytics, purchasing Marketing Cloud runs the risk of overbuying.
      • In part due to its price point and market focus, Marketing Cloud is more suited to enterprise use cases than SMB use cases.

      Salesforce

      Vendor Profiles icon
      'Product' and 'Vendor' scores for  . Overall product is 3/4; overall vendor is 4/4.
      'Scenario Performance' awards and 'Value Index' in the three previous scenarios. Salesforce earned 'Champion' in Social Listening & Analytics, 'Leader' in Social Publishing & Campaign Management, and 'Champion' in Social Customer Care.
      Info-Tech Recommends

      Social Studio in Salesforce Marketing Cloud remains a leading solution. Organizations that need to blend processes across the enterprise that rely on social listening, deep analytics, and customer engagement should have the product on their shortlist. However, companies with more basic needs may be off-put by the solution’s price point.

      Scores for 's individual features, color-coded as they were previously.

      Sendible offers multiple social media management capabilities for SMBs and agencies

      Vendor Profiles icon
      Product Sendible
      Employees 27
      Headquarters London, UK
      Website Sendible.com
      Founded 2009
      Presence Privately held

      Logo for Sendible.

      3 year TCO for this solution falls into pricing tier 4, between $25,000 and $50,000

      Pricing tier for Sendible, tier 4.
      Pricing derived from public information

      OVERVIEW
      • Founded in 2009, Sendible is a rising player in the SMMP market. Sendible is primarily focused on the SMB space. A growing segment of its client base is digital marketing agencies and franchise companies.
      STRENGTHS
      • Sendible’s user interface is very intuitive and user friendly.
      • The product offers the ability to manage multiple social accounts simultaneously as well as schedule posts to multiple groups on different social networks, making Sendible a strong choice for social engagement and customer care.
      • Its affordability is strong given its feature set, making it an attractive option for organizations that are budget conscious.
      CHALLENGES
      • Sendible remains a smaller vendor in the market – its list of channel partners lags behind larger incumbents.
      • Sendible’s contextual and visual content analytics are lacking vis-à-vis more analytics-centric vendors.

      Sendible

      Vendor Profiles icon
      'Product' and 'Vendor' scores for Sendible. Overall product is 3/4; overall vendor is 4/4.
      'Scenario Performance' awards and 'Value Index' in the three previous scenarios. Sendible earned 6th out of 6 and 'Best Overall Value' in Social Publishing & Campaign Management and 4th out of 6 in Social Customer Care.
      Info-Tech Recommends

      Sendible offers a viable solution for small and mid-market companies, as well as social agencies with a focus on customer engagement for marketing and customer service use cases. However, organizations that need deep social analytics may want to look elsewhere.

      Scores for Sendible's individual features, color-coded as they were previously.

      Sprinklr

      Vendor Profiles icon
      Product Sprinklr
      Employees 1,100
      Headquarters New York, NY
      Website Sprinklr.com
      Founded 2009
      Presence Privately held

      Logo for Sprinklr.

      Pricing tier for Sprinklr, tier 6.
      Pricing derived from public information

      OVERVIEW
      • Sprinklr has risen rapidly as a best-of-breed player in the social media management market. It markets a solution geared towards multiple use cases, from customer intelligence and analytics to service-centric response management.
      STRENGTHS
      • Sprinklr’s breadth of capabilities are impressive: the vendor has maintained a strong focus on social-specific functionality. As a result of this market focus, they have invested prudently in advanced social analytics and moderation workflow capabilities.
      • Sprinklr’s user experience design and data visualization capabilities are top-notch, making it a solution that’s easy for end users and decision makers to get up and running with quickly.
      CHALLENGES
      • Relative to other players in the market, the breadth and scope of Sprinklr’s integrations with other customer experience management solutions is limited.
      • Based on its feature set and price point, Sprinklr is best suited for mid-to-large organizations. SMBs run the risk of an overbuy situation.

      Sprinklr

      Vendor Profiles icon

      'Product' and 'Vendor' scores for Sprinklr. Overall product is 3/4; overall vendor is 3/4.
      'Scenario Performance' awards and 'Value Index' in the three previous scenarios. Sprinklr earned 4th out of 6 in Social Listening & Analytics, 5th out of 6 in Social Publishing & Campaign Management, and 'Leader' in Social Customer Care.
      Info-Tech Recommends

      Sprinklr is a strong choice for small and mid-market organizations offering breadth of social media management capabilities that covers social analytics, engagement, and customer service.

      Scores for Sprinklr's individual features, color-coded as they were previously.

      Sprout Social provides small-to-medium enterprises with robust social response capabilities at a reasonable price

      Vendor Profiles icon
      Product Sprout Social
      Employees 200+
      Headquarters Chicago, IL
      Website Sproutsocial.com
      Founded 2010
      Presence Privately held

      Logo for Sprout Social.

      3 year TCO for this solution falls into pricing tier 6, between $100,000 and $250,000

      Pricing tier for Sprout Social, tier 6.
      Pricing derived from public information

      OVERVIEW
      • Sprout Social has built out its enterprise capabilities over the last several years. It offers strong feature sets for account management, social monitoring and analytics, and customer care – it particularly excels at the latter.
      STRENGTHS
      • Sprout’s unified inbox and response management features are some of the most intuitive we’ve seen. This makes it a natural option for providing customer service via social channels.
      • Sprout Social is priced competitively in relation to other vendors.
      • The product provides strong social asset management capabilities where users can set content permissions and expiration dates, and limit access.
      CHALLENGES
      • Deep contextual analysis is lacking: the solution clearly falls more to the engagement side of the spectrum, and is particularly suited for social customer service.
      • Sprout Social has a limited number of technology partners for integrations with applications such as CRM and marketing automation software.
      • It still has a predominantly North American market focus.

      Sprout Social

      Vendor Profiles icon
      'Product' and 'Vendor' scores for Sprout Social. Overall product is 3/4; overall vendor is 3/4.
      'Scenario Performance' awards and 'Value Index' in the three previous scenarios. Sprout Social earned 6th out of 6 in Social Listening & Analytics and 4th out of 6 in Social Publishing & Campaign Management.
      Info-Tech Recommends

      Sprout Social’s easy-to-understand benchmarking and dashboards, paired with strong response management, make it a great choice for mid-sized enterprises concerned with social engagement. However, organizations that want to do deep social analytics will need to augment the solution.

      Scores for Sprout Social's individual features, color-coded as they were previously.

      Sysomos’ prime feature is its hardy analytics built atop a plethora of inbound social channels

      Vendor Profiles icon

      Product Sysomos MAP and Heartbeat
      Employees 200+
      Headquarters Toronto, ON
      Website Sysomos.com
      Founded 2007
      Presence Privately held

      Logo for Sysomos.

      3 year TCO for this solution falls into pricing tier 4, between $25,000 and $50,000

      Pricing tier for Sysomos, tier 4.
      Pricing derived from public information

      OVERVIEW
      • Sysomos began life as a project at the University of Toronto prior to its acquisition by Marketwire in 2010.
      • It split from Marketwire in 2015 and redesigned its product to focus on social monitoring, analysis, and engagement.

      STRENGTHS

      • MAP and Heartbeat offer extensive contextual and sentiment analytics, consolidating findings through a spam-filtering process that parses out a lot of the “noise” inherent in social media data.
      • The solution provides an unlimited number of profiles, enabling more opportunities for collaboration.
      • It provides workflow summaries, documenting the actions of staff and providing an audit trail through the entire process.

      CHALLENGES

      • Sysomos has introduced a publishing tool for social campaigns. However, its outbound capabilities continue to lag, and there are currently no tools for asset management.
      • Sysomos’ application integration stack is limited relative to other vendors.

      Sysomos

      Vendor Profiles icon
      'Product' and 'Vendor' scores for Sysomos. Overall product is 3/4; overall vendor is 3/4.
      'Scenario Performance' awards and 'Value Index' in the three previous scenarios. Sysomos earned 'Leader' and 'Best Overall Value' in Social Listening & Analytics and 5th out of 6 as well as 'Best Overall Value' in Social Customer Care.
      Info-Tech Recommends

      Sysomos’ broad array of good features has made it a frequent challenger to Marketing Cloud on analytics-centric SMMP evaluation shortlists. Enterprise-scale customers specifically interested in social listening and analytics, rather than customer engagement and campaign execution, will definitely want to take a look.

      Scores for Sysomos's individual features, color-coded as they were previously.

      Viralheat offers a clean analysis of an organization’s social media activity and has beefed up response workflows

      Vendor Profiles icon

      Product Viralheat
      Employees 1,200
      Headquarters Chicago, IL
      Website Cision.com
      Founded 2015
      Presence Privately held

      Logo for Cision (Viralheat).

      3 year TCO for this solution falls into pricing tier 6, between $100,000 and $250,000

      Pricing tier for Cision (Viralheat), tier 6.
      Pricing derived from public information

      OVERVIEW
      • Viralheat has been in the social media market since 2009. It provides tools for analytics and in-band social engagement.
      • The company was acquired by Cision in 2015, a Chicago-based public relations technology company.

      STRENGTHS

      • Viralheat offers robust workflow management capabilities for social response and is particularly useful for customer service.
      • The product has strong post time optimization capability through its ViralPost scheduling feature.
      • Cision’s acquisition of Viralheat makes the product a great choice for third-party social media management, namely public relations and digital marketing agencies.

      CHALLENGES

      • Viralheat remains a smaller vendor in the market – its list of channel partners lags behind larger incumbents.
      • Contextual and sentiment analysis are lacking relative to other vendors.

      Cision (Viralheat)

      Vendor Profiles icon
      'Product' and 'Vendor' scores for Cision (Viralheat). Overall product is 3/4; overall vendor is 2/4.
      'Scenario Performance' awards and 'Value Index' in the three previous scenarios. Cision (Viralheat) earned  in Social Listening & Analytics,  in Social Publishing & Campaign Management, and  in Social Customer Care.
      Info-Tech Recommends

      Cision has upped its game in terms of social workflow and response management and it monitors an above-average number of services. It is a steadfast tool for brands that are primarily interested in outbound customer engagement for marketing and customer service use cases.

      Scores for Cision (Viralheat)'s individual features, color-coded as they were previously.

      Use the SMMP Vendor Shortlist Tool to customize the vendor analysis for your organization

      Vendor Profiles icon SMMP Vendor Shortlist & Detailed Feature Analysis Tool

      Instructions

      1. Eliminate misaligned vendors with knock-out criteria
        Use the SMMP Vendor Shortlist &am; Detailed Feature Analysis Tool to eliminate vendors based on specific knock-out criteria on tab 2, Knock-Out Criteria.
      2. Create your own evaluation framework
        Tailor the vendor evaluation to include your own product and vendor considerations on tab 3, Weightings. Identify the significance of advanced features for your own procurement on a scale of Mandatory, Optional, and Not Required on tab 4, Detailed Feature Analysis.
      3. Review the results of your customized evaluation
        Review your custom vendor shortlist on tab 5, Results.
      This evaluation uses both functional and architectural considerations to eliminate vendors.

      Knock-Out Criteria

      COTS vs. Open Source
      Deployment Models

      Sample of the SMMP Vender Shortlist & Detailed Feature Analysis Tool tab 5, Results.
      Sample Vendor Shortlist from tab 5, Results

      Interpreting the Results
      Your custom shortlist will rank vendors that passed the initial knock-out criteria based on their overall score.
      The shortlist will provide broken-down scoring, as well as a custom value index based on the framework set in the tool.

      Phase 2, Step 2: Select your SMMP solution

      2.1

      2.2

      Analyze and shortlist vendors in the space Select your SMMP solution

      This step will walk you through the following activities:

      • Prioritize your solution requirements.
      • Create an RFP to submit to vendors.
      • Solicit and review vendor proposals.
      • Conduct onsite vendor demonstrations.
      • Select the right solution.

      This step involves the following participants:

      • Core Project Team
      • Procurement Manager
      • Representative Stakeholders from Digital Marketing, Sales, and IT

      Outcomes of this step:

      • SMMP Selection Strategy

      Determine your SMMP procurement strategy

      Critical Points and Checks in Your Procurement
      • Follow your own organization’s procurement procedures to ensure that you adhere to your organization’s policies.
      • Based on your organization’s policies, identify if you are going to conduct a private or public RFP process.
        • If your RFP will contain sensitive information, use a private RFP process that is directed to specific vendors in order to protect the proprietary practices of your business.

      Info-Tech Insight

      If you are still not sure of a vendor’s capabilities, we recommend sending an RFI before proceeding with an RFP.

      INFO-TECH OPPORTUNITY

      If your organization lacks a clear procurement process, refer to Info-Tech's Optimize IT Procurement research to help construct a formal process for selecting application technology.

      Info-Tech’s 15-Step Procurement Process

      Use Info-Tech's procurement process to ensure that your SMMP selection is properly planned and executed.

      1. Initiate procurement.
      2. Select procurement manager.
      3. Prepare for procurement; check that prerequisites are met.
      4. Select appropriate procurement vehicle.
      5. Assemble procurement teams.
      6. Create procurement project plan.
      7. Identify and notify vendors about procurement.
      8. Configure procurement process.
      9. Gather requirements.
      10. Prioritize requirements.
      11. Build the procurement documentation package.
      12. Issue the procurement.
      13. Evaluate proposals.
      14. Recommend a vendor.
      15. Present to management.

      Much of your procurement process should already be outlined from your charter and initial project structuring.
      In this stage of the process, focus on the successful completion of steps 7-15.

      Prioritize your solution requirements based on your business, architecture, and performance needs

      Associated Activity icon

      INPUT: Requirements Workbook and requirements gathering findings

      OUTPUT: Full documentation of requirements for the RFP and solution evaluation process

      Completed in Section 3

      1. Identify Your Requirements
        Use the findings being collected in the Requirements Workbook and related materials to define clear requirements around your organization’s desired SMMP.
      2. Prioritize Your Requirements
        • Identify the significance of each requirement for your solution evaluation.
        • Identify features and requirements as mandatory, important, or optional.
        • Control the number of mandatory requirements you document. Too many mandatory requirements could create an unrealistic framework for evaluating solutions.
      3. Create a Requirements Package
        • Consolidate your identified requirements into one list, removing redundancies and conflicts.
        • Categorize the requirements based on their priority and nature.
        • Use this requirements package as you evaluate vendors and create your RFP for shortlisted vendors.

      Info-Tech Insight

      No solution will meet 100% of your requirements. Control the number of mandatory requirements you place in your procurement process to ensure that vendors that are the best fit for your organization are not eliminated unnecessarily.

      Create an RFP to submit to vendors

      Supporting Tool icon Request for Proposal Template
      Associated Activity icon Activity: Interpreting the Results

      INPUT: Requirements package, Organization’s procurement procedures

      OUTPUT: RFP

      MATERIALS: Whiteboard and markers

      PARTICIPANTS: Project manager, Core project team

      Leverage Info-Tech’s SMMP RFP Template to convey your desired suite requirements to vendors and outline the proposal and procurement steps set by your organization.

      Build Your RFP
      1. Outline the organization's procurement instructions for vendors (Sections 1, 3, and 5).
      2. Input the requirements package created in Activity 5.2 into your RFP (Section 4).
      3. Create a scenario overview to provide vendors an opportunity to give an estimated price.

      Approval Process

      Each organization has a unique procurement process; follow your own organization’s process as you submit your RFPs to vendors.

      1. Ensure compliance with your organization's standards and gain approval for submitting your RFP.

      Info-Tech RFP
      Table of Contents

      1. Statement of Work
      2. General Information
      3. Proposal Preparation Instructions
      4. Scope of Work, Specifications, and Requirements
      5. Vendor Qualifications and References
      6. Budget and Estimated Pricing
      7. Vendor Certification

      Standardize the potential responses from vendors and streamline your evaluation with a response template

      Supporting Tool icon Vendor Response Template
      Sample of the Vendor Response Template. Adjust the scope and content of the Vendor Response Template to fit your SMMP procurement process and vendor requirements.

      Section

      Why is this section important?

      About the Vendor This is where the vendor will describe itself and prove its organizational viability.
      Understanding of the Challenge Demonstrates that understanding of the problem is the first step in being able to provide a solution.
      Methodology Shows that there is a proven methodology to approach and solve the challenge.
      Proposed Solution Describes how the vendor will address the challenge. This is a very important section as it articulates what you will receive from the vendor as a solution.
      Project Management, Plan, and Timeline Provides an overview of the project management methodology, phases of the project, what will be delivered, and when.
      Vendor Qualifications Provides evidence of prior experience with delivering similar projects for similar clients.
      References Provides contact information for individuals/organizations for which the vendor has worked and who can vouch for the experience and success of working with this vendor.
      Value Added Services Remember, this could lead to a long-term relationship. It’s not only about what you need now, but also what you may need in the future.
      Requirements Confirmation from the vendor as to which requirements it can meet and how it will meet them.

      Evaluate the RFPs you receive within a clear scoring process

      Supporting Tool icon SMMP RFP Evaluation and Scoring Tool
      Steps to follow: 'Review, Evaluate, Shortlist, Brief, Select' with the first 3 highlighted.

      Associated Activity icon Activity

      Build a fair evaluation framework that evaluates vendor solutions against a set criteria rather than relative comparisons.

      INSTRUCTIONS

      1. Have members of the SMMP evaluation team review the RFP responses given by vendors.
      2. Input vendor solution information into the SMMP RFP Evaluation and Scoring Tool.
      3. Analyze the vendors against your identified evaluation framework.
      4. Identify vendors with whom you wish to arrange vendor briefings.
      5. Contact vendors and arranging briefings.
      How to use this tool
      • Review the feature list and select where each feature is mandatory, desirable, or not applicable.
      • Select if each feature has been met by the vendor RFP response.
      • Enter the costing information provided by each vendor.
      • Determine the relative importance of the features, architecture, and support.
      Tool Output
      • Costing
      • Overall score
      • Evaluation notes and comments

      Vendor product demonstration

      Vendor Profiles icon Demo Script Template

      Demo

      Invite vendors to come onsite to demonstrate the product and to answer questions. Use a demo script to help identify how a vendor’s solution will fit your organization’s particular business capability needs.
      Make sure the solution will work for your business

      Provide the vendor with some usage patterns for the SMMP tool in preparation for the vendor demo.

      Provide the following information to vendors in your script:

      • Usage for different groups.
      • SMMP usage and [business analytics] usage.
      • The requirements for administration.
      How to challenge the vendors in the demo
      • Change visualization/presentation.
      • Change the underlying data.
      • Add additional datasets to the artifacts.
      • Collaboration capabilities.
      • Perform an investigation in terms of finding BI objects and identifying previous changes, and examine the audit trail.
      Sample of the SMMP Demo Script Template
      SMMP Demo Script Template

      INFO-TECH ACTIVITY

      INPUT: Requirements package, Use-case results

      OUTPUT: Onsite demo

      1. Create a demo script that will be sent to vendors that outlines SMMP usage patterns from your organization.
      2. Construct the demo script with your SMMP evaluation team, providing both prompts for the vendor to display the capabilities and some sample data for the vendor to model.

      Use vendor RFPs and demos to select the SMMP that best fits your organization’s needs

      Supporting Tool icon Suite Evaluation and Scoring Tool: Tab 5, Overall Score

      Don’t just choose the vendor who gave the best presentation. Instead, select the vendor who meets your functional requirements and organizational needs.

      Category Weight Vendor 1 Vendor 2 Vendor 3 Vendor 4
      SMMP Features 60% 75% 80% 80% 90%
      Architecture 25% 55% 60% 90% 90%
      Support 15% 10% 70% 60% 95%
      Total Score 100% 60% 74% 80% 91%
      Use your objective evaluation to select a vendor to recommend to management for procurement. Arrow from 'Vendor 4' to post script.

      Don’t automatically decide to go with the highest score; validate that the vendor is someone you can envision working with for the long term.

      • Select a vendor based not only on their evaluation performance, but also on your belief that you could form a lasting and supportive relationship with them.
      • Integration needs are dynamic, not static. Find an SMMP tool and vendor that have strong capabilities and will fit with the application and integration plans of the business.
      • In many cases, you will require professional services together with your SMMP purchase to make sure you have some guidance in the initial development and your own staff are trained properly.

      Following the identification of your selected suite, submit your recommendation to the organization’s management or evaluation team for final approval.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Sample of 'Create an RFP to submit to vendors' slide with 'Request for Proposal Template'. Create an RFP for SMMP procurement

      Our Info-Tech analyst will walk you through the RFP preparation to ensure the SMMP requirements are articulated clearly to vendors in this space.

      Sample of 'Vendor product demonstration' slide with 'Demo Script Template'. Create SMMP demo scripts

      An analyst will walk you through the demo script preparation to guide the SMMP product demonstrations and briefings offered by vendors. The analyst will ensure the demo script addresses key requirements documented earlier in the process.

      Select and Implement a Social Media Management Platform

      PHASE 3

      Review Implementation Considerations

      Phase 3: Review implementation considerations

      Steps of this blueprint represented by circles of varying colors and sizes, labelled by text of different sizes. Only Phase 3 is highlighted.
      Estimated Timeline:

      Info-Tech Insight

      Even a solution that is a perfect fit for an organization will fail to generate value if it is not properly implemented or measured. Conduct the necessary planning before implementing your SMMP.

      Major Milestones Reached
      • Plan for implementation and expected go-live date

      Key Activities Completed

      • SMMP Implementation Plan
      • Governance Plan
      • Change Control Methods

      Outcomes from This Phase

      Plans for implementing the selected SMMP tool.

      Phase 3 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Review Implementation Considerations

      Proposed Time to Completion: 2 weeks
      Step 3.1: Establish best practices for SMMP implementation Step 3.2: Assess the measured value from the project
      Start with an analyst kick-off call:
      • Determine the right governance structure to overlook the SMMP implementation.
      • Identify integrations with other applications.
      • Establish an ongoing maintenance plan.
      • Assess the different deployment models.
      Review findings with analyst:
      • Determine the key performance indicators for each department using the SMMP
      • Identify key performance indicators for business units using an SMMP
      Then complete these activities…
      • Establish a governance structure for social media.
      • Specify data linkages with CRM.
      • Identify risks and mitigation strategies
      • Determine the right deployment model for your organization.
      Then complete these activities…
      • Identify key performance indicators for business units using an SMMP
      With these tools & templates:
      • Social Media Steering Committee
      Phase 3 Results & Insights:
      • Implementation Plan
      • SMMP KPIs

      Phase 3, Step 1: Establish best practices for SMMP implementation

      3.1

      3.2

      Establish best practices for SMMP implementation Assess the measured value from the project

      This step will walk you through the following activities:

      • Establish a governance structure for social media management.
      • Specify the data linkages you will need between your CRM platform and SMMP.

      This step involves the following participants:

      • Core Project Team

      Outcomes of this step

      • Social Media Steering Committee Charter
      • SMMP data migration Inventory
      • Determination of the deployment model that works best for your organization
      • Deployment Model

      Follow these steps for effective SMMP implementation

      What to Consider

      • Creating an overall social media strategy is the critical first step in implementing an SMMP.
      • Selecting an SMMP involves gathering business requirements, then translating those requirements into specific selection criteria. Know exactly what your business needs are to ensure the right SMMP is selected.
      • Implement the platform with an eye toward creating business value: establish points of integration with the existing CRM solution, establish ongoing maintenance policies, select the right deployment model, and train end users around role-based objectives.
      Arrow pointing down.

      Plan

      • Develop a strategy for customer interaction
      • Develop a formal strategy for social media
      • Determine business requirements
      Arrow pointing down.

      Create RFP

      • Translate into functional requirements
      • Determine evaluation criteria
      Arrow pointing down.

      Evaluate

      • Evaluate vendors against criteria
      • Shortlist vendors
      • Perform in-depth vendor review

      Implement

      • Integrate with existing CRM ecosystem (if applicable)
      • Establish ongoing maintenance policies
      • Map deployment to organizational models
      • Train end-users and establish acceptable use policies
      • Designate an SMMP subject matter expert

      Before deploying the SMMP, ensure the right social media governance structures are in place to oversee implementation

      An SMMP is a tool, not a substitute, for adequate cross-departmental social media oversight. You must coordinate efforts across constituent stakeholders.

      • Successful organizations have permanent governance structures in place for managing social media. For example, mature companies leverage Social Media Steering Committees (SMSCs) to coordinate the social media initiatives of different business units and departments. Large organizations with highly complex needs may even make use of a physical command center.
      • Compared to traditional apps projects (like CRM or ERP), social media programs tend to start as grassroots initiatives. Marketing and Public Relations departments are the most likely to spearhead the initial push, often selecting their own tools without IT involvement or oversight. This causes application fragmentation and a proliferation of shadow IT.
      • This organic adoption contrasts with the top-down approach many IT leaders are accustomed to. Bottom-up growth can ensure rapid response to social media opportunities, but it also leads to insufficient coordination. A conscious effort should be made to mature your social media strategy beyond this disorganized initial state.
      • IT can help be a “cat herder” to shepherd departments into shared initiatives.

      Info-Tech Best Practice

      Before implementing the SMMP, go through the appropriate organizational governance structures to ensure they have input into the deployment. If a social media steering committee is not already in place, rolling out an SMMP is a great opportunity to get one going. See our research on social media program execution for more details.

      Establish a governance structure for social media management

      Associated Activity icon 3.1.1 60 minutes

      INPUT: Project stakeholders, SMMP mandate

      OUTPUT: Social Media Governance Structure

      MATERIALS: Whiteboard, Markers

      PARTICIPANTS: Project Manager, Core project team

      1. Describe the unique role that the governance team will play in social media management.
      2. Describe the overall purpose statement of the governance team.
      3. Define the roles and responsibilities of the governance team.
      4. Document the outcome in the Social Media Steering Committee Charter.

      EXAMPLE

      Executive Sponsorship
      Social Media Steering Committee
      VP Marketing VP Sales VP Customer Service VP Public Relations CIO/ IT Director
      Marketing Dept. Sales Dept. Customer Service Dept. Public Relations Dept. IT Dept.

      Use Info-Tech’s Social Media Steering Committee Charter Template to define roles and ensure value delivery

      Supporting Tool icon 3.1

      Leaders must ensure that the SMSC has a formal mandate with clear objectives, strong executive participation, and a commitment to meeting regularly. Create an SMSC Charter to formalize the committee governance capabilities.

      Developing a Social Media Steering Committee Charter:
      • Outline the committee’s structure, composition, and responsibilities using the Info-Tech Social Media Steering Committee Charter Template.
      • This template also outlines the key tasks and responsibilities for the committee:
        • Providing strategic leadership for social media
        • Leading SMMP procurement efforts
        • Providing process integration
        • Governing social media initiatives
        • Ensuring open communications between departments with ownership of social media processes
      • Keep the completed charter on file and available to all committee members. Remember to periodically update the document as organizational priorities shift to ensure the charter remains relevant.

      INFO-TECH DELIVERABLE

      Sample of the Social Media Steering Committee Charter Template.

      Integrate your social media management platform with CRM to strengthen the realization of social media goals

      • Linking social media to existing customer relationship management solutions can improve information accuracy, reduce manual effort and provide more in-depth customer insights.
        • Organizations Info-Tech surveyed, and who integrated their solutions, achieved more goals as a result.
      • Several major CRM vendors are now offering products that integrate with popular social networking services (either natively or by providing support for third-party add-ons).
        • For example, Salesforce.com now allows for native integration with Twitter, while an add-on available for Oracle gathers real-time information about prospects by pulling their extended information from publicly available LinkedIn profiles.
      • Some CRM vendors are acquiring established SMMPs outright.
        • For example, Salesforce.com acquired Radian6 for their clients that have advanced social media requirements.
      Bar chart comparing the social media goal realization of organizations that integrated their SMMP and CRM technology and those that didn't.

      Info-Tech Best Practice

      CRM vendors still lag in out-of-the-box social features, making a separate SMMP purchase a given. For companies that have not formally integrated social media with CRM, IT should develop the business case in conjunction with the applicable business-side partner (e.g. Marketing, Sales, Service, PR, etc.).

      Establish points of integration between SMMPs and CRM suites to gain a 360 degree view of the customer

      • Social media is a valuable tool from a standalone perspective, but its power is considerably magnified when it’s paired with the CRM suite.
      • Many SMMPs offer native integration with CRM platforms. IT should identify and enable these connectors to strengthen the business value of the platform.
      • An illustrated example of how an SMMP linked via CRM can provide proactive service while contributing to sales and marketing.
        An example of how an SMMP linked via CRM can provide proactive service while contributing to sales and marketing.
      • New channels do not mean they stand alone and do not need to be integrated into the rest of the customer interaction architecture.
      • Challenge SMMP vendors to demonstrate integration experience with CRM vendors and multimedia queue vendors.
      • Manual integration – adding resolved social inquiries yourself to a CRM system after closure – cannot scale given the rapid increase in customer inquiries originating in the social cloud. Integration with interaction management workflows is most desirable.

      These tools are enabling sales, and they help us serve our customers better. And anything that does that, is a good investment on our part.” Chip Meyers, (Sales Operation Manager, Insource)

      Info-Tech Best Practice

      SMMPs are a necessary single-channel evolutionary step, just like there used to be email-only and web chat-only customer service options in the late 1990s. But they are temporary. SMMPs will eventually be subsumed into the larger marketing automation ecosystem. Only a few best of breed will survive in 10 years.

      Specify the data linkages you will need between your CRM platform and SMMP

      Associated Activity icon 3.1.2 1 hour

      INPUT: SMMP data sources

      OUTPUT: SMMP data migration inventory

      MATERIALS: Whiteboard, Markers

      PARTICIPANTS: Project Manager, Core project team

      1. Build a list of sources of information that you’ll need to integrate with your CRM tool.
      2. Identify:
        1. Data Source
        2. Integration Direction
        3. Data Type and Use Case
      Data Source Migration/Integration Direction Data Type/Use Case
      Social Platform Bidirectional Recent Social Posts
      Customer Data Warehouse Bidirectional Contact Information, Cases, Tasks, Opportunities

      Establish a plan for ongoing platform maintenance

      • Like other enterprise applications, the SMMP will require periodic upkeep. IT must develop and codify policies around ongoing platform maintenance.
      • Platform maintenance should touch on the following areas:
        • Account access and controls – periodically, access privileges for employees no longer with the organization should be purged.
        • Platform security – cloud-based platforms will be automatically updated by the vendor to plug security holes, but on-premises solutions must be periodically updated to ensure that there are no gaps in security.
        • Pruning of old or outdated material – pages (e.g. Facebook Groups, Events, and Twitter feeds) that are no longer in use should be pruned. For example, a management console for an event that was held two years ago is unnecessary. Remove it from the platform (and the relevant service) to cut down on clutter (and reduce costs for “per-topic” priced platforms.)
      SMMP being fixed by a wrench.

      IT: SMMP Maintenance Checklist

      • Account upkeep and pruning
      • Security, privacy, and access
      • Content upkeep and pruning

      Info-Tech Best Practice

      Even cloud-based platforms like SMMPs require a certain degree of maintenance around account controls, security, and content pruning. IT should assist the business units in carrying out periodic maintenance.

      Social media is a powerful medium, but organizations must develop a prudent strategy for minimizing associated risks

      Using an SMMP can help mitigate many of the risks associated with social media. Review the risk categories on the next several slides to determine which ones can be mitigated by effective utilization of a dedicated SMMP.

      Risk Category Likelihood Risk(s) Suggested Mitigation Strategy
      Privacy and Confidentiality High
      • Risk of inappropriate exchange of information between personal and business social networks (e.g. a personal account used for company business).
      • Abuse of privacy and confidentiality laws.
      • Whenever possible, implement separate social network accounts for business, and train your employees to avoid using personal accounts at work.
      • Have a policy in place for how to treat pre-existing accounts versus newly created ones for enterprise use.
      • Use the “unified sign-on” capabilities of an SMMP to prevent employees from directly accessing the underlying social media services.

      Good governance means being proactive in mitigating the legal and compliance risks of your social media program

      Risk Category Likelihood Risk(s) Suggested Mitigation Strategy
      Trademark and Intellectual Property Medium
      • Copyrighted information could inappropriately be used for promotional and other business purposes (e.g. using a private user’s images in collateral).
      • Legal should conduct training to make sure the organization’s social media representatives only use information in the public domain, nothing privileged or confidential. This is particularly sensitive for Marketing and PR.
      Control over Brand Image and Inappropriate Content Medium
      • Employees on social media channels may post something inappropriate to the nature of your business.
      • Employees can post something that compromises industry and/or ethical standards.
      • Use SMMP outbound filtering/post approval workflows to censor certain inappropriate keywords.
      • Select the team carefully and ensure they are fully trained on both official company policy and social media etiquette.
      • Ensure strong enforcement of Social Media AUPs: take a zero tolerance approach to flagrant abuses.

      Security is a top-of-mind risk, though bandwidth is a low priority issue for most organizations

      Risk Category Likelihood Risk(s) Suggested Mitigation Strategy
      IT Security Medium Risk of employees downloading or being sent malware through social media services. Your clients are also exposed to this risk; this may undermine their trust of your brand.
      • Implement policies that outline appropriate precautions by employees, such as using effective passwords and not downloading unauthorized software.
      • Use web-filtering and anti-malware software that incorporates social media as a threat vector.
      Bandwidth Low Increase in bandwidth needs to support social media efforts, particularly when using video social media such as YouTube.
      • Plan for any bandwidth requirements with IT network staff.
      • Most social media strategies shouldn’t have a material impact on bandwidth.

      Poaching of client lists and increased costs are unlikely to occur, but address as a worst case scenario

      Risk Category Likelihood Risk(s) Suggested Mitigation Strategy
      Competitors Poaching Client Lists Low The ability for a competitor to view lists of clients that have joined your organization’s social media groups.
      • In a public social network, you cannot prevent this. Monitor your own brand as well as competitors’. If client secrecy must be maintained, then you should use a private social network (e.g. Jive, Lithium, private SharePoint site), not a public network.
      Increased Cost of Servicing Customers Low Additional resources may be allocated to social media without seeing immediate ROI.
      • Augment existing customer service responsibilities with social media requests.
      • If a dedicated resource is not available, dedicate a specific amount of time per employee to be spent addressing customer concerns via social media.

      Determine your top social media risks and develop an appropriate mitigation strategy that incorporates an SMMP

      Associated Activity icon 3.1.3 20 minutes

      INPUT: Risk assessment inventory

      OUTPUT: Top social media risks and mitigation plan

      MATERIALS: Whiteboard, Markers

      PARTICIPANTS: Project Manager, Core project team

      1. Based on your unique business variables, which social media risk categories are most applicable to your organization? In what order?
      2. Summarize the top risks below and identify mitigation steps (which often involve effective use of a dedicated SMMP).
      Rank Risk Category Mitigation Steps
      High Confidentiality We have strong records retention requirements, so using a rules-based SMMP like SocialVolt is a must.
      Medium Brand Image Ensure that only personnel who have undergone mandatory training can touch our social accounts via an SMMP.
      Low Competitors’ Poaching Lists Migrate our Business Services division contacts onto LinkedIn – maintain no Facebook presence for these clients.

      Determine the workflows that will be supported using your social media management platform

      Determine when, where, and how social media services should be used to augment existing workflows across (and between) the business process domains. Establish escalation rules and decide whether workflows will be reactive or proactively.

      • Fine tune your efforts in each business process domain by matching social technologies to specific business workflows. This will clearly delineate where value is created by leveraging social media.
      • Common business process domains that should be targeted include marketing, sales, and customer service. Public relations, human resources, and analyst relations are other areas to consider for social process support.
      • For each business process domain, IT should assist with technology enablement and execution.
      Target domains: 'Marketing', 'Sales', 'Customer Service', 'Public Relations', 'Human Resources'.

      Info-Tech Best Practice

      The social media governance team should have high-level supervision of process workflows. Ask to see reports from line managers on what steps they have taken to put process in place for reactive and proactive customer interactions, as well as escalations and channel switching. IT helps orchestrate these processes through knowledge and expertise with SMMP workflow capability.

      There are three primary models for SMMP deployment: the agency model uses the SMMP as a third-party offering

      There are three models for deploying an SMMP: agency, centralized, and distributed.

      Agency Model
      Visual of the Agency Model with the 'Social Cloud' attached to the 'SMMP' attached to the 'Agency (e.g. marketing or public relations agency)' attached to the 'Client Organization (Marketing, Sales, Service)'
      • In the agency model of SMMP deployment, the platform is managed on behalf of the organization by a third party – typically a marketing or public relations agency.
      • The agency serves as the primary touch point for the client organization: the client requests the types of market research it wants done, or the campaigns it wants managed. The agency uses its own SMMP(s) to execute the requests. Often, the SMMP’s results or dashboards will be rebranded by the agency.
      • Pros: The agency model is useful when large portions of marketing, service, or public relations are already being outsourced to a third-party provider. Going with an agency also splits the cost of more expensive SMMPs over multiple clients, and limits deployment costs.
      • Cons: The client organization has no direct control over the platform; going with an agency is not cost effective for firms with in-house marketing or PR capabilities.
      • Advice: Go with an agency-managed SMMP if you already use an agency for marketing or PR.

      Select the centralized deployment model when SMMP functionality rests in the hands of a single department

      Centralized Model
      Visual of the Centralized Model with the 'Social Cloud' attached to the 'SMMP' attached to 'Marketing' attached to the 'Sales' and 'Service'
      In this example, marketing owns and manages a single SMMP
      • In the centralized model, a single SMMP workspace is owned and operated predominantly by a single business unit or department. Unlike the agency model, the SMMP functionality is utilized in-house.
      • Information from the SMMP may occasionally be shared with other departments, but normally the platform is used almost exclusively by a single group in the company. Marketing or public relations are usually the groups that maintain ownership of the SMMP in the centralized model (with selection and deployment assistance from the IT department).
      • Pros: The centralized model provides small organizations with an in-house, dedicated SMMP without having to go through an agency. Having a single group own and manage the SMMP is considerably more cost effective than having SMMPs licensed to multiple business units in a small company.
      • Cons: If more and more departments start clamoring for control of SMMP resources, the centralized model will fail to meet the overall needs of the organization.
      • Advice: Small-to-medium enterprises with mid-sized topic or brand portfolios should use the centralized model.

      Go with a distributed deployment if multiple business units require advanced SMMP functionality

      Distributed Model
      Visual of the Distributed Model with the 'Social Cloud' attached to two 'SMMPs', one attached to 'Marketing' and 'Sales', the other to 'Customer Service' and 'Public Relations'.
      • In the distributed model, multiple SMMPs (sometimes from different vendors) or multiple SMMP workspaces (from a single vendor) are deployed to several groups (e.g. multiple departments or brand portfolios) in the organization.
      • Pros: The distributed model is highly effective in large organizations with multiple departments or brands that each are interested in SMMP functionality. Having separate workspaces for each business group enables customizing workspaces to satisfy different goals of the different business groups.
      • Cons: The cost of deploying multiple SMMP workspaces can be prohibitive.
      • Advice: Go with the distributed model if your organization is large and has multiple relevant departments or product marketing groups, with differing social media goals.

      Determine which deployment model works best for your organization

      Associated Activity icon 3.1.4 1 Hour

      INPUT: Deployment models

      OUTPUT: Best fit deployment model

      MATERIALS: Whiteboard, Markers

      PARTICIPANTS: Project Manager, Core project team

      1. Assess and understand the three models of SMMP deployments: agency, centralized and distributed. Consider the pros and cons of each model.
      2. Understand how your organization manages enterprise social media. Consider the follow questions:
        • What is the size of your organization?
        • Who owns the management of social media in your organization?
        • Is social media managed in-house or outsourced to an agency?
        • What are the number of departments that use and rely on social media?
      3. Select the best deployment model for your organization.
      Agency Model Centralized Model Distributed Model
      Visual of the Agency Model with the 'Social Cloud' attached to the 'SMMP' attached to the 'Agency (e.g. marketing or public relations agency)' attached to the 'Client Organization (Marketing, Sales, Service)' Visual of the Centralized Model with the 'Social Cloud' attached to the 'SMMP' attached to 'Marketing' attached to the 'Sales' and 'Service' Visual of the Distributed Model with the 'Social Cloud' attached to two 'SMMPs', one attached to 'Marketing' and 'Sales', the other to 'Customer Service' and 'Public Relations'.

      Create an SMMP training matrix based on social media roles

      IT must assist the business by creating and executing a role-based training program. An SMMP expert in IT should lead training sessions for targeted groups of end users, training them only on the functions they require to perform their jobs.

      Use the table below to help identify which roles should be trained on which SMMP features.

      PR Professionals Marketing Brand, Product, and Channel Managers Customer Service Reps and Manager Product Development and Market Research IT Application Support
      Account Management Circle indicating a positive field. Circle indicating a positive field. Circle indicating a positive field. Circle indicating a positive field. Circle indicating a positive field.
      Response and Engagement Circle indicating a positive field. Circle indicating a positive field. Circle indicating a positive field.
      Social Analytics and Data Mining Circle indicating a positive field. Circle indicating a positive field. Circle indicating a positive field.
      Marketing Campaign Execution Circle indicating a positive field. Circle indicating a positive field.
      Mobile Access Circle indicating a positive field. Circle indicating a positive field. Circle indicating a positive field.
      Archiving Circle indicating a positive field.
      CRM Integration Circle indicating a positive field.

      Phase 3, Step 2: Track your metrics

      3.1

      3.2

      Establish best practices for SMMP implementation Assess the measured value from the project

      This step will walk you through the following activities:

      • Identify metrics and KPIs for business units using a dedicated SMMP

      This step involves the following participants:

      • Core Project Team
      • Representative Stakeholders from Digital Marketing, Sales, and IT

      Outcomes of this step

      • Key Performance Indicators

      Know key performance indicators (KPIs) for each department that employs a dedicated social media management platform

      Share of Voice
      How often a brand is mentioned, relative to other brands competing in a defined market.

      User Engagement
      Quantity and quality of customer interactions with a brand or with each other, either on- or offline.

      Campaign Success
      Tracking reception of campaigns and leads brought in as a result.
      Marketing KPIs Reach
      Measurement of the size of market your brand advertisements and communications reach.

      Impressions
      The number of exposures your content, ad, or social post has to people in your target audience.

      Cost per Point (CPP)
      Cost to reach one percent of your organization’s audience.

      Product Innovation
      The quantity and quality of improvements, updates, and changes to existing products.

      Time-to-Market
      Time that passes between idea generation and the product being available to consumers.

      Product Development KPIs

      New Product Launches
      A ratio of completely new product types released to brand extensions and improvements.

      Cancelled Projects
      Measure of quality of ideas generated and quality of idea assessment method.

      Use social media metrics to complement your existing departmental KPIs – not usurp them

      Cost per Lead
      The average amount an organization spends to find leads.

      Conversion Rate
      How many sales are made in relation to the number of leads.

      Quantity of Leads
      How many sales leads are in the funnel at a given time.
      Sales KPIs Average Cycle Time
      Average length of time it takes leads to progress through the sales cycle.

      Revenue by Lead
      Total revenue divided by total number of leads.

      Avg. Revenue per Rep
      Total revenue divided by number of sales reps.

      Time to Resolution
      Average amount of time it takes for customers to get a response they are satisfied with.

      First Contact Resolution
      How often customer issues are resolved on the first contact.

      Customer Service KPIs

      Contact Frequency
      The number of repeated interactions from the same customers.

      Satisfaction Scores
      Determined from customer feedback – either through surveys or gathered sporadically.

      Social analytics don’t operate alone; merge social data with traditional data to gain the deepest insights

      Employee Retention
      The level of effort an organization exerts to maintain its current staff.

      Employee Engagement
      Rating of employee satisfaction overall or with a given aspect of the workplace.

      Preferred Employer
      A company where candidates would rather work over other companies.
      Marketing KPIs Recruitment Cycle Time
      Average length of time required to recruit a new employee.

      Employee Productivity
      A comparison of employee inputs (time, effort, etc.) and outputs (work).

      Employee Referrals
      The ratio of employee referrals that complete the recruitment process.

      There are conversations going on behind your back, and if you're not participating in them, then you're either not perpetuating the positive conversation or not diffusing the negative. And that's irresponsible in today's business world.” (Lon Safko, Social Media Bible)

      Identify key performance indicators for business units using an SMMP

      Associated Activity icon 3.2.1 30 minutes

      INPUT: Social media goals

      OUTPUT: SMMP KPIs

      MATERIALS: Whiteboard, Markers

      PARTICIPANTS: Representative stakeholders from different business units

      For each listed department, identify the social media goals and departmental key performance indicators to measure the impact of the SMMP.

      DepartmentSocial Media GoalsKPI
      Marketing
      • E.g. build a positive brand image
      • Net increase in brand recognition
      Product Development
      • Launch a viral video campaign showcasing product attributes to drive increased YT traffic
      • Net increase in unaided customer recall
      Sales
      • Enhance sales lead generation through social channels
      • Net increase in sales lead generation in the social media sales funnel
      Customer Service
      • Produce more timely responses to customer enquiries and complaints
      • Reduced time to resolution
      HR
      • Enhance social media recruitment channels
      • Number of LinkedIn recruitment

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1

      Sample of activity 3.1.1 'Establish a governance structure for social media management'. Establish a governance structure for social media management

      Our Info-Tech analyst will walk you through the exercise of developing roles and responsibilities to govern your social media program.

      3.1.2

      Sample of activity 3.1.2 'Specify the data linkages you will need between your CRM platform and SMMP'. Specify the data linkages you will need between your CRM and SMMP

      The analyst will help you identify the points of integration between the SMMP and your CRM platform.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      3.1.3

      Sample of activity 3.1.3 'Determine your top social media risks and develop an appropriate mitigation strategy that incorporates an SMMP'. Determine your top social media risks

      Our Info-Tech analyst will facilitate the discussion to identify the top risks associated with the SMMP and determine mitigation strategies for each risk.

      3.1.4

      Sample of activity 3.1.4 'Determine which deployment model works best for your organization'. Determine the best-fit deployment model

      An analyst will demonstrate the different SMMP deployment models and assist in determining the most suitable model for your organization.

      3.2.1

      Sample of activity 3.2.1 'Identify key performance indicators for business units using an SMMP'. Identify departmental KPIs

      An analyst will work with different stakeholders to determine the top social media goals for each department.

      Appendices

      Works Cited

      Ashja, Mojtaba, Akram Hadizadeh, and Hamid Bidram. “Comparative Study of Large Information Systems’ CSFs During Their Life Cycle.” Information Systems Frontiers. September 8, 2013.

      UBM. “The State of Social Media Analytics.” January, 2016.

      Jobvite. “2015 Recruiter Nation Survey.” September, 2015.

      Vendor Landscape Analysis Appendices

      Vendor Landscape Methodology:
      Overview

      Info-Tech’s Vendor Landscapes are research materials that review a particular IT market space, evaluating the strengths and abilities of both the products available in that space, as well as the vendors of those products. These materials are created by a team of dedicated analysts operating under the direction of a senior subject matter expert over a period of several weeks.

      Evaluations weigh selected vendors and their products (collectively “solutions”) on the following eight criteria to determine overall standing:

      • Features: The presence of advanced and market-differentiating capabilities.
      • User Interface: The intuitiveness, power, and integrated nature of administrative consoles and client software components.
      • Affordability: The three-year total cost of ownership of the solution; flexibility of the pricing and discounting structure.
      • Architecture: The degree of integration with the vendor’s other tools, flexibility of deployment, and breadth of platform applicability.
      • Viability: The stability of the company as measured by its history in the market, the size of its client base, and its percentage of growth.
      • Focus: The commitment to both the market space, as well as to the various sized clients (small, mid-sized, and enterprise clients).
      • Reach: The ability of the vendor to support its products on a global scale.
      • Sales: The structure of the sales process and the measure of the size of the vendor’s channel and industry partners.

      Evaluated solutions within scenarios are visually represented by a Pathway to Success, based off a linear graph using above scoring methods:

      • Use-case scenarios are decided upon based on analyst expertise and experience with Info-Tech clients.
      • Use-case scenarios are defined through feature requirements, predetermined by analyst expertise.
      • Placement within scenario rankings consists of features being evaluated against the other scoring criteria.

      Info-Tech’s Vendor Landscapes are researched and produced according to a strictly adhered to process that includes the following steps:

      • Vendor/product selection
      • Information gathering
      • Vendor/product scoring
      • Information presentation
      • Fact checking
      • Publication

      This document outlines how each of these steps is conducted.

      Vendor Landscape Methodology:
      Vendor/Product Selection & Information Gathering

      Info-Tech works closely with its client base to solicit guidance in terms of understanding the vendors with whom clients wish to work and the products that they wish evaluated; this demand pool forms the basis of the vendor selection process for Vendor Landscapes. Balancing this demand, Info-Tech also relies upon the deep subject matter expertise and market awareness of its Senior Analysts to ensure that appropriate solutions are included in the evaluation. As an aspect of that expertise and awareness, Info-Tech’s analysts may, at their discretion, determine the specific capabilities that are required of the products under evaluation, and include in the Vendor Landscape only those solutions that meet all specified requirements.

      Information on vendors and products is gathered in a number of ways via a number of channels.

      Initially, a request package is submitted to vendors to solicit information on a broad range of topics. The request package includes:

      • A detailed survey.
      • A pricing scenario (see Vendor Landscape Methodology: Price Evaluation and Pricing Scenario, below).
      • A request for reference clients.
      • A request for a briefing and, where applicable, guided product demonstration.

      These request packages are distributed approximately eight weeks prior to the initiation of the actual research project to allow vendors ample time to consolidate the required information and schedule appropriate resources.

      During the course of the research project, briefings and demonstrations are scheduled (generally for one hour each session, though more time is scheduled as required) to allow the analyst team to discuss the information provided in the survey, validate vendor claims, and gain direct exposure to the evaluated products. Additionally, an end-user survey is circulated to Info-Tech’s client base and vendor-supplied reference accounts are interviewed to solicit their feedback on their experiences with the evaluated solutions and with the vendors of those solutions.

      These materials are supplemented by a thorough review of all product briefs, technical manuals, and publicly available marketing materials about the product, as well as about the vendor itself.

      Refusal by a vendor to supply completed surveys or submit to participation in briefings and demonstrations does not eliminate a vendor from inclusion in the evaluation. Where analyst and client input has determined that a vendor belongs in a particular evaluation, it will be evaluated as best as possible based on publicly available materials only. As these materials are not as comprehensive as a survey, briefing, and demonstration, the possibility exists that the evaluation may not be as thorough or accurate. Since Info-Tech includes vendors regardless of vendor participation, it is always in the vendor’s best interest to participate fully.

      All information is recorded and catalogued, as required, to facilitate scoring and for future reference.

      Vendor Landscape Methodology:
      Scoring

      Once all information has been gathered and evaluated for all vendors and products, the analyst team moves to scoring. All scoring is performed at the same time so as to ensure as much consistency as possible. Each criterion is scored on a ten-point scale, though the manner of scoring for criteria differs slightly:

      • Features is scored via Cumulative Scoring.
      • Affordability is scored via Scalar Scoring.
      • All other criteria are scored via Base5 Scoring.

      Cumulative Scoring is on a four-point scale. Zero points are awarded to features that are deemed absent or unsatisfactory, one point is assigned to features that are partially present, two points are assigned to features that require an extra purchase in the vendor’s product portfolio or through a third party, three points are assigned to features that are fully present and native to the solution, and four points are assigned to the best-of-breed native feature. The assigned points are summed and normalized to a value out of ten. For example, if a particular Vendor Landscape evaluates eight specific features in the Feature Criteria, the summed score out of eight for each evaluated product would be multiplied by 1.25 to yield a value out of ten to represent in a Harvey Ball format.

      In Scalar Scoring, a score of ten is assigned to the lowest cost solution, and a score of one is assigned to the highest cost solution. All other solutions are assigned a mathematically-determined score based on their proximity to / distance from these two endpoints. For example, in an evaluation of three solutions, where the middle cost solution is closer to the low end of the pricing scale it will receive a higher score, and where it is closer to the high end of the pricing scale it will receive a lower score; depending on proximity to the high or low price it is entirely possible that it could receive either ten points (if it is very close to the lowest price) or one point (if it is very close to the highest price). Where pricing cannot be determined (vendor does not supply price and public sources do not exist), a score of 0 is automatically assigned.

      In Base5 scoring a number of sub-criteria are specified for each criterion (for example, Longevity, Market Presence, and Financials are sub-criteria of the Viability criterion), and each one is scored on the following scale:

      • 5 - The product/vendor is exemplary in this area (nothing could be done to improve the status).
      • 4 - The product/vendor is good in this area (small changes could be made that would move things to the next level).
      • 3 - The product/vendor is adequate in this area (small changes would make it good, more significant changes required to be exemplary).
      • 2 - The product/vendor is poor in this area (this is a notable weakness and significant work is required).
      • 1 - The product/vendor fails in this area (this is a glaring oversight and a serious impediment to adoption).

      The assigned points are summed and normalized to a value out of ten as explained in Cumulative Scoring above.

      Scores out of ten, known as Raw scores, are transposed as is into Info-Tech’s Vendor Landscape Shortlist Tool, which automatically determines Vendor Landscape positioning (see Vendor Landscape Methodology: Information Presentation – Vendor Landscape, below), Criteria Score (see Vendor Landscape Methodology: Information Presentation – Criteria Score, below), and Value Index (see Vendor Landscape Methodology: Information Presentation – Value Index, below).

      Vendor Landscape Methodology:
      Information Presentation – Criteria Scores (Harvey Balls)

      Info-Tech’s criteria scores are visual representations of the absolute score assigned to each individual criterion, as well as of the calculated overall vendor and product scores. The visual representation used is Harvey Balls.

      Harvey Balls are calculated as follows:

      1. Raw scores are transposed into the Info-Tech Vendor Landscape Shortlist Tool (for information on how raw scores are determined, see Vendor Landscape Methodology: Scoring, above).
      2. Each individual criterion raw score is multiplied by a pre-assigned weighting factor for the Vendor Landscape in question. Weighting factors are determined prior to the evaluation process, based on the expertise of the Senior or Lead Research Analyst, to eliminate any possibility of bias. Weighting factors are expressed as a percentage, such that the sum of the weighting factors for the vendor criteria (Viability, Strategy, Reach, Channel) is 100%, and the sum of the product criteria (Features, Usability, Affordability, Architecture) is 100%.
      3. A sum-product of the weighted vendor criteria scores and of the weighted product criteria scores is calculated to yield an overall vendor score and an overall product score.
      4. Both overall vendor score / overall product score, as well as individual criterion raw scores are converted from a scale of one to ten to Harvey Ball scores on a scale of zero to four, where exceptional performance results in a score of four and poor performance results in a score of zero.
      5. Harvey Ball scores are converted to Harvey Balls as follows:
        • A score of four becomes a full Harvey Ball.
        • A score of three becomes a three-quarter full Harvey Ball.
        • A score of two becomes a half-full Harvey Ball.
        • A score of one becomes a one-quarter full Harvey Ball.
        • A score of zero becomes an empty Harvey Ball.
      6. Harvey Balls are plotted by solution in a chart where rows represent individual solutions and columns represent overall vendor / overall product, as well as individual criteria. Solutions are ordered in the chart alphabetically by vendor name.
      Harvey Balls
      Overall Harvey Balls represent weighted aggregates. Example of Harvey Balls with 'Overall' balls at the beginning of each category followed by 'Criteria' balls for individual raw scores. Criteria Harvey Balls represent individual raw scores.

      Vendor Landscape Methodology:
      Use-Case Scoring

      Within each Vendor Landscape a set of use-case scenarios are created by the analysts by considering the different outcomes and purposes related to the technology being evaluated. To generate the custom use-case vendor performances, the feature and Harvey Ball scoring performed in the Vendor Landscapes are set with custom weighting configurations.

      Calculations

      Each product has a vendor multiplier calculated based on its weighted performance, considering the different criteria scored in the Harvey Ball evaluations.

      To calculate each vendor’s performance, the advanced feature scores are multiplied against the weighting for the feature in the use-case scenario’s configuration.

      The weighted advanced feature score is then multiplied against the vendor multiplier.

      The sum of each vendor’s total weighted advanced features is calculated. This sum is used to identify the vendor’s qualification and relative rank within the use case.

      Example pie charts.

      Each use case’s feature weightings and vendor/product weighting configurations are displayed within the body of slide deck.

      Use-Case Vendor Performance

      Example stacked bar chart of use-case vendor performance.

      Vendors who qualified for each use-case scenario are ranked from first to last in a weighted bar graph based on the features considered.

      Vendor Landscape Methodology:
      Information Presentation – Feature Ranks (Stoplights)

      Advanced features are determined by analyst expertise, leveraging information gained from conversations with clients. Advanced features chosen as part of the evaluation are representative of what Info-Tech clients have indicated are of importance to their vendor solution. Advanced features are evaluated through a series of partial marks, dedicated to whether the solution performs all aspects of the Info-Tech definition of the feature and whether the feature is provided within the solution. Analysts hold the right to determine individual, unique scoring criteria for each evaluation. If a feature does not meet the criteria, Info-Tech holds the right to score the feature accordingly.

      Use cases use features as a baseline of the inclusion and scoring criteria.

      'Stoplight Legend' with green+star 'Feature category is present: best in class', green 'Feature category is present: strong', yellow 'Feature category is present: average', orange 'Feature category is partially present: weak', and red 'Feature category is absent or near-absent'.

      Vendor Landscape Methodology:
      Information Presentation – Value Index

      Info-Tech’s Value Index is an indexed ranking of solution value per dollar as determined by the raw scores assigned to each criteria (for information on how raw scores are determined, see Vendor Landscape Methodology: Scoring, above).

      Value scores are calculated as follows:

      1. The TCO Affordability criterion is removed from the Affordability score and the remaining product score criteria (Features, Usability, Architecture). Affordability scoring is adjusted with the TCO weighting distributed in proportion to the use case’s weighting for Affordability. Weighting is adjusted as to retain the same weightings relative to one another, while still summing to 100%.
      2. An adjusted multiplier is determined for each vendor using the recalculated Affordability scoring.
      3. The multiplier vendor score and vendor’s weighted feature score (based on the use-case scenario’s weightings), are summed. This sum is multiplied by the TCO raw score to yield an interim Value Score for each solution.
      4. All interim Value Scores are then indexed to the highest performing solution by dividing each interim Value Score by the highest interim Value Score. This results in a Value Score of 100 for the top solution and an indexed Value Score relative to the 100 for each alternate solution.
      5. Solutions are plotted according to Value Score, with the highest score plotted first, and all remaining scores plotted in descending numerical order.

      Where pricing is not provided by the vendor and public sources of information cannot be found, an Affordability raw score of zero is assigned. Since multiplication by zero results in a product of zero, those solutions for which pricing cannot be determined receive a Value Score of zero. Since Info-Tech assigns a score of zero where pricing is not available, it is always in the vendor’s best interest to provide accurate and up-to-date pricing. In the event that insufficient pricing is available to accurately calculate a Value Index, Info-Tech will omit it from the Vendor Landscape.

      Value Index

      Vendors are arranged in order of Value Score. The Value Score each solution achieved is displayed, and so is the average score.

      Example bar chart indicating the 'Value Score' vs the 'Average Score'.

      Those solutions that are ranked as Champions are differentiated for point of reference.

      Vendor Landscape Methodology:
      Information Presentation – Price Evaluation: Mid-Market

      Info-Tech’s Price Evaluation is a tiered representation of the three-year Total Cost of Ownership (TCO) of a proposed solution. Info-Tech uses this method of communicating pricing information to provide high-level budgetary guidance to its end-user clients while respecting the privacy of the vendors with whom it works. The solution TCO is calculated and then represented as belonging to one of ten pricing tiers.

      Pricing tiers are as follows:

      1. Between $1 and $2,500
      2. Between $2,500 and $10,000
      3. Between $10,000 and $25,000
      4. Between $25,000 and $50,000
      5. Between $50,000 and $100,000
      6. Between $100,000 and $250,000
      7. Between $250,000 and $500,000
      8. Between $500,000 and $1,000,000
      9. Between $1,000,000 and $2,500,000
      10. Greater than $2,500,000

      Where pricing is not provided, Info-Tech makes use of publicly available sources of information to determine a price. As these sources are not official price lists, the possibility exists that they may be inaccurate or outdated, and so the source of the pricing information is provided. Since Info-Tech publishes pricing information regardless of vendor participation, it is always in the vendor’s best interest to supply accurate and up to date information.

      Info-Tech’s Price Evaluations are based on pre-defined pricing scenarios (see Product Pricing Scenario, below) to ensure a comparison that is as close as possible between evaluated solutions. Pricing scenarios describe a sample business and solicit guidance as to the appropriate product/service mix required to deliver the specified functionality, the list price for those tools/services, as well as three full years of maintenance and support.

      Price Evaluation

      Call-out bubble indicates within which price tier the three-year TCO for the solution falls, provides the brackets of that price tier, and links to the graphical representation.

      Example price evaluation with a '3 year TCO...' statement, a visual gauge of bars, and a statement on the source of the information.

      Scale along the bottom indicates that the graphic as a whole represents a price scale with a range of $1 to $2.5M+, while the notation indicates whether the pricing was supplied by the vendor or derived from public sources.

      Vendor Landscape Methodology:
      Information Presentation – Vendor Awards

      At the conclusion of all analyses, Info-Tech presents awards to exceptional solutions in three distinct categories. Award presentation is discretionary; not all awards are extended subsequent to each Vendor Landscape and it is entirely possible, though unlikely, that no awards may be presented.

      Awards categories are as follows:

      • Champion Awards are presented to the top performing solution in a particular use-case scenario. As a result, only one Champion Award is given for each use case, and the entire Vendor Landscape will have the same number of Champion Awards as the number of evaluated use cases.
      • Leader Awards are presented to top performing solutions for each use-case scenario. Depending on the use-case scenario and the number of solutions being evaluated, a variable number of leader awards will be given. This number is at the discretion of the analysts, but is generally placed at two, and given to the solutions ranking second and third respectively for the use case.
      • Best Overall Value Awards are presented to the solution for each use-case scenario that ranked the highest in the Info-Tech Value Index for each evaluated scenario (see Vendor Landscape Methodology: Information Presentation – Value Index, above). If insufficient pricing information is made available for the evaluated solutions, such that a Value Index cannot be calculated, no Best Overall Value Award will be presented. Only one Best Overall Value Award is available for each use-case scenario.

      Vendor Awards for Use-Case Performance

      Vendor Award: 'Champion'. Info-Tech’s Champion Award is presented to solutions that placed first in an use-case scenario within the Vendor Landscape.
      Vendor Award: 'Leader'. Info-Tech Leader Award is given to solutions who placed in the top segment of a use-case scenario.
      Vendor Award: 'Best Overall Value'. Info-Tech’s Best Overall Value Award is presented to the solution within each use-case scenario with the highest Value Index score.

      Vendor Landscape Methodology:
      Fact Check & Publication

      Info-Tech takes the factual accuracy of its Vendor Landscapes, and indeed of all of its published content, very seriously. To ensure the utmost accuracy in its Vendor Landscapes, we invite all vendors of evaluated solutions (whether the vendor elected to provide a survey and/or participate in a briefing or not) to participate in a process of fact check.

      Once the research project is complete and the materials are deemed to be in a publication ready state, excerpts of the material specific to each vendor’s solution are provided to the vendor. Info-Tech only provides material specific to the individual vendor’s solution for review encompassing the following:

      • All written review materials of the vendor and the vendor’s product that comprise the evaluated solution.
      • Info-Tech’s Criteria Scores / Harvey Balls detailing the individual and overall vendor / product scores assigned.
      • Info-Tech’s Feature Rank / stoplights detailing the individual feature scores of the evaluated product.
      • Info-Tech’s Raw Pricing for the vendor either as received from the vendor or as collected from publicly available sources.
      • Info-Tech’s Scenario ranking for all considered scenarios for the evaluated solution.

      Info-Tech does not provide the following:

      • Info-Tech’s Vendor Landscape placement of the evaluated solution.
      • Info-Tech’s Value Score for the evaluated solution.
      • End-user feedback gathered during the research project.
      • Info-Tech’s overall recommendation in regard to the evaluated solution.

      Info-Tech provides a one-week window for each vendor to provide written feedback. Feedback must be corroborated (be provided with supporting evidence), and where it does, feedback that addresses factual errors or omissions is adopted fully, while feedback that addresses opinions is taken under consideration. The assigned analyst team makes all appropriate edits and supplies an edited copy of the materials to the vendor within one week for final review.

      Should a vendor still have concerns or objections at that time, they are invited to a conversation, initially via email, but as required and deemed appropriate by Info-Tech, subsequently via telephone, to ensure common understanding of the concerns. Where concerns relate to ongoing factual errors or omissions, they are corrected under the supervision of Info-Tech’s Vendor Relations personnel. Where concerns relate to ongoing differences of opinion, they are again taken under consideration with neither explicit not implicit indication of adoption.

      Publication of materials is scheduled to occur within the six weeks following the completion of the research project, but does not occur until the fact check process has come to conclusion, and under no circumstances are “pre-publication” copies of any materials made available to any client.

      Pricing Scenario

      Info-Tech Research Group is providing each vendor with a common pricing scenario to enable normalized scoring of Affordability, calculation of Value Index rankings, and identification of the appropriate solution pricing tier as displayed on each vendor scorecard.

      Vendors are asked to provide list costs for SMMP software licensing to address the needs of a reference organization described in the pricing scenario. Please price out the lowest possible 3-year total cost of ownership (TCO) including list prices for software and licensing fees to meet the requirements of the following scenario.

      Three-year total acquisition costs will be normalized to produce the Affordability raw scores and calculate Value Index ratings for each solution.

      The pricing scenario:

      • Enterprise Name: Imperial Products Incorporated
      • Enterprise Size: SMB
      • Enterprise Vertical: Consumer packaged goods
      • Total Number of Sites: Three office locations
      • Total Number of Employees: 500
      • Total Number SMMP End Users: 50
        • 20 dedicated CSRs who are handling all customer service issues routed to them
        • 5 PR managers who need the ability to monitor the social cloud
        • 24 brand portfolio managers – each portfolio has 5 products (25 total)
        • Each product has its own Facebook and Twitter presence
        • 1 HR manager (using social media for recruiting)
      • Total Number of IT Staff: 20
      • Operating System Environment: Windows 7
      • Functional Requirements and Additional Information: Imperial Products Incorporated is a mid-sized consumer packaged goods firm operating in the United States. The organization is currently looking to adopt a platform for social media monitoring and management. Functional requirements include the ability to monitor and publish to Facebook, Twitter, YouTube, and blogs. The platform must have the ability to display volume trends, show follower demographics, and conduct sentiment analysis. It must also provide tools for interacting in-platform with social contacts, provide workflow management capabilities, and offer the ability to manage specific social properties (e.g. Facebook Pages). Additional features that are desirable are the ability to archive social interactions, and a dedicated mobile application for one of the major smartphone/tablet operating systems (iOS, Android etc.).

      Disaster Recovery Planning

      • Buy Link or Shortcode: {j2store}38|cart{/j2store}
      • Related Products: {j2store}38|crosssells{/j2store}
      • Teaser Video: Visit Website
      • Teaser Video Title: Disaster Recovery Planning
      • member rating overall impact: 9.6/10
      • member rating average dollars saved: $92,268
      • member rating average days saved: 36
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk
      The show must go on. Make sure your IT has right-sized DR capabilities.

      Prepare for Negotiations More Effectively

      • Buy Link or Shortcode: {j2store}224|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $6,000 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • IT budgets are increasing, but many CIOs feel their budgets are inadequate to accomplish what is being asked of them.
      • Eighty percent of organizations don’t have a mature, repeatable, scalable negotiation process.
      • Training dollars on negotiations are often wasted or ineffective.

      Our Advice

      Critical Insight

      • Negotiations are about allocating risk and money – how much risk is a party willing to accept at what price point?
      • Using a cross-functional/cross-insight team structure for negotiation preparation yields better results.
      • Soft skills aren’t enough and theatrical negotiation tactics aren’t effective.

      Impact and Result

      A good negotiation process can help:

      • Maximize budget dollars.
      • Improve vendor performance.
      • Enhance relationships internally and externally.

      Prepare for Negotiations More Effectively Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create and follow a scalable process for preparing to negotiate with vendors, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Before

      Throughout this phase, the 12 steps for negotiation preparation are identified and reviewed.

      • Prepare for Negotiations More Effectively – Phase 1: Before
      • Before Negotiating Tool
      [infographic]

      Workshop: Prepare for Negotiations More Effectively

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 12 Steps to Better Negotiation Preparation

      The Purpose

      Improve negotiation preparation.

      Understand how to use the Info-Tech Before Negotiating Tool.

      Key Benefits Achieved

      A scalable framework for negotiation preparation will be created.

      The Before Negotiating Tool will be configured for the customer’s environment.

      Activities

      1.1 Establish specific negotiation goals and ranges.

      1.2 Identify and assess alternatives to a negotiated agreement.

      1.3 Identify and evaluate assumptions made by the parties.

      1.4 Conduct research.

      1.5 Identify and evaluate relationship issues.

      1.6 Identify and leverage the team structure.

      1.7 Identify and address leverage issues.

      1.8 Evaluate timeline considerations.

      1.9 Create a strategy.

      1.10 Draft a negotiation agenda.

      1.11 Draft and answer questions.

      1.12 Rehearse (informal and formal).

      Outputs

      Sample negotiation goals and ranges will be generated via a case study to demonstrate the concepts and how to use the Before Negotiating Tool (this will apply to each Planned Activity)

      Sample alternatives will be generated

      Sample assumptions will be generated

      Sample research will be generated

      Sample relationship issues will be generated

      Sample teams will be generated

      Sample leverage items will be generated

      Sample timeline issues will be generated

      A sample strategy will be generated

      A sample negotiation agenda will be generated

      Sample questions and answers will be generated

      Sample rehearsals will be conducted

      Transition Projects Over to the Service Desk

      • Buy Link or Shortcode: {j2store}495|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • IT suffers from a lack of strategy and plan for transitioning support processes to the service desk.
      • Lack of effective communication between the project delivery team and the service desk, leads to an inefficient knowledge transfer to the service desk.
      • New service is not prioritized and categorized, negatively impacting service levels and end-user satisfaction.

      Our Advice

      Critical Insight

      Make sure to build a strong knowledge management strategy to identify, capture, and transfer knowledge from project delivery to the service desk.

      Impact and Result

      • Build touchpoints between the service desk and project delivery team and make strategic points in the project lifecycles to ensure service support is done effectively following the product launch.
      • Develop a checklist of action items on the initiatives that should be done following project delivery.
      • Build a training plan into the strategy to make sure service desk agents can handle tickets independently.

      Transition Projects Over to the Service Desk Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Transition Projects Over to the Service Desk – A guideline to walk you through transferring project support to the service desk.

      This storyboard will help you craft a project support plan to document information to streamline service support.

      • Transition Projects Over to the Service Desk Storyboard

      2. Project Handover and Checklist – A structured document to help you record information on the project and steps to take to transfer support.

      Use these two templates as a means of collaboration with the service desk to provide information on the application/product, and steps to take to make sure there are efficient service processes and knowledge is appropriately transferred to the service desk to support the service.

      • Project Handover Template
      • Service Support Transitioning Checklist
      [infographic]

      Further reading

      Transition Projects Over to the Service Desk

      Increase the success of project support by aligning your service desk and project team.

      Analyst Perspective

      Formalize your project support plan to shift customer service to the service desk.

      Photo of Mahmoud Ramin, Senior Research Analyst, Infrastructure and Operations, Info-Tech Research Group

      As a service support team member, you receive a ticket from an end user about an issue they’re facing with a new application. You are aware of the application release, but you don’t know how to handle the issue. So, you will need to either spend a long time investigating the issue via peer discussion and research or escalate it to the project team.

      Newly developed or improved services should be transitioned appropriately to the support team. Service transitioning should include planning, coordination, and communication. This helps project and support teams ensure that upon a service failure, affected end users receive timely and efficient customer support.

      At the first level, the project team and service desk should build a strategy around transitioning service support to the service desk by defining tasks, service levels, standards, and success criteria.

      In the second step, they should check the service readiness to shift support from the project team to the service desk.

      The next step is training on the new services via efficient communication and coordination between the two parties. The project team should allocate some time, according to the designed strategy, to train the service desk on the new/updated service. This will enable the service desk to provide independent service handling.

      This research walks you through the above steps in more detail and helps you build a checklist of action items to streamline shifting service support to the service desk.

      Mahmoud Ramin, PhD

      Senior Research Analyst
      Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • IT suffers from a lack of strategy and planning for transitioning support processes to the service desk.
      • Lack of effective communication between the project delivery team and the service desk leads to an inefficient knowledge transfer to the service desk.
      • New service is not prioritized and categorized, negatively impacting service levels and end-user satisfaction.

      Common Obstacles

      • Building the right relationship between the service desk and project team is challenging, making support transition tedious.
      • The service desk is siloed; tasks and activities are loosely defined. Service delivery is inconsistent, which impacts customer satisfaction.
      • Lack of training on new services forces the service desk to unnecessarily escalate tickets to other levels and delays service delivery.

      Info-Tech’s Approach

      • Build touchpoints between the service desk and project delivery team and make strategic points in the project lifecycles to ensure service support is done effectively following the product launch.
      • Develop a checklist of action items on the initiatives that should be done following project delivery.
      • Build a training plan into the strategy to make sure service desk agents can handle tickets independently.

      Info-Tech Insight

      Make sure to build a strong knowledge management strategy to identify, capture, and transfer knowledge from project delivery to the service desk.

      A lack of formal service transition process presents additional challenges

      When there is no formal transition process following a project delivery, it will negatively impact project success and customer satisfaction.

      Service desk team:

      • You receive a request from an end user to handle an issue with an application or service that was recently released. You are aware of the features but don’t know how to solve this issue particularly.
      • You know someone in the project group who is familiar with the service, as he was involved in the project. You reach out to him, but he is very busy with another project.
      • You get back to the user to let them know that this will be done as soon as the specialist is available. But because there is no clarity on the scope of the issue, you cannot tell them when this will be resolved.
      • Lack of visibility and commitment to the service recovery will negatively impact end-user satisfaction with the service desk.

      Project delivery team:

      • You are working on an exciting project, approaching the deadline. Suddenly, you receive a ticket from a service desk agent asking you to solve an incident on a product that was released three months ago.
      • Given the deadline on the current project, you are stressed, thinking about just focusing on the projects. On the other hand, the issue with the other service is impacting multiple users and requires much attention.
      • You spend extra time handling the issue and get back to your project. But a few days later the same agent gets back to you to take care of the same issue.
      • This is negatively impacting your work quality and causing some friction between the project team and the service desk.

      Link how improvement in project transitioning to the service desk can help service support

      A successful launch can still be a failure if the support team isn't fully informed and prepared.

      • In such a situation, the project team sends impacted users a mass notification without a solid plan for training and no proper documentation.
      • To provide proper customer service, organizations should involve several stakeholder groups to collaborate for a seamless transition of projects to the service desk.
      • This shift in service support takes time and effort; however, via proper planning there will be less confusion around customer service, and it will be done much faster.
        • For instance, if AppDev is customizing an ERP solution without considering knowledge transfer to the service desk, relevant tickets will be unnecessarily escalated to the project team.
      • On the other hand, the service desk should update configuration items (CIs) and the service catalog and related requests, incidents, problems, and workarounds to the relevant assets and configurations.
      • In this transition process, knowledge transfer plays a key role. Users, the service desk, and other service support teams need to know how the new application or service works and how to manage it when an issue arises.
      • Without a knowledge transfer, service support will be forced to either reinvent the wheel or escalate the ticket to the development team. This will unnecessarily increase the time for ticket handling, increase cost per ticket, and reduce end-user satisfaction.

      Info-Tech Insight

      Involve the service desk in the transition process via clear communication, knowledge transfer, and staff training.

      Integrate the service desk into the project management lifecycle for a smooth transition of service support

      Service desk involvement in the development, testing, and maintenance/change activity steps of your project lifecycle will help you logically define the category and priority level of the service and enable service level improvement accordingly after the project goes live.

      Project management lifecycle

      As some of the support and project processes can be integrated, responsibility silos should be broken

      Processes are done by different roles. Determine roles and responsibilities for the overlapping processes to streamline service support transition to the service desk.

      The project team is dedicated to projects, while the support team focuses on customer service for several products.

      Siloed responsibilities:

      • Project team transfers the service fully to the service desk and leaves technicians alone for support without a good knowledge transfer.
      • Specialists who were involved in the project have deep knowledge about the product, but they are not involved in incident or problem management.
      • Service desk was not involved in the planning and execution processes, which leads to lack of knowledge about the product. This leaves the support team with some vague knowledge about the service, which negatively impacts the quality of incident and problem management.

      How to break the silos:

      Develop a tiered model for the service desk and include project delivery in the specialist tier.

      • Use tier 1 (service desk) as a single point of contact to support all IT services.
      • Have tier 2/3 as experts in technology. These agents are a part of the project team. They are also involved in incident management, root-cause analysis, and change management.

      Determine the interfaces

      At the project level, get a clear understanding of support capabilities and demands, and communicate them to the service desk to proactively bring them into the planning step.

      The following questions help you with an efficient plan for support transition

      Questions for support transition

      Clear responsibilities help you define the level of involvement in the overlapping processes

      Conduct a stakeholder analysis to identify the people that can help ensure the success of the transition.

      Goal: Create a prioritized list of people who are affected by the new service and will provide support.

      Why is stakeholder analysis essential?

      Why is stakeholder analysis essential

      Identify the tasks that are required for a successful project handover

      Embed the tasks that the project team should deliver before handing support to the service desk.

      Task/Activity Example

      Conduct administrative work in the application

      • New user setup
      • Password reset

      Update documentation

      • Prepare for knowledge transfer>
      Service request fulfillment/incident management
      • Assess potential bugs
      Technical support for systems troubleshooting
      • Configure a module in ITSM solution

      End-user training

      • FAQs
      • How-to questions
      Service desk training
      • Train technicians for troubleshooting

      Support management (monitoring, meeting SLAs)

      • Monitoring
      • Meeting SLAs

      Report on the service transitioning

      • Transition effectiveness
      • Four-week warranty period
      Ensure all policies follow the transition activities
      • The final week of transition, the service desk will be called to a meeting for final handover of incidents and problems

      Integrate project description and service priority throughout development phase

      Include the service desk in discussions about project description, so it will be enabled to define service priority level.

      • Project description will be useful for bringing the project forward to the change advisory board (CAB) for approval and setting up the service in the CMDB.
      • Service priority is used for adding the next layer of attributes to the CMDB for the service and ensuring the I&O department can set up systems monitoring.
      • This should be done early in the process in conjunction with the project manager and business sponsors.
      • It should be done as the project gets underway and the team can work on specifically where that milestone will be in each project.
      • What to include in the project description:
        • Name
        • Purpose
        • Publisher
        • Departments that will use the service
        • Service information
        • Regulatory constrains
      • What to include in the service priority information:
        • Main users
        • Number of users
        • Service requirements
        • System interdependencies
        • Criticality of the dependent systems
        • Service category
        • Service SME and support backup
        • System monitoring resources
        • Alert description and flow

      Document project description and service priority in the Project Handover Template.

      Embed service levels and maintenance information

      Include the service desk in discussions about project description, so it will be enabled to define service priority level.

      • Service level objectives (SLOs) will be added to CMDB to ensure the product is reviewed for business continuity and disaster recovery and that the service team knows what is coming.
      • This step will be good to start thinking about training agents and documenting knowledgebase (KB) articles.
      • What to include in SLO:
        • Response time
        • Resolution time
        • Escalation time
        • Business owner
        • Service owner
        • Vendor(s)
        • Vendor warranties
        • Data archiving/purging
        • Availability list
        • Business continuity/recovery objectives
        • Scheduled reports
        • Problem description
      • Maintenance and change requirements: You should add maintenance windows to the change calendar and ensure the maintenance checklist is added to KB articles and technician schedules.
      • What to include in maintenance and change requirements:
        • Scheduled events for the launch
        • Maintenance windows
        • Module release
        • Planned upgrades
        • Anticipated intervals for changes and trigger points
        • Scheduled batches

      Document service level objectives and maintenance in the Project Handover Template.

      Enhance communication between the project team and the service desk

      Communicating with the service desk early and often will ensure that agents fully get a deep knowledge of the new technology.

      Transition of a project to the service desk includes both knowledge transfer and execution transfer.

      01

      Provide training and mentoring to ensure technical knowledge is passed on.

      02

      Transfer leadership responsibilities by appointing the right people.

      03

      Transfer support by strategically assigning workers with the right technical and interpersonal skills.

      04

      Transfer admin rights to ensure technicians have access rights for troubleshooting.

      05

      Create support and a system to transfer work process. For example, using an online platform to store knowledge assets is a great way for support to access project information.

      Info-Tech Insight

      A communication plan and executive presentation will help project managers outline recommendations and communicate their benefits.

      Communicate reasons for projects and how they will be implemented

      Proactive communication of the project to affected stakeholders will help get their buy-in for the new technology and feedback for better support.

      Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, that makes the change concrete and meaningful to staff.

      The message should:

      • Explain why the change or new application is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed due to the new or updated product.
      • Explain how the application will be implemented.
      • Address how this will affect various roles in the organization.
      • Discuss the staff’s role in making the project successful.
      • Communicate the supporting roles in the early implementation stages and later on.

      Five elements of communicating change

      Implement knowledge transfer to the service desk to ensure tickets won’t be unnecessarily escalated

      The support team usually uses an ITSM solution, while the project team mostly uses a project management solution. End users’ support is done and documented in the ITSM tool.

      Even terminologies used by these teams are different. For instance, service desk’s “incident” is equivalent to a project manager’s “defect.” Without proper integration of the development and support processes, the contents get siloed and outdated over time.

      Potential ways to deal with this challenge:

      Use the same platform for both project and service support

      This helps you document information in a single platform and provides better visibility of the project status to the support team as well. It also helps project team find out change-related incidents for a faster rollback.

      Note: This is not always feasible because of the high costs incurred in purchasing a new application with both ITSM and PM capabilities and the long time it takes for implementing such a solution.

      Integrate the PM and ITSM tools to improve transition efficiency

      Note: Consider the processes that should be integrated. Don’t integrate unnecessary steps in the development stage, such as design, which will not be helpful for support transition.

      Build a training plan for the new service

      When a new system is introduced or significant changes are applied, describe the steps and timeline for training.

      Training the service desk has two-fold benefits:
      Improve support:
      • Support team gets involved in user acceptance testing, which will provide feedback on potential bugs or failures in the technology.
      • Collaboration between specialists and tier 1 technicians will allow the service desk to gather information for handling potential incidents on the application.
      Shift-left enablement:
      • At the specialist level, agents will be more focused on other projects and spend less time on application issues, as they are mostly handled by the service desk.
      • As you shift service support left:
        • Cost per ticket decreases as more of the less costly resources are doing the work.
        • Average time to resolve decreases as the ticket is handled by the service desk.
        • End-user satisfaction increases as they don’t need to wait long for resolution.

      Who resolves the incident

      For more information about shift-left enablement, refer to InfoTech’s blueprint Optimize the Service Desk With a Shift-Left Strategy.

      Integrate knowledge management in the transition plan

      Build a knowledge transfer process to streamline service support for the newly developed technology.

      Use the following steps to ensure the service desk gets trained on the new project.

      1. Identify learning opportunities.
      2. Prioritize the identified opportunities based on:
      • Risk of lost knowledge
      • Impact of knowledge on support improvement
    • Define ways to transfer knowledge from the project team to the service desk. These could be:
      • One-on-one meetings
      • Mentoring sessions
      • Knowledgebase articles
      • Product road test
      • Potential incident management shadowing
    • Capture and transfer knowledge (via the identified means).
    • Support the service desk with further training if the requirement arises.
    • Info-Tech Insight

      Allocate knowledge transfer within ticket handling workflows. When incident is resolved by a specialist, they will assess if it is a good candidate for technician training and/or a knowledgebase article. If so, the knowledge manager will be notified of the opportunity to assign it to a SME for training and documentation of an article.

      For more information about knowledge transfer, refer to phase 3 of Info-Tech’s blueprint Standardize the Service Desk.

      Focus on the big picture first

      Identify training functions and plan for a formal knowledge transfer

      1. Brainstorm training functions for each group.
      2. Determine the timeline needed to conduct training for the identified training topics.
      RoleTraining FunctionTimeline

      Developer/Technical Support

      • Coach the service desk on the new application
      • Document relevant KB articles
      Business Analysts
      • Conduct informational interviews for new business requirements

      Service Desk Agents

      • Conduct informational interviews
      • Shadow incident management procedures
      • Document lessons learned
      Vendor
      • Provide cross-training to support team

      Document your knowledge transfer plan in the Project Handover Template.

      Build a checklist of the transition action items

      At this stage, the project is ready to go live and support needs to be independently done by the service desk.

      Checklist of the transition action items

      Info-Tech Insight

      No matter how well training is done, specialists may need to work on critical incidents and handle emergency changes. With effective service support and transition planning, you can make an agreement between the incident manager, change manager, and project manager on a timeline to balance critical incident or emergency change management and project management and define your SLA.

      Activity: Prepare a checklist of initiatives before support transition

      2-3 hours

      Document project support information and check off each support transition initiative as you shift service support to the service desk.

      1. As a group, review the Project Handover Template that you filled out in the previous steps.
      2. Download the Service Support Transitioning Checklist, and review the items that need to be done throughout the development, testing, and deployment steps of your project.
      3. Brainstorm at what step service desk needs to be involved.
      4. As you go through each initiative and complete it, check it off to make sure you are following the agreed document for a smooth transition of service support.
      Input Output
      • Project information
      • Support information for developed application/service
      • List of transitioning initiatives
      MaterialsParticipants
      • Project Handover Template
      • Service Support Transitioning Checklist
      • Project Team
      • Service Desk Manager
      • IT Lead

      Download the Project Handover Template

      Download the Service Support Transitioning Checklist

      Define metrics to track the success of project transition

      Consider key metrics to speak the language of targeted end users.

      You won’t know if transitioning support processes are successful unless you measure their impact. Find out your objectives for project transition and then track metrics that will allow you to fulfill these goals.

      Determine critical success factors to help you find out key metrics:

      High quality of the service

      Effectiveness of communication of the transition

      Manage risk of failure to help find out activities that will mitigate risk of service disruption

      Smooth and timely transition of support to the service desk

      Efficient utilization of the shared services and resources to mitigate conflicts and streamline service transitioning

      Suggested metrics:

      • Time to fulfill requests and resolve incidents for the new project
      • Time spent training the service desk
      • Number of knowledgebase articles created by the project team
      • Percentage of articles used by the service desk that prevented ticket escalation
      • First-level resolution
      • Ratio of escalated tickets for the new project
      • Problem ticket volume for the new project
      • Average customer satisfaction with the new project support
      • SLA breach rate

      Summary of Accomplishment

      Problem Solved

      Following the steps outlined in this research has helped you build a strategy to shift service support from the project team to the service desk, resulting in an improvement in customer service and agent satisfaction.

      You have also developed a plan to break the silo between the service desk and specialists and enable knowledge transfer so the service desk will not need to unnecessarily escalate tickets to developers. In the meantime, specialists are also responsible for service desk training on the new application.

      Efficient communication of service levels has helped the project team set clear expectations for managers to create a balance between their projects and service support.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Standardize the Service Desk

      Improve customer service by driving consistency in your support approach and meeting SLAs.

      Optimize the Service Desk With a Shift-Left Strategy

      The best type of service desk ticket is the one that doesn’t exist.

      Tailor IT Project Management Processes to Fit Your Projects

      Right-size PMBOK for all of your IT projects.

      Works Cited

      Brown, Josh. “Knowledge Transfer: What it is & How to Use it Effectively.” Helpjuice, 2021. Accessed November 2022.

      Magowan, Kirstie. “Top ITSM Metrics & KPIs: Measuring for Success, Aiming for Improvement.” BMC Blogs, 2020. Accessed November 2022.

      “The Complete Blueprint for Aligning Your Service Desk and Development Teams (Process Integration and Best Practices).” Exalate, 2021. Accessed October 2022.

      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.

      Effectively Acquire Infrastructure Services

      • Buy Link or Shortcode: {j2store}467|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $26,627 Average $ Saved
      • member rating average days saved: 12 Average Days Saved
      • Parent Category Name: Data Center & Facilities Optimization
      • Parent Category Link: /data-center-and-facilities-optimization
      • Most organizations are good at procuring IT products, but few are truly good at acquiring infrastructure services.
      • The lack of expertise in acquiring services is problematic – not only is the acquisition process for services more complex, but it also often has high stakes with large deal sizes, long-term contracts, and high switching costs.

      Our Advice

      Critical Insight

      • Don’t treat infrastructure service acquisitions lightly. Not only are failure rates high, but the stakes are high as well.
      • Make sure your RFP strategy aligns with your deal value. Large deals, characterized by high monthly spend, high criticality to the organization, and high switching costs, warrant a more thorough and lengthy planning period and RFP process.
      • Word your RFP carefully and do your due diligence when reviewing SLAs. Make sure your RFP will help you understand what the vendor’s standard offerings are and don’t treat your service level agreements like an open negotiation. The vendor’s standard offerings will be your most reliable options.

      Impact and Result

      • Follow this blueprint to avoid common pitfalls and navigate the tricky business of acquiring infrastructure services.
      • This blueprint will provide step-by-step guidance from assessing your acquisition goals to transitioning your service. Make sure you do the due diligence required to acquire the best service for your needs.

      Effectively Acquire Infrastructure Services Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should follow the blueprint to effectively acquire infrastructure services, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop the procurement strategy and process

      Kick off an acquisition by establishing acquisition goals, validating the decision to acquire a service, and structuring an acquisition approach. There are several RFP approaches and strategies – evaluate the options and develop one that aligns with the nature of the acquisition.

      • Effectively Acquire Infrastructure Services – Phase 1: Develop the Procurement Strategy and Process

      2. Assess requirements and build the RFP

      A solid RFP is critical to the success of this project. Assess the current and future requirements, examine the characteristics of an effective RFP, and develop an RFP.

      • Effectively Acquire Infrastructure Services – Phase 2: Assess Requirements and Build the RFP
      • Infrastructure Service RFP Template

      3. Manage vendor questions and select the vendor

      Manage the activities surrounding vendor questions and score the RFP responses to select the best-fit solution.

      • Effectively Acquire Infrastructure Services – Phase 3: Manage Vendor Questions and Select the Vendor
      • Vendor Question Organizer Template
      • Infrastructure Outsourcing RFP Scoring Tool

      4. Manage the contract, transition, and vendor

      Perform due diligence in reviewing the SLAs and contract before signing. Plan to transition the service into the environment and manage the vendor on an ongoing basis for a successful partnership.

      • Effectively Acquire Infrastructure Services – Phase 4: Manage the Contract, Transition, and Vendor
      • Service Acquisition Planning and Tracking Tool
      • Vendor Management Template
      [infographic]

      Workshop: Effectively Acquire Infrastructure Services

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Develop the Procurement Strategy and Process

      The Purpose

      Establish procurement goals and success metrics.

      Develop a projected acquisition timeline.

      Establish the RFP approach and strategy.

      Key Benefits Achieved

      Defined acquisition approach and timeline.

      Activities

      1.1 Establish your acquisition goals.

      1.2 Establish your success metrics.

      1.3 Develop a projected acquisition timeline.

      1.4 Establish your RFP process and refine your RFP timeline.

      Outputs

      Acquisition goals

      Success metrics

      Acquisition timeline

      RFP strategy and approach

      2 Gather Service Requirements

      The Purpose

      Gather requirements for services to build into the RFP.

      Key Benefits Achieved

      Gathered requirements.

      Activities

      2.1 Assess the current state.

      2.2 Evaluate service requirements and targets.

      2.3 Assess the gap and validate the service acquisition.

      2.4 Define requirements to input into the RFP.

      Outputs

      Current State Assessment

      Service requirements

      Validation of services being acquired and key processes that may need to change

      Requirements to input into the RFP

      3 Develop the RFP

      The Purpose

      Build the RFP.

      Key Benefits Achieved

      RFP development.

      Activities

      3.1 Build the RFP requirement section.

      3.2 Develop the rest of the RFP.

      Outputs

      Service requirements input into the RFP

      Completed RFP

      4 Review RFP Responses and Select a Vendor (Off-Site)

      The Purpose

      Review RFP responses to select the best solution for the acquisition.

      Key Benefits Achieved

      Vendor selected.

      Activities

      4.1 Manage vendor questions regarding the RFP.

      4.2 Review RFP responses and shortlist the vendors.

      4.3 Conduct additional due diligence on the vendors.

      4.4 Select a vendor.

      Outputs

      Managed RFP activities

      Imperceptive scoring of RFP responses and ranking of vendors

      Additional due diligence and further questions for the vendor

      Selected vendor

      Deliver a Customer Service Training Program to Your IT Department

      • Buy Link or Shortcode: {j2store}484|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $4,339 Average $ Saved
      • member rating average days saved: 6 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • The scope of service that the service desk must provide has expanded. With the growing complexity of technologies to support, it becomes easy to forget the customer service side of the equation. Meanwhile, customer expectations for prompt, frictionless, and exceptional service from anywhere have grown.
      • IT departments struggle to hire and retain talented service desk agents with the right mix of technical and customer service skills.
      • Some service desk agents don’t believe or understand that customer service is an integral part of their role.
      • Many IT leaders don’t ask for feedback from users to know if there even is a customer service problem.

      Our Advice

      Critical Insight

      • There’s a common misconception that customer service skills can’t be taught, so no effort is made to improve those skills.
      • Even when there is a desire to improve customer service, it’s hard for IT teams to make time for training and improvement when they’re too busy trying to keep up with tickets.
      • A talented service desk agent with both great technical and customer service skills doesn’t have to be a rare unicorn, and an agent without innate customer service skills isn’t a lost cause. Relevant and impactful customer service habits, techniques, and skills can be taught through practical, role-based training.
      • IT leaders can make time for this training through targeted, short modules along with continual on-the-job coaching and development.

      Impact and Result

      • Good customer service is critical to the success of the service desk. How a service desk treats its customers will determine its customers' satisfaction with not only IT but also the company as a whole.
      • Not every technician has innate customer service skills. IT managers need to provide targeted, practical training on what good customer service looks like at the service desk.
      • One training session is not enough to make a change. Leaders must embed the habits, create a culture of engagement and positivity, provide continual coaching and development, regularly gather customer feedback, and seek ways to improve.

      Deliver a Customer Service Training Program to Your IT Department Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should deliver customer service training to your team, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Deliver a Customer Service Training Program to Your IT Department – Executive Brief
      • Deliver a Customer Service Training Program to Your IT Department Storyboard

      1. Deliver customer service training to your IT team

      Understand the importance of customer service training, then deliver Info-Tech's training program to your IT team.

      • Customer Service Training for the Service Desk – Training Deck
      • Customer Focus Competency Worksheet
      • Cheat Sheet: Service Desk Communication
      • Cheat Sheet: Service Desk Written Communication
      [infographic]

      Start Making Data-Driven People Decisions

      • Buy Link or Shortcode: {j2store}427|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Leadership Development Programs
      • Parent Category Link: /leadership-development-programs
      • Ninety-one percent of IT leaders believe that analytics is important for talent management but 59% use no workforce analytics at all, although those who use analytics are much more effective than those who don't.
      • The higher the level of analytics used, the higher the level of effectiveness of the department as a whole.

      Our Advice

      Critical Insight

      • You don't need advanced metrics and analytics to see a return on people data. Begin by getting a strong foundation in place and showing the ROI on a pilot project.
      • Complex analyses will never make up for inadequate data quality. Spend the time up front to audit and improve data quality if necessary, no matter which stage of analytics proficiency you are at.
      • Ensure you collect and analyze only data that is essential to your decision making. More is not better, and excess data can detract from the overall impact of analytics.

      Impact and Result

      • Build a small-scale foundational pilot, which will allow you to demonstrate feasibility, refine your costs estimate, and show the ROI on people analytics for your budgeting meeting.
      • Drive organizational change incrementally by identifying and communicating with the stakeholders for your people analytics pilot.
      • Choose basic analytics suitable for organizations of all sizes and understand the building blocks of data quality to support more further analytics down the line.

      Start Making Data-Driven People Decisions Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should strategically apply people analytics to your IT talent management.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define the problem and apply the checklist

      From choosing the right data for the right problem to evaluating your progress toward data-driven people decisions, follow these steps to build your foundation to people analytics.

      • Start Making Data-Driven People Decisions – Phase 1: Define the Problem and Apply the Checklist
      • People Analytics Strategy Template
      • Talent Metrics Library
      [infographic]

      Map Technical Skills for a Changing Infrastructure & Operations Organization

      • Buy Link or Shortcode: {j2store}333|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: 5 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design
      • Infrastructure & Operations is changing rapidly. It’s a constant challenge to find the right skills to support the next new technology while at the same time maintaining the skills in house that allow you to support your existing platforms.
      • A lack of clarity around required skills makes finding the right skills difficult, and it’s not clear whether you should train, hire, contract, or outsource to address gaps.
      • You need to keep up with changes and new strategy while continuing to support your existing environment.

      Our Advice

      Critical Insight

      • Take a strategic approach to acquiring skills – looking only as far as the needs of the next project will lead to a constant skills shortage with no plan for it to be addressed.
      • Begin by identifying your future state. Identify needed skills in the organization to support planned projects and initiatives, and to mitigate skills-related risks.

      Impact and Result

      • Leverage your infrastructure roadmap and cloud strategy to identify needed skills in your future state environment.
      • Decide how you’ll acquire needed skills based on the characteristics of need for each skill.
      • Communicate the change and create a plan of action for the skills transformation.

      Map Technical Skills for a Changing Infrastructure & Operations Organization Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should map technical skills for a changing Infrastructure & Operations organization, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify skills needs for the future state environment

      Identify what skills are needed based on where the organization is going.

      • Map Technical Skills for a Changing Infrastructure & Operations Organization – Phase 1: Identify Skills Needs for Your Future State Environment
      • Future State Playbook
      • IT/Cloud Solutions Architect
      • IT/Cloud Engineer
      • IT/Cloud Administrator
      • IT/Cloud Demand Billing & Accounting Analyst

      2. Acquire needed skills

      Ground skills acquisition decisions in the characteristics of need.

      • Map Technical Skills for a Changing Infrastructure & Operations Organization – Phase 2: Acquire Needed Skills
      • Technical Skills Map

      3. Maximize the value of the skills map

      Get stakeholder buy-in; leverage the skills map in other processes.

      • Map Technical Skills for a Changing Infrastructure & Operations Organization – Phase 3: Maximize the Value of Your Skills Map
      • Technical Skills Map Communication Deck Template
      [infographic]

      Workshop: Map Technical Skills for a Changing Infrastructure & Operations Organization

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Review Initiatives and Skills-Related Risks

      The Purpose

      Identify process and skills changes required by the future state of your environment.

      Key Benefits Achieved

      Set foundation for alignment between strategy-defined technology initiatives and needed skills.

      Activities

      1.1 Review the list of initiatives and projects with the group.

      1.2 Identify how key support, operational, and deployment processes will change through planned initiatives.

      1.3 Identify skills-related risks and pain points.

      Outputs

      Future State Playbook

      2 Identify Needed Skills and Roles

      The Purpose

      Identify process and skills changes required by the future state of your environment.

      Key Benefits Achieved

      Set foundation for alignment between strategy-defined technology initiatives and needed skills.

      Activities

      2.1 Identify skills required to support the new environment.

      2.2 Map required skills to roles.

      Outputs

      IT/Cloud Architect Role Description

      IT/Cloud Engineer Role Description

      IT/Cloud Administrator Role Description

      3 Create a Plan to Acquire Needed Skills

      The Purpose

      Create a skills acquisition strategy based on the characteristics of need.

      Key Benefits Achieved

      Optimal skills acquisition strategy defined.

      Activities

      3.1 Modify impact scoring scale for key skills decision factors.

      3.2 Apply impact scoring scales to needed skills

      3.3 Decide whether to train, hire, contract, or outsource to acquire needed skills.

      Outputs

      Technical Skills Map

      4 Develop a Communication Plan

      The Purpose

      Create an effective communication plan for different stakeholders across the organization.

      Identify opportunities to leverage the skills map elsewhere.

      Key Benefits Achieved

      Create a concise, clear, consistent, and relevant change message for stakeholders across the organization.

      Activities

      4.1 Review skills decisions and decide how you will acquire skills in each role.

      4.2 Update roles descriptions.

      4.3 Create a change message.

      4.4 Identify opportunities to leverage the skills map in other processes.

      Outputs

      Technical Skills Map Communication Deck

      Standardize the Service Desk

      • Buy Link or Shortcode: {j2store}477|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $24,155 Average $ Saved
      • member rating average days saved: 24 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Not everyone embraces their role in service support. Specialists would rather work on projects than provide service support.
      • The Service Desk lacks processes and workflows to provide consistent service. Service desk managers struggle to set and meet service-level expectations, which further compromises end-user satisfaction.

      Our Advice

      Critical Insight

      • Service desk improvement is an exercise in organizational change. Engage specialists across the IT organization in building the solution. Establish a single service-support team across the IT group and enforce it with a cooperative, customer-focused culture.
      • Don’t be fooled by a tool that’s new. A new service desk tool alone won’t solve the problem. Service desk maturity improvements depend on putting in place the right people and processes to support the technology.

      Impact and Result

      • Create a consistent customer service experience for service desk patrons, and increase efficiency, first-call resolution, and end-user satisfaction with the Service Desk.
      • Decrease time and cost to resolve service desk tickets.
      • Understand and address reporting needs to address root causes and measure success and build a solid foundation for future IT service improvements.

      Standardize the Service Desk Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Standardize the Service Desk Research – A step-by-step document that helps you improve customer service by driving consistency in your support approach and meet SLAs.

      Use this blueprint to standardize your service desk by assessing your current capability and laying the foundations for your service desk, design an effective incident management workflow, design a request fulfillment process, and apply the discussions and activities to make an actionable plan for improving your service desk.

      • Standardize the Service Desk – Phases 1-4

      2. Service Desk Maturity Assessment – An assessment tool to help guide process improvement efforts and track progress.

      This tool is designed to assess your service desk process maturity, identify gaps, guide improvement efforts, and measure your progress.

      • Service Desk Maturity Assessment

      3. Service Desk Project Summary – A template to help you organize process improvement initiatives using examples.

      Use this template to organize information about the service desk challenges that the organization is facing, make the case to build a right-sized service desk to address those challenges, and outline the recommended process changes.

      • Service Desk Project Summary

      4. Service Desk Roles and Responsibilities Guide – An analysis tool to determine the right roles and build ownership.

      Use the RACI template to determine roles for your service desk initiatives and to build ownership around them. Use the template and replace it with your organization's information.

      • Service Desk Roles and Responsibilities Guide

      5. Incident Management and Service Desk Standard Operating Procedure – A template designed to help service managers kick-start the standardization of service desk processes.

      The template will help you identify service desk roles and responsibilities, build ticket management processes, put in place sustainable knowledgebase practices, document ticket prioritization scheme and SLO, and document ticket workflows.

      • Incident Management and Service Desk SOP

      6. Ticket and Call Quality Assessment Tool – An assessment tool to check in on ticket and call quality quarterly and improve the quality of service desk data.

      Use this tool to help review the quality of tickets handled by agents and discuss each technician's technical capabilities to handle tickets.

      • Ticket and Call Quality Assessment Tool

      7. Workflow Library – A repository of typical workflows.

      The Workflow Library provides examples of typical workflows that make up the bulk of the incident management and request fulfillment processes at the service desk.

      • Incident Management and Service Desk Workflows (Visio)
      • Incident Management and Service Desk Workflows (PDF)

      8. Service Desk Ticket Categorization Schemes – A repository of ticket categories.

      The Ticket Categorization Schemes provide examples of ticket categories to organize the data in the service desk tool and produce reports that help managers manage the service desk and meet business requirements.

      • Service Desk Ticket Categorization Schemes

      9. Knowledge Manager – A job description template that includes a detailed explication of the responsibilities and expectations of a Knowledge Manager role.

      The Knowledge Manager's role is to collect, synthesize, organize, and manage corporate information in support of business units across the enterprise.

      • Knowledge Manager

      10. Knowledgebase Article Template – A comprehensive record of the incident management process.

      An accurate and comprehensive record of the incident management process, including a description of the incident, any workarounds identified, the root cause (if available), and the profile of the incident's source, will improve incident resolution time.

      • Knowledgebase Article Template

      11. Sample Communication Plan – A sample template to guide your communications around the integration and implementation of your overall service desk improvement initiatives.

      Use this template to develop a communication plan that outlines what stakeholders can expect as the process improvements recommended in the Standardize the Service Desk blueprint are implemented.

      • Sample Communication Plan

      12. Service Desk Roadmap – A structured roadmap tool to help build your service desk initiatives timeline.

      The Service Desk Roadmap helps track outstanding implementation activities from your service desk standardization project. Use the roadmap tool to define service desk project tasks, their owners, priorities, and timeline.

      • Service Desk Roadmap
      [infographic]

      Workshop: Standardize the Service Desk

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Lay Service Desk Foundations

      The Purpose

      Discover your challenges and understand what roles, metrics, and ticket handling procedures are needed to tackle the challenges.

      Key Benefits Achieved

      Set a clear understanding about the importance of service desk to your organization and service desk best practices.

      Activities

      1.1 Assess current state of the service desk.

      1.2 Review service desk and shift-left strategy.

      1.3 Identify service desk metrics and reports.

      1.4 Identify ticket handling procedures

      Outputs

      Current state assessment

      Shift-left strategy and implications

      Service desk metrics and reports

      Ticket handling procedures

      2 Design Incident Management

      The Purpose

      Build workflows for incident and critical incident tickets.

      Key Benefits Achieved

      Distinguish incidents from service requests.

      Ticket categorization facilitates ticket. routing and reporting.

      Develop an SLA for your service desk team for a consistent service delivery.

      Activities

      2.1 Build incident and critical incident management workflows.

      2.2 Design ticket categorization scheme and proper ticket handling guidelines.

      2.3 Design incident escalation and prioritization guidelines.

      Outputs

      Incident and critical incident management workflows

      Ticket categorization scheme

      Ticket escalation and prioritization guidelines

      3 Design Request Fulfilment

      The Purpose

      Build service request workflows and prepare self-service portal.

      Key Benefits Achieved

      Standardize request fulfilment processes.

      Prepare for better knowledge management and leverage self-service portal to facilitate shift-left strategy.

      Activities

      3.1 Build service request workflows.

      3.2 Build a targeted knowledgebase.

      3.3 Prepare for a self-serve portal project.

      Outputs

      Distinguishing criteria for requests and projects

      Service request workflows and SLAs

      Knowledgebase article template, processes, and workflows

      4 Build Project Implementation Plan

      The Purpose

      Now that you have laid the foundation of your service desk, put all the initiatives into an action plan.

      Key Benefits Achieved

      Discuss priorities, set timeline, and identify effort for your service desk.

      Identify the benefits and impacts of communicating service desk initiatives to stakeholders and define channels to communicate service desk changes.

      Activities

      4.1 Build an implementation roadmap.

      4.2 Build a communication plan

      Outputs

      Project implementation and task list with associated owners

      Project communication plan and workshop summary presentation

      Further reading

      Analyst Perspective

      "Customer service issues are rarely based on personality but are almost always a symptom of poor and inconsistent process. When service desk managers are looking to hire to resolve customer service issues and executives are pushing back, it’s time to look at improving process and the support strategy to make the best use of technicians’ time, tools, and knowledge sharing. Once improvements have been made, it’s easier to make the case to add people or introduce automation.

      Replacing service desk solutions will also highlight issues around poor process. Without fixing the baseline services, the new solution will simply wrap your issues in a prettier package.

      Ultimately, the service desk needs to be the entry point for users to get help and the rest of IT needs to provide the appropriate support to ensure the first line of interaction has the knowledge and tools they need to resolve quickly and preferably on first contact. If your plans include optimization to self-serve or automation, you’ll have a hard time getting there without standardizing first."

      Sandi Conrad

      Principal Research Director, Infrastructure & Operations Practice

      Info-Tech Research Group

      A method for getting your service desk out of firefighter mode

      This Research Is Designed For:

      • The CIO and senior IT management who need to increase service desk effectiveness and timeliness and improve end-user satisfaction.
      • The service desk manager who wants to lead the team from firefighting mode to providing consistent and proactive support.

      This Research Will Also Assist:

      • Service desk teams who want to increase their own effectiveness and move from a help desk to a service desk.
      • Infrastructure and applications managers who want to decrease reactive support activities and increase strategic project productivity by shifting repetitive and low-value work left.

      This Research Will Help You:

      • Create a consistent customer service experience for service desk patrons.
      • Increase efficiency, first-call resolution, and end-user satisfaction with the Service Desk.
      • Decrease time and cost to resolve service desk tickets.
      • Understand and address reporting needs to address root causes and measure success.
      • Build a solid foundation for future IT service improvements.

      Executive Summary

      Situation

      • The CIO and senior IT management who need to increase service desk effectiveness and timeliness and improve end-user satisfaction.
      • If only the phone could stop ringing, the Service Desk could become proactive, address service levels, and improve end-user IT satisfaction.

      Complication

      • Not everyone embraces their role in service support. Specialists would rather work on projects than provide service support.
      • The Service Desk lacks processes and workflows to provide consistent service. Service desk managers struggle to set and meet service-level expectations, which further compromises end-user satisfaction.

      Resolution

      • Go beyond the blind adoption of best-practice frameworks. No simple formula exists for improving service desk maturity. Use diagnostic tools to assess the current state of the Service Desk. Identify service support challenges and draw on best-practice frameworks intelligently to build a structured response to those challenges.
      • An effective service desk must be built on the right foundations. Understand how:
        • Service desk structure affects cost and ticket volume capacity.
        • Incident management workflows can improve ticket handling, prioritization, and escalation.
        • Request fulfillment processes create opportunities for streamlining and automating services.
        • Knowledge sharing supports the processes and workflows essential to effective service support.

      Info-Tech Insight

      Service desk improvement is an exercise in organizational change. Engage specialists across the IT organization in building the solution. Establish a single service-support team across the IT group and enforce it with a cooperative, customer-focused culture. Don’t be fooled by a tool that’s new. A new service desk tool alone won’t solve the problem. Service desk maturity improvements depend on putting in place the right people and processes to support the technology

      Directors and executives understand the importance of the service desk and believe IT can do better

      A double bar graph is depicted. The blue bars represent Effectiveness and the green bars represent Importance in terms of service desk at different seniority levels, which include frontline, manager, director, and executive.

      Source: Info-Tech, 2019 Responses (N=189 organizations)

      Service Desk Importance Scores

        No Importance: 1.0-6.9
        Limited Importance: 7.0-7.9
        Significant Importance: 8.0-8.9
        Critical Importance: 9.0-10.0

      Service Desk Effectiveness Scores

        Not in Place: N/A
        Not Effective: 0.0-4.9
        Somewhat Ineffective: 5.0-5.9
        Somewhat Effective: 6.0-6.9
        Very Effective: 7.0-10.0

      Info-Tech Research Group’s IT Management and Governance Diagnostic (MGD) program assesses the importance and effectiveness of core IT processes. Since its inception, the MGD has consistently identified the service desk as an area to leverage.

      Business stakeholders consistently rank the service desk as one of the top five most important services that IT provides

      Since 2013, Info-Tech has surveyed over 40,000 business stakeholders as part of our CIO Business Vision program.

      Business stakeholders ranked the following 12 core IT services in terms of importance:

      Learn more about the CIO Business Vision Program.
      *Note: IT Security was added to CIO Business Vision 2.0 in 2019

      Top IT Services for Business Stakeholders

      1. Network Infrastructure
      2. IT Security*
      3. Data Quality
      4. Service Desk
      5. Business Applications
      6. Devices
      7. Client-Facing Technology
      8. Analytical Capability
      9. IT Innovation Leadership
      10. Projects
      11. Work Orders
      12. IT Policies
      13. Requirements Gathering
      Source: Info-Tech Research Group, 2019 (N=224 organizations)

      Having an effective and timely service desk correlates with higher end-user satisfaction with all other IT services

      A double bar graph is depicted. The blue bar represents dissatisfied ender user, and the green bar represents satisfied end user. The bars show the average of dissatisfied and satisfied end users for service desk effectiveness and service desk timeliness.

      On average, organizations that were satisfied with service desk effectiveness rated all other IT processes 46% higher than dissatisfied end users.

      Organizations that were satisfied with service desk timeliness rated all other IT processes 37% higher than dissatisfied end users.
      “Satisfied” organizations had average scores =8.“Dissatisfied" organizations had average scores “Dissatisfied" organizations had average scores =6. Source: Info-Tech Research Group, 2019 (N=18,500+ respondents from 75 organizations)

      Standardize the service desk the Info-Tech way to get measurable results

      More than one hundred organizations engaged with Info-Tech, through advisory calls and workshops, for their service desk projects in 2016. Their goal was either to improve an existing service desk or build one from scratch.

      Organizations that estimate the business impact of each project phase help us shed light on the average measured value of the engagements.

      "The analysts are an amazing resource for this project. Their approach is very methodical, and they have the ability to fill in the big picture with detailed, actionable steps. There is a real opportunity for us to get off the treadmill and make real IT service management improvements"

      - Rod Gula, IT Director

      American Realty Advisors

      Three circles are depicted. The top circle shows the sum of measured value dollar impact which is US$1,659,493.37. The middle circle shows the average measured value dollar impact which is US$19,755.87. The bottom circle shows the average measured value time saved which is 27 days.

      Info-Tech’s approach to service desk standardization focuses on building service management essentials

      This image depicts all of the phases and steps in this blueprint.

      Info-Tech draws on the COBIT framework, which focuses on consistent delivery of IT services across the organization

      This image depicts research that can be used to improve IT processes. Service Desk is circled to demonstrate which research is being used.

      The service desk is the foundation of all other service management processes.

      The image shows how the service desk is a foundation for other service management processes.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Standardize the Service Desk – project overview

      This image shows the project overview of this blueprint.

      Info-Tech delivers: Use our tools and templates to accelerate your project to completion

      Project Summary

      Image of template.

      Service Desk Standard Operating Procedures

      Image of tool.

      Service Desk Maturity Assessment Tool

      Image of tool.

      Service Desk Implementation Roadmap

      Image of tool Incident, knowledge, and request management workflows

      Incident, knowledge, and request management workflows

      The project’s key deliverable is a service desk standard operating procedure

      Benefits of documented SOPs:

      Improved training and knowledge transfer: Routine tasks can be delegated to junior staff (freeing senior staff to work on higher priority tasks).

      IT automation, process optimization, and consistent operations: Defining, documenting, and then optimizing processes enables IT automation to be built on sound processes, so consistent positive results can be achieved.

      Compliance: Compliance audits are more manageable because the documentation is already in place.

      Transparency: Visually documented processes answer the common business question of “why does that take so long?”

      Cost savings: Work solved at first contact or with a minimal number of escalations will result in greater efficiency and more cost-effective support. This will also lead to better customer service.

      Impact of undocumented/undefined SOPs:

      Tasks will be difficult to delegate, key staff become a bottleneck, knowledge transfer is inconsistent, and there is a longer onboarding process for new staff

      IT automation built on poorly defined, unoptimized processes leads to inconsistent results.

      Documenting SOPs to prepare for an audit becomes a major time-intensive project.

      Other areas of the organization may not understand how IT operates, which can lead to confusion and unrealistic expectations.

      Support costs are highest through inefficient processes, and proactive work becomes more difficult to schedule, making the organization vulnerable to costly disruptions.

      Workshop Overview

      Image depicts workshop overview occurring over four days.

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Phase 1

      Lay Service Desk Foundations

      Step 1.1:Assess current state

      Image shows the steps in phase 1. Highlight is on step 1.1

      This step will walk you through the following activities:

      • 1.1.1 Outline service desk challenges
      • 1.1.2 Assess the service desk maturity

      This step involves the following participants:

      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Alignment on the challenges that the service desk faces, an assessment of the current state of service desk processes and technologies, and baseline metrics against which to measure improvements.

      Deliverables

      • Service Desk Maturity Assessment

      Standardizing the service desk benefits the whole business

      The image depicts 3 circles to represent the service desk foundations.

      Embrace standardization

      • Standardization prevents wasted energy on reinventing solutions to recurring issues.
      • Standardized processes are scalable so that process maturity increases with the size of your organization.

      Increase business satisfaction

      • Improve confidence that the service desk can meet service levels.
      • Create a single point of contact for incidents and requests and escalate quickly.
      • Analyze trends to forecast and meet shifting business requirements.

      Reduce recurring issues

      • Create tickets for every task and categorize them accurately.
      • Generate reliable data to support root-cause analysis.

      Increase efficiency and lower operating costs

      • Empower end users and technicians with a targeted knowledgebase (KB).
      • Cross-train to improve service consistency.

      Case Study: The CIO of Westminster College took stock of existing processes before moving to empower the “helpless desk”

      Scott Lowe helped a small staff of eight IT professionals formalize service desk processes and increase the amount of time available for projects.

      When he joined Westminster College as CIO in 2006, the department faced several infrastructure challenges, including:

      • An unreliable network
      • Aging server replacements and no replacement plan
      • IT was the “department of no”
      • A help desk known as the “helpless desk”
      • A lack of wireless connectivity
      • Internet connection speed that was much too slow

      As the CIO investigated how to address the infrastructure challenges, he realized people cared deeply about how IT spent its time.

      The project load of IT staff increased, with new projects coming in every day.

      With a long project list, it became increasingly important to improve the transparency of project request and prioritization.

      Some weeks, staff spent 80% of their time working on projects. Other weeks, support requirements might leave only 10% for project work.

      He addressed the infrastructure challenges in part by analyzing IT’s routine processes.

      Internally, IT had inefficient support processes that reduced the amount of time they could spend on projects.

      They undertook an internal process analysis effort to identify processes that would have a return on investment if they were improved. The goal was to reduce operational support time so that project time could be increased.

      Five years later, they had a better understanding of the organization's operational support time needs and were able to shift workloads to accommodate projects without compromising support.

      Common challenges experienced by service desk teams

      Unresolved issues

      • Tickets are not created for all incidents.
      • Tickets are lost or escalated to the wrong technicians.
      • Poor data impedes root-cause analysis of incidents.

      Lost resources/accountability

      • Lack of cross-training and knowledge sharing.
      • Lack of skills coverage for critical applications and services.
      • Time is wasted troubleshooting recurring issues.
      • Reports unavailable due to lack of data and poor categorization.

      High cost to resolve

      • Tier 2/3 resolve issues that should be resolved at tier 1.
      • Tier 2/3 often interrupt projects to focus on service support.

      Poor planning

      • Lack of data for effective trend analysis leads to poor demand planning.
      • Lack of data leads to lost opportunities for templating and automation.

      Low business satisfaction

      • Users are unable to get assistance with IT services quickly.
      • Users go to their favorite technician instead of using the service desk.

      Outline the organization’s service desk challenges

      1.1.1 Brainstorm service desk challenges

      Estimated Time: 45 minutes

      A. As a group, outline the areas where you think the service desk is experiencing challenges or weaknesses. Use sticky notes or a whiteboard to separate the challenges into People, Process, and Technology so you have a wholistic view of the constraints across the department.

      B. Think about the following:

      • What have you heard from users? (e.g. slow response time)
      • What have you heard from executives? (e.g. poor communication)
      • What should you start doing? (e.g. documenting processes)
      • What should you stop doing? (e.g. work that is not being entered as tickets)

      C. Document challenges in the Service Desk Project Summary.

      Participants:

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      Assess current service desk maturity to establish a baseline and create a plan for service desk improvement

      A current-state assessment will help you build a foundation for process improvements. Current-state assessments follow a basic formula:

      1. Determine the current state of the service desk.
      2. Determine the desired state of the service desk.
      3. Build a practical path from current to desired state.
      Image depicts 2 circles and a box. The circle on the 1. left has assess current state. The circle on the right has 2. assess target state. The box has 3. build a roadmap.

      Ideally, the current-state assessment should align the delivery of IT services with organizational needs. The assessment should achieve the following goals:

      1. Identify service desk pain points.
      2. Map each pain point to business services.
      3. Assign a broad business value to the resolution of each pain point.
      4. Map each pain point to a process.

      Expert Insight

      Image of expert.

      “How do you know if you aren’t mature enough? Nothing – or everything – is recorded and tracked, customer satisfaction is low, frustration is high, and there are multiple requests and incidents that nobody ever bothers to address.”

      Rob England

      IT Consultant & Commentator

      Owner Two Hills

      Also known as The IT Skeptic

      Assess the process maturity of the service desk to determine which project phase and steps will bring the most value

      1.1.2 Measure which activity will have the greatest impact

      The Service Desk Maturity Assessmenttool helps organizations assess their service desk process maturity and focus the project on the activities that matter most.

      The tool will help guide improvement efforts and measure your progress.

      • The second tab of the tool walks through a qualitative assessment of your service desk practices. Questions will prompt you to evaluate how you are executing key activities. Select the answer in the drop-down menus that most closely aligns with your current state.
      • The third tab displays your rate of process completeness and maturity. You will receive a score for each phase, an overall score, and advice based on your performance.
      • Document the results of the efficiency assessment in the Service Desk Project Summary.

      The tool is intended for periodic use. Review your answers each year and devise initiatives to improve the process performance where you need it most.

      Where do I find the data?

      Consult:

      • Service Manager
      • Service Desk Tools
      Image is the service desk tools.

      Step 1.2:Review service support best practices

      Image shows the steps in phase 1. Highlight is on step 1.2.

      This step will walk you through the following activities:

      1. 1.2.1 Identify roles and responsibilities in your organization
      2. 1.2.2 Map out the current and target structure of the service desk

      This step involves the following participants:

      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Identifying who is accountable for different support practices in the service desk will allow workload to be distributed effectively between functional teams and individuals. Closing the gaps in responsibilities will enable the execution of a shift-left strategy.

      Deliverables

      • Roles & responsibilities guide
      • Service desk structure

      Everyone in IT contributes to the success of service support

      Regardless of the service desk structure chosen to meet an organization’s service support requirements, IT staff should not doubt the role they play in service support.

      If you try to standardize service desk processes without engaging specialists in other parts of the IT organization, you will fail. Everyone in IT has a role to play in providing service support and meeting service-level agreements.

      Service Support Engagement Plan

      • Identify who is accountable for different service support processes.
      • Outline the different responsibilities of service desk agents at tier 1, tier 2, and tier 3 in meeting service-level agreements for service support.
      • Draft operational-level agreements between specialty groups and the service desk to improve accountability.
      • Configure the service desk tool to ensure ticket visibility and ownership across queues.
      • Engage tier 2 and tier 3 resources in building workflows for incident management, request fulfilment, and writing knowledgebase articles.
      • Emphasize the benefits of cooperation across IT silos:
        • Better customer service and end-user satisfaction.
        • Shorter time to resolve incidents and implement requests.
        • A higher tier 1 resolution rate, more efficient escalations, and fewer interruptions from project work.

      Info-Tech Insight

      Specialists tend to distance themselves from service support as they progress through their career to focus on projects.

      However, their cooperation is critical to the success of the new service desk. Not only do they contribute to the knowledgebase, but they also handle escalations from tiers 1 and 2.

      Clear project complications by leveraging roles and responsibilities

      R

      Responsible: This person is the staff member who completes the work. Assign at least one Responsible for each task, but this could be more than one.

      A

      Accountable: This team member delegates a task and is the last person to review deliverables and/or task. Sometimes Responsible and Accountable can be the same staff. Make sure that you always assign only one Accountable for each task and not more.

      C

      Consulted: People who do not carry out the task but need to be consulted. Typically, these people are subject matter experts or stakeholders.

      I

      Informed: People who receive information about process execution and quality and need to stay informed regarding the task.

      A RACI analysis is helpful with the following:

      • Workload Balancing: Allowing responsibilities to be distributed effectively between functional teams and individuals.
      • Change Management: Ensuring key functions and processes are not overlooked during organizational changes.
      • Onboarding: New employees can identify their own roles and responsibilities.

      A RACI chart outlines which positions are Responsible, Accountable, Consulted, and Informed

      Image shows example of RACI chart

      Create a list of roles and responsibilities in your organization

      1.2.1 Create RACI matrix to define responsibilities

      1. Use the Service Desk Roles and Responsibilities Guidefor a better understanding of the roles and responsibilities of different service desk tiers.
      2. In the RACI chart, replace the top row with specific roles in your organization.
      3. Modify or expand the process tasks, as needed, in the left column.
      4. For each role, identify the responsibility values that the person brings to the service desk. Fill out each column.
      5. Document in the Service Desk SOP. Schedule a time to share the results with organization leads.
      6. Distribute the chart between all teams in your organization.

      Notes:

      • Assign one Accountable for each task.
      • Have at least one Responsible for each task.
      • Avoid generic responsibilities, such as “team meetings.”
      • Keep your RACI definitions in your documents, as they are sometimes tough to remember.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Roles and Responsibilities Guide
      • Flip Chart
      • Whiteboard

      Build a single point of contact for the service desk

      Regardless of the service desk structure chosen to meet your service support requirements, end users should be in no doubt about how to access the service.

      Provide end users with:

      • A single phone number.
      • A single email address.
      • A single web portal for all incidents and requests.

      A single point of contact will ensure:

      • An agent is available to field incidents and requests.
      • Incidents and requests are prioritized according to impact and urgency.
      • Work is tracked to completion.

      This prevents ad hoc ticket channels such as shoulder grabs or direct emails, chats, or calls to a technician from interrupting work.

      A single point of contact does not mean the service desk is only accessible through one intake channel, but rather all tickets are directed to the service desk (i.e. tier 1) to be resolved or redirected appropriately.

      Image depicts 2 boxes. The smaller box labelled users and the larger box labelled Service Desk Tier 1. There are four double-sided arrows. The top is labelled email, the second is walk-in, the third is phone, the fourth is web portal.

      Directors and executives understand the importance of the service desk and believe IT can do better

      A double bar graph is depicted. The blue bars represent Effectiveness and the green bars represent Importance in terms of service desk at different seniority levels, which include frontline, manager, director, and executive.

      Source: Info-Tech, 2019 Responses (N=189 organizations)

      Service Desk Importance Scores

        No Importance: 1.0-6.9
        Limited Importance: 7.0-7.9
        Significant Importance: 8.0-8.9
        Critical Importance: 9.0-10.0

      Service Desk Effectiveness Scores

        Not in Place: N/A
        Not Effective: 0.0-4.9
        Somewhat Ineffective: 5.0-5.9
        Somewhat Effective: 6.0-6.9
        Very Effective: 7.0-10.0

      Info-Tech Research Group’s IT Management and Governance Diagnostic (MGD) program assesses the importance and effectiveness of core IT processes. Since its inception, the MGD has consistently identified the service desk as an area to leverage.

      Business stakeholders consistently rank the service desk as one of the top five most important services that IT provides

      Since 2013, Info-Tech has surveyed over 40,000 business stakeholders as part of our CIO Business Vision program.

      Business stakeholders ranked the following 12 core IT services in terms of importance:

      Learn more about the CIO Business Vision Program.
      *Note: IT Security was added to CIO Business Vision 2.0 in 2019

      Top IT Services for Business Stakeholders

      1. Network Infrastructure
      2. IT Security*
      3. Data Quality
      4. Service Desk
      5. Business Applications
      6. Devices
      7. Client-Facing Technology
      8. Analytical Capability
      9. IT Innovation Leadership
      10. Projects
      11. Work Orders
      12. IT Policies
      13. Requirements Gathering
      Source: Info-Tech Research Group, 2019 (N=224 organizations)

      Having an effective and timely service desk correlates with higher end-user satisfaction with all other IT services

      A double bar graph is depicted. The blue bar represents dissatisfied ender user, and the green bar represents satisfied end user. The bars show the average of dissatisfied and satisfied end users for service desk effectiveness and service desk timeliness.

      On average, organizations that were satisfied with service desk effectiveness rated all other IT processes 46% higher than dissatisfied end users.

      Organizations that were satisfied with service desk timeliness rated all other IT processes 37% higher than dissatisfied end users.
      “Satisfied” organizations had average scores =8.“Dissatisfied" organizations had average scores “Dissatisfied" organizations had average scores =6. Source: Info-Tech Research Group, 2019 (N=18,500+ respondents from 75 organizations)

      Standardize the service desk the Info-Tech way to get measurable results

      More than one hundred organizations engaged with Info-Tech, through advisory calls and workshops, for their service desk projects in 2016. Their goal was either to improve an existing service desk or build one from scratch.

      Organizations that estimate the business impact of each project phase help us shed light on the average measured value of the engagements.

      "The analysts are an amazing resource for this project. Their approach is very methodical, and they have the ability to fill in the big picture with detailed, actionable steps. There is a real opportunity for us to get off the treadmill and make real IT service management improvements"

      - Rod Gula, IT Director

      American Realty Advisors

      Three circles are depicted. The top circle shows the sum of measured value dollar impact which is US$1,659,493.37. The middle circle shows the average measured value dollar impact which is US$19,755.87. The bottom circle shows the average measured value time saved which is 27 days.

      Info-Tech’s approach to service desk standardization focuses on building service management essentials

      This image depicts all of the phases and steps in this blueprint.

      Info-Tech draws on the COBIT framework, which focuses on consistent delivery of IT services across the organization

      This image depicts research that can be used to improve IT processes. Service Desk is circled to demonstrate which research is being used.

      The service desk is the foundation of all other service management processes.

      The image shows how the service desk is a foundation for other service management processes.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Standardize the Service Desk – project overview

      This image shows the project overview of this blueprint.

      Info-Tech delivers: Use our tools and templates to accelerate your project to completion

      Project Summary

      Image of template.

      Service Desk Standard Operating Procedures

      Image of tool.

      Service Desk Maturity Assessment Tool

      Image of tool.

      Service Desk Implementation Roadmap

      Image of tool Incident, knowledge, and request management workflows

      Incident, knowledge, and request management workflows

      The project’s key deliverable is a service desk standard operating procedure

      Benefits of documented SOPs:

      Improved training and knowledge transfer: Routine tasks can be delegated to junior staff (freeing senior staff to work on higher priority tasks).

      IT automation, process optimization, and consistent operations: Defining, documenting, and then optimizing processes enables IT automation to be built on sound processes, so consistent positive results can be achieved.

      Compliance: Compliance audits are more manageable because the documentation is already in place.

      Transparency: Visually documented processes answer the common business question of “why does that take so long?”

      Cost savings: Work solved at first contact or with a minimal number of escalations will result in greater efficiency and more cost-effective support. This will also lead to better customer service.

      Impact of undocumented/undefined SOPs:

      Tasks will be difficult to delegate, key staff become a bottleneck, knowledge transfer is inconsistent, and there is a longer onboarding process for new staff

      IT automation built on poorly defined, unoptimized processes leads to inconsistent results.

      Documenting SOPs to prepare for an audit becomes a major time-intensive project.

      Other areas of the organization may not understand how IT operates, which can lead to confusion and unrealistic expectations.

      Support costs are highest through inefficient processes, and proactive work becomes more difficult to schedule, making the organization vulnerable to costly disruptions.

      Workshop Overview

      Image depicts workshop overview occurring over four days.

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Phase 1

      Lay Service Desk Foundations

      Step 1.1:Assess current state

      Image shows the steps in phase 1. Highlight is on step 1.1

      This step will walk you through the following activities:

      • 1.1.1 Outline service desk challenges
      • 1.1.2 Assess the service desk maturity

      This step involves the following participants:

      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Alignment on the challenges that the service desk faces, an assessment of the current state of service desk processes and technologies, and baseline metrics against which to measure improvements.

      Deliverables

      • Service Desk Maturity Assessment

      Standardizing the service desk benefits the whole business

      The image depicts 3 circles to represent the service desk foundations.

      Embrace standardization

      • Standardization prevents wasted energy on reinventing solutions to recurring issues.
      • Standardized processes are scalable so that process maturity increases with the size of your organization.

      Increase business satisfaction

      • Improve confidence that the service desk can meet service levels.
      • Create a single point of contact for incidents and requests and escalate quickly.
      • Analyze trends to forecast and meet shifting business requirements.

      Reduce recurring issues

      • Create tickets for every task and categorize them accurately.
      • Generate reliable data to support root-cause analysis.

      Increase efficiency and lower operating costs

      • Empower end users and technicians with a targeted knowledgebase (KB).
      • Cross-train to improve service consistency.

      Case Study: The CIO of Westminster College took stock of existing processes before moving to empower the “helpless desk”

      Scott Lowe helped a small staff of eight IT professionals formalize service desk processes and increase the amount of time available for projects.

      When he joined Westminster College as CIO in 2006, the department faced several infrastructure challenges, including:

      • An unreliable network
      • Aging server replacements and no replacement plan
      • IT was the “department of no”
      • A help desk known as the “helpless desk”
      • A lack of wireless connectivity
      • Internet connection speed that was much too slow

      As the CIO investigated how to address the infrastructure challenges, he realized people cared deeply about how IT spent its time.

      The project load of IT staff increased, with new projects coming in every day.

      With a long project list, it became increasingly important to improve the transparency of project request and prioritization.

      Some weeks, staff spent 80% of their time working on projects. Other weeks, support requirements might leave only 10% for project work.

      He addressed the infrastructure challenges in part by analyzing IT’s routine processes.

      Internally, IT had inefficient support processes that reduced the amount of time they could spend on projects.

      They undertook an internal process analysis effort to identify processes that would have a return on investment if they were improved. The goal was to reduce operational support time so that project time could be increased.

      Five years later, they had a better understanding of the organization's operational support time needs and were able to shift workloads to accommodate projects without compromising support.

      Common challenges experienced by service desk teams

      Unresolved issues

      • Tickets are not created for all incidents.
      • Tickets are lost or escalated to the wrong technicians.
      • Poor data impedes root-cause analysis of incidents.

      Lost resources/accountability

      • Lack of cross-training and knowledge sharing.
      • Lack of skills coverage for critical applications and services.
      • Time is wasted troubleshooting recurring issues.
      • Reports unavailable due to lack of data and poor categorization.

      High cost to resolve

      • Tier 2/3 resolve issues that should be resolved at tier 1.
      • Tier 2/3 often interrupt projects to focus on service support.

      Poor planning

      • Lack of data for effective trend analysis leads to poor demand planning.
      • Lack of data leads to lost opportunities for templating and automation.

      Low business satisfaction

      • Users are unable to get assistance with IT services quickly.
      • Users go to their favorite technician instead of using the service desk.

      Outline the organization’s service desk challenges

      1.1.1 Brainstorm service desk challenges

      Estimated Time: 45 minutes

      A. As a group, outline the areas where you think the service desk is experiencing challenges or weaknesses. Use sticky notes or a whiteboard to separate the challenges into People, Process, and Technology so you have a wholistic view of the constraints across the department.

      B. Think about the following:

      • What have you heard from users? (e.g. slow response time)
      • What have you heard from executives? (e.g. poor communication)
      • What should you start doing? (e.g. documenting processes)
      • What should you stop doing? (e.g. work that is not being entered as tickets)

      C. Document challenges in the Service Desk Project Summary.

      Participants:

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      Assess current service desk maturity to establish a baseline and create a plan for service desk improvement

      A current-state assessment will help you build a foundation for process improvements. Current-state assessments follow a basic formula:

      1. Determine the current state of the service desk.
      2. Determine the desired state of the service desk.
      3. Build a practical path from current to desired state.
      Image depicts 2 circles and a box. The circle on the 1. left has assess current state. The circle on the right has 2. assess target state. The box has 3. build a roadmap.

      Ideally, the current-state assessment should align the delivery of IT services with organizational needs. The assessment should achieve the following goals:

      1. Identify service desk pain points.
      2. Map each pain point to business services.
      3. Assign a broad business value to the resolution of each pain point.
      4. Map each pain point to a process.

      Expert Insight

      Image of expert.

      “How do you know if you aren’t mature enough? Nothing – or everything – is recorded and tracked, customer satisfaction is low, frustration is high, and there are multiple requests and incidents that nobody ever bothers to address.”

      Rob England

      IT Consultant & Commentator

      Owner Two Hills

      Also known as The IT Skeptic

      Assess the process maturity of the service desk to determine which project phase and steps will bring the most value

      1.1.2 Measure which activity will have the greatest impact

      The Service Desk Maturity Assessmenttool helps organizations assess their service desk process maturity and focus the project on the activities that matter most.

      The tool will help guide improvement efforts and measure your progress.

      • The second tab of the tool walks through a qualitative assessment of your service desk practices. Questions will prompt you to evaluate how you are executing key activities. Select the answer in the drop-down menus that most closely aligns with your current state.
      • The third tab displays your rate of process completeness and maturity. You will receive a score for each phase, an overall score, and advice based on your performance.
      • Document the results of the efficiency assessment in the Service Desk Project Summary.

      The tool is intended for periodic use. Review your answers each year and devise initiatives to improve the process performance where you need it most.

      Where do I find the data?

      Consult:

      • Service Manager
      • Service Desk Tools
      Image is the service desk tools.

      Step 1.2:Review service support best practices

      Image shows the steps in phase 1. Highlight is on step 1.2.

      This step will walk you through the following activities:

      1. 1.2.1 Identify roles and responsibilities in your organization
      2. 1.2.2 Map out the current and target structure of the service desk

      This step involves the following participants:

      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Identifying who is accountable for different support practices in the service desk will allow workload to be distributed effectively between functional teams and individuals. Closing the gaps in responsibilities will enable the execution of a shift-left strategy.

      Deliverables

      • Roles & responsibilities guide
      • Service desk structure

      Everyone in IT contributes to the success of service support

      Regardless of the service desk structure chosen to meet an organization’s service support requirements, IT staff should not doubt the role they play in service support.

      If you try to standardize service desk processes without engaging specialists in other parts of the IT organization, you will fail. Everyone in IT has a role to play in providing service support and meeting service-level agreements.

      Service Support Engagement Plan

      • Identify who is accountable for different service support processes.
      • Outline the different responsibilities of service desk agents at tier 1, tier 2, and tier 3 in meeting service-level agreements for service support.
      • Draft operational-level agreements between specialty groups and the service desk to improve accountability.
      • Configure the service desk tool to ensure ticket visibility and ownership across queues.
      • Engage tier 2 and tier 3 resources in building workflows for incident management, request fulfilment, and writing knowledgebase articles.
      • Emphasize the benefits of cooperation across IT silos:
        • Better customer service and end-user satisfaction.
        • Shorter time to resolve incidents and implement requests.
        • A higher tier 1 resolution rate, more efficient escalations, and fewer interruptions from project work.

      Info-Tech Insight

      Specialists tend to distance themselves from service support as they progress through their career to focus on projects.

      However, their cooperation is critical to the success of the new service desk. Not only do they contribute to the knowledgebase, but they also handle escalations from tiers 1 and 2.

      Clear project complications by leveraging roles and responsibilities

      R

      Responsible: This person is the staff member who completes the work. Assign at least one Responsible for each task, but this could be more than one.

      A

      Accountable: This team member delegates a task and is the last person to review deliverables and/or task. Sometimes Responsible and Accountable can be the same staff. Make sure that you always assign only one Accountable for each task and not more.

      C

      Consulted: People who do not carry out the task but need to be consulted. Typically, these people are subject matter experts or stakeholders.

      I

      Informed: People who receive information about process execution and quality and need to stay informed regarding the task.

      A RACI analysis is helpful with the following:

      • Workload Balancing: Allowing responsibilities to be distributed effectively between functional teams and individuals.
      • Change Management: Ensuring key functions and processes are not overlooked during organizational changes.
      • Onboarding: New employees can identify their own roles and responsibilities.

      A RACI chart outlines which positions are Responsible, Accountable, Consulted, and Informed

      Image shows example of RACI chart

      Create a list of roles and responsibilities in your organization

      1.2.1 Create RACI matrix to define responsibilities

      1. Use the Service Desk Roles and Responsibilities Guidefor a better understanding of the roles and responsibilities of different service desk tiers.
      2. In the RACI chart, replace the top row with specific roles in your organization.
      3. Modify or expand the process tasks, as needed, in the left column.
      4. For each role, identify the responsibility values that the person brings to the service desk. Fill out each column.
      5. Document in the Service Desk SOP. Schedule a time to share the results with organization leads.
      6. Distribute the chart between all teams in your organization.

      Notes:

      • Assign one Accountable for each task.
      • Have at least one Responsible for each task.
      • Avoid generic responsibilities, such as “team meetings.”
      • Keep your RACI definitions in your documents, as they are sometimes tough to remember.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Roles and Responsibilities Guide
      • Flip Chart
      • Whiteboard

      Build a tiered generalist service desk to optimize costs

      A tiered generalist service desk with a first-tier resolution rate greater than 60% has the best operating cost and customer satisfaction of all competing service desk structural models.

      Image depicts a tiered generalist service desk example. It shows a flow from users to tier 1 and to tiers 2 and 3.

      The success of a tiered generalist model depends on standardized, defined processes

      Image lists the processes and benefits of a successful tiered generalist service desk.

      Define the structure of the service desk

      1.2.2 Map out the current and target structure of the service desk

      Estimated Time: 45 minutes

      Instructions:

      1. Using the model from the previous slides as a guide, discuss how closely it matches the current service desk structure.
      2. Map out a similar diagram of your existing service desk structure, intake channels, and escalation paths.
      3. Review the structure and discuss any changes that could be made to improve efficiency. Revise as needed.
      4. Document the outcome in the Service Desk Project Summary.

      Image depicts a tiered generalist service desk example. It shows a flow from users to tier 1 and to tiers 2 and 3.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      Use a shift-left strategy to lower service support costs, reduce time to resolve, and improve end-user satisfaction

      Shift-left strategy:

      • Shift service support tasks from specialists to generalists.
      • Implement self-service.
      • Automate incident resolution.
      Image shows the incident and service request resolution in a graph. It includes metrics of cost per ticket, average time to resolve, and end-user satisfaction.

      Work through the implications of adopting a shift-left strategy

      Overview:

      Identify process gaps that you need to fill to support the shift-left strategy and discuss how you could adopt or improve the shift-left strategy, using the discussion questions below as a guide.

      Which process gaps do you need to fill to identify ticket trends?

      • What are your most common incidents and service requests?
      • Which tickets could be resolved at tier 1?
      • Which tickets could be resolved as self-service tickets?
      • Which tickets could be automated?

      Which processes do you most need to improve to support a shift-left strategy?

      • Which incident and request processes are well documented?
      • Do you have recurring tickets that could be automated?
      • What is the state of your knowledgebase maintenance process?
      • Which articles do you most need to support tier 1 resolution?
      • What is the state of your web portal? How could it be improved to support self-service?

      Document in the Project Summary

      Step 1.3: Identify service desk metrics and reports

      Image shows the steps in phase 1. Highlight is on step 1.3.

      This step will walk you through the following activities:

      • 1.3 Create a list of required reports to identify relevant metrics

      This step involves the following participants:

      • Project Sponsor
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Managers and analysts will have service desk metrics and reports that help set expectations and communicate service desk performance.

      Deliverables

      • A list of service desk performance metrics and reports

      Engage business unit leaders with data to appreciate needs

      Service desk reports are an opportunity to communicate the story of IT and collect stakeholder feedback. Interview business unit leaders and look for opportunities to improve IT services.

      Start with the following questions:

      • What are you hearing from your team about working with IT?
      • What are the issues that are contributing to productivity losses?
      • What are the workarounds your team does because something isn’t working?
      • Are you able to access the information you need?

      Work with business unit leaders to develop an action plan.

      Remember to communicate what you do to address stakeholder grievances.

      The service recovery paradox is a situation in which end users think more highly of IT after the organization has corrected a problem with their service compared to how they would regard the company if the service had not been faulty in the first place.

      The point is that addressing issues (and being seen to address issues) will significantly improve end-user satisfaction. Communicate that you’re listening and acting, and you should see satisfaction improve.

      Info-Tech Insight

      Presentation is everything:

      If you are presenting outside of IT, or using operational metrics to create strategic information, be prepared to:

      • Discuss trends.
      • Identify organizational and departmental impacts.
      • Assess IT costs and productivity.

      For example, “Number of incidents with ERP system has decreased by 5% after our last patch release. We are working on the next set of changes and expect the issues to continue to decrease.”

      Engage technicians to ensure they input quality data in the service desk tool

      You need better data to address problems. Communicate to the technical team what you need from them and how their efforts contribute to the usefulness of reports.

      Tickets MUST:

      • Be created for all incidents and service requests.
      • Be categorized correctly, and categories updated when the ticket is resolved.
      • Be closed after the incidents and service requests are resolved or implemented.

      Emphasize that reports are analyzed regularly and used to manage costs, improve services, and request more resources.

      Info-Tech Insight

      Service Desk Manager: Technical staff can help themselves analyze the backlog and improve service metrics if they’re looking at the right information. Ensure their service desk dashboards are helping them identify high-priority and quick-win tickets and anticipate potential SLA breaches.

      Produce service desk reports targeted to improve IT services

      Use metrics and reports to tell the story of IT.

      Metrics should be tied to business requirements and show how well IT is meeting those requirements and where obstacles exist.

      Tailor metrics and reports to specific stakeholders.

      Technicians require mostly real-time information in the form of a dashboard, providing visibility into a prioritized list of tickets for which they are responsible.

      Supervisors need tactical information to manage the team and set client expectations as well as track and meet strategic goals.

      Managers and executives need summary information that supports strategic goals. Start by looking at executive goals for the support team and then working through some of the more tactical data that will help support those goals.

      One metric doesn’t give you the whole picture

      • Don’t put too much emphasis on a single metric. At best, it will give you a distorted picture of your service desk performance. At worst, it will distort the behavior of your agents as they may adopt poor practices to meet the metric.
      • The solution is to use tension metrics: metrics that work together to give you a better sense of the state of operations.
      • Tension metrics ensure a balanced focus toward shared goals.

      Example:

      First-call resolution (FCR), end-user satisfaction, and number of tickets reopened all work together to give you a complete picture. As FCR goes up, so should end-user satisfaction, as number of tickets re-opened stays steady or declines. If the three metrics are heading in different directions, then you know you have a problem.

      Rely on internal metrics to measure and improve performance

      External metrics provide useful context, but they represent broad generalizations across different industries and organizations of different sizes. Internal metrics measured annually are more reliable.

      Internal metrics provide you with information about your actual performance. With the right continual improvement process, you can improve those metrics year over year, which is a better measure of the performance of your service desk.

      Whether a given metric is the right one for your service desk will depend on several different factors, not the least of which include:

      • The maturity of your service desk processes.
      • Your ticket volume.
      • The complexity of your tickets.
      • The degree to which your end users are comfortable with self-service.

      Info-Tech Insight

      Take external metrics with a grain of salt. Most benchmarks represent what service desks do across different industries, not what they should do. There also might be significant differences between different industries in terms of the kinds of tickets they deal with, differences which the overall average obscures.

      Use key service desk metrics to build a business case for service support improvements

      The right metrics can tell the business how hard IT works and how many resources it needs to perform:

      1. End-User Satisfactions:
        • The most important metric for measuring the perceived value of the service desk. Determine this based on a robust annual satisfaction survey of end users and transactional satisfaction surveys sent with a percentage of tickets.
      2. Ticket Volume and Cost per Ticket:
        • A key indicator of service desk efficiency, computed as the monthly operating expense divided by the average ticket volume per month.
      3. First-Contact Resolution Rate:
        • The biggest driver of end-user satisfaction. Depending on the kind of tickets you deal with, you can measure first-contact, first-tier, or first-day resolution.
      4. Average Time to Resolve (Incident) or Fulfill (Service Requests):
        • An assessment of the service desk's ability to resolve tickets effectively, measuring the time elapsed between the moment the ticket status is set to “open” and the moment it is set to “resolved.”

      Info-Tech Insight

      Metrics should be tied to business requirements. They tell the story of how well IT is meeting those requirements and help identify when obstacles get in the way. The latter can be done by pointing to discrepancies between the internal metrics you expected to reach but didn’t and external metrics you trust.

      Use service desk metrics to track progress toward strategic, operational, and tactical goals

      Image depicts a chart to show the various metrics in terms of strategic goals, tactical goals, and operational goals.

      Cost per ticket and customer satisfaction are the foundation metrics of service support

      Ultimately, everything boils down to cost containment (measured by cost per ticket) and quality of service (measured by customer satisfaction).

      Cost per ticket is a measure of the efficiency of service support:

      • A higher than average cost per ticket is not necessarily a bad thing, particularly if accompanied by higher-than-average quality levels.
      • Conversely, a low cost per ticket is not necessarily good, particularly if the low cost is achieved by sacrificing quality of service.

      Cost per ticket is the total monthly operating expense of the service desk divided by the monthly ticket volume. Operating expense includes the following components:

      • Salaries and benefits for desktop support technicians
      • Salaries and benefits for indirect personnel (team leads, supervisors, workforce schedulers, dispatchers, QA/QC personnel, trainers, and managers)
      • Technology expense (e.g. computers, software licensing fees)
      • Telecommunications expenses
      • Facilities expenses (e.g. office space, utilities, insurance)
      • Travel, training, and office supplies
      Image displays a pie chart that shows the various service desk costs.

      Create a list of required reports to identify metrics to track

      1.3.1 Start by identifying the reports you need, then identify the metrics that produce them

      1. Answer the following questions to determine the data your reports require:
        • What strategic initiatives do you need to track?
          • Example: reducing mean time to resolve, meeting SLAs
        • What operational areas need attention?
          • Example: recurring issues that need a permanent resolution
        • What kind of issues do you want to solve?
          • Example: automate tasks such as password reset or software distribution
        • What decisions or processes are held up due to lack of information?
          • Example: need to build a business case to justify infrastructure upgrades
        • How can the data be used to improve services to the business?
          • Example: recurring issues by department
      2. Document report and metrics requirements in Service Desk SOP.
      3. Provide the list to your tool administrator to create reports with auto-distribution.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Step 1.4: Review ticket handling procedures

      Image shows the steps in phase 1. Highlight is on step 1.4.

      This step will walk you through the following activities:

      • 1.4.1 Review ticket handling practices
      • 1.4.2 Identify opportunities to automate ticket creation and reduce recurring tickets

      This step involves the following participants:

      • Project Sponsor
      • IT Managers and Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Managers and analysts will have best practices for ticket handling and troubleshooting to support ITSM data quality and improve first-tier resolution.

      DELIVERABLES

      • List of ticket templates and recurring tickets
      • Ticket and Call QA Template and ticket handling best practices

      Start by reviewing the incident intake process to find opportunities for improvement

      If end users are avoiding your service desk, you may have an intake problem. Create alternative ways for users to seek help to manage the volume; keep in mind not every request is an emergency.

      Image shows the various intake channels and the recommendation.

      Identify opportunities for improvement in your ticket channels

      The two most efficient intake channels should be encouraged for the majority of tickets.

      • Build a self-service portal.
        • Do users know where to find the portal?
        • How many tickets are created through the portal?
        • Is the interface easy to use?
      • Deal efficiently with email.
        • How quickly are messages picked up?
        • Are they manually transferred to a ticket or does the service desk tool automatically create a ticket?

      The two most traditional and fastest methods to get help must deal with emergencies and escalation effectively.

      • Phone should be the fastest way to get help for emergencies.
        • Are enough agents answering calls?
        • Are voicemails picked up on time?
        • Are the automated call routing prompts clear and concise?
      • Are walk-ins permitted and formalized?
        • Do you always have someone at the desk?
        • Is your equipment secure?
        • Are walk-ins common because no one picks up the phone or is the traffic as you’d expect?

      Ensure technicians create tickets for all incidents and requests

      Why Collect Ticket Data?

      If many tickets are missing, help service support staff understand the need to collect the data. Reports will be inaccurate and meaningless if quality data isn’t entered into the ticketing system.

      Image shows example of ticket data

      Set ticket handling expectations to drive a consistent process

      Set expectations:

      • Create and update tickets, but not at the expense of good customer service. Agents can start the ticket but shouldn’t spend five minutes creating the ticket when they should be troubleshooting the problem.
      • Update the ticket when the issue is resolved or needs to be escalated. If agents are escalating, they should make sure all relevant information is passed along to the next technician.
      • Update user of ETA if issue cannot be resolved quickly.
      • Ticket templates for common incidents can lead to fast creation, data input, and categorizations. Templates can reduce the time it takes to create tickets from two minutes to 30 seconds.
      • Update categories to reflect the actual issue and resolution.
      • Reference or link to the knowledgebase article as the documented steps taken to resolve the incident.
      • Validate incident is resolved with client; automate this process with ticket closure after a certain time.
      • Close or resolve the ticket on time.

      Use the Ticket and Call Quality Assessment Tool to improve the quality of service desk data

      Build a process to check-in on ticket and call quality monthly

      Better data leads to better decisions. Use the Ticket and Call Quality Assessment Toolto check-in on the ticket and call quality monthly for each technician and improve service desk data quality.

      1. Fill tab 1 with technician’s name.
      2. Use either tab 2 (auto-scoring) or tab 3 (manual scoring) to score the agent. The assessment includes ticket evaluation, call evaluation, and overall metric.
      3. Record the results of each review in the score summary of tab 1.
      Image shows tool.

      Use ticket templates to make ticket creation, updating, and resolution more efficient

      A screenshot of the Ticket and Call Quality Assessment Tool

      Implement measures to improve ticket handling and identify ticket template candidates

      1.4.1 Identify opportunities to automate ticket creation

      1. Poll the team and discuss.
        • How many members of the team are not creating tickets? Why?
        • How can we address those barriers?
        • What are the expectations of management?
      2. Brainstorm five to ten good candidates for ticket templates.
        • What data can auto-fill?
        • What will help process the ticket faster?
        • What automations can we build to ensure a fast, consistent service?
        • Note:
          • Ticket template name
          • Information that will auto-fill from AD and other applications
          • Categories and resolution codes
          • Automated routing and email responses
      3. Document ticket template candidates in the Service Desk Roadmap to capture the actions.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You'll Needs

      • Flip Chart
      • Whiteboard

      Phase 2

      Design Incident Management Processes

      Step 2.1: Build incident management workflows

      Image shows the steps in phase 2. Highlight is on step 2.1.

      This step will walk you through the following activities:

      • 2.1.1 Review incident management challenges
      • 2.1.2 Define the incident management workflow
      • 2.1.3 Define the critical incident management workflow
      • 2.1.4 Design critical incident communication plan

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Workflows for incident management and critical incident management will improve the consistency and quality of service delivery and prepare the service desk to negotiate reliable service levels with the organization.

      DELIVERABLES

      • Incident management workflows
      • Critical incident management workflows
      • Critical incident communication plan

      Communicate the great incident resolution work that you do to improve end-user satisfaction

      End users think more highly of IT after the organization has corrected a problem with their service than they would have had the service not been faulty in the first place.

      Image displays a graph to show the service recovery paradox

      Info-Tech Insight

      Use the service recovery paradox to your advantage. Address service desk challenges explicitly, develop incident management processes that get services back online quickly, and communicate the changes.

      If you show that the service desk recovered well from the challenges end users raised, you will get greater loyalty from them.

      Assign incident roles and responsibilities to promote accountability

      The role of an incident coordinator or manager can be assigned to anyone inside the service desk that has a strong knowledge of incident resolution, attention to detail, and knows how to herd cats.

      In organizations with high ticket volumes, a separate role may be necessary.

      Everyone must recognize that incident management is a cross-IT organization process and it does not have to be a unique service desk process.

      An incident coordinator is responsible for:

      • Improving incident management processes.
      • Tracking metrics and producing reports.
      • Developing and maintaining the incident management system.
      • Developing and maintaining critical incident processes.
      • Ensuring the service support team follows the incident management process.
      • Gathering post-mortem information from the various technical resources on root cause for critical or severity 1 incidents.

      The Director of IT Services invested in incident management to improve responsiveness and set end-user expectations

      Practitioner Insight

      Ben Rodrigues developed a progressive plan to create a responsive, service-oriented culture for the service support organization.

      "When I joined the organization, there wasn’t a service desk. People just phoned, emailed, maybe left [sticky] notes for who they thought in IT would resolve it. There wasn’t a lot of investment in developing clear processes. It was ‘Let’s call somebody in IT.’

      I set up the service desk to clarify what we would do for end users and to establish some SLAs.

      I didn’t commit to service levels right away. I needed to see how many resources and what skill sets I would need. I started by drafting some SLA targets and plugging them into our tracking application. I then monitored how we did on certain things and established if we needed other skill sets. Then I communicated those SOPs to the business, so that ‘if you have an issue, this is where you go, and this is how you do it,’ and then shared those KPIs with them.

      I had monthly meetings with different function heads to say, ‘this is what I see your guys calling me about,’ and we worked on something together to make some of the pain disappear."

      -Ben Rodrigues

      Director, IT Services

      Gamma Dynacare

      Sketch out incident management challenges to focus improvements

      Common Incident Management Challenges

      End Users

      • No faith in the service desk beyond speaking with their favorite technician.
      • No expectations for response or resolution time.
      • Non-IT staff are disrupted as people ask their colleagues for IT advice.

      Technicians

      • No one manages and escalates incidents.
      • Incidents are unnecessarily urgent and more likely to have a greater impact.
      • Agents are flooded with requests to do routine tasks during desk visits.
      • Specialist support staff are subject to constant interruptions.
      • Tickets are lost, incomplete, or escalated incorrectly.
      • Incidents are resolved from scratch rather than referring to existing solutions.

      Managers

      • Tickets are incomplete or lack historical information to address complaints.
      • Tickets in system don’t match the perceived workload.
      • Unable to gather data for budgeting or business analysis.

      Info-Tech Insight

      Consistent incident management processes will improve end-user satisfaction with all other IT services.

      However, be prepared to overcome these common obstacles as you put the process in place, including:

      • Absence of management or staff commitment.
      • Lack of clarity on organizational needs.
      • Outdated work practices.
      • Poorly defined service desk goals and responsibilities.
      • Lack of a reliable knowledgebase.
      • Inadequate training.
      • Resistance to change.

      Prepare to implement or improve incident management

      2.1.1 Review incident management challenges and metrics

      1. Review your incident management challenges and the benefits of addressing them.
      2. Review the level of service you are providing with the current resources. Define clear goals and deliverables for the improvement initiative.
      3. Decide how the incident management process will interface with the service desk. Who will take on the responsibility for resolving incidents? Specifically, who will:
        • Log incidents.
        • Perform initial incident troubleshooting.
        • Own and monitor tickets.
        • Communicate with end users.
        • Update records with the resolution.
        • Close incidents.
        • Implement next steps (e.g. initiate problem management).
      4. Document recommendations and the incident management process requirements in the Service Desk SOP.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Distinguish between different kinds of tickets for better SLAs

      Different ticket types are associated with radically different prioritization, routing, and service levels. For instance, most incidents are resolved within a business day, but requests take longer to implement.

      If you fail to distinguish between ticket types, your metrics will obscure service desk performance.

      Common Service Desk Tickets

      • Incidents
        • An unanticipated interruption of a service.
          • The goal of incident management is to restore the service as soon as possible, even if the resolution involves a workaround.
      • Problems
        • The root cause of several incidents.
          • The goal of problem management is to detect the root cause and provide long-term resolution and prevention.
      • Requests
        • A generic description for small changes or service access
          • Requests are small, frequent, and low risk. They are best handled by a process distinct from incident, change, and project management.
      • Changes
        • Modification or removal of anything that could influence IT services.
          • The scope includes significant changes to architectures, processes, tools, metrics, and documentation.

      Info-Tech Insight

      Organizations sometimes mistakenly classify small projects as service requests, which can compromise your data, resulting in a negative impact to the perceived value of the service desk.

      Separate incidents and service requests for increased customer service and better-defined SLAs

      Defining the differences between service requests and incidents is not just for reporting purposes. It also has a major impact on how service is delivered.

      Incidents are unexpected disruptions to normal business processes and require attempts to restore services as soon as possible (e.g. the printer is not working).

      Service requests are tasks that don’t involve something that is broken or has an immediate impact on services. They do not require immediate resolution and can typically be scheduled (e.g. new software).

      Image shows a chart on incidents and service requests.

      Focus on the big picture first to capture and streamline how your organization resolves incidents

      Image displays a flow chart to show how to organize resolving incidents.

      Document your incident management workflow to identify opportunities for improvement

      Image shows a flow cart on how to organize incident management.

      Workflow should include:

      • Ticket creation and closure
      • Triage
      • Troubleshooting
      • Escalations
      • Communications
      • Change management
      • Documentation
      • Vendor escalations

      Notes:

      • Notification and alerts should be used to set or reset expectations on delivery or resolution
      • Identify all the steps where a customer is informed and ensure we are not over or under communicating

      Collaborate to define each step of the incident management workflow

      2.1.2 Define the incident management workflow

      Estimated Time: 60 minutes

      Option 1: Whiteboard

      1. Discuss the workflow and draw it on the whiteboard.
      2. Assess whether you are using the best workflow. Modify it if necessary.
      3. Engage the team in refining the process workflow.
      4. Transfer data to Visio and add to the SOP.

      Option 2: Tabletop Exercise

      1. Distribute index cards to each member of the team.
      2. Have each person write a single task they perform on the index card. Be granular. Include the title or the name of the person responsible.
      3. Mark cards that are decision points. Use a card of a different color or use a marker to make a colored dot.
      4. Arrange the index cards in order, removing duplicates.
      5. Assess whether you are using the best workflow. Engage the team to refine it if necessary.
      6. Transfer data to Visio and add to the Service Desk SOP.

      Participants

      • Service Manager
      • Service Desk Support
      • Applications or Infrastructure Support

      What You’ll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens
      • Service Desk SOP
      • Project Summary

      Formalize the process for critical incident management to reduce organizational impact

      Discuss these elements to see how the organization will handle them.

      • Communication plan:
        • Who communicates with end users?
        • Who communicates with the executive team?
      • It’s important to separate the role of the technician trying to solve a problem with the need to communicate progress.
      • Change management:
      • Define a separate process for regular and emergency change management to ensure changes are timely and appropriate.
      • Business continuity plan:
      • Identify criteria to decide when a business continuity plan (BCP) must be implemented during a critical incident to minimize the business impact of the incident.
      • Post-mortems:
      • Formalize the process of discussing and documenting lessons learned, understanding outstanding issues, and addressing the root cause of incidents.
      • Source of incident notification:
      • Does the process change if users notify the service desk of an issue or if the systems management tools alert technicians?

      Critical incidents are high-impact, high-urgency events that put the effectiveness and timeliness of the service desk center stage.

      Build a workflow that focuses on quickly bringing together the right people to resolve the incident and reduces the chances of recurrence.

      Document your critical incident management workflow to identify opportunities for improvement

      Image shows a flow cart on how to organize critical incident management.

      Workflow should include:

      • Ticket creation and closure
      • Triage
      • Troubleshooting
      • Escalations
      • Communications plan
      • Change management
      • Disaster recovery or business continuity plan
      • Documentation
      • Vendor escalations
      • Post-mortem

      Collaborate to define each step of the critical incident management workflow

      2.1.3 Define the critical incident management workflow

      Estimated Time: 60 minutes

      Option 1: Whiteboard

      1. Discuss the workflow and draw it on the whiteboard.
      2. Assess whether you are using the best workflow. Modify it if necessary.
      3. Engage the team in refining the process workflow.
      4. Transfer data to Visio and add to the SOP.

      Option 2: Tabletop Exercise

      1. Distribute index cards to each member of the team.
      2. Have each person write a single task they perform on the index card. Be granular. Include the title or the name of the person responsible.
      3. Mark cards that are decision points. Use a card of a different color or use a marker to make a colored dot.
      4. Arrange the index cards in order, removing duplicates.
      5. Assess whether you are using the best workflow. Engage the team to refine it if necessary.
      6. Transfer data to Visio and add to the Service Desk SOP.

      Participants

      • Service Manager
      • Service Desk Support
      • Applications or Infrastructure Support

      What You’ll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens
      • Service Desk SOP

      Establish a critical incident management communication plan

      When it comes to communicating during major incidents, it’s important to get the information just right. Users don’t want too little, they don’t want too much, they just want what’s relevant to them, and they want that information at the right time.

      As an IT professional, you may not have a background in communications, but it becomes an important part of your job. Broad guidelines for good communication during a critical incident are:

      1. Communicate as broadly as the impact of your incident requires.
      2. Communicate as much detail as a specific audience requires, but no more than necessary.
      3. Communicate as far ahead of impact as possible.

      Why does communication matter?

      Sending the wrong message, at the wrong time, to the wrong stakeholders, can result in:

      • Drop in customer satisfaction.
      • Wasted time and resources from multiple customers contacting you with the same issue.
      • Dissatisfied executives kept in the dark.
      • Increased resolution time if the relevant providers and IT staff are not informed soon enough to help.

      Info-Tech Insight

      End users understand that sometimes things break. What’s important to them is that (1) you don’t repeatedly have the same problem, (2) you keep them informed, and (3) you give them enough notice when their systems will be impacted and when service will be returned.

      Automate communication to save time and deliver consistent messaging to the right stakeholders

      In the middle of resolving a critical incident, the last thing you have time for is worrying about crafting a good message. Create a series of templates to save time by providing automated, tailored messages for each stage of the process that can be quickly altered and sent out to the right stakeholders.

      Once templates are in place, when the incident occurs, it’s simply a matter of:

      1. Choosing the relevant template.
      2. Updating recipients and messaging if necessary.
      3. Adding specific, relevant data and fields.
      4. Sending the message.

      When to communicate?

      Tell users the information they need to know when they need to know it. If a user is directly impacted, tell them that. If the incident does not directly affect the user, the communication may lead to decreased customer satisfaction or failure to pay attention to future relevant messaging.

      What to say?

      • Keep messaging short and to the point.
      • Only say what you know for sure.
      • Provide only the details the audience needs to know to take any necessary action or steps on their side and no more. There’s no need to provide details on the reason for the failure before it’s resolved, though this can be done after resolution and restoration of service.

      You’ll need distinct messages for distinct audiences. For example:

      • To incident resolvers: “Servers X through Y in ABC Location are failing intermittently. Please test the servers and all the connections to determine the exact cause so we can take corrective action ASAP.”
      • To the IT department head: “Servers X through Y in ABC Location are failing intermittently. We are beginning tests. We will let you know when we have determined the exact cause and can give you an estimated completion time.”
      • To executives: “We’re having an issue with some servers at ABC Location. We are testing to determine the cause and will let you know the estimated completion time as soon as possible.”
      • To end users: “We are experience some service issues. We are working on a resolution diligently and will restore service as soon as possible.”

      Map out who will need to be contacted in the event of a critical incident

      2.1.4 Design the critical incident communication plan

      • Identify critical incidents that require communication.
      • Identify stakeholders who will need to be informed about each incident.
      • For each audience, determine:
        1. Frequency of communication
        2. Content of communication
      Use the sample template to the right as an example.

      Some questions to assist you:

      • Whose work will be interrupted, either by their services going down or by their workers having to drop everything to solve the incident?
      • What would happen if we didn’t notify this person?
      • What level of detail do they need?
      • How often would they want to be updated?
      Document outcomes in the Service Desk SOP. Image shows template of unplanned service outage.

      Measure and improve customer satisfaction with the use of relationship and transactional surveys

      Customer experience programs with a combination of relationship and transactional surveys tend to be more effective. Merging the two will give a wholistic picture of the customer experience.

      Relationship Surveys

      Relationship surveys focus on obtaining feedback on the overall customer experience.

      • Inform how well you are doing or where you need improvement in the broad services provided.
      • Provide a high-level perspective on the relationship between the business and IT.
      • Help with strategic improvement decisions.
      • Should be sent over a duration of time and to the entire customer base after they’ve had time to experience all the services provided by the service desk. This can be done as frequently as per quarter or on a yearly basis.
      • E.g. An annual satisfaction survey such as Info-Tech’s End User Satisfaction Diagnostic.

      Transactional Surveys

      Transactional surveys are tied to a specific interaction or transaction your end users have with a specific product or service.

      • Help with tactical improvement decisions.
      • Questions should point to a specific interaction.
      • Usually only a few questions that are quick and easy to complete following the transaction.
      • Since transactional surveys allow you to improve individual relationships, they should be sent shortly after the interaction with the service desk has occurred.
      • E.g. How satisfied are you with the way your ticket was resolved?

      Add transactional end-user surveys at ticket close to escalate unsatisfactory results

      A simple quantitative survey at the closing of a ticket can inform the service desk manager of any issues that were not resolved to the end user’s satisfaction. Take advantage of workflows to escalate poor results immediately for quick follow-up.

      Image shows example of survey question with rating.

      If a more complex survey is required, you may wish to include some of these questions:

      Please rate your overall satisfaction with the way your issue was handled (1=unsatisfactory, 5=fantastic)

      • The professionalism of the analyst.
      • The technical skills or knowledge of the analyst.
      • The timeliness of the service provided.
      • The overall service experience.

      Add an open-ended, qualitative question to put the number in context, and solicit critical feedback:

      What could the service desk have done to improve your experience?

      Define a process to respond to both negative and positive feedback

      Successful customer satisfaction programs respond effectively to both positive and negative outcomes. Late or lack of responses to negative comments may increase customer frustration, while not responding at all to the positive comments may give the perception of indifference. If customers are taking the time to fill out the survey, good or bad, they should be followed up with

      Take these steps to handle survey feedback:

      1. Assign resources to receive, read, and track responses. The entire team doesn’t need to receive every response, while a single resource may not have capacity to respond in a timely manner. Decide what makes the most sense in your environment.
      2. Respond to negative feedback: It may not be possible to respond to every customer that fills out a survey. Set guidelines for responding to negative surveys with no details on the issue; don’t spend time guessing why they were upset, simply ask the user why they were unsatisfied. The critical piece of taking advantage of the service recovery paradox is in the follow-up to the customer.
      3. Investigate and improve: Make sure you investigate the issue to ensure that it is a justified complaint or whether the issue is a symptom of another issue’s root cause. Identify remediation steps to ensure the issue does not repeat itself, and then communicate to the customer the action you have taken to improve.
      4. Act on positive feedback as well: If it’s easy for customers to provide feedback, then make room in your process for handling the positive results. Appreciate the time and effort your customers take to give kudos and use it as a tool to build a long-term relationship with that user. Saying thank you goes a long way and when customers know their time matters, they will be encouraged to fill out those surveys. This is also a good way to show what a great job the service desk team did with the interaction.

      Analyze survey feedback month over month to complement and justify metric results already in place

      When you combine the tracking and analysis of relationship and transactional survey data you will be able to dive into specific issues, identify trends and patterns, assess impact to users, and build a plan to make improvements.

      Once the survey data is centralized, categorized, and available you can start to focus on metrics. At a minimum, for transactional surveys, consider tracking:

      • Breakdown of satisfaction scores with trends over time
      • Unsatisfactory surveys that are related to incidents and service requests
      • Total surveys that have been actioned vs pending

      For relationship surveys, consider tracking:

      • Satisfaction scores by department and seniority level
      • Satisfaction with IT services, applications, and communication
      • Satisfaction with IT’s business enablement

      Scores of overall satisfaction with IT

      Image Source: Info-Tech End User Satisfaction Report

      Prioritize company-wide improvement initiatives by those that have the biggest impact to the entire customer base first and then communicate the plan to the organization using a variety of communication channels that will draw your customers in, e.g. dashboards, newsletters, email alerts.

      Info-Tech Insight

      Consider automating or using your ITSM notification system as a direct communication method to inform the service desk manager of negative survey results.

      Step 2.2: Design ticket categorization

      Image shows the steps in phase 2. Highlight is on step 2.2

      This step will walk you through the following activities:

      • 2.2.1 Assess ticket categorization
      • 2.2.2 Enhance ticket categories with resolution and status codes

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The reviewed ticket categorization scheme will be easier to use and deploy more consistently, which will improve the categorization of data and the reliability of reports.

      DELIVERABLES

      • Optimized ticket categorization

      Design a ticket classification scheme to produce useful reports

      Reliable reports depend on an effective categorization scheme.

      Too many options cause confusion; too few options provide little value. As you build the classification scheme over the next few slides, let call routing and reporting requirements be your guide.

      Effective classification schemes are concise, easy to use correctly, and easy to maintain.

      Image shows example of a ticket classification scheme.

      Keep these guidelines in mind:

      • A good categorization scheme is exhaustive and mutually exclusive: there’s a place for every ticket and every ticket fits in only one place.
      • As you build your classification scheme, ensure the categories describe the actual asset or service involved based on final resolution, not how it was reported initially.
      • Pre-populate ticket templates with relevant categories to dramatically improve reporting and routing accuracy.
      • Use a tiered system to make the categories easier to navigate. Three tiers with 6-8 categories per tier provides up to 512 sub-categories, which should be enough for the most ambitious team.
      • Track only what you will use for reporting purposes. If you don’t need a report on individual kinds of laptops, don’t create a category beyond “laptops.”
      • Avoid “miscellaneous” categories. A large portion of your tickets will eventually end up there.

      Info-Tech Insight

      Don’t do it alone! Collaborate with managers in the specialized IT groups responsible for root-cause analysis to develop a categorization scheme that makes sense for them.

      The first approach to categorization breaks down the IT portfolio into asset types

      WHY SHOULD I START WITH ASSETS?

      Start with asset types if asset management and configuration management processes figure prominently in your practice or on your service management implementation roadmap.

      Image displays example of asset types and how to categorize them.

      Building the Categories

      Ask these questions:

      • Type: What kind of asset am I working on?
      • Category: What general asset group am I working on?
      • Subcategory: What particular asset am I working on?

      Need to make quick progress? Use Info-Tech Research Group’s Service Desk Ticket Categorization Schemes template.

      Info-Tech Insight

      Think about how you will use the data to determine which components need to be included in reports. If components won’t be used for reporting, routing, or warranty, reporting down to the component level adds little value.

      The second approach to categorization breaks down the IT portfolio into types of services

      WHY SHOULD I START WITH SERVICES?

      Start with asset services if service management generally figures prominently in your practice, especially service catalog management.

      Image displays example of service types and how to categorize them.

      Building the Categories

      Ask these questions:

      • Type: What kind of service am I working on?
      • Category: What general service group am I working on?
      • Subcategory: What particular service am I working on?

      Need to make quick progress? Use Info-Tech Research Group’s Service Desk Ticket Categorization Schemes template.

      Info-Tech Insight

      Remember, ticket categories are not your only source of reports. Enhance the classification scheme with resolution and status codes for more granular reporting.

      Improve the categorization scheme to enhance routing and reporting

      2.2.1 Assess whether the service desk can improve its ticket categorization

      1. As a group, review existing categories, looking for duplicates and designations that won’t affect ticket routing. Reconcile duplicates and remove non-essential categories.
      2. As a group, re-do the categories, ensuring that the new categorization scheme will meet the reporting requirements outlined earlier.
        • Are categories exhaustive and mutually exclusive?
        • Is the tier simple and easy to use (i.e. 3 tiers x 8 categories)?
      3. Test against recent tickets to ensure you have the right categories.
      4. Record the ticket categorization scheme in the Service Desk Ticket Categorization Schemes template.

      A screenshot of the Service Desk Ticket Categorization Schemes template.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Flip Chart
      • Whiteboard
      • Service Desk Ticket Categorization Scheme

      Enhance the classification scheme with resolution and status codes for more granular reporting

      Resolution codes differ from detailed resolution notes.

      • A resolution code is a field within the ticketing system that should be updated at ticket close to categorize the primary way the ticket was resolved.
      • This is important for reporting purposes as it adds another level to the categorization scheme and can help you identify knowledgebase article candidates, training needs, or problems.

      Ticket statuses are a helpful field for both IT and end users to identify the current status of the ticket and to initiate workflows.

      • The most common statuses are open, pending/in progress, resolved, and closed (note the difference between resolved and closed).
      • Waiting on user or waiting on vendor are also helpful statuses to stop the clock when awaiting further information or input.

      Common Examples:

      Resolution Codes

      • How to/training
      • Configuration change
      • Upgrade
      • Installation
      • Data import/export/change
      • Information/research
      • Reboot

      Status Fields

      • Declined
      • Open
      • Closed
      • Waiting on user
      • Waiting on vendor
      • Reopened by user

      Identify and document resolution and status codes

      2.2.2 Enhance ticket categories with resolution codes

      Discuss:

      • How can we use resolution information to enhance reporting?
      • Are current status fields telling the right story?
      • Are there other requirements like project linking?

      Draft:

      1. Write out proposed resolution codes and status fields and critically assess their value.
      2. Resolutions can be further broken down by incident and service request if desired.
      3. Test resolution codes against a few recent tickets.
      4. Record the ticket categorization scheme in the Service Desk SOP.

      Participants

      • CIO
      • Service Desk Manager
      • Service Desk Technician(s)

      What You’ll Need

      • Whiteboard or Flip Chart
      • Markers

      Step 2.3: Design incident escalation and prioritization

      Image shows the steps in phase 2. Highlight is on step 2.3.

      This step will walk you through the following activities:

      • 2.3.1 Build a small number of rules to facilitate prioritization
      • 2.3.2 Define escalation rules
      • 2.3.3 Define automated escalations
      • 2.3.4 Provide guidance to each tier around escalation steps and times

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The reviewed ticket escalation and prioritization will streamline queue management, improve the quality of escalations, and ensure agents work on the right tickets at the right time.

      DELIVERABLES

      • Optimized ticket prioritization scheme
      • Guidelines for ticket escalations
      • List of automatic escalations

      Build a ticket prioritization matrix to make escalation assessment less subjective

      Most IT leaders agree that prioritization is one of the most difficult aspects of IT in general. Set priorities based on business needs first.

      Mission-critical systems or problems that affect many people should always come first (i.e. Severity Level 1).

      The bulk of reported problems, however, are often individual problems with desktop PCs (i.e. Severity Level 3 or 4).

      Some questions to consider when deciding on problem severity include:

      • How is productivity affected?
      • How many users are affected?
      • How many systems are affected?
      • How critical are the affected systems to the organization?

      Decide how many severity levels the organization needs the service desk to have. Four levels of severity are ideal for most organizations.

      Image shows example ticket prioritization matrix

      Collect the ticket prioritization scheme in one diagram to ensure service support aligns to business requirements

      Image shows example ticket prioritization matrix

      Prioritize incidents based on severity and urgency to foreground critical issues

      2.3.1 Build a clearly defined priority scheme

      Estimated Time: 60 minutes

      1. Decide how many levels of severity are appropriate for your organization.
      2. Build a prioritization matrix, breaking down priority levels by impact and urgency.
      3. Build out the definitions of impact and urgency to complete the prioritization matrix.
      4. Run through examples of each priority level to make sure everyone is on the same page.

      Image shows example ticket prioritization matrix

      Document in the SOP

      Participants

      • Service Managers
      • Service Desk Support
      • Applications or Infrastructure Support

      What You'll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens
      • Service Desk SOP

      Example of outcome from 2.3.1

      Define response and resolution targets for each priority level to establish service-level objectives for service support

      Image shows example of response and resolution targets.

      Build clear rules to help agents determine when to escalate

      2.3.2 Assign response, resolution, and escalation times to each priority level

      Estimated Time: 60 minutes

      Instructions:

      For each incident priority level, define the associated:

      1. Response time – time from when incident record is created to the time the service desk acknowledges to the customer that their ticket has been received and assigned.
      2. Resolution time – time from when the incident record is created to the time that the customer has been advised that their problem has been resolved.
      3. Escalation time – maximum amount of time that a ticket should be worked on without progress before being escalated to someone else.

      Participants

      • Service Managers
      • Service Desk Support
      • Applications or Infrastructure Support

      What You'll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens

      Image shows example of response and resolution targets

      Use the table on the previous slide as a guide.

      Discuss the possible root causes for escalation issues

      WHY IS ESCALATION IMPORTANT?

      Escalation is not about admitting defeat, but about using your resources properly.

      Defining procedures for escalation reduces the amount of time the service desk spends troubleshooting before allocating the incident to a higher service tier. This reduces the mean time to resolve and increases end-user satisfaction.

      You can correlate escalation paths to ticket categories devised in step 2.2.

      Image shows example on potential root causes for escalation issues.

      Build decision rights to help agents determine when to escalate

      2.3.3 Provide guidance to each tier around escalation steps and times

      Estimated Time: 60 minutes

      Instructions

      1. For each support tier, define escalation rules for troubleshooting (steps that each tier should take before escalation).
      2. For each support tier, define maximum escalation times (maximum amount of time to work on a ticket without progress before escalating).
      Example of outcome from step 2.3.3 to determine when to escalate issues.

      Create a list of application specialists to get the escalation right the first time

      2.3.4 Define automated escalations

      Estimated Time: 60 minutes

      1. Identify applications that will require specialists for troubleshooting or access rights.
      2. Identify primary and secondary specialists for each application.
      3. Identify vendors that will receive escalations either immediately or after troubleshooting.
      4. Set up application groups in the service desk tool.
      5. Set up workflows in the service desk tool where appropriate.
      6. Document the automated escalations in the categorization scheme developed in step 2.2 and in the Service Desk Roles and Responsibilities Guide.

      A screenshot of the Service Desk Roles and Responsibilities Guide

      Participants

      • Service Managers
      • Service Desk Support
      • Applications or Infrastructure Support

      What You'll Need

      • Flip Chart Paper
      • Sticky Notes
      • Pens

      Phase 3

      Design Request Fulfilment Processes

      Step 3.1: Build request workflows

      Image shows the steps in phase 3. Highlight is on step 3.1.

      This step will walk you through the following activities:

      • 3.1.1 Distinguish between requests and small projects
      • 3.1.2 Define service requests with SLAs
      • 3.1.3 Build and critique request workflows

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      Workflows for service requests will improve the consistency and quality of service delivery and prepare the service desk to negotiate reliable service levels with the organization.

      DELIVERABLES

      • Workflows for the most common service requests
      • An estimated service level for each service request
      • Request vs. project criteria

      Standardize service requests for more efficient delivery

      Definitions:

      • An incident is an unexpected disruption to normal business processes and requires attempts to restore service as soon as possible (e.g. printer not working).
      • A service request is a request where nothing is broken or impacting a service and typically can be scheduled rather than requiring immediate resolution (e.g. new software application).
      • Service requests are repeatable, predictable, and easier to commit to SLAs.
      • By committing to SLAs, expectations can be set for users and business units for service fulfillment.
      • Workflows for service requests should be documented and reviewed to ensure consistency of fulfillment.
      • Documentation should be created for service request procedures that are complex.
      • Efficiencies can be created through automation such as with software deployment.
      • All service requests can be communicated through a self-service portal or service catalog.

      PREPARE A FUTURE SERVICE CATALOG

      Standardize requests to develop a consistent offering and prepare for a future service catalog.

      Document service requests to identify time to fulfill and approvals.

      Identify which service requests can be auto-approved and which will require a workflow to gain approval.

      Document workflows and analyze them to identify ways to improve SLAs. If any approvals are interrupting technical processes, rearrange them so that approvals happen before the technical team is involved.

      Determine support levels for each service offering and ensure your team can sustain them.

      Where it makes sense, automate delivery of services such as software deployment.

      Distinguish between service requests and small projects to ensure agents and end users follow the right process

      The distinction between service requests and small projects has two use cases, which are two sides of the same resourcing issue.

      • Service desk managers need to understand the difference to ensure the right approval process is followed. Typically, projects have more stringent intake requirements than requests do.
      • PMOs need to understand the difference to ensure the right people are doing the work and that small, frequent changes are standardized, automated, and taken out of the project list.

      What’s the difference between a service request and a small project?

      • The key differences involve resource scope, frequency, and risk.
      • Requests are likely to require fewer resources than projects, be fulfilled more often, and involve less risk.
      • Requests are typically done by tier 1 and 2 employees throughout the IT organization.
      • A request can turn into a small project if the scope of the request grows beyond the bounds of a normal request.

      Example: A mid-sized organization goes on a hiring blitz and needs to onboard 150 new employees in one quarter. Submitting and scheduling 150 requests for onboarding new employees would require much more time and resources.

      Projects are different from service requests and have different criteria

      A project, by terminology, is a temporary endeavor planned around producing a specific organizational or business outcome.

      Common Characteristics of Projects:

      • Time sensitive, temporary, one-off.
      • Uncertainty around how to create the unique thing, product, or service that is the project’s goal.
      • Non-repetitive work and sizeable enough to introduce heightened risk and complexity.
      • Strategic focus, business case-informed capital funding, and execution activities driven by a charter.
      • Introduces change to the organization.
      • Multiple stakeholders involved and cross-functional resourcing.

      Info-Tech Insight

      Projects require greater risk, effort, and resources than a service request and should be redirected to the PMO.

      Standard service requests vs. non-standard service requests: criteria to make them distinct

      • If there is no differentiation between standard and non-standard requests, those tickets can easily move into the backlog, growing it very quickly.
      • Create a process to easily identify non-standard requests when they enter the ticket queue to ensure customers are made aware of any delay of service, especially if it is a product or service currently not offered. This will give time for any approvals or technical solutioning that may need to occur.
      • Take recurring non-standard requests and make them standard. This is a good way to determine if there are any gaps in services offered and another vehicle to understand what your customers want.

      Standard Requests

      • Very common requests, delivered on an on-going basis
      • Defined process
      • Measured in hours or days
      • Uses service catalog, if it exists
      • Formalized and should already be documented
      • The time to deal with the request is defined

      Non-Standard Requests

      • Higher level complexity than standard requests
      • Cannot be fulfilled via service catalog
      • No defined process
      • Not supplied by questions that Service Request Definition (SRD) offers
      • Product or service is not currently offered, and it may need time for technical review, additional approvals, and procurement processes

      The right questions can help you distinguish between standard requests, non-standard requests, and projects

      Where do we draw the line between a standard and non-standard request and a project?

      The service desk can’t and shouldn’t distinguish between requests and projects on its own. Instead, engage stakeholders to determine where to draw the line.

      Whatever criteria you choose, define them carefully.

      Be pragmatic: there is no single best set of criteria and no single best definition for each criterion. The best criteria and definitions will be the ones that work in your organizational context.

      Common distinguishing factors and thresholds:

      Image shows table of the common distinguishing factors and thresholds.

      Distinguish between standard and non-standard service requests and projects

      3.1.1 Distinguish between service requests and projects

      1. Divide the group into two small teams.
      2. Each team will brainstorm examples of service requests and small projects.
      3. Identify factors and thresholds that distinguish between the two groups of items.
      4. Bring the two groups together and discuss the two sets of criteria.
      5. Consolidate one set of criteria that will help make the distinction between projects and service requests.
      6. Capture the table in the Service Desk SOP.

      Image shows blank template of the common distinguishing factors and thresholds.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Distinguishing factors and thresholds

      Don’t standardize request fulfilment processes alone

      Everyone in IT contributes to the fulfilment of requests, but do they know it?

      New service desk managers sometimes try to standardize request fulfilment processes on their own only to encounter either apathy or significant resistance to change.

      Moving to a tiered generalist service desk with a service-oriented culture, a high first-tier generalist resolution rate, and collaborative T2 and T3 specialists can be a big change. It is critical to get the request workflows right.

      Don’t go it alone. Engage a core team of process champions from all service support. With executive support, the right process building exercises can help you overcome resistance to change.

      Consider running the process building activities in this project phase in a working session or a workshop setting.

      Info-Tech Insight

      If they build it, they will come. Service desk improvement is an exercise in organizational change that crosses IT disciplines. Organizations that fail to engage IT specialists from other silos often encounter resistance to change that jeopardizes the process improvements they are trying to make. Overcome resistance by highlighting how process changes will benefit different groups in IT and solicit the feedback of specialists who can affect or be affected by the changes.

      Define standard service requests with SLAs and workflows

      WHY DO I NEED WORKFLOWS?

      Move approvals out of technical IT processes to make them more efficient. Evaluate all service requests to see where auto-approvals make sense. Where approvals are required, use tools and workflows to manage the process.

      Example:

      Image is an example of SLAs and workflows.

      Approvals can be the main roadblock to fulfilling service requests

      Image is example of workflow approvals.

      Review the general standard service request and inquiry fulfillment processes

      As standard service requests should follow standard, repeatable, and predictable steps to fulfill, they can be documented with workflows.

      Image is a flow chart of service and inquiry request processes.

      Review the general standard service request and inquiry fulfillment processes

      Ensure there is a standard and predictable methodology for assessing non-standard requests; inevitably those requests may still cause delay in fulfillment.

      Create a process to ensure reasonable expectations of delivery can be set with the end user and then identify what technology requests should become part of the existing standard offerings.

      Image is a flowchart of non-standard request processes

      Document service requests to ensure consistent delivery and communicate requirements to users

      3.1.2 Define service requests with SLAs

      1. On a flip chart, list standard service requests.
      2. Identify time required to fulfill, including time to schedule resources.
      3. Identify approvals required; determine if approvals can be automated through defining roles.
      4. Discuss opportunities to reduce SLAs or automate, but recognize that this may not happen right away.
      5. Discuss plans to communicate SLAs to the business units, recognizing that some users may take a bit of time to adapt to the new SLAs.
      6. Work toward improving SLAs as new opportunities for process change occur.
      7. Document SLAs in the Service Desk SOP and update as SLAs change.
      8. Build templates in the service desk tool that encapsulate workflows and routing, SLAs, categorization, and resolution.

      Participants

      • Service Desk Managers
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Info-Tech Insight

      These should all be scheduled services. Anything that is requested as a rush needs to be marked as a higher urgency or priority to track end users who need training on the process.

      Analyze service request workflows to improve service delivery

      3.1.3 Build and critique request workflows

      1. Divide the group into small teams.
      2. Each team will choose one service request from the list created in the previous module and then draw the workflow. Include decision points and approvals.
      3. Discuss availability and technical support:
        • Can the service be fulfilled during regular business hours or 24x7?
        • Is technical support and application access available during regular business hours or 24x7?
      4. Reconvene and present workflows to the group.
      5. Document workflows in Visio and add to the Service Desk SOP. Where appropriate, enter workflows in the service desk tool.

      Critique workflows for efficiencies and effectiveness:

      • Do the workflows support the SLAs identified in the previous exercise?
      • Are the workflows efficient?
      • Is the IT staff consistently following the same workflow?
      • Are approvals appropriate? Is there too much bureaucracy or can some approvals be removed? Can they be preapproved?
      • Are approvals interrupting technical processes? If so, can they be moved?

      Participants

      • Service Desk Managers
      • Service Desk Agents

      What You'll Need

      • Service Desk SOP
      • Project Summary
      • Flip Chart
      • Whiteboard

      Step 3.2: Build a targeted knowledgebase

      Image shows the steps in phase 3. Highlight is on step 3.2.

      This step will walk you through the following activities:

      • 3.2.1 Design knowledge management processes
      • 3.2.2 Create actionable knowledgebase articles

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The section will introduce service catalogs and get the organization to envision what self-service tools it might include.

      DELIVERABLES

      • Knowledgebase policy and process

      A knowledgebase is an essential tool in the service management toolbox

      Knowledge Management

      Gathering, analyzing, storing & sharing knowledge to reduce the need to rediscover known solutions.

      Knowledgebase

      Organized repository of IT best practices and knowledge gained from practical experiences.

      • End-User KB
      • Give end users a chance to resolve simple issues themselves without submitting a ticket.

      • Internal KB
      • Shared resource for service desk staff and managers to share and use knowledge.

      Use the knowledgebase to document:

      • Steps for pre-escalation troubleshooting.
      • Known errors.
      • Workarounds or solutions to recurring issues.
      • Solutions that require research or complex troubleshooting.
      • Incidents that have many root causes. Start with the most frequent solution and work toward less likely issues.

      Draw on organizational goals to define the knowledge transfer target state

      Image is Info-Tech’s Knowledge Transfer Maturity Model
      *Source: McLean & Company, 2013; N=120

      It’s better to start small than to have nothing at all

      Service desk teams are often overwhelmed by the idea of building and maintaining a comprehensive integrated knowledgebase that covers an extensive amount of information.

      Don’t let this idea stop you from building a knowledgebase! It takes time to build a comprehensive knowledgebase and you must start somewhere.

      Start with existing documentation or knowledge that depends on the expertise of only a few people and is easy to document and you will already see the benefits.

      Then continue to build and improve from there. Eventually, knowledge management will be a part of the culture.

      Engage the team to build a knowledgebase targeted on your most important incidents and requests

      WHERE DO I START?

      Inventory and consolidate existing documentation, then evaluate it for audience relevancy, accuracy, and usability. Use the exercise and the next slides to develop a knowledgebase template.

      Produce a plan to improve the knowledgebase.

      • Identify the current top five or ten incidents from the service desk reports and create related knowledgebase articles.
      • Evaluate for end-user self-service or technician resolution.
      • Note any resolutions that require access rights to servers.
      • Assign documentation creation tasks for the knowledgebase to individual team members each week.
      • Apply only one incident per article.
      • Set goals for each technician to submit one or two meaningful articles per month.
      • Assign a knowledge manager to monitor creation and edit and maintain the database.
      • Set policy to drive currency of the knowledgebase. See the Service Desk SOP for an example of a workable knowledge policy.

      Use a phased approach to build a knowledgebase

      Image is an example of a phased approach to build a knowledge base

      Use a quarterly, phased approach to continue to build and maintain your knowledgebase

      Continual Knowledgebase Maintenance:

      • Once a knowledgebase is in place, future articles should be written using established templates.
      • Articles should be regularly reviewed and monitored for usage. Outdated information will be retired and archived.
      • Ticket trend analysis should be done on an ongoing basis to identify new articles.
      • A proactive approach will anticipate upcoming issues based on planned upgrades and maintenance or other changes, and document resolution steps in knowledgebase articles ahead of time.

      Every Quarter:

      1. Conduct a ticket trend analysis. Identify the most important and common tickets.
      2. Review the knowledgebase to identify relevant articles that need to be revised or written.
      3. Use data from knowledge management tool to track expiring content and lesser used articles.
      4. Assign the task of writing articles to all IT staff members.
      5. Build and revise ticket templates for incident and service requests.

      Assign a knowledge manager role to ensure accountability for knowledgebase maintenance

      Assign a knowledge manager to monitor creation and edit and maintain database.

      Knowledge Manager/Owner Role:

      • Has overall responsibility for the knowledgebase.
      • Ensures content is consistent and maintains standards.
      • Regularly monitors and updates the list of issues that should be added to the knowledgebase.
      • Regularly reviews existing knowledgebase articles to ensure KB is up to date and flags content to retire or review.
      • Assigns content creation tasks.
      • Optimizes knowledgebase structure and organization.
      • See Info-Tech’s knowledge manager role description if you need a hand defining this position.

      The knowledge manager role will likely be a role assigned to an existing resource rather than a dedicated position.

      Develop a template to ensure knowledgebase articles are easy to read and write

      A screenshot of the Knowledgebase Article Template

      QUICK TIPS

      • Use non-technical language whenever possible to help less-technical readers.
      • Identify error messages and use screenshots where it makes sense.
      • Take advantage of social features like voting buttons to increase use.
      • Use Info-Tech’s Knowledge Base Article Template to get you started.

      Analyze the necessary features for your knowledgebase and compare them against existing tools

      Service desk knowledgebases range in complexity from simple FAQs to fully integrated software suites.

      Options include:

      • Article search with negative and positive filters.
      • Tagging, with the option to have keywords generate top matches.
      • Role-based permissions (to prevent unauthorized deletions).
      • Ability to turn a ticket resolution into a knowledgebase article (typically only available if knowledgebase tool is part of the service desk tool).
      • Natural language search.
      • Partitioning so relevant articles only appear for specific audiences.
      • Editorial workflow management.
      • Ability to set alerts for scheduled article review.
      • Article reporting (most viewed, was it useful?).
      • Rich text fields for attaching screenshots.

      Determine which features your organization needs and check to see if your tools have them.

      For more information on knowledgebase improvement, refer to Info-Tech’s Optimize the Service Desk With a Shift-Left Strategy.

      Document your knowledge management maintenance workflow to identify opportunities for improvement

      Workflow should include:

      • How you will identify top articles that need to be written
      • How you will ensure articles remain relevant
      • How you will assign new articles to be written, inclusive of peer review
      Image of flowchart of knowledgebase maintenance process.

      Design knowledgebase management processes

      3.2.1 Design knowledgebase management processes

      1. Assign a knowledge manager to monitor creation and edit and maintain the database. See Info-Tech’s knowledge manager role description if you need a hand defining this position.
      2. Discuss how you can use the service desk tool to integrate the knowledgebase with incident management, request fulfilment, and self-service processes.
      3. Discuss the suitability of a quarterly process to build and edit articles for a target knowledgebase that covers your most important incidents and requests.
      4. Set knowledgebase creation targets for tier 1, 2, and 3 analysts.
      5. Identify relevant performance metrics.
      6. Brainstorm elements that might be used as an incentive program to encourage the creation of knowledgebase articles and knowledge sharing more generally.
      7. Set policy to drive currency of knowledgebase. See the Service Desk SOP for an example of a workable knowledge policy.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Create actionable knowledgebase articles

      3.2.2 Run a knowledgebase working group

      Write and critique knowledgebase articles.

      1. On a whiteboard, build a list of potential knowledgebase articles divided by audience: Technician or End User.
      2. Each team member chooses one topic and spends 20 minutes writing.
      3. Each team member either reads the article and has the team critique or passes to the technician to the right for peer review. If there are many participants, break into smaller groups.
      4. Set a goal with the team for how, when, and how often knowledgebase articles will be created.
      5. Capture knowledgebase processes in the Service Desk SOP.

      Audience: Technician

      • Password update
      • VPN printing
      • Active directory – policy, procedures, naming conventions
      • Cell phones
      • VPN client and creation set-up

      Audience: End users

      • Set up email account
      • Password creation policy
      • Voicemail – access, change greeting, activities
      • Best practices for virus, malware, phishing attempts
      • Windows 10 tips and tricks

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Service Desk SOP
      • Flip Chart
      • Whiteboard

      Step 3.3: Prepare for a self-service portal project

      Image shows the steps in phase 3. Highlight is on step 3.3.

      This step will walk you through the following activities:

      • 3.3.1 Develop self-service tools for the end user
      • 3.3.2 Make a plan for creating or improving the self-service portal

      This step involves the following participants:

      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The section prepares you to tackle a self-service portal project once the service desk standardization is complete.

      DELIVERABLES

      • High-level activities to create a self-service portal

      Design the self-service portal with the users’ computer skills in mind

      A study by the OECD offers a useful reminder of one of usability’s most hard-earned lessons: you are not the user.

      • There is an important difference between IT professionals and the average user that’s even more damaging to your ability to predict what will be a good self-service tool: skills in using computers, the internet, and technology in general.
      • An international research study explored the computer skills of 215,942 people aged 16-65 in 33 countries.
      • The results show that across 33 rich countries, only 5% of the population has strong computer-related abilities and only 33% of people can complete medium-complexity computer tasks.
      • End users are skilled, they just don’t have the same level of comfort with computers as the average IT professional. Design your self-service tools with that fact in mind.
      Image is of a graph showing the ability of computer skills from age 16-65 among various countries.

      Take an incremental and iterative approach to developing your self-service portal

      Use a web portal to offer self-serve functionality or provide FAQ information to your customers to start.

      • Don’t build from scratch. Ideally, use the functionality included with your ITSM tool.
      • If your ITSM tool doesn’t have an adequate self-service portal functionality, then harness other tools that IT already uses. Common examples include Microsoft SharePoint and Google Forms.
      • Make it as easy as possible to access the portal:
        • Deploy an app to managed devices or put the app in your app store.
        • Create a shortcut on people’s start menus or home screens.
        • Print the URL on swag such as mousepads.
      • Follow Info-Tech’s approach to developing your user facing service catalog.

      Some companies use vending machines as a form of self serve. Users can enter their purchase code and “buy” a thin client, mouse, keyboard, software, USB keys, tablet, headphones, or loaners.

      Info-Tech Insight

      Building the basics first will provide your users with immediate value. Incrementally add new features to your portal.

      Optimize the portal: self-service should be faster and more convenient than the alternative

      Design the portal by demand, not supply

      Don’t build a portal framed around current offerings and capabilities just for the sake of it. Build the portal based on what your users want and need if you want them to use it.

      Make user experience a top priority

      The portal should be designed for users to self-serve, and thus self-service must be seamless, clear, and attractive to users.

      Speak your users’ language

      Keep in mind that users may not have high technical literacy or be familiar with terminology that you find commonplace. Use terms that are easy to understand.

      Appeal to both clickers and searchers

      Ensure that users can find what they’re looking for both by browsing the site and by using search functionality.

      Use one central portal for all departments

      If multiple departments (i.e. HR, Finance) use or will use a portal, set up a shared portal so that users won’t have to guess where to go to ask for help.

      You won’t know unless you test

      You will know how to navigate the portal better than anyone, but that doesn’t mean it’s intuitive for a new user. Test the portal with users to collect and incorporate feedback.

      Self-service portal examples (1/2)

      Image is of an example of the self-service portal

      Image source: Cherwell Service Management

      Self-service examples (2/2)

      Image is of an example of the self-service portal

      Image source: Team Dynamix

      Keep the end-user facing knowledgebase relevant with workflows, multi-device access, and social features

      Workflows:

      • Easily manage peer reviews and editorial and relevance review.
      • Enable links and importing between tickets and knowledgebase articles.
      • Enable articles to appear based on ticket content.

      Multi-device access:

      • Encourage users to access self-service.
      • Enable technicians to solve problems from anywhere.

      Social features:

      • Display most popular articles first to solve trending issues.
      • Enable voting to improve usability of articles.
      • Allow collaboration on self-service.

      For more information on building self-service portal, refer to Info-Tech’s Optimize the Service Desk with a Shift-Left Strategy

      Draft a high-level project plan for a self-service portal project

      3.3.1 Draft a high-level project plan for a self-service portal project

      1. Identify stakeholders who can contribute to the project.
        • Who will help with FAQ creation?
        • Who can design the self-service portal?
        • Who needs to sign off on the project?
      2. Identify the high-level tasks that need to be done.
        • How many FAQs need to be created?
        • How will we design the service catalog’s web portal?
        • What might a phased approach look like?
        • How can we break down the project into design, build, and implementation tasks?
        • What is the rough timeline for these tasks?
      3. Capture the high-level activities in the Service Desk Roadmap.

      Participants

      • Service Desk Manager
      • Service Desk Agents

      What You’ll Need

      • Flip Chart
      • Whiteboard
      • Implementation Roadmap

      Once you have a service portal, you can review the business requirements for a service catalog

      A service catalog is a communications device that lists the IT services offered by an organization. The service catalog is designed to enable the creation of a self-service portal for the end user. The portal augments the service desk so analysts can spend time managing incidents and providing technical support.

      The big value comes from workflows:

      • Improved economics and a means to measure the costs to serve over time.
      • Incentive for adoption because things work better.
      • Abstracts delivery from offer to serve so you can outsource, insource, crowdsource, slow, speed, reassign, and cover absences without involving the end user.

      There are three types of catalogs:

      • Static:Informational only, so can be a basic website.
      • Routing and workflow: Attached to service desk tool.
      • Workflow and e-commerce: Integrated with service desk tool and ERP system.
      Image is an example of service catalog

      Image courtesy of University of Victoria

      Understand the time and effort involved in building a service catalog

      A service catalog will streamline IT service delivery, but putting one together requires a significant investment. Service desk standardization comes first.

      • Workflows and back-end services must be in place before setting up a service catalog.
      • Think of the catalog as just the delivery mechanism for service you currently provide. If they aren’t running well and delivery is not consistent, you don’t want to advertise SLAs and options.
      • Service catalogs require maintenance.
      • It’s not a one-time investment – service catalogs must be kept up to date to be useful.
      • Service catalog building requires input from VIPs.
      • Architects and wordsmiths are not the only ones that spend effort on the service catalog. Leadership from IT and the business also provide input on policy and content.

      Sample Service Catalog Efforts

      • A college with 17 IT staff spent one week on a simple service catalog.
      • A law firm with 110 IT staff spent two months on a service catalog project.
      • A municipal government with 300 IT people spent over seven months and has yet to complete the project.
      • A financial organization with 2,000 IT people has spent seven months on service catalog automation alone! The whole project has taken multiple years.

      “I would say a client with 2,000 users and an IT department with a couple of hundred, then you're looking at six months before you have the catalog there.”

      – Service Catalog Implementation Specialist,

      Health Services

      Draft a high-level project plan for a self-service portal project

      3.2.2 Make a plan for creating or improving the self-service portal

      Identify stakeholders who can contribute to the project.

      • Who will help with FAQs creation?
      • Who can design the self-service portal?
      • Who needs to sign off on the project?

      Evaluate tool options.

      • Will you stick with your existing tool or invest in a new tool?

      Identify the high-level tasks that need to be done.

      • How will we design the web portal?
      • What might a phased approach look like?
      • What is the rough timeline for these tasks?
      • How many FAQs need to be created?
      • Will we have a service catalog, and what type?

      Document the plan and tasks in the Service Desk Roadmap.

      Examples of publicly posted service catalogs:

      University of Victoria is an example of a catalog that started simple and now includes multiple divisions, notifications, systems status, communications, e-commerce, incident registration, and more.

      Indiana University is a student, faculty, and staff service catalog and self-service portal that goes beyond IT services.

      If you are ready to start building a service catalog, use Info-Tech’s Design and Build a User-Facing Service Catalog blueprint to get started.

      Phase 4

      Plan the Implementation of the Service Desk

      Step 4.1: Build communication plan

      Image shows the steps in phase 4. Highlight is on step 4.1.

      This step will walk you through the following activities:

      • 4.1.1 Create the communication plan

      This step involves the following participants:

      • CIO
      • IT Director
      • IT Managers
      • Service Desk Manager(s)
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The communication plan and project summary will help project managers outline recommendations and communicate their benefits.

      DELIVERABLES

      • Communication plan
      • Project summary

      Effectively communicate the game plan to IT to ensure the success of service desk improvements

      Communication is crucial to the integration and overall implementation of your service desk improvement.

      An effective communication plan will:

      • Gain support from management at the project proposal phase.
      • Create end-user buy-in once the program is set to launch.
      • Maintainthe presence of the program throughout the business.
      • Instill ownership throughout the business, from top-level management to new hires.

      Build a communication plan to:

      1. Communicate benefits to IT:
        • Share the standard operating procedures for training and feedback.
        • Train staff on policies as they relate to end users and ensure awareness of all policy changes.
        • As changes are implemented, continue to solicit feedback on what is and is not working and communicate adjustments as appropriate.
      2. Train technicians:
        • Make sure everyone is comfortable communicating changes to customers.
      3. Measure success:
        • Review SLAs and reports. Are you consistently meeting SLAs?
        • Is it safe to communicate with end users?

      Create your communication plan to anticipate challenges, remove obstacles, and secure buy-in

      Why:

      • What problems are you trying to solve?

      What:

      • What processes will it affect (that will affect me)?

      Who:

      • Who will be affected?
      • Who do I go to if I have issues with the new process?
      3 gears are depicted. The top gear is labelled managers with an arrow going clockwise. The middle gear is labelled technical staff with an arrow going counterclockwise. The bottom gear is labelled end users with an arrow going clockwise

      When:

      • When will this be happening?
      • When will it affect me?

      How:

      • How will these changes manifest themselves?

      Goal:

      • What is the final goal?
      • How will it benefit me?

      Create a communication plan to outline the project benefits

      Improved business satisfaction:

      • Improve confidence that the service desk can solve issues within the service-level agreement.
      • Channel incidents and requests through the service desk.
      • Escalate incidents quickly and accurately.

      Fewer recurring issues:

      • Tickets are created for every incident and categorized correctly.
      • Reports can be used for root-cause analysis.

      Increased efficiency or lower cost to serve:

      • Use FAQs to enable end users to self-solve.
      • Use knowledgebase to troubleshoot once, solve many times.
      • Cross-train to improve service consistency.

      Enhanced demand planning:

      • Trend analysis and reporting improve IT’s ability to forecast and address the demands of the business.

      Organize the information to manage the deployment of key messages

      Example of how to organize and manage key messages

      Create the communication plan

      4.1.1 Create the communication plan

      Estimated Time: 45 minutes

      Develop a stakeholder analysis.

      1. Identify everyone affected by the project.
      2. Assess their level of interest, value, and influence.
      3. Develop a communication strategy tailored to their level of engagement.

      Craft key messages tailored to each stakeholder group.

      Finalize the communication plan.

      1. Examine your roadmap and determine the most appropriate timing for communications.
      2. Assess when communications must happen with executives, business unit leaders, end users, and technicians.
      3. Identify any additional communication challenges that have come up.
      4. Identify who will send out the communications.
      5. Identify multiple methods for getting the messages out (newsletters, emails, posters, company meetings).
      6. For inspiration, you can refer to the Sample Communication Plan for the project.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      Step 4.2: Build implementation roadmap

      Image shows the steps in phase 4. Highlight is on step 4.2.

      This step will walk you through the following activities:

      • 4.2.1 Build implementation roadmap

      This step involves the following participants:

      • CIO
      • IT Director
      • IT Managers
      • Service Desk Manager
      • Representation from tier 2 and tier 3 specialists

      Outcomes

      The implementation plan will help track and categorize the next steps and finalize the project.

      DELIVERABLES

      • Implementation roadmap

      Collaborate to create an implementation plan

      4.2.1 Create the implementation plan

      Estimated Time: 45 minutes

      Determine the sequence of improvement initiatives that have been identified throughout the project.

      The purpose of this exercise is to define a timeline and commit to initiatives to reach your goals.

      Instructions:

      1. Review the initiatives that will be taken to improve the service desk and revise tasks, as necessary.
      2. Input each of the tasks in the data entry tab and provide a description and rationale behind the task.
      3. Assign an effort, priority, and cost level to each task (high, medium, low).
      4. Assign ownership to each task.
      5. Identify the timeline for each task based on the priority, effort, and cost (short, medium, and long term).
      6. Highlight risk for each task if it will be deferred.
      7. Track the progress of each task with the status column.

      Participants

      • CIO
      • IT Managers
      • Service Desk Manager
      • Service Desk Agents

      A screenshot of the Roadmap tool.

      Document using the Roadmap tool.

      Related Info-Tech Research

      Standardize the Service Desk

      ImplementHardware and Software Asset Management

      Optimize Change Management Incident and Problem Management Build a Continual Improvement Plan for the Service Desk

      The Standardize blueprint reviews service desk structures and metrics and builds essential processes and workflows for incident management, service request fulfillment, and knowledge management practices.

      Once the service desk is operational, there are three paths to basic ITSM maturity:

      • Having the incident management processes and workflows built allows you to:
        • Introduce Change Management to reduce change-related incidents.
        • Introduce Problem Management to reduce incident recurrence.
        • Introduce Asset Management to augment service management processes with reliable data.

      Solicit targeted department feedback on core IT service capabilities, IT communications, and business enablement. Use the results to assess the satisfaction of end users, with each service broken down by department and seniority level.

      Works cited

      “Help Desk Staffing Models: Simple Analysis Can Save You Money.” Giva, Inc., 2 Sept. 2009. Web.

      Marrone et al. “IT Service Management: A Cross-national Study of ITIL Adoption.” Communications of the Association for Information Systems: Vol. 34, Article 49. 2014. PDF.

      Rumburg, Jeff. “Metric of the Month: First Level Resolution Rate.” MetricNet, 2011. Web.

      “Service Recovery Paradox.” Wikipedia, n.d. Web.

      Tang, Xiaojun, and Yuki Todo. “A Study of Service Desk Setup in Implementing IT Service Management in Enterprises.” Technology and Investment: Vol. 4, pp. 190-196. 2013. PDF.

      “The Survey of Adult Skills (PIAAC).” Organisation for Economic Co-operation and Development (OECD), 2016. Web.

      Contributors

      • Jason Aqui, IT Director, Bellevue College
      • Kevin Sigil, IT Director, Southwest Care Centre
      • Lucas Gutierrez, Service Desk Manager, City of Santa Fe
      • Rama Dhuwaraha, CIO, University of North Texas System
      • Annelie Rugg, CIO, UCLA Humanities
      • Owen McKeith, Manager IT Infrastructure, Canpotex
      • Rod Gula, IT Director, American Realty Association
      • Rosalba Trujillo, Service Desk Manager, Northgate Markets
      • Jason Metcalfe, IT Manager, Mesalabs
      • Bradley Rodgers, IT Manager, SecureTek
      • Daun Costa, IT Manager, Pita Pit
      • Kari Petty, Service Desk Manager, Mansfield Oil
      • Denis Borka, Service Desk Manager, PennTex Midstream
      • Lateef Ashekun, IT Manager, City of Atlanta
      • Ted Zeisner, IT Manager, University of Ottawa Institut de Cardiologie

      Build a Strategic Infrastructure Roadmap

      • Buy Link or Shortcode: {j2store}332|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $36,636 Average $ Saved
      • member rating average days saved: 26 Average Days Saved
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      Getting a seat at the table is your first objective in building a strategic roadmap. Knowing what the business wants to do and understanding what it will need in the future is a challenge for most IT departments.

      This could be a challenge such as:

      • Understanding the business vision
      • Clear communications on business planning
      • Insight into what the future state should look like
      • Understanding what the IT team is spending its time on day to day

      Our Advice

      Critical Insight

      • Having a clear vision of what the future state is and knowing that creating an IT Infrastructure roadmap is never finished will give your IT team an understanding of priorities, goals, business vision, and risks associated with not planning.
      • Understand what you are currently paying for and why.

      Impact and Result

      • Understanding of the business priorities, and vision of the future
      • Know what your budget is spent on: running the business, growth, or innovation
      • Increased communication with the right stakeholders
      • Better planning based on analysis of time study, priorities, and business goals

      Build a Strategic Infrastructure Roadmap Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a Strategic Infrastructure Roadmap Storyboard – Improve and align goals and strategy.

      In this section you will develop a vision and mission statement and set goals that align with the business vision and goals. The outcome will deliver your guiding principles and a list of goals that will determine your initiatives and their priorities.

      • Build Your Infrastructure Roadmap Storyboard
      • Strategic Infrastructure Roadmap Tool

      2. Financial Spend Analysis Template – Envision future and analyze constraints.

      Consider your future state by looking at technology that will help the business in the future. Complete an analysis of your past spending to determine your future spend. Complete a SWOT analysis to determine suitability.

      • Financial Spend Analysis Template

      3. Strategic Roadmap Initiative Template – Align and build the roadmap.

      Develop a risk framework that may slow or hinder your strategic initiatives from progressing and evaluate your technical debt. What is the current state of your infrastructure? Generate and prioritize your initiatives, and set dates for completion.

      • Strategic Roadmap Initiative Template

      4. Infrastructure and Strategy Executive Brief Template – Communicate and improve the process.

      After creating your roadmap, communicate it to your audience. Identify who needs to be informed and create an executive brief with the template download. Finally, create KPIs to measure what success looks like.

      • Infrastructure Strategy and Roadmap Executive Presentation Template
      • Infrastructure Strategy and Roadmap Report Template

      Infographic

      Further reading

      Build a Strategic Infrastructure Roadmap

      Align infrastructure investment to business-driven goals.

      Analysts' Perspectives

      Infrastructure roadmaps are an absolute necessity for all organizations. An organization's size often dictates the degree of complexity of the roadmap, but they all strive to paint the future picture of the organization's IT infrastructure.

      Infrastructure roadmaps typically start with the current state of infrastructure and work on how to improve. That thinking must change! Start with the future vision, an unimpeded vision, as if there were no constraints. Now you can see where you want to be.

      Look at your past to determine how you have been spending your infrastructure budget. If your past shows a trend of increased operational expenditures, that trend will likely continue. The same is true for capital spending and staffing numbers.

      Now that you know where you want to go, and how you ended up where you are, look at the constraints you must deal with and make a plan. It's not as difficult as it may seem, and even the longest journey begins with one step.

      Speaking of that first step, it should be to understand the business goals and align your roadmap with those same goals. Now you have a solid plan to develop a strategic infrastructure roadmap; enjoy the journey!

      There are many reasons why you need to build a strategic IT infrastructure roadmap, but your primary objectives are to set the long-term direction, build a framework for decision making, create a foundation for operational planning, and be able to explain to the business what you are planning. It is a basis for accountability and sets out goals and priorities for the future.

      Other than knowing where you are going there are four key benefits to building the roadmap.

      1. It allows you to be strategic and transformative rather than tactical and reactive.
      2. It gives you the ability to prioritize your tasks and projects in order to get them going.
      3. It gives you the ability to align your projects to business outcomes.
      4. Additionally, you can leverage your roadmap to justify your budget for resources and infrastructure.

      When complete, you will be able to communicate to your fellow IT teams what you are doing and get an understanding of possible business- or IT-related roadblocks, but overall executing on your roadmap will demonstrate to the business your competencies and ability to succeed.

      PJ Ryan

      PJ Ryan
      Research Director
      Infrastructure & Operations Practice
      Info-Tech Research Group

      John Donovan

      John Donovan
      Principal Research Director
      Infrastructure & Operations Practice
      Info-Tech Research Group

      Build a Strategic Infrastructure Roadmap

      Align infrastructure investment to business-driven goals.

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      When it comes to building a strategic roadmap, getting a seat at the table is your first objective. Knowing what the business wants to do and understanding its future needs is a challenge for most IT organizations.

      Challenges such as:

      • Understanding the business vision
      • Clear communications on business planning
      • Insight into what the future state should look like

      Common Obstacles

      Fighting fires, keeping the lights on, patching, and overseeing legacy debt maintenance – these activities prevent your IT team from thinking strategically and looking beyond day-to-day operations. Issues include:

      • Managing time well
      • Building the right teams
      • Setting priorities

      Procrastinating when it comes to thinking about your future state will get you nowhere in a hurry.

      Info-Tech's Approach

      Look into your past IT spend and resources that are being utilized.

      • Analyze all aspects of the operation, and resources required.
      • Be realistic with your timelines.
      • Work from the future state backward.

      Build your roadmap by setting priorities, understanding risk and gaps both in finance and resources. Overall, your roadmap is never done, so don't worry if you get it wrong on the first pass.

      Info-Tech Insight

      Have a clear vision of what the future state is, and know that when creating an IT infrastructure roadmap, it is never done. This will give your IT team an understanding of priorities, goals, business vision, and risks associated with not planning. Understand what you are currently paying for and why.

      Insight Summary

      "Planning is bringing the future into the present so that you can do something about it now."
      Source: Alan Lakein, Libquotes

      Your strategic objectives are key to building a roadmap

      Many organizations' day-to-day IT operations are tactical and reactive. This needs to change; the IT team needs to become strategic and proactive in its planning and execution. Forward thinking bridges the gap from your current state, to what the organization is, to what it wants to achieve. Your strategic objectives need to align to the business vision and goals and keep it running.

      Your future state will determine your roadmap priorities

      Identify what the business needs to meet its goals; this should be reflected in your roadmap priorities. Then identify the tasks and projects that can get you there. Business alignment is key, as these projects require prioritization. Strategic initiatives that align to business outcomes will be your foundation for planning on those priorities. If you do not align your initiatives, you will end up spinning your wheels. A good strategic roadmap will have all the elements of forward thinking and planning to execute with the right resources, right priorities, and right funding to make it happen.

      Understand what you have been paying for the last few years

      Measure the cost of "keeping the lights on" as a baseline for your budget that is earmarked and already spent. Determine if your current spend is holding back innovation due to:

      1. The high cost of maintenance
      2. Resources in operations doing low-value work due to the effort required to do tasks related to break/fix on aging hardware and software

      A successful strategic roadmap will be determined when you have a good handle on your current spending patterns and planning for future needs that include resources, budget, and know-how. Without a plan and roadmap, that plan will not get business buy-in or funding.

      Top challenges reported by Info-Tech members

      Lack of strategic direction

      • Infrastructure leadership must discover the business goals.

      Time seepage

      • Project time is constantly being tracked incorrectly.

      Technical debt

      • Aging equipment is not proactively cycled out with newer enabling technologies.

      Case Study

      The strategic IT roadmap allows Dura to stay at the forefront of automotive manufacturing.

      INDUSTRY: Manufacturing
      SOURCE: Performance Improvement Partners

      Challenge

      Following the acquisition of Dura, MiddleGround aimed to position Dura as a leader in the automotive industry, leveraging the company's established success spanning over a century.

      However, prior limited investments in technology necessitated significant improvements for Dura to optimize its processes and take advantage of digital advancements.

      Solution

      MiddleGround joined forces with PIP to assess technology risks, expenses, and prospects, and develop a practical IT plan with solutions that fit MiddleGround's value-creation timeline.

      By selecting the top 15 most important IT projects, the companies put together a feasible technology roadmap aimed at advancing Dura in the manufacturing sector.

      Results

      Armed with due diligence reports and a well-defined IT plan, MiddleGround and Dura have a strategic approach to maximizing value creation.

      By focusing on key areas such as analysis, applications, infrastructure and the IT organization, Dura is effectively transforming its operations and shaping the future of the automotive manufacturing industry.

      How well do you know your business strategy?

      A mere 25% of managers
      can list three of the company's
      top five priorities.

      Based on a study from MIT Sloan, shared understanding of strategic directives barely exists beyond the top tiers of leadership.

      An image of a bar graph showing the percentage of leaders able to correctly list a majority of their strategic priorities.

      Take your time back

      Unplanned incident response is a leading cause of the infrastructure time crunch, but so too are nonstandard service requests and service requests that should be projects.

      29%

      Less than one-third of all IT projects finish on time.

      200%

      85% of IT projects average cost overruns of 200% and time overruns of 70%.

      70%

      70% of IT workers feel as though they have too much work and not enough time to do it.

      Source: MIT Sloan

      Inventory Assessment

      Lifecycle

      Refresh strategies are still based on truisms (every three years for servers, every seven years for LAN, etc.) more than risk-based approaches.

      Opportunity Cost

      Assets that were suitable to enable business goals need to be re-evaluated as those goals change.

      See Info-Tech's Manage Your Technical Debt blueprint

      an image of info-tech's Manage your technical debt.

      Key IT strategy initiatives can be categorized in three ways

      IT key initiative plan

      Initiatives collectively support the business goals and corporate initiatives, and improve the delivery of IT services.

      1. Business support
        • Support major business initiatives
        • Each corporate initiative is supported by a major IT project and each project has unique IT challenges that require IT support.
      2. IT excellence
        • Reduce risk and improve IT operational excellence
        • These projects will increase IT process maturity and will systematically improve IT.
      3. Innovation
        • Drive technology innovation
        • These projects will improve future innovation capabilities and decrease risk by increasing technology maturity.

      Info-Tech Insight

      A CIO has three roles: enable business productivity, run an effective IT shop, and drive technology innovation. Your key initiative plan must reflect these three mandates and how IT strives to fulfill them.

      IT must accomplish many things

      Manage
      the lifecycle of aging equipment against current capacity and capability demands.

      Curate
      a portfolio of enabling technologies to meet future capacity and capability demands.

      Initiate
      a realistic schedule of initiatives that supports a diverse range of business goals.

      Adapt
      to executive feedback and changing business goals.

      an image of Info-Tech's Build your strategic roadmap

      Primary and secondary infrastructure drivers

      • Primary driver – The infrastructure component that is directly responsible for enabling change in the business metric.
      • Secondary driver – The infrastructure component(s) that primary drivers rely on.

      (Source: BMC)

      Sample primary and secondary drivers

      Business metric Source(s) Primary infrastructure drivers Secondary infrastructure drivers

      Sales revenue

      Online store

      Website/Server (for digital businesses)

      • Network
      • Data center facilities

      # of new customers

      Call center

      Physical plant cabling in the call center

      • PBX/VOIP server
      • Network
      • Data center facilities

      Info-Tech Insight

      You may not be able to directly influence the primary drivers of the business, but your infrastructure can have a major impact as a secondary driver.

      Info-Tech's approach

      1. Align strategy and goals
      • Establish the scope of your IT strategy by defining IT's mission and vision statements and guiding principles.
    • Envision future and analyze constraints
      • Envision and define your future infrastructure and analyze what is holding you back.
    • Align and build the roadmap
      • Establish a risk framework, identify initiatives, and build your strategic infrastructure roadmap.
    • Communicate and improve the process
      • Communicate the results of your hard work to the right people and establish the groundwork for continual improvement of the process.
    • Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Mission and Vision Statement
      Goal Alignment (Slide 28)

      Construct your vision and mission aligned to the business.

      Mission and Vision Statement

      Strategic Infrastructure Roadmap tool

      Build initiatives and prioritize them. Build the roadmap.

      Strategic Infrastructure Roadmap tool

      Infrastructure Domain Study

      What is stealing your time from getting projects done?

      Infrastructure Domain Study

      Initiative Templates Process Maps & Strategy

      Build templates for initiates, build process map, and develop strategies.

      Initiative Templates Process Maps & Strategy

      Key Deliverable

      it infrastructure roadmap template

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Info-Tech's methodology for an infrastructure strategy and roadmap

      1. Align Strategy and Goals

      2. Envision Future and Analyze Constraints

      3. Align and Build the Roadmap

      4. Communicate and Improve the Process

      Phase steps

      1.1 Develop the infrastructure strategy

      1.2 Define the goals

      2.1 Define the future state

      2.2 Analyze constraints

      3.1 Align the roadmap

      3.2 Build the roadmap

      4.1 Identify the audience

      4.2 Improve the process

      Phase Outcomes

      • Vision statement
      • Mission statement
      • Guiding principles
      • List of goals
      • Financial spend analysis
      • Domain time study
      • Prioritized list of roadblocks
      • Future-state vision document
      • IT and business risk frameworks
      • Technical debt assessment
      • New technology analysis
      • Initiative templates
      • Initiative candidates
      • Roadmap visualization
      • Process schedule
      • Communications strategy
      • process map
      • Infrastructure roadmap report

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 0 Phase 1 Phase 2 Phase 3 Phase 4

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Define mission and vision statements and guiding principles to discuss strategy scope.
      Call #3: Brainstorm goals and definition.

      Call #4: Conduct a spend analysis and a time resource study.
      Call #5: Identify roadblocks.

      Call #6: Develop a risk framework and address technical debt.
      Call #7: Identify new initiatives and SWOT analysis.
      Call #8: Visualize and identify initiatives.
      Call #9: Complete shadow IT and initiative finalization.

      Call #10: Identify your audience and communicate.
      Call #11: Improve the process.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Session 0 (Pre-workshop)

      Session 1

      Session 2

      Session 3

      Session 4

      Session 5 (Post-workshop)

      Elicit business context Align Strategy and Goals Envision Future and Analyze Constraints Align and Build the Roadmap Communicate and Improve the Process Wrap-up (offsite)

      0.1 Complete recommended diagnostic programs.
      0.2 Interview key business stakeholders, as needed, to identify business context: business goals, initiatives, and the organization's mission and vision.
      0.3 (Optional) CIO to compile and prioritize IT success stories.

      1.1 Infrastructure strategy.
      1.1.1 Review/validate the business context.
      1.1.2 Construct your mission and vision statements.
      1.1.3 Elicit your guiding principles and finalize IT strategy scope.

      1.2 Business goal alignment
      1.2.1 Intake identification and analysis.
      1.2.2 Survey results analysis.
      1.2.3 Brainstorm goals.
      1.2.4 Perform goal association and analysis.

      2.1 Define the future state.
      2.1.1 Conduct an emerging technology discussion.
      2.1.2 Document desired future state.
      2.1.3 Develop a new technology identification process.
      2.1.4 Compete SWOT analysis.

      2.2 Analyze your constraints
      2.2.1 Perform a historical spend analysis.
      2.2.2 Conduct a time study.
      2.2.3 Identify roadblocks.
      .

      3.1 Align the roadmap
      3.1.1 Develop a risk framework.
      3.1.2 Evaluate technical debt.

      3.2 Build the roadmap.
      3.2.1 Build effective initiative templates.
      3.2.2 Visualize.
      3.2.3 Generate new initiatives.
      3.2.4 Repatriate shadow IT initiatives.
      3.2.5 Finalize initiative candidates.

      4.2 Identify the audience
      4.1.1 Identify required authors and target audiences.
      4.1.2 Plan the process.
      4.1.2 Identify supporters and blockers.

      4.2 Improve the process
      4.2.1 Evaluate the value of each process output.
      4.2.2 Brainstorm improvements.
      4.2.3 Set realistic measures.

      5.1 Complete in-progress deliverables from previous four days.
      5.2 Set up time to review workshop deliverables and discuss next steps.

      1. SWOT analysis of current state
      2. Goals cascade
      3. Persona analysis
      1. Vision statement, mission statement, and guiding principles
      2. List of goals
      1. Spend analysis document
      2. Domain time study
      3. Prioritized list of roadblocks
      4. Future state vision document
      1. IT and business risk frameworks
      2. Technical debt assessment
      3. New technology analysis
      4. Initiative templates
      5. Initiative candidates
      1. Roadmap visualization
      2. Process schedule
      3. Communications strategy
      4. Process map
      1. Strategic Infrastructure Roadmap Report

      Phase 1

      Align Strategy and Goals

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Infrastructure strategy

      1.2 Goal alignment

      2.1 Define your future

      2.2 Conduct constraints analysis

      3.1 Drive business alignment

      3.2. Build the roadmap

      4.1 Identify the audience

      4.2 Process improvement

      and measurements

      This phase will walk you through the following activities:

      • How to build IT mission and vision statements
      • How to elicit IT guiding principles
      • How to finalize and communicate your IT strategy scope

      This phase involves the following participants:

      • CIO
      • Senior IT Team

      Step 1.1

      Develop the Infrastructure Strategy

      Activities

      1.1.1 Review/validate the business context

      1.1.2 Construct your mission and vision statements

      1.1.3 Elicit your guiding principles and finalize IT strategy scope

      This step requires the following inputs:

      • Business Mission Statement
      • Business Vision Statement
      • Business Goals

      This step involves the following participants:

      • Roadmap team

      Outcomes of this step

      • IT mission statement
      • IT vision statement
      • Guiding principles

      To complete this phase, you will need:

      Infrastructure Strategy and Roadmap Report Template

      Infrastructure Strategy and Roadmap Report Template

      Use the IT Infrastructure Strategy and Roadmap Report Template to document the results from the following activities:

      • Mission and Vision Statements
      • Business impact
      • Roadmap

      IT must aim to support the organization's mission and vision

      A mission statement

      • Focuses on today and what an organization does to achieve the mission.
      • Drives the company.
      • Answers: What do we do? Who do we serve? How do we service them?

      "A mission statement focuses on the purpose of the brand; the vision statement looks to the fulfillment of that purpose."

      A vision statement

      • Focuses on tomorrow and what an organization ultimately wants to become.
      • Gives the company direction.
      • Answers: What problems are we solving? Who and what are we changing?

      "A vision statement provides a concrete way for stakeholders, especially employees, to understand the meaning and purpose of your business. However, unlike a mission statement – which describes the who, what, and why of your business – a vision statement describes the desired long-term results of your company's efforts."
      Source: Business News Daily, 2020

      Characteristics of mission and vision statements

      A strong mission statement has the following characteristics:

      • Articulates the IT function's purpose and reason for existence.
      • Describes what the IT function does to achieve its vision.
      • Defines the customers of the IT function.
      • Is:
        • Compelling
        • Easy to grasp
        • Sharply focused
        • Concise

      A strong vision statement has the following characteristics:

      • Describes a desired future achievement.
      • Focuses on ends, not means.
      • Communicates promise.
      • Is:
        • Concise; no unnecessary words
        • Compelling
        • Achievable
        • Measurable

      Derive the IT mission and vision statements from the business

      Begin the process by identifying and locating the business mission and vision statements.

      • Corporate websites
      • Business strategy documents
      • Business executives

      Ensure there is alignment between the business and IT statements.

      Note: Mission statements may remain the same unless the IT department's mandate is changing.

      an image showing Business mission, IT mission, Business Vision, and IT Vison.

      1.1.2 Construct mission and vision statements

      1 hour

      Objective: Help teams define their purpose (why they exist) to build a mission statement (if one doesn't already exist).

      Step 1:

      1. Gather the IT strategy creation team and revisit your business context inputs, specifically the corporate mission statement.
      2. Begin by asking the participants:
          1. What is our job as a team?
          2. What's our goal? How do we align IT to our corporate mission?
          3. What benefit are we bringing to the company and the world?
        1. Ask them to share general thoughts in a check-in.

      Step 2:

      1. Share some examples of IT mission statements.
      2. Example: IT provides innovative product solutions and leadership that drives growth and
        success.
      3. Provide each participant with some time to write their own version of an IT mission statement.

      Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

      Input

      • Business vision statement
      • Business mission statement

      Output

      • IT mission statement
      • IT vision statement

      Materials

      • Sticky notes
      • Markers
      • Whiteboard
      • Paper
      • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

      Participants

      • CIO
      • Senior IT Team

      1.1.2 Construct mission and vision statements (cont'd)

      1 hour

      Objective: Help teams define their purpose (why they exist) to build a mission statement (if one doesn't already exist).

      Step 3:

      This step involves reviewing individual mission statements, combining them, and building one collective mission statement for the team.

      1. Consider the following approach to build a unified mission statement:

      Use the 20x20 rule for group decision-making. Give the group no more than 20 minutes to craft a collective team purpose with no more than 20 words.

      1. As a facilitator, provide guidelines on how to write for the intended audience. Business stakeholders need business language.
      2. Refer to the corporate mission statement periodically and ensure there is alignment.
      3. Document your final mission statement in your ITRG Infrastructure Strategy and Roadmap Report Template.

      Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

      Input

      • Business vision statement
      • Business mission statement

      Output

      • IT mission statement
      • IT vision statement

      Materials

      • Sticky notes
      • Markers
      • Whiteboard
      • Paper
      • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

      Participants

      • CIO
      • Senior IT Team

      1.1.2 Construct mission and vision statements (cont'd)

      1 hour

      Objective: Help teams define their purpose (why they exist) to build a mission statement (if one doesn't already exist).

      Step 4:

      1. Gather the IT strategy creation team and revisit your business context inputs, specifically the corporate vision statement.
      2. Share one or more examples of vision statements.
      3. Provide participants with sticky notes and writing materials and ask them to work individually for this step.
      4. Ask participants to brainstorm:
        1. What is the desired future state of the IT organization?
        2. How should we work to attain the desired state?
        3. How do we want IT to be perceived in the desired state?
      5. Provide participants with guidelines to build descriptive, compelling, and achievable statements regarding their desired future state.
      6. Regroup as a team and review participant answers.

      Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

      Input

      • Business vision statement
      • Business mission statement

      Output

      • IT mission statement
      • IT vision statement

      Materials

      • Sticky notes
      • Markers
      • Whiteboard
      • Paper
      • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

      Participants

      • CIO
      • Senior IT Team

      1.1.2 Construct mission and vision statements (cont'd)

      1 hour

      Objective: Help teams define their purpose (why they exist) to build a mission statement (if one doesn't already exist).

      Step 5:

      1. Ask the team to post their notes on the wall.
      2. Have the team group the words that have a similar meaning or feeling behind them; this will create themes.
      3. When the group is done categorizing the statements into themes, ask if there's anything missing. Did they ensure alignment to the corporate vision statement? Are there any elements missing when considering alignment back to the corporate vision statement?

      Step 6:

      1. Consider each category as a component of your vision statement.
      2. Review each category with participants; define what the behavior looks like when it is being met and what it looks like when it isn't.
      3. As a facilitator, provide guidelines on word-smithing and finessing the language.
      4. Refer to the corporate vision statement periodically and ensure there is alignment.
      5. Document your final mission statement in your IT Strategy Presentation Template.

      Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

      Input

      • Business vision statement
      • Business mission statement

      Output

      • IT mission statement
      • IT vision statement

      Materials

      • Sticky notes
      • Markers
      • Whiteboard
      • Paper
      • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

      Participants

      • CIO
      • Senior IT Team

      1.1.2 Construct mission and vision statements (cont'd)

      Tips for online facilitation:

      • Pick an online whiteboard tool that allows participants to use a large, zoomable canvas.
      • Set up each topic at a different area of the board; spread them out just like you would do on the walls of a room.
      • Invite participants to zoom in and visit each section and add their ideas as sticky notes once you reach that section of the exercise.
      • If you're not using an online whiteboard, we'd recommend using a collaboration tool such as Google Docs or Teams Whiteboard to collect the information for each step under a separate heading. Invite everyone into the document but be very clear regarding editing rights.
      • Pre-create your screen deck and screen share this with your participants through your videoconferencing software. We'd also recommend sharing this so participants can go through the deck again during the reflection steps.
      • When facilitating group discussion, we'd recommend that participants use non-verbal means to indicate they'd like to speak. You can use tools like Teams' hand-raising tool, a reaction emoji, or have people put their hands up. The facilitator can then invite that person to talk.

      Source: Hyper Island

      Input

      • Business vision statement
      • Business mission statement

      Output

      • IT mission statement
      • IT vision statement

      Materials

      • Sticky notes
      • Markers
      • Whiteboard
      • Paper
      • Collaboration/brainstorming tool (whiteboard, flip chart, digital equivalent)

      Participants

      • CIO
      • Senior IT Team

      IT mission statements demonstrate IT's purpose

      The IT mission statement specifies the function's purpose or reason for being. The mission should guide each day's activities and decisions. The mission statements use simple and concise terminology and speak loudly and clearly, generating enthusiasm for the organization.

      Strong IT mission statements have the following characteristics:

      • Articulate the IT function's purpose and reason for existence
      • Describe what the IT function does to achieve its vision
      • Define the customers of the IT function
      • Are:
        • Compelling
        • Easy to grasp
        • Sharply focused
        • Inspirational
        • Memorable
        • Concise

      Sample IT Mission Statements:

      • To provide infrastructure, support, and innovation in the delivery of secure, enterprise-grade information technology products and services that enable and empower the workforce at [Company Name].
      • To help fulfill organizational goals, the IT department is committed to empowering business stakeholders with technology and services that facilitate effective processes, collaboration, and communication.
      • The mission of the information technology (IT) department is to build a solid, comprehensive technology infrastructure; to maintain an efficient, effective operations environment; and to deliver high-quality, timely services that support the business goals and objectives of ABC Inc.
      • The IT department has operational, strategic, and fiscal responsibility for the innovation, implementation, and advancement of technology at ABC Inc. in three main areas: network administration and end-user support, instructional services, and information systems. The IT department provides leadership in long-range planning, implementation, and maintenance of information technology across the organization.
      • The IT group is customer-centered and driven by its commitment to management and staff. It oversees services in computing, telecommunications, networking, administrative computing, and technology training.

      Sample mission statements (cont'd)

      • To collaborate and empower our stakeholders through an engaged team and operational agility and deliver innovative technology and services.
      • To empower our stakeholders with innovative technology and services, through collaboration and agility.
      • To collaborate and empower our stakeholder, by delivering innovative technology and services, with an engaged team and operational agility.
      • To partner with departments and be technology leaders that will deliver innovative, secure, efficient, and cost-effective services for our citizens.
      • As a client-centric strategic partner, provide excellence in IM and IT services through flexible business solutions for achieving positive user experience and satisfaction.
      • Develop a high-performing global team that will plan and build a scalable, stable operating environment.
      • Through communication and collaboration, empower stakeholders with innovative technology and services.
      • Build a robust portfolio of technology services and solutions, enabling science-lead and business-driven success.
      • Guided by value-driven decision making, high-performing teams and trusted partners deliver and continually improve secure, reliable, scalable, and reusable services that exceed customer expectations.
      • Engage the business to grow capabilities and securely deliver efficient services to our users and clients.
      • Engage the business to securely deliver efficient services and grow capabilities for our users and clients.

      IT vision statements demonstrate what the IT organization aspires to be

      The IT vision statement communicates a desired future state of the IT organization. The statement is expressed in the present tense. It seeks to articulate the desired role of IT and how IT will be perceived.

      Strong IT vision statements have the following characteristics:

      • Describe a desired future
      • Focus on ends, not means
      • Communicate promise
      • Are:
        • Concise; no unnecessary words
        • Compelling
        • Achievable
        • Inspirational
        • Memorable

      Sample IT vision statements:

      • To be a trusted advisor and partner in enabling business innovation and growth through an engaged IT workforce.
      • The IT organization will strive to become a world-class value center that is a catalyst for innovation.
      • IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset.
      • Develop and maintain IT and an IT support environment that is secure, stable, and reliable within a dynamic environment.

      Sample vision statements (cont'd)

      • Alignment: To ensure that the IT organizational model and all related operational services and duties are properly aligned with all underlying business goals and objectives. Alignment reflects an IT operation "that makes sense," considering the business served, its interests and its operational imperatives.
      • Engagement: To ensure that all IT vision stakeholders are fully engaged in technology-related planning and the operational parameters of the IT service portfolio. IT stakeholders include the IT performing organization (IT Department), company executives and end-users.
      • Best Practices: To ensure that IT operates in a standardized fashion, relying on practical management standards and strategies properly sized to technology needs and organizational capabilities.
      • Commitment to Customer Service: To ensure that IT services are provided in a timely, high-quality manner, designed to fill the operational needs of the front-line end-users, working within the boundaries established by business interests and technology best practices.

      Quoted From ITtoolkit, 2020

      Case Study

      Acme Corp. was able to construct its IT mission and vison statements by aligning to its corporate mission and vision.

      INDUSTRY: Professional Services
      COMPANY: This case study is based on a real company but was anonymized for use in this research.

      Business

      IT

      Mission

      Vision

      Mission

      Vision

      We help IT leaders achieve measurable results by systematically improving core IT processes, governance, and critical technology projects.

      Acme Corp. will grow to become the largest research firm across the industry by providing unprecedented value to our clients.

      IT provides innovative product solutions and leadership that drives growth and success.

      We will relentlessly drive value to our customers through unprecedented innovation.

      IT guiding principles set the boundaries for your strategy

      Strategic guiding principles advise the IT organization on the boundaries of the strategy.

      Guiding principles are a priori decisions that limit the scope of strategic thinking to what is acceptable organizationally, from budgetary, people, and partnership standpoints. Guiding principles can cover other dimensions, as well.

      Organizational stakeholders are more likely to follow IT principles when a rationale is provided.

      After defining the set of IT principles, ensure that they are all expanded upon with a rationale. The rationale ensures principles are more likely to be followed because they communicate why the principles are important and how they are to be used. Develop the rationale for each IT principle your organization has chosen.

      IT guiding principles = IT strategy boundaries

      Consider these four components when brainstorming guiding principles

      Breadth

      of the IT strategy can span across the eight perspectives: people, process, technology, data, process, sourcing, location, and timing.

      Defining which of the eight perspectives is in scope for the IT strategy is crucial to ensuring the IT strategy will be comprehensive, relevant, and actionable.

      Depth

      of coverage refers to the level of detail the IT strategy will go into for each perspective. Info-Tech recommends that depth should go to the initiative level (i.e. individual projects).

      Organizational coverage

      will determine which part of the organization the IT strategy will cover.

      Planning horizon

      of the IT strategy will dictate when the target state should be reached and the length of the roadmap.

      Consider these criteria when brainstorming guiding principle statements

      Approach focused IT principles are focused on the approach, i.e. how the organization is built, transformed, and operated, as opposed to what needs to be built, which is defined by both functional and non-functional requirements.
      Business relevant Create IT principles that are specific to the organization. Tie IT principles to the organization's priorities and strategic aspirations.
      Long lasting Build IT principles that will withstand the test of time.
      Prescriptive Inform and direct decision-making with IT principles that are actionable. Avoid truisms, general statements, and observations.
      Verifiable If compliance can't be verified, the principle is less likely to be followed.
      Easily digestible IT principles must be clearly understood by everyone in IT and by business stakeholders. IT principles aren't a secret manuscript of the IT team. IT principles should be succinct; wordy principles are hard to understand and remember.
      Followed

      Successful IT principles represent a collection of beliefs shared among enterprise stakeholders. IT principles must be continuously reinforced to all stakeholders to achieve and maintain buy-in.

      In organizations where formal policy enforcement works well, IT principles should be enforced through appropriate governance processes.

      Review ten universal IT principles to determine if your organization wishes to adopt them

      IT principle name

      IT principle statement

      1. Enterprise value focus We aim to provide maximum long-term benefits to the enterprise as a whole while optimizing total costs of ownership and risks.
      2. Fit for purpose We maintain capability levels and create solutions that are fit for purpose without over engineering them.
      3. Simplicity We choose the simplest solutions and aim to reduce operational complexity of the enterprise.
      4. Reuse > buy > build We maximize reuse of existing assets. If we can't reuse, we procure externally. As a last resort, we build custom solutions.
      5. Managed data We handle data creation, modification, and use enterprise-wide in compliance with our data governance policy.
      6. Controlled technical diversity We control the variety of technology platforms we use.
      7. Managed security We manage security enterprise-wide in compliance with our security governance policy.
      8. Compliance to laws and regulations We operate in compliance with all applicable laws and regulations.
      9. Innovation We seek innovative ways to use technology for business advantage.
      10. Customer centricity We deliver best experiences to our customers with our services and products.

      1.1.3 Elicit guiding principles

      1 hour

      Objective: Generate ideas for guiding principle statements with silent sticky note writing.

      1. Gather the IT strategy creation team and revisit your mission and vision statements.
      2. Ask the group to brainstorm answers individually, silently writing their ideas on separate sticky notes. Provide the brainstorming criteria from the previous slide to all team members. Allow the team to put items on separate notes that can later be shuffled and sorted as distinct thoughts.
      3. After a set amount of time, ask the members of the group to stick their notes to the whiteboard and quickly present them. Categorize all ideas into four major buckets: breadth, depth, organizational coverage, and planning horizon. Ideally, you want one guiding principle to describe each of the four components.
      4. If there are missing guiding principles in any category or anyone's items inspire others to write more, they can stick those up on the wall too, after everyone has presented.
      5. Discuss and finalize your IT guiding principles.
      6. Document your guiding principles in the IT Strategy Presentation Template in Section 1.

      Source: Hyper Island

      Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

      Input

      • Four components for eliciting guiding principles
      • Mission and vision statements

      Output

      • IT guiding principles
      • IT strategy scope

      Materials

      • Sticky notes
      • Whiteboard
      • Paper
      • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

      Participants

      • CIO
      • Senior IT Team

      Guiding principle examples

      • Alignment: Our IT decisions will align with [our organization's] strategic plan.
      • Resources: We will allocate cyber-infrastructure resources based on providing the greatest value and benefit for [the community].
      • User Focus: User needs will be a key component in all IT decisions.
      • Collaboration: We will work within and across organizational structures to meet strategic goals and identify opportunities for innovation and improvement.
      • Transparency: We will be transparent in our decision making and resource use.
      • Innovation: We will value innovative and creative thinking.
      • Data Stewardship: We will provide a secure but accessible data environment.
      • IT Knowledge and Skills: We will value technology skills development for the IT community.
      • Drive reduced costs and improved services
      • Deploy packaged apps – do not develop – retain business process knowledge expertise – reduce apps portfolio
      • Standardize/Consolidate infrastructure with key partners
      • Use what we sell, and help sell
      • Drive high-availability goals: No blunders
      • Ensure hardened security and disaster recovery
      • Broaden skills (hard and soft) across the workforce
      • Improve business alignment and IT governance

      Quoted From: Office of Information Technology, 2014; Future of CIO, 2013

      Case Study

      Acme Corp. elicited guiding principles that set the scope of its IT strategy for FY21.

      INDUSTRY: Professional Services
      COMPANY: Acme Corp.

      The following guiding principles define the values that drive IT's strategy in FY23 and provide the criteria for our 12-month planning horizon.

      • We will focus on big-ticket items during the next 12 months.
      • We will keep the budget within 5%+/- YOY.
      • We will insource over outsource.
      • We will develop a cloud-first technology stack.

      Finalize your IT strategy scope

      Your mission and vision statements and your guiding principles should be the first things you communicate on your IT strategy document.

      Why is this important?

      • Communicating these elements shows how IT supports the corporate direction.
      • The vision and mission statements will clearly articulate IT's aspirations and purpose.
      • The guiding principles will clearly articulate how IT plans to support the business strategically.
      • These elements set expectations with stakeholders for the rest of your strategy.

      Input information into the IT Strategy Presentation Template.

      an image showing the IT Strategy Scope.

      Summary of Accomplishment

      Established the scope of your IT strategy

      • Constructed the IT mission statement to communicate the IT organization's reason for being.
      • Constructed the IT vision statement to communicate the desired future state of the IT organization.
      • Elicited IT's guiding principles to communicate the overall scope and time horizon for the strategy.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Step 1.2

      Business Goal Alignment

      Activities

      1.2.1 Intake identification and analysis

      1.2.2 Survey results analysis

      1.2.3 Goal brainstorming

      1.2.4 Goal association and analysis

      This step requires the following inputs:

      • Last year's accomplished project list
      • Business unit input source list
      • Goal list
      • In-flight initiatives list

      This step involves the following participants:

      • Business leadership
      • Project Management Office
      • Service Desk
      • Business Relationship Management
      • Solution or Enterprise Architecture
      • Roadmap team

      Outcomes of this step

      • Intake analysis
      • Goal list
      • Initiative-to-goal map

      Identify who is expecting what from the infrastructure

      "Typically, IT thinks in an IT first, business second, way: 'I have a list of problems and if I solve them, the business will benefit.' This is the wrong way of thinking. The business needs to be thought of first, then IT."

      – Fred Chagnon, Infrastructure Director,
      Info-Tech Research Group

      Info-Tech Insight

      If you're not soliciting input from or delivering on the needs of the various departments in your company, then who is? Be explicit and track how you communicate with each individual unit within your company.

      Mature project portfolio management and enterprise architecture practices are no substitute for understanding your business clientele.

      It may not be a democracy, but listening to everyone's voice is an essential step toward generating a useful roadmap.

      Building good infrastructure requires an understanding of how it will be used. Explicit consultation with stakeholders maximizes a roadmap's usefulness and holds the enterprise accountable in future roadmap iterations as goals change.

      Who are the customers for infrastructure?

      Internal customer examples:

      • Network Operations manager
      • IT Systems manager
      • Webmaster
      • Security manager

      External customer examples:

      • Director of Sales
      • Operations manager
      • Applications manager
      • Clients
      • Partners and consultants
      • Regulators/government

      1.2.1 Intake identification and analysis

      1 hour

      The humble checklist is the single most effective tool to ensure we don't forget someone or something:

      1. Have everyone write down their top five completed projects from last year – one project per sticky note.
      2. Organize everyone's sticky notes on a whiteboard according to input source – did these projects come from the PMO? Directly from a BRM? Service request? VP or LoB management?
      3. Make a MECE list of these sources on the left-hand side of a whiteboard.
      4. On the right-hand side list all the departments or functional business units within the company.
      5. Draw lines from right to left indicating which business units use which input source to request work.
      6. Optional: Rate the efficacy of each input channel – what is the success rate of projects per channel in terms of time, budget, and functionality?

      Discussion:

      1. How clearly do projects and initiatives arrive at infrastructure to be acted on? Do they follow the predictable formal process with all the needed information or is it more ad hoc?
      2. Can we validate that business units are using the correct input channel to request the appropriate work? Does infrastructure have to spend more time validating the requests of any one channel?
      3. Can we identify business units that are underserved? How about overserved? Infrastructure initiatives tend to be near universal in effect – are we forgetting anyone?
      4. Are all these methods passive (order taking), or is there a process for infrastructure to suggest an initiative or project?

      Input

      • Last year's accomplished project list

      Output

      • Work requested workflow and map

      Materials

      • Sticky notes
      • Whiteboard & markers

      Participants

      • Roadmap team

      Case Study

      Building IT governance and digital infrastructure for tech-enabled student experiences

      INDUSTRY: Education
      COMPANY: Collegis Education

      Challenge

      In 2019, Saint Francis University decided to expand its online program offering to reach students outside of its market.

      It had to first transform its operations to deliver a high-quality, technology-enabled student experience on and off campus. The remote location of the campus posed power outages, Wi-Fi issues, and challenges in attracting and retaining the right staff to help the university achieve its goals.

      It began working with an IT consulting firm to build a long-term strategic roadmap.

      Solution

      The consultant designed a strategic multi-year roadmap for digital transformation that would prioritize developing infrastructure to immediately improve the student experience and ultimately enable the university to scale its online programs. The consultant worked with school leadership to establish a virtual CIO to oversee the IT department's strategy and operations. The virtual CIO quickly became a key advisor to the president and board, identifying gaps between technology initiatives and enrollment and revenue targets. St. Francis staff also transitioned to the consultant's technology team, allowing the university to alleviate its talent acquisition and retention challenges.

      Results

      • $200,000 in funds reallocated to help with upgrades due to streamlined technology infrastructure
      • Updated card access system for campus staff and students
      • Active directory implementation for a secure and strong authentication technology
      • An uninterruptible power supply (UPS) backup is installed to ensure power continues in the event of a power outage
      • Upgrade to a reliable, campus-wide Wi-Fi network
      • Behind-the-scenes upgrades like state-of-the-art data centers to stabilize aging technology for greater reliability

      Track your annual activity by business unit – not by input source

      A simple graph showing the breakdown of projects by business unit is an excellent visualization of who is getting the most from infrastructure services.

      Show everyone in the organization that the best way to get anything done is by availing themselves of the roadmap process.

      An image of two bar graphs, # of initiatives requested
by customer; # of initiatives proposed to customer.

      Enable technology staff to engage in business storytelling by documenting known goals in a framework

      Without a goal framework

      Technology-focused IT staff are notoriously disconnected from the business process and are therefore often unable to explain the outcomes of their projects in terms that are meaningful to the business.

      With a goal framework

      When business, IT, and infrastructure goals are aligned, the business story writes itself as you follow the path of cascading goals upward.

      Info-Tech Best Practice

      So many organizations we speak with don't have goals written down. This rarely means that the goals aren't known, rather that they're not clearly communicated.

      When goals aren't clear, personal agendas can take precedence. This is what often leads to the disconnect between what the business wants and what IT is delivering.

      1.2.2 Survey and results analysis

      1 hour

      Infrastructure succeeds by effectively scaling shared resources for the common good. Sometimes that is a matter of aggregating similarities, sometimes by recognizing where specialization is required.

      1. Have every business unit provide their top three to five current goals or objectives for their department. Emphasize that you are requesting their operational objectives, not just the ones they think IT may be able to help them with.
      2. Put each goal on a sticky note (optional: use a unique sticky note or marker color for each department) and place them on a whiteboard.
      3. Group the sticky notes according to common themes.
      4. Rank each grouping according to number of occurrences.

      Discussion:

      1. This is very democratic. Do certain departments' goals carry more weight more than others?
      2. What is the current business prioritization process? Do the results of our activity match with the current published output of this process?
      3. Consider each business goal in the context of infrastructure activity or technology feature or capability. As infrastructure is a lift function existing only to serve the business, it is important to understand our world in context.

      Examples: The VP of Operations is looking to reduce office rental costs over the next three years. The VP of Sales is focused on increasing the number of face-to-face customer interactions. Both can potentially be served by IT activities and technologies that increase mobility.

      Input

      • Business unit input source list

      Output

      • Prioritized list of business goals

      Materials

      • Sticky notes
      • Whiteboard & markers

      Participants

      • Roadmap team

      1.2.3 Goal brainstorming – Affinity diagramming exercise

      1 hour

      Clarify how well you understand what the business wants.

      1. Ask each participant to consider: "What are the top three priorities of the company [this period]?" They should consider not what they think the priorities should be, but their understanding of what business leadership's priorities actually are.
      2. Have each participant write down their three priorities on sticky notes – one per note.
      3. Select a moderator from the group – not the infrastructure leader or the CIO. The moderator will begin by placing (and explaining) their sticky notes on the whiteboard.
      4. Have each participant place and explain their sticky notes on the whiteboard.
      5. The moderator will assist each participant in grouping sticky notes together based on theme.
      6. Groups that become overly large may be broken into smaller, more precise themes.
      7. Once everyone has placed their sticky notes, and the groups have been arranged and rearranged, you should have a visual representation of infrastructure's understanding of the business' priorities.
      8. Let the infrastructure leader and/or CIO place their sticky notes last.

      Discussion:

      Is there a lot of agreement within the group? What does it mean if there are 10 or 15 groups with equal numbers of sticky notes? What does it mean if there are a few top groups and dozens of small outliers?

      How does the group's understanding compare with that of the Director and/or CIO?

      What mechanisms are in place for the business to communicate their goals to infrastructure? Are they effective? Does the team take the time to reimagine those goals and internalize them?

      What does it mean if infrastructure's understanding differs from the business?

      Input

      • Business unit input source list

      Output

      • Prioritized list of business goals

      Materials

      • Sticky notes
      • Whiteboard & markers

      Participants

      • Roadmap team

      Additional Activity

      Now that infrastructure has a consensus on what it thinks the business' goals are, suggest a meeting with leadership to validate this understanding. Once the first picture is drawn, a 30-minute meeting can help clear up any misconceptions.

      Build your own framework or start with these three root value drivers

      With a framework of cascading goals in place, a roadmap is a Rosetta Stone. Being able to map activities back to governance objectives allows you to demonstrate value regardless of the audience you are addressing.

      An image of the framework for developing a roadmap using three root value drivers.

      (Info-Tech, Build a Business-Aligned IT Strategy 2022)

      1.2.4 Goal association exercise and analysis

      1 hour

      Wherever possible use the language of your customers to avoid confusion, but at least ensure that everyone in infrastructure is using a common language.

      1. Take your business strategy or IT strategy or survey response (Activity 1.2.3) or Info-Tech's fundamental goals list (strategic agility, improved cash flow, innovate product, safety, standardize end-user experience) and write them across the top of a whiteboard.
      2. Have everyone write, on a sticky note, their current in-flight initiatives – one per sticky note.
      3. Have each participant then place each of their sticky notes on the whiteboard and draw a line from the initiative to the goal it supports.
      4. The rest of the group should challenge any relationships that seem unsupported or questionable.

      Discussion:

      1. How many goals are you supporting? Are there too many? Are you doing enough to support the right goals?
      2. Is there a shared understanding of the business goals among the infrastructure staff? Or, do questions about meaning keep coming up?
      3. Do you have initiatives that are difficult to express in terms of business goals? Do you have a lot of them or just a few?

      Input

      • Goal list
      • In-flight initiatives list

      Output

      • Initiatives-to-goals map

      Materials

      • Whiteboard & markers

      Participants

      • Roadmap team

      Summary of Accomplishment

      Review performance from last fiscal year.

      • Analyzed and communicated the benefits and value realized from IT's strategic initiatives in the past fiscal year.
      • Analyzed and prioritized diagnostic data insights to communicate IT success stories.
      • Elicited important retrospective information such as KPIs, financials, etc. to build IT's credibility as a strategic business partner.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Phase 2

      Envision Future and Analyze Constraints

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Infrastructure strategy

      1.2 Goal alignment

      2.1 Define your future

      2.2 Conduct constraints analysis

      3.1 Drive business alignment

      3.2. Build the roadmap

      4.1 Identify the audience

      4.2 Process improvement

      and measurements

      This phase will walk you through the following activities:

      • Determine from a greenfield perspective what the future state looks like.
      • Do SWOT analysis on technology you may plan to use in the future.
      • Complete a time study.

      This phase involves the following participants:

      • Roadmap team

      Step 2.1

      Define the future state

      Activities

      2.1.1 Define your future infrastructure vision

      2.1.2 Document desired future state

      2.1.3 Develop a new technology identification process

      2.1.4 Conduct a SWOT analysis

      This step requires the following inputs:

      • Emerging technology interest

      This step involves the following participants:

      • Roadmap team
      • External SMEs

      Outcomes of this step

      • Technology discovery process
      • Technology assessment process
      • Future state vision document

      Future state discussion

      "Very few of us are lucky enough to be one of the first few employees in a new organization. Those of you who get to plan the infrastructure with a blank slate and can focus all of your efforts on doing things right the first time."

      BMC, 2018

      "A company's future state is ultimately defined as the greater vision for the business. It's where you want to be, your long-term goal in terms of the ever-changing state of technology and how that applies to your present-day business."
      "Without a definitive future state, a company will often find themselves lacking direction, making it harder to make pivotal decisions, causing misalignment amongst executives, and ultimately hindering the progression and growth of a company's mission."
      Source: Third Stage Consulting

      "When working with digital technologies, it is imperative to consider how such technologies can enhance the solution. The future state should communicate the vision of how digital technologies will enhance the solutions, deliver value, and enable further development toward even greater value creation."
      Source: F. Milani

      Info-Tech Insight

      Define your infrastructure roadmap as if you had a blank slate – no constraints, no technical debt, and no financial limitations. Imagine your future infrastructure and let that vision drive your roadmap.

      Expertise is not innate; it requires effort and research

      Evaluating new enterprise technology is a process of defining it, analyzing it, and sourcing it.

      • Understand what a technology is in order to have a common frame of reference for discussion. Just as important, understand what it is not.
      • Conduct an internal and external analysis of the technology including an adoption case study.
      • Provide an overview of the vendor landscape, identifying the leading players in the market and how they differentiate their offerings.

      This is not intended to be a thesis grade research project, nor an onerous duty. Most infrastructure practitioners came to the field because of an innate excitement about technology! Harness that excitement and give them four to eight hours to indulge themselves.

      An output of approximately four slides per technology candidate should be sufficient to decided if moving to PoC or pilot is warranted.

      Including this material in the roadmap helps you control the technology conversation with your audience.

      Info-Tech Best Practices

      Don't start from scratch. Recall the original sources from your technology watchlist. Leverage vendors and analyst firms (such as Info-Tech) to give the broad context, letting you focus instead on the specifics relevant to your business.

      Channel emerging technologies to ensure the rising tide floats all boats rather than capsizing your business

      Adopting the wrong new technology can be even more dangerous than failing to adopt any new technology.

      Implementing every new promising technology would cost prodigious amounts of money and time. Know the costs before choosing what to invest in.

      The risk of a new technology failing is acceptable. The risk of that failure disrupting adjacent core functions is unacceptable. Vet potential technologies to ensure they can be safely integrated.

      Best practices for new technologies are nonexistent, standards are in flux, and use cases are fuzzy. Be aware of the unforeseen that will negatively affect your chances of a successful implementation.

      "Like early pioneers crossing the American plains, first movers have to create their own wagon trails, but later movers can follow in the ruts."
      Harper Business, 2014

      Info-Tech Insight

      The right technology for someone else can easily be the wrong technology for your business.

      Even with a mature Enterprise Architecture practice, wrong technology bets can happen. Minimize the chance of this occurrence by making selection an infrastructure-wide activity. Leverage the practical knowledge of the day-to-day operators.

      First Mover

      47% failure rate

      Fast Follower

      8% failure rate

      2.1.1 Create your future infrastructure vision

      1 hour

      Objective: Help teams define their future infrastructure state (assuming zero constraints or limitations).

      1. Ask each participant to ponder the question: "How would the infrastructure look if there were no limitations?" They should consider all aspects of their infrastructure but keep in mind the infrastructure vision and mission statements from phase one, as well as the business goals.
      2. Have each participant write down their ideas on sticky notes – one per note.
      3. Select a moderator and a scribe from the group – not the infrastructure leader or the CIO. The moderator will begin by placing (and explaining) their sticky notes on the whiteboard. The scribe will summarize the results in short statements at the end.
      4. Have each participant place and explain their sticky notes on the whiteboard.
      5. The moderator will assist each participant in grouping sticky notes together based on theme.
      6. Once everyone has placed their sticky notes and groups have been arranged and rearranged, you should have a visual representation of infrastructure's understanding of the business' priorities.
      7. Let the infrastructure leader and/or CIO place their sticky notes last.

      Discussion:

      1. Assume a blank slate as a starting point. No technical debt or financial constraints; nothing holding you back.
      2. Can SaaS, PaaS, or other cloud-based offerings play a role in this future utopia?
      3. Do vendors play a larger or smaller role in your future infrastructure vision?

      Download the IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

      Input

      • Thoughts and ideas about how the future infrastructure should look.

      Output

      • Future state vision

      Materials

      • Sticky notes
      • Whiteboard & markers

      Participants

      • Roadmap team

      2.1.1 Document your future state vision (cont'd)

      Objective: Help teams define their future infrastructure state (assuming zero constraints or limitations).

      1 hour

      Steps:

      1. The scribe will take the groups of suggestions and summarize them in a statement or two, briefly describing the infrastructure in that group.
      2. The statements should be recorded on Tab 2 of the Infrastructure Strategy and Roadmap Tool.

      Discussion:

      • Should the points be listed in any specific order?
      • Include all suggestions in the summary. Remember this is a blank slate with no constraints, and no idea is higher or lower in weight at this stage.
      Infrastructure Future State Vision
      Item Focus Area Future Vision
      1 Email Residing on Microsoft 365
      2 Servers Hosted in cloud - nothing on prem.
      3 Endpoints virtual desktops on Microsoft Azure
      4 Endpoint hardware Chromebooks
      5 Network internet only
      6 Backups cloud based but stored in multiple cloud services
      7

      Download Info-Tech's Infrastructure Strategy and Roadmap Tool and document your future state vision in the Infrastructure Future State tab.

      Input

      • Thoughts and ideas about how the future infrastructure should look.

      Output

      • Future state vision

      Materials

      • Sticky notes
      • Whiteboard & markers

      Participants

      • Roadmap team

      2.1.2 Identification and association exercise

      1 hour

      Formalize what is likely an ad hoc process.

      1. Brainstorm with the group a list of external sources they are currently using to stay abreast of the market.
      2. Organize this list on the left-hand side of a whiteboard, in vendor and vendor-neutral groups.
        1. For each item in the list ask a series of questions:
        2. Is this a push or pull source?
        3. Is this source suited to individual or group consumption?
        4. What is the frequency of this source?
      3. What is the cost of this source to the company?
      4. On the right-hand side of the whiteboard brainstorm a list of internal mechanisms for sharing new technology information. Ask about the audience, distribution mode, and frequency for each of those mechanisms.
      5. Map which of the external sources make it over to internal distribution.

      Discussion:

      1. Are we getting the most value out of our high-cost conferences? Does that information make it from the attendees to the rest of the team?
      2. Do we share information only within our domains? Or across the whole infrastructure practice?
      3. Do we have sufficient diversity of sources? Are we in danger of believing one vendor's particular market interpretation?
      4. How do we select new technologies to explore further? Make it fun – upvotes, for example.

      Input

      • Team knowledge
      • Conference notes
      • Expense reports

      Output

      • Internal socialization process
      • Tech briefings & repository

      Materials

      • Whiteboard & markers

      Participants

      • Roadmap team

      Info-Tech Best Practices

      It is impractical for everyone to present their tech briefing at the monthly meeting. But you want to avoid a one-to-many exercise. Keep the presenter a secret until called on. Those who do not present live can still contribute their material to the technology watchlist database.

      Analyze new technologies for your future state

      Four to eight hours of research per technology can uncover a wealth of relevant information and prepare the infrastructure team for a robust discussion. Key research elements include:

      • Précis: A single page or slide that describes the technology, outlines some of the vendors, and explores the value proposition.
      • SWOT Analysis:
        • Strengths and weaknesses: What does the technology inherently do well (e.g. lots of features) and what does it do poorly (e.g. steep learning curve)?
        • Opportunities and threats: What capabilities can the technology enable (e.g. build PCs faster, remote sensing)? Why would we not want to exploit this technology (e.g. market volatility, M&As)

      a series of four screenshots from the IT Infrastructure Strategy and Roadmap Report Template

      Download the IT Infrastructure Strategy and Roadmap Report Template slides 21, 22, 23 for sample output.

      Position infrastructure as the go-to source for information about new technology

      One way or another, tech always seems to finds its way into infrastructure's lap. Better to stay in front and act as stewards rather than cleanup crew.

      Beware airline magazine syndrome!

      Symptoms

      Pathology
      • Leadership speaking in tech buzzwords
      • Urgent meetings to discuss vaguely defined topics
      • Fervent exclamations of "I don't care how – just get it done!"
      • Management showing up on at your doorstep needing help with their new toy

      Outbreaks tend to occur in close proximity to

      • Industry trade shows
      • Excessive executive travel
      • Vendor BRM luncheons or retreats with leadership
      • Executive golf outings with old college roommates

      Effective treatment options

      1. Targeted regular communication with a technology portfolio analysis customized to the specific goals of the business.
      2. Ongoing PoC and piloting efforts with detailed results reporting.

      While no permanent cure exists, regular treatment makes this chronic syndrome manageable.

      Keep your roadmap horizon in mind

      Technology doesn't have to be bleeding edge. New-to-you can have plenty of value.

      You want to present a curated landscape of technologies, demonstrating that you are actively maintaining expertise in your chosen field.

      Most enterprise IT shops buy rather than develop their technology, which means they want to focus effort on what is market available. The outcome is that infrastructure sponsors and delivers new technologies whose capabilities and features will help the business achieve its goals on this roadmap.

      If you want to think more like a business disruptor or innovator, we suggest working through the blueprint Exploit Disruptive Infrastructure Technology.
      Explore technology five to ten years into the future!

      a quadrant analysis comparing innovation and transformation, as well as two images from Exploit Disruptive Infrastructure Technology.

      Info-Tech Insight

      The ROI of any individual effort is difficult to justify – in aggregate, however, the enterprise always wins!
      Money spent on Google Glass in 2013 seemed like vanity. Certainly, this wasn't enterprise-ready technology. But those early experiences positioned some visionary firms to quickly take advantage of augmented reality in 2018. Creative research tends to pay off in unexpected and unpredictable ways.
      .

      2.1.3 Working session, presentation, and feedback

      1 hour

      Complete a SWOT analysis with future state technology.

      The best research hasn't been done in isolation since the days of da Vinci.

      1. Divide the participants into small groups of at least four people.
      2. Further split those groups into two teams – the red team and the white team.
      3. Assign a technology candidate from the last exercise to each group. Ideally the group should have some initial familiarity with the technology and/or space.
      4. The red team from each group will focus on the weaknesses and threats of the technology. The white team will focus on the strengths and opportunities of the technology.
      5. Set a timer and spend the next 30-40 minutes completing the SWOT analysis.
      6. Have each group present their analysis to the larger team. Encourage conversation and debate. Capture and refine the understanding of the analysis.
      7. Reset with the next technology candidate. Have the participants switch teams within their groups.
      8. Continue until you've exhausted your technology candidates.

      Discussion:

      1. Does working in a group make for better research? Why?
      2. Do you need specific expertise in order to evaluate a technology? Is an outsider (non-expert) view sometimes valuable?
      3. Is it easier to think of the positive or the negative qualities of a technology? What about the internal or external implications?

      Input

      • Technology candidates

      Output

      • Technology analysis including SWOT

      Materials

      • Projector
      • Templates
      • Laptops & internet

      Participants

      • Roadmap team

      Step 2.2

      Constraints analysis

      Activities

      2.2.1 Historical spend analysis

      2.2.2 Conduct a time study

      2.2.3 Identify roadblocks

      This step requires the following inputs:

      • Historical spend and staff numbers
      • Organizational design identification and thought experiment
      • Time study
      • Roadblock brainstorming session
      • Prioritization exercise

      This step involves the following participants:

      • Financial leader
      • HR Leader
      • Roadmap team

      Outcomes of this step

      • OpEx, CapEx, and staffing trends
      • Domain time study
      • Prioritized roadblock list

      2.2.1 Historical spend analysis

      "A Budget is telling your money where to go, instead of wondering where it went."
      -David Ramsay

      "Don't tell me where your priorities are. Show me where you spend your money and I'll tell you what they are"
      -James Frick, Due.com

      Annual IT budgeting aligns with business goals
      a circle showing 68%, broken down into 50% and 18%

      50% of businesses surveyed see that improvements are necessary for IT budgets to align to business goals, while 18% feel they require significant improvements to align to business goals
      Source: ITRG Diagnostics 2022

      Challenges in IT spend visibility

      68%

      Visibility of all spend data for on-prem, SaaS and cloud environments
      Source: Flexera

      The challenges that keep IT leaders up at night

      47%

      Lack of visibility in resource usage and cost
      Source: BMC, 2021

      2.2.1 Build a picture of your financial spending and staffing trends

      Follow the steps below to generate a visualization so you can start the conversation:

      1 hour

      1. Open the Info-Tech Infrastructure Roadmap Financial Spend Analysis Tool.
      2. The Instructions tab will provide guidance, or you can follow the instructions below.
      3. Insert values into the appropriate uncolored blocks in the first 4 rows of the Spend Record Entry tab to reflect the amount spent on IT OpEx, IT CapEx, or staff numbers for the present year (budgeted) as well as the previous five years.
      4. Data input populates cells in subsequent rows to quickly reveal spending ratios.

      an image of the timeline table from the Infrastructure Roadmap Financial Analysis Tool

      Download the Infrastructure Roadmap Financial Analysis Tool
      ( additional Deep Dive available if required)

      Input

      • Historical spend and staff numbers

      Output

      • OpEx, CapEx, and staffing trends for your organization

      Materials

      • Info-Tech's Infrastructure Roadmap Financial Spend Analysis Tool

      Participants

      • Infrastructure leader
      • Financial leader
      • HR leader

      2.2.1 Build a picture of your financial spending and staffing trends (cont'd)

      Continue with the steps below to generate a visualization so you can start the conversation.

      1 hour

      1. Select tab 3 (Results) to reveal a graphical analysis of your data.
      2. Trends are shown in graphs for OpEx, CapEx, and staffing levels as well as comparative graphs to show broader trends between multiple spend and staffing areas.
      3. Some observations worth noting may include the following:
        • Is OpEx spending increasing over time or decreasing?
        • Is CapEx increasing or decreasing?
        • Are OpEx and CapEx moving in the same directions?
        • Are IT staff to total staff ratios increasing or decreasing?
        • Trends will continue in the same direction unless changes are made.

      Download the Infrastructure Roadmap Financial Analysis Tool
      ( additional Deep Dive available if required)

      Input

      • Historical spend and staff numbers

      Output

      • OpEx, CapEx, and staffing trends for your organization

      Materials

      • Info-Tech's Infrastructure Roadmap Financial Spend Analysis Tool

      Participants

      • Infrastructure leader
      • Financial leader
      • HR leader

      Consider perceptions held by the enterprise when dividing infrastructure into domains

      2.2.2 Conduct a time study

      Internal divisions that seem important to infrastructure may have little or even negative value when it comes to users accessing their services.

      Domains are the logical divisions of work within an infrastructure practice. Historically, the organization was based around physical assets: servers, storage, networking, and end-user devices. Staff had skills they applied according to specific best practices using physical objects that provided functionality (computing power, persistence, connectivity, and interface).

      Modern enterprises may find it more effective to divide according to activity (analytics, programming, operations, and security) or function (customer relations, learning platform, content management, and core IT). As a rule, look to your organizational chart; managers responsible for buying, building, deploying, or supporting technologies should each be responsible for their own domain.

      Regardless of structure, poor organization leads to silos of marginally interoperable efforts working against each other, without focus on a common goal. Clearly defined domains ensure responsibility and allow for rapid, accurate, and confident decision making.

      • Server
      • Network
      • Storage
      • End User
      • DevOps
      • Analytics
      • Core IT
      • Security

      Info-Tech Insight

      The medium is the message. Do stakeholders talk about switches or storage or services? Organizing infrastructure to match its external perception can increase communication effectiveness and improve alignment.

      Case Study

      IT infrastructure that makes employees happier

      INDUSTRY: Services
      SOURCE: Network Doctor

      Challenge

      Atlas Electric's IT infrastructure was very old and urgently needed to be refreshed. Its existing server hardware was about nine years old and was becoming unstable. The server was running Windows 2008 R2 server operating systems that was no longer supported by Microsoft; security updates and patches were no longer available. They also experienced slowdowns on many older PCs.

      Recommendations for an upgrade were not approved due to budgetary constraints. Recommendations for upgrading to virtual servers were approved following a harmful phishing attack.

      Solution

      The following improvements to their infrastructure were implemented.

      • Installing a new physical host server running VMWare ESXi virtualization software and hosting four virtual servers.
      • Migration of data and applications to new virtual servers.
      • Upgrading networking equipment and deploying new relays, switches, battery backups, and network management.
      • New server racks to host new hardware.

      Results

      Virtualization, consolidating servers, and desktops have made assets more flexible and simpler to manage.

      Improved levels of efficiency, reliability, and productivity.

      Enhanced security level.

      An upgraded backup and disaster recovery system has improved risk management.

      Optimize where you spend your time by doing a time study

      Infrastructure activity is limited generally by only two variables: money and time. Money is in the hands of the CFO, which leaves us a single variable to optimize.

      Not all time is spent equally, nor is it equally valuable. Analysis lets us communicate with others and gives us a shared framework to decide where our priorities lie.

      There are lots of frameworks to help categorize our activities. Stephen Covey (Seven Habits of Highly Effective People) describes a four-quadrant system along the axes of importance and urgency. Gene Kim, through his character Erik in The Phoenix Project,speaks instead of business projects, internal IT projects, changes, and unplanned work.

      We propose a similar four-category system.

      Project Maintenance

      Administrative

      Reactive

      Planned activity spent pursuing a business objective

      Planned activity spent on the upkeep of existing IT systems

      Planned activity required as a condition of employment

      Unplanned activity requiring immediate response

      This is why we are valuable to our company

      We have it in our power to work to reduce these three in order to maximize our time available for projects

      Survey and analysis

      Perform a quick time study.

      Verifiable data sources are always preferred but large groups can hold each other's inherent biases in check to get a reasonable estimate.

      1 hour

      1. Organize the participants into the domain groups established earlier.
      2. On an index card have each participant independently write down the percentage of time they think their entire domain (not themselves personally) spends during the average month, quarter, or year on:
        1. Admin
        2. Reactive work
        3. Maintenance
      3. Draw a matrix on the whiteboard; collect the index cards and transcribe the results from participants into the matrix.
      4. Add up the three reported time estimates and subtract from 100 – the result is the percentage of time available for/spent on project work.

      Discussion

      1. Certain domains should have higher percentages of reactive work (think Service Desk and Network Operations Center) – can we shift work around to optimize resources?
      2. Why is reactive work the least desirable type? Could we reduce our reactive work by increasing our maintenance work?
      3. From a planning perspective, what are the implications of only having x% of time available for project work?
      4. Does it feel like backing into the project work from adding the other three together provides a reasonable assessment?

      Input

      • Domain groups

      Output

      • Time study

      Materials

      • Whiteboard & markers
      • Index cards

      Participants

      • Roadmap team

      Quickly and easily evaluate all your infrastructure

      Strategic Infrastructure Roadmap Tool, Tab 2, Capacity Analysis

      In order to quickly and easily build some visualizations for the eventual final report, Info-Tech has developed the Strategic Infrastructure Roadmap Tool.

      • Up to five infrastructure domains are supported.
        • For practices that cannot be reasonably collapsed into five domains, multiple copies of the tool can be used and manually stitched together.
      • The tool can be used in either an absolute (total number) or relative mode (percentage of available).
      • By design we specifically don't ask for a project work figure but rather calculate it based on other values.
      • For everything but miscellaneous duties, hard data sources can (and where appropriate should) be leveraged.
        • Reactive work – service desk tool
        • Project work – project management tool
        • Maintenance work – logs or ITSM tool
      • Individual domains' values are calculated, as well as the overall breakdown for the infrastructure practice.
      • Even these rough estimates will be useful during the planning steps throughout the rest of the roadmap process.

      an image of the source capacity analysis page from tab 2 of the Strategic Infrastructure Roadmap Tool

      Please note that this tool requires Microsoft's Power Pivot add-in to be installed if you are using Excel 2010 or 2013. The scatter plot labels on tabs 5 and 8 may not function correctly in Excel 2010.

      Build your roadmap from both the top and the bottom for best results

      Strong IT strategy favors top-down: activities enabling clearly dictated goals. The bottom-up approach aggregates ongoing activities into goals.

      Systematic approach

      External stakeholders prioritize a list of goals requiring IT initiatives to achieve.

      Roadblocks:

      • Multitudes of goals easily overwhelm scant IT resources.
      • Unglamorous yet vital maintenance activities get overlooked.
      • Goals are set without awareness of IT capacity or capabilities.

      Organic approach

      Practitioners aggregate initiatives into logical groups and seek to align them to one or more business goals.

      Roadblocks:

      • Pet initiatives can be perpetuated based on cult of personality rather than alignment to business goals.
      • Funding requests can fall flat when competing against other business units for executive support.

      A successful roadmap respects both approaches.

      an image of two arrows, intersecting with the words Infrastructure Roadmap with the top arrow labeled Systematic, and the bottom arrow being labeled Organic.

      Info-Tech Insight

      Perfection is anathema to practicality. Draw the first picture and not only expect but welcome conflicting feedback! Socialize it and drive the conversation forward to a consensus.

      2.2.3 Brainstorming – Affinity diagramming

      Identify the systemic roadblocks to executing infrastructure projects

      1 hour

      Affinity diagramming is a form of structured brainstorming that works well with larger groups and provokes discussion.

      1. Have each participant write down their top five impediments to executing their projects from last year – one roadblock per sticky note.
      2. Once everyone has written their top five, select a moderator from the group. The moderator will begin by placing (and explaining) their five sticky notes on the whiteboard.
      3. Have each participant then place and explain their sticky notes on the whiteboard.
      4. The moderator will assist participants in grouping sticky notes together based on theme.
      5. Groups that have become overly large may be broken into smaller, more precise themes.
      6. Once everyone has placed their sticky notes, you should be able to visually identify the greatest or most common roadblocks the group perceives.

      Discussion

      Categorize each roadblock identified as either internal or external to infrastructure's control.

      Attempt to understand the root cause of each roadblock. What would you need to ask for in order to remove the roadblock?

      Additional Research

      Also called the KJ Method (after its inventor, Jiro Kawakita, a 1960s Japanese anthropologist), this activity helps organize large amounts of data into groupings based on natural relationships while reducing many social biases.

      Input

      • Last years initiatives and their roadblocks

      Output

      • List of refined Roadblocks

      Materials

      • Sticky notes
      • Whiteboard & markers

      Participants

      • Roadmap team

      2.2.4 Prioritization exercise – Card sorting

      Choose your priorities wisely.

      Which roadblocks do you need to work on? How do you establish a group sense of these priorities? This exercise helps establish priorities while reducing individual bias.

      1 hour

      1. Distribute index cards that have been prepopulated with the roadblocks identified in the previous activity – one full set of cards to each participant.
      2. Have each participant sort their set-in order of perceived priority, highest on top.
      3. Where n=number of cards in the stack, take the n-3 lowest priority cards and put a tick mark in the upper-right-hand corner. Pass these cards to the person on the left, who should incorporate them into their pile (if you start with eight cards you're ticking and passing five cards). Variation: On the first pass, allow everyone to take the most important and least important cards, write "0th" and "NIL" on them, respectively, and set them aside.
      4. Repeat steps 2 and 3 for a total of n times. Treat duplicates as a single card in your hand.
      5. After the final pass, ask each participant to write the priority in the upper-left-hand corner of their top three cards.
      6. Collect all the cards, group by roadblock, count the number of ticks, and take note of the final priority.

      Discussion

      Total the number of passes (ticks) for each roadblock. A large number indicates a notionally low priority. No passes indicates a high priority.

      Are the internal or external roadblocks of highest priority? Were there similarities among participants' 0th and NILs compared to each other or to the final results?

      Input

      • Roadblock list

      Output

      • Prioritized roadblocks

      Materials

      • Index cards

      Participants

      • Roadmap team

      Summary of Accomplishment

      Review performance from last fiscal year

      • Analyzed and communicated the benefits and value realized from IT's strategic initiatives in the past fiscal year.
      • Analyzed and prioritized diagnostic data insights to communicate IT success stories.
      • Elicited important retrospective information such as KPIs, financials, etc. to build IT's credibility as a strategic business partner.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Phase 3

      Align and Build the Roadmap

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Infrastructure strategy

      1.2 Goal alignment

      2.1 Define your future

      2.2 Conduct constraints analysis

      3.1 Drive business alignment

      3.2. Build the roadmap

      4.1 Identify the audience

      4.2 Process improvement

      and measurements

      This phase will walk you through the following activities:

      • Elicit business context from the CIO & IT team
      • Identify key initiatives that support the business
      • Identify key initiatives that enable IT excellence
      • Identify initiatives that drive technology innovation
      • Build initiative profiles
      • Construct your strategy roadmap

      This phase involves the following participants:

      • Roadmap Team

      Step 3.1

      Drive business alignment

      Activities

      3.1.1 Develop a risk framework

      3.1.2 Evaluate technical debt

      This step requires the following inputs:

      • Intake identification and analysis
      • Survey results analysis
      • Goal brainstorming
      • Goal association and analysis

      This step involves the following participants:

      • Business leadership
      • Project Management Office
      • Service Desk
      • Business Relationship Management
      • Solution or Enterprise Architecture
      • Roadmap team

      Outcomes of this step

      • Intake analysis
      • Goal list
      • Initiative-to-goal map

      Speak for those with no voice – regularly review your existing portfolio of IT assets and services

      A chain is only as strong as its weakest link; while you'll receive no accolades for keeping the lights on, you'll certainly hear about it if you don't!

      Time has been a traditional method for assessing the fitness of infrastructure assets – servers are replaced every five years, core switches every seven, laptops and desktops every three. While quick, this framework of assessment is overly simplistic for most modern organizations.

      Building one that is instead based on the likelihood of asset failure plotted against the business impact of that failure is not overly burdensome and yields more practical results. Infrastructure focuses on its strength (assessing IT risk) and validates an understanding with the business regarding the criticality of the service(s) enabled by any given asset.

      Rather than fight on every asset individually, agree on a framework with the business that enables data-driven decision making.

      IT Risk Factors
      Age, Reliability, Serviceability, Conformity, Skill Set

      Business Risk Factors
      Suitability, Capacity, Safety, Criticality

      Info-Tech Insight

      Infrastructure in a cloud-enabled world: As infrastructure operations evolve it is important to keep current with the definition of an asset. Software platforms such as hypervisors and server OS are just as much an asset under the care and control of infrastructure as are cloud services, managed services from third-party providers, and traditional racks and switches.

      3.1.1 Develop a risk framework – Classification exercise

      While it's not necessary for each infrastructure domain to view IT risk identically, any differences should be intensely scrutinized.

      1 hour

      1. Divide the whiteboard along the axes of IT Risk and
        Business Risk (criticality) into quadrants:
        1. High IT Risk & High Biz Risk (upper right)
        2. Low IT Risk & Low Biz Risk (bottom left)
        3. Low IT Risk & High Biz Risk (bottom right)
        4. High IT Risk & Low Biz Risk (upper left)
      2. Have each participant write the names of two or three infrastructure assets or services they are responsible or accountable for – one name per sticky note.
      3. Have each participant come one-at-a-time and place their sticky notes in one quadrant.
      4. As each additional sticky note is placed, verify with the group that the relative positioning of the others is still accurate.

      Discussion:

      1. Most assets should end up in the lower-right quadrant, indicating that IT has lowered the risk of failure commensurate to the business consequences of a failure. What does this imply about assets in the other three quadrants?
      2. Infrastructure is foundational; do we properly document and communicate all dependencies for business-critical services?
      3. What actions can infrastructure take to adjust the risk profile of any given asset?

      Input

      • List of infrastructure assets

      Output

      • Notional risk analysis

      Materials

      • Whiteboard & markers
      • Sticky notes

      Participants

      • Roadmap team

      3.1.2 Brainstorming and prioritization exercise

      Identify the key elements that make up risk in order to refine your framework.

      A shared notional understanding is good, but in order to bring the business onside a documented defensible framework is better.

      1 hour

      1. Brainstorm (possibly using the affinity diagramming technique) the component elements of IT risk.
      2. Ensure you have a non-overlapping set of risk elements. Ensure that all the participants are comfortable with the definitions of each element. Write them on a whiteboard.
      3. Give each participant an equal number (three to five) of voting dots.
      4. As a group have the participants go the whiteboard and use their dots to cast their votes for what they consider to be the most important risk element(s). Participants are free to place any number of their dots on a single element.
      5. Based on the votes cast select a reasonable number of elements with which to proceed.
      6. For each element selected, brainstorm up to six tiers of the risk scale. You can use numbers or words, whichever is most compelling.
        • E.g. Reliability: no failures, >1 incident per year, >1 incident per quarter, >1 incident per month, frequent issues, unreliable.
      7. Repeat the above except with the components of business risk. Alternately, rely on existing business risk documentation, possibly from a disaster recovery or business continuity plan.

      Discussion
      How difficult was it to agree on the definitions of the IT risk elements? What about selecting the scale? What was the voting distribution like? Were there tiers of popular elements or did most of the dots end up on a limited number of elements? What are the implications of having more elements in the analysis?

      Input

      • Notional risk analysis

      Output

      • Risk elements
      • Scale dimensions

      Materials

      • Whiteboard & markers
      • Voting dots

      Participants

      • Roadmap team

      3.1.3 Forced ranking exercise

      Alternate: Identify the key elements that make up risk in order to refine your framework

      A shared notional understanding is good, but in order to bring the business onside a documented defensible framework is better.

      1 hour

      1. Brainstorm (possibly using the affinity diagramming technique) the component elements of IT risk.
      2. Ensure you have a non-overlapping set of risk elements. Ensure that all the participants are comfortable with the definitions of each element. Write them on a whiteboard.
      3. Distribute index cards (one per participant) with the risk elements written down one side.
      4. Ask the participants to rank the elements in order of importance, with 1 being the most important.
      5. Collect the cards and write the ranking results on the whiteboard.
      6. Look for elements with high variability. Also look for the distribution of 1, 2, and 3 ranks.
      7. Based on the results select a reasonable number of elements with which to proceed.
      8. Follow the rest of the procedure from the previous activity.

      Discussion:

      What was the total number of elements required in order to contain the full set of every participant's first-, second-, and third-ranked risks? Does this seem a reasonable number?

      Why did some elements contain both the lowest and highest rankings? Was one (or more) participant thinking consistently different from the rest of the group? Are they seeing something the rest of the group is overlooking?

      This technique automatically puts the focus on a smaller number of elements – is this effective? Or is it overly simplistic and reductionist?

      Input

      • Notional risk analysis

      Output

      • Risk elements

      Materials

      • Whiteboard & markers
      • Index cards

      Participants

      • Roadmap team

      3.1.4 Consensus weighting

      Use your previous notional assessment to inform your risk weightings:

      1 hour

      1. Distribute index cards that have been prepopulated with the risk elements from the previous activity.
      2. Have the participants independently assign a weighting to each element. The assigned weights must add up to 100.
      3. Collect the cards and transcribe the results into a matrix on the whiteboard.
      4. Look for elements with high variability in the responses.
      5. Discuss and come to a consensus figure for each element's weighting.
      6. Select a variety of assets and services from the notional assessment exercise. Ensure that you have representation from all four quadrants.
      7. Using your newly defined risk elements and associated scales, evaluate as a group the values you'd suggest for each asset. Aim for a plurality of opinion rather than full consensus.
      8. Use Info-Tech's Strategic Infrastructure Roadmap Tool to document the elements, weightings, scales, and asset analysis.
      9. Compare the output generated by the tool (Tab 4) with the initial notional assessment.

      Discussion:

      How much framework is too much? Complexity and granularity do not guarantee accuracy. What is the right balance between effort and result?

      Does your granular assessment match your notional assessment? Why or why not? Do you need to go back and change weightings? Or reduce complexity?

      Is this a more reasonable and valuable way of periodically evaluating your infrastructure?

      Input

      • Notional risk analysis

      Output

      • Weighted risk framework

      Materials

      • Whiteboard & markers
      • Index cards
      • Strategic Infrastructure Roadmap Tool

      Participants

      • Roadmap team

      3.1.5 Platform assessment set-up

      Hard work up front allows for year-over-year comparisons

      The value of a risk framework is that once the heavy lifting work of building it is done, the analysis and assessment can proceed very quickly. Once built, the framework can be tweaked as necessary, rather than recreated every year.

      • Open Info-Tech's Strategic Infrastructure Roadmap Tool, Tab 3.
      • Up to eight elements each of IT and business risk can be captured.
        • IT risk elements of end-of-life and dependencies are mandatory and do not count against the eight customizable elements.
      • Every element can have up to six scale descriptors. Populate them from left to right in increasing magnitude of risk.
        • Scale descriptors must be input as string values and not numeric.
      • Each element's scale can be customized from linear to a risk-adverse or risk-seeking curve. We recommend linear.

      an image of the Platform Assessment Setup Page from Info-Tech's Strategic Infrastructure Roadmap Tool,

      IT platform assessment

      Quickly and easily evaluate all your infrastructure.

      Once configured, individual domain teams can spend surprisingly little time answering reasonably simple questions to assess their assets. The common framework lets results be compared between teams and produces a valuable visualization to communication with the business.

      • Open the Strategic Infrastructure Roadmap Tool, Tab 4.
      • The tool has been tested successfully with up to 2,000 asset items. Don't necessarily list every asset; rather, think of the logical groups of assets you'd cycle in or out of your environment.
      • Each asset must be associated with one and only one infrastructure domain and have a defined End of Service Life date.
      • With extreme numbers of assets an additional filter can be useful – the Grouping field allows you to set any number of additional tags to make sorting and filtering easier.
      • Drop-down menus for each risk element are prepopulated with the scale descriptors from Tab 3. Unused elements are greyed out.
      • Each asset can be deemed dependent on up to four additional assets or services. Use this to highlight obscure or undervalued relationships between assets. It is generally not useful to be reminded that everything relies on Cat 6 cabling.

      A series of screenshots from the IT Platform Assessment.

      Prioritized upgrades

      Validate and tweak your framework with the business

      Once the grunt work of inputting all the assets and the associated risk data has been completed, you can tweak the risk profile and sort the data to whatever the business may require.

      • Open Info-Tech's Strategic Infrastructure Roadmap Tool, Tab 5.
      • IT platforms in the upper-right quadrant have an abundance of IT risk and are critical to the business.
      • The visualization can be sorted by selecting the slicers on the left. Sort by:
        • Infrastructure domain
        • Customized grouping tag
        • Top overall risk platforms
      • With extreme numbers of assets an additional filter can be useful. The Grouping field allows you to set any number of additional tags to make sorting and filtering easier.
      • Risk weightings can be individually adjusted to reflect changing business priorities or shared infrastructure understanding of predictive power.
        • In order to make year-over-year comparisons valuable it is recommended that changing IT risk elements should be avoided unless absolutely necessary.

      An image of a scatter plot graph titled Prioritized Upgrades.

      Step 3.2

      Build the roadmap

      Activities

      3.2.1 Build templates and visualize

      3.2.2 Generate new initiatives

      3.2.3 Repatriate shadow IT initiatives

      3.2.4 Finalize initiative candidates

      This step requires the following inputs:

      • Develop an initiative template
      • Restate the existing initiatives with the template
      • Visualize the existing initiatives
      • Brainstorm new initiatives
      • Initiative ranking
      • Solicit, evaluate, and refine shadow IT initiatives
      • Resource estimation

      This step involves the following participants:

      • Roadmap team

      Outcomes of this step

      • Initiative communication template
      • Roadmap visualization diagram

      Tell them what they really need to know

      Templates transform many disparate sources of data into easy-to-produce, easy-to-consume, business-ready documents.

      Develop a high-level document that travels with the initiative from inception through executive inquiry and project management, and finally to execution. Understand an initiative's key elements that both IT and the business need defined and that are relatively static over its lifecycle.

      Initiatives are the waypoints along a roadmap leading to the eventual destination, each bringing you one step closer. Like steps, initiatives need to be discrete: able to be conceptualized and discussed as a single largely independent item. Each initiative must have two characteristics:

      • Specific outcome: Describe an explicit change in the people, processes, or technology of the enterprise.
      • Target end date: When the described outcome will be in effect.

      "Learn a new skill"– not an effective initiative statement.

      "Be proficient in the new skill by the end of the year" – better.

      "Use the new skill to complete a project and present it at a conference by Dec 15" – best!

      Info-Tech Insight

      Bundle your initiatives for clarity and manageability.
      Ruthlessly evaluate if an initiative should stand alone or can be rolled up with another. Fewer initiatives increases focus and alignment, allowing for better communication.

      3.2.1 Develop impactful templates to sell your initiative upstream

      Step 1: Open Info-Tech's Strategic Roadmap Initiative Template. Determine and describe the goals that the initiative is enabling or supporting.
      Step 2: State the current pain points from the end-user or business perspective. Do not list IT-specific pain points here, such as management complexity.
      Step 3: List both the tangible (quantitative) and ancillary (qualitative) benefits of executing the project. These can be pain relievers derived from the pain points, or any IT-specific benefit not captured in Step 1.
      Step 4: List any enabled capability that will come as an output of the project. Avoid technical capabilities like "Application-aware network monitoring." Instead, shoot for business outcomes like "Ability to filter network traffic based on application type."

      An image of the Move to Office 365, with the numbers 1-4 superimposed over the image.  These correspond to steps 1-4 above.

      Info-Tech Insight

      Sell the project to the mailroom clerk! You need to be able to explain the outcome of the project in terms that non-IT workers can appreciate. This is done by walking as far up the goals cascade as you have defined, which gets to the underlying business outcome that the initiative supports.

      Develop impactful templates to sell your initiative upstream (cont'd)

      Strategic Roadmap Initiative Template, p. 2

      Step 5: State the risks to the business for not executing the project (and avoid restating the pain points).
      Step 6: List any known or anticipated roadblocks that may come before, during, or after executing the project. Consider all aspects of people, process, and technology.
      Step 7: List any measurable objectives that can be used to gauge the success of the projects. Avoid technical metrics like "number of IOPS." Instead think of business metrics such as "increased orders per hour."
      Step 8: The abstract is a short 50-word project description. Best to leave it as the final step after all the other aspects of the project (risks and rewards) have been fully fleshed out. The abstract acts as an executive summary – written last, read first.

      An image of the Move to Office 365, with the numbers 5-8 superimposed over the image.  These correspond to steps 5-8 above.

      Info-Tech Insight

      Every piece of information that is not directly relevant to the interests of the audience is a distraction from the value proposition.

      Working session, presentation, and feedback

      Rewrite your in-flight initiatives to ensure you're capturing all the required information:

      1 hour

      1. Have each participant select an initiative they are responsible or accountable for.
      2. Introduce the template and discuss any immediate questions they might have.
      3. Take 15-20 minutes and have each participant attempt to fill out the template for their initiative.
      4. Have each participant present their initiative to the group.
      5. The group should imagine themselves business leaders and push back with questions or clarification when IT jargon is used.
      6. Look to IT leadership in the room for cues as to what hot button items they've encountered from the business executives.
      7. Debate the merits of each section in the template. Adjust and customize as appropriate.

      Discussion:
      Did everyone use the goal framework adopted earlier? Why not?
      Are there recurring topics or issues that business leaders always seem concerned about?
      Of all the information available, what consistently seems to be the talking points when discussing an initiative?

      Input

      • In-flight initiatives

      Output

      • Completed initiatives templates

      Materials

      • Templates
      • Laptops & internet

      Participants

      • Roadmap team

      3.2.2 Visual representations are more compelling than text alone

      Being able to quickly sort and filter data allows you to customize the visualization and focus on what matters to your audience. Any data that is not immediately relevant to them risks becoming a distraction.

      1. Open the Strategic Infrastructure Roadmap Tool, Tabs 6 and 7.
      2. Up to ten goals can be supported. Input the goals into column F of the tool. Be explicit but brief.
      3. Initiatives and Obstacles can be independently defined, and the tool supports up to five subdivisions of each. Initiative by origin source makes for an interesting analysis but initially we recommend simplicity.
      4. Every Initiative and Obstacle must be given a unique name in column H. Context-sensitive drop-downs let you define the subtype and responsible infrastructure domain.
      5. Three pieces of data are captured for each initiative: Business Impact is the qualitative value to the business; Risk is the qualitative likelihood of failure – entirely or partially (e.g. significantly over budget or delayed); and Effort is a relative measure of magnitude ($ or time). Only the value for Effort must be specified.
      6. Every initiative can claim to support one or many goals by placing an "x" in the appropriate column(s).
      7. On Tab 7 you must select the initiative end date (go-live date). You can also document start date, owner, and manager if required. Remember, though, that the tool does not replace proper project management tools.

      A series of screenshots of tables, labeled A-F

      Decoding your visualization

      Strategic Infrastructure Roadmap Tool, Tab 8, "Roadmap"

      Visuals aren't always as clear as we assume them to be.

      An example of a roadmap visualization found in the Strategic Infrastructure Roadmap Tool

      If you could suggest one thing, what would it be?

      The roadmap is likely the best and most direct way to showcase our ideas to business leadership – take advantage of it.

      We've spent an awful lot of time setting the stage, deciding on frameworks so we agree on what is important. We know how to have an effective conversation – now what do we want to say?

      an image of a roadmap, including inputs passing through infrastructure & Operations; to the Move to Office 365 images found earlier in this blueprint.

      Creative thinking, presentation, and feedback

      Since we're so smart – how could we do it better?

      1 hour

      1. Introduce the Roadmap Initiative Template and discuss any immediate questions the participants might have.
      2. Take 15-20 minutes and have each participant attempt to fill out the template for their initiative candidate.
      3. Have each author present their initiative to the group.
      4. The group should imagine themselves business leaders and push back with questions or clarification when IT jargon is used.
      5. Look to IT leadership in the room for cues as to what hot button items they've encountered from the business executives
      6. Debate the merits of each section in the template. Adjust and customize as appropriate.

      Discussion:
      Did everyone use the goal framework adopted earlier? Why not?
      Do we think we can find business buy-in or sponsorship? Why or why not?
      Are our initiatives at odds with or complementary to the ones proposed through the normal channels?

      Input

      • Everything we know

      Output

      • Initiative candidates

      Materials

      • Info-Tech's Infrastructure Roadmap Initiatives Template
      • Laptops & internet

      Participants

      • Roadmap team

      Forced Ranking Exercise

      Showcase only your best and brightest ideas:

      1 hour

      1. Write the initiative titles from the previous exercise across the top of a whiteboard.
      2. Distribute index cards (one per participant) with the initiative titles written down one side.
      3. Ask each participant to rank the initiatives in order of importance, with 1 being the most important.
      4. Collect the cards and write the ranking results on the whiteboard.
      5. Look at the results with an eye toward high variability. Also look for the distribution of 1, 2, and 3 ranks.
      6. Based on the results, select (through democratic vote or authoritarian fiat – Director or CIO) a reasonable number of initiatives.
      7. Refine the selected initiative templates for inclusion in the roadmap.

      Discussion:
      Do participants tend to think their idea is the best and rank it accordingly?
      If so, then is it better to look at the second, third, and fourth rankings for consensus instead?
      What is a reasonable number of initiatives to suggest? How do we limit ourselves?

      Input

      • Infrastructure initiative candidates

      Output

      • Infrastructure initiatives

      Materials

      • Index cards

      Participants

      • Roadmap team

      Who else might be using technology to solve business problems?

      Shadow IT operates outside of the governance and control structure of Enterprise IT and so is, by definition, a problem. an opportunity!

      Except for that one thing they do wrong, that one small technicality, they may well do everything else right.

      Consider:

      1. Shadow IT evolves to solve a problem or enable an activity for a specific group of users.
      2. This infers that because stakeholders spend their own resources resolving a problem or enabling an action, it is a priority.
      3. The technology choices they've made have been based solely on functionality for value, unrestrained by any legacy of previous decisions.
      4. Staffing demands and procedural issues must be modest or nonexistent.
      5. The users must be engaged, receptive to change, and tolerant of stutter steps toward a goal.

      In short, shadow IT can provide fully vetted infrastructure initiatives that with a little effort can be turned into easy wins on the roadmap.

      Info-Tech Insight

      Shadow IT can include business-ready initiatives, needing only minor tweaking to align with infrastructure's best practices.

      3.2.3 Survey and hack-a-thon

      Negotiate amnesty with shadow IT by evaluating their "hacks" for inclusion on the roadmap.

      1 hour

      1. Put out an open call for submissions across the enterprise. Ask "How do you think technology could help you solve one of your pain points?" Be specific.
      2. Gather the responses into a presentable format and assemble the roadmap team.
      3. Use voting dots (three per person) to filter out a shortlist.
      4. Invite the original author to come in and work with a roadmap team member to complete the template.
      5. Reassemble the roadmap team and use the forced ranking exercise to select initiatives to move forward.

      Discussion:
      Did you learn anything from working directly with in-the-trenches staff? Can those learnings be used elsewhere in infrastructure? Or in larger IT?

      Input

      • End-user ideas

      Output

      • Roadmap initiatives

      Materials

      • Whiteboard & markers
      • Voting dots
      • Index cards
      • Templates

      Participants

      • Enthusiastic end users
      • Roadmap team
      • Infrastructure leader

      3.2.4 Consensus estimation

      Exploit the wisdom of groups to develop reasonable estimates.

      1 hour

      Also called scrum poker (in Agile software circles), this method reduces anchoring bias by requiring all participants to formulate and submit their estimates independently and simultaneously.

      Equipment: A typical scrum deck shows the Fibonacci sequence of numbers, or similar progression, with the added values of ∞ (project too big and needs to be subdivided), and a coffee cup (need a break). Use of the (mostly) Fibonacci sequence helps capture the notional uncertainty in estimating larger values.

      1. The infrastructure leader, who will not play, moderates the activity. A "currency" of estimation is selected. This could be person, days, or weeks, or a dollar value in the thousands or tens of thousands – whatever the group feels they can speak to authoritatively.
      2. The author of each initiative gives a short overview, and the participants are given the chance to ask questions and clarify assumptions and risks.
      3. Participants lay a card representing their estimate face down on the table. Estimates are revealed simultaneously.
      4. Participants with the highest and lowest estimates are given a soapbox to offer justification. The author is expected to provide clarifications. The moderator drives the conversation.
      5. The process is repeated until consensus is reached (decided by the moderator).
      6. To structure discussion, the moderator can impose time limits between rounds.

      Discussion:

      How often was the story unclear? How often did participants have to ask for additional information to make their estimate? How many rounds were required to reach consensus?
      Does number of person, days, or weeks, make more sense than dollars? Should we estimate both independently?
      Source: Scrum Poker

      Input

      • Initiative candidates from previous activity

      Output

      • Resourcing estimates

      Materials

      • Scrum poker deck

      Participants

      • Roadmap team

      Hard work up front allows for year-over-year comparisons

      Open the Strategic Infrastructure Roadmap Tool, Tab 6, "Initiatives & Goals" and Tab 7, "Timeline"

      Add your ideas to the visualization.

      • An initiative subtype can be useful here to differentiate infrastructure-sponsored initiatives from traditional ones.
      • Goal alignment is as important as always – ideally you want your sponsored initiatives to fill gaps or support the highest-priority business goals.
      • The longer-term roadmap is an excellent parking lot for ideas, especially ones the business didn't even know they wanted. Make sure to pull those ideas forward, though, as you repeat the process periodically.

      An image containing three screenshots of timeline tables from the Strategic Infrastructure Roadmap Tool

      Pulling it all together – the published report

      We started with eight simple questions. Logically, the answers suggest sections for a published report. Developing those answers in didactic method is effective and popular among technologists as answers build upon each other. Business leaders and journalists, however, know never to bury the lead.

      Report Section Title Roadmap Activity or Step
      Sunshine diagram Visualization
      Priorities Understand business goals
      Who we help Evaluate intake process
      How we can help Create initiatives
      What we're working on Review initiatives
      How you can help us Assess roadblocks
      What is new Assess new technology
      How we spend our day Conduct a time study
      What we have Assess IT platform
      We can do better! Identify process optimizations

      Summary of Accomplishment

      Review performance from last fiscal year

      • Analyzed and communicated the benefits and value realized from IT's strategic initiatives in the past fiscal year.
      • Analyzed and prioritized diagnostic data insights to communicate IT success stories.
      • Elicited important retrospective information such as KPIs, financials, etc. to build IT's credibility as a strategic business partner.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Phase 4

      Communicate and Improve the Process

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Infrastructure strategy

      1.2 Goal alignment

      2.1 Define your future

      2.2 Conduct constraints analysis

      3.1 Drive business alignment

      3.2. Build the roadmap

      4.1 Identify the audience

      4.2 Process improvement

      and measurements

      This phase will walk you through the following activities:

      • Identify authors and target audiences
      • Understand the planning process
      • Identify if the process outputs have value
      • Set up realistic KPIs

      This phase involves the following participants:

      • CIO
      • Roadmap team

      Step 4.1

      Identify the audience

      Activities

      4.1.1 Identify required authors and target audiences

      4.1.2 Planning the process

      4.1.3 Identifying supporters and blockers

      This step requires the following inputs:

      • Identify required authors and target audiences
      • Plan the process
      • Identify supporters and blockers

      This step involves the following participants:

      • CIO
      • Roadmap team

      Outcomes of this step

      • Process schedule
      • Communication strategy

      Again! Again!

      And you thought we were done. The roadmap is a process. Set a schedule and pattern to the individual steps.

      Publishing an infrastructure roadmap once a year as a lead into budget discussion is common practice. But this is just the last in a long series of steps and activities. Balance the effort of each activity against its results to decide on a frequency. Ensure that the frequency is sufficient to allow you to act on the results if required. Work backwards from publication to develop the schedule.

      an image of a circle of questions around the Infrastructure roadmap.

      A lot of work has gone into creating this final document. Does a single audience make sense? Who else may be interested in your promises to the business? Look back at the people you've asked for input. They probably want to know what this has all been about. Publish your roadmap broadly to ensure greater participation in subsequent years.

      4.1.1 Identify required authors and target audiences

      1 hour

      Identification and association

      Who needs to hear (and more importantly believe) your message? Who do you need to hear from? Build a communications plan to get the most from your roadmap effort.

      1. Write your eight roadmap section titles in the middle of a whiteboard.
      2. Make a list of everyone who answered your questions during the creation of this roadmap. Write these names on a single color of sticky notes and place them on the left side.
      3. Make a list of everyone who would be (or should be) interested in what you have to say. Write these names on a different single color of sticky notes and place them on the right side.
      4. Draw lines between the stickies and the relevant section of the roadmap. Solid lines indicate a must have communication while dashed lines indicate a nice-to-have communication.
      5. Come to a consensus.

      Discussion:

      How many people appear in both lists? What are the implications of that?

      Input

      • Roadmap sections

      Output

      • Roadmap audience and contributors list

      Materials

      • Whiteboard & markers
      • Sticky notes

      Participants

      • Roadmap team

      4.1.2 Planning the process and scheduling

      The right conversation at the right time

      Due Date (t) Freq Mode Participants Infrastructure Owner
      Update & Publish

      Start of Budget Planning

      Once

      Report

      IT Steering Committee

      Infrastructure Leader or CIO

      Evaluate Intakes

      (t) - 2 months

      (t) - 8 months

      Biannually

      Review

      PMO

      Service Desk

      Domain Heads

      Assess Roadblocks

      (t) - 2 months

      (t) - 5 months

      (t) - 8 months

      (t) - 11 months

      Quarterly

      Brainstorming & Consensus

      Domain Heads

      Infrastructure Leader

      Time Study

      (t) - 1 month

      (t) - 4 months

      (t) - 7 months

      (t) - 10 months

      Quarterly

      Assessment

      Domain Staff

      Domain Heads

      Inventory Assessment

      (t) - 2 months

      Annually

      Assessment

      Domain Staff

      Domain Heads

      Business Goals

      (t) - 1 month

      Annually

      Survey

      Line of Business Managers

      Infrastructure Leader or CIO

      New Technology Assessment

      monthly

      (t) - 2 months

      Monthly/Annually

      Process

      Domain Staff

      Infrastructure Leader

      Initiative Review

      (t) - 1 month

      (t) - 4 months

      (t) - 7 months

      (t) - 10 months

      Quarterly

      Review

      PMO

      Domain Heads

      Infrastructure Leader

      Initiative Creation

      (t) - 1 month

      Annually

      Brainstorming & Consensus

      Roadmap Team

      Infrastructure Leader

      The roadmap report is just a point-in-time snapshot, but to be most valuable it needs to come at the end of a full process cycle. Know your due date, work backwards, and assign responsibility.

      Discussion:

      1. Do each of the steps make sense? Is the outcome clear and does it flow naturally to where it will be useful?
      2. Is the effort required for each step commensurate with its value? Are we doing to much for not enough return?
      3. Are we acting on the information we're gathering? Is it informing or changing decisions throughout the year or period?

      Input

      • Roadmap sections

      Output

      • Roadmap process milestones

      Materials

      • Whiteboard & markers
      • Template

      Participants

      • Roadmap team

      Tailor your messaging to secure stakeholders' involvement and support

      If your stakeholders aren't on board, you're in serious trouble.

      Certain stakeholders will not only be highly involved and accountable in the process but may also be responsible for approving the roadmap and budget, so it's essential that you get their buy-in upfront.

      an image of a quadrant analysis, comparing levels of influence and support.

      an image of a quadrant analysis, comparing levels of influence and support.

      4.1.3 Identifying supporters and blockers

      Classification and Strategy

      1 hour

      You may want to restrict participation to senior members of the roadmap team only.

      This activity requires a considerable degree of candor in order to be effective. It is effectively a political conversation and as such can be sensitive.

      Steps:

      1. Review your sticky notes from the earlier activity (list of input and output names).
      2. Place each name in the corresponding quadrant of a 2x2 matrix like the one on the right.
      3. Come to a consensus on the placement of each sticky note.

      Input

      • Roadmap audience and contributors list

      Output

      • Communications strategy & plan

      Materials

      • Whiteboard & markers
      • Sticky notes

      Participants

      • Senior roadmap team

      Step 4.2

      Process improvement

      Activities

      4.2.1 Evaluating the value of each process output

      4.2.2 Brainstorming improvements

      4.2.3 Setting realistic measures

      This step requires the following inputs:

      • Evaluating the efficacy of each process output
      • Brainstorming improvements
      • Setting realistic measures

      This step involves the following participants:

      • Roadmap team

      Outcomes of this step

      • Process map
      • Process improvement plan

      Continual improvement

      Not just for the DevOps hipsters!

      You started with a desire – greater satisfaction with infrastructure from the business. All of the inputs, processes, and outputs exist only, and are designed solely, to serve the attainment of that outcome.

      The process outlined is not dogma; no element is sacrosanct. Ruthlessly evaluate the effectiveness of your efforts so you can do better next time.

      You would do no less after a server migration, network upgrade, or EUC rollout.

      Consider these four factors to help make your infrastructure roadmap effort more successful.

      Leadership
      If infrastructure leaders aren't committed, then this will quickly become an exercise of box-checking rather than candid communication.

      Data
      Quantitative or qualitative – always try to go where the data leads. Reduce unconscious bias and be surprised by the insight uncovered.

      Metrics
      Measurement allows management but if you measure the wrong thing you can game the system, cheating yourself out of the ultimate prize.

      Focus
      Less is sometimes more.

      4.2.1 Evaluating the value of each process output

      Understanding why and how individual steps are effective (or not) is how we improve the outcome of any process.

      1 hour

      1. List each of the nine roadmap steps on the left-hand side of a whiteboard.
      2. Ask the participants "Why was this step included? Did it accomplish its objective?" Consider using a reduced scale affinity diagramming exercise for this step.
      3. Consider the priority characteristics of each step; try to be as universal as possible (every characteristic will ideally apply to each step).
      4. Include two columns at the far right: "Improvement" and "Expected Change."
      5. Populate the table. If this is your first time, brainstorm reasonable objectives for your left-hand columns. Otherwise, document the reality of last year and focus on brainstorming the right-hand columns.
      6. Optional: Conduct a thought experiment and brainstorm tension metrics to establish whether the process is driving the outcomes we desire.
      7. Optional: Consider Info-Tech's assertion about the four things a roadmap can do. Brainstorm KPIs that you can measure yearly. What else would you want the roadmap to be able to do?

      Discussion:

      Did the group agree on the intended outcome of each step? Did the group think the step was effective? Was the outcome clear and did it flow naturally to where it was useful?
      Is the effort required for each step commensurate with its value? Are we doing too much for not enough return?
      Are we acting on the information we're gathering? Is it informing or changing decisions throughout the year or period?

      Input

      • Roadmap process steps

      Output

      • Process map
      • Improvement targets & metrics

      Materials

      • Whiteboard & markers
      • Sticky notes
      • Process Map Template (see next slide)

      Participants

      • Roadmap team

      Process map template

      Replace the included example text with your inputs.

      Freq.MethodMeasuresSuccess criteria

      Areas for improvement

      Expected change

      Evaluate intakesBiannuallyPMO Intake & Service RequestsProjects or Initiatives% of departments engaged

      Actively reach out to underrepresented depts.

      +10% engagement

      Assess roadblocksQuarterlyIT All-Staff MeetingRoadblocks% of identified that have been resolved

      Define expected outcomes of removing roadblock

      Measurable improvements

      Time studyQuarterly IT All-Staff MeetingTimeConfidence value of data

      Real data sources (time sheets, tools, etc.)

      85% of sources defensible

      Legacy asset assessmentAnnuallyDomain effortAsset Inventory Completeness of Inventory
      • Compare against Asset Management database
      • Track business activity by enabling asset(s)
      • > 95% accuracy/
        completeness
      • Easier business risk framework conversations
      Understand business goalsAnnuallyRoadmap MeetingGoal listGoal specificity

      Survey or interview leadership directly

      66% directly attributable participation

      New technology assessmentMonthly/AnnuallyTeam/Roadmap MeetingTechnologies Reviewed IT staff participation/# SWOTs

      Increase participation from junior members

      50% presentations from junior members

      Initiative review

      Quarterly

      IT All-Staff Meeting

      • Status Review
      • Template usage
      • Action taken upon review
      • Template uptake
      • Identify predictive factors
      • Improve template
      • 25% of yellow lights to green
      • -50% requests for additional info

      Initiative creation

      Annually Roadmap MeetingInitiatives# of initiatives proposedBusiness uptake+25% sponsorship in 6 months (biz)

      Update and publish

      AnnuallyPDF reportRoadmap Final ReportLeadership engagement Improve audience reach+15% of LoB managers have read the report

      Establish baseline metrics

      Baseline metrics will improve through:

      1. Increased communication. More information being shared to more people who need it.
      2. Better planning. More accurate information being shared.
      3. Reduced lead times. Less due diligence or discovery work required as part of project implementations.
      4. Faster delivery times. Less less-valuable work, freeing up more time to project work.
      Metric description Current metric Future goal
      # of critical incidents resulting from equipment failure per month
      # of service provisioning delays due to resource (non-labor) shortages
      # of projects that involve standing up untested (no prior infrastructure PoC) technologies
      # of PoCs conducted each year
      # of initiatives proposed by infrastructure
      # of initiatives proposed that find business sponsorship in >1yr
      % of long-term projects reviewed as per goal framework
      # of initiatives proposed that are the only ones supporting a business goal
      # of technologies deployed being used by more than the original business sponsor
      # of PMO delays due to resource contention

      Insight Summary

      Insight 1

      Draw the first picture.

      Highly engaged and effective team members are proactive rather than reactive. Instead of waiting for clear inputs from the higher ups, take what you do know, make some educated guesses about the rest, and present that to leadership. Where thinking diverges will be crystal clear and the necessary adjustments will be obvious.

      Insight 2

      Infrastructure must position itself as the broker for new technologies.

      No man is an island; no technology is a silo. Infrastructure's must ensure that everyone in the company benefits from what can be shared, ensure those benefits are delivered securely and reliably, and prevent the uninitiated from making costly technological mistakes. It is easier to lead from the front, so infrastructure must stay on top of available technology.

      Insight 3

      The roadmap is a process that is business driven and not a document.

      In an ever-changing world the process of change itself changes. We know the value of any specific roadmap output diminishes quickly over time, but don't forget to challenge the process itself from time to time. Striving for perfection is a fool's game; embrace constant updates and incremental improvement.

      Insight 4

      Focus on the framework, not the output.

      There usually is no one right answer. Instead make sure both the business and infrastructure are considering common relevant elements and are working from a shared set of priorities. Data then, rather than hierarchical positioning or a d20 Charisma roll, becomes the most compelling factor in making a decision. But since your audience is in hierarchical ascendency over you, make the effort to become familiar with their language.

      4.2.3 Track metrics throughout the project to keep stakeholders informed

      An effective strategic infrastructure roadmap should help to:

      1. Initiate a schedule of infrastructure projects to achieve business goals.
      2. Adapt to feedback from executives on changing business priorities.
      3. Curate a portfolio of enabling technologies that align to the business whether growing or stabilizing.
      4. Manage the lifecycle of aging equipment in order to meet capacity demands.
      Metric description

      Metric goal

      Checkpoint 1

      Checkpoint 2

      Checkpoint 3

      # of critical incidents resulting from equipment failure per month >1
      # of service provisioning delays due to resource (non-labor) shortages >5
      # of projects that involve standing up untested (no prior infrastructure PoC) technologies >10%
      # of PoCs conducted each year 4
      # of initiatives proposed by infrastructure 4
      # of initiatives proposed that find business sponsorship in >1 year 1
      # of initiatives proposed that are the only ones supporting a business goal 1
      % of long-term projects reviewed as per goal framework 100%

      Summary of Accomplishment

      Review performance from last fiscal year

      • Analyzed and communicated the benefits and value realized from IT's strategic initiatives in the past fiscal year.
      • Analyzed and prioritized diagnostic data insights to communicate IT success stories.
      • Elicited important retrospective information such as KPIs, financials, etc. to build IT's credibility as a strategic business partner.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Related Info-Tech Research

      Build a Business-Aligned IT Strategy
      Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.

      Document your Cloud Strategy
      A cloud strategy might seem like a big project, but it's just a series of smaller conversations. The methodology presented here is designed to facilitate those conversations using a curated list of topics, prompts, participant lists, and sample outcomes. We have divided the strategy into four key areas.

      Develop an IT Asset Management Strategy
      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there's no value in data for data's sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service provider.

      Infrastructure & Operations Research Center
      Practical insights, tools, and methodologies to systematically improve IT Infrastructure & Operations.

      Summary of Accomplishment

      Knowledge gained

      • Deeper understanding of business goals and priorities
      • Key data the business requires for any given initiative
      • Quantification of risk
      • Leading criteria for successful technology adoption

      Processes optimized

      • Infrastructure roadmap
      • Initiative creation, estimation, evaluation, and prioritization
      • Inventory assessment for legacy infrastructure debt
      • Technology adoption

      Deliverables completed

      • Domain time study
      • Initiative intake analysis
      • Prioritized roadblock list
      • Goal listing
      • IT and business risk frameworks
      • Infrastructure inventory assessment
      • New technology analyzes
      • Initiative templates
      • Initiative candidates
      • Roadmap visualization
      • Process schedule
      • Communications strategy
      • Process map
      • Roadmap report

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Bibliography

      "10 Essential KPIs for the IT Strategic Planning Process." Apptio Inc, Dec. 2021. Accessed Nov. 2022.
      Amos, Justin. "8 areas your 2022 IT Infrastructure roadmap should cover." Soma, 24 Jan 2022 Accessed Nov. 2022
      Ahmed, Anam. "Importance of Mission Vision in Organizational Strategy." Chron, 14 March 2019. Accessed 10 May 2021. ."
      Barker, Joel A. "Joel A Barker Quote about Vision." Joel A Barker.com. Accessed 10 Nov 2022
      Bhagwat, Swapnil ."Top IT Infrastructure Management Strategies For 2023 , Atlas Systems, 23 Oct 2022. Accessed Nov. 2022.
      Blank, Steve. "You're Better Off Being A Fast Follower Than An Originator." Business Insider. 5 Oct. 2010. Web.
      Bridges, Jennifer . "IT Risk Management Strategies and Best Practices." Project Manager, 6 Dec 2019. Accessed Nov. 2022.
      "Building a Technology Roadmap That Stabilizes and Transforms." Collegis Education. Accessed Dec 2022.
      Collins, Gavin. "WHY AN IT INFRASTRUCTURE ROAD MAP?." Fifth Step, Date unknown. Accessed Nov. 2022.
      "Define the Business Context Needed to Complete Strategic IT Initiatives: 2018 Blueprint - ResearchAndMarkets.com." Business Wire, 1 Feb. 2018. Accessed 9 June 2021.
      De Vos, Colton. “Well-Developed IT Strategic Plan Example." Resolute Tech Solutions, 6 Jan 2020. Accessed Nov. 2022.
      Gray, Dave. "Post-Up." Gamestorming, 15 Oct. 2010. Accessed 10 Nov 2022
      Helm, Clay. "Majority of Surveyed Companies are Not Prepared for IT Needs of the Future." IBM Study, 4 Jan 2021. Accessed Nov. 2022.
      Hertvik, Joe. "8 Components of A Great IT Strategy, BMC Blogs, 29 May. 2020. Accessed Nov. 2022.
      ISACA, "Effective governance at your Fingertips". COBIT Framework, Accessed Dec 2022
      "IT Guiding Principles." Office of Information Technology, NC State University, 2014-2020. Accessed 9 Nov 2022.
      ""IT Infrastructure That Makes Employees Happier." Network Doctor, 2021. Accessed Dec 2022
      "IT Road mapping Helps Dura Remain at the Forefront of Auto Manufacturing." Performance Improvement Partners, ND. Accessed Dec 2022.
      ITtoolkit.com. "The IT Vision: A Strategic Path to Lasting IT Business Alignment." ITtoolkit Magazine, 2020. Accessed 9 June 2021.
      Kark, Khalid. "Survey: CIOs Are CEOs' Top Strategic Partner." CIO Journal, The Wall Street Journal, 22 May 2020. Accessed 11 May 2021.
      Kimberling, Eric. "What is "Future State" and Why is it Important?" Third Stage Consulting, 11 June 2021. Accessed Nov. 2022.
      Kishore. "The True Cost of Keeping the Lights On." Optanix, 1 Feb. 2017. Accessed Nov. 2022.
      Lakein, Alan. Libquotes.
      Mindsight. "THE ULTIMATE GUIDE TO CREATING A TECHNOLOGY ROADMAP" Mind sight, 12 Dec 2021. Accessed Nov. 2022.
      Milani, F. (2019). Future State Analysis. In: Digital Business Analysis. Springer, Cham. https://doi.org/10.1007/978-3-030-05719-0_13
      Newberry, Dennis. "Meeting the Challenges of Optimizing IT Cost and Capacity Management." BMC, 2021, Accessed 12 Nov 2022.
      Peek, Sean. "What Is a Vision Statement?" Business News Daily, 7 May 2020. Accessed 10 Nov 2022.
      Ramos, Diana. "Infrastructure Management 101: A Beginner's Guide to IT Infrastructure Management." Smartsheet.com. 30 Nov 2021. Accessed 09 Dec 2022.
      Ramsey, Dave. "Dave Rant: How to Finally Take Control of Your Money." Ramseysolutions. 26 Aug 2021. Accessed 10 Nov 2022.
      Richards-Gustafson, Flora. "5 Core Operational Strategies." Chron, 8 Mar 2019. Accessed 9 June 2021.
      Richardson, Nigel. "What are the differences between current and future state maps?." Nexus, 18 Oct 2022. Accessed Nov. 2022.
      Roush, Joe. "IT Infrastructure Planning: How To Get Started." BMC. 05 January, 2018. Accessed 24 Jan 2023.
      Shields, Corey. "A Complete Guide to IT Infrastructure Management." Ntiva, 15 Sept. 2020. Accessed 28 Nov. 2022.
      Snow, Shane. "Smartcuts: How Hackers, Innovators, and Icons Accelerate Success." Harper Business, 2014.
      Strohlein, Marc. "The CIO's Guide to Aligning IT Strategy with the Business." IDC, 2019. Accessed Nov 2022.
      Sull, Sull, and Yoder. "No One Knows Your Strategy — Not Even Your Top Leaders." MIT Sloan. 12 Feb 2018. Accessed 26 Jan 2023.
      "Team Purpose & Culture." Hyper Island. Accessed 10 Nov. 2022
      "Tech Spend Pulse, 2022." Flexera, Jan 2022, Accessed 15 Nov 2022
      "Tech Spend Pulse." Flexera, Dec. 2022. Accessed Nov. 2022.
      "The Definitive Guide to Developing an IT Strategy and Roadmap" CIO Pages.com , 5 Aug 13 2022. Accessed 30 Nov. 2022.
      Wei, Jessica. "Don't Tell Me Where Your Priorities Are – James W. Frick." Due.com, 21 Mar 2022. Accessed 23 Nov 2022.
      Zhu, Pearl. "How to Set Guiding Principles for an IT Organization." Future of CIO, 1 July 2013. Accessed 9 June 2021.

      Build an Extensible Data Warehouse Foundation

      • Buy Link or Shortcode: {j2store}342|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Big Data
      • Parent Category Link: /big-data
      • Data warehouse implementation is a costly and complex undertaking, and can end up not serving the business' needs appropriately.
      • Too heavy a focus on technology creates a data warehouse that isn’t sustainable and ends up with poor adoption.
      • Emerging data sources and technologies add complexity to how the appropriate data is made available to business users.

      Our Advice

      Critical Insight

      • A data warehouse is a project; but successful data warehousing is a program. An effective data warehouse requires planning beyond the technology implementation.
      • Governance, not technology needs to be the core support system for enabling a data warehouse program.
      • Understand business processes at the operational, tactical, and ad hoc levels to ensure a fit-for-purpose DW is built.

      Impact and Result

      • Leverage an approach that focuses on constructing a data warehouse foundation that is able to address a combination of operational, tactical, and ad hoc business needs.
      • Invest time and effort to put together pre-project governance to inform and provide guidance to your data warehouse implementation.
      • Develop “Rosetta Stone” views of your data assets to facilitate data modeling.
      • Select the most suitable architecture pattern to ensure the data warehouse is “built right” at the very beginning.

      Build an Extensible Data Warehouse Foundation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why the data warehouse is becoming an important tool for driving business value, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare for the data warehouse foundation project

      Begin the data warehouse foundation by defining the project and governance teams, as well as reviewing supporting data management practices.

      • Build an Extensible Data Warehouse Foundation – Phase 1: Prepare for the Data Warehouse Foundation Project
      • Data Warehouse Foundation Project Plan Template
      • Data Warehouse Work Breakdown Structure Template
      • Data (Warehouse) Architect
      • Data Integration Specialist
      • Business Intelligence Specialist
      • Director of Data Warehousing/Business Intelligence
      • Data Warehouse Program Charter Template
      • Data Warehouse Steering Committee Charter Template

      2. Establish the business drivers and data warehouse strategy

      Using the business activities as a guide, develop a data model, data architecture, and technology plan for a data warehouse foundation.

      • Build an Extensible Data Warehouse Foundation – Phase 2: Establish the Business Drivers and Data Warehouse Strategy
      • Business Data Catalog
      • Data Classification Inventory Tool
      • Data Warehouse Architecture Planning Tool
      • Master Data Mapping Tool

      3. Plan for data warehouse governance

      Start developing a data warehouse program by defining how users will interact with the new data warehouse environment.

      • Build an Extensible Data Warehouse Foundation – Phase 3: Plan for Data Warehouse Governance
      • Data Warehouse Standard Operating Procedures Template
      • Data Warehouse Service Level Agreement
      [infographic]

      Workshop: Build an Extensible Data Warehouse Foundation

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Prepare for the Data Warehouse Foundation Project

      The Purpose

      Identify the members of the foundation project team.

      Define overarching statements and define success factors/risks.

      Outline basic project governance.

      Key Benefits Achieved

      Defined membership, roles, and responsibilities involved in the foundation project.

      Establishment of a steering committee as a starting point for the data warehouse program.

      Activities

      1.1 Identify foundation project team and create a RACI chart.

      1.2 Understand what a data warehouse can and cannot enable.

      1.3 Define critical success factors, key performance metrics, and project risks.

      1.4 Develop rough timelines for foundation project completion.

      1.5 Define the current and future states for key data management practices.

      Outputs

      Job Descriptions and RACI

      Data Warehouse Steering Committee Charter

      Data Warehouse Foundation Project Plan

      Work Breakdown Structure

      2 Establish the Business Drivers and Data Warehouse Strategy

      The Purpose

      Define the information needs of the business and its key processes.

      Create the components that will inform an appropriate data model.

      Design a data warehouse architecture model.

      Key Benefits Achieved

      Clear definition of business needs that will directly inform the data and architecture models.

      Activities

      2.1 Understand the most fundamental needs of the business.

      2.2 Define the data warehouse vision, mission, purpose, and goals.

      2.3 Detail the most important operational, tactical, and ad hoc activities the data warehouse should support.

      2.4 Link the processes that will be central to the data warehouse foundation.

      2.5 Walk through the four-column model and business entity modeling as a starting point for data modeling.

      2.6 Create data models using the business data glossary and data classification.

      2.7 Identify master data elements to define dimensions.

      2.8 Design lookup tables based on reference data.

      2.9 Create a fit-for-purpose data warehousing model.

      Outputs

      Data Warehouse Program Charter

      Data Warehouse Vision and Mission

      Documentation of Business Processes

      Business Entity Map

      Business Data Glossary

      Data Classification Scheme

      Data Warehouse Architecture Model

      3 Plan for Data Warehouse Governance

      The Purpose

      Create a plan for governing your data warehouse efficiently and effectively.

      Key Benefits Achieved

      Documentation of current standard operating procedures.

      Identified members of a data warehouse center of excellence.

      Activities

      3.1 Develop a technology capability map to visualize your desired state.

      3.2 Establish a data warehouse center of excellence.

      3.3 Create a data warehouse foundation roadmap.

      3.4 Define data warehouse service level agreements.

      3.5 Create standard operating procedures.

      Outputs

      Technology Capability Map

      Project Roadmap

      Service Level Agreement

      Data Warehouse Standard Operating Procedure Workbook

      Choose Your Mobile Platform and Tools

      • Buy Link or Shortcode: {j2store}281|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Mobile Development
      • Parent Category Link: /mobile-development
      • Organizations see the value of mobile applications in improving productivity and reach of day-to-day business and IT operations. This motivates leaders to begin the planning of their first application.
      • However, organizations often lack the critical foundational knowledge and skills to deliver and maintain high quality and valuable applications that meet business and user priorities and technical requirements.
      • Mobile technologies and trends are continually evolving and maturing. It is hard to predict which trends will make a significant impact and to prepare current mobile investments to harness their value of these trends.

      Our Advice

      Critical Insight

      • Mobile applications can stress the stability, reliability, and overall quality of your enterprise systems and services. They will also increase your security risks because of the exposure of your enterprise technology assets to unsecured networks and devices.
      • High costs of entry may restrict what built-in features your users can have in their mobile experience. Workarounds may not be sufficient to offset the costs of certain built-in feature needs.
      • Many operating models do not enable or encourage the collaboration required to fully understand user needs and behaviors and evaluate mobile opportunities and underlying operational systems from multiple perspectives.

      Impact and Result

      • Establish the right expectations. Understand your mobile users by learning their needs, challenges, and behaviors. Discuss the current state of your systems and your high priority non-functional requirements to determine what to expect from your mobile applications.
      • Choose the right mobile platform approach and shortlist your mobile delivery solutions. Obtain a thorough view of the business and technical complexities of your mobile opportunities, including current mobile delivery capabilities and system compatibilities.
      • Create your mobile roadmap. Describe the gradual rollout of your mobile technologies through minimal valuable products (MVPs).

      Choose Your Mobile Platform and Tools Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Choose Your Mobile Platform and Tools Storyboard

      This blueprint helps you develop an approach to understand the mobile experience your stakeholders want your users to have and select the appropriate platform and delivery tools to meet these expectations.

      • Choose Your Mobile Platform and Tools Storyboard

      2. Mobile Application Delivery Communication Template – Clearly communicate the goal and approach of your mobile application implementation in a language your audience understands.

      This template narrates a story to describe the need and expectations of your low- and no-code initiative to get buy-in from stakeholders and interested parties.

      • Mobile Application Delivery Communication Template

      Infographic

      Workshop: Choose Your Mobile Platform and Tools

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Choose Your Platform and Delivery Solution

      The Purpose

      Choose the right mobile platform.

      Shortlist your mobile delivery solution and desired features and services.

      Key Benefits Achieved

      A chosen mobile platform that meets user and enterprise needs.

      Candidate mobile delivery solutions that meet your delivery needs and capacity of your teams.

      Activities

      1.1 Select your platform approach.

      1.2 Shortlist your mobile delivery solution.

      1.3 Build your feature and service lists.

      Outputs

      Desired mobile platform approach.

      Shortlisted mobile delivery solutions.

      Desired list of vendor features and services.

      2 Create Your Roadmap

      The Purpose

      Design the mobile application minimal viable product (MVP).

      Create your mobile roadmap.

      Key Benefits Achieved

      An achievable and valuable mobile application that is scalable for future growth.

      Clear intent of business outcome delivery and completing mobile delivery activities.

      Activities

      2.1 Define your MVP release.

      2.2 Build your roadmap.

      Outputs

      MVP design.

      Mobile delivery roadmap.

      3 Set the Mobile Context

      The Purpose

      Understand your user’s environment needs, behaviors, and challenges.

      Define stakeholder expectations and ensure alignment with the holistic business strategy.

      Identify your mobile application opportunities.

      Key Benefits Achieved

      Thorough understanding of your mobile user and opportunities where mobile applications can help.

      Level set stakeholder expectations and establish targeted objectives.

      Prioritized list of mobile opportunities.

      Activities

      3.1 Generate user personas with empathy maps.

      3.2 Build your mobile application canvas.

      3.3 Build your mobile backlog.

      Outputs

      User personas.

      Mobile objectives and metrics.

      Mobile opportunity backlog.

      4 Identify Your Technical Needs

      The Purpose

      Define the mobile experience you want to deliver and the features to enable it.

      Understand the state of your current system to support mobile.

      Identify your definition of mobile application quality.

      List the concerns with mobile delivery.

      Key Benefits Achieved

      Clear understanding of the desired mobile experience.

      Potential issues and risks with enabling mobile on top of existing systems.

      Grounded understanding of mobile application quality.

      Holistic readiness assessment to proceed with mobile delivery.

      Activities

      4.1 Discuss your mobile needs.

      4.2 Conduct a technical assessment.

      4.3 Define mobile application quality.

      4.4 Verify your decision to deliver mobile applications.

      Outputs

      List of mobile features to enable the desired mobile experience.

      System current assessment.

      Mobile application quality definition.

      Verification to proceed with mobile delivery.

      Further reading

      Choose Your Mobile Platform and Tools

      Maximize the value of your mobile investments by prioritizing technology decisions on user experience, business priorities, and system quality.

      EXECUTIVE BRIEF

      Analyst Perspective

      Mobile is the way of working.

      Workers require access to enterprise products, data, and services anywhere at anytime on any device. Give them the device-specific features, offline access, desktop-like interfaces, and automation capabilities they need to be productive.

      To be successful, you need to instill a collaborative business-IT partnership. Only through this partnership will you be able to select the right mobile platform and tools to balance desired outcomes with enterprise security, performance, integration, quality, and other delivery capacity concerns.

      This is a picture of Andrew Kum-Seun Senior Research Analyst, Application Delivery and Application Management Info-Tech Research Group

      Andrew Kum-Seun
      Senior Research Analyst,
      Application Delivery and Application Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Organizations see the value of mobile applications in improving productivity and reach of day-to-day business and IT operations. This motivates leaders to begin the planning of their first application.
      • However, organizations often lack the critical foundational knowledge and skills to deliver and maintain high quality and valuable applications that meet business and user priorities and technical requirements.
      • Mobile technologies and trends are continually evolving and maturing. It is hard to predict which trends will make a significant impact and to prepare current mobile investments to harness the value of these trends.

      Common Obstacles

      • Mobile applications can stress the stability, reliability and overall quality of your enterprise systems and services. They will also increase your security risks because of the exposure of your enterprise technology assets to unsecured networks and devices.
      • High costs of entry may restrict what native features your users can have in their mobile experience. Workarounds may not be sufficient to offset the costs of certain native feature needs.
      • Many operating models do not enable or encourage the collaboration required to fully understand user needs and behaviors and evaluate mobile opportunities and underlying operational systems from multiple perspectives.

      Info-Tech's Approach

      • Establish the right expectations. Understand your mobile users by learning their needs, challenges, and behaviors. Discuss the current state of your systems and your high priority non-functional requirements to determine what to expect from your mobile applications.
      • Choose the right mobile platform approach and shortlist your mobile delivery solutions. Obtain a thorough view of the business and technical complexities of your mobile opportunities, including current mobile delivery capabilities and system compatibilities.
      • Create your mobile roadmap. Describe the gradual rollout of your mobile technologies through minimal valuable products (MVPs).

      Insight Summary

      Overarching Info-Tech Insight

      Treat your mobile applications as digital products. Digital products are continuously modernized to ensure they are fit-for-purpose, secured, accessible, and immersive. A successful mobile experience involves more than just the software and supporting system. It involves good training and onboarding, efficient delivery turnaround, and a clear and rational vision and strategy.

      Phase 1: Set the Mobile Context

      • Build applications your users need and desire – Design the right mobile application that enables your users to address their frustrations and productivity challenges.
      • Maximize return on your technology investments – Build your mobile applications with existing web APIs, infrastructure, and services as much as possible.
      • Prioritize mobile security, performance and integration requirements – Understand the unique security, performance, and integration influences has on your desired mobile user experience. Find the right balance of functional and non-functional requirements through business and IT collaboration.

      Phase 2: Define Your Mobile Approach

      • Start with a mobile web platform - Minimize disruptions to your existing delivery process and technical stack by building against common web standards. Select a hybrid platform or cross-platform if you need device hardware access or have complicated non-functional requirements.
      • Focus your mobile solution decision on vendor support and functional complexity – Verify that your solution is not only compatible with the architecture, data, and policies of existing business systems, but satisfies IT's concerns with access to restricted technology and data, and with IT's ability to manage and operate your applications.
      • Anticipate changes, defects & failures in your roadmap - Quickly shift your mobile roadmaps according to user feedback, delivery challenges, value, and stability.

      Mobile is how the business works today

      Mobile adoption continues to grow in part due to the need to be a mobile workforce, and the shift in customer behaviors. This reality pushed the industry to transform business processes and technologies to better support the mobile way of working.

      Mobile Builds Interests
      61%
      Mobile devices drove 61% of visits to U.S. websites
      Source: Perficient, 2021

      Mobile Maintains Engagement
      54%
      Mobile devices generated 54.4% of global website traffic in Q4 2021.
      Source: Statista, 2022

      Mobile Drives Productivity
      82%
      According to 82% of IT executives, smartphones are highly important to employee productivity
      Source: Samsung and Oxford Economics, 2022

      Mobile applications enable and drive your digital business strategy

      Organizations know the criticality of mobile applications in meeting key business and digital transformation goals, and they are making significant investments. Over half (58%) of organizations say their main strategy for driving application adoption is enabling mobile access to critical enterprise systems (Enterprise CIO, 2016). The strategic positioning and planning of mobile applications are key for success.

      Mobile Can Motivate, Support and Drive Progress in Key Activities Underpinning Digital Transformation Goals

      Goal: Enhance Customer Experience

      • A shift from paper to digital communications
      • Seamless, omni-channel client experiences across devices
      • Create Digital interactive documents with sections that customers can customize to better understand their communications

      Goal: Increase Workflow Throughput & Efficiency

      • Digitized processes and use of data to improve process efficiency
      • Modern IT platforms
      • Automation through robotic process automation (RPA) where possible
      • Use of AI and machine learning for intelligent automation

      Source: Broadridge, 2022

      To learn more, visit Info-Tech's Define Your Digital Business Strategy blueprint.

      Well developed mobile applications bring unique opportunities to drive more value

      Role

      Opportunities With Mobile Applications

      Expected Value

      Stationary Worker

      Design flowcharts and diagrams, while abandoning paper and desktop applications in favor of easy-to-use, drawing tablet applications.

      Multitask by checking the application to verify information given by a vendor during their presentation or pitch.

      • Reduce materials cost to complete administrative responsibilities.
      • Digitally and automatically store and archive frequently used documents.

      Roaming Worker
      (Engineer)

      Replace physical copies of service and repair manuals with digital copies, and access them with mobile applications.

      Scan or input product bar code to determine whether a replacement part is available or needs to be ordered.

      • Readily access and update corporate data anywhere at anytime.
      • Expand employee responsibilities with minimal skills impact.

      Roaming Worker
      (Nurse)

      Log patient information according to HIPAA standards and complete diagnostics live to propose medication for a patient.

      Receive messages from senior staff about patients and scheduling while on-call.

      • Quickly and accurately complete tasks and update patient data at site.
      • Be readily accessible to address urgent issues.

      Info-Tech Insight

      If you build it, they may not come. Design and build the applications your user wants and needs, and ensure users are properly onboarded and trained. Learn how your applications are leveraged, capture feedback from the user and system dashboards, and plan for enhancements, fixes, and modernizations.

      Workers expect IT to deliver against their high mobile expectations

      Workers want sophisticated mobile applications like what they see their peers and competitors use.

      Why is IT considering building their own applications?

      • Complex and Unique Workflows: Canned templates and shells are viewed as incompatible to the workflows required to complete worker responsibilities outside the office, with the same level of access to corporate data as on premise.
      • Supporting Bring Your Own Device (BYOD): Developing your own mobile applications around your security protocols and standards can help mitigate the risks with personal devices that are already in your workforce.
      • Long-Term Architecture Misalignment: Outsourcing mobile development risks the mobile application misaligned with your quality standards or incompatible with other enterprise and third-party systems.

      Continuously meeting aggressive user expectations will not be easy

      Value Quickly Wears Off
      39.9% of users uninstall an application because it is not in use.
      40%
      Source: n=2,000, CleverTap, 2021

      Low Tolerance to Waiting
      Keeping a user waiting for 3 seconds is enough to dissatisfy 43% of users.
      43%
      Source: AppSamurai, 2018

      Quick Fixes Are Paramount
      44% of defects are found by users
      44%
      Source: Perfecto Mobile, 2014

      Mobile emphasizes the importance of good security, performance, and integration

      Today's mobile workers are looking for new ways to get more work done quickly. They want access to enterprise solutions and data directly on their mobile devices, which can reside on multiple legacy systems and in the cloud and third-party infrastructure. This presents significant performance, integration, and security risks.

      Cloud Solutions: Can I use my existing APIs?. Solutions in Corporate Networks: Do my legacy systems have the capacity to support mobile?; How do I integrate solutions and data from multiple sources into a single view?; Third Party Solutions: Will I have a significant performance bottleneck?; Single View on Mobile Devices: How is corporate data stored on the device?; What new technology dependencies must I account for in my architecture and operational support capabilities?

      Accept change as the norm

      IT is challenged with keeping up with disruptive technologies, such as mobile, which are arriving and changing faster and faster.

      What is the issue? Mobile priorities, concepts, and technologies do not remain static. For example, current Google's Pixels benefit from at least three versions of Android updates and at least three years of monthly security patches after their release (NextPit, 2022). Keeping up to date with anything mobile is difficult if you do not have the right delivery and product management practices in place.

      What is the impact on IT? Those who fail to prepare for changing requirements and technologies will quickly run into maintainability, extensibility, and flexibility issues. Mobile applications will quickly become stale and misaligned with the maturity of other enterprise infrastructure and applications.

      Continuously look at the trends, vendor roadmaps, and your user's feedback to envision where your mobile applications should be. Learning from your past attempts gives you insights on the opportunities and impacts changes will have on your people, process, and technology.

      How do I address this issue? A well-defined mobile vision and roadmap ensures your initiatives are aligned with your holistic business and technology strategies, the right problem is being solved, and resources are available to deliver high priority changes.

      To learn more, visit Info-Tech's Deliver on Your Digital Product Vision blueprint.

      Address the difficulties in managing enterprise mobile technologies

      Adaptability During Development

      Teams must be ready to alter their mobile approach when new insights and issues arise during and after the delivery of your mobile application and its updates.

      High Cybersecurity Standards

      Cybersecurity should be a top priority given the high security exposure of mobiles and the sensitive data mobile applications need to operate. Role-based access, back-up systems, advanced scanning, and protection software and encryption should all be implemented.

      Integration with Other Systems

      Your application will likely be integrated with other systems to expand service offerings and optimize performance and user experience. Your enterprise integration strategy ensures all systems connect against a common pattern with compatible technologies.

      Finding the Right Mobile Developers

      Enterprise mobile delivery requires a broad skillset to build valuable applications against extensive non-functional requirements in complex and integration environments. The right resources are even harder to find when native applications are preferred over web-based ones.

      Source: Radoslaw Szeja, Netguru, 2022.

      Build and manage the right experience by treating mobile as digital products

      Digital products are continuously modernized to ensure they are fit-for-purpose, secured, insightful, accessible, and interoperable. A good experience involves more than just technology.

      First, deliver the experience end users want and expect by designing the application against digital application principles.

      Business Value

      Continuous modernization

      • Fit for purpose
      • User-centric
      • Adaptable
      • Accessible
      • Private and secured
      • Informative and insightful
      • Seamless application connection
      • Relationship and network building

      To learn more, visit Info-Tech's Modernize Your Applications blueprint.

      Then, deliver a long-lasting experience by supporting your applications with key governance and management capabilities.

      • Product Strategy and Roadmap
      • External Relationships
      • User Adoption and Organizational Change Management
      • Funding
      • Knowledge Management
      • Stakeholder Management
      • Product Governance
      • Maintenance & Enhancement
      • User Support
      • Managing and Governing Data
      • Requirements Analysis and Design
      • Research & Development

      To learn more, visit Info-Tech's Make the Case for Product Delivery blueprint.

      Choose Your Mobile Platform and Tools

      Maximize the value of your mobile investments by prioritizing technology decisions on user experience, business priorities, and system quality.

      WORKFLOW

      1. Capture Your User Personas and Journey workflow: Trigger: Step 1; Step 2; Step 3; Step 4; Outcome
      2. Select Your Platform Nine datapoints are arranged on a graph where the x axis s labeled: User Centric Needs; and the Y axis is labeled: Enterprise-centric needs. The datapoints are, in order from left to right, top to bottom: Hybrid; Cross- Platform; Native; Web; Hybrid or Cross- Platform; Cros-s Platform; Web; Web; Hybrid or Cross- Platform.
      3. Shortlist Your Solutions A quadrant analysis is depicted. the top data is labeled Complex Mobile Features; the right side is labeled Organization-Managed Stack; the bottom is labeled Simple Mobile Features; and the left side is labeled Vendor-Managed Stack. The quadrants are labeled the following, in order from left to right, top to bottom. Vendor- Hosted Mobile Platform; Custom Native Development Solutions; Commercial-Off-the-Shelf Solutions; Custom Web Development Solutions. In the middle of the graph are the following, in order from top to bottom: Cross-Platform Development Solutions; Hybrid Development Solutions

      Strategic Perspective
      Business and Product Strategies

      1. End-User Perspective

      End User Needs

      • Productivity
      • Innovation
      • Transformation

      Native User Experience

      • Anytime, Anywhere
      • Visually Pleasing & Fulfilling
      • Personalized & Insightful
      • Hands-Off & Automated
      • Integrated Ecosystem

      2. Platform Perspective

      Technical Requirements

      Security

      Performance

      Integration

      Mobile Platform

      3. Solution Perspective

      Vendor Support

      Services

      Stack Mgmt.

      Quality & Risk

      Mobile Delivery Solutions

      Make user experience (UX) the standard

      User experience (UX) focuses on a user's emotions, beliefs, and physical and psychological responses that occur before, during, or after interacting with a service or product.

      For a mobile application to be meaningful, the functions, aesthetics and content must be:

      • Usable
        • Users can intuitively navigate through your mobile application and complete their desired tasks.
      • Desirable
        • The application elements are used to evoke positive emotions and appreciation.
      • Accessible
        • Users can easily use your mobile application, including those with disabilities.
      • Valuable
        • Users find the content useful, and it fulfills a need.

      Enable a greater experience with UX-driven thinking

      Designing for a high-quality experience requires more than just focusing on the UI. It also requires the merging of multiple business, technical, and social disciplines in order to create an immersive, practical, and receptive application. The image on the right explains the disciplines involved in UX. This is critical for ensuring users have a strong desire to use the mobile application, it is adequately supported technically, and it supports business objectives.

      To learn more, visit Info-Tech's Implement and Mature Your User Experience Design Practice blueprint.

      A Venn diagram is depicted, demonstrating the inputs that lead to an interactive design, with interactive elements, usability, and accessibility. This work by Mark Roden is licensed under a Creative Commons Attribution 3.0 Unported License.

      Source: Marky Roden, Xomino, 2018

      Define the mobile experience your end users want

      • Anytime, Anywhere
        • The user can access, update and analyze data and corporate products and services whenever they want, in all networks, and on any device.
      • Hands-Off and Automated
        • The application can perform various workflows and tasks without the user's involvement and notify the user when specific triggers are hit.
      • Personalized and Insightful
        • Content presentation and subject are tailored for the user based on specific inputs from the user, device hardware, or predicted actions.
      • Integrated Ecosystem
        • The application supports a seamless experience across various third-party and enterprise applications and services the user needs.
      • Visually Pleasing and Fulfilling
        • The UI is intuitive and aesthetically gratifying, with little security and performance trade-offs to use the full breadth of its functions and services.

      Each mobile platform has its own take on the mobile native experience. The choice ultimately depends on whether the costs and effort are worth the anticipated value.

      Mobile value is dependent on the platform you choose

      What is a platform?

      "A platform is a set of software and a surrounding ecosystem of resources that helps you to grow your business. A platform enables growth through connection: its value comes not only from its own features, but from its ability to connect external tools, teams, data, and processes." (Source: Emilie Nøss Wangen, 2021) In the mobile context, applications in a platform execute and communicate through a loosely-coupled API architecture, whether the supporting system is managed and supported by your organization or by third-party providers.

      Web

      Mobile web applications are deployed and executed within the mobile web browser. They are often developed with a combination of web and scripting languages, such as HTML, CSS, and JavaScript. Web often takes two forms on mobile:

      • Progressive Web Applications (PWA)
      • Mobile Web Sites

      Hybrid

      Hybrid applications are developed with web technologies but are deployed as native applications. The code is wrapped using a framework so that it runs locally within a native container. It uses the device's browser runtime engine to support more sophisticated designs and features than to the web approach.

      Cross-Platform

      Cross-platform applications are developed within a distinct programming or scripting environment that uses its own scripting language (often like web languages) and APIs. The solution compiles the code into device-specific builds for native deployment.

      Native

      Native applications are developed and deployed to specific devices and OSs using platform-specific software development kits (SDKs) provided by the operating system vendors. The programming language and framework are dictated by the targeted device, such as Java for Android.

      Start mobile development on a mobile web platform

      Start with what you have: begin with a mobile web platform to minimize impacts to your existing delivery skill sets and technical stack while addressing business needs. Resort to a hybrid first. Then consider a cross-platform application if you require device access or need to meet specific non-functional requirements.

      Why choose a mobile web platform?

      Pros

      The latest versions of the most popular web languages (HTML5, CSS3, JavaScript) abstract away from the granular, physical components of the application, simplifying the development process. HTML5 offer some mobile features (e.g. geolocation, accelerometer) that can meet your desired experience without the need for native development skills. Native look-and-feel, high performance, and full device access are just a few tradeoffs of going with web languages.

      Cons

      Native mobile platforms depend on device-specific code which follows specific frameworks and leverages unique programming libraries, such as Objective C for iOS and Java for Android. Each language requires a high level of expertise in the coding structure and hardware of specific devices. This requires resources with specific skillsets and different tools to support development and testing.

      Other Notable Benefits with Web Languages

      • Modern browsers in most mobile devices can execute and render many mobile features developed in web languages, allowing for greater portability and sophistication of code across multiple devices. However, this flexibility comes at the cost of performance since the browser's runtime engine will not perform as well as a native engine.
      • Web languages are well known by developers, minimizing skills and resourcing impacts. Consequently, changes can be quickly accommodated and updated uniformly across all end users.

      Select your mobile platform

      Drive your mobile platform selection against user-centric needs (e.g. device access, aesthetics) and enterprise-centric needs (e.g. security, system performance).

      When does a platform makes sense to use?

      Web

      • Desire to maximize current web technologies investments (people, process, and technologies).
      • Use cases do not require significant computational resources on the device or are tightly constrained by non-functional requirements.
      • Limited budget to acquire mobile development resources.
      • Access to device hardware is not a high priority.

      Hybrid / Cross-Platform

      • The need to quickly spin up native-like applications for multiple platforms and devices.
      • Desire to leverage existing web development skills, but also a need for device access and meeting specific non-functional requirements.
      • Vendor support is needed for the entire mobile delivery process.

      Native

      • Developers are experts in the target programming language and with the device's hardware.
      • Strong need for high performance, security, and device-specific access and customizations.
      • Application use cases require significant computing resources.

      Nine datapoints are arranged on a graph where the x axis s labeled: User Centric Needs; and the Y axis is labeled: Enterprise-centric needs. The datapoints are, in order from left to right, top to bottom: Hybrid; Cross- Platform; Native; Web; Hybrid or Cross- Platform; Cros-s Platform; Web; Web; Hybrid or Cross- Platform.

      Understand the common attributes of a mobile delivery solution

      • Source Code Management – Built-in or having the ability to integrate with code management solutions for branching, merging, and versioning. Debugging and coding assistance capabilities may be available.
      • Single Code Base – Capable of programming in a standard coding and scripting language for deployment into several platforms and devices. This code base is aligned to a common industry framework (e.g. AngularJS, Java) or a vendor-defined one.
      • Out-of-the-Box Connectors & Plug-ins – Pre-built APIs enhance the solution's capabilities with third-party tools and systems to deliver and manage high quality and valuable mobile applications.
      • Emulators – Ability to virtualize an application's execution on a target platform and device.
      • Support for Native Features – Supports plug-ins and APIs for access to device-specific features.

      What are mobile delivery solutions?

      A mobile delivery solution provides the tools, resources, and support to enable or build your mobile application. It can provide pre-built applications, vendor supported components to allow some configurations, or resources for full stack customizations. Solutions can be barebone software development kits (SDKs), or comprehensive suites offering features to support the entire software delivery lifecycle, such as:

      • Mobile application management
      • Testing and publishing to app stores
      • Content management
      • Cloud hosting
      • Application performance management

      Info-Tech Insight

      Mobile enablement and development capabilities are already embedded in many common productivity tools and enterprise applications, such as Microsoft PowerApps and ERP modules. They can serve as a starting point in the initial rollout of new management and governance practices without the need to acquire new tools.

      Select your mobile delivery solutions

      1. Set the scope of your framework.
      • The initial context of this framework is based on the mobile functions needed to support your desired mobile experience and on the current state of your enterprise and 3rd party systems.
    • Define the decision factors for your solution selection.
      • Review the decision factors that will influence the selection of your mobile delivery solution for each mobile opportunity:
      • Stack Management – Who will be hosting and supporting your mobile application stack?
      • Workflows Complexity & Native Experience – How complex is your desired mobile experience and how will native device features be leveraged?
    • Select your solution type.
      • Mobile delivery solutions are broadly defined in the following groups:
      • Commercial-Off-The-Shelf (COTS) – Pre-built mobile applications requiring little to no configurations or implementation effort.
      • Vendor Hosted Mobile Platform – Back-end and mid-tier infrastructure and operational support are managed by a vendor.
      • Cross-Platform Development – Frameworks that transform a single code base into platform-specific builds.
      • Hybrid Development – Tools that wrap a single code base into a locally deployable build.
      • Custom Web Development – Environment enabling full stack development for mobile web applications.
      • Custom Native Development – Environment enabling full stack development for mobile native applications.
    • A quadrant analysis is depicted. the top data is labeled Complex Mobile Features; the right side is labeled Organization-Managed Stack; the bottom is labeled Simple Mobile Features; and the left side is labeled Vendor-Managed Stack. The quadrants are labeled the following, in order from left to right, top to bottom. Vendor- Hosted Mobile Platform; Custom Native Development Solutions; Commercial-Off-the-Shelf Solutions; Custom Web Development Solutions. In the middle of the graph are the following, in order from top to bottom: Cross-Platform Development Solutions; Hybrid Development Solutions

      Optimize your software delivery process

      Mobile brings new delivery and management challenges that are often difficult for organizations that are tied to legacy systems, hindered by rigid and slow delivery lifecycles, and are unable to adopt leading-edge technologies. Many of these challenges stem from the fact that mobile is a significant shift from desktop development:

      • Mobile devices and operating systems are heavily fragmented, especially in the Android space.
      • Test coverage is significantly expanded to include physical environments and multiple network connections.
      • Mobile devices do not have the same performance capabilities and memory storage as their desktop counterparts.
      • The user interface must be strategically designed to accommodate the limited screen size.
      • Mobile applications are highly susceptible to security breaches.
      • Mobile users often expect quick turnaround time on fixes and enhancements due to continuously changing technology, business priorities, and user needs.

      To learn more, visit Info-Tech's Modernize Your SDLC blueprint.

      How should the process change?

      • Cross-functional collaboration – Bringing business and IT together at the most opportune times to clarify user needs and business priorities, and set realistic expectations given technology and capacity constraints. The appropriate tactics and techniques are used to improve decision making and delivery effectiveness according to the type of work.
      • Iterative delivery – Frequent delivery of progressive changes minimizes the risk of low-quality features by containing and simplifying scope, and enables responsive turnarounds of fixes, enhancements, and priority changes.
      • Feedback loops –Mobile application owners constantly review, update and refine their backlog of mobile features and changes to reflect user feedback and system performance metrics. Delivery teams proactively prepare the application for future scaling based on lessons and feedback learned from earlier releases.

      Achieve mobile success with MVPs

      By delivering mobile capabilities in small iterations, teams recognize value sooner and reduce accumulated risk. Both benefits are realized as the iteration enters validation testing and release.

      This image depicts a graph of the learn-build-measure cycle over time, adapted from Managing the Development of Large Software Systems, Dr. Winston W. Royce, 1970

      An MVP focuses on a small set of functions, involves minimal possible effort to deliver a working and valuable solution, and is designed to satisfy a specific user group. Its purpose is to:

      • Maximize learning.
      • Evaluate the value and acceptance of mobile applications.
      • Inform the building of a mobile delivery practice.

      The build-measure-learn loop suggests mobile delivery teams should perpetually take an idea and develop, test, and validate it with the mobile development solution, then expand on the MVP using the lessons learned and evolving ideas. In this sense the MVP is just the first iteration in the loop.

      Gauge the value with the right metrics

      Metrics are a powerful way to drive behavior change in your organization. But metrics are highly prone to creating unexpected outcomes so they must be used with great care. Use metrics judiciously to avoid gaming or ambivalent behavior, productivity loss, and unintended consequences.

      To learn more, visit Info-Tech's Select and Use SDLC Metrics Effectively blueprint.

      What should I measure?

      1. Mobile Application Engagement, Retention and User Satisfaction
        1. The activeness of users on the applications, the number of returning users, and the happiness of the users.
        2. Example: Number of tasks completed, number of active and returning users, session length and intervals, user satisfaction
      2. Value Driven from Mobile Applications
        1. The business value that the user directly or indirectly receives with the mobile application.
        2. Example: Mobile application revenue, business operational costs, worker productivity, business reputation and image
      3. Delivery Throughput and Quality
        1. The health and quality of your mobile applications throughout their lifespan and the speed to deliver working applications that meet stakeholder expectations.
        2. Example: Frequency of release, lead time, request turnaround, escaped defects, test coverage.

      Use Info-Tech's diagnostic to evaluate the reception of your mobile applications

      Info-Tech's Application Portfolio Assessment (APA) Diagnostic is a canned end-user satisfaction survey used to evaluate your application portfolio health to support data-driven decisions.

      This image contains a screenshot from Info-Tech's Application Portfolio Assessment (APA) Diagnostic

      USE THE PROGRAM DIAGNOSTIC TO:

      • Assess the importance and satisfaction of enterprise applications.
      • Solicit feedback from your end users on applications being used.
      • Understand the strengths and weaknesses of your current applications.
      • Perform a high-level application rationalization initiative.

      INTEGRATE DIAGNOSTIC RESULTS TO:

      • Target which applications to analyze in greater detail.
      • Expand on the initial application rationalization results with a more comprehensive and business-value-focused criteria.

      Grow your mobile delivery practice

      Level 1: Mobile Delivery Foundations

      You understand the opportunities and impacts mobile has on your business operations and its disruptive nature on your enterprise systems. Your software delivery lifecycle was optimized to incorporate the specific practices and requirements needed for mobile. A mobile platform was selected based on stakeholder needs that are weighed against current skillsets, high priority non-functional requirements, the available capacity and scalability of your stack, and alignment to your current delivery process.

      Level 2: Scaled Mobile Delivery

      New features and mobile use cases are regularly emerging in the industry. Ensuring your mobile platform and delivery process can easily scale to incorporate constantly changing mobile features and technologies is key. This can help minimize the impact these changes will have on your mobile stack and the resulting experience.

      Achieving this state requires three competencies: mobile security, performance optimization, and integration practices.

      Level 3: Leading-Edge Mobile Delivery

      Many of today's mobile trends involve, in one form or another, hardware components on the mobile device (e.g., NFC receivers, GPS, cameras). You understand the scope of native features available on your end user's mobile device and the required steps and capabilities to enable and leverage them.

      Hit a home run with your stakeholders

      Use a data-driven approach to select the right tooling vendor for your needs – fast.

      Awareness Education & Discovery Evaluation Selection

      Negotiation & Configuration

      1.1 Proactively Lead Technology Optimization & Prioritization 2.1 Understand Marketplace Capabilities & Trends 3.1 Gather & Prioritize Requirements & Establish Key Success Metrics 4.1 Create a Weighted Selection Decision Model 5.1 Initiate Price Negotiation with Top Two Venders
      1.2 Scope & Define the Selection Process for Each Selection Request Action 2.2 Discover Alternate Solutions & Conduct Market Education 3.2 Conduct a Data Driven Comparison of Vendor Features & Capabilities 4.2 Conduct Investigative Interviews Focused on Mission Critical Priorities with Top 2-4 Vendors 5.2 Negotiate Contract Terms & Product Configuration

      1.3 Conduct an Accelerated Business Needs Assessment

      2.3 Evaluate Enterprise Architecture & Application Portfolio Narrow the Field to Four Top Contenders 4.3 Validate Key Issues with Deep Technical Assessments, Trial Configuration & Reference Checks 5.3 Finalize Budget Approval & Project
      1.4 Align Stakeholder Calendars to Reduce Elapsed Time & Asynchronous Evaluation 2.4 Validate the Business Case 5.4 Invest in Training & Onboarding Assistance

      Investing time improving your software selection methodology has big returns.

      Info-Tech Insight

      Not all software selection projects are created equal – some are very small, some span the entire enterprise. To ensure that IT is using the right framework, understand the cost and complexity profile of the application you're looking to select. Info-Tech's Rapid Application Selection Framework approach is best for commodity and mid-tier enterprise applications; selecting complex applications is better handled by the methodology in Info-Tech's Implement a Proactive and Consistent Vendor Selection Process.

      Pitch your mobile delivery approach with Info-Tech's template

      Communicate the justification of your approach to mobile applications with Info-Tech's Mobile Application Delivery Communication Template:

      • Level set your mobile application goals and objectives by weighing end user expectations with technical requirements.
      • Define the high priority opportunities for mobile applications.
      • Educate decision makers of the limitations and challenges of delivering specific mobile experiences with the various mobile platform options.
      • Describe your framework to select the right mobile platform and delivery tools.
      • Lay out your mobile delivery roadmap and initiatives.

      INFO-TECH DELIVERABLE

      This is a screenshot from Info-Tech's Mobile Application Delivery Communication Template

      Info-Tech's methodology for mobile platform and delivery solution selection

      1. Set the Mobile Context

      2. Define Your Mobile Approach

      Phase Steps

      Step 1.1 Build Your Mobile Backlog

      Step 1.2 Identify Your Technical Needs

      Step 1.3 Define Your Non-Functional Requirements

      Step 2.1 Choose Your Platform Approach

      Step 2.2 Shortlist Your Mobile Delivery Solution

      Step 2.3 Create a Roadmap for Mobile Delivery

      Phase Outcomes

      • User personas
      • Mobile objectives and metrics
      • Mobile opportunity backlog
      • List of mobile features to enable the desired mobile experience
      • System current assessment
      • Mobile application quality definition
      • Readiness for mobile delivery
      • Desired mobile platform approach
      • Shortlisted mobile delivery solutions
      • Desired list of vendor features and services
      • MVP design
      • Mobile delivery roadmap

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2

      Call #1: Understand the case and motivators for mobile applications.

      Call #2: Discuss the end user and desired mobile experience.

      Call #5: Discuss the desired mobile platform.

      Call #8: Discuss your mobile MVP.

      Call #3: Review technical complexities and non-functional requirements.

      Call #6: Shortlist mobile delivery solutions and desired features.

      Call #9: Review your mobile delivery roadmap.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 6 to 9 calls over the course of 2 to 3 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Module 1 Module 2 Module 3 Module 4 Post-Workshop
      Activities Set the Mobile Context Identify Your Technical Needs Choose Your Platform & Delivery Solution Create Your Roadmap Next Steps andWrap-Up (offsite)

      1.1 Generate user personas with empathy maps

      1.2 Build your mobile application canvas

      1.3 Build your mobile backlog

      2.1 Discuss your mobile needs

      2.2 Conduct a technical assessment

      2.3 Define mobile application quality

      2.4 Verify your decision to deliver mobile applications

      3.1 Select your platform approach

      3.2 Shortlist your mobile delivery solution

      3.3 Build your feature and service lists

      4.1 Define your MVP release

      4.2 Build your roadmap

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      • User personas
      • Mobile objectives and metrics
      • Mobile opportunity backlog
      • List of mobile features to enable the desired mobile experience
      • System current assessment
      • Mobile application quality definition
      • Verification to proceed with mobile delivery
      • Desired mobile platform approach
      • Shortlisted mobile delivery solutions
      • Desired list of vendor features and services
      • MVP design
      • Mobile delivery roadmap
      • Completed workshop output deliverable
      • Next steps

      Phase 1

      Set the Mobile Context

      Choose Your Mobile Platform and Tools

      This phase will walk you through the following steps:

      • Step 1.1 – Build Your Mobile Backlog
      • Step 1.2 – Identify Your Technical Needs
      • Step 1.3 – Define Your Non-Functional Requirements

      This phase involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Step 1.1

      Build Your Mobile Backlog

      Activities

      1.1.1 Generate user personas with empathy maps

      1.1.2 Build your mobile application canvas

      1.1.3 Build your mobile backlog

      Set the Mobile Context

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • User personas
      • Mobile objectives and metrics
      • Mobile opportunity backlog

      Users expect your organization to support their mobile way of working

      Today, users expect sophisticated and personalized features, immersive interactions, and cross-platform capabilities from their mobile applications and be able to access information and services anytime, anywhere and on any device. These demands are pushing organizations to become more user-driven, placing greater importance on user experience (UX) with enterprise-grade technologies.

      How has technologies evolved to easily enable mobile capabilities?

      • Desktop-Like Features
        • Native-like features, such as geolocation and local caching, are supported through web language or third-party plugins and extensions.
      • Extendable & Scalable
        • Plug-and-play architecture is designed to allow software delivery teams to explore new use cases and mobile capabilities with out-of-the-box connectors and/or customizable REST APIs.
      • Low Barrier to Entry
        • Low- and no-code development tools, full-stack solutions, and plug-and-play architectures allow non-technical users to easily build and implement applications without direct IT involvement.
      • Templates & Shells
        • Vendors provide UI templates and application shells that contain pre-built native features and multiple aesthetic layouts in a publishing-friendly and configurable way.
      • Personalized Content
        • Content can be uniquely tailored to a user's preference or be automatically generated based on the user's profile or activity history.
      • Hands-Off Operations
        • Many mobile solutions operate in a as-a-service model where the underlying and integrated technologies are managed by the vendor and abstracted away.

      Make user experience (UX) the standard

      User experience (UX) focuses on a user's emotions, beliefs, and physical and psychological responses that occur before, during, or after interacting with a service or product.

      For a mobile application to be a meaningful experience, the functions, aesthetics and content must be:

      • Usable
        • Users can intuitively navigate through your mobile application and complete their desired tasks.
      • Desirable
        • The application elements are used to evoke positive emotions and appreciation.
      • Accessible
        • Users can easily use your mobile application, including those with disabilities.
      • Valuable
        • Users find the content useful, and it fulfills a need.

      Enable a greater experience with UX-driven thinking

      Designing for a high-quality experience requires more than just focusing on the UI. It also requires the merging of multiple business, technical, and social disciplines in order to create an immersive, practical, and receptive application. The image on the right explains the disciplines involved in UX. This is critical for ensuring users have a strong desire to use the mobile application, it is adequately supported technically, and it supports business objectives.

      To learn more, visit Info-Tech's Implement and Mature Your User Experience Design Practice blueprint.

      A Venn diagram is depicted, demonstrating the inputs that lead to an interactive design, with interactive elements, usability, and accessibility. This work by Mark Roden is licensed under a Creative Commons Attribution 3.0 Unported License.

      Source: Marky Roden, Xomino, 2018

      UX-driven mobile apps bring together a compelling UI with valuable functionality

      Info-Tech Insight

      Organizations often over-rotate on the UI. Receptive and satisfying applications require more than just pretty pictures, bold colors, and flashy animations. UX-driven mobile applications require the seamless merging of enticing design elements and valuable functions that are specifically tailored to the behaviors of the users. Take a deep look at how each design element and function is used and perceived by the user, and how your application can sufficiently support user needs.

      UI-Function Balance to Achieve Highly Satisfying Mobile Applications

      An application's UI and function both contribute to UX, but they do so in different ways.

      • The UI generates the visual, audio, and vocal cues to draw the attention of users to key areas of the application while stimulating the user's emotions.
      • Functions give users the means to satisfy their needs effortlessly.

      Finding the right balance of UI and function is dependent on the organization's understanding of user emotions, needs, and tendencies. However, these factors are often left out of an application's design. Having the right UX competencies is key in assuring user behaviors are appropriately accommodated early in the delivery process.

      To learn more, visit Info-Tech's Modernize Your Corporate Website to Drive Business Value blueprint.

      Focus your efforts on all items that drive high user experience and satisfaction

      UX-driven mobile applications involve all interaction points and system components working together to create an immersive experience while being actively supported by delivery and operations teams. Many organizations commonly focus on visual and content design to improve the experience, but this is only a small fraction of the total UX design. Look beyond the surface to effectively enhance your application's overall UX.

      Typical Focus of Mobile UX

      Aesthetics
      What Are the Colors & Fonts?

      Relevance & Modern
      Will Users Receive Up to Date Content and Trending Features?

      UI Design
      Where Are the Interaction Points?

      Content Layout
      How Is Content Organized?

      Critical Areas of Mobile UX That Are Often Ignored

      Web Infrastructure
      How Will Your Application Be Operationally Supported?

      Human Behavior
      What Do the Users Feel About Your Application?

      Coding Language
      What Is the Best Language to Use?

      Cross-Platform Compatibility
      How Does It Work in a Browser Versus Each Mobile Platform?

      Application Quality
      How are Functional and Non-Functional Needs Balanced?

      Adoption & Retention
      How Do I Promote Adoption and Maintain User Engagement?

      Application Support
      How Will My Requests and Issues Be Handled?

      Use personas to envision who will be using your mobile application

      What Are Personas?

      Personas are detailed descriptions of the targeted audience of your mobile application. It represents a type of user in a particular scenario. Effective personas:

      • Express and focus on the major needs and expectations of the most important user groups.
      • Give a clear picture of the typical user's behavior.
      • Aid in uncovering critical features and functionalities.
      • Describe real people with backgrounds, goals, and values.

      Why Are Personas Important to UX?

      They are important because they help:

      • Focus the development of mobile application features on the immediate needs of the intended audience.
      • Detail the level of customization needed to ensure content is valuable to and resonates with the user.
      • Describe how users may behave when certain audio and visual stimulus are triggered from the mobile application.
      • Outline the special design considerations required to meet user accessibility needs.

      Key Elements of a Persona:

      • Professional and Technical Skills and Experiences (e.g., knowledge of mobile applications, area of expertise)
      • Persona Group (e.g., executives)
      • Technological Environment of User (e.g., devices, browsers, network connection)
      • Demographics (e.g., nationality, age, language spoken)
      • Typical Behaviors and Tendencies (e.g., goes to different website when cannot find information in 20 seconds)
      • Purpose of Using the Mobile Application (e.g., search for information, submit registration form)

      Create empathy maps to gain a deeper understanding of stakeholder personas

      Empathy mapping draws out the characteristics, motivations, and mannerisms of a potential end user.

      This image contains an image of an empathy map from XPLANE, 2017. it includes the following list: 1. Who are we empathizing with; 2. What do they need to DO; 3. What do they SEE; 4. What do they SAY?; 5. What do they DO; 6. What do they HEAR; 7. What do they THINK and FEEL.

      Source: XPLANE, 2017

      Empathy mapping focuses on identifying the problems, ambitions, and frustrations they are looking to resolve and describes their motivations for wanting to resolve them. This analysis helps your teams:

      • Better understand the reason behind the struggles, frustrations and motivators through a user's perspective.
      • Verify the accuracy of assertions made about the user.
      • Pinpoint the specific problem the mobile application will be designed to solve and the constraints to its successful adoption and on-going use.
      • Read more about empathy mapping and download the empathy map PDF template here.

      To learn more, visit Info-Tech's Use Experience Design to Drive Empathy with the Business blueprint.

      1.1.1 Generate user personas with empathy maps

      1-3 hours

      1. Download the Empathy Map Canvas and draw the map on a whiteboard or project it on the screen.
      2. Choose an end user to be the focus of your empathy map. Using sticky notes, fill out the sections of the empathy map in the following order:
        1. Start by filling out the goals section. State who the subject of the empathy map will be and what activity or task you would like them to do.
          1. Focus on activities and tasks that may benefit from mobile.
        2. Next, complete the outer sections in clockwise order (see, say, do, hear). The purpose of this is to think in terms of what the subject of your empathy map is observing, sensing, and experiencing.
          1. Indicate the mobile devices and OS users will likely use and the environments they will likely be in (e.g., places with poor connections)
          2. Discuss accessibility needs and how user prefer to consume content.
        3. Last, complete the inner circle of the empathy map (pains and gains). Since you spent the last step of the exercise thinking about the external influences on your stakeholder, you can think about how those stimuli affect their emotions.
      3. Document your end user persona into Info-Tech's Mobile Application Delivery Communication Template.

      Input

      Output
      • List of potential mobile application users
      • User personas
      Materials Participants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.1.1 cont'd

      This image contains an image of an empathy map from XPLANE, 2017. it includes the following list: 1. Who are we empathizing with; 2. What do they need to DO; 3. What do they SEE; 4. What do they SAY?; 5. What do they DO; 6. What do they HEAR; 7. What do they THINK and FEEL.

      Download the Empathy Map Canvas

      Many business priorities are driving mobile

      Mobile Applications

      • Product Roadmap
        • Upcoming enterprise technology releases and updates offer mobile capabilities to expand its access to a broader userbase.
      • Cost Optimization
        • Maximizing business value in processes and technologies through disciplined and strategic cost and spending reduction practices with mobile applications.
      • Competitive Differentiation
        • Developing and optimizing your organization's distinct products and services quickly with mobile applications.
      • Digital Transformation
        • Transitioning processes, data and systems to a digital environment to broaden access to enterprise data and services anywhere at anytime.
      • Operational Efficiency
        • Improving software delivery and business process throughput by increasing worker productivity with mobile applications.
      • Other Business Priorities
        • New corporate products and services, business model changes, application rationalization and other priorities may require modernization, innovation and a mobile way of working.

      Focus on the mobile business and end user problem, not the solution

      People are naturally solution-focused. The onus isn't on them to express their needs in the form of a problem statement!

      When refining your mobile problem statement, attempt to answer the following four questions:

      • Who is impacted?
      • What is the (user or organizational) challenge that needs to be addressed?
      • Where does it happen?
      • Why does it matter?

      There are many ways of writing problem statements, a clear approach follows the format:

      • "Our (who) has the problem that (what) when (where). Our solution should (why)."
      • Example: "Our system analysts has the problem that new tickets take too long to update when working on user requests. Our approach should enable the analyst to focus on working with customers and not on administration."

      Adapted from: "Design Problem Statements – What and How to Frame Them"

      How to write a vision statement

      It's ok to dream a little!

      When thinking about a vision statement, think about:

      • Who is it for?
      • What does the customer need?
      • What can we do for them?
      • And why is this special?

      There are different statement templates available to help form your vision statements. Some include:

      1. For [our target customer], who [customer's need], the [product] is a [product category or description] that [unique benefits and selling points]. Unlike [competitors or current methods], our product [main differentiators]. (Crossing the Chasm)
      2. "We believe (in) a [noun: world, time, state, etc.] where [persona] can [verb: do, make, offer, etc.], for/by/with [benefit/goal].
      3. To [verb: empower, unlock, enable, create, etc.] [persona] to [benefit, goal, future state].
      4. Our vision is to [verb: build, design, provide], the [goal, future state], to [verb: help, enable, make it easier to...] [persona]."

      (Numbers 2-4 from: How to define a product vision)

      Info-Tech Best Practice

      A vision shouldn't be so far out that it doesn't feel real and so short term that it gets bogged down in minutiae and implementation details. Finding that right balance will take some trial and error and will be different depending on your organization.

      Ensure mobile supports ongoing value delivery and stakeholder expectations

      Success hinges on your team's ability to deliver business value. Well-developed mobile applications instill stakeholder confidence in ongoing business value delivery and stakeholder buy-in, provided proper expectations are set and met.

      Business value defines the success criteria of an organization, and it is interpreted from four perspectives:

      • Profit Generation – The revenue generated from a business capability with mobile applications.
      • Cost Reduction – The cost reduction when performing business capabilities with mobile applications.
      • Service Enablement – The productivity and efficiency gains of internal business operations with mobile applications.
      • Customer and Market Reach – Metrics measuring the improved reach and insights of the business in existing or new markets.

      See our Build a Value Measurement Framework blueprint for more information about business value definition.

      This image contains a quadrant analysis with the following labels: Left - Improved Capabilities; Top - Outward; Right - Financial Benefit; Bottom - Inward. the quadrants are labeled the following, in order from left to right, top to bottom. Customer and Market Reach; Profit Generation; Service Enhancement; Cost Reduction

      Set realistic mobile goals

      Mobile applications enables the exploration of new and different ways to improve worker productivity and deliver business value. However, the realities of mobile applications may limit your ability to meet some of your objectives:

      • On the day of installation, the average retention rate for public-facing applications was 25.3%. By day 30, the retention rate drops to 5.7%. (Source: Statista, 2020)
      • 63% of 3,335 most popular Android mobile applications on the Google Play Store contained open-source components with known security vulnerabilities and other pervasive security concerns including exposing sensitive data (Source: Synopsys, 2021)
      • 62% of users would delete the application because of performance issues, such as crashes, freezes and other errors (Source: Intersog, 2021).

      These realities are not guaranteed to occur or impede your ability to deliver valuable mobile applications, but they can lead to unachievable expectations. Ensure your stakeholders are not oversold on advertised benefits and hold you accountable for unrealistic objectives. Recognize that the organization must also change how it works and operates to see the full benefit and adoption of mobile applications and overcome the known and unknown challenges and hurdles that often come with mobile delivery.

      Benchmarks present enticing opportunities, but should be used to set reasonable expectations

      66%
      Improve Market Reach
      66% of the global population uses a mobile device
      Source: DataReportal, 2021

      20%
      Connected Workers are More Productive
      Nearly 20 percent of mobile professionals estimate they miss more than three hours of working time a week not being able to get connected to the internet
      Source: iPass, 2017

      80%
      Increase Brand Recognition
      80% of smartphone users are more likely to purchase from companies whose mobile sites of apps help them easily find answers to their questions
      Source: Google, 2018

      Gauge the value with the right metrics

      Metrics are a powerful way to drive behavior change in your organization. But metrics are highly prone to creating unexpected outcomes so they must be used with great care. Use metrics judiciously to avoid gaming or ambivalent behavior, productivity loss, and unintended consequences.

      To learn more, visit Info-Tech's Select and Use SDLC Metrics Effectively blueprint.

      What should I measure?

      1. Mobile Application Engagement, Retention and User Satisfaction
        • The activeness of users on the applications, the number of returning users, and the happiness of the users.
        • Example: Number of tasks completed, number of active and returning users, session length and intervals, user satisfaction
      2. Value Driven from Mobile Applications
        • The business value that the user directly or indirectly receives with the mobile application.
        • Example: Mobile application revenue, business operational costs, worker productivity, business reputation and image
      3. Delivery Throughput and Quality
        • The health and quality of your mobile applications throughout their lifespan and the speed to deliver working applications that meet stakeholder expectations.
        • Example: Frequency of release, lead time, request turnaround, escaped defects, test coverage.

      Use Info-Tech's diagnostic to evaluate the reception of your mobile applications

      Info-Tech's Application Portfolio Assessment (APA) Diagnostic is a canned end user satisfaction survey used to evaluate your application portfolio health to support data-driven decisions.

      This image contains a screenshot from Info-Tech's Application Portfolio Assessment (APA) Diagnostic

      USE THE PROGRAM DIAGNOSTIC TO:

      • Assess the importance and satisfaction of enterprise applications.
      • Solicit feedback from your end users on applications being used.
      • Understand the strengths and weaknesses of your current applications.
      • Perform a high-level application rationalization initiative.

      INTEGRATE DIAGNOSTIC RESULTS TO:

      • Target which applications to analyze in greater detail.
      • Expand on the initial application rationalization results with a more comprehensive and business-value-focused criteria.

      Use a canvas to define key elements of your mobile initiative

      Mobile Application Initiative Name

      Owner:
      Parent Initiative:
      Updated:

      NAME
      LINK
      October 05, 2022

      Problem Statement

      Vision

      The problem or need mobile applications are addressing

      Vision, unique value proposition, elevator pitch, or positioning statement

      Business Goals & Metrics

      Capabilities, Processes & Application Systems

      List of business objectives or goals for the mobile application initiative.

      List of business capabilities, processes and application systems related to this initiative.

      Personas/Customers/Users

      Stakeholders

      List of groups who consume the mobile application

      List of key resources, stakeholders, and teams needed to support the process, systems and services

      To learn more, visit Info-Tech's Deliver on Your Digital Product Vision blueprint.

      1.1.2 Build your mobile application canvas

      1-3 hours

      1. Complete the following fields to build your mobile application canvas:
        • Mobile application initiative name
        • Mobile application owner
        • Parent initiative name
        • Problem that mobile applications are intending to solve and your vision. See the outcome from the previous exercise.
        • Mobile application business goals and metrics.
        • Capabilities, processes and application systems involved
        • Primary customers/users (For additional help with your product personas, download and complete to Deliver on Your Digital Product Vision.)
      2. Stakeholders
      3. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • User personas
      • Business strategy
      • Problem and vision statements
      • Mobile objectives and metrics
      • Mobile application canvas
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.1.2 cont'd

      Mobile Application Initiative Name

      Owner:
      Parent Initiative:
      Updated:

      NAME
      LINK
      October 05, 2022

      Problem Statement

      Vision

      [Problem Statement]

      [Vision]

      Business Goals & Metrics

      Capabilities, Processes & Application Systems

      [Business Goal 1, Metric]
      [Business Goal 2, Metric]
      [Business Goal 3, Metric]

      [Business Capability]
      [Business Process]
      [Application System]

      Personas/Customers/Users

      Stakeholders

      [User 1]
      [User 2]
      [User 3]

      [Stakeholder 1]
      [Stakeholder 2]
      [Stakeholder 3]

      Create your mobile backlog

      Your backlog gives you a holistic understanding of the demand for mobile applications across your organization.

      Opportunities
      Trends
      MVP

      External Sources

      Internal Sources

      • Market Trends Analysis
      • Competitive Analysis
      • Regulations & Industry Standards
      • Customer & Reputation Analysis
      • Application Rationalization
      • Capability & Value Stream Analysis
      • Business Requests & Incidents
      • Discovery & Mining Capabilities

      A mobile application minimum viable product (MVP) focuses on a small set of functions, involves minimal possible effort to deliver a working and valuable solution, and is designed to satisfy a specific user group. Its purpose is to maximize learning, evaluate value and acceptance, and inform the development of a full-fledged mobile delivery practice.

      Find your mobile opportunities

      Modern mobile technologies enable users to access, analyze and change data anywhere with native device features, which opens the door to enhanced processes and new value sources.

      Examples of Mobile Opportunities:

      • Mobile Payment
        • Cost alternative to credit card transaction fees.
        • Loyalty systems are updated upon payment without need of a physical card.
        • Quicker completion of transactions.
      • Inventory Management
        • Update inventory database when shipments arrive or deliveries are made.
        • Inform retailers and consumers of current stock on website.
        • Alert staff of expired or outdated products.
      • Quick and Small Data Transfer
        • Embed tags into posters to transfer URIs, which sends users to sites containing product or location information.
        • Replace entry tags, fobs, or smart cards at doors.
        • Exchange contact details.
      • Location Sensitive Information
        • Proactively send promotions and other information (e.g. coupons, event details) to users within a defined area.
        • Inform employees of nearby prospective clients.
      • Supply Chain Management
        • Track the movement and location of goods and delivery trucks.
        • Direct drivers to the most optimal route.
        • Location-sensitive billing apps such as train and bus ticket purchases.
      • Education and Learning
        • Educate users about real-world objects and places with augmented books and by pushing relevant learning materials.
        • Visualize theories and other text with dynamic 3D objects.
      • Augmented Reality (AR)
        • Provide information about the user's surroundings and the objects in the environment through the mobile device.
        • Interactive and immersive experiences with the inclusion of virtual reality.
      • Architecture and Planning
        • Visualize historic buildings or the layout of structural projects and development plans.
        • Develop a digital tour with location-based audio initiated with location-based services or a camera.
      • Navigation
        • Provide directions to users to navigate and provide contextual travelling instructions.
        • Push traffic notifications and route changes to travelling users.
      • Tracking User Movement
        • Predict the future location of users based on historic information and traffic modelling.
        • Proactively push information to users before they reach their destination.

      1.1.3 Build your mobile backlog

      1-3 hours

      1. As a group, discuss the use and value mobile already has within your organization for each persona.
        1. What are some of the apps being used?
        2. What enterprise systems and applications are already exposed to the web and accessible by mobile devices?
        3. How critical is mobile to business operations, marketing campaigns, etc.?
      2. Discuss how mobile can bring additional business value to other areas of your organization for each persona.
        1. Can mobile enhance your customer reach? Do your customers care that your services are offered through mobile?
        2. Are employees asking for better access to enterprise systems in order to improve their productivity?
      3. Write your mobile opportunities in the following form: As a [end user persona], I want to [process or capability to enable with mobile applications], so that [organizational benefit]. Prioritize each opportunity against feasibility, desirability, and viability.
      4. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Input

      Output
      • Problem and vision statements
      • Mobile objectives and metrics
      • Mobile application canvas
      • Mobile opportunities backlog
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Manage your mobile backlog

      Your backlog stores and organizes your mobile opportunities at various stages of readiness. It must be continuously refined to address new requests, maintenance and changing priorities.

      3 – IDEAS
      Composed of raw, vague, and potentially large ideas that have yet to go through any formal valuation.

      2 – QUALIFIED
      Researched and qualified opportunities awaiting refinement.

      1 READY
      Discrete, refined opportunities that are ready to be placed in your team's delivery plans.

      Adapted from Essential Scrum

      A well-formed backlog can be thought of as a DEEP backlog

      • Detailed Appropriately: opportunities are broken down and refined as necessary
      • Emergent: The backlog grows and evolves over time as opportunities are added and removed.
      • Estimated: The effort an opportunity requires is estimated at each tier.
      • Prioritized: The opportunity's value and priority are determined at each tier.

      (Source Perforce, 2018)

      See our Deliver on Your Digital Product Vision for more information on backlog practices.

      Step 1.2

      Identify Your Technical Needs

      Activities

      1.2.1 Discuss your mobile needs

      1.2.2 Conduct a technical assessment

      Set the Mobile Context

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • List of mobile features to enable the desired mobile experience
      • System current assessment

      Describe your desired mobile experiences with journey maps

      A journey map tells the story of the user's experience with an existing or prospective product or service, starting with a trigger, through the process of engagement, to create an outcome. Journey maps can focus on a particular part of the user's or the entire experience with your organization's products or services. All types of maps capture key interactions and motivations of the user in chronological order.

      Why are journey maps an important for mobile application delivery?

      Everyone has their own preferred method for completing their tasks on mobile devices – often, what differentiates one persona from another has to do with how users privately behave. Understand that the activities performed outside of IT's purview develop context for your persona's pain points and position IT to meet their needs with the appropriate solution.

      To learn more, visit Info-Tech's Use Experience Design to Drive Empathy with the Business blueprint.

      Two charts are depicted, the first shows the path from Trigger, through steps 1-4, to the outcome, and the Activities and Touchpoints for each. The second chart shows the Expectation analysis, showing which steps are must-haves, nice-to-haves, and hidden-needs.

      Pinpoint specific mobile needs in your journey map

      Realize that mobile applications may not precisely fit with your personas workflow or align to their expectations due to device and system limitations and restrictions. Flag the mobile opportunities that require significant modifications to underlying systems.

      Consider these workflow scenarios that can influence your persona's desire for mobile:

      Workflow Scenarios Ask Yourself The Key Questions Technology Constraints or Restrictions to Consider Examples of Mobile Opportunities

      Data View – Data is queried, prepared and presented to make informed decisions, but it cannot be edited.

      Where is the data located and can it be easily gathered and prepared?

      Is the data sensitive and can it be locally stored?

      What is the level of detail in my view?

      Multi-factor authentication required.

      Highly sensitive data requires encryption in transit and at rest.

      Minor calculations and preparation needed before data view.

      Generate a status report.

      View social media channels.

      View contact information.

      Data Collection – Data is inputted directly into the application and updates back-end system or integrated 3rd party services.

      Do I need special permission to add, delete and overwrite data?

      How much data can I edit?

      Is the data automatically gathered?

      Bandwidth restrictions.

      Multi-factor authentication required.

      Native device access required (e.g., camera).

      Multiple types and formats of gathered data.

      Manual and automatic data gathering

      Book appointments with clients.

      Update inventory.

      Tracking movement of company assets.

      Data Analysis & Modification – Data is evaluated, manipulated and transformed through the application, back-end system or 3rd party service.

      How complex are my calculations?

      Can computations be offloaded?

      What resources are needed to complete the analysis?

      Memory and processing limitations on device.

      Inability to configure device and enterprise hardware to support system resource demand.

      Scope and precision of analysis and modifications.

      Evaluate and propose trends.

      Gauge user sentiment.

      Propose next steps and directions.

      Define the mobile experience your end users want

      Anytime, Anywhere
      The user can access, update and analyze data, and corporate products and services whenever they want, in all networks, and on any device.

      Hands-Off & Automated
      The application can perform various workflows and tasks without the user's involvement and notify the user when specific triggers are hit.

      Personalized & Insightful
      Content presentation and subject are tailored for the user based on specific inputs from the user, device hardware or predicted actions.

      Integrated Ecosystem
      The application supports a seamless experience across various 3rd party and enterprise applications and services the user needs.

      Visually Pleasing & Fulfilling
      The UI is intuitive and aesthetically gratifying with little security and performance trade-offs to use the full breadth of its functions and services.

      Each mobile platform has its own take on the mobile native experience. The choice ultimately depends on whether the costs and effort are worth the anticipated value.

      1.2.1 Discover your mobile needs

      1-3 hours

      1. Define the workflow of a high priority opportunity in your mobile backlog. This workflow can be pertaining to an existing mobile application or a workflow that can benefit with a mobile application.
        1. Indicate the trigger that will initiate the opportunity and the desired outcome.
        2. Break down the persona's desired outcome into small pieces of value that are realized in each workflow step.
      2. Identify activities and touchpoints the persona will need to complete to finish each step in the workflow. Indicate the technology used to complete the activity or to facilitate the touchpoint.
      3. Indicate which activities and touchpoints can be satisfied, complimented or enhanced with mobile.

      Input

      Output
      • User personas
      • Mobile application canvas
      • Desired mobile experience
      • List of mobile features
      • Journey map
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.2.1 cont'd

      Workflow

      Trigger

      Conduct initial analysis

      Get planning help

      Complete and submit RFP

      Design and implement solution

      Implement changes

      Activities, Channels, and Touchpoints

      Need is recognized in CIO council meeting

      See if we have a sufficient solution internally

      Seek planning help (various channels)

      *Meet with IT shared services business analyst

      Select the appropriate vendor

      Follow action plan

      Compliance rqmt triggered by new law

      See if we have a sufficient solution internally

      *Hold in-person initial meeting with IT shared services

      *Review and approve rqmts (email)

      Seek miscellaneous support

      Implement project and manage change

      Research potential solutions in the marketplace

      Excess budget identified for utilization

      Pick a "favorite" solution

      *Negotiate and sign statement of work (email)

      Prime organization for the change

      Create action plan

      If solution is unsatisfactory, plan remediation

      Current Technology

      • Email
      • Video conferencing
      • Phone
      • Meeting transcripts and recordings
      • ERP
      • IT asset management
      • Internet browser for research
      • Virtual environment to demonstrate solutions
      • Email
      • Vendor assessment and procurement solution
      • Email
      • Video conferencing
      • Phone
      • Meeting transcripts and recordings
      • PDF documents and reader
      • Digital signature
      • Email
      • Video conferencing
      • Phone
      • Meeting transcripts and recordings
      • PDF documents and reader
      • Digital signature
      • Email
      • Video conferencing
      • Phone
      • Vendor assessment and procurement solution
      • Project management solution
      • Team collaboration solution
      • Email
      • Video conferencing
      • Phone
      • Project management solution
      • Team collaboration solution
      • Vendor's solution

      Legend:

      Bold – Touchpoint

      * – Activities or Touchpoints That Can Benefit with Mobile

      1.2.1 cont'd

      1-3 hours

      1. Analyze persona expectations. Identify the persona's must-haves, then nice-to-haves, and then hidden needs to effectively complete the workflow.
        1. Must-haves. The necessary outcomes, qualities, and features of the workflow step.
        2. Nice-to-haves. Desired outcomes, qualities, or features that your persona is able to articulate or express.
        3. Hidden needs. Outcomes, qualities, or features that your persona is not aware they have a desire for; benefits that they are pleasantly surprised to receive. These will usually be unknown for your first-iteration journey map.
      2. Indicate which persona expectations can be satisfied with mobile. Discuss what would the desired mobile experience be.
      3. Discuss feedback and experiences your team has heard from the personas they engage with regularly.
      4. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      1.2.1 cont'd

      Example

      This image contains an example workflow for determining mobile needs.

      1.2.1 cont'd

      Template:

      Workflow

      TriggerStep 1Step 2Step 3Step 4

      Desired Outcome

      Journey Map

      Activities & Touch-points

      <>

      <>

      <>

      <>

      <>

      <>

      Must-Haves

      <>

      <>

      <>

      <>

      <>

      <>

      Nice-to-Haves

      <>

      <>

      <>

      <>

      <>

      <>

      Hidden Needs

      <>

      <>

      <>

      <>

      <>

      <>

      Emotional Journey

      <>

      <>

      <>

      <>

      <>

      <>

      If you need more than four steps in the workflow, duplicate this slide.

      Understand how mobile fits with your current system

      Evaluate the risks and impacts of your desired mobile features by looking at your enterprise system architecture from top to bottom. Is your mobile vision and needs compatible with your existing business capabilities and technologies?

      An architecture is usually represented by one or more architecture views that together provide a coherent description of the application system, including demonstrating the full impact mobile will have. A single, comprehensive model is often too complex to be understood and communicated in its most detailed form, and a model too high level hides the underlying complexity of an application's structure and deployment (The Open Group, TOGAF 8.1.1 - Developing Architecture Views). Obtain a complete understanding of your architecture by assessing it through multiple levels of views to reveal different sets of concerns:

      Application Architecture Views

      1. Use Case View
      • How does your business operate, and how will users interact with your mobile applications?
    • . Process View
      • What is the user workflow impacted by mobile, and how will it change?
    • Component View
      • How are my existing applications structured? What are its various components? How will mobile expand the costs of the existing technical debt?
    • Data View
      • What is the relationship of the data and information consumed, analyzed, and transmitted? Will mobile jeopardize the quality and reliability of the data?
    • Deployment View
      • In what environment are your mobile application components deployed? How will the existing systems operate with your mobile applications?
    • System View
      • How does your mobile application communicate with other internal and external systems? How will dependencies change with mobile?
    • See our Enhance Your Solution Architecture for more information.

      Ask key questions in your current system assessment

      • How do the various components of your system communicate with each other (e.g., web APIs, middleware, and point to point)?
      • What information is exchanged during the conversation?
      • How does the data flow from one component to the next? Is the data read-only or can application and users edit and modify it?
      • What are the access points to your mid- and back-tier systems (e.g., user access through web interface, corporate networks and third-party application access through APIs)?
      • Who has access to your enterprise systems?
      • Which components are managed and operated by third-party providers? What is your level of control?
      • What are the security protocols currently enforced in your system?
      • How often are your databases updated? Is it real-time or periodic extract, transfer, and load (ETL)?
      • What are the business rules?
      • Is your mobile stack dependent on other systems?
      • Is a mobile middleware, web server, or API gateway needed to help facilitate the integration between devices and your back-end support?

      1.2.2 Conduct a technical assessment

      1-3 hours

      1. Evaluate your current systems that will support the journey map of your mobile opportunities based on two categories: system quality and system management. Use the tables on the following slides and modify the questions if needed.
      2. Discuss if the current state of your system will impede your ability to succeed with mobile. Use this discussion to verify the decision to continue with mobile applications in your current state.
      3. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • Journey map
      • Understanding of current system
      • Assessment of current system
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.2.2 cont'd

      Current State System Quality Assessment

      Factors Definitions Survey Responses
      Fit-for-Purpose System functionalities, services and integrations are designed and implemented for the purpose of satisfying the end users' needs and technology compatibilities. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Response Rate The system completes computation and processing requests within acceptable timeframes. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Data Quality The system delivers consumable, accurate, and trustworthy data. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Usability The system provides functionalities, services and integrations that are rewarding, engaging, intuitive, and emotionally satisfying. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Reliability The system is resilient or quickly recovers from issues and defects. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Accessible The system is available on demand and on the end user's preferred interface and device. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Secured End-user activity and data is protected from unauthorized access. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Adaptable The system can be quickly tailored to meet changing end-user and technology needs with reusable and customizable components. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)

      1.2.2 cont'd

      Current State System Management Assessment

      Factors Definitions Survey Responses
      Documentation The system is documented, accurate, and shared in the organization. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Measurement The system is continuously measured against clearly defined metrics tied to business value. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Compliance The system is compliant with regulations and industry standards. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Continuous Improvement The system is routinely rationalized and enhanced. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Architecture There is a shared overview of how the process supports business value delivery and its dependencies with technologies and other processes. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Ownership & Accountability The process has a clearly defined owner who is accountable for its risks and roadmap. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Support Resources are available to address adoption and execution challenges. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Organizational Change Management Communication, onboarding, and other change management capabilities are available to facilitate technology and related role and process changes. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)

      Step 1.3

      Define Your Non-Functional Requirements

      Activities

      1.3.1 Define mobile application quality

      1.3.2 Verify your decision to deliver mobile applications

      Set the Mobile Context

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams

      Outcomes of this step

      • Mobile application quality definition
      • Readiness for mobile delivery

      Build a strong foundation of mobile application quality

      Functionality and aesthetics often take front seats in mobile application delivery. Applications are then frequently modified and changed, not because they are functionally deficient or visually displeasing, but because they are difficult to maintain or scale, too slow, vulnerable or compromised. Implementing clear quality principles (i.e., non-functional requirements) and strong quality assurance practices throughout delivery are critical to minimize the potential work of future maintenance and to avoid, mitigate and manage IT risks.

      What is Mobile Application Quality?

      • Quality requirements (i.e., non-functional requirements) are properties of a system or product that dictate how it should behave at runtime and how it should be designed, implemented, and maintained.
      • These requirements should be involved in decision making around architecture, UI and functional design changes.
      • Functionality should not dictate the level of security, availability, or performance of a product, thereby risking system quality. Functionality and quality are viewed orthogonally, and trade-offs are discussed when one impacts the other.
      • Quality attributes should never be achieved in isolation as one attribute can have a negative or positive impact on another (e.g. security and availability).

      Why is Mobile Quality Assurance Critical?

      • Quality assurance (QA) is a necessity for the validation and verification of mobile delivery, whether you are delivering applications in an Agile or Waterfall fashion. Effective QA practices implemented across the software development lifecycle (SDLC) are vital, as all layers of the mobile stack need to readily able to adjust to suddenly evolving and changing business and user needs and technologies without risking system stability and breaking business standards and expectations.
      • However, investments in QA optimizations are often afterthoughts. QA is commonly viewed as a lower priority compared to other delivery capabilities (e.g., design and coding) and is typically the first item cut when delivery is under pressure.

      See our Build a Software Quality Assurance Program for more information.

      Mobile emphasizes the importance of good security, performance and integration

      Today's mobile workforce is looking for new ways to get more work done quickly. They want access to enterprise solutions and data directly on their mobile device, which can reside on multiple legacy systems and in the cloud and third-party infrastructure. This presents significant performance, integration, and security risks.

      Cloud Solutions: Can I use my existing APIs?. Solutions in Corporate Networks: Do my legacy systems have the capacity to support mobile?; How do I integrate solutions and data from multiple sources into a single view?; Third Party Solutions: Will I have a significant performance bottleneck?; Single View on Mobile Devices: How is corporate data stored on the device?; What new technology dependencies must I account for in my architecture and operational support capabilities?

      Mobile risks opening and widening existing security gaps

      New mobile technologies and the continued expansion of the enterprise environment increase the number of entry points attackers to your corporate data and networks. The ever-growing volume, velocity, and variety of new threats puts significant pressure on mobile delivery teams who are responsible for implementing mobile security measures and maintaining alignment to your security policies and those of app stores.

      Mobile attacks can come from various vectors:

      Attack Surface: Mobile Device

      Attack Surface: Network

      Attack Surface: Data Center

      Browser:
      Phishing
      Buffer Overflow
      Data Caching

      System:
      No Passcode
      Jailbroken and Rooted OS
      No/Weak Encryption
      OS Data Caching

      Phone:
      SMSishing
      Radio Frequency Attacks

      Apps:
      Configuration Manipulation
      Runtime Injection
      Improper SSL Validation

      • Packet Sniffing
      • Session Hijacking
      • Man-in-the-Middle (circumvent password verification systems)
      • Fake SSL Certificate
      • Rogue Access Points

      Web Server:
      Cross-Site Scripting (XSS)
      Brute Force Attacks
      Server Misconfigurations

      Database:
      SQL Injection
      Data Dumping

      Understand the top web security risks and vulnerabilities seen in the industry

      Recognize mobile applications are exposed to the same risks and vulnerabilities as web applications. Learn of OWASP's top 10 web security risks.

      • Broken Access Control
        • Failures typically lead to unauthorized information disclosure, modification, or destruction of all data or performing a business function outside the user's limits.
      • Cryptographic Failures
        • Improper and incorrect protection of data in transit and at rest, especially proprietary and confidential data and those that fall under privacy laws.
      • Injection
        • Execution of malicious code and injection of hostile or unfiltered data on the mobile device via the mobile application.
      • Insecure Design
        • Missing or ineffective security controls in the application design. An insecure design cannot be fixed by a perfect implementation,. Needed security controls were never created to defend against specific attacks.
      • Security Misconfiguration
        • The security settings in the application are not securely set or configured, including poor security hardening and inadequate system upgrading practices.
      • Vulnerable and Outdated Components
        • System components are vulnerable because they are unsupported, out of date, untested or not hardened against current security concerns.
      • Identification and Authentication Failures
        • Improper or poor protection against authentication-related attacks, particularly to the user's identity, authentication and session management.
      • Software and Data Integrity Failures
        • Failures related to code and infrastructure that does not protect against integrity violations, such as an application relying upon plugins, libraries, or modules from untrusted sources, repositories, and content delivery networks
      • Security Logging and Monitoring Failures
        • Insufficient logging, detection, monitoring, and active response that hinders the ability to detect, escalate, and respond to active breaches.
      • Server-Side Request Forgery (SSRF)
        • SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL.

      Good mobile application performance drives satisfaction and value delivery

      Underperforming mobile applications can cause your users to be unproductive. Your mobile applications should always aim to satisfy the productivity requirements of your end users.

      Users quickly notice applications that are slow and difficult to use. Providing a seamless experience for the user is now heavily dependent on how well your application performs. Optimizing your mobile application's processing efficiency can help your users perform their jobs properly in various environment conditions.

      Productive Users Need
      Performant Mobile Applications

      Persona

      Mobile Application Use Case

      Optimized Mobile Application

      Stationary Worker

      • Design flowcharts and diagrams, while abandoning paper and desktop apps in favor of easy-to-use, drawing tablet applications.
      • Multitask by checking the application to verify information given by a vendor during their presentation or pitch.
      • Flowcharts and diagrams are updated in real time for team members to view and edit
      • Compare vendors under assessment with a quick look-up app feature

      Roaming Worker (Engineer)

      • Replace physical copies of service and repair manuals physically stored with digital copies and access them with mobile applications.
      • Scan or input product bar code to determine whether a replacement part is available or needs to be ordered.
      • Worker is capable of interacting with other features of the mobile web app while product bar code is being verified

      Enhance the performance of the entire mobile stack

      Due to frequently changing mobile hardware, users' high performance expectations and mobile network constraints, mobile delivery teams must focus on the entire mobile stack for optimizing performance.

      Fine tune your enterprise mobile applications using optimization techniques to improve performance across the full mobile stack.

      This image contains a bar graph ranking the importance of the following datapoints: Minimize render blocking resources; Configure the mobile application viewport; Determine the right image file format ; Determine above-the-fold content; Minimize browser reflow; Adopt UI techniques to improve perceived latency; Resource minification; Data compression; Asynchronous programming; Resource HTTP caching; Minimize network roundtrips for first time to render.

      Info-Tech Insight

      Some user performance expectations can be managed with clever UI design (e.g., spinning pinwheels to indicate loading in progress and directing user focus to quick loading content) and operational choices (e.g. graceful degradation and progressive enhancements).

      Create an API-centric integration strategy

      Mobile delivery teams are tasked to keep up with the changing needs of end users and accommodate the evolution of trending mobile features. Ensuring scalable APIs is critical in quickly releasing changes and ensuring availability of corporate services and resources.

      As your portfolio of mobile applications grows, and device platforms and browsers diversify, it will become increasingly complex to provide all the data and service capabilities your mobile apps need to operate. It is important that your APIs are available, reliable, reusable, and secure for multiple uses and platforms.

      Take an API-centric approach to retain control of your mobile development and ensure reliability.

      APIs are the underlying layer of your mobile applications, enabling remote access of company data and services to end users. Focusing design and development efforts on the maintainability, reliability and scalability of your APIs enables your delivery teams to:

      • Reuse tried-and-tested APIs to deliver, test and harden applications and systems quicker by standardizing on the use and structure of REST APIs.
      • Ensure a consistent experience and performance across different applications using the same API.
      • Uniformly apply security and access control to remain compliant to security protocols, industry standards and regulations.
      • Provide reliable integration points when leveraging third-party APIs and services.

      See our Build Effective Enterprise Integration on the Back of Business Process for more information.

      Guide your integration strategy with principles

      Craft your principles around good API management and integration practices

      Expose Enterprise Data And Functionality in API-Friendly Formats
      Convert complex on-premises application services into developer-friendly RESTful APIs

      Protect Information Assets Exposed Via APIs to Prevent Misuse
      Ensure that enterprise systems are protected against message-level attack and hijack

      Authorize Secure, Seamless Access for Valid Identities
      Deploy strong access control, identity federation and social login functionality

      Optimize System Performance and Manage the API Lifecycle
      Maintain the availability of backend systems for APIs, applications and end users

      Engage, Onboard, Educate and Manage Developers
      Give developers the resources they need to create applications that deliver real value

      Source: 5 Pillars of API Management, Broadcom, 2021

      Clarify your definition of mobile quality

      Quality does not mean the same thing to everyone

      Do not expect a universal definition of mobile quality. Each department, person and industry standard will have a different interpretation of quality, and they will perform certain activities and enforce policies that meet those interpretations. Misunderstanding of what is defined as a high quality mobile application within business and IT teams can lead to further confusion behind governance, testing priorities and compliance.

      Each interpretation of quality can lead to endless testing, guardrails and constraints, or lack thereof. Be clear on the priority of each interpretation and the degree of effort needed to ensure they are met.

      For example:

      Mobile Application Owner
      What does an accessible mobile application mean?

      Persona: Customer
      I can access it on mobile phones, tablets and the web browser

      Persona: Developer
      I have access to each layer of the mobile stack including the code & data

      Persona: Operations
      The mobile application is accessible 24/7 with 95% uptime

      Example: A School Board's Quality Definition

      Quality Attribute Definitions
      Usability The product is an intuitive solution. Usability is the ease with which the user accomplishes a desired task in the application system and the degree of user support the system provides. Limited training and documentation are required.
      Performance Usability and performance are closely related. A solution that is slow is not usable. The application system is able to meet timing requirements, which is dependent on stable infrastructure to support it regardless of where the application is hosted. Baseline performance metrics are defined and changes must result in improvements. Performance is validated against peak loads.
      Availability The application system is present, accessible, and ready to carry out its tasks when needed. The application is accessible from multiple devices and platforms, is available 24x7x365, and teams communicate planned downtimes and unplanned outages. IT must serve teachers international student's parents, and other users who access the application outside normal business hours. The application should never be down when it should be up. Teams must not put undue burden on end users accessing the systems. Reasonable access requirements are published.
      Security Applications handle both private and personal data, and must be able to segregate data based on permissions to protect privacy. The application system is able to protect data and information from unauthorized access. Users want it to be secure but seamless. Vendors need to understand and implement the District School Board's security requirements into their products. Teams ensure access is authorized, maintain data integrity, and enforce privacy.
      Reusability Reusability is the capability for components and subsystems to be suitable for use in other applications and in other scenarios. This attribute minimizes the duplication of components and implementation time. Teams ensure a modular design that is flexible and usable in other applications.
      Interoperability The degree to which two or more systems can usefully exchange meaningful information via interfaces in a particular context.

      Scalability

      There are two kinds of scalability:

      • Horizontal scalability (scaling out): Adding more resources to logical units, such as adding another server to a cluster of servers.
      • Vertical scalability (scaling up): Adding more resources to a physical unit, such as adding more memory to a single computer.

      Ease of maintenance and enhancements are critical. Additional care is given to custom code because of the inherent difficulty to make it scale and update.

      Modifiability The capability to manage the risks and costs of change, considering what can be changed, the likelihood of change, and when and who makes the change. Teams minimize the barriers to change, and get business buy in to keep systems current and valuable.
      Testability The ease with which software are made to demonstrate its faults through (typically execution-based) testing. It cannot be assumed that the vendor has already tested the system against District School Board's requirements. Testability applies to all applications, operating systems, and databases.
      Supportability The ability of the system to provide information helpful for identifying and resolving issues when it fails to work correctly. Supportability applies to all applications and systems within the District School Board's portfolio, whether that be custom developed applications or vendor provided solutions. Resource investments are made to better support the system.
      Cost Efficiency The application system is executed and maintained in such a way that each area of cost is reduced to what is critically needed. Cost efficiency is critical (e.g. printers cost per page, TCO, software what does downtime cost us), and everyone must understand the financial impact of their decisions.
      Self-Service End users are empowered to make configurations, troubleshoot and make changes to their application without the involvement of IT. The appropriate controls are in place to manage the access to unauthorized access to corporate systems.
      Modifiability The capability to manage the risks and costs of change, considering what can be changed, the likelihood of change, and when and who makes the change. Teams minimize the barriers to change, and get business buy in to keep systems current and valuable.
      Testability The ease with which software are made to demonstrate its faults through (typically execution-based) testing. It cannot be assumed that the vendor has already tested the system against District School Board's requirements. Testability applies to all applications, operating systems, and databases.
      Supportability The ability of the system to provide information helpful for identifying and resolving issues when it fails to work correctly. Supportability applies to all applications and systems within the District School Board's portfolio, whether that be custom developed applications or vendor provided solutions. Resource investments are made to better support the system.

      1.3.1 Define mobile application quality

      1-3 hours

      1. List 5 quality attributes that your organization sees as important for a successful mobile application.
      2. List the core personas that will support mobile delivery and that will consume the mobile application. Start with development, operations and support, and end user.
      3. Describe each quality attributes from the perspective of each persona by asking, "What does quality mean to you?".
      4. Review each description from each persona to come to an acceptable definition.
      5. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • User personas
      • Mobile application canvas
      • Journey map
      • Mobile application quality definition
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.3.1 cont'd

      Example: Info-Tech Guided Implementation with a Legal and Professional Services Organization

      Quality AttributeDeveloperOperations & Support TeamEnd Users

      Usability

      • Architecture and frameworks are aligned with industry best practices
      • Regular feedback through analytics and user feedback
      • Faster development and less technical debt
      • Pride in the product
      • Satisfaction that the product is serving its purpose and is actually being used by the user
      • Increased update of product use and feedback for future lifecycle
      • Standardization and positive perception of IT processes
      • Simpler to train users to adopt products and changes
      • Trust in system and ability to promote the product in a positive light
      • Trusted list of applications
      • Intuitive (easy to use, no training required)
      • Encourage collaboration and sharing ideas between end users and delivery teams
      • The information presented is correct and accurate
      • Users understand where the data came from and the algorithms behind it
      • Users learn features quickly and retain their knowledge longer, which directly correlates to decreased training costs and time
      • High uptake in use of the product
      • Seamless experience, use less energy to work with product

      Security

      • Secure by design approach
      • Testing across all layers of the application stack
      • Security analysis of our source code
      • Good approach to security requirement definition, secure access to databases, using latest libraries and using semantics in code
      • Standardized & clear practices for development
      • Making data access granular (not all or none)
      • Secure mission critical procedures which will reduce operational cost, improve compliance and mitigate risks
      • Auditable artifacts on security implementation
      • Good data classification, managed secure access, system backups and privacy protocols
      • Confidence of protection of user data
      • Encryption of sensitive data
      Availability
      • Good access to the code
      • Good access to the data
      • Good access to APIs and other integration technologies
      • Automatic alerts when something goes wrong
      • Self-repairing/recovering
      • SLAs and uptimes
      • Code documentation
      • Proactive support from the infrastructure team
      • System availability dashboard
      • Access on any end user device, including mobile and desktop
      • 24/7 uptime
      • Rapid response to reported defects or bugs
      • Business continuity

      1.3.2 Verify your decision to deliver mobile applications

      1-3 hours

      1. Review the various end user, business and technical expectations for mobile its achievability given the current state of your system and non-functional requirements.
      2. Complete the list of questions on the following slide as an indication for your readiness for mobile delivery.

      Input

      Output
      • Mobile application canvas
      • Assessment to proceed with mobile
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.3.2 cont'd

      Skill Sets
      Software delivery teams have skills in creating mobile applications that stakeholders are expecting in value and quality. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Architects look for ways to reuse existing technical asset and design for future growth and maturity in mobile. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Resources can be committed to implement and manage a mobile platform. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Software delivery teams and resources are adaptable and flexible to requirements and system changes. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Delivery Process
      My software delivery process can accommodate last minute and sudden changes in mobile delivery tasks. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Business and IT requirements for the mobile are clarified through collaboration between business and IT representatives. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Mobile will help us fill the gaps and standardize our software delivery process process. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      My testing practices can be adapted to verify and validate the mobile functional and non-functional requirements. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Technical Stack
      My mid-tier and back-end support has the capacity to accommodate additional traffic from mobile. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      I have access to my web infrastructure and integration technologies, and I am capable of making configurations. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      My security approaches and capabilities can be enhanced address specific mobile application risks and vulnerabilities. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      I have a sound and robust integration strategy involving web APIs that gives me the flexibility to support mobile applications. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)

      Phase 2

      Define Your Mobile Approach

      Choose Your Mobile Platform and Tools

      This phase will walk you through the following activities:

      • Step 2.1 – Choose Your Platform Approach
      • Step 2.2 – Shortlist Your Mobile Delivery Solution
      • Step 2.3 – Create a Roadmap for Mobile Delivery

      This phase involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Step 2.1

      Choose Your Platform Approach

      Activities

      2.1.1 Select your platform approach

      Define Your Mobile Approach

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • Desired mobile platform approach

      Mobile value is dependent on the platform you choose

      What is a platform?

      "A platform is a set of software and a surrounding ecosystem of resources that helps you to grow your business. A platform enables growth through connection: its value comes not only from its own features, but from its ability to connect external tools, teams, data, and processes." (Source: Emilie Nøss Wangen, 2021) In the mobile context, applications in a platform execute and communicate through a loosely coupled API architecture whether the supporting system is managed and supported by your organization or by 3rd party providers.

      Web

      The mobile web often takes on one of the following two approaches:

      • Responsive websites – Content, UI and other website elements automatically adjusts itself according to the device, creating a seamless experience regardless of the device.
      • Progressive web applications (PWAs) – PWAs uses the browser's APIs and features to offer native-like experiences.

      Mobile web applications are often developed with a combination of HTML, CSS, and JavaScript languages.

      Hybrid

      Hybrid applications are developed with web technologies but are deployed as native applications. The code is wrapped using a framework so that it runs locally within a native container, and it uses the device's browser runtime engine to support more sophisticated designs and features compared to the web approach. Hybrid mobile solutions allows teams to code once and deploy to multiple platforms.

      Some notable examples:

      • Gmail
      • Instagram

      Cross-Platform

      Cross-platform applications are developed within a distinct programming or scripting environment that uses its own scripting language (often like web languages) and APIs. Then the solution will compile the code into device-specific builds for native deployment.

      Some notable examples:

      • Facebook
      • Skype
      • Slack

      Native

      Native applications are developed and deployed to specific devices and OSs using platform-specific software development kits (SDKs) provided by the operating system vendors. The programming language and framework are dictated by the targeted device, such as Java for Android.

      With this platform, developers have direct access to local device features allowing customized operations. This enables the use of local resources, such as memory and runtime engines, which will achieve a higher performance than hybrid and cross-platform applications.

      Each platform offers unique pros and cons depending on your mobile needs

      WebHybridCross-PlatformNative

      Pros

      Cons

      Pros

      Cons

      Pros

      Cons

      Pros

      Cons

      • Modern browsers support the popular of web languages (HTML, CSS, and JavaScript).
      • Ubiquitous across multiple form factors and devices.
      • Mobile can be easily integrated into traditional web development processes and technical stacks.
      • Installations are not required, and updates are immediate.
      • Sensitive data can be wiped from memory after app is closed.
      • Limited access to local device hardware and software.
      • Local caching is available for limited offline capabilities, but the scope of tasks that can be completed in this scenario is restricted.
      • The browser's runtime engine is limited in computing power.
      • Not all browsers fully support the latest versions of HTML, CSS, or JavaScript.
      • Web languages can be used to develop a complete application.
      • Code can be reused for multiple platforms, including web.
      • Access to commonly-used native features that are not available through the web platform.
      • Quick delivery and maintenance updates compared to native and cross-platform platforms.
      • Consistent internet access is needed due to its reliance heavily reliance on web technologies to operate.
      • Limited ability to support complex workflows and features.
      • Sluggish performance compared to cross-platform and native applications.
      • Certain features may not operate the same across all platforms given the code once, deploy everywhere approach.
      • More cost-effective to develop than using native development approaches to gain similar features. Platform-specific developers are not needed.
      • Common codebase to develop applications on different applications.
      • Enables more complex application functionalities and technical customizations compared to hybrid applications.
      • Code is not portable across cross-platform delivery solutions.
      • The framework is tied to the vendor solution which presents the risk of vendor lock-in.
      • Deployment is dependent on an app store and the delivery solution may not guarantee the application's acceptance into the application store.
      • Significant training and onboarding may be needed using the cross-platform framework.
      • Tight integration with the device's hardware enables high performance and greater use of hardware features.
      • Computationally-intensive and complex tasks can be completed on the device.
      • Available offline access.
      • Apps are available through easy-to-access app stores.
      • Requires additional investments, such as app stores, app-specific support, versioning, and platform-specific extensions.
      • Developers skilled in a device-specific language are difficult to acquire and costly to train.
      • Testing is required every time a new device or OS is introduced.
      • Higher development and maintenance costs are tradeoffs for native device features.

      Start mobile development on a mobile web platform

      Start with what you have: begin with a mobile web platform to minimize impacts to your existing delivery skill sets and technical stack while addressing business needs. Resort to a hybrid first and then consider a cross-platform application if you require device access or the need to meet specific non-functional requirements.

      Why choose a mobile web platform?

      Pros

      The latest versions of the most popular web languages (HTML5, CSS3, JavaScript) abstract away from the granular, physical components of the application, simplifying the development process. HTML5 offer some mobile features (e.g., geolocation, accelerometer) that can meet your desired experience without the need for native development skills. Native look-and-feel, high performance, and full device access are just a few tradeoffs of going with web languages.

      Cons

      Native mobile platforms depend on device-specific code which follows specific frameworks and leverages unique programming libraries, such as Objective C for iOS and Java for Android. Each language requires a high level of expertise in the coding structure and hardware of specific devices requiring resources with specific skillsets and different tools to support development and testing.

      Other Notable Benefits with Web Languages

      • Modern browsers in most mobile devices are capable of executing and rendering many mobile features developed in web languages, allowing for greater portability and sophistication of code across multiple devices. However, this flexibility comes at the cost of performance since the browser's runtime engine will not perform as well as a native engine.
      • Web languages are well known by developers, minimizing skills and resourcing impacts. Consequently, changes can be quickly accommodated and updated uniformly across all end users.

      Do you need a native platform?

      Consider web workarounds if you choose a web platform but require some native experiences.

      The web platform does not give you direct access or sophisticated customizations to local device hardware and services, underlying code and integrations. You may run into the situation where you need some native experiences, but the value of these features may not offset the costs to undertake a native, hybrid or cross-platform application. When developing hybrid and cross-platform applications with a mobile delivery solution, only the APIs of the commonly used device features are available. Note that some vendors may not offer a particular native feature across all devices, inhibiting your ability to achieve feature parity or exploiting device features only available in certain devices. Workarounds are then needed.

      Consider the following workarounds to address the required native experiences on the web platform:

      Native Function Description Web Workaround Impact
      Camera Takes pictures or records videos through the device's camera. Create an upload form in the web with HTML5. Break in workflow leading to poor user experience (UX).
      Geolocation Detects the geographical location of the device. Available through HTML5. Not Applicable.
      Calendar Stores the user's calendar in local memory. Integrate with calendaring system or manually upload contacts. Costly integration initiative. Poor user experience.
      Contacts Stores contact information in local memory. Integrate app with contact system or manually upload contacts. Costly integration initiative. Poor user experience.
      Near Field Communication (NFC) Communication between devices by touching them together or bringing them into proximity. Manual transfer of data. A lot of time is consumed transferring simple information.
      Native Computation Computational power and resources needed to complete tasks on the device. Resource-intensive requests are completed by back-end systems and results sent back to user. Slower application performance given network constraints.

      Info-Tech Insight

      In many cases, workarounds are available when evaluating the gaps between web and native applications. For example, not having application-level access to the camera does not negate the user option to upload a picture taken by the camera through a web form. Tradeoffs like this will come down to assessing the importance of each platform gap for your organization and whether a workaround is good enough as a native-like experience.

      Architect and configure your entire mobile stack with a plan

      • Assess your existing technology stack that will support your mobile platform. Determine if it has the capacity to handle mobile traffic and the necessary integration between devices and enterprise and 3rd party systems are robust and reliable. Reach out to your IT teams and vendors if you are missing key mobile components, such as:
      • The acquisition and provisioning of physical or virtual mobile web servers and middleware from existing vendors.
      • Cloud services [e.g., Mobile Back-end as a Service (mBaaS)] that assists in the mobilization of back-end data sources with API SDKs, orchestration of data from multiple sources, transformation of legacy APIs to mobile formats, and satisfaction of other security, integration and performance needs.
      • Configure the services of your web server or middleware to facilitate the translation, transformation, and transfer of data between your mobile front-end and back-end. If your plan involves scripts, maintenance and other ongoing costs will likely increase.
      • Leverage the APIs or adapters provided by your vendors or device manufacturers to integrate your mobile front-end and back-end support to your web server or middleware. If you are reusing a web server, the back-end integration should already be in place. Remember, APIs implement business rules to maintain the integrity of data exchange within your mobile stack.
      • See Appendix A for examples of reference architectures of mobile platforms.

      See our Enhance Your Solution Architecture for more information.

      Do Not Forget Your Security and Performance Requirements

      Security: New threats from mobile put organizations into a difficult situation beyond simply responding to them in a timely matter. Be careful not to take the benefits of security out of the mobile context. You need to make security a first-order citizen during the scoping, design, and optimization of your systems supporting mobile. It must also be balanced with other functional and non-functional requirements with the right roles taking accountability for these decisions.

      See our Strengthen the SSDLC for Enterprise Mobile Applications for more information.

      Performance: Within a distributed mobile environment, performance has a risk of diminishing due to limited device capacity, network hopping, lack of server scalability, API bottlenecks, and other device, network and infrastructure issues. Mobile web APIs suffer from the same pain points as traditional web browsing and unplanned API call management in an application will lead to slow performance.

      See our Develop Enterprise Mobile Applications With Realistic and Relevant Performance for more information.

      Enterprise platform selection requires a shift in perspective

      Your mobile platform selection must consider both user and enterprise (i.e., non-functional) needs. Use a two-step process for your analysis:

      Begin Platform Selection with a User-Centric Approach

      Organizations appealing to end users place emphasis on the user experience: the look and appeal of the user interface, and the satisfaction, ease of use, and value of its functionalities. In this approach, IT concerns and needs are not high priorities, but many functions are completed locally or isolated from mission critical corporate networks and sensitive data. Some needs include:

      • Performance: quick execution of tasks and calculations made on the device or offloaded to web servers or the cloud.
      • User Interface: cross-platform compatibility and feature-rich design and functionality. The right native experience is critical to the user adoption and satisfaction.
      • Device Access: use of local device hardware and software to complete app use cases, such as camera, calendar, and contact lists.

      Refine Platform Selection with an Enterprise-Centric Approach

      From the enterprise perspective, emphasis is on security, system performance, integration, reuse and other non-functional requirements as the primary motivations in the selection of a mobile platform. User experience is still a contributing factor because of the mobile application's need to drive value but its priority is not exclusive. Some drivers include:

      • Openness: agreed-upon industry standards and technologies that can be applied to serve enterprise needs which support business processes.
      • Integration: increase the reuse of legacy investments and existing applications and services with integration capabilities.
      • Flexibility: support for multiple data types from applications such as JSON format for mobile.
      • Capacity: maximize the utilization of your software delivery resources beyond the initial iteration of the mobile application.

      Info-Tech Insight

      Selecting a mobile platform should not solely be made on business requirements. Key technical stakeholders should be at the table in this discussion to provide insight on the implementation and ongoing costs and benefits of each platform. Both business and technical requirements should be considered when deciding on a final platform.

      Select your mobile platform

      Drive your mobile platform selection against user-centric needs (e.g. device access, aesthetics) and enterprise-centric needs (e.g. security, system performance).

      When does a platform makes sense to use?

      Web

      • Desire to maximize current web technologies investments (people, process, and technologies).
      • Use cases do not require significant computational resources on the device or are tightly constrained by non-functional requirements.
      • Limited budget to acquire mobile development resources.
      • Access to device hardware is not a high priority.

      Hybrid / Cross-Platform

      • The need to quickly spin up native-like applications for multiple platforms and devices.
      • Desire to leverage existing web development skills, but also a need for device access and meeting specific non-functional requirements.
      • Vendor support is needed for the entire mobile delivery process.

      Native

      • Developers are experts in the target programming language and with the device's hardware.
      • Strong need for high performance, security and device-specific access and customizations.
      • Application use cases requiring significant computing resources.

      Nine datapoints are arranged on a graph where the x axis s labeled: User Centric Needs; and the Y axis is labeled: Enterprise-centric needs. The datapoints are, in order from left to right, top to bottom: Hybrid; Cross- Platform; Native; Web; Hybrid or Cross- Platform; Cros-s Platform; Web; Web; Hybrid or Cross- Platform.

      2.1.1 Select your platform approach

      1-3 hours

      1. Review your mobile objectives, end user needs and non-functional requirements.
      2. Determine which mobile platform is appropriate for each mobile opportunity or use case by answering the following questions on the following slides against two factors: user-centric and enterprise-centric needs.
      3. Calculate an average score for user-centric and one for enterprise-centric. Then, map them on the matrix to indicate possible platform options. Consider all options around the plotted point.
      4. Further discuss which platforms should be the preferred choice.
      5. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • Desired mobile experience
      • List of desired mobile features
      • Current state assessments
      • Mobile platform approach
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      2.1.1 cont'd

      User-Centric Needs: Functional Requirements

      Factors Definitions Survey Responses
      Device Hardware Access The scope of access to native device hardware features. Basic features include those that are available through current web languages (e.g., geolocation) whereas comprehensive features are those that are device-specific. 1 (Basic) – 2 – 3 (Moderate) – 4 – 5 (Comprehensive)
      Customized Execution of Device Hardware The degree of changes to the execution of local device hardware to satisfy functional needs. 1 (Use as Is) – 2 – 3 (Configure) – 4 – 5 (Customize)
      Device Software Access The scope of access to software on the user's device, such as calendars and contact. 1 (Basic) – 2 – 3 (Moderate) – 4 – 5 (Comprehensive)
      Customized Execution of Device Software The degree of changes to the execution of local device software to satisfy functional needs. 1 (Use as Is) – 2 – 3 (Configure) – 4 – 5 (Customize)
      Use Case Complexity Workflow tasks and decisions are simple and straightforward. Complex computation is not needed to acquire the desired outcome. 1 (Strongly Agree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Disagree)
      Computational Resources The resources needed on the device to complete desired functional needs. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Use Case Ambiguity The mobile use case and technical requirements are well understood and documented. Changes to the mobile application is likely. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Mobile Application Access Enterprise systems and data are accessible to the broader organization through the mobile application. This factor does not necessarily mean that anyone can access it untracked. You may still need to identify yourself or log in, etc. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Scope of Adoption & Impact The extent to which the mobile application is leveraged in the organization. 1 (Enterprise) – 2 – 3 (Department) – 4 – 5 (Team)
      Installable The need to locally install the mobile application. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Targeted Devices & Platforms Mobile applications are developed for a defined set of mobile platform versions and types and device. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Output Audience The mobile application transforms an input into a valuable output for high-priority internal or external stakeholders. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)

      2.1.1 cont'd

      User-Centric Needs: Native User Experience Factors

      Factors Definitions Survey Responses
      Immersive Experience The need to bridge physical world with the virtual and digital environment, such as geofencing and NFC. 1 (Internally Delivered) – 2 – 3 (3rd Party Supported) – 4 – 5 (Business Implemented)
      Timeliness of Content and Updates The speed of which the mobile application (and supporting system) responds with requested information, data and updates from enterprise systems and 3rd party services. 1 (Reasonable Delayed Response) – 2 – 3 (Partially Outsourced) – 4 – 5 (Fully Outsourced)
      Application Performance The speed of which the mobile application completes tasks is critical to its success. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Network Accessibility The needed ability to access and use the mobile application in various network conditions. 1 (Only Available When Online) – 2 – 3 (Partially Available When Online) – 4 – 5 (Available Online)
      Integrated Ecosystem The approach to integrate the mobile application with enterprise or 3rd party systems and services. 1 (Out-of-the-Box Connectors) – 2 – 3 (Configurable Connectors) – 4 – 5 (Customized Connectors)
      Desire to Have a Native Look-and-Feel The aesthetics and UI features (e.g., heavy animations) that are only available through native and cross-platform applications. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      User Tolerance to Change The degree of willingness and ableness for a user to change their way of working to maximize the value of the mobile application. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Mission Criticality The business could not execute its main strategy if the mobile application was removed. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Business Value The mobile application directly adds business value to the organization. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Industry Differentiation The mobile application provides a distinctive competitive advantage or is unique to your organization. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)

      2.1.1 cont'd

      Enterprise-Centric Needs: Non-Functional Requirements

      Factors Definitions Survey Responses
      Legacy Compatibility The need to integrate and operate with legacy systems. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Code Portability The need to enable the "code once and deploy everywhere" approach. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Vendor & Technology Lock-In The tolerance to lock into a vendor mobile delivery solution or technology framework. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Data Sensitivity The data used by the mobile application does not fall into the category of sensitive data – meaning nothing financial, medical, or personal identity (GDPR and worldwide equivalents). The disclosure, modification, or destruction of this data would cause limited harm to the organization. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Data Policies Policies of the mobile application's data are mandated by internal departmental standards (e.g. naming standards, backup standards, data type consistency). Policies only mandated in this way usually have limited use in a production capacity. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Security Risks Mobile applications are connected to private data sources and its intended use will be significant if underlying data is breached. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Business Continuity & System Integrity Risks The mobile application in question does not have much significance relative to the running of mission critical processes in the organization. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      System Openness Openness of enterprise systems to enable mobile applications from the user interface to the business logic and backend integrations and database. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Mobile Device Management The organization's policy for the use of mobile devices to access and leverage enterprise data and services. 1 (Bring-Your-Own-Device) – 2 – 3 (Hybrid) – 4 – 5 (Corporate Devices)

      2.1.1 cont'd

      Enterprise-Centric Needs: Delivery Capacity

      Factors Definitions Survey Responses
      Ease of Mobile Delivery The desire to have out-of-the-box and packaged tools to expedite mobile application delivery using web technologies. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Solution Competency The capability for internal staff to and learn how to implement and administer mobile delivery tools and deliver valuable, high-quality applications. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Ease of Deployment The desire to have the mobile applications delivered by the team or person without specialized resources from outside the team. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Delivery Approach The capability to successfully deliver mobile applications given budgetary and costing, resourcing, and supporting services constraints. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Maintenance & Operational Support The capability of the resources to responsibly maintain and operate mobile applications, including defect fixes and the addition and extension of modules to base implementations of the digital product. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Domain Knowledge Support The availability and accessibility of subject and domain experts to guide facilitate mobile application implementation and adoption. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Delivery Urgency The desire to have the mobile application delivered quickly. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Reusable Components The desire to reuse UI elements and application components. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)

      2.1.1 cont'd

      Example:

      Score Factors (Average) Mobile Opportunity 1: Inventory Management Mobile Opportunity 2: Remote Support
      User-Centric Needs 4.25 3
      Functional Requirements 4.5 2.25
      Native User Experience Factors 4 1.75
      Enterprise-Centric Needs 4 2
      Non-Functional Requirements 3.75 3.25
      Delivery Capacity 4.25 2.75
      Possible Mobile Platform Cross-Platform Native PWA Hybrid

      Nine datapoints are arranged on a graph where the x axis s labeled: User Centric Needs; and the Y axis is labeled: Enterprise-centric needs. The datapoints are, in order from left to right, top to bottom: Hybrid; Cross- Platform; Native; Web; Hybrid or Cross- Platform; Cros-s Platform; Web; Web; Hybrid or Cross- Platform. Two yellow circles are overlaid, one containing the phrase: Remote Support - over the box containing Progressive Web Applications (PWA) or Hybrid; and a yellow circle containing the phrase Inventory MGMT, partly covering the box containing Native; and the box containing Cross-Platform.

      Build a scalable and manageable platform

      Long-term mobile success depends on the efficiency and reliability of the underlying operational platform. This platform must support the computational and performance demands in a changing business environment, whether it is composed of off-the-self or custom-developed solutions, or a single vendor or best-of-breed.

      • Application
        • The UI design and content language is standardized and consistently applied
        • All mobile configurations and components are automatically versioned
        • Controlled administration and tooling access, automation capabilities, and update delivery
        • Holistic portfolio management
      • Data
        • Automated data management to preserve data quality (e.g. removal of duplications)
        • Defined single source of truth
        • Adherence to data governance, and privacy and security policies
        • Good content management practices, governance and architecture
      • Infrastructure
        • Containers and sandboxes are available for development and testing
        • Self-healing and self-service environments
        • Automatic system scaling and load balancing
        • Comply to budgetary and licensing constraints
      • Integration
        • Backend database and system updates are efficient
        • Loosely coupled architecture to minimize system regressions and delivery effort
        • Application, system and data monitoring

      Step 2.2

      Shortlist Your Mobile Delivery Solution

      Activities

      2.2.1 Shortlist your mobile delivery solution

      2.2.2 Build your feature and service lists

      Define Your Mobile Approach

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • Shortlisted mobile delivery solutions
      • Desired list of vendor features and services

      Ask yourself: should I build or buy?

      Build Buy

      Multi-Source Best-of-Breed

      Vendor Add-Ons & Integrations

      Integrate various technologies that provide subset(s) of the features needed for supporting the business functions.

      Enhance an existing vendor's offerings by using their system add-ons either as upgrades, new add-ons or integrations.

      Pros

      • Flexibility in choice of tools.
      • In some cases, cost may be lower.
      • Easier to enhance with in-house teams.

      Cons

      • Introduces tool sprawl.
      • Requires resources to understand tools and how they integrate.
      • Some of the tools necessary may not be compatible with each other.

      Pros

      • Reduces tool sprawl.
      • Supports consistent tool stack.
      • Vendor support can make enhancement easier.
      • Total cost of ownership may be lower.

      Cons

      • Vendor Lock-In.
      • The processes to enhance may require tweaking to fit tool capability.

      Multi-Source Custom

      Single Source

      Integrate systems built in-house with technologies developed by external organizations.

      Buy an application/system from one vendor only.

      Pros

      • Flexibility in choice of tools.
      • In some cases, cost may be lower.
      • Easier to enhance with in-house teams.

      Cons

      • May introduce tool sprawl.
      • Requires resources to have strong technical skills
      • Some of the tools necessary may
      • not be compatible with each other.

      Pros

      • Reduces tool sprawl.
      • Supports consistent tool stack.
      • Vendor support can make enhancement easier.
      • Total cost of ownership may be lower.

      Cons

      • Vendor Lock-In.
      • The processes to enhance may require tweaking to fit tool capability.

      Weigh the pros and cons of mobile enablement versus development

      Mobile Enablement

      Mobile Development

      Description Mobile interfaces that heavily rely on enterprise or 3rd party systems to operate. Mobile does not expand the functionality of the system but complements it with enhanced access, input and consumption capabilities. Mobile applications that are custom built or configured in a way that can operate as a standalone entity, whether they are locally deployed to a user's device or virtually hosted.
      Mobile Platform Mobile web, locally installed mobile application provided by vendor Mobile web, hybrid, cross-platform, native
      Typical Audience Internal staff, trusted users Internal and external users, general public
      Examples of Tooling Flavors Enterprise applications, point solutions, robotic & process automation Mobile enterprise application platform, web development, low and no code development, software development kits (SDKs)
      Technical Skills Required Little to no mobile delivery experience and skillsets are needed, but teams must be familiar with the supporting system to understand how a mobile interface can improve the value of the system. Have good UX-driven and quality-first practices in the mobile context. In-depth coding, networking, system and UX design, data management and security skills are needed for complex designs, functions, and architectures.
      Architecture & Integration Architecture is standardized by the vendor or enterprise with UI elements that are often minimally configurable. Extensions and integrations must be done through the system rather than the mobile interface. Much of application stack and integration approach can be customized to meet the specific functional and non-functional needs. It should still leverage web and design standards and investments currently used.
      Functional Scope Functionality is limited to the what the underlying system allows the interface to do. This often is constrained to commodity web application features (e.g., reporting) or tied to minor configurations to the vendor-provided point solution Functionality is only constrained by the platform and the targeted mobile devices whether it is performance, integration, access or security related. Teams should consider feature and content parity across all products within the organization portfolio.
      Delivery Pipeline End-to-end delivery and automated pipeline is provided by the vendor to ensure parity across all interfaces. Many vendors provide cloud-based services for hosting. Otherwise, it is directly tied to the SDLC of the supporting system. End-to-end delivery and automated pipeline is directly tied to enterprise SDLC practices or through the vendor. Some vendors provide cloud-based services for hosting. Updates are manually or automatically (through a vendor) published to app stores and can be automatically pushed to corporate users through mobile application management capabilities.
      Standards & Guardrails Quality standards and technology governance are managed by the vendor or IT with limited capabilities to tailor them to be mobile specific. Quality standards and technology governance are managed by the mobile delivery teams. The degree of customizations to these standards and guardrails is dependent on the chosen platform and delivery team competencies.

      Understand the common attributes of a mobile delivery solution

      • Source Code Management – Built-in or having the ability to integrate with code management solutions for branching, merging, and versioning. Debugging and coding assistance capabilities may be available.
      • Single Code Base – Capable of programming in a standard coding and scripting language for deployment into several platforms and devices. This code base is aligned to a common industry framework (e.g., AngularJS, Java) or a vendor-defined one.
      • Out-of-the-Box Connectors & Plug-ins – Pre-built APIs enhance the solution's capabilities with 3rd party tools and systems to deliver and manage high quality and valuable mobile applications.
      • Emulators – Ability to virtualize an application's execution on a target platform and device.
      • Support for Native Features – Supports plug-ins and APIs for access to device-specific features.

      What are mobile delivery solutions?

      A mobile delivery solution gives you the tools, resources and support to enable or build your mobile application. They can provide pre-built applications, vendor supported components to allow some configurations, or resources for full stack customizations. Some solutions can be barebone software development kits (SDKs) or comprehensive suites offering features to support the entire software delivery lifecycle, such as:

      • Mobile application management
      • Testing and publishing to app stores
      • Content management
      • Cloud hosting
      • Application performance management

      Info-Tech Insight

      Mobile enablement and development capabilities are already embedded in many common productivity tools and enterprise applications, such as Microsoft PowerApps and ERP modules. They can serve as a starting point in the initial rollout of new management and governance practices without the need of acquiring new tools.

      Select your mobile delivery solutions

      1. Set the scope of your framework.
      • The initial context of this framework is based on the mobile functions needed to support your desired mobile experience and on the current state of your enterprise and 3rd party systems.
    • Define the decision factors for your solution selection.
      • Review the decision factors that will influence the selection of your mobile delivery solution for each mobile opportunity:
      • Stack Management – Who will be hosting and supporting your mobile application stack?
      • Workflows Complexity & Native Experience – How complex is your desired mobile experience and how will native device features be leveraged?
    • Select your solution type.
      • Mobile delivery solutions are broadly defined in the following groups:
      • Commercial-Off-The-Shelf (COTS) – Pre-built mobile applications requiring little to no configurations or implementation effort.
      • Vendor Hosted Mobile Platform – Back-end and mid-tier infrastructure and operational support are managed by a vendor.
      • Cross-Platform Development – Frameworks that transform a single code base into platform-specific builds.
      • Hybrid Development – Tools that wrap a single code base into a locally deployable build.
      • Custom Web Development – Environment enabling full stack development for mobile web applications.
      • Custom Native Development – Environment enabling full stack development for mobile native applications.
    • A quadrant analysis is depicted. the top data is labeled Complex Mobile Features; the right side is labeled Organization-Managed Stack; the bottom is labeled Simple Mobile Features; and the left side is labeled Vendor-Managed Stack. The quadrants are labeled the following, in order from left to right, top to bottom. Vendor- Hosted Mobile Platform; Custom Native Development Solutions; Commercial-Off-the-Shelf Solutions; Custom Web Development Solutions. In the middle of the graph are the following, in order from top to bottom: Cross-Platform Development Solutions; Hybrid Development Solutions

      Explore the various solution options

      Vendor Hosted Mobile Platform

      • Cloud Services (Mobile Backend-as-a-Service) (Amazon Amplify, Kinvey, Back4App, Google Firebase, Apache Usergrid)
      • Low Code Mobile Platforms (Outsystems, Mendix, Zoho Creator, IBM Mobile Foundation, Pega Mobile, HCL Volt MX, Appery)
      • Mobile Development via Enterprise Application (SalesForce Heroku, Oracle Application Accelerator MAX, SAP Mobile Development Kit, NetSuite Mobile)
      • Mobile Development via Business Process Automation (PowerApps, Appian, Nintex, Quickbase)

      Cross-Platform Development SDKs

      React Native, NativeScript, Xamarin Forms, .NET MAUI, Flutter, Kotlin Multiplatform Mobile, jQuery Mobile, Telerik, Temenos Quantum

      Custom Native Development Solutions

      • Native Development Languages and Environments (Swift, Java, Objective-C, Kotlin, Xcode, NetBeans, Android Studio, AppCode, Microsoft Visual Studio, Eclipse, DriodScript, Compose, Atom)
      • Mobile Application Utilities (Unity, MonoGame, Blender, 3ds Max Design, Maya, Unreal Engine, Amazon Lumberyard, Oculus)

      Commercial-Off-the-Shelf Solutions

      • No Code Mobile Platforms (Swiftic, Betty Blocks, BuildFire, Appy Pie, Plant an App, Microsoft Power Apps, AppSheet, Wix, Quixy)
      • Mobile Application Point Solutions and Enablement via Enterprise Applications

      Hybrid Development SDKs

      Cordova Project, Sencha Touch, Electron, Ionic, Capacitor, Monaca, Voltbuilder

      Custom Web Development Solutions

      Web Development Frameworks (React, Angular, Vue, Express, Django, Rails, Spring, Ember, Backbone, Bulma, Bootstrap, Tailwind CSS, Blade)

      Get the most out of your solutions by understanding their core components

      While most of the heavy lifting is handled by the vendor or framework, understanding how the mobile application is built and operates can identify where further fine-tuning is needed to increase its value and quality.

      Platform Runtime

      Automatic provisioning, configurations, and tuning of organizational and 3rd party infrastructure for high availability, performance, security and stability. This can include cloud management and non-production environments.

      Extensions

      • Mobile delivery solutions can be extended to allow:
      • Custom development of back-end code
      • Customizable integrations and hooks where needed
      • Integrations with CI/CD pipelines and administrative services
      • Integrations with existing databases and authentication services

      Platform Services

      The various services needed to support mobile delivery and enable continuous delivery, such as:

      • Configuration & Change Management – Verifies, validates, and monitors builds, deployments and changes across all components.
      • Code Generator – Transforms UI and data models into native application components that are ready to be deployed.
      • Deployment Services – Deploys application components consistently across all target environments and app stores.
      • Application Services – Manages the mobile application at runtime, including executing scheduled tasks and instrumentation.

      Application Architecture

      Fundamentally, mobile application architecture is no different than any other application architecture so much of your design standards still applies. The trick is tuning it to best meet your mobile functional and non-functional needs.

      This image contains an example of mobile application architecture.

      Source: "HCL Volt MX", HCL.

      Build your shortlist decision criteria

      The decision on which type of mobile delivery solution to use is dependent on several key questions?

      Who is the Mobile Delivery Team?

      • Is it a worker, business or IT?
      • What skills and knowledge does this person have?
      • Who is supporting mobile delivery and management?
      • Are other skills and tools needed to support, extend or mature mobile delivery adoption?

      What are the Use Cases?

      • What is the value and priority of the use cases?
      • What native features do we need?
      • Who is the audience of the output and who is impacted?
      • What systems, data and services do I need access?
      • Is it best to build it or buy it?
      • What are the quality standards?
      • How strategic is the use case?

      How Complex is the System?

      • Is the mobile application a standalone or integrated with enterprise systems?
      • What is the system's state and architecture?
      • What 3rd party services do we need integrated?
      • Are integrations out-of-the-box or custom?
      • Is the data standardized and who can edit its definition?
      • Is the system monolithic or loosely coupled?

      How Much Can We Tolerate?

      • Risks: What are the business and technical risks involved?
      • Costs: How much can we invest in implementation, training and operations?
      • Change: What organizational changes am I expecting to make? Will these changes be accepted and adopted?

      2.2.1 Shortlist your mobile delivery solution

      1-3 hours

      1. Determine which mobile delivery solutions is appropriate for each mobile opportunity or use case by answering the following questions on the following slides against two factors: complexity of mobile workflows and native features and management of the mobile stack.
        1. Take the average of the enterprise-centric and user-centric scores from step 2.1 for your complexity of mobile workflows and native features scores.
      2. Calculate an average score for the management of the mobile stack. Then, map them on the matrix to indicate possible solution options alongside your user-centric scores. Consider all options around the plotted point.
      3. Further discuss which solution should be the preferred choice and compare those options with your selected platform approach.
      4. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • Current state assessment
      • Mobile platform approach
      • Shortlist of mobile delivery solution
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      2.2.1 cont'd

      Stack Management

      Factors Definitions Survey Responses
      Cost of Delayed Delivery The expected cost if a vendor solution or update is delayed. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Vendor Negotiation Organization's ability to negotiate favorable terms from vendors. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Controllable Delivery Timeline Organization's desire to control when solutions and updates are delivered. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Solution Hosting The desired approach to host the mobile application. 1 (Fully Outsourced) – 2 – 3 (Partially Outsourced) – 4 – 5 (Internally Hosted)
      Vendor Lock-In The tolerance to be locked into a specific technology stack or vendor ecosystem. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Operational Cost Target The primary target of the mobile application's operational budget. 1 (External Resources) – 2 – 3 (Hybrid) – 4 – 5 (Internal Resources)
      Platform Management The desired approach to manage the mobile delivery solution, platform or underlying technology. 1 (Decentralized) – 2 – 3 (Federated) – 4 – 5 (Centralized)
      Skill & Competency of Mobile Delivery Team The ability of the team to create and manage valuable and high-quality mobile applications. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Current Investment in Enterprise Technologies The need to maximize the ROI of current enterprise technologies or integrate with legacy technologies. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Ease of Extensibility Need to have out-of-the-box connectors and plug-ins to extend the mobile delivery solution beyond its base implementation. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Holistic Application Strategy Organizational priorities on the types of applications the portfolio should be comprised. 1 (Buy) – 2 – 3 (Hybrid) – 4 – 5 (Build)
      Control of Delivery Pipeline The desire to control the software delivery pipeline from design to development, testing, publishing and support. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Specific Quality Requirements Software and mobile delivery is constrained to your unique quality standards (e.g., security, performance, availability) 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)

      2.2.1 cont'd

      Example:

      Score Factors (Average) Mobile Opportunity 1: Inventory Management Mobile Opportunity 2: Remote Support
      User-Centric & Enterprise Centric Needs (From Step 2.1) 4.125 2.5
      Stack Management 2 2.5
      Desired Mobile Delivery Solution Vendor-Hosted Mobile Platform

      Commercial-Off-the-Shelf Solution

      Hybrid Development Solution

      A quadrant analysis is depicted. the top data is labeled Complex Mobile Features; the right side is labeled Organization-Managed Stack; the bottom is labeled Simple Mobile Features; and the left side is labeled Vendor-Managed Stack. The quadrants are labeled the following, in order from left to right, top to bottom. Vendor- Hosted Mobile Platform; Custom Native Development Solutions; Commercial-Off-the-Shelf Solutions; Custom Web Development Solutions. In the middle of the graph are the following, in order from top to bottom: Cross-Platform Development Solutions; Hybrid Development Solutions.

      Consider the following in your solution selection and implementation

      • Vendor lock in – Each solution has its own approach, frameworks, and data schemas to convert designs and logic into an executable build that is stable in the targeted environment. Consequently, moving application artifacts (e.g., code and designs) from one solution or environment to another may not be easily accomplished without significant modifications or the use of application modernization or migration services.
      • Conflicting priorities and viewpoints of good delivery practices – Mobile delivery solutions are very particular on how they generate applications from designs and configurations. The solution's approach may not accommodate your interpretation of high-quality code (e.g., scalability, maintainability, extensibility, security). Technical experts should be reviewing and refactoring the generated code.
      • Incompatibility with enterprise applications and systems – The true benefit of mobile delivery solutions is their ability to connect your mobile application to enterprise and 3rd party technologies and services. This capability often requires enterprise technologies and services to be architected in a way that is compatible with your delivery solution while ensuring data, security protocols and other standards and policies are consistently enforced.
      • Integration with current application development and management tools – Mobile delivery solutions should be extensions from your existing application development and management tools that provides the versioning, testing, monitoring, and deployment capabilities to sustain a valuable application portfolio. Without this integration, IT will be unable to:
        • Root cause issues found on IT dashboards or reported to help desk.
        • Rollback defective applications to a previous stable state.
        • Obtain a complete application portfolio inventory.
        • Execute comprehensive testing for high-risk applications.
        • Trace artifacts throughout the development lifecycle.
        • Generate reports of the status of releases.

      Enhance your SDLC to support mobile delivery

      What is the SDLC?

      The software development lifecycle (SDLC) is a process that ensures valuable software products are efficiently delivered to customers. It contains a repeatable set of activities needed to intake and analyze requirements to design, build, test, deploy, and maintain software products.

      How will mobile delivery influence my SDLC?

      • Cross-functional collaboration – Bringing business and IT together at the most opportune times to clarify user needs and business priorities, and set realistic expectations given technology and capacity constraints. The appropriate tactics and techniques are used to improve decision making and delivery effectiveness according to the type of work.
      • Iterative delivery – Frequent delivery of progressive changes minimizes the risk of low-quality features by containing and simplifying scope, and enables responsive turnarounds of fixes, enhancements, and priority changes.
      • Feedback loops –Mobile application owners constantly review, update and refine their backlog of mobile features and changes to reflect user feedback and system performance metrics. Delivery teams proactively prepare the application for future scaling based on lessons and feedback learned from earlier releases.

      To learn more, visit Info-Tech's Modernize Your SDLC blueprint.

      Example: Low- & No-Code Mobile Delivery Pipeline

      Low Code

      Data Modeling & Configuration

      No Code

      Visual Interface with Complex Data Models

      Data Modeling & Configuration

      Visual Interfaces with Simple Data Models

      GUI Designer with Customizable Components & Entities

      UI Definition & Design

      GUI Designer with Canned Templates

      Visual Workflow and Custom Scripting

      Business Logic Rules and Workflow Specification

      Visual Workflow and Natural Language Scripting

      Out-of-the-Box Plugins & Custom Integrations

      Integration of External Services (via 3rd Party APIs)

      Out-of-the-Box Plugins

      Automated and Manual Build & Packaging

      Build & Package

      Automated Build & Packaging

      Automated & Manual Testing

      Test

      Automated Testing

      One-Click Push or IT Push to App Store

      Publish to App Store

      One-Click Push to App Store

      Use Info-Tech's research to address your delivery gaps

      Mobile success requires more than a set of good tools.

      Overcome the Common Challenges Faced with Building Mobile Applications

      Common Challenges with Digital Applications

      Suggested Solutions

      • Time & Resource Constraints
      • Buy-In From Internal Stakeholders
      • Rapidly Changing Requirements
      • Legacy Systems
      • Low-Priority for Internal Tools
      • Insufficient Data Access

      Source: DronaHQ, 2021

      Learn the differentiators of mobile delivery solutions

      • Native Program Languages – Supports languages other than web (Java, Ruby, C/C++/C#, Objective-C).
      • IDE Integration – Available plug-ins for popular development suites and editors.
      • Debugging Tools – Finding and eliminating bugs (breakpoints, single stepping, variable inspection, etc.).
      • Application Packaging via IDE – Digitally sign applications through the IDE for it to be packaged and published in app stores.
      • Automated Testing Tools – Native or integration with automated functional and unit testing tools.
      • Low- and No- Code Designer – Tools for designing graphical user interfaces and features and managing data with drag-and-drop functionalities.
      • Publishing and Deployment Capabilities – Automated deployment to mobile device management (MDM) systems, mobile application management (MAM) systems, mobile application stores, and web servers.
      • Third-Party and Open-Source Integration – Integration with proprietary and open-source third-party modules, development tools, and systems.
      • Developer Marketplace – Out-of-the-box plug-ins, templates, and integration are available through a marketplace.
      • Mobile Application Support Capabilities – Ability to gather, manage, and address application issues and defects.
      • API Gateway, Monitoring, and Management – Services that enable the creation, publishing, maintenance, monitoring, and securing of APIs through a common interface.
      • Mobile Analytics and Monitoring – View the adoption, usage, and performance of deployed mobile applications through graphical dashboards.
      • Mobile Content Management – Publish and manage mobile content through a centralized system.
      • Mobile Application Security – Supports the securing of application access and usage, data encryption, and testing of security controls.

      Define your mobile delivery vendor selection criteria

      Focus on the key vendor attributes and capabilities that enable mobile delivery scaling and growth in your organization

      Considerations in Mobile Delivery Vendor Selection
      Platform Features & Capabilities Price to Implement & Operate Platform
      Types of Mobile Applications That Can Be Developed Ease of IT Administration & Management
      User Community & Marketplace Size Security, Privacy & Access Control Capabilities
      SME in Industry Verticals & Business Functions Vendor Product Roadmap & Corporate Strategy
      Pre-Built Designs, Templates & Application Shells Scope of Device- and OS-Specific Compatibilities
      Regulatory & Industry Compliance Integration & Technology Partners
      Importing Artifacts From and Exporting to Other Solutions Platform Architecture & Underlying Technology
      End-to-End Support for the Entire Mobile SDLC Relevance to Current Mobile Trends & Practices

      Build your features list

      Incorporate different perspectives when defining the list of mandatory and desired features of your target solution.

      Appendix B contains a list of features for low- and no-code solutions that can be used as a starting point.

      Visit Info-Tech's Implement a Proactive and Consistent Vendor Selection Process blueprint.

      Mobile Developer

      • Visual, drag-and-drop models to define data models, business logic, and user interfaces.
      • One-click deployment.
      • Self-healing capabilities.
      • Vendor-managed infrastructure.
      • Active community and marketplace.
      • Pre-built templates and libraries.
      • Optical character recognition and natural language processing.
      • Knowledgebase and document management.
      • Business value, operational costs, and other KPI monitoring.
      • Business workflow automation.

      Mobile IT Professional

      • Audit and change logs.
      • Theme and template builder.
      • Template management.
      • Role-based access.
      • Regulatory compliance.
      • Consistent design and user experience across applications.
      • Application and system performance monitoring.
      • Versioning and code management.
      • Automatic application and system refactoring and recovery.
      • Exception and error handling.
      • Scalability (e.g. load balancing) and infrastructure management.
      • Real-time debugging.
      • Testing capabilities.
      • Security management.
      • Application integration management.

      2.2.2 Build your feature and service lists

      1-3 hours

      Review the key outcomes in the previous exercises to help inform the features and vendor support you require to support your mobile delivery needs:

      End user personas and desired mobile experience

      Objectives and expectations

      Desired mobile features and platform

      Mobile delivery solutions

      Brainstorm a list of features and functionalities you require from your ideal solution vendors. Prioritize these features and functionalities. See our Implement a Proactive and Consistent Vendor Selection Process blueprint for more information on vendor procurement.

      Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • Shortlist of mobile solutions
      • Quality definitions
      • Mobile objectives and metrics
      • List of desired features and services of mobile delivery solution vendors
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Hit a home run with your stakeholders

      Use a data-driven approach to select the right tooling vendor for your needs – fast.

      AwarenessEducation & DiscoveryEvaluationSelection

      Negotiation & Configuration

      1.1 Proactively Lead Technology Optimization & Prioritization2.1 Understand Marketplace Capabilities & Trends3.1 Gather & Prioritize Requirements & Establish Key Success Metrics4.1 Create a Weighted Selection Decision Model5.1 Initiate Price Negotiation with Top Two Venders
      1.2 Scope & Define the Selection Process for Each Selection Request Action2.2 Discover Alternate Solutions & Conduct Market Education3.2 Conduct a Data Driven Comparison of Vendor Features & Capabilities4.2 Conduct Investigative Interviews Focused on Mission Critical Priorities with Top 2-4 Vendors5.2 Negotiate Contract Terms & Product Configuration

      1.3 Conduct an Accelerated Business Needs Assessment

      2.3 Evaluate Enterprise Architecture & Application PortfolioNarrow the Field to Four Top Contenders4.3 Validate Key Issues with Deep Technical Assessments, Trial Configuration & Reference Checks5.3 Finalize Budget Approval & Project
      1.4 Align Stakeholder Calendars to Reduce Elapsed Time & Asynchronous Evaluation2.4 Validate the Business Case5.4 Invest in Training & Onboarding Assistance

      Investing time improving your software selection methodology has big returns.

      Info-Tech Insight

      Not all software selection projects are created equal – some are very small, some span the entire enterprise. To ensure that IT is using the right framework, understand the cost and complexity profile of the application you're looking to select. Info-Tech's Rapid Application Selection Framework approach is best for commodity and mid-tier enterprise applications; selecting complex applications is better handled by the methodology in Info-Tech's Implement a Proactive and Consistent Vendor Selection Process.

      Step 2.3

      Create a Roadmap for Mobile Delivery

      Activities

      2.3.1 Define your MVP release

      2.3.2 Build your roadmap

      Define Your Mobile Approach

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • MVP design
      • Mobile delivery roadmap

      Achieve mobile success with MVPs

      By delivering mobile capabilities in small iterations, teams recognize value sooner and reduce accumulated risk. Both benefits are realized as the iteration enters validation testing and release.

      This image depicts a graph of the learn-build-measure cycle over time, adapted from Managing the Development of Large Software Systems, Dr. Winston W. Royce, 1970

      An MVP focuses on a small set of functions, involves minimal possible effort to deliver a working and valuable solution, and is designed to satisfy a specific user group. Its purpose is to:

      • Maximize learning.
      • Evaluate the value and acceptance of mobile applications.
      • Inform the building of a mobile delivery practice.

      The build-measure-learn loop suggests mobile delivery teams should perpetually take an idea and develop, test, and validate it with the mobile development solution, then expand on the MVP using the lessons learned and evolving ideas. In this sense the MVP is just the first iteration in the loop.

      Leverage a canvas to detail your MVP

      Use the release canvas to organize and align the organization around your MVP!

      This is an example of a release canvas which can be used to detail your MVP.

      2.3.1 Define your MVP release

      1-3 hours

      1. Create a list of high priority use cases slated for mobile application delivery. Brainstorm the various supporting activities required to implement your use cases including the shortlisting of mobile delivery tools.
      2. Prioritize these use cases based on business priority (from your canvas). Size the effort of these use cases through collaboration.
      3. Define your MVPs using a release canvas as shown on the following slide.
      4. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Input

      Output
      • High priority mobile opportunities
      • Mobile platform approach
      • Shortlist of mobile solutions
      • List of potential MVPs
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      2.3.1 cont'd

      MVP Name

      Owner:
      Parent Initiative:
      Updated:

      NAME
      LINK
      October 05, 2022

      MVP Theme/Goals

      [Theme / Goal]

      Use Cases

      Value

      Costs

      [Use Case 1]
      [Use Case 2]
      [Use Case 3]

      [Business Value 1]
      [Business Value 2]
      [Business Value 3]

      [Cost Item 1]
      [Cost Item 2]
      [Cost Item 3]

      Impacted Personas

      Impacted Workflows

      Stakeholders

      [Persona 1]
      [Persona 2]
      [Persona 3]

      [Workflow 1]
      [Workflow 2]
      [Workflow 3]

      [Stakeholder 1]
      [Stakeholder 2]
      [Stakeholder 3]

      Build your mobile roadmap

      It's more than a set of colorful boxes. It's the map to align everyone to where you are going

      Your mobile roadmap

      • Lays out a strategy for your mobile application, platform and practice implementation and scaling.
      • Is a statement of intent for your mobile adoption.
      • Communicates direction for the implementation and use of mobile delivery tools, mobile applications and supporting technologies.
      • Directly connects to the organization's goals

      However, it is not:

      • Representative of a hard commitment.
      • A simple combination of your current product roadmaps

      Roadmap your MVPs against your milestones and release dates

      This is an image of an example of a roadmap for your MVPS, with milestones across Jan 2022, Feb 2022, Mar 2022, Apr 2022. under milestones, are the following points: Points in the timeline when an established set of artifacts is complete (feature-based), or to check status at a particular point in time (time-based); Typically assigned a date and used to show progress; Plays an important role when sequencing different types of artifacts. Under Release Dates are the following points: Releases mark the actual delivery of a set of artifacts packaged together in a new version of processes and applications or new mobile application and delivery capabilities. ; Release dates, firm or not, allow stakeholders to anticipate when this is coming.

      To learn more, visit Info-Tech's Deliver on Your Digital Product Vision blueprint.

      Understand what is communicated in your roadmap

      WHY is the work being done?

      Explains the overarching goal of work being done to a specific audience.

      WHO is doing the work?

      Categorizes the different groups delivering the work on the product.

      WHAT is the work being done?

      Explains the artifacts, or items of work, that will be delivered.

      WHEN is the work being done?

      Explains when the work will be delivered within your timeline.

      To learn more, visit Info-Tech's Deliver on Your Digital Product Vision blueprint.

      Pay attention to organizational changes

      Be prepared to answer:

      "How will mobile change the way I do my job?"

      • Plan how workers will incorporate mobile applications into their way of working and maximize the features it offers.
      • Address the human concerns regarding the transition to a digital world involving modern and mobile technologies and automation.
      • Accept changes, challenges and failures with open arms and instill tactics to quickly address them.
      • Build and strengthen business-IT trust, empowerment, and collaborative culture by adopting the right practices throughout the mobile delivery process.
      • Ensure continuous management and leadership support for business empowerment, operational changes, and shifts in role definitions to best support mobile delivery.
      • Establish a committee to manage the growth, adoption, and delivery of mobile as part of a grandeur digital application portfolio and address conflicts among business units and IT.

      Anticipate and prepare for changes and issues

      Verify and validate the flexibility and adaptability of your mobile applications, strategy and roadmap against various scenarios

      • Scenarios
        • Application Stores Rejecting the Application
        • Security Incidents & Risks
        • Low User Adoption, Retention & Satisfaction
        • Incompatibility with User's Device & Other Systems
        • Device & OS Patches & Updates
        • Changes in Industry Standards & Regulations

      Use the "Now, Next, Later" roadmap

      Use this when deadlines and delivery dates are not strict. This is best suited for brainstorming a product plan when dependency mapping is not required.

      Now

      What are you going to do now?

      Next

      What are you going to do very soon?

      Later

      What are you going to do in the future?

      This is a roadmap showing various points in the following categories: Now; Next; Later

      Adapted From: "Tips for Agile product roadmaps & product roadmap examples," Scrum.org, 2017

      2.3.2 Build your roadmap

      1-3 hours

      1. Identify the business outcomes your mobile application delivery and MVP is expected to deliver.
      2. Build your strategic roadmap by grouping each business outcome by how soon you need to deliver it:
        1. Now: Let's achieve this ASAP.
        2. Next: Sometime very soon, let's achieve these things.
        3. Later: Much further off in the distance, let's consider these things.
      3. Identify what the critical steps are for the organization to embrace mobile application delivery and deliver your MVP.
      4. Build your tactical roadmap by grouping each critical step by how soon you need to address it:
        1. Now: Let's do this ASAP.
        2. Next: Sometime very soon, let's do these things.
        3. Later: Much further off in the distance, let's consider these things.
      5. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Input

      Output
      • List of potential MVPs
      • Mobile roadmap
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      2.3.2 cont'd

      Example: Tactical Roadmap

      Milestone 1

      • Modify the business processes of the MVP to best leverage mobile technologies. Streamline the business processes by removing the steps that do not directly support value delivery.
      • Develop UI templates using the material design framework and the organization's design standards. Ensure it is supported on mobile devices through the mobile browser and satisfy accessibility design standards.
      • Verify and validate current security controls against latest security risks using the W3C as a starting point. Install the latest security patches to maintain compliance.
      • Acquire the Ionic SDK and upskill delivery teams.

      Milestone 2

      • Update the current web framework and third-party libraries with the latest version and align web infrastructure to latest W3C guidelines.
      • Verify and validate functionality and stability of APIs with third-party applications. Begin transition to REST APIs where possible.
      • Make minor changes to the existing data architecture to better support the data volume, velocity, variety, and veracity the system will process and deliver.
      • Update the master data management with latest changes. Keep changes to a minimum.
      • Develop and deliver the first iteration of the MVP with Ionic.

      Milestone 3

      • Standardize the initial mobile delivery practice.
      • Continuously monitor the system and proactively address business continuity, system stability and performance, and security risks.
      • Deliver a hands-on and facilitated training session to end users.
      • Develop intuitive user manuals that are easily accessible on SharePoint.
      • Consult end users for their views and perspectives of suggested business model and technology changes.
      • Regularly survey end users and the media to gauge industry sentiment toward the organization.

      Pitch your roadmap initiatives

      There are multiple audiences for your pitch, and each audience requires a different level of detail when addressed. Depending on the outcomes expected from each audience, a suitable approach must be chosen. The format and information presented will vary significantly from group to group.

      Audience

      Key Contents

      Outcome

      Outcome

      • Costs or benefits estimates

      Sign off on cost and benefit projections

      Executives and decision makers

      • Business value and financial benefits
      • Notable business risks and impacts
      • Business rationale and strategic roadmap

      Revisions, edits, and approval

      IT teams

      • Notable technical and IT risks
      • IT rationale and tactical roadmap
      • Proposed resourcing and skills capacity

      Clarity of vision and direction and readiness for delivery

      Business workers

      • Business rationale
      • Proposed business operations changes
      • Application roadmap

      Verification on proposed changes and feedback

      Continuously measure the benefits and value realized in your mobile applications

      Success hinges on your team's ability to deliver business value. Well-developed mobile applications instill stakeholder confidence in ongoing business value delivery and stakeholder buy-in, provided proper expectations are set and met.

      Business value defines the success criteria of an organization, and it is interpreted from four perspectives:

      • Profit Generation – The revenue generated from a business capability with mobile applications.
      • Cost Reduction – The cost reduction when performing business capabilities with mobile applications.
      • Service Enablement – The productivity and efficiency gains of internal business operations with mobile applications.
      • Customer and Market Reach – Metrics measuring the improved reach and insights of the business in existing or new markets.

      See our Build a Value Measurement Framework blueprint for more information about business value definition.

      Business Value Matrix

      This image contains a quadrant analysis with the following labels: Left - Improved Capabilities; Top - Outward; Right - Financial Benefit; Bottom - Inward. the quadrants are labeled the following, in order from left to right, top to bottom. Customer and Market Reach; Profit Generation; Service Enhancement; Cost Reduction

      Grow your mobile delivery practice

      We are Here
      Level 1: Mobile Delivery Foundations Level 2: Scaled Mobile Delivery Level 3: Leading-Edge Mobile Delivery

      You understand the opportunities and impacts mobile has on your business operations and its disruptive nature on your enterprise systems. Your software delivery lifecycle was optimized to incorporate the specific practices and requirements needed for mobile. A mobile platform was selected based on stakeholder needs that are weighed against current skillsets, high priority non-functional requirements, the available capacity and scalability of your stack, and alignment to your current delivery process.

      New features and mobile use cases are regularly emerging in the industry. Ensuring your mobile platform and delivery process can easily scale to incorporate constantly changing mobile features and technologies is key. This can help minimize the impact these changes will have on your mobile stack and the resulting experience.

      Achieving this state requires three competencies: mobile security, performance optimization, and integration practices.

      Many of today's mobile trends involve, in one form or another, hardware components on the mobile device (e.g., NFC receivers, GPS, cameras). You understand the scope of native features available on your end user's mobile device and the required steps and capabilities to enable and leverage them.

      Grow your mobile delivery practice (cont'd)

      Ask yourself the following questions:
      Level 1: Mobile Delivery Foundations Level 2: Scaled Mobile Delivery Level 3: Leading-Edge Mobile Delivery

      Checkpoint questions shown at the end of step 1.2 of this blueprint

      You should be at this point upon the successful delivery of your first mobile application.

      Security

      • Your mobile stack (application, data, and infrastructure) is updated to incorporate the security risks mobile apps will have on your systems and business operations.
      • Leading edge encryption, authentication management (e.g., multi-factor), and access control systems are used to bolster existing mobile security infrastructure.
      • Network traffic to and from mobile application is monitored and analyzed.

      Performance Optimization

      • Performance enhancements are made with the entire mobile stack in mind.
      • Mobile performance is monitored and assessed with both proactive (data flow) and retroactive (instrumentation) approaches.
      • Development and testing practices and technologies accommodate the performance differences between mobile and desktop applications.

      API Development

      • Existing web APIs are compatible with mobile applications, or a gateway / middleware is used to facilitate communication with backend and third-party services.
      • APIs are secured to prevent unauthorized access and misuse.
      • Web APIs are documented and standardized for reuse in multiple mobile applications.
      • Implementing APIs of native features in native and/or cross-platform and/or hybrid platforms is well understood.
      • All leading-edge mobile features are mapped to and support business requirements and objectives.
      • The new mobile use cases are well understood and account for the various scenarios/environments a user may encounter with the leading-edge mobile features.
      • The relevant non-mobile devices, readers, sensors, and other dependent systems are shortlisted and acquired to enable and support your new mobile capabilities.
      • Delivery teams are prepared to accommodate the various security, performance, and integration risks associated with implementing leading-edge mobile features. Practices and mechanisms are established to minimize the impact to business operations.
      • Metrics are used to measure the success of your leading-edge mobile features implementation by comparing its performance and acceptance against past projects.
      • Business stakeholders and development teams are up to date with the latest mobile technologies and delivery techniques.

      Summary of Accomplishment

      Choose Your Mobile Platform and Tools

      • User personas
      • Mobile objectives and metrics
      • Mobile opportunity backlog
      • List of mobile features to enable the desired mobile experience
      • System current assessment
      • Mobile application quality definition
      • Readiness for mobile delivery
      • Desired mobile platform approach
      • Shortlisted mobile delivery solutions
      • Desired list of vendor features and services
      • MVP design
      • Mobile delivery roadmap

      If you would like additional support, have our analysts guide you through other phases as part of Info-Tech workshop.

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Research Contributors and Experts

      This is a picture of Chaim Yudkowsky, Chief Information Officer for The American Israel Public Affairs Committee

      Chaim Yudkowsky
      Chief Information Officer
      The American Israel Public Affairs Committee

      Chaim Yudkowsky is currently Chief information Officer for American Israel Public Affairs Committee (AIPAC), the DC headquartered not-for-profit focused on lobbying for a strong US-Israel relationship. In that role, Chaim is responsible for all traditional IT functions including oversight of IT strategy, vendor relationships, and cybersecurity program. In addition, Chaim also has primary responsibility for all physical security technology and strategy for US offices and event technology for the many AIPAC events.

      Bibliography

      "5 Pillars of API Management". Broadcom, 2021. Web.

      Bourne, James. "Apperian research shows more firms pushing larger numbers of enterprise apps". Enterprise CIO, 17 Feb 2016. Web.

      Ceci, L. "Mobile app user retention rate worldwide 2020, by vertical". Statista, 6 Apr 2022. Web.

      Clement, J. "Share of global mobile website traffic 2015-2021". Statista, 18 Feb 2022. Web

      DeVos, Jordan. "Design Problem Statements – What They Are and How to Frame Them." Toptal, n.d. Web.

      Enge, Eric. "Mobile vs. Desktop Usage in 2020". Perficient, 23 March 2021. Web.

      Engels, Antoine. "How many Android updates does Samsung, Xiaomi or OnePlus offer?" NextPit, Mar 2022. Web.

      "Fast-tracking digital transformation through next-gen technologies". Broadridge, 2022. Web.

      Gayatri. "The Pulse of Digital Transformation 2021 – Survey Results." DronaHQ, 2021. Web.

      Gray, Dave. "Updated Empathy Map Canvas." The XPLANE Collection, 15 July 2017. Web.

      "HCL Volt MX". HCL, n.d. Web.

      "iPass Mobile Professional Report 2017". iPass, 2017. Web.

      Karlsson, Johan. "Backlog Grooming: Must-Know Tips for High-Value Products." Perforce, 2019. Web.

      Karnes, KC. "Why Users Uninstall Apps: 28% of People Feel Spammed [Survey]". CleverTap, 27 July 2021. Web.

      Kemp, Simon. "Digital 2021: Global Overview Report". DataReportal, 27 Jan 2021. Web.

      Kleinberg, Sara. "Consumers are always shopping and eager for your help". Google, Aug 2018. Web.

      MaLavolta, Ivano. "Anatomy of an HTML 5 mobile web app". University of L'Aquila, 16 Apr 2012. Web.

      "Maximizing Mobile Value: To BYOD or not to BYOD?" Samsung and Oxford Economics, 2022. Web.

      "Mobile App Performance Metrics For Crash-Free Apps." AppSamurai, 27 June 2018. Web.

      "Mobile Application Development Statistics: 5 Facts". Intersog, 23 Nov 2021. Web.

      Moore, Geoffrey A. "Crossing the Chasm, 3rd Edition: Marketing and Selling Disruptive Products to Mainstream Customers." Harper Business, 3rd edition, 2014. Book.

      "OWASP Top Ten". OWASP, 2021. Web.

      "Personas". Usability.gov, n.d. Web.

      Roden, Marky. "PSC Tech Talk: UX Design – Not just making things pretty". Xomino, 18 Mar 2018. Web.

      Royce, Dr. Winston W. "Managing the Development of Large Software Systems." USC Student Computing Facility, 1970. Web.

      Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education, 2012. Book.

      Sahay, Apurvanand et al. "Supporting the understanding and comparison of low-code development platforms." Universit`a degli Studi dell'Aquila, 2020. Web.

      Schuurman, Robbin. "Tips for Agile product roadmaps & product roadmap examples." Scrum.org, 2017. Web.

      Strunk, Christian. "How to define a product vision (with examples)." Christian Strunk. n.d. Web.

      Szeja, Radoslaw. "14 Biggest Challenges in Mobile App Development in 2022". Netguru, 4 Jan 2022. Web.

      "Synopsys Research Reveals Significant Security Concerns in Popular Mobile Apps Amid Pandemic". Synopsys, 25 Mar 2021. Web.

      "TOGAF 8.1.1 Online, Part IV: Resource Base, Developing Architecture Views." The Open Group, n.d. Web.

      Wangen, Emilie Nøss. "What Is a Software Platform & How Is It Different From a Product?" HubSpot, 2021. Web.

      "Mobile App Retention Rate: What's a Good Retention Rate?" Localytics, July 2021. Web.

      "Why Mobile Apps Fail: Failure to Launch". Perfecto Mobile, 26 Jan 2014. Web.

      Appendix A

      Sample Reference Frameworks

      Reference Framework: Web Platform

      Most of the operations of the applications on a web platform are executed in the mid-tier or back-end servers. End users interact with the platform through the presentation layer, developed with web languages, in the browser.

      This is an image of the Reference Framework: Web Platform

      Reference Framework: Mobile Web Application

      Many mobile web applications are composed of JavaScript (the muscle of the app), HTML5 (the backbone of the app), and CSS (the aesthetics of the app). The user will make a request to the web server which will interact with the application to provide a response. Since each device has unique attributes, consider a device detection service to help adjust content for each type of device.

      this is an image of the Reference Framework: Mobile Web Application

      Source: MaLavolta, Ivono, 2012.

      Web Platform: Anatomy of a Web Server

      Web Server Services

      • Mediation Services: Perform transformation of data/messages.
      • Boundary Services: Provide interface protocol and data/message conversion capabilities.
      • Event Distribution: Provides for the enterprise-wide adoption of content and topic-based publish/subscribe event distribution.
      • Transport Services: Facilitate data transmission across the middleware/server.
      • Service Directory: Manages multiple service identifiers and locations.

      This image shows the relationships of the various web server services listed above

      Reference Framework: Hybrid Platform

      Unlike the mobile web platform, most of an application's operations on the hybrid platform is on the device within a native container. The container leverages the device browser's runtime engine and is based on the framework of the mobile delivery solution.

      This is an image of the Reference Framework: Hybrid Platform

      Reference Framework: Native Platform

      Applications on a native platform are installed locally on the device giving it access to native device hardware and software. The programming language depends on the operating system's or device's SDK.

      This is an image of the Reference Framework: Native Platform

      Appendix B

      List of Low- and No- Code Software Delivery Solution Features

      Supplementary List of Features

      Graphical user interface

      • Drag-and-drop designer - This feature enhances the user experience by permitting to drag all the items involved in making an app including actions, responses, connections, etc.
      • Point and click approach - This is similar to the drag-and-drop feature except it involves pointing on the item and clicking on the interface rather than dragging and dropping the item.
      • Pre-built forms/reports - This is off-the-shelf and most common reusable editable forms or reports that a user can use when developing an application.
      • Pre-built dashboards - This is off-the-shelf and most common dashboards that a user can use when developing an application.
      • Forms - This feature helps in creating a better user interface and user experience when developing applications. A form includes dashboards, custom forms, surveys, checklists, etc. which could be useful to enhance the usability of the application being developed.
      • Progress tracking - This features helps collaborators to combine their work and track the development progress of the application.
      • Advanced Reporting - This features enables the user to obtain a graphical reporting of the application usage. The graphical reporting includes graphs, tables, charts, etc.
      • Built-in workflows - This feature helps to concentrate the most common reusable workflows when creating applications.
      • Configurable workflows - Besides built-in workflows, the user should be able to customize workflows according to their needs.

      Interoperability support

      • Interoperability with external services - This feature is one of the most important features to incorporate different services and platforms including that of Microsoft, Google, etc. It also includes the interoperability possibilities among different low-code platforms.
      • Connection with data sources - This features connects the application with data sources such as Microsoft Excel, Access and other relational databases such as Microsoft SQL, Azure and other non-relational databases such as MongoDB.

      Security Support

      • Application security - This feature enables the security mechanism of an application which involves confidentiality, integrity and availability of an application, if and when required.
      • Platform security - The security and roles management is a key part in developing an application so that the confidentiality, integrity and authentication (CIA) can be ensured at the platform level.

      Collaborative development support

      • Off-line collaboration - Different developers can collaborate on the specification of the same application. They work off-line locally and then they commit to a remote server their changes, which need to be properly merged.
      • On-line collaboration - Different developers collaborate concurrently on the specification of the same application. Conflicts are managed at run-time.

      Reusability support

      • Built-in workflows - This feature helps to concentrate the most common reusable workflows in creating an application.
      • Pre-built forms/reports - This is off-the-shelf and most common reusable editable forms or reports that a user might want to employ when developing an application.
      • Pre-built dashboards - This is off-the-shelf and most common dashboards that a user might want to employ when developing an application.

      Scalability

      • Scalability on number of users - This features enables the application to scale-up with respect to the number of active users that are using that application at the same time.
      • Scalability on data traffic - This features enables the application to scale-up with respect to the volume of data traffic that are allowed by that application in a particular time.
      • Scalability on data storage - This features enables the application to scale-up with respect to the data storage capacity of that application.

      Business logic specification mechanisms

      • Business rules engine - This feature helps in executing one or more business rules that help in managing data according to user's requirements.
      • Graphical workflow editor - This feature helps to specify one or more business rules in a graphical manner.
      • AI enabled business logic - This is an important feature which uses Artificial Intelligence in learning the behavior of an attributes and replicate those behaviors according to learning mechanisms.

      Application build mechanisms

      • Code generation - According to this feature, the source code of the modeled application is generated and subsequently deployed before its execution.
      • Models at run-time - The model of the specified application is interpreted and used at run-time during the execution of the modeled application without performing any code generation phase.

      Deployment support

      • Deployment on cloud - This features enables an application to be deployed online in a cloud infrastructure when the application is ready to deployed and used.
      • Deployment on local infrastructures - This features enables an application to be deployed locally on the user organization's infrastructure when the application is ready to be deployed and used.

      Kinds of supported applications

      • Event monitoring - This kind of applications involves the process of collecting data, analyzing the event that can be caused by the data, and signaling any events occurring on the data to the user.
      • Process automation - This kind of applications focuses on automating complex processes, such as workflows, which can take place with minimal human intervention.
      • Approval process control - This kind of applications consists of processes of creating and managing work approvals depending on the authorization of the user. For example, payment tasks should be managed by the approval of authorized personnel only.
      • Escalation management - This kind of applications are in the domain of customer service and focuses on the management of user viewpoints that filter out aspects that are not under the user competences.
      • Inventory management - This kind of applications is for monitoring the inflow and outflow of goods and manages the right amount of goods to be stored.
      • Quality management - This kind of applications is for managing the quality of software projects, e.g., by focusing on planning, assurance, control and improvements of quality factors.
      • Workflow management - This kind of applications is defined as sequences of tasks to be performed and monitored during their execution, e.g., to check the performance and correctness of the overall workflow.

      Source: Sahay, Apurvanand et al., 2020

      Govern Shared Services

      • Buy Link or Shortcode: {j2store}459|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • IT managers have come under increasing pressure to cut costs, and implementing shared services has become a popular demand from the business.
      • Business unit resistance to a shared services implementation can derail the project.
      • Shared services rearranges responsibilities within existing IT departments, potentially leaving no one accountable for project success and causing cost overruns and service performance failures.

      Our Advice

      Critical Insight

      • Over one-third of shared services implementations increase IT costs, due to implementation failures. Ineffective governance plays a major role in the breakdown of shared services, particularly when it does not overcome stakeholder resistance or define clear areas of responsibility.
      • Effective governance of a shared services implementation requires the IT leader to find the optimal combination of independence and centralization for the shared service provider.
      • Three primary models exist for governing shared services: entrepreneurial, mandated, and market-based. Each one occupies a different location in the trade-off of independence and centralization. The optimal model for a specific situation depends on the size of the organization, the number of participants, the existing trend towards centralization, and other factors.

      Impact and Result

      • Find the optimal governance model for your organization by weighing the different likely benefits and costs of each path.
      • Assign appropriate individual responsibilities to participants, so you can effectively scope your service offering and fund your implementation.
      • Support the governance effort effectively using published Info-Tech tools and templates.

      Govern Shared Services Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand each of the governance models and what each entails

      Build a plan for governing an implementation.

      • Storyboard: Govern Shared Services
      • None

      2. Choose the optimal approach to shared services governance

      Maximize the net benefit conferred by governance.

      • Shared Services Governance Strategy Roadmap Tool
      [infographic]

      Build a Data Classification MVP for M365

      • Buy Link or Shortcode: {j2store}67|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing Applications
      • Parent Category Link: /end-user-computing-applications
      • Resources are the primary obstacle to getting a foot hold in O365 governance, whether it is funding or FTE resources.
      • Data is segmented and is difficult to analyze when you can’t see it or manage the relationships between sources.
      • Organizations expect results early and quickly and a common obstacle is that building a proper data classification framework can take more than two years and the business can't wait that long.

      Our Advice

      Critical Insight

      • Data classification is the lynchpin to ANY effective governance of O/M365 and your objective is to navigate through this easily and effectively and build a robust, secure, and viable governance model.
      • Start your journey by identifying what and where your data is and how much data you have. You need to understand what sensitive data you have and where it is stored before you can protect it or govern that data.
      • Ensure there is a high-level leader who is the champion of the governance objective.

      Impact and Result

      • Using least complex sensitivity labels in your classification are your building blocks to compliance and security in your data management schema; they are your foundational steps.

      Build a Data Classification MVP for M365 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a Data Classification MVP for M365 Deck – A guide for how to build a minimum-viable product for data classification that end users will actually use.

      Discover where your data resides, what governance helps you do, and what types of data you're classifying. Then build your data and security protection baselines for your retention policy, sensitivity labels, workload containers, and both forced and unforced policies.

      • Build a Data Classification MVP for M365 Storyboard
      [infographic]

      Further reading

      Build a Data Classification MVP for M365

      Kickstart your governance with data classification users will actually use!

      Executive Summary

      Info-Tech Insight

      • Creating an MVP gets you started in data governance
        Information protection and governance are not something you do once and then you are done. It is a constant process where you start with the basics (a minimum-viable product or MVP) and enhance your schema over time. The objective of the MVP is reducing obstacles to establishing an initial governance position, and then enabling rapid development of the solution to address a variety of real risks, including data loss prevention (DLP), data retention, legal holds, and data labeling.
      • Define your information and protection strategy
        The initial strategy is to start looking across your organization and identifying your customer data, regulatory data, and sensitive information. To have a successful data protection strategy you will include lifecycle management, risk management, data protection policies, and DLP. All key stakeholders need to be kept in the loop. Ensure you keep track of all available data and conduct a risk analysis early. Remember, data is your highest valued intangible asset.
      • Planning and resourcing are central to getting started on MVP
        A governance plan and governance decisions are your initial focus. Create a team of stakeholders that include IT and business leaders (including Legal, Finance, HR, and Risk), and ensure there is a top-level leader who is the champion of the governance objective, which is to ensure your data is safe, secure, and not prone to leakage or theft, and maintain confidentiality where it is warranted.

      Executive Summary

      Your Challenge
      • Today, the amount of data companies are gathering is growing at an explosive rate. New tools are enabling unforeseen channels and ways of collaborating.
      • Combined with increased regulatory oversight and reporting obligations, this makes the discovery and management of data a massive undertaking. IT can’t find and protect the data when the business has difficulty defining its data.
      • The challenge is to build a framework that can easily categorize and classify data yet allows for sufficient regulatory compliance and granularity to be useful. Also, to do it now because tomorrow is too late.
      Common Obstacles

      Data governance has several obstacles that impact a successful launch, especially if governing M365 is not a planned strategy. Below are some of the more common obstacles:

      • Resources are the primary obstacle to starting O365 governance, whether it is funding or people.
      • Data is segmented and is difficult to analyze when you can’t see it or manage the relationships between sources.
      • Organizations expect results early and quickly and a common obstacle is that building a "proper data classification framework” is a 2+ year project and the business can't wait that long.
      Info-Tech’s Approach
      • Start with the basics: build a minimum-viable product (MVP) to get started on the path to sustainable governance.
      • Identify what and where your data resides, how much data you have, and understand what sensitive data needs to be protected.
      • Create your team of stakeholders, including Legal, records managers, and privacy officers. Remember, they own the data and should manage it.
      • Categorization comes before classification, and discovery comes before categorization. Use easy-to-understand terms like high, medium, or low risk.

      Info-Tech Insight

      Data classification is the lynchpin to any effective governance of O/M365 and your objective is to navigate through this easily and effectively and build a robust, secure, and viable governance model. Start your journey by identifying what and where your data is and how much data do you have. You need to understand what sensitive data you have and where it is stored before you can protect or govern it. Ensure there is a high-level leader who is the champion of the governance objectives. Data classification fulfills the governance objectives of risk mitigation, governance and compliance, efficiency and optimization, and analytics.

      Questions you need to ask

      Four key questions to kick off your MVP.

      1

      Know Your Data

      Do you know where your critical and sensitive data resides and what is being done with it?

      Trying to understand where your information is can be a significant project.

      2

      Protect Your Data

      Do you have control of your data as it traverses across the organization and externally to partners?

      You want to protect information wherever it goes through encryption, etc.

      3

      Prevent Data Loss

      Are you able to detect unsafe activities that prevent sharing of sensitive information?

      Data loss prevention (DLP) is the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data.

      4

      Govern Your Data

      Are you using multiple solutions (or any) to classify, label, and protect sensitive data?

      Many organizations use more than one solution to protect and govern their data, making it difficult to determine if there are any coverage gaps.

      Classification tiers

      Build your schema.

      Pyramid visualization for classification tiers. The top represents 'Simplicity', and the bottom 'Complexity' with the length of the sides at each level representing the '# of policies' and '# of labels'. At the top level is 'MVP (Minimum-Viable Product) - Confidential, Internal (Subcategory: Personal), Public'. At the middle level is 'Regulated - Highly Confidential, Confidential, Sensitive, General, Internal, Restricted, Personal, Sub-Private, Public'. And a the bottom level is 'Government (DOD) - Top Secret (TS), Secret, Confidential, Restricted, Official, Unclassified, Clearance'

      Info-Tech Insight

      Deciding on how granular you go into data classification will chiefly be governed by what industry you are in and your regulatory obligations – the more highly regulated your industry, the more classification levels you will be mandated to enforce. The more complexity you introduce into your organization, the more operational overhead both in cost and resources you will have to endure and build.

      Microsoft MIP Topology

      Microsoft Information Protection (MIP), which is Microsoft’s Data Classification Services, is the key to achieving your governance goals. Without an MVP, data classification will be overwhelming; simplifying is the first step in achieving governance.

      A diagram of multiple offerings all connected to 'MIP Data Classification Service'. Circled is 'Sensitivity Labels' with an arrow pointing back to 'MIP' at the center.
      (Source: Microsoft, “Microsoft Purview compliance portal”)

      Info-Tech Insight

      Using least-complex sensitivity labels in your classification are your building blocks to compliance and security in your data management schema; they are your foundational steps.

      MVP RACI Chart

      Data governance is a "takes a whole village" kind of effort.

      Clarify who is expected to do what with a RACI chart.

      End User M365 Administrator Security/ Compliance Data Owner
      Define classification divisions R A
      Appy classification label to data – at point of creation A R
      Apply classification label to data – legacy items R A
      Map classification divisions to relevant policies R A
      Define governance objectives R A
      Backup R A
      Retention R A
      Establish minimum baseline A R

      What and where your data resides

      Data types that require classification.

      Logos for 'Microsoft', 'Office 365', and icons for each program included in that package.
      M365 Workload Containers
      Icon for MS Exchange. Icon for MS SharePoint.Icon for MS Teams. Icon for MS OneDrive. Icon for MS Project Online.
      Email
      • Attachments
      Site Collections, Sites Sites Project Databases
      Contacts Teams and Group Site Collections, Sites Libraries and Lists Sites
      Metadata Libraries and Lists Documents
      • Versions
      Libraries and Lists
      Teams Conversations Documents
      • Versions
      Metadata Documents
      • Versions
      Teams Chats Metadata Permissions
      • Internal Sharing
      • External Sharing
      Metadata
      Permissions
      • Internal Sharing
      • External Sharing
      Files Shared via Teams Chats Permissions
      • Internal Sharing
      • External Sharing

      Info-Tech Insight

      Knowing where your data resides will ensure you do not miss any applicable data that needs to be classified. These are examples of the workload containers; you may have others.

      Discover and classify on- premises files using AIP

      AIP helps you manage sensitive data prior to migrating to Office 365:
      • Use discover mode to identify and report on files containing sensitive data.
      • Use enforce mode to automatically classify, label, and protect files with sensitive data.
      Can be configured to scan:
      • SMB files
      • SharePoint Server 2016, 2013
      Stock image of a laptop uploading to the cloud with a padlock and key in front of it.
      • Map your network and find over-exposed file shares.
      • Protect files using MIP encryption.
      • Inspect the content in file repositories and discover sensitive information.
      • Classify and label file per MIP policy.
      Azure Information Protection scanner helps discover, classify, label, and protect sensitive information in on-premises file servers. You can run the scanner and get immediate insight into risks with on-premises data. Discover mode helps you identify and report on files containing sensitive data (Microsoft Inside Track and CIAOPS, 2022). Enforce mode automatically classifies, labels, and protects files with sensitive data.

      Info-Tech Insight

      Any asset deployed to the cloud must have approved data classification. Enforcing this policy is a must to control your data.

      Understanding governance

      Microsoft Information Governance

      Information Governance
      • Retention policies for workloads
      • Inactive and archive mailboxes

      Arrow pointing down-right

      Records Management
      • Retention labels for items
      • Disposition review

      Arrow pointing down-left

      Retention and Deletion

      ‹——— Connectors for Third-Party Data ———›

      Information governance manages your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you do not. Backup should not be used as a retention methodology since information governance is managed as a “living entity” and backup is a stored information block that is “suspended in time.” Records management uses intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization. It is for that discrete set of content that needs to be immutable.
      (Source: Microsoft, “Microsoft Purview compliance portal”)

      Retention and backup policy decision

      Retention is not backup.

      Info-Tech Insight

      Retention is not backup. Retention means something different: “the content must be available for discovery and legal document production while being able to defend its provenance, chain of custody, and its deletion or destruction” (AvePoint Blog, 2021).

      Microsoft Responsibility (Microsoft Protection) Weeks to Months Customer Responsibility (DLP, Backup, Retention Policy) Months to Years
      Loss of service due to natural disaster or data center outage Loss of data due to departing employees or deactivated accounts
      Loss of service due to hardware or infrastructure failure Loss of data due to malicious insiders or hackers deleting content
      Short-term (30 days) user error with recycle bin/ version history (including OneDrive “File Restore”) Loss of data due to malware or ransomware
      Short-term (14 days) administrative error with soft- delete for groups, mailboxes, or service-led rollback Recovery from prolonged outages
      Long-term accidental deletion coverage with selective rollback

      Understand retention policy

      What are retention policies used for? Why you need them as part of your MVP?

      Do not confuse retention labels and policies with backup.

      Remember: “retention [policies are] auto-applied whereas retention label policies are only applied if the content is tagged with the associated retention label” (AvePoint Blog, 2021).

      E-discovery tool retention policies are not turned on automatically.

      Retention policies are not a backup tool – when you activate this feature you are unable to delete anyone.

      “Data retention policy tools enable a business to:

      • “Decide proactively whether to retain content, delete content, or retain and then delete the content when needed.
      • “Apply a policy to all content or just content meeting certain conditions, such as items with specific keywords or specific types of sensitive information.
      • “Apply a single policy to the entire organization or specific locations or users.
      • “Maintain discoverability of content for lawyers and auditors, while protecting it from change or access by other users. […] ‘Retention Policies’ are different than ‘Retention Label Policies’ – they do the same thing – but a retention policy is auto-applied, whereas retention label policies are only applied if the content is tagged with the associated retention label.

      “It is also important to remember that ‘Retention Label Policies’ do not move a copy of the content to the ‘Preservation Holds’ folder until the content under policy is changed next.” (Source: AvePoint Blog, 2021)

      Definitions

      Data classification is a focused term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level. In its most basic form, data classification is a means of protecting your data from unauthorized disclosure, alteration, or destruction based on how sensitive or impactful it is.

      Once data is classified, you can then create policies; sensitive data types, trainable classifiers, and sensitivity labels function as inputs to policies. Policies define behaviors, like if there will be a default label, if labeling is mandatory, what locations the label will be applied to, and under what conditions. A policy is created when you configure Microsoft 365 to publish or automatically apply sensitive information types, trainable classifiers, or labels.

      Sensitivity label policies show one or more labels to Office apps (like Outlook and Word), SharePoint sites, and Office 365 groups. Once published, users can apply the labels to protect their content.

      Data loss prevention (DLP) policies help identify and protect your organization's sensitive info (Microsoft Docs, April 2022). For example, you can set up policies to help make sure information in email and documents is not shared with the wrong people. DLP policies can use sensitive information types and retention labels to identify content containing information that might need protection.

      Retention policies and retention label policies help you keep what you want and get rid of what you do not. They also play a significant role in records management.

      Data examples for MVP classification

      • Examples of the type of data you consider to be Confidential, Internal, or Public.
      • This will help you determine what to classify and where it is.
      Internal Personal, Employment, and Job Performance Data
      • Social Security Number
      • Date of birth
      • Marital status
      • Job application data
      • Mailing address
      • Resume
      • Background checks
      • Interview notes
      • Employment contract
      • Pay rate
      • Bonuses
      • Benefits
      • Performance reviews
      • Disciplinary notes or warnings
      Confidential Information
      • Business and marketing plans
      • Company initiatives
      • Customer information and lists
      • Information relating to intellectual property
      • Invention or patent
      • Research data
      • Passwords and IT-related information
      • Information received from third parties
      • Company financial account information
      • Social Security Number
      • Payroll and personnel records
      • Health information
      • Self-restricted personal data
      • Credit card information
      Internal Data
      • Sales data
      • Website data
      • Customer information
      • Job application data
      • Financial data
      • Marketing data
      • Resource data
      Public Data
      • Press releases
      • Job descriptions
      • Marketing material intended for general public
      • Research publications

      New container sensitivity labels (MIP)

      New container sensitivity labels

      Public Private
      Privacy
      1. Membership to group is open; anyone can join
      2. “Everyone except external guest” ACL onsite; content available in search to all tenants
      1. Only owner can add members
      2. No access beyond the group membership until someone shares it or changes permissions
      Allowed Not Allowed
      External guest policy
      1. Membership to group is open; anyone can join
      2. “Everyone except external guest” ACL onsite; content available in search to all tenants
      1. Only owner can add members
      2. No access beyond the group membership until someone shares it or changes permissions

      What users will see when they create or label a Team/Group/Site

      Table of what users will see when they create or label a team/group/site highlighting 'External guest policy' and 'Privacy policy options' as referenced above.
      (Source: Microsoft, “Microsoft Purview compliance portal”)

      Info-Tech Insights

      Why you need sensitivity container labels:
      • Manage privacy of Teams Sites and M365 Groups
      • Manage external user access to SPO sites and teams
      • Manage external sharing from SPO sites
      • Manage access from unmanaged devices

      Data protection and security baselines

      Data Protection Baseline

      “Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline" (Microsoft Docs, June 2022). This baseline assessment has a set of controls for key regulations and standards for data protection and general data governance. This baseline draws elements primarily from NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) and ISO (International Organization for Standardization) as well as from FedRAMP (Federal Risk and Authorization Management Program) and GDPR (General Data Protection Regulation of the European Union).

      Security Baseline

      The final stage in M365 governance is security. You need to implement a governance policy that clearly defines storage locations for certain types of data and who has permission to access it. You need to record and track who accesses content and how they share it externally. “Part of your process should involve monitoring unusual external sharing to ensure staff only share documents that they are allowed to” (Rencore, 2021).

      Info-Tech Insights

      • Controls are already in place to set data protection policy. This assists in the MVP activities.
      • Finally, you need to set your security baseline to ensure proper permissions are in place.

      Prerequisite baseline

      Icon of crosshairs.
      Security

      MFA or SSO to access from anywhere, any device

      Banned password list

      BYOD sync with corporate network

      Icon of a group.
      Users

      Sign out inactive users automatically

      Enable guest users

      External sharing

      Block client forwarding rules

      Icon of a database.
      Resources

      Account lockout threshold

      OneDrive

      SharePoint

      Icon of gears.
      Controls

      Sensitivity labels, retention labels and policies, DLP

      Mobile application management policy

      Building baselines

      Sensitivity Profiles: Public, Internal, Confidential; Subcategory: Highly Confidential

      Microsoft 365 Collaboration Protection Profiles

      Sensitivity Public External Collaboration Internal Highly Confidential
      Description Data that is specifically prepared for public consumption Not approved for public consumption, but OK for external collaboration External collaboration highly discouraged and must be justified Data of the highest sensitivity: avoid oversharing, internal collaboration only
      Label details
      • No content marking
      • No encryption
      • Public site
      • External collaboration allowed
      • Unmanaged devices: allow full access
      • No content marking
      • No encryption
      • Private site
      • External collaboration allowed
      • Unmanaged devices: allow full access
      • Content marking
      • Encryption
      • Private site
      • External collaboration allowed but monitored
      • Unmanaged devices: limited web access
      • Content marking
      • Encryption
      • Private site
      • External collaboration disabled
      • Unmanaged devices: block access
      Teams or Site details Public Team or Site open discovery, guests are allowed Private Team or Site members are invited, guests are allowed Private Team or Site members are invited, guests are not allowed
      DLP None Warn Block

      Please Note: Global/Compliance Admins go to the 365 Groups platform, the compliance center (Purview), and Teams services (Source: Microsoft Documentation, “Microsoft Purview compliance documentation”)

      Info-Tech Insights

      • Building baseline profiles will be a part of your MVP. You will understand what type of information you are addressing and label it accordingly.
      • Sensitivity labels are a way to classify your organization's data in a way that specifies how sensitive the data is. This helps you decrease risks in sharing information that shouldn't be accessible to anyone outside your organization or department. Applying sensitivity labels allows you to protect all your data easily.

      MVP activities

      PRIMARY
      ACTIVITIES
      Define Your Governance
      The objective of the MVP is reducing barriers to establishing an initial governance position, and then enabling rapid progression of the solution to address a variety of tangible risks, including DLP, data retention, legal holds, and labeling.
      Decide on your classification labels early.

      CATEGORIZATION





      CLASSIFICATION

      MVP
      Data Discovery and Management
      AIP (Azure Information Protection) scanner helps discover, classify, label, and protect sensitive information in on-premises file servers. You can run the scanner and get immediate insight into risks with on-premises data.
      Baseline Setup
      Building baseline profiles will be a part of your MVP. You will understand what type of information you are addressing and label it accordingly. Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline.
      Default M365 settings
      Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline. This baseline assessment has a set of controls for key regulations and standards for data protection and general data governance.
      SUPPORT
      ACTIVITIES
      Retention Policy
      Retention policy is auto-applied. Decide whether to retain content, delete content, or retain and then delete the content.
      Sensitivity Labels
      Automatically enforce policies on groups through labels; classify groups.
      Workload Containers
      M365: SharePoint, Teams, OneDrive, and Exchange, where your data is stored for labels and policies.
      Unforced Policies
      Written policies that are not enforceable by controls in Compliance Manager such as acceptable use policy.
      Forced Policies
      Restrict sharing controls to outside organizations. Enforce prefix or suffix to group or team names.

      ACME Company MVP for M/O365

      PRIMARY
      ACTIVITIES
      Define Your Governance


      Focus on ability to use legal hold and GDPR compliance.

      CATEGORIZATION





      CLASSIFICATION

      MVP
      Data Discovery and Management


      Three classification levels (public, internal, confidential), which are applied by the user when data is created. Same three levels are used for AIP to scan legacy sources.

      Baseline Setup


      All data must at least be classified before it is uploaded to an M/O365 cloud service.

      Default M365 settings


      Turn on templates 1 8 the letter q and the number z

      SUPPORT
      ACTIVITIES
      Retention Policy


      Retention policy is auto-applied. Decide whether to retain content, delete content, or retain and then delete the content.

      Sensitivity Labels


      Automatically enforce policies on groups through labels; classify groups.

      Workload Containers


      M365: SharePoint, Teams, OneDrive, and Exchange, where your data is stored for labels and policies.

      Unforced Policies


      Written policies that are not enforceable by controls in Compliance Manager such as acceptable use policy.

      Forced Policies


      Restrict sharing controls to outside organizations. Enforce prefix or suffix to group or team names.

      Related Blueprints

      Govern Office 365

      Office 365 is as difficult to wrangle as it is valuable. Leverage best practices to produce governance outcomes aligned with your goals.

      Map your organizational goals to the administration features available in the Office 365 console. Your governance should reflect your requirements.

      Migrate to Office 365 Now

      Jumping into an Office 365 migration project without careful thought of the risks of a cloud migration will lead to project halt and interruption. Intentionally plan in order to expose risk and to develop project foresight for a smooth migration.

      Microsoft Teams Cookbook

      Remote work calls for leveraging your Office 365 license to use Microsoft Teams – but IT is unsure about best practices for governance and permissions. Moreover, IT has few resources to help train end users with Teams best practices

      IT Governance, Risk & Compliance

      Several blueprints are available on a broader topic of governance, from Make Your IT Governance Adaptable to Improve IT Governance to Drive Business Results and Build an IT Risk Management Program.

      Bibliography

      “Best practices for sharing files and folders with unauthenticated users.” Microsoft Build, 28 April 2022. Accessed 2 April 2022.

      “Build and manage assessments in Compliance Manager.” Microsoft Docs, 15 June 2022. Web.

      “Building a modern workplace with Microsoft 365.” Microsoft Inside Track, n.d. Web.

      Crane, Robert. “June 2020 Microsoft 365 Need to Know Webinar.” CIAOPS, SlideShare, 26 June 2020. Web.

      “Data Classification: Overview, Types, and Examples.” Simplilearn, 27 Dec. 2021. Accessed 11 April 2022.

      “Data loss prevention in Exchange Online.” Microsoft Docs, 19 April 2022. Web.

      Davies, Nahla. “5 Common Data Governance Challenges (and How to Overcome Them).” Dataversity. 25 October 2021. Accessed 5 April 2022.

      “Default labels and policies to protect your data.” Microsoft Build, April 2022. Accessed 3 April 2022.

      M., Peter. "Guide: The difference between Microsoft Backup and Retention." AvePoint Blog, 9 Oct. 2021. Accessed 4 April 2022.

      Meyer, Guillaume. “Sensitivity Labels: What They Are, Why You Need Them, and How to Apply Them.” nBold, 6 October 2021. Accessed 2 April 2022.

      “Microsoft 365 guidance for security & compliance.” Microsoft, 27 April 2022. Accessed 28 April 2022.

      “Microsoft Purview compliance portal.” Microsoft, 19 April 2022. Accessed 22 April 2022.

      “Microsoft Purview compliance documentation.” Microsoft, n.d. Accessed 22 April 2022.

      “Microsoft Trust Center: Products and services that run on trust.” Microsoft, 2022. Accessed 3 April 2022.

      “Protect your sensitive data with Microsoft Purview.” Microsoft Build, April 2022. Accessed 3 April 2022.

      Zimmergren, Tobias. “4 steps to successful cloud governance in Office 365.” Rencore, 9 Sept. 2021. Accessed 5 April 2022.

      Develop a Use Case for Smart Contracts

      • Buy Link or Shortcode: {j2store}92|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Organizations today continue to use traditional and often archaic methods of manual processing with physical paper documents.
      • These error-prone methods introduce cumbersome administrative work, causing businesses to struggle with payments and contract disputes.
      • The increasing scale and complexity of business processes has led to many third parties, middlemen, and paper hand-offs.
      • Companies remain bogged down by expensive and inefficient processes while losing sight of their ultimate stakeholder: the customer. A failure to focus on the customer is a failure to do business.

      Our Advice

      Critical Insight

      • Simplify, automate, secure. Smart contracts enable businesses to simplify, automate, and secure traditionally complex transactions.
      • Focus on the customer. Smart contracts provide a frictionless experience for customers by removing unnecessary middlemen and increasing the speed of transactions.
      • New business models. Smart contracts enable the redesign of your organization and business-to-business relationships and transactions.

      Impact and Result

      • Simplify and optimize your business processes by using Info-Tech’s methodology to select processes with inefficient transactions, unnecessary middlemen, and excessive manual paperwork.
      • Use Info-Tech’s template to generate a smart contract use case customized for your business.
      • Customize Info-Tech’s stakeholder presentation template to articulate the goals and benefits of the project and get buy-in from business executives.

      Develop a Use Case for Smart Contracts Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should leverage smart contracts in your business, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Develop a Use Case for Smart Contracts – Phases 1-2

      1. Understand smart contracts

      Understand the fundamental concepts of smart contract technology and get buy-in from stakeholders.

      • Develop a Use Case for Smart Contracts – Phase 1: Understand Smart Contracts
      • Smart Contracts Executive Buy-in Presentation Template

      2. Develop a smart contract use case

      Select a business process, create a smart contract logic diagram, and complete a smart contract use-case deliverable.

      • Develop a Use Case for Smart Contracts – Phase 2: Develop the Smart Contract Use Case
      • Smart Contracts Use-Case Template

      [infographic]

      Workshop: Develop a Use Case for Smart Contracts

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Smart Contracts

      The Purpose

      Review blockchain basics.

      Understand the fundamental concepts of smart contracts.

      Develop smart contract use-case executive buy-in presentation.

      Key Benefits Achieved

      Understanding of blockchain basics.

      Understanding the fundamentals of smart contracts.

      Development of an executive buy-in presentation.

      Activities

      1.1 Review blockchain basics.

      1.2 Understand smart contract fundamentals.

      1.3 Identify business challenges and smart contract benefits.

      1.4 Create executive buy-in presentation.

      Outputs

      Executive buy-in presentation

      2 Smart Contract Logic Diagram

      The Purpose

      Brainstorm and select a business process to develop a smart contract use case around.

      Generate a smart contract logic diagram.

      Key Benefits Achieved

      Selected a business process.

      Developed a smart contract logic diagram for the selected business process.

      Activities

      2.1 Brainstorm candidate business processes.

      2.2 Select a business process.

      2.3 Identify phases, actors, events, and transactions.

      2.4 Create the smart contract logic diagram.

      Outputs

      Smart contract logic diagram

      3 Smart Contract Use Case

      The Purpose

      Develop smart contract use-case diagrams for each business process phase.

      Complete a smart contract use-case deliverable.

      Key Benefits Achieved

      Smart contract use-case diagrams.

      Smart contract use-case deliverable.

      Activities

      3.1 Build smart contract use-case diagrams for each phase of the business process.

      3.2 Create a smart contract use-case summary diagram.

      3.3 Complete smart contract use-case deliverable.

      Outputs

      Smart contract use case

      4 Next Steps and Action Plan

      The Purpose

      Review workshop week and lessons learned.

      Develop an action plan to follow through with next steps for the project.

      Key Benefits Achieved

      Reviewed workshop week with common understanding of lessons learned.

      Completed an action plan for the project.

      Activities

      4.1 Review workshop deliverables.

      4.2 Create action plan.

      Outputs

      Smart contract action plan

       

      Identify the Components of Your Cloud Security Architecture

      • Buy Link or Shortcode: {j2store}354|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Leveraging the cloud introduces IT professionals to a new world that they are tasked with securing. Consumers do not know what security services they need and when to implement them.
      • With many cloud vendors proposing to share the security responsibility, it can be a challenge for organizations to develop a clear understanding of how they can best secure their data off premises.

      Our Advice

      Critical Insight

      • Your cloud security architecture needs to be strategic, realistic, and based on risk. The NIST approach to cloud security is to include everything security into your cloud architecture to be deemed secure. However, you can still have a robust and secure cloud architecture by using a risk-based approach to identify the necessary controls and mitigating services for your environment.
      • The cloud is not the right choice for everyone. You’re not as unique as you think. Start with a reference model that is based on your risks and business attributes and optimize it from there.
      • Your responsibility doesn’t end at the vendor. Even if you outsource your security services to your vendors, you will still have security responsibilities to address.
      • Don’t boil the ocean; do what is realistic for your enterprise. Your cloud security architecture should be based on securing your most critical assets. Use our reference model to determine a launch point.
      • A successful strategy is holistic. Controlling for cloud risks comes from knowing what the risks are. Consider the full spectrum of security, including both processes and technologies.

      Impact and Result

      • The business is adopting a cloud environment and it must be secured, which includes:
        • Ensuring business data cannot be leaked or stolen.
        • Maintaining the privacy of data and other information.
        • Securing the network connection points.
        • Knowing the risks associated with the cloud and mitigating those risks with the appropriate services.
      • This blueprint and associated tools are scalable for all types of organizations within various industry sectors. It allows them to know what types of risk they are facing and what security services are strongly recommended to mitigate those risks.

      Identify the Components of Your Cloud Security Architecture Research & Tools

      Start Here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create a cloud security architecture with security at the forefront, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Cloud security alignment analysis

      Explore how the cloud changes and whether your enterprise is ready for the shift to the cloud.

      • Identify the Components of Your Cloud Security Architecture – Phase 1: Cloud Security Alignment Analysis
      • Cloud Security Architecture Workbook

      2. Business-critical workload analysis

      Analyze the workloads that will migrated to the cloud. Consider the various domains of security in the cloud, considering the cloud’s unique risks and challenges as they pertain to your workloads.

      • Identify the Components of Your Cloud Security Architecture – Phase 2: Business-Critical Workload Analysis

      3. Cloud security architecture mapping

      Map your risks to services in a reference model from which to build a robust launch point for your architecture.

      • Identify the Components of Your Cloud Security Architecture – Phase 3: Cloud Security Architecture Mapping
      • Cloud Security Architecture Archive Document
      • Cloud Security Architecture Reference Model (Visio)
      • Cloud Security Architecture Reference Model (PDF)

      4. Cloud security strategy planning

      Map your risks to services in a reference architecture to build a robust roadmap from.

      • Identify the Components of Your Cloud Security Architecture – Phase 4: Cloud Security Strategy Planning
      • Cloud Security Architecture Communication Deck

      Infographic

      Workshop: Identify the Components of Your Cloud Security Architecture

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Cloud Security Alignment Analysis

      The Purpose

      Understand your suitability and associated risks with your workloads as they are deployed into the cloud.

      Key Benefits Achieved

      An understanding of the organization’s readiness and optimal service level for cloud security.

      Activities

      1.1 Workload Deployment Plan

      1.2 Cloud Suitability Questionnaire

      1.3 Cloud Risk Assessment

      1.4 Cloud Suitability Analysis

      Outputs

      Workload deployment plan

      Determined the suitability of the cloud for your workloads

      Risk assessment of the associated workloads

      Overview of cloud suitability

      2 Business-Critical Workload Analysis

      The Purpose

      Explore your business-critical workloads and the associated controls and mitigating services to secure them.

      Key Benefits Achieved

      Address NIST 800-53 security controls and the appropriate security services that can mitigate the risks appropriately.

      Activities

      2.1 “A” Environment Analysis

      2.2 “B” Environment Analysis

      2.3 “C” Environment Analysis

      2.4 Prioritized Security Controls

      2.5 Effort and Risk Dashboard Overview

      Outputs

      NIST 800-53 control mappings and relevancy

      NIST 800-53 control mappings and relevancy

      NIST 800-53 control mappings and relevancy

      Prioritized security controls based on risk and environmental makeup

      Mitigating security services for controls

      Effort and Risk Dashboard

      3 Cloud Security Architecture Mapping

      The Purpose

      Identify security services to mitigate challenges posed by the cloud in various areas of security.

      Key Benefits Achieved

      Comprehensive list of security services, and their applicability to your network environment. Documentation of your “current” state of cloud security.

      Activities

      3.1 Cloud Security Control Mapping

      3.2 Cloud Security Architecture Reference Model Mapping

      Outputs

      1. Cloud Security Architecture Archive Document to codify and document each of the associated controls and their risk levels to security services

      2. Mapping of the codified controls onto Info-Tech’s Cloud Security Architecture Reference Model for clear security prioritization

      4 Cloud Security Strategy Planning

      The Purpose

      Prepare a communication deck for executive stakeholders to socialize them to the state of your cloud security initiatives and where you still have to go.

      Key Benefits Achieved

      A roadmap for improving security in the cloud.

      Activities

      4.1 Cloud Security Strategy Considerations

      4.2 Cloud Security Architecture Communication Deck

      Outputs

      Consider the additional security considerations of the cloud for preparation in the communication deck.

      Codify all your results into an easily communicable communication deck with a clear pathway for progression and implementation of security services to mitigate cloud risks.

      Initiate Your Service Management Program

      • Buy Link or Shortcode: {j2store}398|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • IT organizations continue attempting to implement service management, often based on ITIL, with limited success and without visible value.
      • More than half of service management implementations have failed beyond simply implementing the service desk and the incident, change, and request management processes.
      • Organizational structure, goals, and cultural factors are not considered during service management implementation and improvement.
      • The business lacks engagement and understanding of service management.

      Our Advice

      Critical Insight

      • Service management is an organizational approach. Focus on producing successful and valuable services and service outcomes for the customers.
      • All areas of the organization are accountable for governing and executing service management. Ensure that you create a service management strategy that improves business outcomes and provides the value and quality expected.

      Impact and Result

      • Identified structure for how your service management model should be run and governed.
      • Identified forces that impact your ability to oversee and drive service management success.
      • Mitigation approach to restraining forces.

      Initiate Your Service Management Program Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand why service management implementations often fail and why you should establish governance for service management.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify the level of oversight you need

      Use Info-Tech’s methodology to establish an effective service management program with proper oversight.

      • Service Management Program Initiation Plan
      [infographic]

      The challenge of corporate security management

      • Buy Link or Shortcode: {j2store}41|cart{/j2store}
      • Related Products: {j2store}41|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk

      Corporate security management is a vital aspect in every modern business, regardless of business area or size. At Tymans Group we offer expert security management consulting to help your business set up proper protocols and security programs. More elaborate information about our security management consulting services and solutions can be found below.

      Corporate security management components

      You may be experiencing one or more of the following:

      • The risk goals should support business goals. Your business cannot operate without security, and security is there to conduct business safely. 
      • Security governance supports security strategy and security management. These three components form a protective arch around your business. 
      • Governance and management are like the legislative branch and the executive branch. Governance tells people what to do, and management's job is to verify that they do it.

      Our advice with regards to corporate security management

      Insight

      To have a successful information security strategy, take these three factors into account:

      • Holistic: your view must include people, processes, and technology.
      • Risk awareness: Base your strategy on the actual risk profile of your company and then add the appropriate best practices.
      • Business-aligned: When your strategic security plan demonstrates alignment with the business goals and supports it, embedding will be much more straightforward.

      Impact and results of our corporate security management approach

      • The approach of our security management consulting company helps to provide a starting point for realistic governance and realistic corporate security management.
      • We help you by implementing security governance and managing it, taking into account your company's priorities, and keeping costs to a minimum.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within the corporate security management domain have access to:

      Get up to speed

      Read up on why you should build your customized corporate information security governance and management system. Review our methodology and understand the four ways we can support you.

      Align your security objectives with your business goals

      Determine the company's risk tolerance.

      • Implement a Security Governance and Management Program – Phase 1: Align Business Goals With Security Objectives (ppt)
      • Information Security Governance and Management Business Case (ppt)
      • Information Security Steering Committee Charter (doc)
      • Information Security Steering Committee RACI Chart (doc)
      • Security Risk Register Tool (xls)

      Build a practical governance framework for your company

      Our best-of-breed security framework makes you perform a gap analysis between where you are and where you want to be (your target state). Once you know that, you can define your goals and duties.

      • Implement a Security Governance and Management Program – Phase 2: Develop an Effective Governance Framework (ppt)
      • Information Security Charter (doc)
      • Security Governance Organizational Structure Template (doc)
      • Security Policy Hierarchy Diagram (ppt)
      • Security Governance Model Facilitation Questions (ppt)
      • Information Security Policy Charter Template (doc)
      • Information Security Governance Model Tool (Visio)
      • Pdf icon 20x20
      • Information Security Governance Model Tool (PDF)

      Now that you have built it, manage your governance framework.

      There are several essential management activities that we as a security management consulting company suggest you employ.

      • Implement a Security Governance and Management Program – Phase 3: Manage Your Governance Framework (ppt)
      • Security Metrics Assessment Tool (xls)
      • Information Security Service Catalog (xls)
      • Policy Exception Tracker (xls)
      • Information Security Policy Exception Request Form (doc)
      • Security Policy Exception Approval Workflow (Visio)
      • Security Policy Exception Approval Workflow (PDF)
      • Business Goal Metrics Tracking Tool (xls)

      Book an online appointment for more advice

      We are happy to tell you more about our corporate security management solutions and help you set up fitting security objectives. As a security management consulting firm we offer solutions and advice, based on our own extensive experience, which are practical and people-orientated. Discover our services, which include data security management and incident management and book an online appointment with CEO Gert Taeymans to discuss any issues you may be facing regarding risk management or IT governance.

      cybersecurity

      Integrate IT Risk Into Enterprise Risk

      • Buy Link or Shortcode: {j2store}195|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,599 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
      • IT is expected to own risks over which they have no authority or oversight.
      • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

      Our Advice

      Critical Insight

      • Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize the organization’s ability to respond to risk.

      Impact and Result

      • Understand gaps in the organization’s current approach to risk management practices.
      • Establish a standardized approach for how IT risks impact the enterprise as a whole.
      • Drive a risk-aware organization toward innovation and consider alternative options for how to move forward.
      • Integrate IT risks into the foundational risk practice.

      Integrate IT Risk Into Enterprise Risk Research & Tools

      Integrated Risk Management Capstone – A framework for how IT risks can be integrated into your organization’s enterprise risk management program to enable strategic risk-informed decisions.

      This is a capstone blueprint highlighting the benefits of an integrated risk management program that uses risk information and data to inform strategic decision making. Throughout this research you will gain insight into the five core elements of integrating risk through assessing, governing, defining the program, defining the process, and implementing.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Integrate IT Risk Into Enterprise Risk Capstone
      • Integrated Risk Maturity Assessment
      • Risk Register Tool

      Infographic

      Further reading

      Integrate IT Risk Into Enterprise Risk

      Don’t fear IT risks, integrate them.

      EXECUTIVE BRIEF

      Analyst Perspective

      Having siloed risks is risky business for any enterprise.

      Photo of Valence Howden, Principal Research Director, CIO Practice.
      Valence Howden
      Principal Research Director, CIO Practice
      Photo of Petar Hristov Research Director, Security, Privacy, Risk & Compliance.
      Petar Hristov
      Research Director, Security, Privacy, Risk & Compliance
      Photo of Ian Mulholland Research Director, Security, Risk & Compliance.
      Ian Mulholland
      Research Director, Security, Risk & Compliance
      Photo of Brittany Lutes, Senior Research Analyst, CIO Practice.
      Brittany Lutes
      Senior Research Analyst, CIO Practice
      Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice
      Ibrahim Abdel-Kader
      Research Analyst, CIO Practice

      Every organization has a threshold for risk that should not be exceeded, whether that threshold is defined or not.

      In the age of digital, information and technology will undoubtedly continue to expand beyond the confines of the IT department. As such, different areas of the organization cannot address these risks in silos. A siloed approach will produce different ways of identifying, assessing, responding to, and reporting on risk events. Integrated risk management is about embedding IT uncertainty to inform good decision making across the organization.

      When risk is integrated into the organization's enterprise risk management program, it enables a single view of all risks and the potential impact of each risk event. More importantly, it provides a consistent view of the risk event in relation to uncertainty that might have once been seemingly unrelated to IT.

      And all this can be achieved while remaining within the enterprise’s clearly defined risk appetite.

      Executive Summary

      Your Challenge

      Most organizations fail to integrate IT risks into enterprise risks:

      • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
      • IT is expected to own risks over which they have no authority or oversight.
      • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

      Common Obstacles

      IT leaders have to overcome these obstacles when it comes to integrating risk:

      • Making business leaders aware of, involved in, and able to respond to all enterprise risks.
      • A lack of data or information being used to support a holistic risk management process.
      • A low level of enterprise risk maturity.
      • A lack of risk management capabilities.

      Info-Tech’s Approach

      By leveraging the Info-Tech Integrated Risk approach, your business can better address and embed risk by:

      • Understanding gaps in the organization’s current approach to risk management practices.
      • Establishing a standardized approach for how IT risks impact the enterprise as a whole.
      • Driving a risk-aware organization toward innovation and considering alternative options for how to move forward.
      • Helping integrate IT risks into the foundational risk practice.

      Info-Tech Insight

      Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize its ability to respond to risk.

      What is integrated risk management?

      • Integrated risk management is the process of ensuring all forms of risk information, including information and technology, are considered and included in the enterprise’s risk management strategy.
      • It removes the siloed approach to classifying risks related to specific departments or areas of the organization, recognizing that each of those risks is a threat to the overarching enterprise.
      • Aggregating the different threats or uncertainty that might exist within an organization allows for informed decisions to be made that align to strategic goals and continue to drive value back to the business.
      • By holistically considering the different risks, the organization can make informed decisions on the best course of action that will reduce any negative impacts associated with the uncertainty and increase the overall value.

      Enterprise Risk Management (ERM)

      • IT
      • Security
      • Digital
      • Vendor/Third Party
      • Other

      Enterprise risk management is the practice of identifying and addressing risks to your organization and using risk information to drive better decisions and better opportunities.

      IT risk is enterprise risk

      Multiple types of risk, 'Finance', 'IT', 'People', and 'Digital', funneling into 'ENTERPRISE RISKS'. IT risks have a direct and often aggregated impact on enterprise risks and opportunities in the same way other business risks can. This relationship must be understood and addressed through integrated risk management to ensure a consistent approach to risk.

      Your challenge

      Embedding IT risks into the enterprise risk management program is challenging because:

      • Most organizations classify risks based on the departments or areas of the business where the uncertainty is likely to happen.
      • Unnecessary expectations are placed on the IT department to own risks over which they have no authority or oversight.
      • Risks are often only identified when conducting due diligence for a project or ensuring compliance with regulations and standards.

      Risk-mature organizations have a unique benefit in that they often have established an overarching governance framework and embedded risk awareness into the culture.

      35% — Only 35% of organizations had embraced ERM in 2020. (Source: AICPA and NC State Poole College of Management)

      12% — Only 12% of organizations are leveraging risk as a tool to their strategic advantage. (Source: AICPA and NC State Poole College of Management)

      Common obstacles

      These barriers make integrating IT risks difficult to address for many organizations:

      • IT risks are not seen as enterprise risks.
      • The organization’s culture toward risk is not defined.
      • The organization’s appetite and threshold for risk are not defined.
      • Each area of the organization has a different method of identifying, assessing, and responding to risk events.
      • Access to reliable and informative data to support risk management is difficult to obtain.
      • Leadership does not see the business value of integrating risk into a single management program.
      • The organization’s attitudes and behaviors toward risk contradict the desired and defined risk culture.
      • Skills, training, and resources to support risk management are lacking, let alone those to support integrated risk management.

      Integrating risks has its challenges

      62% — Accessing and disseminating information is the main challenge for 62% of organizations maturing their organizational risk management. (Source: OECD)

      20-28% — Organizations with access to machine learning and analytics to address future risk events have 20 to 28% more satisfaction. (Source: Accenture)

      Integrate Risk and Use It to Your Advantage

      Accelerate and optimize your organization by leveraging meaningful risk data to make intelligent enterprise risk decisions.

      Risk management is more than checking an audit box or demonstrating project due diligence.

      Risk Drivers
      • Audit & compliance
      • Preserve value & avoid loss
      • Previous risk impact driver
      • Major transformation
      • Strategic opportunities
      Arrow pointing right. Only 7% of organizations are in a “leading” or “aspirational” level of risk maturity. (OECD, 2021) 63% of organizations struggle when it comes to defining their appetite toward strategy related risks. (“Global Risk Management Survey,” Deloitte, 2021) Late adopters of risk management were 70% more likely to use instinct over data or facts to inform an efficient process. (Clear Risk, 2020) 55% of organizations have little to no training on ERM to properly implement such practices. (AICPA, NC State Poole College of Management, 2021)
      1. Assess Enterprise Risk Maturity 3. Build a Risk Management Program Plan 4. Establish Risk Management Processes 5. Implement a Risk Management Program
      2. Determine Authority with Governance
      Unfortunately, less than 50% of those in risk focused roles are also in a governance role where they have the authority to provide risk oversight. (Governance Institute of Australia, 2020)
      IT can improve the maturity of the organization’s risk governance and help identify risk owners who have authority and accountability.

      Governance and related decision making is optimized with integrated and aligned risk data.

      List of 'Integrated Risk Maturity Categories': '1. Context & Strategic Direction', '2. Risk Culture and Authority', '3. Risk Management Process', and '4. Risk Program Optimization'. The five types of a risk in Enterprise Risk Management.

      ERM incorporates the different types of risk, including IT, security, digital, vendor, and other risk types.

      The program plan is meant to consider all the major risk types in a unified approach.

      The 'Risk Process' cycle starting with '1. Identify', '2. Assess', '3. Respond', '4. Monitor', '5. Report', and back to the beginning. Implementation of an integrated risk management program requires ongoing access to risk data by those with decision making authority who can take action.

      Integrated Risk Mapping — Downside Risk Focus

      A diagram titled 'Risk and Controls' beginning with 'Possible Sources' and a list of sources, 'Control Activities' to prevent, the 'RISK EVENT', 'Recovery Activities' to recover, and 'Possible Repercussions' with a list of ramifications.

      Integrated Risk Mapping — Downside and Upside Risk

      Third-Party Risk Example

      Example of a third-party risk mapped onto the diagram on the previous slide, but with potential upsides mapped out as well. The central risk event is 'Vendor exposes private customer data'. Possible Sources of the downside are 'External Attack' with likelihood prevention method 'Define security standard requirements for vendor assessment' and 'Exfiltration of data through fourth-party staff' with likelihood prevention method 'Ensure data is properly classified'. Possible Sources of the upside are 'Application rationalization' with likelihood optimization method 'Reduce number of applications in environment' and 'Review vendor assessment practices' with likelihood optimization method 'Improve vendor onboarding'. Possible Repercussions on the downside are 'Organization unable to operate in jurisdiction' with impact minimization method 'Engage in-house risk mitigation responses' and 'Fines levied against organization' with impact minimization method 'Report incident to any regulators'. Possible Repercussions on the upside are 'Easier vendor integration and management' with impact utilization method 'Improved vendor onboarding practices' and 'Able to bid on contracts with these requirements' with impact utilization method 'Vendors must provide attestations (e.g. SOC or CMMC)'.

      Insight Summary

      Overarching insight

      Stop fearing risk – integrate it. Integration leads to opportunities for organizations to embrace innovation and new digital technologies as well as reducing operational costs and simplifying reporting.

      Govern risk strategically

      Governance of risk management for information- and technology-related events is often misplaced. Just because it's classified as an IT risk does not mean it shouldn’t be owned by the board or business executive.

      Assess risk maturity

      Integrating risk requires a baseline of risk maturity at the enterprise level. IT can push integrating risks, but only if the enterprise is willing to adopt the attitudes and behaviors that will drive the integrated risk approach.

      Manage risk

      It is not a strategic decision to have different areas of the organization manage the risks perceived to be in their department. It’s the easy choice, but not the strategic one.

      Implement risk management

      Different areas of an enterprise apply risk management processes differently. Determining a single method for identification, assessment, response, and monitoring can ensure successful implementation of enterprise risk management.

      Tactical insight

      Good risk management will consider both the positives and negatives associated with a risk management program by recognizing both the upside and downside of risk event impact and likelihood.

      Integrated risk benefits

      IT Benefits

      • IT executives have a responsibility but not accountability when it comes to risk. Ensure the right business stakeholders have awareness and ability to make informed risk decisions.
      • Controls and responses to risks that are within the “IT” realm will be funded and provided with sufficient support from the business.
      • The business respects and values the role of IT in supporting the enterprise risk program, elevating its role into business partner.

      Business Benefits

      • Business executives and boards can make informed responses to the various forms of risk, including those often categorized as “IT risks.”
      • The compounding severity of risks can be formally assessed and ideally quantified to provide insight into how risks’ ramifications can change based on scenarios.
      • Risk-informed decisions can be used to optimize the business and drive it toward adopting innovation as a response to risk events.
      • Get your organization insured against cybersecurity threats at the lowest premiums possible.

      Measure the value of integrating risk

      • Reduce Operating Costs

        • Organizations can reduce their risk operating costs by 20 to 30% by adopting enterprise-wide digital risk initiatives (McKinsey & Company).
      • Increase Cybersecurity Threat Preparedness

        • Increase the organization’s preparedness for cybersecurity threats. 79% of organizations that were impacted by email threats in 2020 were not prepared for the hit (Diligent)
      • Increase Risk Management’s Impact to Drive Strategic Value

        • Currently, only 3% of organizations are extensively using risk management to drive their unique competitive advantage, compared to 35% of companies who do not use it at all (AICPA & NC State Poole College of Management).
      • Reduce Lost Productivity for the Enterprise

        • Among small businesses, 76% are still not considering purchasing cyberinsurance in 2021, despite the fact that ransomware attacks alone cost Canadian businesses $5.1 billion in productivity in 2020 (Insurance Bureau of Canada, 2021).

      “31% of CIO’s expected their role to expand and include risk management responsibilities.” (IDG “2021 State of the CIO,” 2021)

      Make integrated risk management sustainable

      58%

      Focus not just on the preventive risk management but also the value-creating opportunities. With 58% of organizations concerned about disruptive technology, it’s an opportunity to take the concern and transform it into innovation. (Accenture)

      70%

      Invest in tools that have data and analytics features. Currently, “gut feelings” or “experience” inform the risk management decisions for 70% of late adopters. (Clear Risk)

      54%

      Align to the strategic vision of the board and CEO, given that these two roles account for 54% of the accountability associated with extended enterprise risk management. (Extended Enterprise Risk Management Survey, 2020,” Deloitte)

      63%

      Include IT leaders in the risk committee to help informed decision making. Currently 63% of chief technology officers are included in the C‑suite risk committee. (AICPA & NC State Poole College of Management)

      Successful adoption of integrated risk management is often associated with these key elements.

      Assessment

      Assess your organization’s method of addressing risk management to determine if integrated risk is possible

      Assessing the organization’s risk maturity

      Mature or not, integrated risk management should be a consideration for all organizations

      The first step to integrating risk management within the enterprise is to understand the organization’s readiness to adopt practices that will enable it to successfully integrate information.

      In 2021, we saw enterprise risk management assessments become one of the most common trends, particularly as a method by which the organization can consolidate the potential impacts of uncertainties or threats (Lawton, 2021). A major driver for this initiative was the recognition that information and technology not only have enterprise-wide impacts on the organization’s risk management but that IT has a critical role in supporting processes that enable effective access to data/information.

      A maturity assessment has several benefits for an organization: It ensures there is alignment throughout the organization on why integrated risk is the right approach to take, it recognizes the organization’s current risk maturity, and it supports the organization in defining where it would like to go.

      Pie chart titled 'Organizational Risk Management Maturity Assessment Results' showing just under half 'Progressing', a third 'Established', a seventh 'Emerging', and a very small portion 'Leading or Aspirational'.

      Integrated Risk Maturity Categories

      Semi-circle with colored points indicating four categories.

      1

      Context & Strategic Direction Understand the organization’s main objectives and how risk can support or enhance those objectives.

      2

      Risk Culture and Authority Examine if risk-based decisions are being made by those with the right level of authority and if the organization’s risk appetite is embedded in the culture.

      3

      Risk Management Process Determine if the current process to identify, assess, respond to, monitor, and report on risks is benefitting the organization.

      4

      Risk Program Optimization Consider opportunities where risk-related data is being gathered, reported, and used to make informed decisions across the enterprise.

      Maturity should inform your approach to risk management

      The outcome of the risk maturity assessment should inform how risk management is approached within the organization.

      A row of waves starting light and small and becoming taller and darker in steps. The levels are 'Non-existent', 'Basic', 'Partially Integrated', 'Mostly Integrated', 'Fully Integrated', and 'Optimized'.

      For organizations with a low maturity, remaining superficial with risk will offer more benefits and align to the enterprise’s risk tolerance and appetite. This might mean no integrated risk is taking place.

      However, organizations that have higher risk maturity should begin to integrate risk information. These organizations can identify the nuances that would affect the severity and impact of risk events.

      Integrated Risk Maturity Assessment

      The purpose of the Integrated Risk Maturity Assessment is to assess the organization's current maturity and readiness for integrated risk management (IRM).

      Frequently and continually assessing your organization’s maturity toward integrated risk ensures the right risk management program can be adopted by your organization.

      Integrated Risk Maturity Assessment

      A simple tool to understand if your organization is ready to embrace integrated risk management by measuring maturity across four key categories: Context & Strategic Direction, Risk Culture & Authority, Risk Management Process, and Risk Program Optimization

      Sample of the Integrated Risk Maturity Assessment deliverable.

      Use the results from this integrated risk maturity assessment to determine the type of risk management program that can and should be adopted by your organization.

      Some organizations will need to remain siloed and focused on IT risk management only, while others will be able to integrate risk-related information to start enabling automatic controls that respond to this data.

      Security Priorities 2023

      • Buy Link or Shortcode: {j2store}254|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $909 Average $ Saved
      • member rating average days saved: 1 Average Days Saved
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Most people still want a hybrid work model but there is a shortage in security workforce to maintain secure remote work, which impacts confidence in the security practice.
      • Pressure of operational excellence drives organizational modernization with the consequence of higher risks of security attacks that impact not only cyber but also physical systems.
      • The number of regulations with stricter requirements and reporting is increasing, along with high sanctions for violations.
      • Accurate assessment of readiness and benefits to adopt next-gen cybersecurity technologies can be difficult. Additionally, regulation often faces challenges to keep up with next-gen cybersecurity technologies implications and risks of adoption, which may not always be explicit.
      • Software is usually produced as part of a supply chain instead in a silo. Thus, a vulnerability in any part of the supply chain can become a threat surface.

      Our Advice

      Critical Insight

      • Secure remote work still needs to be maintained to facilitate the hybrid work model post pandemic.
      • Despite all the cybersecurity risks, organizations continue modernization plans due to the long-term overall benefits. Hence, we need to secure organization modernization.
      • Organizations should use regulatory changes to improve security practices, instead of treating them as a compliance burden.
      • Next-gen cybersecurity technologies alone are not the silver bullet. A combination of technologies with skilled talent, useful data, and best practices will give a competitive advantage.

      Impact and Result

      • Use this report to help decide your 2023 security priorities by:
        • Collecting and analyzing your own related data, such as your organization 2022 incident reports. Use Info-Tech’s Security Priorities 2023 material for guidance.
        • Identifying your needs and analyzing your capabilities. Use Info-Tech's template to explain the priorities you need to your stakeholders.
        • Determining the next steps. Refer to Info-Tech's recommendations and related research.

      Security Priorities 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Security Priorities 2023 Report – A report to help decide your 2023 security priorities.

      Each organization is different, so a generic list of security priorities will not be applicable to every organization. Thus, you need to:

    • Collect and analyze your own related data such as your organization 2022 incident reports. Use Info-Tech’s Security Priorities 2023 material for guidance.
    • Identify your needs and analyze your capabilities. Use Info-Tech's template to explain the priorities you need to your stakeholders.
    • Refer to Info-Tech's recommendations and related research for guidance on the next steps.
      • Security Priorities 2023 Report

      Infographic

      Further reading

      Security Priorities 2023

      How we live post pandemic

      Each organization is different, so a generic list of priorities will not be applicable to every organization.

      During 2022, ransomware campaigns declined from quarter to quarter due to the collapse of experienced groups. Several smaller groups are developing to recapture the lost ransomware market. However, ransomware is still the most worrying cyber threat.

      Also in 2022, people returned to normal activities such as traveling and attending sports or music events but not yet to the office. The reasons behind this trend can be many fold, such as employees perceive that work from home (WFH) has positive productivity effects and time flexibility for employees, especially for those with families with younger children. On the other side of the spectrum, some employers perceive that WFH has negative productivity effects and thus are urging employees to return to the office. However, employers also understand the competition to retain skilled workers is harder. Thus, the trend is to have hybrid work where eligible employees can WFH for a certain portion of their work week.

      Besides ransomware and the hybrid work model, in 2022, we saw an evolving threat landscape, regulatory changes, and the potential for a recession by the end of 2023, which can impact how we prioritize cybersecurity this year. Furthermore, organizations are still facing the ongoing issues of insufficient cybersecurity resources and organization modernization.

      This report will explore important security trends, the security priorities that stem from these trends, and how to customize these priorities for your organization.

      In Q2 2022, the median ransom payment was $36,360 (-51% from Q1 2022), a continuation of a downward trend since Q4 2021 when the ransom payment median was $117,116.
      Source: Coveware, 2022

      From January until October 2022, hybrid work grew in almost all industries in Canada especially finance, insurance, real estate, rental and leasing (+14.7%), public administration and professional services (+11.8%), and scientific and technical services (+10.8%).
      Source: Statistics Canada, Labour Force Survey, October 2022; N=3,701

      Hybrid work changes processes and infrastructure

      Investment on remote work due to changes in processes and infrastructure

      As part of our research process for the 2023 Security Priorities Report, we used the results from our State of Hybrid Work in IT Survey, which collected responses between July 10 and July 29, 2022 (total N=745, with n=518 completed surveys). This survey details what changes in processes and IT infrastructure are likely due to hybrid work.

      Process changes to support hybrid work

      A bar graph is depicted with the following dataset: None of the above - 12%; Change management - 29%; Asset management - 34%; Service request support - 41%; Incident management - 42%

      Survey respondents (n=518) were asked what processes had the highest degree of change in response to supporting hybrid work. Incident management is the #1 result and service request support is #2. This is unsurprising considering that remote work changed how people communicate, how they access company assets, and how they connect to the company network and infrastructure.

      Infrastructure changes to support hybrid work

      A bar graph is depicted with the following dataset: Changed queue management and ticketing system(s) - 11%; Changed incident and service request processes - 23%; Addition of chatbots as part of the Service Desk intake process - 29%; Reduced the need for recovery office spaces and alternative work mitigations - 40%; Structure & day-to-day operation of Service Desk - 41%; Updated network architecture - 44%

      For 2023, we believe that hybrid work will remain. The first driver is that employees still prefer to work remotely for certain days of the week. The second driver is the investment from employers on enabling WFH during the pandemic, such as updated network architecture (44%) and the infrastructure and day-to-day operations (41%) as shown on our survey.

      Top cybersecurity concerns and organizational preparedness for them

      Concerns may correspond to readiness.

      In the Info-Tech Research Group 2023 Trends and Priorities Survey of IT professionals, we asked about cybersecurity concerns and the perception about readiness to meet current and future government legislation regarding cybersecurity requirements.

      Cybersecurity issues

      A bar graph is depicted with the following dataset: Cyber risks are not on the radar of the executive leaders or board of directors - 3.19; Organization is not prepared to respond to a cyber attack - 3.08; Supply chain risks related to cyber threats - 3.18; Talent shortages leading to capacity constraints in cyber security - 3.51; New government or industry-imposed regulations - 3.15

      Survey respondents were asked how concerned they are about certain cybersecurity issues from 1 (not concerned at all) to 5 (very concerned). The #1 concern was talent shortages. Other issues with similar concerns included cyber risks not on leadership's radar, supply chain risks, and new regulations (n=507).

      Cybersecurity legislation readiness

      A bar graph is depicted with the following dataset: 1 (Not confident at all) - 2.4%; 2 - 11.2%; 3 - 39.7%; 4 - 33.3%; 5 (Very confident) - 13.4%

      When asked about how confident organizations are about being prepared to meet current and future government legislation regarding cybersecurity requirements, from 1 (not confident at all) to 5 (very confident), the #1 response was 3 (n=499).

      Unsurprisingly, the ever-changing government legislation environment in a world emerging from a pandemic and ongoing wars may not give us the highest confidence.

      We know the concerns and readiness…

      But what is the overall security maturity?

      As part of our research process for the 2023 Security Priorities Report, we reviewed results of completed Info-Tech Research Group Security Governance and Management Benchmark diagnostics (N=912). This report details what we see in our clients' security governance maturity. Setting aside the perception on readiness – what are their actual security maturity levels?

      A bar graph is depicted with the following dataset: Security Culture - 47%; Policy and Process Governance - 47%; Event and Incident Management - 58%; Vulnerability - 57%; Auditing - 52%; Compliance Management - 58%; Risk Analysis - 52%

      Overall, assessed organizations are still scoring low (47%) on Security Culture and Policy and Process Governance. This justifies why most security incidents are still due to gaps in foundational security and security awareness, not lack of advanced controls such as event and incident management (58%).

      And how will the potential recession impact security?

      Organizations are preparing for recession, but opportunities for growth during recession should be well planned too.

      As part of our research process for the 2023 Security Priorities Report, we reviewed the results of the Info-Tech Research Group 2023 Trends and Priorities Survey of IT professionals, which collected responses between August 9 and September 9, 2022 (total N=813 with n=521 completed surveys).

      Expected organizational spending on cybersecurity compared to the previous fiscal year

      A bar graph is depicted with the following dataset: A decrease of more than 10% - 2.2%; A decrease of between 1-10% - 2.6%; About the same - 41.4%; An increase of between 1-10% - 39.6%; An increase of more than 10% - 14.3%

      Keeping the same spending is the #1 result and #2 is increasing spending up to 10%. This is a surprising finding considering the survey was conducted after the middle of 2022 and a recession has been predicted since early 2022 (n=489).

      An infographic titled Cloudy with a Chance of Recession

      Source: Statista, 2022, CC BY-ND

      US recession forecast

      Contingency planning for recessions normally includes tight budgeting; however, it can also include opportunities for growth such as hiring talent who have been laid off by competitors and are difficult to acquire in normal conditions. This can support our previous findings on increasing cybersecurity spending.

      Five Security Priorities for 2023

      This image describes the Five Security Priorities for 2023.

      Maintain Secure Hybrid Work

      PRIORITY 01

      • HOW TO STRATEGICALLY ACQUIRE, RETAIN, OR UPSKILL TALENT TO MAINTAIN SECURE SYSTEMS.

      Executive summary

      Background

      If anything can be learned from COVID-19 pandemic, it is that humans are resilient. We swiftly changed to remote workplaces and adjusted people, processes, and technologies accordingly. We had some hiccups along the way, but overall, we demonstrated that our ability to adjust is amazing.

      The pandemic changed how people work and how and where they choose to work, and most people still want a hybrid work model. However, the number of days for hybrid work itself varies. For example, from our survey in July 2022 (n=516), 55.8% of employees have the option of 2-3 days per week to work offsite, 21.0% for 1 day per week, and 17.8% for 4 days per week.

      Furthermore, the investment (e.g. on infrastructure and networks) to initiate remote work was huge, and the cost doesn't end there, as we need to maintain the secure remote work infrastructure to facilitate the hybrid work model.

      Current situation

      Remote work: A 2022 survey by WFH Research (N=16,451) reports that ~14% of full-time employees are fully remote and ~29% are in a hybrid arrangement as of Summer-Fall 2022.

      Security workforce shortage: A 2022 survey by Bridewell (N=521) reports that 68% of leaders say it has become harder to recruit the right people, impacting organizational ability to secure and monitor systems.

      Confidence in the security practice: A 2022 diagnostic survey by Info-Tech Research Group (N=55) reports that importance may not correspond to confidence; for example, the most important selected cybersecurity area, namely Data Access/Integrity (93.7%), surprisingly has the lowest confidence of the practice (80.5%).

      "WFH doubled every 15 years pre-pandemic. The increase in WFH during the pandemic was equal to 30 years of pre-pandemic growth."

      Source: National Bureau of Economic Research, 2021

      Leaders must do more to increase confidence in the security practice

      Importance may not correspond to confidence

      As part of our research process for the 2023 Security Priorities Report, we analyzed results from the Info-Tech Research Group diagnostics. This report details what we see in our clients' perceived importance of security and their confidence in existing security practices.

      Cybersecurity importance

      A bar graph is depicted with the following dataset: Importance to the Organization - 94.3%; Importance to My Department	92.2%

      Cybersecurity importance areas

      A bar graph is depicted with the following dataset: Mobility (Remote & Mobile Access) - 90.2%; Regulatory Compliance - 90.1%; Desktop Computing - 90.9%; Data Access / Integrity - 93.7%

      Confidence in cybersecurity practice

      A bar graph is depicted with the following dataset: Confidence in the Organization's Overall Security - 79.4%; Confidence in Security for My Department - 79.8%

      Confidence in cybersecurity practice areas

      A bar graph is depicted with the following dataset: Mobility (Remote & Mobile Access) - 75.8%; Regulatory Compliance - 81.5%; Desktop Computing - 80.9%; Data Access / Integrity - 80.5%

      Diagnostics respondents (N=55) were asked about how important security is to their organization or department. Importance to the overall organization is 2.1 percentage points (pp) higher, but confidence in the organization's overall security is slightly lower (-0.4 pp).

      If we break down to security areas, we can see that the most important area, Data Access/Integrity (93.7%), surprisingly has the lowest confidence of the practice: 80.5%. From this data we can conclude that leaders must build a strong cybersecurity workforce to increase confidence in the security practice.

      Use this template to explain the priorities you need your stakeholders to know about.

      Maintain secure hybrid work plan

      Provide a brief value statement for the initiative.

      Build a strong cybersecurity workforce to increase confidence in the security practice to facilitate hybrid work.

      Initiative Description:

      • Description must include what organization will undertake to complete the initiative.
      • Review your security strategy for hybrid work.
      • Identify skills gaps that hinder the successful execution of the hybrid work security strategy.
      • Use the identified skill gaps to define the technical skill requirements for current and future work roles.
      • Conduct a skills assessment on your current workforce to identify employee skill gaps.
      • Decide whether to train, hire, contract, or outsource each skill gap.

      Drivers:

      List initiative drivers.

      • Employees still prefer to WFH for certain days of the week.
      • The investment on WFH during pandemic such as updated network architecture and infrastructure and day-to-day operations.
      • Tech companies' huge layoffs, e.g. Meta laid off more than 11,000 employees.

      Risks:

      List initiative risks and impacts.

      • Unskilled workers lacking certificates or years of experience who are trained and become skilled workers then quit or are hijacked by competitors.
      • Organizational and cultural changes cause friction with work-life balance.
      • Increased attack surface of remote/hybrid workforce.

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      • Increase perceived productivity by employees and increase retention.
      • Increase job satisfaction and work-life balance.
      • Hiring talent that has been laid off who are difficult to acquire in normal conditions.

      Related Info-Tech Research:

      Recommended Actions

      1. Identify skill requirements to maintain secure hybrid work

      Review your security strategy for hybrid work.

      Determine the skill needs of your security strategy.

      2. Identify skill gaps

      Identify skills gaps that hinder the successful execution of the hybrid work security strategy.

      Use the identified skill gaps to define the technical skill requirements for work roles.

      3. Decide whether to build or buy skills

      Conduct a skills assessment on your current workforce to identify employee skill gaps.

      Decide whether to train, hire, contract, or outsource each skill gap.

      Source: Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan, Info-Tech

      Secure Organization Modernization

      PRIORITY 02

      • TRENDS SUGGEST MODERNIZATION SUCH AS DIGITAL
        TRANSFORMATION TO THE CLOUD, OPERATIONAL TECHNOLOGY (OT),
        AND THE INTERNET OF THINGS (IOT) IS RISING; ADDRESSING THE RISK
        OF CONVERGING ENVIRONMENTS CAN NO LONGER BE DEFERRED.

      Executive summary

      From computerized milk-handling systems in Wisconsin farms, to automated railway systems in Europe, to Ausgrid's Distribution Network Management System (DNMS) in Australia, to smart cities and beyond; system modernization poses unique challenges to cybersecurity.

      The threats can be safety, such as the trains stopped in Denmark during the last weekend of October 2022 for several hours due to an attack on a third-party IT service provider; economics, such as a cream cheese production shutdown that occurred at the peak of cream cheese demand in October 2021 due to hackers compromising a large cheese manufacturer's plants and distribution centers; and reliability, such as the significant loss of communication for the Ukrainian military, which relied on Viasat's services.

      Despite all the cybersecurity risks, organizations continue modernization plans due to the long-term overall benefits.

      Current situation

      • Pressure of operational excellence: Competitive markets cannot keep pace with demand without modernization. For example, in automated milking systems, the labor time saved from milking can be used to focus on other essential tasks such as the decision-making process.
      • Technology offerings: Technologies are available and affordable such as automated equipment, versatile communication systems, high-performance human machine interaction (HMI), IIoT/Edge integration, and big data analytics.
      • Higher risks of cyberattacks: Modernization enlarges attack surfaces, which are not only cyber but also physical systems. Most incidents indicate that attackers gained access through the IT network, which was followed by infiltration into OT networks.

      IIoT market size is USD 323.62 billion in 2022 and projected to be around USD 1 trillion in 2028.

      Source: Statista,
      March 2022

      Modernization brings new opportunities and new threats

      Higher risks of cyberattacks on Industrial Control System (ICS)

      Target: Australian sewage plant.

      Method: Insider attack. Impact: 265,000 gallons of untreated sewage released.

      Target: Middle East energy companies.

      Method: Shamoon.

      Impact: Overwritten Windows-based systems files.

      Target: German Steel Mill

      Method: Spear-phishing

      Impact: Blast furnace control shutdown failure.

      Target: Middle East Safety Instrumented System (SIS).

      Method: TRISIS/TRITON.

      Impact: Modified safety system ladder logic.

      Target: Viasat's KA-SAT Network.

      Method: AcidRain.

      Impact: Significant loss of communication for the Ukrainian military, which relied on Viasat's services.

      A timeline displaying the years 1903; 2000; 2010; 2012; 2013; 2014; 2018; 2019; 2021; 2022 is displayed.

      Target: Marconi wireless telegraphs presentation. Method: Morse code.

      Impact: Fake message sent "Rats, rats, rats, rats. There was a young fellow of Italy, Who diddled the public quite prettily."

      Target: Iranian uranium enrichment plant.

      Method: Stuxnet.

      Impact: Compromised programmable logic controllers (PLCs).

      Target: ICS supply chain.

      Method: Havex.

      Impact: Remote Access Trojan (RAT) collected information and uploaded data to command-and-control (C&C) servers.

      Target: Ukraine power grid.

      Method: BlackEnergy.

      Impact: Manipulation of HMI View causing 1-6 hour power outages for 230,000 consumers.

      Target: Colonial Pipeline.

      Method: DarkSide ransomware.

      Impact: Compromised billing infrastructure halted the pipeline operation.

      Sources:

      • DOE, 2018
      • CSIS, 2022
      • MIT Technology Review, 2022

      Info-Tech Insight

      Most OT incidents start with attacks against IT networks and then move laterally into the OT environment. Therefore, converging IT and OT security will help protect the entire organization.

      Use this template to explain the priorities you need your stakeholders to know about.

      Secure organization modernization

      Provide a brief value statement for the initiative.

      The systems (OT, IT, IIoT) are evolving now – ensure your security plan has you covered.

      Initiative Description:

      • Description must include what organization will undertake to complete the initiative.
      • Identify the drivers to align with your organization's business objectives.
      • Build your case by leveraging a cost-benefit analysis and update your security strategy.
      • Identify people, process, and technology gaps that hinder the modernization security strategy.
      • Use the identified skill gaps to update risks, policies and procedures, IR, DR, and BCP.
      • Evaluate and enable modernization technology top focus areas and refine security processes.
      • Decide whether to train, hire, contract, or outsource to fill the security workforce gap.

      Drivers:

      List initiative drivers.

      • Pressure of operational excellence
      • Technology offerings
      • Higher risks of cyberattacks

      Risks:

      List initiative risks and impacts.

      • Complex systems with many components to implement and manage require diligent change management.
      • Organizational and cultural changes cause friction between humans and machines.
      • Increased attack surface of cyber and physical systems.

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      • Improve service reliability through continuous and real-time operation.
      • Enhance efficiency through operations visibility and transparency.
      • Gain cost savings and efficiency to automate operations of complex and large equipment and instrumentations.

      Related Info-Tech Research:

      Recommended Actions

      1. Identify modernization business cases to secure

      Identify the drivers to align with your organization's business objectives.

      Build your case by leveraging a cost-benefit analysis, and update your security strategy.

      2. Identify gaps

      Identify people, process, and technology gaps that hinder the modernization
      security strategy.

      Use the identified skill gaps to update risks, policies and procedures, IR, DR, and BCP.

      3. Decide whether to build or buy capabilities

      Evaluate and enable modernization technology top focus areas and refine
      security processes.

      Decide whether to train, hire, contract, or outsource to fill the security workforce gap.

      Sources:

      Industrial Control System (ICS) Modernization: Unlock the Value of Automation in Utilities, Info-Tech

      Secure IT-OT Convergence, Info-Tech

      Develop a cost-benefit analysis

      Identify a modernization business case for security.

      Benefits

      Metrics

      Operational Efficiency and Cost Savings

      • Reduction in truck rolls and staff time of manual operations of equipment or instrumentation.
      • Cost reduction in energy usage such as substation power voltage level or water treatment chemical level.

      Improve Reliability and Resilience

      • Reduction in field crew time to identify the outage locations by remotely accessing field equipment to narrow down the
        fault areas.
      • Reduction in outage time impacting customers and avoiding financial penalty in service quality metrics.
      • Improve operating reliability through continuous and real-time trend analysis of equipment performance.

      Energy & Capacity Savings

      • Optimize energy usage of operation to reduce overall operating cost and contribution to organizational net-zero targets.

      Customers & Society Benefits

      • Improve customer safety for essential services such as drinkable water consumption.
      • Improve reliability of services and address service equity issues based on data.

      Cost

      Metrics

      Equipment and Infrastructure

      Upgrade existing security equipment or instrumentation or deploy new, e.g. IPS on Enterprise DMZ and Operations DMZ.

      Implement communication network equipment and labor to install and configure.

      Upgrade or construct server room including cooling/heating, power backup, and server and rack hardware.

      Software and Commission

      The SCADA/HMI software and maintenance fee as well as lifecycle upgrade implementation project cost.

      Labor cost of field commissioning and troubleshooting.

      Integration with security systems, e.g. log management and continuous monitoring.

      Support and Resources

      Cost to hire/outsource security FTEs for ongoing managing and operating security devices, e.g. SOC.

      Cost to hire/outsource IT/OT FTEs to support and troubleshoot systems and its integrations with security systems, e.g. MSSP.

      An example of a cost-benefit analysis for ICS modernization

      Sources:

      Industrial Control System (ICS) Modernization: Unlock the Value of Automation in Utilities, Info-Tech

      Lawrence Berkeley National Laboratory, 2021

      IT-OT convergence demands new security approach and solutions

      Identify gaps

      Attack Vectors

      IT

      • User's compromised credentials
      • User's access device, e.g. laptop, smartphone
      • Access method, e.g. denial-of-service to modem, session hijacking, bad data injection

      OT

      • Site operations, e.g. SCADA server, engineering workstation, historian
      • Controls, e.g. SCADA Client, HMI, PLCs, RTUs
      • Process devices, e.g. sensors, actuators, field devices

      Defense Strategies

      • Limit exposure of system information
      • Identify and secure remote access points
      • Restrict tools and scripts
      • Conduct regular security audits
      • Implement a dynamic network environment

      (Control System Defense: Know the Opponent, CISA)

      An example of a high-level architecture of an electric utility's control system and its interaction with IT systems.

      An example of a high-level architecture of an electric utility's control system and its interaction with IT systems.

      Source: ISA-99, 2007

      RESPOND TO REGULATORY CHANGES

      PRIORITY 03

      • GOVERNMENT-ENACTED POLICY CHANGES AND INDUSTRY REGULATORY CHANGES COULD BE A COMPLIANCE BURDEN … OR PREVENT YOUR NEXT SECURITY INCIDENT.

      Executive summary

      Background

      Government-enacted regulatory changes are occurring at an ever-increasing rate these days. As one example, on November 10, 2022, the EU Parliament introduced two EU cybersecurity laws: the Network and Information Security (NIS2) Directive (applicable to organizations located within the EU and organizations outside the EU that are essential within an EU country) and the Digital Operational Resilience Act (DORA). There are also industry regulatory changes such as PCI DSS v4.0 for the payment sector and the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) for Bulk Electric Systems (BES).

      Organizations should use regulatory changes as a means to improve security practices, instead of treating them as a compliance burden. As said by lead member of EU Parliament Bart Groothuis on NIS2, "This European directive is going to help around 160,000 entities tighten their grip on security […] It will also enable information sharing with the private sector and partners around the world. If we are being attacked on an industrial scale, we need to respond on an industrial scale."

      Current situation

      Stricter requirements and reporting: Regulations such as NIS2 include provisions for incident response, supply chain security, and encryption and vulnerability disclosure and set tighter cybersecurity obligations for risk management reporting obligations.

      Broader sectors: For example, the original NIS directive covers 19 sectors such as Healthcare, Digital Infrastructure, Transport, and Energy. Meanwhile, the new NIS2 directive increases to 35 sectors by adding other sectors such as providers of public electronic communications networks or services, manufacturing of certain critical products (e.g. pharmaceuticals), food, and digital services.

      High sanctions for violations: For example, Digital Services Act (DSA) includes fines of up to 6% of global turnover and a ban on operating in the EU single market in case of repeated serious breaches.

      Approximately 100 cross-border data flow regulations exist in 2022.

      Source: McKinsey, 2022

      Stricter requirements for payments

      Obligation changes to keep up with emerging threats and technologies

      64 New requirements were added
      A total of 64 requirements have been added to version 4.0 of the PCI DSS.

      13 New requirements become effective March 31, 2024
      The other 51 new requirements are considered best practice until March 31, 2025, at which point they will become effective.

      11 New requirements only for service providers
      11 of the new requirements are applicable only to entities that provide third-party services to merchants.

      Defined roles must be assigned for requirements.

      Focus on periodically assessing and documenting scope.

      Entities may choose a defined approach or a customized approach to requirements.

      An example of new requirements for PCI DSS v4.0

      Source: Prepare for PCI DSS v4.0, Info-Tech

      Use this template to explain the priorities you need your stakeholders to know about.

      Respond to regulatory changes

      Provide a brief value statement for the initiative.

      The compliance obligations are evolving – ensure your security plan has you covered.

      Initiative Description:

      Description must include what organization will undertake to complete the initiative.

      • Identify relevant security and privacy compliance and conformance levels.
      • Identify gaps for updated obligations, and map obligations into control framework.
      • Review, update, and implement policies and strategy.
      • Develop compliance exception process and forms.
      • Develop test scripts.
      • Track status and exceptions

      Drivers:

      List initiative drivers.

      • Pressure of new regulations
      • Governance, risk & compliance (GRC) tool offerings
      • High administrative or criminal penalties of non-compliance

      Risks:

      List initiative risks and impacts.

      • Complex structures and a great number of compliance requirements
      • Restricted budget and lack of skilled workforce for organizations such as local municipalities and small or medium organizations compared to private counterparts
      • Personal liability for some regulations for non-compliance

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      • Reduces compliance risk.
      • Reduces complexity within the control environment by using a single framework to align multiple compliance regimes.
      • Reduces costs and efforts related to managing IT audits through planning and preparation.

      Related Info-Tech Research:

      Recommended Actions

      1. Identify compliance obligations

      Identify relevant security and privacy obligations and conformance levels.

      Identify gaps for updated obligations, and map obligations into control framework.

      2. Implement compliance strategy

      Review, update, and implement policies and strategy.

      Develop compliance exception process.

      3. Track and report

      Develop test scripts to check your remediations to ensure they are effective.

      Track and report status and exceptions.

      Sources: Build a Security Compliance Program and Prepare for PCI DSS v4.0, Info-Tech

      Identify relevant security and privacy compliance obligations

      Identify obligations

      # Security Jurisdiction
      1 Network and Information Security (NIS2) Directive European Union (EU) and organizations outside the EU that are essential within an EU country
      2 North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) North American electrical utilities
      3 Executive Order (EO) 14028: Improving the Nation's Cybersecurity, The White House, 2021 United States

      #

      Privacy Jurisdiction
      1 General Data Protection Regulation (GDPR) EU and EU citizens
      2 Personal Information Protection and Electronic Documents Act (PIPEDA) Canada
      3 California Consumer Privacy Act (CCPA) California, USA
      4 Personal Information Protection Law of the People’s Republic of China (PIPL) China

      An example of security and privacy compliance obligations

      How much does it cost to become compliant?

      • It is important to understand the various frameworks and to adhere to the appropriate compliance obligations.
      • Many factors influence the cost of compliance, such as the size of organization, the size of network, and current security readiness.
      • To manage compliance obligations, it is important to use a platform that not only performs internal and external monitoring but also provides third-party vendors (if applicable) with visibility into potential threats in their organization.

      Adopt Next-Generation Cybersecurity Technologies

      PRIORITY 04

      • GOVERNMENTS AND HACKERS ARE RECOGNIZING THE IMPORTANCE OF EMERGING TECHNOLOGIES, SUCH AS ZERO TRUST ARCHITECTURE AND AI-BASED CYBERSECURITY. SO SHOULD YOUR ORGANIZATION.

      Executive summary

      Background

      The cat and mouse game between threat actors and defenders is continuing. The looming question "can defenders do better?" has been answered with rapid development of technology. This includes the automation of threat analysis (signature-based, specification-based, anomaly-based, flow-based, content-based, sandboxing) not only on IT but also on other relevant environments, e.g. IoT, IIoT, and OT based on AI/ML.

      More fundamental approaches such as post-quantum cryptography and zero trust (ZT) are also emerging.
      ZT is a principle, a model, and also an architecture focused on resource protection by always verifying transactions using the least privilege principle. Hopefully in 2023, ZT will be more practical and not just a vendor marketing buzzword.

      Next-gen cybersecurity technologies alone are not a silver bullet. A combination of skilled talent, useful data, and best practices will give a competitive advantage. The key concepts are explainable, transparent, and trustworthy. Furthermore, regulation often faces challenges to keep up with next-gen cybersecurity technologies, especially with the implications and risks of adoption, which may not always be explicit.

      Current situation

      ZT: Performing an accurate assessment of readiness and benefits to adopt ZT can be difficult due to ZT's many components. Thus, an organization needs to develop a ZT roadmap that aligns with organizational goals and focuses on access to data, assets, applications, and services; don't select solutions or vendors too early.

      Post-quantum cryptography: Current cryptographic applications, such as RSA for PKI, rely on factorization. However, algorithms such as Shor's show quantum speedup for factorization, which can break current crypto when sufficient quantum computing devices are available. Thus, threat actors can intercept current encrypted information and store it to decrypt in the future.

      AI-based threat management: AI helps in analyzing and correlating data extremely fast compared to humans. Millions of telemetries, malware samples, raw events, and vulnerability data feed into the AI system, which humans cannot process manually. Furthermore, AI does not get tired in processing this big data, thus avoiding human error and negligence.

      Data breach mitigation cost without AI: USD 6.20 million; and with AI: USD 3.15 million

      Source: IBM, 2022

      Traditional security is not working

      Alert Fatigue

      Too many false alarms and too many events to process. Evolving threat landscapes waste your analysts' valuable time on mundane tasks, such as evidence collection. Meanwhile, only limited time is spared for decisions and conclusions, which results in the fear of missing an incident and alert fatigue.

      Lack of Insight

      To report progress, clear metrics are needed. However, cybersecurity still lacks in this area as the system itself is complex and some systems work in silos. Furthermore, lessons learned are not yet distilled into insights for improving future accuracy.

      Lack of Visibility

      System integration is required to create consistent workflows across the organization and to ensure complete visibility of the threat landscape, risks, and assets. Also, the convergence of OT, IoT, and IT enhances this challenge.

      Source: IBM Security Intelligence, 2020

      A business case for AI-based cybersecurity

      Threat management

      Prevention

      Risk scores are generated by machine learning based on variables such as behavioral patterns and geolocation. Zero trust architecture is combined with machine learning. Asset management leverages visibility using machine learning. Comply with regulations by improving discovery, classification, and protection of data using machine learning. Data security and data privacy services use machine learning for data discovery.

      Detection

      AI, advanced machine learning, and static approaches, such as code file analysis, combine to automatically detect and analyze threats and prevent threats from spreading, assisted by threat intelligence.

      Response

      AI helps in orchestrating security technologies for organizations to reduce the number of security agents installed, which may not talk to each other or, worse, may conflict with each other.

      Recovery

      AI continuously tunes based on lessons learned, such as creating security policies for improving future accuracy. AI also does not get fatigue, and it assists humans in a faster recovery.

      Prevention; Detection; Response; Recovery

      AI has been around since the 1940s, but why is it only gaining traction now? Because supporting technologies are only now available, including faster GPUs for complex computations and cheaper storage for massive volumes of data.

      Use this template to explain the priorities you need your stakeholders to know about.

      Adopt next-gen cybersecurity technologies

      Use this template to explain the priorities you need your stakeholders to know about.

      Develop a practical roadmap that shows the business value of next-gen cybersecurity technologies investment.

      Initiative Description:

      Description must include what organization will undertake to complete the initiative.

      • Identify the stakeholders who will be affected by the next-gen cybersecurity technologies implementation and define responsibilities based on skillsets and the degree of support.
      • Adopt well-established data governance practices for cross-functional teams.
      • Conduct a maturity assessment of key processes and highlight interdependencies.
      • Develop a baseline and periodically review risks, policies and procedures, and business plan.
      • Develop a roadmap and deploy next-gen cybersecurity architecture and controls step by step, working with trusted technology partners.
      • Monitor metrics on effectiveness and efficiency.

      Drivers:

      List initiative drivers.

      • Pressure of attacks by sophisticated threat actors
      • Next-gen cybersecurity technologies tool offerings
      • High cost of traditional security, e.g. longer breach lifecycle

      Risks:

      List initiative risks and impacts.

      • Lack of transparency of the model or bias, leading to non-compliance with policies/regulations
      • Risks related with data quality and inadequate data for model training
      • Adversarial attacks, including, but not limited to, adversarial input and model extraction

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      • Reduces the number of alerts, thus reduces alert fatigue.
      • Increases the identification of unknown threats.
      • Leads to faster detection and response.
      • Closes skills gap and increases productivity.

      Related Info-Tech Research:

      Recommended Actions

      1. People

      Identify the stakeholders who will be affected by the next-gen cybersecurity technologies implementation and define responsibilities based on skillsets and the degree of support.

      Adopt well-established data governance practices for cross-functional teams.

      2. Process

      Conduct a maturity assessment of key processes and highlight interdependencies.

      Develop a baseline and periodically review risks, policies and procedures, and business plan.

      3. Technology

      Develop a roadmap and deploy next-gen cybersecurity architecture and controls step by step, working with trusted technology partners.

      Monitor metrics on effectiveness and efficiency.

      Source: Leverage AI in Threat Management (keynote presentation), Info-Tech

      Secure Services and Applications

      PRIORITY 05

      • APIS ARE STILL THE #1 THREAT TO APPLICATION SECURITY.

      Executive summary

      Background

      Software is usually produced as part of a supply chain instead of in silos. A vulnerability in any part of the supply chain can become a threat surface. We have learned this from recent incidents such as Log4j, SolarWinds, and Kaseya where attackers compromised a Virtual System Administrator tool used by managed service providers to attack around 1,500 organizations.

      DevSecOps is a culture and philosophy that unifies development, security, and operations to answer this challenge. DevSecOps shifts security left by automating, as much as possible, development and testing. DevSecOps provides many benefits such as rapid development of secure software and assurance that, prior to formal release and delivery, tests are reliably performed and passed.

      DevSecOps practices can apply to IT, OT, IoT, and other technology environments, for example, by integrating a Secure Software Development Framework (SSDF).

      Current situation

      Secure Software Supply Chain: Logging is a fundamental feature of most software, and recently the use of software components, especially open source, are based on trust. From the Log4j incident we learned that more could be done to improve the supply chain by adopting ZT to identify related components and data flows between systems and to apply the least privilege principle.

      DevSecOps: A software error wiped out wireless services for thousands of Rogers customers across Canada in 2021. Emergency services were also impacted, even though outgoing 911 calls were always accessible. Losing such services could have been avoided, if tests were reliably performed and passed prior to release.

      OT insecure-by-design: In OT, insecurity-by-design is still a norm, which causes many vulnerabilities such as insecure protocols implementation, weak authentication schemes, or insecure firmware updates. Additional challenges are the lack of CVEs or CVE duplication, the lack of Software Bill of Materials (SBOM), and product supply chains issues such as vulnerable products that are certified because of the scoping limitation and emphasis on functional testing.

      Technical causes of cybersecurity incidents in EU critical service providers in 2019-2021 shows: software bug (12%) and faulty software changes/update (9%).

      Source: CIRAS Incident reporting, ENISA (N=1,239)

      Software development keeps evolving

      DOD Maturation of Software Development Best Practices

      Best Practices 30 Years Ago 15 Years Ago Present Day
      Lifecycle Years or Months Months or Weeks Weeks or Days
      Development Process Waterfall Agile DevSecOps
      Architecture Monolithic N-Tier Microservices
      Deployment & Packaging Physical Virtual Container
      Hosting Infrastructure Server Data Center Cloud
      Cybersecurity Posture Firewall + SIEM + Zero Trust

      Best practices in software development are evolving as shown on the diagram to the left. For example, 30 years ago the lifecycle was "Years or Months," while in the present day it is "Weeks or Days."

      These changes also impact security such as the software architecture, which is no longer "Monolithic" but "Microservices" normally built within the supply chain.

      The software supply chain has known integrity attacks that can happen on each part of it. Starting from bad code submitted by a developer, to compromised source control platform (e.g. PHP git server compromised), to compromised build platform (e.g. malicious behavior injected on SolarWinds build), to a compromised package repository where users are deceived into using the bad package by the similarity between the malicious and the original package name.

      Therefore, we must secure each part of the link to avoid attacks on the weakest link.

      Software supply chain guidance

      Secure each part of the link to avoid attacks on the weakest link.

      Guide for Developers

      Guide for Suppliers

      Guide for Customers

      Secure product criteria and management, develop secure code, verify third-party components, harden build environment, and deliver code.

      Define criteria for software security checks, protect software, produce well-secured software, and respond to vulnerabilities.

      Secure procurement and acquisition, secure deployment, and secure software operations.

      Source: "Securing the Software Supply Chain" series, Enduring Security Framework (ESF), 2022

      "Most software today relies on one or more third-party components, yet organizations often have little or no visibility into and understanding of how these software components are developed, integrated, and deployed, as well as the practices used to ensure the components' security."

      Source: NIST – NCCoE, 2022

      Use this template to explain the priorities you need your stakeholders to know about.

      Secure services and applications

      Provide a brief value statement for the initiative.

      Adopt recommended practices for securing the software supply chain.

      Initiative Description:

      Description must include what organization will undertake to complete the initiative.

      • Define and keep security requirements and risk assessments up to date.
      • Require visibility into provenance of product, and require suppliers' self-attestation of security hygiene.
      • Verify distribution infrastructure, product and individual components integrity, and SBOM.
      • Use multi-layered defenses, e.g. ZT for integration and control configuration.
      • Train users on how to detect and report anomalies and when to apply updates to a system.
      • Ensure updates from authorized and authenticated sources and verify the integrity of the updated SBOM.

      Drivers:

      List initiative drivers.

      • Cyberattacks exploit the vulnerabilities of weak software supply chain
      • Increased need to enhance software supply chain security, e.g. under the White House Executive Order (EO) 14028
      • OT insecure-by-design hinders OT modernization

      Risks:

      List initiative risks and impacts.

      Only a few developers and suppliers explicitly address software security in detail.

      Time pressure to deliver functionality over security.

      Lack of security awareness and lack of trained workforce.

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      Customers (acquiring organizations) achieve secure acquisition, deployment, and operation of software.

      Developers and suppliers provide software security with minimal vulnerabilities in its releases.

      Automated processes such as automated testing avoid error-prone and labor-intensive manual test cases.

      Related Info-Tech Research:

      Recommended Actions

      1. Procurement and Acquisition

      Define and keep security requirements and risk assessments up to date.

      Perform analysis on current market and supplier solutions and acquire security evaluation.

      Require visibility into provenance of product, and require suppliers' self-attestation of security hygiene

      2. Deployment

      Verify distribution infrastructure, product and individual components integrity, and SBOM.

      Save and store the tests and test environment and review and verify the
      self-attestation mechanism.

      Use multi-layered defenses, e.g. ZT for integration and control configuration.

      3. Software Operations

      Train users on how to detect and report anomalies and when to apply updates to a system.

      Ensure updates from authorized and authenticated sources and verify the integrity of the updated SBOM.

      Apply supply chain risk management (SCRM) operations.

      Source: "Securing the Software Supply Chain" series, Enduring Security Framework (ESF), 2022

      Bibliography

      Aksoy, Cevat Giray, Jose Maria Barrero, Nicholas Bloom, Steven J. Davis, Mathias Dolls, and Pablo Zarate. "Working from Home Around the World." Brookings Papers on Economic Activity, 2022.
      Barrero, Jose Maria, Nicholas Bloom, and Steven J. Davis. "Why working from home will stick." WFH Research, National Bureau of Economic Research, Working Paper 28731, 2021.
      Boehm, Jim, Dennis Dias, Charlie Lewis, Kathleen Li, and Daniel Wallance. "Cybersecurity trends: Looking over the horizon." McKinsey & Company, March 2022. Accessed
      31 Oct. 2022.
      "China: TC260 issues list of national standards supporting implementation of PIPL." OneTrust, 8 Nov. 2022. Accessed 17 Nov. 2022.
      Chmielewski, Stéphane. "What is the potential of artificial intelligence to improve cybersecurity posture?" before.ai blog, 7 Aug. 2022. Accessed 15 Aug. 2022.
      Conerly, Bill. "The Recession Will Begin Late 2023 Or Early 2024." Forbes, 1 Nov. 2022. Accessed 8 Nov. 2022.
      "Control System Defense: Know the Opponent." CISA, 22 Sep. 2022. Accessed 17 Nov. 2022.
      "Cost of a Data Breach Report 2022." IBM, 2022.
      "Cybersecurity: Parliament adopts new law to strengthen EU-wide resilience." European Parliament News, 10 Nov. 2022. Press Release.
      "Cyber Security in Critical National Infrastructure Organisations: 2022." Bridewell, 2022. Accessed 7 Nov. 2022.
      Davis, Steven. "The Big Shift to Working from Home." NBER Macro Annual Session On
      "The Future of Work," 1 April 2022.
      "Digital Services Act: EU's landmark rules for online platforms enter into force."
      EU Commission, 16 Nov. 2022. Accessed 16 Nov. 2022.
      "DoD Enterprise DevSecOps Fundamentals." DoD CIO, 12 May 2022. Accessed 21 Nov. 2022.
      Elkin, Elizabeth, and Deena Shanker. "That Cream Cheese Shortage You Heard About? Cyberattacks Played a Part." Bloomberg, 09 Dec. 2021. Accessed 27 Oct. 2022.
      Evan, Pete. "What happened at Rogers? Day-long outage is over, but questions remain." CBC News, 21 April 2022. Accessed 15 Nov. 2022.
      "Fewer Ransomware Victims Pay, as Median Ransom Falls in Q2 2022." Coveware,
      28 July 2022. Accessed 18 Nov. 2022.
      "Fighting cybercrime: new EU cybersecurity laws explained." EU Commission, 10 Nov. 2022. Accessed 16 Nov. 2022.
      "Guide to PCI compliance cost." Vanta. Accessed 18 Nov. 2022.
      Hammond, Susannah, and Mike Cowan. "Cost of Compliance 2022: Competing priorities." Thomson Reuters, 2022. Accessed 18 Nov. 2022.
      Hemsley, Kevin, and Ronald Fisher. "History of Industrial Control System Cyber Incidents." Department of Energy (DOE), 2018. Accessed 29 Aug. 2022.
      Hofmann, Sarah. "What Is The NIS2 And How Will It Impact Your Organisation?" CyberPilot,
      5 Aug. 2022. Accessed 16 Nov. 2022.
      "Incident reporting." CIRAS Incident Reporting, ENISA. Accessed 21 Nov. 2022.
      "Introducing SLSA, an End-to-End Framework for Supply Chain Integrity." Google,
      16 June 2021. Accessed 25 Nov. 2022.
      Kovacs, Eduard. "Trains Vulnerable to Hacker Attacks: Researchers." SecurityWeek, 29 Dec. 2015. Accessed 15 Nov. 2022.
      "Labour Force Survey, October 2022." Statistics Canada, 4 Nov. 2022. Accessed 7 Nov. 2022.
      Malacco, Victor. "Promises and potential of automated milking systems." Michigan State University Extension, 28 Feb. 2022. Accessed 15 Nov. 2022.
      Maxim, Merritt, et al. "Planning Guide 2023: Security & Risk." Forrester, 23 Aug. 2022. Accessed 31 Oct. 2022.
      "National Cyber Threat Assessment 2023-2024." Canadian Centre for Cyber Security, 2022. Accessed 18 Nov. 2022.
      Nicaise, Vincent. "EU NIS2 Directive: what's changing?" Stormshield, 20 Oct. 2022. Accessed
      17 Nov. 2022.
      O'Neill, Patrick. "Russia hacked an American satellite company one hour before the Ukraine invasion." MIT Technology Review, 10 May 2022. Accessed 26 Aug. 2022.
      "OT ICEFALL: The legacy of 'insecure by design' and its implications for certifications and risk management." Forescout, 2022. Accessed 21 Nov. 2022.
      Palmer, Danny. "Your cybersecurity staff are burned out - and many have thought about quitting." ZDNet, 8 Aug. 2022. Accessed 19 Aug. 2022.
      Placek, Martin. "Industrial Internet of Things (IIoT) market size worldwide from 2020 to 2028 (in billion U.S. dollars)." Statista, 14 March 2022. Accessed 15 Nov. 2022.
      "Revised Proposal Attachment 5.13.N.1 ADMS Business Case PUBLIC." Ausgrid, Jan. 2019. Accessed 15 Nov. 2022.
      Richter, Felix. "Cloudy With a Chance of Recession." Statista, 6 April 2022. Web.
      "Securing the Software Supply Chain: Recommended Practices Guide for Developers." Enduring Security Framework (ESF), Aug. 2022. Accessed 22 Sep. 2022.
      "Securing the Software Supply Chain: Recommended Practices Guide for Suppliers." Enduring Security Framework (ESF), Sep. 2022. Accessed 21 Nov. 2022.
      "Securing the Software Supply Chain: Recommended Practices Guide for Customers." Enduring Security Framework (ESF), Oct. 2022. Accessed 21 Nov. 2022.
      "Security Guidelines for the Electricity Sector: Control System Electronic Connectivity."
      North American Electric Reliability Corporation (NERC), 28 Oct. 2013. Accessed 25 Nov. 2022.
      Shepel, Jan. "Schreiber Foods hit with cyberattack; plants closed." Wisconsin State Farmer,
      26 Oct. 2022. Accessed 15 Nov. 2022.
      "Significant Cyber Incidents." Center for Strategic and International Studies (CSIS). Accessed
      1 Sep. 2022.
      Souppaya, Murugiah, Michael Ogata, Paul Watrobski, and Karen Scarfone. "Software Supply Chain and DevOps Security Practices: Implementing a Risk-Based Approach to DevSecOps." NIST - National Cybersecurity Center of Excellence (NCCoE), Nov. 2022. Accessed
      22 Nov. 2022.
      "Ten Things Will Change Cybersecurity in 2023." SOCRadar, 23 Sep. 2022. Accessed
      31 Oct. 2022.
      "The Nature of Cybersecurity Defense: Pentagon To Reveal Updated Zero-Trust Cybersecurity Strategy & Guidelines." Cybersecurity Insiders. Accessed 21 Nov. 2022.
      What Is Threat Management? Common Challenges and Best Practices." IBM Security Intelligence, 2020.
      Woolf, Tim, et al. "Benefit-Cost Analysis for Utility-Facing Grid Modernization Investments: Trends, Challenges, and Considerations." Lawrence Berkeley National Laboratory, Feb. 2021. Accessed 15 Nov. 2022.
      Violino, Bob. "5 key considerations for your 2023 cybersecurity budget planning." CSO Online,
      14 July 2022. Accessed 27 Oct. 2022

      Research Contributors and Experts

      Andrew Reese
      Cybersecurity Practice Lead
      Zones

      Ashok Rutthan
      Chief Information Security Officer (CISO)
      Massmart

      Chris Weedall
      Chief Information Security Officer (CISO)
      Cheshire East Council

      Jeff Kramer
      EVP Digital Transformation and Cybersecurity
      Aprio

      Kris Arthur
      Chief Information Security Officer (CISO)
      SEKO Logistics

      Mike Toland
      Chief Information Security Officer (CISO)
      Mutual Benefit Group

      DORA - Article 7 — Explained

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      Intro

      While this text is about DORA requirements, it is really about resilient availability of your service. Even if you are not bound to this regulation, maybe you are not a financial services provider, the requirements and tips on how to get there are invaluable to your client satisfaction.

      Legal text

      In order to address and manage ICT risk, financial entities shall use and maintain updated ICT systems, protocols and tools that are:
      (a) appropriate to the magnitude of operations supporting the conduct of their activities, in accordance with the
      proportionality principle as referred to in Article 4;
      (b) reliable;
      (c) equipped with sufficient capacity to accurately process the data necessary for the performance of activities and the timely provision of services, and to deal with peak orders, message or transaction volumes, as needed, including where new technology is introduced;
      (d) technologically resilient in order to adequately deal with additional information processing needs as required under
      stressed market conditions or other adverse situations.

      What do you need to do?

      • Determine what systems you need.
      • Inventory the systems you have.
      • Make sure your systems and applications are sized right for your business
        • and made resilient according to the business functions they support
          in relation to the size of the business functions they support (proportionality)
        • and are reliable, meaning they produce consistent results
        • and are resilient, meaning they can withstand adverse effects where needed 

      How do you do this?

      For requirement (a)

      • Identify the capacity requirements for your services
      • Also identify the capacity requirements in case of serious decapacitating events (Business continuity)
      • Detail your capacity management plan so that you can meet the requirements
      • Test your systems for compliamce with these requirements

      For requirement (b)

      • Show the parts of your IT policy that deals with availability, 
      • Show the technical Disaster recovery plans and their execution reports (ideally over a number of years)
      • Show the availability reports for your systems.
      • Show the vulnerability management reports for your systems (optional)

      For requirement (C)

      • Show the availability reports for your systems: this is really the end-result: if you can show that your systems are available even under heavy load, you have won half the battle.
      • Show the capacity requirements for your systems. This is where you can prove you really thought about demad for your service.
      • Show the capacity monitoring plans, plans and roadmaps and reports for your systems
      •  Show the load testing reports executed on your systems

       For requirement (d)

      • Show the identified attacks scenarios and you defend against them
      •  Show the results of your resilience test plans: talk about High availability, Disaster recovery, and manual workaround or alternative workflows (that is business continuity.)

      Many of these solutions will depend on the the solutions and responses to other DORA requirements.

       

      dora

      Mergers & Acquisitions: The Buy Blueprint

      • Buy Link or Shortcode: {j2store}325|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: 5 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy

      There are four key scenarios or entry points for IT as the acquiring organization in M&As:

      • IT can suggest an acquisition to meet the business objectives of the organization.
      • IT is brought in to strategy plan the acquisition from both the business’ and IT’s perspectives.
      • IT participates in due diligence activities and valuates the organization potentially being acquired.
      • IT needs to reactively prepare its environment to enable the integration.

      Consider the ideal scenario for your IT organization.

      Our Advice

      Critical Insight

      Acquisitions are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

      • The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
      • A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
      • Transactions that are driven by digital motivations, requiring IT’s expertise.
      • There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.

      Impact and Result

      Prepare for a growth/integration transaction by:

      • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
      • Creating a standard strategy that will enable strong program management.
      • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

      Mergers & Acquisitions: The Buy Blueprint Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how your organization can excel its growth strategy by engaging in M&A transactions. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Proactive Phase

      Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

      • One-Pager: M&A Proactive
      • Case Study: M&A Proactive
      • Information Asset Audit Tool
      • Data Valuation Tool
      • Enterprise Integration Process Mapping Tool
      • Risk Register Tool
      • Security M&A Due Diligence Tool

      2. Discovery & Strategy

      Create a standardized approach for how your IT organization should address acquisitions.

      • One-Pager: M&A Discovery & Strategy – Buy
      • Case Study: M&A Discovery & Strategy – Buy

      3. Due Diligence & Preparation

      Evaluate the target organizations to minimize risk and have an established integration project plan.

      • One-Pager: M&A Due Diligence & Preparation – Buy
      • Case Study: M&A Due Diligence & Preparation – Buy
      • IT Due Diligence Charter
      • Technical Debt Business Impact Analysis Tool
      • IT Culture Diagnostic
      • M&A Integration Project Management Tool (SharePoint)
      • SharePoint Template: Step-by-Step Deployment Guide
      • M&A Integration Project Management Tool (Excel)
      • Resource Management Supply-Demand Calculator

      4. Execution & Value Realization

      Deliver on the integration project plan successfully and communicate IT’s transaction value to the business.

      • One-Pager: M&A Execution & Value Realization – Buy
      • Case Study: M&A Execution & Value Realization – Buy

      Infographic

      Workshop: Mergers & Acquisitions: The Buy Blueprint

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Pre-Transaction Discovery & Strategy

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for acquiring.

      Formalize the program plan.

      Create the valuation framework.

      Strategize the transaction and finalize the M&A strategy and approach.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Set up crucial elements to facilitate the success of the transaction.

      Have a repeatable transaction strategy that can be reused for multiple organizations.

      Activities

      1.1 Conduct the CIO Business Vision and CEO-CIO Alignment Diagnostics.

      1.2 Identify key stakeholders and outline their relationship to the M&A process.

      1.3 Identify the rationale for the company's decision to pursue an acquisition.

      1.4 Assess the IT/digital strategy.

      1.5 Identify pain points and opportunities tied to the acquisition.

      1.6 Create the IT vision and mission statements and identify IT guiding principles and the transition team.

      1.7 Document the M&A governance.

      1.8 Establish program metrics.

      1.9 Create the valuation framework.

      1.10 Establish the integration strategy.

      1.11 Conduct a RACI.

      1.12 Create the communication plan.

      1.13 Prepare to assess target organization(s).

      Outputs

      Business perspectives of IT

      Stakeholder network map for M&A transactions

      Business context implications for IT

      IT’s acquiring strategic direction

      Governance structure

      M&A program metrics

      IT valuation framework

      Integration strategy

      RACI

      Communication plan

      Prepared to assess target organization(s)

      2 Mid-Transaction Due Diligence & Preparation

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for integration.

      Assess the target organization(s).

      Create the valuation framework.

      Plan the integration roadmap.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Methodology identified to assess organizations during due diligence.

      Methodology can be reused for multiple organizations.

      Integration activities are planned and assigned.

      Activities

      2.1 Gather and evaluate the stakeholders involved, M&A strategy, future-state operating model, and governance.

      2.2 Review the business rationale for the acquisition.

      2.3 Establish the integration strategy.

      2.4 Create the due diligence charter.

      2.5 Create a list of IT artifacts to be reviewed in the data room.

      2.6 Conduct a technical debt assessment.

      2.7 Assess the current culture and identify the goal culture.

      2.8 Identify the needed workforce supply.

      2.9 Create the valuation framework.

      2.10 Establish the integration roadmap.

      2.11 Establish and align project metrics with identified tasks.

      2.12 Estimate integration costs.

      Outputs

      Stakeholder map

      IT strategy assessment

      IT operating model and IT governance structure defined

      Business context implications for IT

      Integration strategy

      Due diligence charter

      Data room artifacts

      Technical debt assessment

      Culture assessment

      Workforce supply identified

      IT valuation framework

      Integration roadmap and associated resourcing

      3 Post-Transaction Execution & Value Realization

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for integration.

      Plan the integration roadmap.

      Prepare employees for the transition.

      Engage in integration.

      Assess the transaction outcomes.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Integration activities are planned and assigned.

      Employees are set up for a smooth and successful transition.

      Integration strategy and roadmap executed to benefit the organization.

      Review what went well and identify improvements to be made in future transactions.

      Activities

      3.1 Identify key stakeholders and determine IT transaction team.

      3.2 Gather and evaluate the M&A strategy, future-state operating model, and governance.

      3.3 Review the business rationale for the acquisition.

      3.4 Establish the integration strategy.

      3.5 Prioritize integration tasks.

      3.6 Establish the integration roadmap.

      3.7 Establish and align project metrics with identified tasks.

      3.8 Estimate integration costs.

      3.9 Assess the current culture and identify the goal culture.

      3.10 Identify the needed workforce supply.

      3.11 Create an employee transition plan.

      3.12 Create functional workplans for employees.

      3.13 Complete the integration by regularly updating the project plan.

      3.14 Begin to rationalize the IT environment where possible and necessary.

      3.15 Confirm integration costs.

      3.16 Review IT’s transaction value.

      3.17 Conduct a transaction and integration SWOT.

      3.18 Review the playbook and prepare for future transactions.

      Outputs

      M&A transaction team

      Stakeholder map

      IT strategy assessed

      IT operating model and IT governance structure defined

      Business context implications for IT

      Integration strategy

      Integration roadmap and associated resourcing

      Culture assessment

      Workforce supply identified

      Employee transition plan

      Employee functional workplans

      Updated integration project plan

      Rationalized IT environment

      SWOT of transaction

      M&A Buy Playbook refined for future transactions

      Further reading

      Mergers & Acquisitions: The Buy Blueprint

      For IT leaders who want to have a role in the transaction process when their business is engaging in an M&A purchase.

      EXECUTIVE BRIEF

      Analyst Perspective

      Don’t wait to be invited to the M&A table, make it.

      Photo of Brittany Lutes, Research Analyst, CIO Practice, Info-Tech Research Group.
      Brittany Lutes
      Research Analyst,
      CIO Practice
      Info-Tech Research Group
      Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice, Info-Tech Research Group.
      Ibrahim Abdel-Kader
      Research Analyst,
      CIO Practice
      Info-Tech Research Group

      IT has always been an afterthought in the M&A process, often brought in last minute once the deal is nearly, if not completely, solidified. This is a mistake. When IT is brought into the process late, the business misses opportunities to generate value related to the transaction and has less awareness of critical risks or inaccuracies.

      To prevent this mistake, IT leadership needs to develop strong business relationships and gain respect for their innovative suggestions. In fact, when it comes to modern M&A activity, IT should be the ones suggesting potential transactions to meet business needs, specifically when it comes to modernizing the business or adopting digital capabilities.

      IT needs to stop waiting to be invited to the acquisition or divestiture table. IT needs to suggest that the table be constructed and actively work toward achieving the strategic objectives of the business.

      Executive Summary

      Your Challenge

      There are four key scenarios or entry points for IT as the acquiring organization in M&As:

      • IT can suggest an acquisition to meet the business objectives of the organization.
      • IT is brought in to strategy plan the acquisition from both the business’ and IT’s perspectives.
      • IT participates in due diligence activities and valuates the organization potentially being acquired.
      • IT needs to reactively prepare its environment to enable the integration.

      Consider the ideal scenario for your IT organization.

      Common Obstacles

      Some of the obstacles IT faces include:

      • IT is often told about the transaction once the deal has already been solidified and is now forced to meet unrealistic business demands.
      • The business does not trust IT and therefore does not approach IT to define value or reduce risks to the transaction process.
      • The people and culture element are forgotten or not given adequate priority.

      These obstacles often arise when IT waits to be invited into the transaction process and misses critical opportunities.

      Info-Tech's Approach

      Prepare for a growth/integration transaction by:

      • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
      • Creating a standard strategy that will enable strong program management.
      • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

      Info-Tech Insight

      As the number of merger, acquisition, and divestiture transactions continues to increase, so too does IT’s opportunity to leverage the growing digital nature of these transactions and get involved at the onset.

      The changing M&A landscape

      Businesses will embrace more digital M&A transactions in the post-pandemic world

      • When the pandemic occurred, businesses reacted by either pausing (61%) or completely cancelling (46%) deals that were in the mid-transaction state (Deloitte, 2020). The uncertainty made many organizations consider whether the risks would be worth the potential benefits.
      • However, many organizations quickly realized the pandemic is not a hindrance to M&A transactions but an opportunity. Over 16,000 American companies were involved in M&A transactions in the first six months of 2021 (The Economist). For reference, this had been averaging around 10,000 per six months from 2016 to 2020.
      • In addition to this transaction growth, organizations have increasingly been embracing digital. These trends increase the likelihood that, as an IT leader, you will engage in an M&A transaction. However, it is up to you when you get involved in the transactions.

      The total value of transactions in the year after the pandemic started was $1.3 billion – a 93% increase in value compared to before the pandemic. (Nasdaq)

      Virtual deal-making will be the preferred method of 55% of organizations in the post-pandemic world. (Wall Street Journal, 2020)

      Your challenge

      IT is often not involved in the M&A transaction process. When it is, it’s often too late.

      • The most important driver of an acquisition is the ability to access new technology (DLA Piper), and yet 50% of the time, IT isn’t involved in the M&A transaction at all (IMAA Institute, 2017).
      • Additionally, IT’s lack of involvement in the process negatively impacts the business:
        • Most organizations (60%) do not have a standardized approach to integration (Steeves and Associates).
        • Weak integration teams contribute to the failure of 70% of M&A integrations (The Wall Street Journal, 2019).
        • Less than half (47%) of organizations actually experience the positive results sought by the M&A transaction (Steeves and Associates).
      • Organizations pursuing M&A and not involving IT are setting themselves up for failure.

      Only half of M&A deals involve IT (Source: IMAA Institute, 2017)

      Common Obstacles

      These barriers make this challenge difficult to address for many organizations:

      • IT is rarely afforded the opportunity to participate in the transaction deal. When IT is invited, this often happens later in the process where integration will be critical to business continuity.
      • IT has not had the opportunity to demonstrate that it is a valuable business partner in other business initiatives.
      • One of the most critical elements that IT often doesn’t take the time or doesn’t have the time to focus on is the people and leadership component.
      • IT waits to be invited to the process rather then actively involving themselves and suggesting how value can be added to the process.

      In hindsight, it’s clear to see: Involving IT is just good business.

      47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion. (Source: IMAA Institute, 2017)

      40% of acquiring businesses discovered a cybersecurity problem at an acquisition.” (Source: Okta)

      Info-Tech's approach

      Acquisitions & Divestitures Framework

      Acquisitions and divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

      1. The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
      2. Transactions that are driven by digital motivations, requiring IT’s expertise.
      3. A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
      4. There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.
      A diagram highlighting the 'IT Executives' Role in Acquisitions and Divestitures' when they are integrated at different points in the 'Core Business Timeline'. There are four main entry points 'Proactive', 'Discovery and Strategy', 'Due Diligence and Preparation', and 'Execution and Value Realized'. It is highlighted that IT can and should start at 'Proactive', but most organizations start at 'Execution and Value Realized'. 'Proactive': suggest opportunities to evolve the organization; prove IT's value and engage in growth opportunities early. Innovators start here. Steps of the business timeline in 'Proactive' are 'Organization strategies are defined' and 'M and A is considered to enable strategy'. After a buy or sell transaction is initiated is 'Discovery and Strategy': pre-transaction state. If it is a Buy transaction, 'Establish IT's involvement and approach'. If it is a Sell transaction, 'Prepare to engage in negotiations'. Business Partners start here. Steps of the business timeline in 'Discovery and Strategy' are 'Searching criteria is set', 'Potential candidates are considered', and 'LOI is sent/received'. 'Due Diligence and Preparation': mid-transaction state. If it is a Buy transaction, 'Identify potential transaction benefits and risks'. If it is a Sell transaction, 'Comply, communicate, and collaborate in transaction'. Trusted Operators start here. Steps of the business timeline in 'Due Diligence and Preparation' are 'Due diligence engagement occurs', 'Final agreement is reached', and 'Preparation for transaction execution occurs'. 'Execution and Value Realization': post-transaction state. If it is a Buy transaction, 'Integrate the IT environments and achieve business value'. If it is a Sell transaction, 'Separate the IT environment and deliver on transaction terms'. Firefighters start here. Steps of the business timeline in 'Execution and Value Realization' are 'Staff and operations are addressed appropriately', 'Day 1 of implementation and integration activities occurs', '1st 100 days of new entity state occur' and 'Ongoing risk mitigating and value creating activities occur'.

      The business’ view of IT will impact how soon IT can get involved

      There are four key entry points for IT

      A colorful visualization of the four key entry points for IT and a fifth not-so-key entry point. Starting from the top: 'Innovator', Information and Technology as a Competitive Advantage, 90% Satisfaction; 'Business Partner', Effective Delivery of Strategic Business Projects, 80% Satisfaction; 'Trusted Operator', Enablement of Business Through Application and Work Orders, 70% Satisfaction; 'Firefighter', Reliable Infrastructure and IT Service Desk, 60% Satisfaction; and then 'Unstable', Inability to Consistently Deliver Basic Services, <60% Satisfaction.
      1. Innovator: IT suggests an acquisition to meet the business objectives of the organization.
      2. Business Partner: IT is brought in to strategy plan the acquisition from both the business’ and IT’s perspective.
      3. Trusted Operator: IT participates in due diligence activities and valuates the organization potentially being acquired.
      4. Firefighter: IT reactively engages in the integration with little time to prepare.

      Merger, acquisition, and divestiture defined

      Merger

      A merger looks at the equal combination of two entities or organizations. Mergers are rare in the M&A space, as the organizations will combine assets and services in a completely equal 50/50 split. Two organizations may also choose to divest business entities and merge as a new company.

      Acquisition

      The most common transaction in the M&A space, where an organization will acquire or purchase another organization or entities of another organization. This type of transaction has a clear owner who will be able to make legal decisions regarding the acquired organization.

      Divestiture

      An organization may decide to sell partial elements of a business to an acquiring organization. They will separate this business entity from the rest of the organization and continue to operate the other components of the business.

      Info-Tech Insight

      A true merger does not exist, as there is always someone initiating the discussion. As a result, most M&A activity falls into acquisition or divestiture categories.

      Buying vs. selling

      The M&A process approach differs depending on whether you are the executive IT leader on the buy side or sell side

      This blueprint is only focused on the buy side:

      • More than two organizations could be involved in a transaction.
      • Examples of buy-related scenarios include:
        • Your organization is buying another organization with the intent of having the purchased organization keep its regular staff, operations, and location. This could mean minimal integration is required.
        • Your organization is buying another organization in its entirety with the intent of integrating it into your original company.
        • Your organization is buying components of another organization with the intent of integrating them into your original company.
      • As the purchasing organization, you will probably be initiating the purchase and thus will be valuating the selling organization during due diligence and leading the execution plan.

      The sell side is focused on:

      • Examples of sell-related scenarios include:
        • Your organization is selling to another organization with the intent of keeping its regular staff, operations, and location. This could mean minimal separation is required.
        • Your organization is selling to another organization with the intent of separating to be a part of the purchasing organization.
        • Your organization is engaging in a divestiture with the intent of:
          • Separating components to be part of the purchasing organization permanently.
          • Separating components to be part of a spinoff and establish a unit as a standalone new company.
      • As the selling organization, you could proactively seek out suitors to purchase all or components of your organization, or you could be approached by an organization.

      For more information on divestitures or selling your entire organization, check out Info-Tech’s Mergers & Acquisitions: The Sell Blueprint.

      Core business timeline

      For IT to be valuable in M&As, you need to align your deliverables and your support to the key activities the business and investors are working on.

      Info-Tech’s methodology for Buying Organizations in Mergers, Acquisitions, or Divestitures

      1. Proactive

      2. Discovery & Strategy

      3. Due Diligence & Preparation

      4. Execution & Value Realization

      Phase Steps

      1. Identify Stakeholders and Their Perspective of IT
      2. Assess IT’s Current Value and Future State
      3. Drive Innovation and Suggest Growth Opportunities
      1. Establish the M&A Program Plan
      2. Prepare IT to Engage in the Acquisition
      1. Assess the Target Organization
      2. Prepare to Integrate
      1. Execute the Transaction
      2. Reflection and Value Realization

      Phase Outcomes

      Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

      Create a standardized approach for how your IT organization should address acquisitions.

      Evaluate the target organizations successfully and establish an integration project plan.

      Deliver on the integration project plan successfully and communicate IT’s transaction value to the business.

      Potential metrics for each phase

      1. Proactive

      2. Discovery & Strategy

      3. Due Diligence & Preparation

      4. Execution & Value Realization

      • % Share of business innovation spend from overall IT budget
      • % Critical processes with approved performance goals and metrics
      • % IT initiatives that meet or exceed value expectation defined in business case
      • % IT initiatives aligned with organizational strategic direction
      • % Satisfaction with IT's strategic decision-making abilities
      • $ Estimated business value added through IT-enabled innovation
      • % Overall stakeholder satisfaction with IT
      • % Percent of business leaders that view IT as an Innovator
      • % IT budget as a percent of revenue
      • % Assets that are not allocated
      • % Unallocated software licenses
      • # Obsolete assets
      • % IT spend that can be attributed to the business (chargeback or showback)
      • % Share of CapEx of overall IT budget
      • % Prospective organizations that meet the search criteria
      • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
      • % Business leaders that view IT as a Business Partner
      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target
      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT integration
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      The IT executive’s role in the buying transaction is critical

      And IT leaders have a greater likelihood than ever of needing to support a merger, acquisition, or divestiture.

      1. Reduced Risk

        IT can identify risks that may go unnoticed when IT is not involved.
      2. Increased Accuracy

        The business can make accurate predictions around the costs, timelines, and needs of IT.
      3. Faster Integration

        Faster integration means faster value realization for the business.
      4. Informed Decision Making

        IT leaders hold critical information that can support the business in moving the transaction forward.
      5. Innovation

        IT can suggest new opportunities to generate revenue, optimize processes, or reduce inefficiencies.

      The IT executive’s critical role is demonstrated by:

      • Reduced Risk

        47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion (IMAA Institute, 2017).
      • Increased Accuracy

        87% of respondents to a Deloitte survey effectively conducted a virtual deal, with a focus on cybersecurity and integration (Deloitte, 2020).
      • Faster Integration

        Integration costs range from as low as $4 million to as high as $3.8 billion, making the process an investment for the organization (CIO Dive).
      • Informed Decision Making

        Only 38% of corporate and 22% of private equity firms include IT as a significant aspect in their transaction approach (IMAA Institute, 2017).
      • Innovation

        Successful CIOs involved in M&As can spend 70% of their time on aspects outside of IT and 30% of their time on technology and delivery (CIO).

      Playbook benefits

      IT Benefits

      • IT will be seen as an innovative partner to the business, and its suggestions and involvement in the organization will lead to benefits, not hindrances.
      • Develop a streamlined method to valuate the potential organization being purchased and ensure risk management concerns are brought to the business’ attention immediately.
      • Create a comprehensive list of items that IT needs to do during the integration that can be prioritized and actioned.

      Business Benefits

      • The business will get accurate and relevant information about the organization being acquired, ensuring that the anticipated value of the transaction is correctly planned for.
      • Fewer business interruptions will happen, because IT can accurately plan for and execute the high-priority integration tasks.
      • The business can make a fair offer to the purchased organization, having properly valuated all aspects being bought, including the IT environment.

      Insight summary

      Overarching Insight

      As an IT executive, take control of when you get involved in a growth transaction. Do this by proactively identifying acquisition targets, demonstrating the value of IT, and ensuring that integration of IT environments does not lead to unnecessary and costly decisions.

      Proactive Insight

      CIOs on the forefront of digital transformation need to actively look for and suggest opportunities to acquire or partner on new digital capabilities to respond to rapidly changing business needs.

      Discovery & Strategy Insight

      IT organizations that have an effective M&A program plan are more prepared for the buying transaction, enabling a successful outcome. A structured strategy is particularly necessary for organizations expected to deliver M&As rapidly and frequently.

      Due Diligence & Preparation Insight

      Most IT synergies can be realized in due diligence. It is more impactful to consider IT processes and practices (e.g. contracts and culture) in due diligence rather than later in the integration.

      Execution & Value Realization Insight

      IT needs to realize synergies within the first 100 days of integration. The most successful transactions are when IT continuously realizes synergies a year after the transaction and beyond.

      Blueprint deliverables

      Key Deliverable: M&A Buy Playbook

      The M&A Buy Playbook should be a reusable document that enables your IT organization to successfully deliver on any acquisition transaction.

      Screenshots of the 'M and A Buy Playbook' deliverable.

      M&A Buy One-Pager

      See a one-page overview of each phase of the transaction.

      Screenshots of the 'M and A Buy One-Pagers' deliverable.

      M&A Buy Case Studies

      Read a one-page case study for each phase of the transaction.

      Screenshots of the 'M and A Buy Case Studies' deliverable.

      M&A Integration Project Management Tool (SharePoint)

      Manage the integration process of the acquisition using this SharePoint template.

      Screenshots of the 'M and A Integration Project Management Tool (SharePoint)' deliverable.

      M&A Integration Project Management Tool (Excel)

      Manage the integration process of the acquisition using this Excel tool if you can’t or don’t want to use SharePoint.

      Screenshots of the 'M and A Integration Project Management Tool (Excel)' deliverable.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 10 calls over the course of 2 to 4 months.

        Proactive Phase

      • Call #1: Scope requirements, objectives, and your specific challenges.
      • Discovery & Strategy Phase

      • Call #2: Determine stakeholders and their perspectives of IT.
      • Call #3: Identify how M&A could support business strategy and how to communicate.
      • Due Diligence & Preparation Phase

      • Call #4: Establish a transaction team and acquisition strategic direction.
      • Call #5: Create program metrics and identify a standard integration strategy.
      • Call #6: Assess the potential organization(s).
      • Call #7: Identify the integration program plan.
      • Execution & Value Realization Phase

      • Call #8: Establish employee transitions to retain key staff.
      • Call #9: Assess IT’s ability to deliver on the acquisition transaction.

      The Buy Blueprint

      Phase 1

      Proactive

      Phase 1

      Phase 2 Phase 3 Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Growth Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Acquisition
      • 3.1 Assess the Target Organization
      • 3.2 Prepare to Integrate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Conduct the CEO-CIO Alignment diagnostic
      • Conduct the CIO Business Vision diagnostic
      • Visualize relationships among stakeholders to identify key influencers
      • Group stakeholders into categories
      • Prioritize your stakeholders
      • Plan to communicate
      • Valuate IT
      • Assess the IT/digital strategy
      • Determine pain points and opportunities
      • Align goals to opportunities
      • Recommend growth opportunities

      This phase involves the following participants:

      • IT and business leadership

      What is the Proactive phase?

      Embracing the digital drivers

      As the number of merger, acquisition, or divestiture transactions driven by digital means continues to increase, IT has an opportunity to not just be involved in a transaction but actively seek out potential deals.

      In the Proactive phase, the business is not currently considering a transaction. However, the business could consider one to reach its strategic goals. IT organizations that have developed respected relationships with the business leaders can suggest these potential transactions.

      Understand the business’ perspective of IT, determine who the critical M&A stakeholders are, valuate the IT environment, and examine how it supports the business goals in order to suggest an M&A transaction.

      In doing so, IT isn’t waiting to be invited to the transaction table – it’s creating it.

      Goal: To support the organization in reaching its strategic goals by suggesting M&A activities that will enable the organization to reach its objectives faster and with greater-value outcomes.

      Proactive Prerequisite Checklist

      Before coming into the Proactive phase, you should have addressed the following:

      • Understand what mergers, acquisitions, and divestitures are.
      • Understand what mergers, acquisitions, and divestitures mean for the business.
      • Understand what mergers, acquisitions, and divestitures mean for IT.

      Review the Executive Brief for more information on mergers, acquisitions, and divestitures for purchasing organizations.

      Proactive

      Step 1.1

      Identify M&A Stakeholders and Their Perspective of IT

      Activities

      • 1.1.1 Conduct the CEO-CIO Alignment diagnostic
      • 1.1.2 Conduct the CIO Business Vision diagnostic
      • 1.1.3 Visualize relationships among stakeholders to identify key influencers
      • 1.1.4 Group stakeholders into categories
      • 1.1.5 Prioritize your stakeholders
      • 1.16 Plan to communicate

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical M&A stakeholders

      Outcomes of Step

      Understand how the business perceives IT and establish strong relationships with critical M&A stakeholders.

      Business executives' perspectives of IT

      Leverage diagnostics and gain alignment on IT’s role in the organization

      • To suggest or get involved with a merger, acquisition, or divestiture, the IT executive leader needs to be well respected by other members of the executive leadership team and the business.
      • Specifically, the Proactive phase relies on the IT organization being viewed as an Innovator within the business.
      • Identify how the CEO/business executive currently views IT and where they would like IT to move within the Maturity Ladder.
      • Additionally, understand how other critical department leaders view IT and how they view the partnership with IT.
      A colorful visualization titled 'Maturity Ladder' detailing levels of IT function that a business may choose from based on the business executives' perspectives of IT. Starting from the bottom: 'Struggle', Does not embarrass, Does not crash; 'Support', Keeps business happy, Keeps costs low; 'Optimize', Increases efficiency, Decreases costs; 'Expand', Extends into new business, Generates revenue; 'Transform', Creates new industry.

      Misalignment in target state requires further communication between the CIO and CEO to ensure IT is striving toward an agreed-upon direction.

      Info-Tech’s CIO Business Vision (CIO BV) diagnostic measures a variety of high-value metrics to provide a well-rounded understanding of stakeholder satisfaction with IT.

      Sample of Info-Tech's CIO Business Vision diagnostic measuring percentages of high-value metrics like 'IT Satisfaction' and 'IT Value' regarding business leader satisfaction. A note for these two reads 'Evaluate business leader satisfaction with IT this year and last year'. A section titled 'Relationship' has metrics such as 'Understands Needs' and 'Trains Effectively'. A note for this section reads 'Examine indicators of the relationship between IT and the business'. A section titled 'Security Friction' has metrics such as 'Regulatory Compliance-Driven' and 'Office/Desktop Security'.

      Business Satisfaction and Importance for Core Services

      The core services of IT are important when determining what IT should focus on. The most important services with the lowest satisfaction offer the largest area of improvement for IT to drive business value.

      Sample of Info-Tech's CIO Business Vision diagnostic specifically comparing the business satisfaction of 12 core services with their importance. Services listed include 'Service Desk', 'IT Security', 'Requirements Gathering', 'Business Apps', 'Data Quality', and more. There is a short description of the services, a percentage for the business satisfaction with the service, a percentage comparing it to last year, and a numbered ranking of importance for each service. A note reads 'Assess satisfaction and importance across 12 core IT capabilities'.

      1.1.1 Conduct the CEO-CIO Alignment diagnostic

      2 weeks

      Input: IT organization expertise and the CEO-CIO Alignment diagnostic

      Output: An understanding of an executive business stakeholder’s perception of IT

      Materials: CEO-CIO Alignment diagnostic, M&A Buy Playbook

      Participants: IT executive/CIO, Business executive/CEO

      1. The CEO-CIO Alignment diagnostic can be a powerful input. Speak with your Info-Tech account representative to conduct the diagnostic. Use the results to inform current IT capabilities.
      2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret and draw conclusions from the results.
      3. Examine the results of the survey and note where there might be specific capabilities that could be improved.
      4. Determine whether there are any areas of significant disagreement between the you and the CEO. Mark down those areas for further conversations. Additionally, take note of areas that could be leveraged to support growth transactions or support your rationale in recommending growth transactions.

      Download the sample report.

      Record the results in the M&A Buy Playbook.

      1.1.2 Conduct the CIO Business Vision diagnostic

      2 weeks

      Input: IT organization expertise, CIO BV diagnostic

      Output: An understanding of business stakeholder perception of certain IT capabilities and services

      Materials: CIO Business Vision diagnostic, Computer, Whiteboard and markers, M&A Buy Playbook

      Participants: IT executive/CIO, Senior business leaders

      1. The CIO Business Vision (CIO BV) diagnostic can be a powerful tool for identifying IT capability focus areas. Speak with your account representative to conduct the CIO BV diagnostic. Use the results to inform current IT capabilities.
      2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret the results and draw conclusions from the diagnostic.
      3. Examine the results of the survey and take note of any IT services that have low scores.
      4. Read through the diagnostic comments and note any common themes. Especially note which stakeholders identified they have a favorable relationship with IT and which stakeholders identified they have an unfavorable relationship. For those who have an unfavorable relationship, identify if they will have a critical role in a growth transaction.

      Download the sample report.

      Record the results in the M&A Buy Playbook.

      Create a stakeholder network map for M&A transactions

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Example:

      Diagram of stakeholders and their relationships with other stakeholders, such as 'Board Members', 'CFO/Finance', 'Compliance', etc. with 'CIO/IT Leader' highlighted in the middle. There are unidirectional black arrows and bi-directional green arrows indicating each connection.

        Legend
      • Black arrows indicate the direction of professional influence
      • Dashed green arrows indicate bidirectional, informal influence relationships

      Info-Tech Insight

      Your stakeholder map defines the influence landscape that the M&A transaction will occur within. This will identify who holds various levels of accountability and decision-making authority when a transaction does take place.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantial relationships with your stakeholders.

      1.1.3 Visualize relationships among stakeholders to identify key influencers

      1-3 hours

      Input: List of M&A stakeholders

      Output: Relationships among M&A stakeholders and influencers

      Materials: M&A Buy Playbook

      Participants: IT executive leadership

      1. The purpose of this activity is to list all the stakeholders within your organization that will have a direct or indirect impact on the M&A transaction.
      2. Determine the critical stakeholders, and then determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
        • Use black arrows to indicate the direction of professional influence.
        • Use dashed green arrows to indicate bidirectional, informal influence relationships.

      Record the results in the M&A Buy Playbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps IT leaders categorize their stakeholders by their level of influence and ownership in the merger, acquisition, or divestiture process.

      A prioritization map of stakeholder categories split into four quadrants. The vertical axis is 'Influence', from low on the bottom to high on top. The horizontal axis is 'Ownership/Interest', from low on the left to high on the right. 'Spectators' are low influence, low ownership/interest. 'Mediators' are high influence, low ownership/interest. 'Noisemakers' are low influence, high ownership/interest. 'Players' are high influence, high ownership/interest.

      There are four areas in the map, and the stakeholders within each area should be treated differently.

      Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.

      Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.

      Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.

      Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

      1.1.4 Group stakeholders into categories

      30 minutes

      Input: Stakeholder map, Stakeholder list

      Output: Categorization of stakeholders and influencers

      Materials: Flip charts, Markers, Sticky notes, M&A Buy Playbook

      Participants: IT executive leadership, Stakeholders

      1. Identify your stakeholders’ interest in and influence on the M&A process as high, medium, or low by rating the attributes below.
      2. Map your results to the model to the right to determine each stakeholder’s category.

      Same prioritization map of stakeholder categories as before. This one has specific stakeholders mapped onto it. 'CFO' is mapped as low interest and middling influence, between 'Mediator' and 'Spectator'. 'CIO' is mapped as higher than average interest and high influence, a 'Player'. 'Board Member' is mapped as high interest and high influence, a 'Player'.

      Level of Influence
      • Power: Ability of a stakeholder to effect change.
      • Urgency: Degree of immediacy demanded.
      • Legitimacy: Perceived validity of stakeholder’s claim.
      • Volume: How loud their “voice” is or could become.
      • Contribution: What they have that is of value to you.
      Level of Interest

      How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

      Record the results in the M&A Buy Playbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Level of Support

      Supporter

      Evangelist

      Neutral

      Blocker

      Stakeholder Category Player Critical High High Critical
      Mediator Medium Low Low Medium
      Noisemaker High Medium Medium High
      Spectator Low Irrelevant Irrelevant Low

      Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by answering the following question: How significant is that stakeholder to the M&A or divestiture process?

      These parameters are used to prioritize which stakeholders are most important and should receive your focused attention.

      1.1.5 Prioritize your stakeholders

      30 minutes

      Input: Stakeholder matrix

      Output: Stakeholder and influencer prioritization

      Materials: Flip charts, Markers, Sticky notes, M&A Buy Playbook

      Participants: IT executive leadership, M&A/divestiture stakeholders

      1. Identify the level of support of each stakeholder by answering the following question: How significant is that stakeholder to the M&A transaction process?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.

      Stakeholder

      Category

      Level of Support

      Prioritization

      CMO Spectator Neutral Irrelevant
      CIO Player Supporter Critical

      Record the results in the M&A Buy Playbook.

      Define strategies for engaging stakeholders by type

      A revisit to the map of stakeholder categories, but with strategies listed for each one, and arrows on the side instead of an axis. The vertical arrow is 'Authority', which increases upward, and the horizontal axis is Ownership/Interest which increases as it moves to the right. The strategy for 'Players' is 'Engage', for 'Mediators' is 'Satisfy', for 'Noisemakers' is 'Inform', and for 'Spectators' is 'Monitor'.

      Type

      Quadrant

      Actions

      Players High influence, high interest – actively engage Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.
      Mediators High influence, low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.
      Noisemakers Low influence, high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
      Spectators Low influence, low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying stakeholder groups, the IT executive leader can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of Mediators and Players are met.

      1.1.6 Plan to communicate

      30 minutes

      Input: Stakeholder priority, Stakeholder categorization, Stakeholder influence

      Output: Stakeholder communication plan

      Materials: Flip charts, Markers, Sticky notes, M&A Buy Playbook

      Participants: IT executive leadership, M&A/divestiture stakeholders

      The purpose of this activity is to make a communication plan for each of the stakeholders identified in the previous activities, especially those who will have a critical role in the M&A transaction process.

      1. In the M&A Buy Playbook, input the type of influence each stakeholder has on IT, how they would be categorized in the M&A process, and their level of priority. Use this information to create a communication plan.
      2. Determine the methods and frequency of communication to keep the necessary stakeholder satisfied and maintain or enhance IT’s profile within the organization.

      Record the results in the M&A Buy Playbook.

      Proactive

      Step 1.2

      Assess IT’s Current Value and Method to Achieve a Future State

      Activities

      • 1.2.1 Valuate IT
      • 1.2.2 Assess the IT/digital strategy

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical stakeholders to M&A

      Outcomes of Step

      Identify critical opportunities to optimize IT and meet strategic business goals through a merger, acquisition, or divestiture.

      How to valuate your IT environment

      And why it matters so much

      • Valuating your current organization’s IT environment is a critical step that all IT organizations should take, whether involved in an M&A or not, to fully understand what it might be worth.
      • The business investments in IT can be directly translated into a value amount. For every $1 invested in IT, the business might be gaining $100 in value back or possibly even loosing $100.
      • Determining, documenting, and communicating this information ensures that the business takes IT’s suggestions seriously and recognizes why investing in IT is so critical.
      • There are three ways a business or asset can be valuated:
        • Cost Approach: Look at the costs associated with building, purchasing, replacing, and maintaining a given aspect of the business.
        • Market Approach: Look at the relative value of a particular aspect of the business. Relative value can fluctuate and depends on what the markets and consequently society believe that particular element is worth.
        • Discounted Cash Flow Approach: Focus on what the potential value of the business could be or the intrinsic value anticipated due to future profitability.
      • (Source: “Valuation Methods,” Corporate Finance Institute)

      Four ways to create value through digital

      1. Reduced costs
      2. Improved customer experience
      3. New revenue sources
      4. Better decision making
      5. (Source: McKinsey & Company)

      1.2.1 Valuate IT

      1 day

      Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk

      Output: Valuation of IT

      Materials: Relevant templates/tools listed on the following slides, Capital budget, Operating budget, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership

      The purpose of this activity is to demonstrate that IT is not simply an operational functional area that diminishes business resources. Rather, IT contributes significant value to the business.

      1. Review each of the following slides to valuate IT’s data, applications, infrastructure and operations, and security and risk. These valuations consider several tangible and intangible factors and result in a final dollar amount.
      2. Input the financial amounts identified for each critical area into a summary slide. Use this information to determine where IT is delivering value to the organization.

      Info-Tech Insight

      Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.

      Record the results in the M&A Buy Playbook.

      Data valuation

      Data valuation identifies how you monetize the information that your organization owns.

      Create a data value chain for your organization

      When valuating the information and data that exists in an organization, there are many things to consider.

      Info-Tech has two tools that can support this process:

      1. Information Asset Audit Tool: Use this tool first to take inventory of the different information assets that exist in your organization.
      2. Data Valuation Tool: Once information assets have been accounted for, valuate the data that exists within those information assets.

      Data Collection

      Insight Creation

      Value Creation

      Data Valuation

      01 Data Source
      02 Data Collection Method
      03 Data
      04 Data Analysis
      05 Insight
      06 Insight Delivery
      07 Consumer
      08 Value in Data
      09 Value Dimension
      10 Value Metrics Group
      11 Value Metrics
      Screenshots of Tab 2 of Info-Tech's Data Valuation Tool.

      Instructions

      1. Using the Data Valuation Tool, start gathering information based on the eight steps above to understand your organization’s journey from data to value.
      2. Identify the data value spectrum. (For example: customer sales service, citizen licensing service, etc.)
      3. Fill out the columns for data sources, data collection, and data first.
      4. Capture data analysis and related information.
      5. Then capture the value in data.
      6. Add value dimensions such as usage, quality, and economic dimensions.
        • Remember that economic value is not the only dimension, and usage/quality has a significant impact on economic value.
      7. Collect evidence to justify your data valuation calculator (market research, internal metrics, etc.).
      8. Finally, calculate the value that has a direct correlation with underlying value metrics.

      Application valuation

      Calculate the value of your IT applications

      When valuating the applications and their users in an organization, consider using a business process map. This shows how business is transacted in the company by identifying which IT applications support these processes and which business groups have access to them. Info-Tech has a business process mapping tool that can support this process:

      • Enterprise Integration Process Mapping Tool: Complete this tool first to map the different business processes to the supporting applications in your organization.

      Instructions

      1. Start by calculating user costs. This is the product of the (# of users) × (% of time spent using IT) × (fully burdened salary).
      2. Identify the revenue per employee and divide that by the average cost per employee to calculate the derived productivity ratio (DPR).
      3. Once you have calculated the user costs and DPR, multiply those total values together to get the application value.
      4. User Costs

        Total User Costs

        Derived Productivity Ratio (DPR)

        Total DPR

        Application Value

        # of users % time spent using IT Fully burdened salary Multiply values from the 3 user costs columns Revenue per employee Average cost per employee (Revenue P.E) ÷ (Average cost P.E) (User costs) X (DPR)

      5. Once the total application value is established, calculate the combined IT and business costs of delivering that value. IT and business costs include inflexibility (application maintenance), unavailability (downtime costs, including disaster exposure), IT costs (common costs statistically allocated to applications), and fully loaded cost of active (full-time equivalent [FTE]) users.
      6. Calculate the net value of applications by subtracting the total IT and business costs from the total application value calculated in step 3.
      7. IT and Business Costs

        Total IT and Business Costs

        Net Value of Applications

        Application maintenance Downtime costs (include disaster exposure) Common costs allocated to applications Fully loaded costs of active (FTE) users Sum of values from the four IT and business costs columns (Application value) – (IT and business costs)

      (Source: CSO)

      Infrastructure valuation

      Assess the foundational elements of the business’ information technology

      The purpose of this exercise is to provide a high-level infrastructure valuation that will contribute to valuating your IT environment.

      Calculating the value of the infrastructure will require different methods depending on the environment. For example, a fully cloud-hosted organization will have different costs than a fully on-premises IT environment.

      Instructions:

      1. Start by listing all of the infrastructure-related items that are relevant to your organization.
      2. Once you have finalized your items column, identify the total costs/value of each item.
        • For example, total software costs would include servers and storage.
      3. Calculate the total cost/value of your IT infrastructure by adding all of values in the right column.

      Item

      Costs/Value

      Hardware Assets Total Value +$3.2 million
      Hardware Leased/Service Agreement -$
      Software Purchased +$
      Software Leased/Service Agreement -$
      Operational Tools
      Network
      Disaster Recovery
      Antivirus
      Data Centers
      Service Desk
      Other Licenses
      Total:

      For additional support, download the M&A Runbook for Infrastructure and Operations.

      Risk and security

      Assess risk responses and calculate residual risk

      The purpose of this exercise is to provide a high-level risk assessment that will contribute to valuating your IT environment. For a more in-depth risk assessment, please refer to the Info-Tech tools below:

      1. Risk Register Tool
      2. Security M&A Due Diligence Tool

      Instructions

      1. Review the probability and impact scales below and ensure you have the appropriate criteria that align to your organization before you conduct a risk assessment.
      2. Identify the probability of occurrence and estimated financial impact for each risk category detail and fill out the table on the right. Customize the table as needed so it aligns to your organization.
      3. Probability of Risk Occurrence

        Occurrence Criteria
        (Classification; Probability of Risk Event Within One Year)

        Negligible Very Unlikely; ‹20%
        Very Low Unlikely; 20 to 40%
        Low Possible; 40 to 60%
        Moderately Low Likely; 60 to 80%
        Moderate Almost Certain; ›80%

      Note: If needed, you can customize this scale with the severity designations that you prefer. However, make sure you are always consistent with it when conducting a risk assessment.

      Financial & Reputational Impact

      Budgetary and Reputational Implications
      (Financial Impact; Reputational Impact)

      Negligible (‹$10,000; Internal IT stakeholders aware of risk event occurrence)
      Very Low ($10,000 to $25,000; Business customers aware of risk event occurrence)
      Low ($25,000 to $50,000; Board of directors aware of risk event occurrence)
      Moderately Low ($50,000 to $100,000; External customers aware of risk event occurrence)
      Moderate (›$100,000; Media coverage or regulatory body aware of risk event occurrence)

      Risk Category Details

      Probability of Occurrence

      Estimated Financial Impact

      Estimated Severity (Probability X Impact)

      Capacity Planning
      Enterprise Architecture
      Externally Originated Attack
      Hardware Configuration Errors
      Hardware Performance
      Internally Originated Attack
      IT Staffing
      Project Scoping
      Software Implementation Errors
      Technology Evaluation and Selection
      Physical Threats
      Resource Threats
      Personnel Threats
      Technical Threats
      Total:

      1.2.2 Assess the IT/digital strategy

      4 hours

      Input: IT strategy, Digital strategy, Business strategy

      Output: An understanding of an executive business stakeholder’s perception of IT, Alignment of IT/digital strategy and overall organization strategy

      Materials: Computer, Whiteboard and markers, M&A Buy Playbook

      Participants: IT executive/CIO, Business executive/CEO

      The purpose of this activity is to review the business and IT strategies that exist to determine if there are critical capabilities that are not being supported.

      Ideally, the IT and digital strategies would have been created following development of the business strategy. However, sometimes the business strategy does not directly call out the capabilities it requires IT to support.

      1. On the left half of the corresponding slide in the M&A Buy Playbook, document the business goals, initiatives, and capabilities. Input this information from the business or digital strategies. (If more space for goals, initiatives, or capabilities is needed, duplicate the slide).
      2. On the other half of the slide, document the IT goals, initiatives, and capabilities. Input this information from the IT strategy and digital strategy.

      For additional support, see Build a Business-Aligned IT Strategy.

      Record the results in the M&A Buy Playbook.

      Proactive

      Step 1.3

      Drive Innovation and Suggest Growth Opportunities

      Activities

      • 1.3.1 Determine pain points and opportunities
      • 1.3.2 Align goals with opportunities
      • 1.3.3 Recommend growth opportunities

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical M&A stakeholders

      Outcomes of Step

      Establish strong relationships with critical M&A stakeholders and position IT as an innovative business partner that can suggest growth opportunities.

      1.3.1 Determine pain points and opportunities

      1-2 hours

      Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade

      Output: List of pain points or opportunities that IT can address

      Materials: Computer, Whiteboard and markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Business stakeholders

      The purpose of this activity is to determine the pain points and opportunities that exist for the organization. These can be external or internal to the organization.

      1. Identify what opportunities exist for your organization. Opportunities are the potential positives that the organization would want to leverage.
      2. Next, identify pain points, which are the potential negatives that the organization would want to alleviate.
      3. Spend time considering all the options that might exist, and keep in mind what has been identified previously.

      Opportunities and pain points can be trends, other departments’ initiatives, business perspectives of IT, etc.

      Record the results in the M&A Buy Playbook.

      1.3.2 Align goals with opportunities

      1-2 hours

      Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade, List of pain points and opportunities

      Output: An understanding of an executive business stakeholder’s perception of IT, Foundations for growth strategy

      Materials: Computer, Whiteboard and markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Business stakeholders

      The purpose of this activity is to determine whether a growth or separation strategy might be a good suggestion to the business in order to meet its business objectives.

      1. For the top three to five business goals, consider:
        1. Underlying drivers
        2. Digital opportunities
        3. Whether a growth or reduction strategy is the solution
      2. Just because a growth or reduction strategy is a solution for a business goal does not necessarily indicate M&A is the way to go. However, it is important to consider before you pursue suggesting M&A.

      Record the results in the M&A Buy Playbook.

      1.3.3 Recommend growth opportunities

      1-2 hours

      Input: Growth or separation strategy opportunities to support business goals, Stakeholder communication plan, Rationale for the suggestion

      Output: M&A transaction opportunities suggested

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO, Business executive/CEO

      The purpose of this activity is to recommend a merger, acquisition, or divestiture to the business.

      1. Identify which of the business goals the transaction would help solve and why IT is the one to suggest such a goal.
      2. Leverage the stakeholder communication plan identified previously to give insight into stakeholders who would have a significant level of interest, influence, or support in the process.

      Info-Tech Insight

      With technology and digital driving many transactions, leverage this opening and begin the discussions with your business on how and why an acquisition would be a great opportunity.

      Record the results in the M&A Buy Playbook.

      By the end of this Proactive phase, you should:

      Be prepared to suggest M&A opportunities to support your company’s goals through growth or acquisition transactions

      Key outcome from the Proactive phase

      Develop progressive relationships and strong communication with key stakeholders to suggest or be aware of transformational opportunities that can be achieved through growth or reduction strategies such as mergers, acquisitions, or divestitures.

      Key deliverables from the Proactive phase
      • Business perspective of IT examined
      • Key stakeholders identified and relationship to the M&A process outlined
      • Ability to valuate the IT environment and communicate IT’s value to the business
      • Assessment of the business, digital, and IT strategies and how M&As could support those strategies
      • Pain points and opportunities that could be alleviated or supported through an M&A transaction
      • Acquisition or buying recommendations

      The Buy Blueprint

      Phase 2

      Discovery & Strategy

      Phase 1

      Phase 2

      Phase 3Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Growth Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Acquisition
      • 3.1 Assess the Target Organization
      • 3.2 Prepare to Integrate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Create the mission and vision
      • Identify the guiding principles
      • Create the future-state operating model
      • Determine the transition team
      • Document the M&A governance
      • Create program metrics
      • Establish the integration strategy
      • Conduct a RACI
      • Create the communication plan
      • Assess the potential organization(s)

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Transaction FoundationDiscover the Motivation for AcquiringFormalize the Program PlanCreate the Valuation FrameworkStrategize the TransactionNext Steps and Wrap-Up (offsite)

      Activities

      • 0.1 Conduct the CIO Business Vision and CEO-CIO Alignment diagnostics
      • 0.2 Identify key stakeholders and outline their relationship to the M&A process
      • 0.3 Identify the rationale for the company's decisions to pursue an acquisition
      • 1.1 Review the business rationale for the acquisition
      • 1.2 Assess the IT/digital strategy
      • 1.3 Identify pain points and opportunities tied to the acquisition
      • 1.4 Create the IT vision statement, create the IT mission statement, and identify IT guiding principles
      • 2.1 Create the future-state operating model
      • 2.2 Determine the transition team
      • 2.3 Document the M&A governance
      • 2.4 Establish program metrics
      • 3.1 Valuate your data
      • 3.2 Valuate your applications
      • 3.3 Valuate your infrastructure
      • 3.4 Valuate your risk and security
      • 3.5 Combine individual valuations to make a single framework
      • 4.1 Establish the integration strategy
      • 4.2 Conduct a RACI
      • 4.3 Review best practices for assessing target organizations
      • 4.4 Create the communication plan
      • 5.1 Complete in-progress deliverables from previous four days
      • 5.2 Set up review time for workshop deliverables and to discuss next steps

      Deliverables

      1. Business perspectives of IT
      2. Stakeholder network map for M&A transactions
      1. Business context implications for IT
      2. IT’s acquisition strategic direction
      1. Operating model for future state
      2. Transition team
      3. Governance structure
      4. M&A program metrics
      1. IT valuation framework
      1. Integration strategy
      2. RACI
      3. Communication plan
      1. Completed M&A program plan and strategy
      2. Prepared to assess target organization(s)

      What is the Discovery & Strategy phase?

      Pre-transaction state

      The Discovery & Strategy phase during an acquisition is a unique opportunity for many IT organizations. IT organizations that can participate in the acquisition transaction at this stage are likely considered a strategic partner of the business.

      For one-off acquisitions, IT being invited during this stage of the process is rare. However, for organizations that are preparing to engage in many acquisitions over the coming years, this type of strategy will greatly benefit from IT involvement. Again, the likelihood of participating in an M&A transaction is increasing, making it a smart IT leadership decision to, at the very least, loosely prepare a program plan that can act as a strategic pillar throughout the transaction.

      During this phase of the pre-transaction state, IT will also be asked to participate in ensuring that the potential organization being sought will be able to meet any IT-specific search criteria that was set when the transaction was put into motion.

      Goal: To identify a repeatable program plan that IT can leverage when acquiring all or parts of another organization’s IT environment, ensuring customer satisfaction and business continuity

      Discovery & Strategy Prerequisite Checklist

      Before coming into the Discovery & Strategy phase, you should have addressed the following:

      • Understand the business perspective of IT.
      • Know the key stakeholders and have outlined their relationships to the M&A process.
      • Be able to valuate the IT environment and communicate IT's value to the business.
      • Understand the rationale for the company's decisions to pursue an acquisition and the opportunities or pain points the acquisition should address.

      Discovery & Strategy

      Step 2.1

      Establish the M&A Program Plan

      Activities

      • 2.1.1 Create the mission and vision
      • 2.1.2 Identify the guiding principles
      • 2.1.3 Create the future-state operating model
      • 2.1.4 Determine the transition team
      • 2.1.5 Document the M&A governance
      • 2.1.6 Create program metrics

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Outcomes of Step

      Establish an M&A program plan that can be repeated across acquisitions.

      The vision and mission statements clearly articulate IT’s aspirations and purpose

      The IT vision statement communicates a desired future state of the IT organization, whereas the IT mission statement portrays the organization’s reason for being. While each serves its own purpose, they should both be derived from the business context implications for IT.

      Vision Statements

      Mission Statements

      Characteristics

      • Describe a desired future
      • Focus on ends, not means
      • Concise
      • Aspirational
      • Memorable
      • Articulate a reason for existence
      • Focus on how to achieve the vision
      • Concise
      • Easy to grasp
      • Sharply focused
      • Inspirational

      Samples

      To be a trusted advisor and partner in enabling business innovation and growth through an engaged IT workforce. (Source: Business News Daily) IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset. (Source: Forbes, 2013)

      2.1.1 Create the mission and vision statements

      2 hours

      Input: Business objectives, IT capabilities, Rationale for the transaction

      Output: IT’s mission and vision statements for growth strategies tied to mergers, acquisitions, and divestitures

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create mission and vision statements that reflect IT’s intent and method to support the organization as it pursues a growth strategy.

      1. Review the definitions and characteristics of mission and vision statements.
      2. Brainstorm different versions of the mission and vision statements.
      3. Edit the statements until you get to a single version of each that accurately reflects IT’s role in the growth process.

      Record the results in the M&A Buy Playbook.

      Guiding principles provide a sense of direction

      IT guiding principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting IT investment portfolio management, solution development, and procurement decisions.

      A diagram illustrating the place of 'IT guiding principles' in the process of making 'Decisions on the use of IT'. There are four main items, connecting lines naming the type of process in getting from one step to the next, and a line underneath clarifying the questions asked at each step. On the far left, over the question 'What decisions should be made?', is 'Business context and IT implications'. This flows forward to 'IT guiding principles', and they are connected by 'Influence'. Next, over the question 'How should decisions be made?', is the main highlighted section. 'IT guiding principles' flows forward to 'Decisions on the use of IT', and they are connected by 'Guide and inform'. On the far right, over the question 'Who has the accountability and authority to make decisions?', is 'IT policies'. This flows back to 'Decisions on the use of IT', and they are connected by 'Direct and control'.

      IT principles must be carefully constructed to make sure they are adhered to and relevant

      Info-Tech has identified a set of characteristics that IT principles should possess. These characteristics ensure the IT principles are relevant and followed in the organization.

      Approach focused. IT principles should be focused on the approach – how the organization is built, transformed, and operated – as opposed to what needs to be built, which is defined by both functional and non-functional requirements.

      Business relevant. Create IT principles that are specific to the organization. Tie IT principles to the organization’s priorities and strategic aspirations.

      Long lasting. Build IT principles that will withstand the test of time.

      Prescriptive. Inform and direct decision making with actionable IT principles. Avoid truisms, general statements, and observations.

      Verifiable. If compliance can’t be verified, people are less likely to follow the principle.

      Easily Digestible. IT principles must be clearly understood by everyone in IT and by business stakeholders. IT principles aren’t a secret manuscript of the IT team. IT principles should be succinct; wordy principles are hard to understand and remember.

      Followed. Successful IT principles represent a collection of beliefs shared among enterprise stakeholders. IT principles must be continuously communicated to all stakeholders to achieve and maintain buy-in.

      In organizations where formal policy enforcement works well, IT principles should be enforced through appropriate governance processes.

      Consider the example principles below

      IT Principle Name

      IT Principle Statement

      1. Risk Management We will ensure that the organization’s IT Risk Management Register is properly updated to reflect all potential risks and that a plan of action against those risks has been identified.
      2. Transparent Communication We will ensure employees are spoken to with respect and transparency throughout the transaction process.
      3. Integration for Success We will create an integration strategy that enables the organization and clearly communicates the resources required to succeed.
      4. Managed Data We will handle data creation, modification, integration, and use across the enterprise in compliance with our data governance policy.
      5. Establish a single IT Environment We will identify, prioritize, and manage the applications and services that IT provides in order to eliminate redundant technology and maximize the value that users and customers experience.
      6. Compliance With Laws and Regulations We will operate in compliance with all applicable laws and regulations for both our organization and the potentially purchased organization.
      7. Defined Value We will create a plan of action that aligns with the organization’s defined value expectations.
      8. Network Readiness We will ensure that employees and customers have immediate access to the network with minimal or no outages.
      9. Operating to Succeed We will bring all of IT into a central operating model within two years of the transaction.

      2.1.2 Identify the guiding principles

      2 hours

      Input: Business objectives, IT capabilities, Rationale for the transaction, Mission and vision statements

      Output: IT’s guiding principles for growth strategies tied to mergers, acquisitions, and divestitures

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create the guiding principles that will direct the IT organization throughout the growth strategy process.

      1. Review the role of guiding principles and the examples of guiding principles that organizations have used.
      2. Brainstorm different versions of the guiding principles. Each guiding principle should start with the phrase “We will…”
      3. Edit and consolidate the statements until you have a list of approximately eight to ten statements that accurately reflect IT’s role in the growth process.
      4. Review the guiding principles every six months to ensure they continue to support the delivery of the business’ growth strategy goals.

      Record the results in the M&A Buy Playbook.

      Create two IT teams to support the transaction

      IT M&A Transaction Team

      • The IT M&A Transaction Team should consist of the strongest members of the IT team who can be expected to deliver on unusual or additional tasks not asked of them in normal day-to-day operations.
      • The roles selected for this team will have very specific skills sets or deliver on critical integration capabilities, making their involvement in the combination of two or more IT environments paramount.
      • These individuals need to have a history of proving themselves very trustworthy, as they will likely be required to sign an NDA as well.
      • Expect to have to certain duplicate capabilities or roles across the M&A transaction team and operational team.

      IT Operational Team

      • This group is responsible for ensuring the business operations continue.
      • These employees might be those who are newer to the organization but can be counted on to deliver consistent IT services and products.
      • The roles of this team should ensure that end users or external customers remain satisfied.

      Key capabilities to support M&A

      Consider the following capabilities when looking at who should be a part of the M&A transaction team.

      Employees who have a significant role in ensuring that these capabilities are being delivered will be a top priority.

      Infrastructure

      • Systems Integration
      • Data Management

      Business Focus

      • Service-Level Management
      • Enterprise Architecture
      • Stakeholder Management
      • Project Management

      Risk & Security

      • Privacy Management
      • Security Management
      • Risk & Compliance Management

      Build a lasting and scalable operating model

      An operating model is an abstract visualization, used like an architect’s blueprint, that depicts how structures and resources are aligned and integrated to deliver on the organization’s strategy.

      It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint before embarking on detailed organizational design.

      The visual should highlight which capabilities are critical to attaining strategic goals and clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization.

      As you assess the current operating model, consider the following:

      • Does the operating model contain all the necessary capabilities your IT organization requires to be successful?
      • What capabilities should be duplicated?
      • Are there individuals with the skill set to support those roles? If not, is there a plan to acquire or develop those skills?
      • A dedicated project team strictly focused on M&A is great. However, is it feasible for your organization? If not, what blockers exist?
      A diagram with 'Initiatives' and 'Solutions' on the left and right of an area chart, 'Customer' at the top, the area between them labelled 'Functional Area n', and six horizontal bars labelled 'IT Capability' stacked on top of each other. The 'IT Capability' bars are slightly skewed to the 'Solutions' side of the chart.

      Info-Tech Insight

      Investing time up-front getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and allowing your model to change as the business changes.

      2.1.3 Create the future-state operating model

      4 hours

      Input: Current operating model, IT strategy, IT capabilities, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

      Output: Future-state operating model

      Materials: Operating model, Capability overlay, Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to establish what the future-state operating model will be if your organization needs to adjust to support a growth transaction.

      1. Ensuring that all the IT capabilities are identified by the business and IT strategy, document your organization’s current operating model.
      2. Identify what core capabilities would be critical to the buying transaction process and integration. Highlight and make copies of those capabilities in the M&A Buy Playbook.
      3. Arrange the capabilities to clearly show the flow of inputs and outputs. Identify critical stakeholders of the process (such as customers or end users) if that will help the flow.
      4. Ensure the capabilities that will be decentralized are clearly identified. Decentralized capabilities do not exist within the central IT organization but rather in specific lines of businesses or products to better understand needs and deliver on the capability.

      An example operating model is included in the M&A Buy Playbook. This process benefits from strong reference architecture and capability mapping ahead of time.

      Record the results in the M&A Buy Playbook.

      2.1.4 Determine the transition team

      3 hours

      Input: IT capabilities, Future-state operating model, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

      Output: Transition team

      Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a team that will support your IT organization throughout the transaction. Determining which capabilities and therefore which roles will be required ensures that the business will continue to get the operational support it needs.

      1. Based on the outcome of activity 2.1.3, review the capabilities that your organization will require on the transition team. Group capabilities into functional groups containing capabilities that are aligned well with one another because they have similar responsibilities and functionalities.
      2. Replace the capabilities with roles. For example, stakeholder management, requirements gathering, and project management might be one functional group. Project management and stakeholder management might combine to create a project manager role.
      3. Review the examples in the M&A Buy Playbook and identify which roles will be a part of the transition team.

      For more information, see Redesign Your Organizational Structure

      What is governance?

      And why does it matter so much to IT and the M&A process?

      • Governance is the method in which decisions get made, specifically as they impact various resources (time, money, and people).
      • Because M&A is such a highly governed transaction, it is important to document the governance bodies that exist in your organization.
      • This will give insight into what types of governing bodies there are, what decisions they make, and how that will impact IT.
      • For example, funds to support integration need to be discussed, approved, and supplied to IT from a governing body overseeing the acquisition.
      • A highly mature IT organization will have automated governance, while a seemingly non-existent governance process will be considered ad hoc.
      A pyramid with four levels representing the types of governing bodies that are available with differing levels of IT maturity. An arrow beside the pyramid points upward. The bottom of the arrow is labelled 'Traditional (People and document centric)' and the top is labelled 'Adaptive (Data centric)'. Starting at the bottom of the pyramid is level 1 'Ad Hoc Governance', 'Governance that is not well defined or understood within the organization. It occurs out of necessity but often not by the right people'. Level 2 is 'Controlled Governance', 'Governance focused on compliance and decisions driven by hierarchical authority. Levels of authority are defined and often driven by regulatory'. Level 3 is 'Agile Governance', 'Governance that is flexible to support different needs and quick response in the organization. Driven by principles and delegated throughout the company'. At the top of the pyramid is level 4 'Automated Governance', 'Governance that is entrenched and automated into organizational processes and product/service design. Empowered and fully delegated governance to maintain fit and drive organizational success and survival'.

      2.1.5 Document M&A governance

      1-2 hours

      Input: List of governing bodies, Governing body committee profiles, Governance structure

      Output: Documented method on how decisions are made as it relates to the M&A transaction

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine the method in which decisions are made throughout the M&A transaction as it relates to IT. This will require understanding both governing bodies internal to IT and those external to IT.

      1. First, determine the other governance structures within the organization that will impact the decisions made about M&A. List out these bodies or committees.
      2. Create a profile for each committee that looks at the membership, purpose of the committee, decision areas (authority), and the process of inputs and outputs. Ensure IT committees that will have a role in this process are also documented. Consider the benefits realized, risks, and resources required for each.
      3. Organize the committees into a structure, identifying the committees that have a role in defining the strategy, designing and building, and running.

      Record the results in the M&A Buy Playbook.

      Current-state structure map – definitions of tiers

      Strategy: These groups will focus on decisions that directly connect to the strategic direction of the organization.

      Design & Build: The second tier of groups will oversee prioritization of a certain area of governance as well as design and build decisions that feed into strategic decisions.

      Run: The lowest level of governance will be oversight of more-specific initiatives and capabilities within IT.

      Expect tier overlap. Some committees will operate in areas that cover two or three of these governance tiers.

      Measure the IT program’s success in terms of its ability to support the business’ M&A goals

      Upper management will measure IT’s success based on your ability to support the underlying reasons for the M&A. Using business metrics will help assure business stakeholders that IT understands their needs and is working with the business to achieve them.

      Business-Specific Metrics

      • Revenue Growth: Increase in the top line as seen by market expansion, product expansion, etc. by percentage/time.
      • Synergy Extraction: Reduction in costs as determined by the ability to identify and eliminate redundancies over time.
      • Profit Margin Growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs over time.

      IT-Specific Metrics

      • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure over time.
      • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
      • Meeting or improving on IT budget estimates: Delivering successful IT integration on a budget that is the same or lower than the budget estimated during due diligence.
      • Meeting or improving on IT time-to-integration estimates: Delivering successful IT integration on a timeline that is the same or shorter than the timeline estimated during due diligence.
      • Business capability support: Delivering the end state of IT that supports the expected business capabilities and growth.

      Establish your own metrics to gauge the success of IT

      Establish SMART M&A Success Metrics

      S pecific Make sure the objective is clear and detailed.
      M easurable Objectives are measurable if there are specific metrics assigned to measure success. Metrics should be objective.
      A ctionable Objectives become actionable when specific initiatives designed to achieve the objective are identified.
      R ealistic Objectives must be achievable given your current resources or known available resources.
      T ime-Bound An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline.
      • What should IT consider when looking to identify potential additions, deletions, or modifications that will either add value to the organization or reduce costs/risks?
      • Provide a definition of synergies.
      • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure.
      • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
      • Meeting or improving on IT budget estimates: Delivering successful IT integration on a budget that is the same or lower than the budget estimated during due diligence.
      • Meeting or improving on IT time-to-integration estimates: Delivering successful IT integration on a timeline that is the same or shorter than the timeline estimated during due diligence.
      • Revenue growth: Increase in the top line as a result, as seen by market expansion, product expansion, etc.
      • Synergy extraction: Reduction in costs, as determined by the ability to identify and eliminate redundancies.
      • Profit margin growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs.

      Metrics for each phase

      1. Proactive

      2. Discovery & Strategy

      3. Valuation & Due Diligence

      4. Execution & Value Realization

      • % Share of business innovation spend from overall IT budget
      • % Critical processes with approved performance goals and metrics
      • % IT initiatives that meet or exceed value expectation defined in business case
      • % IT initiatives aligned with organizational strategic direction
      • % Satisfaction with IT's strategic decision-making abilities
      • $ Estimated business value added through IT-enabled innovation
      • % Overall stakeholder satisfaction with IT
      • % Percent of business leaders that view IT as an Innovator
      • % IT budget as a percent of revenue
      • % Assets that are not allocated
      • % Unallocated software licenses
      • # Obsolete assets
      • % IT spend that can be attributed to the business (chargeback or showback)
      • % Share of CapEx of overall IT budget
      • % Prospective organizations that meet the search criteria
      • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
      • % Business leaders that view IT as a Business Partner
      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target
      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT integration
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      2.1.6 Create program metrics

      1-2 hours

      Input: IT capabilities, Mission, vision, and guiding principles, Rationale for the acquisition

      Output: Program metrics to support IT throughout the M&A process

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine how IT’s success throughout a growth transaction will be measured and determined.

      1. Document a list of appropriate metrics on the whiteboard. Remember to include metrics that demonstrate the business impact. You can use the sample metrics listed on the previous slide as a starting point.
      2. Set a target and deadline for each metric. This will help the group determine when it is time to evaluate progression.
      3. Establish a baseline for each metric based on information collected within your organization.
      4. Assign an owner for tracking each metric as well as someone to be accountable for performance.

      Record the results in the M&A Buy Playbook.

      Discovery & Strategy

      Step 2.2

      Prepare IT to Engage in the Acquisition

      Activities

      • 2.2.1 Establish the integration strategy
      • 2.2.2 Conduct a RACI
      • 2.2.3 Create the communication plan
      • 2.2.4 Assess the potential organization(s)

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Outcomes of Step

      Identify IT’s plan of action when it comes to the acquisition and align IT’s integration strategy with the business’ M&A strategy.

      Integration strategies

      There are several IT integration strategies that will help you achieve your target technology environment.

      IT Integration Strategies
      • Absorption. Convert the target organization’s strategy, structure, processes, and/or systems to that of the acquiring organization.
      • Best-of-Breed. Pick and choose the most effective people, processes, and technologies to form an efficient operating model.
      • Transformation Retire systems from both organizations and use collective capabilities, data, and processes to create something entirely new.
      • Preservation Retain individual business units that will operate within their own capability. People, processes, and technologies are unchanged.

      The approach IT takes will depend on the business objectives for the M&A.

      • Generally speaking, the integration strategy is well understood and influenced by the frequency of and rationale for acquiring.
      • Based on the initiatives generated by each business process owner, you need to determine the IT integration strategy that will best support the desired target technology environment.

      Key considerations when choosing an IT integration strategy include:

      • What are the main business objectives of the M&A?
      • What are the key synergies expected from the transaction?
      • What IT integration best helps obtain these benefits?
      • What opportunities exist to position the business for sustainable growth?

      Absorption and best-of-breed

      Review highlights and drawbacks of absorption and best-of-breed integration strategies

      Absorption
        Highlights
      • Recommended for businesses striving to reduce costs and drive efficiency gains.
      • Economies of scale realized through consolidation and elimination of redundant applications.
      • Quickest path to a single company operation and systems as well as lower overall IT cost.
        Drawbacks
      • Potential for disruption of the target company’s business operations.
      • Requires significant business process changes.
      • Disregarding the target offerings altogether may lead to inferior system decisions that do not yield sustainable results.
      Best-of-Breed
        Highlights
      • Recommended for businesses looking to expand their market presence or acquire new products. Essentially aligning the two organizations in the same market.
      • Each side has a unique offering but complementing capabilities.
      • Potential for better buy-in from the target because some of their systems are kept, resulting in willingness to
        Drawbacks
      • May take longer to integrate because it tends to present increased complexity that results in higher costs and risks.
      • Requires major integration efforts from both sides of the company. If the target organization is uncooperative, creating the desired technology environment will be difficult.

      Transformation and preservation

      Review highlights and drawbacks of transformation and preservation integration strategies

      Transformation
        Highlights
      • This is the most customized approach, although it is rarely used.
      • It is essential to have an established long-term vision of business capabilities when choosing this path.
      • When executed correctly, this approach presents potential for significant upside and creation of sustainable competitive advantages.
        Drawbacks
      • This approach requires extensive time to implement, and the cost of integration work may be significant.
      • If a new system is created without strategic capabilities, the organizations will not realize long-term benefits.
      • The cost of correcting complexities at later stages in the integration effort may be drastic.
      Preservation
        Highlights
      • This approach is appropriate if the merging organizations will remain fairly independent, if there will be limited or no communication between companies, and if the companies’ market strategies, products, and channels are entirely distinct.
      • Environment can be accomplished quickly and at a low cost.
        Drawbacks
      • Impact to each business is minimal, but there is potential for lost synergies and higher operational costs. This may be uncontrollable if the natures of the two businesses are too different to integrate.
      • Reduced benefits and limited opportunities for IT integration.

      2.2.1 Establish the integration strategy

      1-2 hours

      Input: Business integration strategy, Guiding principles, M&A governance

      Output: IT’s integration strategy

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine IT’s approach to integration. The approach might differ slightly from transaction to transaction. However, the business’ approach to transactions should give insight into the general integration strategy IT should adopt.

      1. Make sure you have clearly articulated the business objectives for the M&A, the technology end state for IT, and the magnitude of the overall integration.
      2. Review and discuss the highlights and drawbacks of each type of integration.
      3. Use Info-Tech’s Integration Posture Selection Framework on the next slide to select the integration posture that will appropriately enable the business. Consider these questions during your discussion:
        1. What are the main business objectives of the M&A? What key IT capabilities will need to support business objectives?
        2. What key synergies are expected from the transaction? What opportunities exist to position the business for sustainable growth?
        3. What IT integration best helps obtain these benefits?

      Record the results in the M&A Buy Playbook.

      Integration Posture Selection Framework

      Business M&A Strategy

      Resultant Technology Strategy

      M&A Magnitude (% of Acquirer Assets, Income, or Market Value)

      IT Integration Posture

      A. Horizontal Adopt One Model ‹10% Absorption
      10 to 75% Absorption or Best-of-Breed
      ›75% Best-of-Breed
      B. Vertical Create Links Between Critical Systems Any
      • Preservation (Differentiated Functions)
      • Absorption or Best-of-Breed (Non-Differentiated Functions)
      C. Conglomerate Independent Model Any Preservation
      D. Hybrid: Horizontal & Conglomerate Independent Model Any Preservation

      2.2.2 Conduct a RACI

      1-2 hours

      Input: IT capabilities, Transition team, Integration strategy

      Output: Completed RACI for transition team

      Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to identify the core accountabilities and responsibilities for the roles identified as critical to your transition team. While there might be slight variation from transaction to transaction, ideally each role should be performing certain tasks.

      1. First, identify a list of critical tasks that need to be completed to support the purchase or acquisition. For example:
        • Communicate with the company M&A team.
        • Identify critical IT risks that could impact the organization after the transaction.
        • Identify key artifacts to collect and review during due diligence.
      2. Next, identify at the activity level which role is accountable or responsible for each activity. Enter an A for accountable, R for responsible, or A/R for both.

      Record the results in the M&A Buy Playbook.

      Communication and change

      Prepare key stakeholders for the potential changes

      • Anytime you are starting a project or program that will depend on users and stakeholders to give up their old way of doing things, change will force people to become novices again, leading to lost productivity and added stress.
      • Change management can improve outcomes for any project where you need people to adopt new tools and procedures, comply with new policies, learn new skills and behaviors, or understand and support new processes.
      • M&As move very quickly, and it can be very difficult to keep track of which stakeholders you need to be communicating with and what you should be communicating.
      • Not all organizations embrace or resist change in the same ways. Base your change communications on your organization’s cultural appetite for change in general.
        • Organizations with a low appetite for change will require more direct, assertive communications.
        • Organizations with a high appetite for change are more suited to more open, participatory approaches.

      Three key dimensions determine the appetite for cultural change:

      • Power Distance. Refers to the acceptance that power is distributed unequally throughout the organization.
        In organizations with a high power distance, the unequal power distribution is accepted by the less powerful employees.
      • Individualism. Organizations that score high in individualism have employees who are more independent. Those who score low in individualism fall into the collectivism side, where employees are strongly tied to one another or their groups.
      • Uncertainty Avoidance. Describes the level of acceptance that an organization has toward uncertainty. Those who score high in this area find that their employees do not favor uncertain situations, while those that score low in this area find that their employees are comfortable with change and uncertainty.

      2.2.3 Create the communication plan

      1-2 hours

      Input: IT’s M&A mission, vision, and guiding principles, M&A transition team, IT integration strategy, RACI

      Output: IT’s M&A communication plan

      Materials: Flip charts/whiteboard, Markers, RACI, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a communication plan that IT can leverage throughout the initiative.

      1. Create a structured communication plan that allows for continuous communication with the integration management office, senior management, and the business functional heads.
      2. Outline key topics of communication, with stakeholders, inputs, and outputs for each topic.
      3. Review Info-Tech’s example communication plan in the M&A Buy Playbook and update it with relevant information.
      4. Does this communication plan make sense for your organization? What doesn’t make sense? Adjust the communication guide to suit your organization.

      Record the results in the M&A Buy Playbook.

      Assessing potential organizations

      As soon as you have identified organizations to consider, it’s imperative to assess critical risks. Most IT leaders can attest that they will receive little to no notice when they have to assess the IT organization of a potential purchase. As a result, having a standardized template to quickly gauge the value of the business can be critical.

      Ways to Assess

      1. News: Assess what sort of news has been announced in relation to the organization. Have they had any risk incidents? Has a critical vendor announced working with them?
      2. LinkedIn: Scan through the LinkedIn profiles of employees. This will give you a sense of what platforms they have based on their employees.
      3. Trends: Some industries will have specific solutions that are relevant and popular. Assess what the key players are (if you don’t already know) to determine the solution.
      4. Business Architecture: While this assessment won’t perfect, try to understand the business’ value streams and the critical business and IT capabilities that would be needed to support them.

      2.2.4 Assess the potential organization(s)

      1-2 hours

      Input: Publicized historical risk events, Solutions and vendor contracts likely in the works, Trends

      Output: IT’s valuation of the potential organization(s) for acquisition

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO

      The purpose of this activity is to assess the organization(s) that your organization is considering purchasing.

      1. Complete the Historical Valuation Worksheet in the M&A Buy Playbook to understand the type of IT organization that your company may inherit and need to integrate with.
        • The business likely isn’t looking for in-depth details at this time. However, as the IT leader, it is your responsibility to ensure critical risks are identified and communicated to the business.
      2. Use the information identified to help the business narrow down which organizations should be targeted for the acquisition.

      Record the results in the M&A Buy Playbook.

      By the end of this pre-transaction phase you should:

      Have a program plan for M&As and a repeatable M&A strategy for IT when engaging in growth transactions

      Key outcomes from the Discovery & Strategy phase
      • Be prepared to analyze and recommend potential organizations that the business can acquire or merge with, using a strong program plan that can be repeated across transactions.
      • Create a M&A strategy that accounts for all the necessary elements of a transaction and ensures sufficient governance, capabilities, and metrics exist.
      Key deliverables from the Discovery & Strategy phase
      • Create vision and mission statements
      • Establish guiding principles
      • Create a future-state operating model
      • Identify the key roles for the transaction team
      • Identify and communicate the M&A governance
      • Determine target metrics
      • Identify the M&A operating model
      • Select the integration strategy framework
      • Conduct a RACI for key transaction tasks for the transaction team
      • Document the communication plan

      M&A Buy Blueprint

      Phase 3

      Due Diligence & Preparation

      Phase 1Phase 2

      Phase 3

      Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Growth Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Acquisition
      • 3.1 Assess the Target Organization
      • 3.2 Prepare to Integrate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Drive value with a due diligence charter
      • Identify data room artifacts
      • Assess technical debt
      • Valuate the target IT organization
      • Assess culture
      • Prioritize integration tasks
      • Establish the integration roadmap
      • Identify the needed workforce supply
      • Estimate integration costs
      • Create an employee transition plan
      • Create functional workplans for employees
      • Align project metrics with identified tasks

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team
      • Business leaders
      • Prospective IT organization
      • Transition team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Transaction FoundationDiscover the Motivation for IntegrationAssess the Target Organization(s)Create the Valuation FrameworkPlan the Integration RoadmapNext Steps and Wrap-Up (offsite)

      Activities

      • 0.1 Identify the rationale for the company's decisions to pursue an acquisition.
      • 0.2 Identify key stakeholders and determine the IT transaction team.
      • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
      • 1.1 Review the business rationale for the acquisition.
      • 1.2 Identify pain points and opportunities tied to the acquisition.
      • 1.3 Establish the integration strategy.
      • 1.4 Create the due diligence charter.
      • 2.1 Create a list of IT artifacts to be reviewed in the data room.
      • 2.2 Conduct a technical debt assessment.
      • 2.3 Assess the current culture and identify the goal culture.
      • 2.4 Identify the needed workforce supply.
      • 3.1 Valuate the target organization’s data.
      • 3.2 Valuate the target organization’s applications.
      • 3.3 Valuate the target organization’s infrastructure.
      • 3.4 Valuate the target organization’s risk and security.
      • 3.5 Combine individual valuations to make a single framework.
      • 4.1 Prioritize integration tasks.
      • 4.2 Establish the integration roadmap.
      • 4.3 Establish and align project metrics with identified tasks.
      • 4.4 Estimate integration costs.
      • 5.1 Complete in-progress deliverables from previous four days.
      • 5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. IT strategy
      2. IT operating model
      3. IT governance structure
      4. M&A transaction team
      1. Business context implications for IT
      2. Integration strategy
      3. Due diligence charter
      1. Data room artifacts
      2. Technical debt assessment
      3. Culture assessment
      4. Workforce supply identified
      1. IT valuation framework to assess target organization(s)
      1. Integration roadmap and associated resourcing
      1. Acquisition integration strategy for IT

      What is the Due Diligence & Preparation phase?

      Mid-transaction state

      The Due Diligence & Preparation phase during an acquisition is a critical time for IT. If IT fails to proactively participate in this phase, IT will have to merely react to integration expectations set by the business.

      While not all IT organizations are able to participate in this phase, the evolving nature of M&As to be driven by digital and technological capabilities increases the rationale for IT being at the table. Identifying critical IT risks, which will inevitably be business risks, begins during the due diligence phase.

      This is also the opportunity for IT to plan how it will execute the planned integration strategy. Having access to critical information only available in data rooms will further enable IT to successfully plan and execute the acquisition to deliver the value the business is seeking through a growth transaction.

      Goal: To thoroughly evaluate all potential risks associated with the organization(s) being pursued and create a detailed plan for integrating the IT environments

      Due Diligence Prerequisite Checklist

      Before coming into the Due Diligence & Preparation phase, you must have addressed the following:

      • Understand the rationale for the company's decisions to pursue an acquisition and what opportunities or pain points the acquisition should alleviate.
      • Identify the key roles for the transaction team.
      • Identify the M&A governance.
      • Determine target metrics.
      • Select an integration strategy framework.
      • Conduct a RACI for key transaction tasks for the transaction team.

      Before coming into the Due Diligence & Preparation phase, we recommend addressing the following:

      • Create vision and mission statements.
      • Establish guiding principles.
      • Create a future-state operating model.
      • Identify the M&A operating model.
      • Document the communication plan.
      • Examine the business perspective of IT.
      • Identify key stakeholders and outline their relationship to the M&A process.
      • Be able to valuate the IT environment and communicate IT’s value to the business.

      The Technology Value Trinity

      Delivery of Business Value & Strategic Needs

      • Digital & Technology Strategy
        The identification of objectives and initiatives necessary to achieve business goals.
      • IT Operating Model
        The model for how IT is organized to deliver on business needs and strategies.
      • Information & Technology Governance
        The governance to ensure the organization and its customers get maximum value from the use of information and technology.

      All three elements of the Technology Value Trinity work in harmony to deliver business value and achieve strategic needs. As one changes, the others need to change as well.

      • Digital and IT Strategy tells you what you need to achieve to be successful.
      • IT Operating Model and Organizational Design is the alignment of resources to deliver on your strategy and priorities.
      • Information & Technology Governance is the confirmation of IT’s goals and strategy, which ensures the alignment of IT and business strategy. It’s the mechanism by which you continuously prioritize work to ensure that what is delivered is in line with the strategy. This oversight evaluates, directs, and monitors the delivery of outcomes to ensure that the use of resources results in the achieving the organization’s goals.

      Too often strategy, operating model and organizational design, and governance are considered separate practices. As a result, “strategic documents” end up being wish lists, and projects continue to be prioritized based on who shouts the loudest – not based on what is in the best interest of the organization.

      Due Diligence & Preparation

      Step 3.1

      Assess the Target Organization

      Activities

      • 3.1.1 Drive value with a due diligence charter
      • 3.1.2 Identify data room artifacts
      • 3.1.3 Assess technical debt
      • 3.1.4 Valuate the target IT organization
      • 3.1.5 Assess culture

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team
      • Business leaders
      • Prospective IT organization
      • Transition team

      Outcomes of Step

      This step of the process is when IT should actively evaluate the target organization being pursued for acquisition.

      3.1.1 Drive value with a due diligence charter

      1-2 hours

      Input: Key roles for the transaction team, M&A governance, Target metrics, Selected integration strategy framework, RACI of key transaction tasks for the transaction team

      Output: IT Due Diligence Charter

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a charter leveraging the items completed in the previous phase, as listed on the Due Diligence Prerequisite Checklist slide, to gain executive sign-off.

      1. In the IT Due Diligence Charter in the M&A Buy Playbook, complete the aspects of the charter that are relevant for you and your organization.
      2. We recommend including these items in the charter:
        • Communication plan
        • Transition team roles
        • Goals and metrics for the transaction
        • Integration strategy
        • Acquisition RACI
      3. Once the charter has been completed, ensure that business executives agree to the charter and sign off on the plan of action.

      Record the results in the M&A Buy Playbook.

      3.1.2 Identify data room artifacts

      4 hours

      Input: Future-state operating model, M&A governance, Target metrics, Selected integration strategy framework, RACI of key transaction tasks for the transaction team

      Output: List of items to acquire and review in the data room

      Materials: Critical domain lists on following slides, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to create a list of the key artifacts that should be asked for and reviewed during the due diligence process.

      1. Review the lists on the following pages as a starting point. Identify which domains, stakeholders, artifacts, and information should be requested for the data room. This information should be directed to the target organization.
      2. IT leadership may or may not be asked to enter the data room directly. Therefore, it’s important that you clearly identify these artifacts.
      3. List each question or concern, select the associated workstream in the M&A Buy Playbook, and update the status of the information retrieval.
      4. Use the comments section to document your discoveries or concerns.

      Record the results in the M&A Buy Playbook.

      Critical domains

      Understand the key stakeholders and outputs for each domain

      Each critical domain will likely have different stakeholders who know that domain best. Communicate with these stakeholders throughout the M&A process to make sure you are getting accurate information and interpreting it correctly.

      Domain

      Stakeholders

      Key Artifacts

      Key Information to request

      Business
      • Enterprise Architecture
      • Business Relationship Manager
      • Business Process Owners
      • Business capability map
      • Capability map (the M&A team should be taking care of this, but make sure it exists)
      • Business satisfaction with various IT systems and services
      Leadership/IT Executive
      • CIO
      • CTO
      • CISO
      • IT budgets
      • IT capital and operating budgets (from current year and previous year)
      Data & Analytics
      • Chief Data Officer
      • Data Architect
      • Enterprise Architect
      • Master data domains, system of record for each
      • Unstructured data retention requirements
      • Data architecture
      • Master data domains, sources, and storage
      • Data retention requirements
      Applications
      • Applications Manager
      • Application Portfolio Manager
      • Application Architect
      • Applications map
      • Applications inventory
      • Applications architecture
      • Copy of all software license agreements
      • Copy of all software maintenance agreements
      Infrastructure
      • Head of Infrastructure
      • Enterprise Architect
      • Infrastructure Architect
      • Infrastructure Manager
      • Infrastructure map
      • Infrastructure inventory
      • Network architecture (including which data centers host which infrastructure and applications)
      • Inventory (including integration capabilities of vendors, versions, switches, and routers)
      • Copy of all hardware lease or purchase agreements
      • Copy of all hardware maintenance agreements
      • Copy of all outsourcing/external service provider agreements
      • Copy of all service-level agreements for centrally provided, shared services and systems
      Products and Services
      • Product Manager
      • Head of Customer Interactions
      • Product lifecycle
      • Product inventory
      • Customer market strategy

      Critical domains (continued)

      Understand the key stakeholders and outputs for each domain

      Domain

      Stakeholders

      Key Artifacts

      Key Information to request

      Operations
      • Head of Operations
      • Service catalog
      • Service overview
      • Service owners
      • Access policies and procedures
      • Availability and service levels
      • Support policies and procedures
      • Costs and approvals (internal and customer costs)
      IT Processes
      • CIO
      • IT Management
      • VP of IT Governance
      • VP of IT Strategy
      • IT process flow diagram
      • Processes in place and productivity levels (capacity)
      • Critical processes/processes the organization feels they do particularly well
      IT People
      • CIO
      • VP of Human Resources
      • IT organizational chart
      • Competency & capacity assessment
      • IT organizational structure (including resources from external service providers such as contractors) with appropriate job descriptions or roles and responsibilities
      • IT headcount and location
      Security
      • CISO
      • Security Architect
      • Security posture
      • Information security staff
      • Information security service providers
      • Information security tools
      • In-flight information security projects
      Projects
      • Head of Projects
      • Project portfolio
      • List of all future, ongoing, and recently completed projects
      Vendors
      • Head of Vendor Management
      • License inventory
      • Inventory (including what will and will not be transitioning, vendors, versions, number of licenses)

      Assess the target organization’s technical debt

      The other organization could be costly to purchase if not yet modernizing.

      • Consider the potential costs that your business will have to spend to get the other IT organization modernized or even digital.
      • This will be highly affected by your planned integration strategy.
      • A best-of-breed strategy might simply mean there's little to bring over from the other organization’s environment.
      • It’s often challenging to identify a direct financial cost for technical debt. Consider direct costs but also assess categories of impact that can have a long-term effect on your business: lost customer, staff, or business partner goodwill; limited flexibility and resilience; and health, safety, and compliance impacts.
      • Use more objective measures to track subjective impact. For example, consider the number of customers who could be significantly affected by each tech debt in the next quarter.

      Focus on solving the problems you need to address.

      Analyzing technical debt has value in that the analysis can help your organization make better risk management and resource allocation decisions.

      Review these examples of technical debt

      Do you have any of these challenges?

      Applications
      • Inefficient or incomplete code
      • Fragile or obsolete systems of record that limit the implementation of new functionality
      • Out-of-date IDEs or compilers
      • Unsupported applications
      Data & Analytics
      • Data presented via API that does not conform to chosen standards (EDI, NRF-ARTS, etc.)
      • Poor data governance
      • No transformation between OLTP and the data warehouse
      • Heavy use of OLTP for reporting
      • Lack of AI model and decision governance, maintenance
      End-User Computing
      • Aging and slow equipment
      • No configuration management
      • No MDM/UEM
      Security
      • Unpatched/unpatchable systems
      • Legacy firewalls
      • No data classification system
      • “Perimeter” security architecture
      • No documented security incident response
      • No policies, or unenforced policies
      Operations
      • Incomplete, ineffective, or undocumented business continuity and disaster recovery plans
      • Insufficient backups or archiving
      • Inefficient MACD processes
      • Application sprawl with no record of installed applications or licenses
      • No ticketing or ITSM system
      • No change management process
      • No problem management process
      • No event/alert management
      Infrastructure
      • End-of-life/unsupported equipment
      • Aging power or cooling systems
      • Water- or halon-based data center fire suppression systems
      • Out-of-date firmware
      • No DR site
      • Damaged or messy cabling
      • Lack of system redundancy
      • Integrated computers on business equipment (e.g. shop floor equipment, medical equipment) running out-of-date OS/software
      Project & Portfolio Management
      • No project closure process
      • Ineffective project intake process
      • No resource management practices

      “This isn’t a philosophical exercise. Knowing what you want to get out of this analysis informs the type of technical debt you will calculate and the approach you will take.” (Scott Buchholz, CTO, Deloitte Government & Public Services Practice, The Wall Street Journal, 2015)

      3.1.3 Assess technical debt

      1-2 hours

      Input: Participant views on organizational tech debt, Five to ten key technical debts, Business impact scoring scales, Reasonable next-quarter scenarios for each technical debt, Technical debt business impact analysis

      Output: Initial list of tech debt for the target organization

      Materials: Whiteboard, Sticky notes, Technical Debt Business Impact Analysis Tool, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Business leaders, Transition team

      The purpose of this activity is to assess the technical debt of the other IT organization. Taking on unnecessary technical debt is one of the biggest risks to the IT environment

      1. This activity can be completed by leveraging the blueprint Manage Your Technical Debt, specifically the Technical Debt Business Impact Analysis Tool. Complete the following activities in the blueprint:
        • 1.2.1 Identify your technical debt
        • 1.2.2 Select tech debt for your impact analysis
        • 2.2.2 Estimate tech debt impact
        • 2.2.3 Identify the most-critical technical debts
      2. Review examples of technical debt in the previous slide to assist you with this activity.
      3. Document the results from tab 3, Impact Analysis, in the M&A Buy Playbook if you are trying to record all artifacts related to the transaction in one place.

      Record the results in the M&A Buy Playbook.

      How to valuate an IT environment

      And why it matters so much

      • Valuating the target organization’s IT environment is a critical step to fully understand what it might be worth. Business partners are often not in the position to valuate the IT aspects to the degree that you would be.
      • The business investments in IT can be directly translated to a value amount. Meaning for every $1 invested in IT, the business might be gaining $100 in value back or possibly even loosing $100.
      • Determining, documenting, and communicating this information ensures that the business takes IT’s suggestions seriously and recognizes why investing in IT can be so critical.
      • There are three ways a business or asset can be valuated:
        • Cost Approach: Look at the costs associated with building, purchasing, replacing, and maintaining a given aspect of the business.
        • Market Approach: Look at the relative value of a particular aspect of the business. Relative value can fluctuate and depends on what the markets and consequently society believe that particular element is worth.
        • Discounted Cash Flow Approach: Focus on what the potential value of the business could be or the intrinsic value anticipated due to future profitability.

      The IT valuation conducted during due diligence can have a significant impact on the final financials of the transaction for the business.

      3.1.4 Valuate the target IT organization

      1 day

      Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk

      Output: Valuation of target organization’s IT

      Materials: Relevant templates/tools, Capital budget, Operating budget, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Prospective IT organization

      The purpose of this activity is to valuate the other IT organization.

      1. Review each of slides 42 to 45 to generate a valuation of IT’s data, applications, infrastructure, and security and risk. These valuations consider several tangible and intangible factors and result in a final dollar amount. For more information on this activity, review Activity 1.2.1 from the Proactive phase.
      2. Identify financial amounts for each critical area and add the financial output to the summary slide in the M&A Buy Playbook.
      3. Compare this information against your own IT organization’s valuation.
        1. Does it add value to your IT organization?
        2. Is there too much risk to accept if this transaction goes through?

      Info-Tech Insight

      Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.

      Record the results in the M&A Buy Playbook.

      Culture should not be overlooked, especially as it relates to the integration of IT environments

      • There are three types of culture that need to be considered.
      • Most importantly, this transition is an opportunity to change the culture that might exist in your organization’s IT environment.
      • Make a decision on which type of culture you’d like IT to have post-transition.

      Target Organization’s Culture

      The culture that the target organization is currently embracing. Their established and undefined governance practices will lend insight into this.

      Your Organization’s Culture

      The culture that your organization is currently embracing. Examine people’s attitudes and behaviors within IT toward their jobs and the organization.

      Ideal Culture

      What will the future culture of the IT organization be once integration is complete? Are there aspects that your current organization and the target organization embrace that are worth considering?

      Culture categories

      Map the results of the IT Culture Diagnostic to an existing framework

      Competitive
      • Autonomy
      • Confront conflict directly
      • Decisive
      • Competitive
      • Achievement oriented
      • Results oriented
      • High performance expectations
      • Aggressive
      • High pay for good performance
      • Working long hours
      • Having a good reputation
      • Being distinctive/different
      Innovative
      • Adaptable
      • Innovative
      • Quick to take advantage of opportunities
      • Risk taking
      • Opportunities for professional growth
      • Not constrained by rules
      • Tolerant
      • Informal
      • Enthusiastic
      Traditional
      • Stability
      • Reflective
      • Rule oriented
      • Analytical
      • High attention to detail
      • Organized
      • Clear guiding philosophy
      • Security of employment
      • Emphasis on quality
      • Focus on safety
      Cooperative
      • Team oriented
      • Fair
      • Praise for good performance
      • Supportive
      • Calm
      • Developing friends at work
      • Socially responsible

      Culture Considerations

      • What culture category was dominant for each IT organization?
      • Do you share the same dominant category?
      • Is your current dominant culture category the most ideal to have post-integration?

      3.1.5 Assess Culture

      3-4 hours

      Input: Cultural assessments for current IT organization, Cultural assessment for target IT organization

      Output: Goal for IT culture

      Materials: IT Culture Diagnostic, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, IT employees of current organization, IT employees of target organization, Company M&A team

      The purpose of this activity is to assess the different cultures that might exist within the IT environments of both organizations. More importantly, your IT organization can select its desired IT culture for the long term if it does not already exist.

      1. Complete this activity by leveraging the blueprint Fix Your IT Culture, specifically the IT Culture Diagnostic. Fill out the diagnostic for the IT department in your organization:
        1. Answer the 16 questions in tab 2, Diagnostic.
        2. Find out your dominant culture and review recommendations in tab 3, Results.
      2. Document the results from tab 3, Results, in the M&A Buy Playbook if you are trying to record all artifacts related to the transaction in one place.
      3. Repeat the activity for the target organization.
      4. Leverage the information to determine what the goal for the culture of IT will be post-integration if it will differ from the current culture.

      Record the results in the M&A Buy Playbook.

      Due Diligence & Preparation

      Step 3.2

      Prepare to Integrate

      Activities

      • 3.2.1 Prioritize integration tasks
      • 3.2.2 Establish the integration roadmap
      • 3.2.3 Identify the needed workforce supply
      • 3.2.4 Estimate integration costs
      • 3.2.5 Create an employee transition plan
      • 3.2.6 Create functional workplans for employees
      • 3.2.7 Align project metrics with identified tasks

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Transition team
      • Company M&A team

      Outcomes of Step

      Have an established plan of action toward integration across all domains and a strategy toward resources.

      Don’t underestimate the importance of integration preparation

      Integration is the process of combining the various components of one or more organizations into a single organization.

      80% of integration should happen within the first two years. (Source: CIO Dive)

      70% of M&A IT integrations fail due to components that could and should be addressed at the beginning. (Source: The Wall Street Journal, 2019)

      Info-Tech Insight

      Integration is not rationalization. Once the organization has integrated, it can prepare to rationalize the IT environment.

      Integration needs

      Identify your domain needs to support the target technology environment

      Set up a meeting with your IT due diligence team to:

      • Address data, applications, infrastructure, and other domain gaps.
      • Discuss the people and processes necessary to achieve the target technology environment and support M&A business objectives.

      Use this opportunity to:

      • Identify data and application complexities between your organization and the target organization.
      • Identify the IT people and process gaps, redundancies, and initiatives.
      • Determine your infrastructure needs and identify redundancies.
        • Does IT have the infrastructure to support the applications and business capabilities of the resultant enterprise?
        • Identify any gaps between the current infrastructure in both organizations and the infrastructure required in the resultant enterprise.
        • Identify any redundancies.
        • Determine the appropriate IT integration strategies.
      • Document your gaps, redundancies, initiatives, and assumptions to help you track and justify the initiatives that must be undertaken and help estimate the cost of integration.

      Integration implications

      Understand the implications for integration with respect to each target technology environment

      Domain

      Independent Models

      Create Links Between Critical Systems

      Move Key Capabilities to Common Systems

      Adopt One Model

      Data & Analytics

      • Consider data sources that might need to be combined (e.g. financials, email lists, internet).
      • Understand where each organization will warehouse its data and how it will be managed in a cost-effective manner.
      • Consider your reporting and transactional needs. Initially systems may remain separate, but eventually they will need to be merged.
      • Analyze whether or not the data types are compatible between companies.
      • Understand the critical data needs and the complexity of integration activities.
      • Consider your reporting and transactional needs. Initially systems may remain separate, but eventually they will need to be merged.
      • Focus on the master data domains that represent the core of your business.
      • Assess the value, size, location, and cleanliness of the target organization’s data sets.
      • Determine the data sets that will be migrated to capture expected synergies and drive core capabilities while addressing how other data sets will be maintained and managed.
      • Decide which applications to keep and which to terminate. This includes setting timelines for application retirement.
      • Establish interim linkages and common interfaces for applications while major migrations occur.

      Applications

      • Establish whether or not there are certain critical applications that still need to be linked (e.g. email, financials).
      • Leverage the unique strengths and functionalities provided by the applications used by each organization.
      • Confirm that adequate documentation and licensing exists.
      • Decide which critical applications need to be linked versus which need to be kept separate to drive synergies. For example, financial, email, and CRM may need to be linked, while certain applications may remain distinct.
      • Pay particular attention to the extent to which systems relating to customers, products, orders, and shipments need to be integrated.
      • Determine the key capabilities that require support from the applications identified by business process owners.
      • Assess which major applications need to be adopted by both organizations, based on the M&A goals.
      • Establish interim linkages and common interfaces for applications while major migrations occur.
      • Decide which applications to keep and which to terminate. This includes setting timelines for application retirement.
      • Establish interim linkages and common interfaces for applications while major migrations occur.

      Integration implications (continued)

      Understand the implications for integration with respect to each target technology environment

      Domain

      Independent Models

      Create Links Between Critical Systems

      Move Key Capabilities to Common Systems

      Adopt One Model

      Infrastructure

      • Assess the infrastructure demands created by retaining separate models (e.g. separate domains, voice, network integration).
      • Evaluate whether or not there are redundant data centers that could be consolidated to reduce costs.
      • Assess the infrastructure demands created by retaining separate models (e.g. separate domains, voice, network integration).
      • Evaluate whether or not there are redundant data centers that could be consolidated to reduce costs.
      • Evaluate whether certain infrastructure components, such as data centers, can be consolidated to support the new model while also eliminating redundancies. This will help reduce costs.
      • Assess which infrastructure components need to be kept versus which need to be terminated to support the new application portfolio. Keep in mind that increasing the transaction volume on a particular application increases the infrastructure capacity that is required for that application.
      • Extend the network to integrate additional locations.

      IT People & Processes

      • Retain workers from each IT department who possess knowledge of key products, services, and legacy systems.
      • Consider whether there are redundancies in staffing that could be eliminated.
      • The IT processes of each organization will most likely remain separate.
      • Consider the impact of the target organization on your IT processes.
      • Retain workers from each IT department who possess knowledge of key products, services, and legacy systems.
      • Consider whether there are redundancies in staffing that could be eliminated.
      • Consider how critical IT processes of the target organization fit with your current IT processes.
      • Identify which redundant staff members should be terminated by focusing on the key skills that will be necessary to support the common systems.
      • If there is overlap with the IT processes in both organizations, you may wish to map out both processes to get a sense for how they might work together.
      • Assess what processes will be prioritized to support IT strategies.
      • Identify which redundant staff members should be terminated by focusing on the key skills that will be necessary to support the prioritized IT processes.

      Integration implications (continued)

      Understand the implications for integration with respect to each target technology environment

      Domain

      Independent Models

      Create Links Between Critical Systems

      Move Key Capabilities to Common Systems

      Adopt One Model

      Leadership/IT Executive

      • Have insight into the goals and direction of the organization’s leadership. Make sure that a communication path has been established to receive information and provide feedback.
      • The decentralized model will require some form of centralization and strong governance processes to enable informed decisions.
      • Ensure that each area can deliver on its needs while not overstepping the goals and direction of the organization.
      • This will help with integration in the sense that front-line employees can see a single organization beginning to form.
      • In this model, there is the opportunity to select elements of each leadership style and strategy that will work for the larger organization.
      • Leadership can provide a single and unified approach to how the strategic goals will be executed.
      • More often than not, this would be the acquiring organization’s strategic direction.

      Vendors

      • Determine which contracts the target organization currently has in place.
      • Having different vendors in place will not be a bad model if it makes sense.
      • Spend time reviewing the contracts and ensuring that each organization has the right contracts to succeed.
      • Identify what redundancies might exist (ERPs, for example) and determine if the vendor would be willing to terminate one contract or another.
      • Through integration, it might be possible to engage in one set of contract negotiations for a single application or technology.
      • Identify whether there are opportunities to combine contracts or if they must remain completely separated until the end of the term.
      • In an effort to capitalize on the contracts working well, reduce the contracts that might be hindering the organization.
      • Speak to the vendor offering the contract.
      • Going forward, ensure the contracts are negotiated to include clauses to allow for easier and more cost-effective integration.

      Integration implications (continued)

      Understand the implications for integration with respect to each target technology environment

      Domain

      Independent Models

      Create Links Between Critical Systems

      Move Key Capabilities to Common Systems

      Adopt One Model

      Security

      • Both organizations would need to have a process for securing their organization.
      • Sharing and accessing information might be more difficult, as each organization would need to keep the other organization separate to ensure the organization remains secure.
      • Creating standard policies and procedures that each organization must adhere to would be critical here (for example, multifactor authentication).
      • Establish a single path of communication between the two organizations, ensuring reliable and secure data and information sharing.
      • Leverage the same solutions to protect the business as a whole from internal and external threats.
      • Identify opportunities where there might be user points of failure that could be addressed early in the process.
      • Determine what method of threat detection and response will best support the business and select that method to apply to the entire organization, both original and newly acquired.

      Projects

      • Projects remain ongoing as they were prior to the integration.
      • Some projects might be made redundant after the initial integration is over.
      • Re-evaluate the projects after integration to ensure they continue to deliver on the business’ strategic direction.
      • Determine which projects are similar to one another and identify opportunities to leverage business needs and solutions for each organization where possible.
      • Review project histories to determine the rationale for and success of projects that could be reused in either organization going forward.
      • Determine which projects should remain ongoing and which projects could wait to be implemented or could be completely stopped.
      • There might be certain modernization projects ongoing that cannot be stopped.
      • However, for all other projects, embrace a single portfolio.
      • Completely reduce or remove all ongoing projects from the one organization and continue with only the projects of the other organization.
      • Add in new projects when they arise as needed.

      3.2.1 Prioritize integration tasks

      2 hours

      Input: Integration tasks, Transition team, M&A RACI

      Output: Prioritized integration list

      Materials: Integration task checklist, Integration roadmap

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to prioritize the different integration tasks that your organization has identified as necessary to this transaction. Some tasks might not be relevant for this particular transaction, and others might be critical.

      1. Download the SharePoint or Excel version of the M&A Integration Project Management Tool. Identify which integration tasks you want as part of your project plan. Alter or remove any tasks that are irrelevant to your organization. Add in tasks you think are missing.
      2. When deciding criticality of the task, consider the effect on stakeholders, those who are impacted or influenced in the process of the task, and dependencies (e.g. data strategy needs to be addressed first before you can tackle its dependencies, like data quality).
      3. Feel free to edit the way you measure criticality. The standard tool leverages a three-point scale. At the end, you should have a list of tasks in priority order based on criticality.

      Record the updates in the M&A Integration Project Management Tool (SharePoint).

      Record the updates in the M&A Integration Project Management Tool (Excel).

      Integration checklists

      Prerequisite Checklist
      • Build the project plan for integration and prioritize activities
        • Plan first day
        • Plan first 30/100 days
        • Plan first year
      • Create an organization-aligned IT strategy
      • Identify critical stakeholders
      • Create a communication strategy
      • Understand the rationale for the acquisition or purchase
      • Develop IT's purchasing strategy
      • Determine goal opportunities
      • Create the mission and vision statements
      • Create the guiding principles
      • Create program metrics
      • Consolidate reports from due diligence/data room
      • Conduct culture assessment
      • Create a transaction team
      • Assess workforce demand and supply
      • Plan and communicate potential layoffs
      • Create an employee transition plan
      • Identify the IT investment
      Business
      • Design an enterprise architecture
      • Document your business architecture
      • Identify and assess all of IT's risks
      Leadership/IT Executive
      • Build an IT budget
      • Structure operating budget
      • Structure capital budget
      • Identify the needed workforce demand vs. capacity
      • Establish and monitor key metrics
      • Communicate value realized/cost savings
      Data
      • Confirm data strategy
      • Confirm data governance
      • Data architecture
      • Data sources
      • Data storage (on-premises vs. cloud)
      • Enterprise content management
      • Compatibility of data types between organizations
      • Cleanliness/usability of target organization data sets
      • Identify data sets that need to be combined to capture synergies/drive core capabilities
      • Reporting and analytics capabilities
      Applications
      • Prioritize and address critical applications
        • ERP
        • CRM
        • Email
        • HRIS
        • Financial
        • Sales
        • Risk
        • Security
      • Leverage application rationalization framework to determine applications to keep, terminate, or create
      • Develop method of integrating applications
      • Model critical applications that have dependencies on one another
      • Identify the infrastructure capacity required to support critical applications
      Operations
      • Communicate helpdesk/service desk information
      • Manage sales access to customer data
      • Determine locations and hours of operation
      • Consolidate phone lists and extensions
      • Synchronize email address books

      Integration checklists (continued)

      Infrastructure
      • Determine single network access
      • Manage organization domains
      • Consolidate data centers
      • Compile inventory of vendors, versions, switches, and routers
      • Review hardware lease or purchase agreements
      • Review outsourcing/service provider agreements
      • Review service-level agreements
      • Assess connectivity linkages between locations
      • Plan to migrate to a single email system if necessary
      Vendors
      • Establish a sustainable vendor management office
      • Review vendor landscape
      • Identify warranty options
      • Rationalize vendor services and solutions
      • Identify opportunities to mature the security architecture
      People
      • Design an IT operating model
      • Redesign your IT organizational structure
      • Conduct a RACI
      • Conduct a culture assessment and identify goal IT culture
      • Build an IT employee engagement program
      • Determine critical roles and systems/process/products they support
      • Create a list of employees to be terminated
      • Create employee transition plans
      • Create functional workplans
      Projects
      • Stop duplicate or unnecessary target organization projects
      • Communicate project intake process
      • Prioritize projects
      Products & Services
      • Ensure customer services requirements are met
      • Ensure customer interaction requirements are met
      • Select a solution for product lifecycle management
      Security
      • Conduct a security assessment of target organization
      • Develop accessibility prioritization and schedule
      • Establish an information security strategy
      • Develop a security awareness and training program
      • Develop and manage security governance, risk, and compliance
      • Identify security budget
      • Build a data privacy and classification program
      IT Processes
      • Evaluate current process models
      • Determine productivity/capacity levels of processes
      • Identify processes to be terminated
      • Identify process expectations from target organization
      • Establish a communication plan
      • Develop a change management process
      • Establish/review IT policies

      3.2.2 Establish the integration roadmap

      2 hours

      Input: Prioritized integration tasks, Employee transition plan, Integration RACI, Costs for activities, Activity owners

      Output: Integration roadmap

      Materials: M&A Integration Project Plan Tool (SharePoint), M&A Integration Project Plan Tool (Excel)

      Participants: IT executive/CIO, IT senior leadership, Transition team, Company M&A team

      The purpose of this activity is to create a roadmap to support IT throughout the integration process. Using the information gathered in previous activities, you can create a roadmap that will ensure a smooth integration.

      1. Leverage our M&A Integration Project Management Tool to track critical elements of the integration project. There are a few options available:
        1. Follow the instructions on the next slide if you are looking to upload our SharePoint project template.
        2. If you cannot or do not want to use SharePoint as your project management solution, download our Excel version of the tool.
          **Remember that this your tool, so customize to your liking.
      2. Identify who will own or be accountable for each of the integration tasks and establish the time frame for when each project should begin and end. This will confirm which tasks should be prioritized.

      Record the updates in the M&A Integration Project Management Tool (SharePoint).

      Record the updates in the M&A Integration Project Management Tool (Excel).

      Integration Project Management Tool (SharePoint Template)

      Follow these instructions to upload our template to your SharePoint environment

      1. Create or use an existing SP site.
      2. Download the M&A Integration Project Plan Tool (SharePoint) .wsp file from the Mergers & Acquisitions: The Buy Blueprint landing page.
      3. To import a template into your SharePoint environment, do the following:
        1. Open PowerShell.
        2. Connect-SPO Service (need to install PowerShell module).
        3. Enter in your tenant admin URL.
        4. Enter in your admin credentials.
        5. Set-SPO Site https://YourDomain.sharepoint.com/sites/YourSiteHe... -DenyAddAndCustomizePages 0
        OR
        1. Turn on both custom script features to allow users to run custom
      4. Screenshot of the 'Custom Script' option for importing a template into your SharePoint environment. Feature description reads 'Control whether users can run custom script on personal sites and self-service created sites. Note: changes to this setting might take up to 24 hours to take effect. For more information, see http://go.microsoft.com/fwlink/?LinkIn=397546'. There are options to prevent or allow users from running custom script on personal/self-service created sites.
      5. Enable the SharePoint Server Standard Site Collection features.
      6. Upload the .wsp file in Solutions Gallery.
      7. Deploy by creating a subsite and select from custom options.
        • Allow or prevent custom script
        • Security considerations of allowing custom script
        • Save, download, and upload a SharePoint site as a template
      8. Refer to Microsoft documentation to understand security considerations and what is and isn’t supported:

      For more information, check out the SharePoint Template: Step-by-Step Deployment Guide.

      Participate in active workforce planning to transition employees

      The chosen IT operating model, primary M&A goals, and any planned changes to business strategy will dramatically impact IT staffing and workforce planning efforts.

      Visualization of the three aspects of 'IT workforce planning', as listed below.

      IT workforce planning

      • Primary M&A goals
        If the goal of the M&A is cost cutting, then workforce planning will be necessary to identify labor redundancies.
      • Changes to business strategy
        If business strategy will change after the merger, then workforce planning will typically be more involved than if business strategy will not change.
      • Integration strategy
        For independent models, workforce planning will typically be unnecessary.
        For connection of essential systems or absorption, workforce planning will likely be an involved, time-consuming process.
      1. Estimate the headcount you will need through the end of the M&A transition period.
      2. Outline the process you will use to assess staff for roles that have more than one candidate.
      3. Review employees in each department to determine the best fit for each role.
      4. Determine whether terminations will happen all together or in waves.

      Info-Tech Insight

      Don’t be a short-term thinker when it comes to workforce planning! IT teams that only consider the headcount needed on day one of the new entity will end up scrambling to find skilled resources to fill workforce gaps later in the transition period.

      3.2.3 Identify the needed workforce supply

      3-4 hours

      Input: IT strategy, Prioritized integration tasks

      Output: A clear indication of how many resources are required for each role and the number of resources that the organization actually has

      Materials: Resource Management Supply-Demand Calculator

      Participants: IT executive/CIO, IT senior leadership, Target organization employees, Company M&A team, Transition team

      The purpose of this activity is to determine the anticipated amount of work that will be required to support projects (like integration), administrative, and keep-the-lights-on activities.

      1. Download the Resource Management Supply-Demand Calculator.
      2. The calculator requires minimal up-front staff participation: You can obtain meaningful results with participation from as few as one person with insight on the distribution of your resources and their average work week or month.
      3. The calculator will yield a report that shows a breakdown of your annual resource supply and demand, as well as the gap between the supply and demand. Further insight on project and non-project supply and demand are provided.
      4. Repeat the tool several times to identify the needs of your IT environment for day one, day 30/100, and year one. Anticipate that these will change over time. Also, do not forget to obtain this information from the target organization. Given that you will be integrating, it’s important to know how many staff they have in which roles.
      5. **For additional information, please review slides starting from slide 44 in Establish Realistic IT Resource Management Practices to see how to use the tool.

      Record the results in the Resource Management Supply-Demand Calculator.

      Resource Supply-Demand Calculator Output Example

      Example of a 'Resource Management Supply-Demand Analysis Report' with charts and tables measuring Annualized Resource Supply and Demand, Resource Capacity Confidence, Project Capacity, and combinations of those metrics.

      Resource Capacity Confidence. This figure is based on your confidence in supply confidence, demand stability, and the supply-demand ratio.

      Importance of estimating integration costs

      Change is the key driver of integration costs

      Integration costs are dependent on the following:
      • Meeting synergy targets – whether that be cost saving or growth related.
        • Employee-related costs, licensing, and reconfiguration fees play a huge part in meeting synergy targets.
      • Adjustments related to compliance or regulations – especially if there are changes to legal entities, reporting requirements, or risk-mitigation standards.
      • Governance or third party–related support required to ensure timelines are met and the integration is a success.
      Integration costs vary by industry type.
      • Certain industries may have integration costs made up of mostly one type, differing from other industries, due to the complexity and different demands of the transaction. For example:
        • Healthcare integration costs are mostly driven by regulatory, safety, and quality standards, as well as consolidation of the research and development function.
        • Energy and Utilities tend to have the lowest integration costs due to most transactions occurring within the same sector rather than as a cross-sector investment. For example, oil and gas acquisitions tend to be for oil fields and rigs (strategic fixed assets), which can easily be added to the buyer’s portfolio.

      Integration costs are more related to the degree of change required than the size of the transaction.

      3.2.4 Estimate integration costs

      3-4 hours

      Input: Integration tasks, Transition team, Valuation of current IT environment, Valuation of target IT environment, Outputs from data room, Technical debt, Employees

      Output: List of anticipated costs required to support IT integration

      Materials: Integration task checklist, Integration roadmap, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to estimate the costs that will be associated with the integration. It’s important to ensure a realistic figure is identified and communicated to the larger M&A team within your company as early in the process as possible. This ensures that the funding required for the transaction is secured and budgeted for in the overarching transaction.

      1. On the associated slide in the M&A Buy Playbook, input:
        • Task
        • Domain
        • Cost type
        • Total cost amount
        • Level of certainty around the cost
      2. Provide a copy of the estimated costs to the company’s M&A team. Also provide any additional information identified earlier to help them understand the importance of those costs.

      Record the results in the M&A Buy Playbook.

      Employee transition planning

      Considering employee impact will be a huge component to ensure successful integration

      • Meet With Leadership
      • Plan Individual and Department Redeployment
      • Plan Individual and Department Layoffs
      • Monitor and Manage Departmental Effectiveness
      • For employees, the transition could mean:
        • Changing from their current role to a new role to meet requirements and expectations throughout the transition.
        • Being laid off because the role they are currently occupying has been made redundant.
      • It is important to plan for what the M&A integration needs will be and what the IT operational needs will be.
      • A lack of foresight into this long-term plan could lead to undue costs and headaches trying to retain critical staff, rehiring positions that were already let go, and keeping redundant employees longer then necessary.

      Info-Tech Insight

      Being transparent throughout the process is critical. Do not hesitate to tell employees the likelihood that their job may be made redundant. This will ensure a high level of trust and credibility for those who remain with the organization after the transaction.

      3.2.5 Create an employee transition plan

      3-4 hours

      Input: IT strategy, IT organizational design, Resource Supply-Demand Calculator output

      Output: Employee transition plans

      Materials: M&A Buy Playbook, Whiteboard, Sticky notes, Markers

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to create a transition plan for employees.

      1. Transition planning can be done at specific individual levels or more broadly to reflect a single role. Consider these four items in the transition plan:
        • Understand the direction of the employee transitions.
        • Identify employees that will be involved in the transition (moved or laid off).
        • Prepare to meet with employees.
        • Meet with employees.
      2. For each employee that will be facing some sort of change in their regular role, permanent or temporary, create a transition plan.
      3. For additional information on transitioning employees, review the blueprint Streamline Your Workforce During a Pandemic.

      **Note that if someone’s future role is a layoff, then there is no need to record anything for skills needed or method for skill development.

      Record the results in the M&A Buy Playbook.

      3.2.6 Create functional workplans for employees

      3-4 hours

      Input: Prioritized integration tasks, Employee transition plan, Integration RACI, Costs for activities, Activity owners

      Output: Employee functional workplans

      Materials: M&A Buy Playbook, Learning and development tools

      Participants: IT executive/CIO, IT senior leadership, IT management team, Company M&A team, Transition team

      The purpose of this activity is to create a functional workplan for the different employees so that they know what their key role and responsibilities are once the transaction occurs.

      1. First complete the transition plan from the previous activity (3.2.5) and the separation roadmap. Have these documents ready to review throughout this process.
      2. Identify the employees who will be transitioning to a new role permanently or temporarily. Creating a functional workplan is especially important for these employees.
      3. Identify the skills these employees need to have to support the separation. Record this in the corresponding slide in the M&A Buy Playbook.
      4. For each employee, identify someone who will be a point of contact for them throughout the transition.

      It is recommended that each employee have a functional workplan. Leverage the IT managers to support this task.

      Record the results in the M&A Buy Playbook.

      Metrics for integration

      Valuation & Due Diligence

      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target

      Execution & Value Realization

      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT integration
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      3.2.7 Align project metrics with identified tasks

      3-4 hours

      Input: Prioritized integration tasks, Employee transition plan, Integration RACI, Costs for activities, Activity owners, M&A goals

      Output: Integration-specific metrics to measure success

      Materials: Roadmap template, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Transition team

      The purpose of this activity is to understand how to measure the success of the integration project by aligning metrics to each identified task.

      1. Review the M&A goals identified by the business. Your metrics will need to tie back to those business goals.
      2. Identify metrics that align to identified tasks and measure achievement of those goals. For each metric you consider, ask the following questions:
        • What is the main goal or objective that this metric is trying to solve?
        • What does success look like?
        • Does the metric promote the right behavior?
        • Is the metric actionable? What is the story you are trying to tell with this metric?
        • How often will this get measured?
        • Are there any metrics it supports or is supported by?

      Record the results in the M&A Buy Playbook.

      By the end of this mid-transaction phase you should:

      Have successfully evaluated the target organization’s IT environment, escalated the acquisition risks and benefits, and prepared IT for integration.

      Key outcomes from the Due Diligence & Preparation phase
      • Participate in due diligence activities to accurately valuate the target organization(s) and determine if there are critical risks or benefits the current organization should be aware of.
      • Create an integration roadmap that considers the tasks that will need to be completed and the resources required to support integration.
      Key deliverables from the Due Diligence & Preparation phase
      • Establish a due diligence charter
      • Create a list of data room artifacts and engage in due diligence
      • Assess the target organization’s technical debt
      • Valuate the target IT organization
      • Assess and plan for culture
      • Prioritize integration tasks
      • Establish the integration roadmap
      • Identify the needed workforce supply
      • Estimate integration costs
      • Create employee transition plans
      • Create functional workplans for employees
      • Align project metrics with identified tasks

      M&A Buy Blueprint

      Phase 4

      Execution & Value Realization

      Phase 1Phase 2Phase 3

      Phase 4

      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Growth Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Acquisition
      • 3.1 Assess the Target Organization
      • 3.2 Prepare to Integrate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Rationalize the IT environment
      • Continually update the project plan
      • Confirm integration costs
      • Review IT’s transaction value
      • Conduct a transaction and integration SWOT
      • Review the playbook and prepare for future transactions

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Vendor management team
      • IT transaction team
      • Company M&A team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Engage in Integration

      Day 4

      Establish the Transaction FoundationDiscover the Motivation for IntegrationPlan the Integration RoadmapPrepare Employees for the TransitionEngage in IntegrationAssess the Transaction Outcomes (Must be within 30 days of transaction date)

      Activities

      • 0.1 Understand the rationale for the company's decisions to pursue an acquisition.
      • 0.2 Identify key stakeholders and determine the IT transaction team.
      • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
      • 1.1 Review the business rationale for the acquisition.
      • 1.2 Identify pain points and opportunities tied to the acquisition.
      • 1.3 Establish the integration strategy.
      • 1.4 Prioritize Integration tasks.
      • 2.1 Establish the integration roadmap.
      • 2.2 Establish and align project metrics with identified tasks.
      • 2.3 Estimate integration costs.
      • 3.1 Assess the current culture and identify the goal culture.
      • 3.2 Identify the needed workforce supply.
      • 3.3 Create an employee transition plan.
      • 3.4 Create functional workplans for employees.
      • I.1 Complete the integration by regularly updating the project plan.
      • I.2 Begin to rationalize the IT environment where possible and necessary.
      • 4.1 Confirm integration costs.
      • 4.2 Review IT’s transaction value.
      • 4.3 Conduct a transaction and integration SWOT.
      • 4.4 Review the playbook and prepare for future transactions.

      Deliverables

      1. IT strategy
      2. IT operating model
      3. IT governance structure
      4. M&A transaction team
      1. Business context implications for IT
      2. Integration strategy
      1. Integration roadmap and associated resourcing
      1. Culture assessment
      2. Workforce supply identified
      3. Employee transition plan
      1. Rationalized IT environment
      2. Updated integration project plan
      1. SWOT of transaction
      2. M&A Buy Playbook refined for future transactions

      What is the Execution & Value Realization phase?

      Post-transaction state

      Once the transaction comes to a close, it’s time for IT to deliver on the critical integration tasks. Set the organization up for success by having an integration roadmap. Retaining critical IT staff throughout this process will also be imperative to the overall transaction success.

      Throughout the integration process, roadblocks will arise and need to be addressed. However, by ensuring that employees, technology, and processes are planned for ahead of the transaction, you as IT will be able to weather those unexpected concerns with greater ease.

      Now that you as an IT leader have engaged in an acquisition, demonstrating the value IT was able to provide to the process is critical to establishing a positive and respected relationship with other senior leaders in the business. Be prepared to identify the positives and communicate this value to advance the business’ perception of IT.

      Goal: To carry out the planned integration activities and deliver the intended value to the business

      Execution Prerequisite Checklist

      Before coming into the Execution & Value Realization phase, you must have addressed the following:

      • Understand the rationale for the company's decisions to pursue an acquisition and what opportunities or pain points the acquisition should alleviate.
      • Identify the key roles for the transaction team.
      • Identify the M&A governance.
      • Determine target metrics and align to project tasks.
      • Select an integration strategy framework.
      • Conduct a RACI for key transaction tasks for the transaction team.
      • Create a list of data room artifacts and engage in due diligence (directly or indirectly).
      • Prioritize integration tasks.
      • Establish the integration roadmap.
      • Identify the needed workforce supply.
      • Create employee transition plans.

      Before coming into the Execution & Value Realization phase, we recommend addressing the following:

      • Create vision and mission statements.
      • Establish guiding principles.
      • Create a future-state operating model.
      • Identify the M&A operating model.
      • Document the communication plan.
      • Examine the business perspective of IT.
      • Identify key stakeholders and outline their relationship to the M&A process.
      • Be able to valuate the IT environment and communicate IT's value to the business.
      • Establish a due diligence charter.
      • Assess the target organization’s technical debt.
      • Valuate the target IT organization.
      • Assess and plan for culture.
      • Estimate integration costs.
      • Create functional workplans for employees.

      Integration checklists

      Prerequisite Checklist
      • Build the project plan for integration and prioritize activities
        • Plan first day
        • Plan first 30/100 days
        • Plan first year
      • Create an organization-aligned IT strategy
      • Identify critical stakeholders
      • Create a communication strategy
      • Understand the rationale for the acquisition or purchase
      • Develop IT's purchasing strategy
      • Determine goal opportunities
      • Create the mission and vision statements
      • Create the guiding principles
      • Create program metrics
      • Consolidate reports from due diligence/data room
      • Conduct culture assessment
      • Create a transaction team
      • Assess workforce demand and supply
      • Plan and communicate potential layoffs
      • Create an employee transition plan
      • Identify the IT investment
      Business
      • Design an enterprise architecture
      • Document your business architecture
      • Identify and assess all of IT's risks
      Leadership/IT Executive
      • Build an IT budget
      • Structure operating budget
      • Structure capital budget
      • Identify the needed workforce demand vs. capacity
      • Establish and monitor key metrics
      • Communicate value realized/cost savings
      Data
      • Confirm data strategy
      • Confirm data governance
      • Data architecture
      • Data sources
      • Data storage (on-premises vs. cloud)
      • Enterprise content management
      • Compatibility of data types between organizations
      • Cleanliness/usability of target organization data sets
      • Identify data sets that need to be combined to capture synergies/drive core capabilities
      • Reporting and analytics capabilities
      Applications
      • Prioritize and address critical applications
        • ERP
        • CRM
        • Email
        • HRIS
        • Financial
        • Sales
        • Risk
        • Security
      • Leverage application rationalization framework to determine applications to keep, terminate, or create
      • Develop method of integrating applications
      • Model critical applications that have dependencies on one another
      • Identify the infrastructure capacity required to support critical applications
      Operations
      • Communicate helpdesk/service desk information
      • Manage sales access to customer data
      • Determine locations and hours of operation
      • Consolidate phone lists and extensions
      • Synchronize email address books

      Integration checklists (continued)

      Infrastructure
      • Determine single network access
      • Manage organization domains
      • Consolidate data centers
      • Compile inventory of vendors, versions, switches, and routers
      • Review hardware lease or purchase agreements
      • Review outsourcing/service provider agreements
      • Review service-level agreements
      • Assess connectivity linkages between locations
      • Plan to migrate to a single email system if necessary
      Vendors
      • Establish a sustainable vendor management office
      • Review vendor landscape
      • Identify warranty options
      • Rationalize vendor services and solutions
      • Identify opportunities to mature the security architecture
      People
      • Design an IT operating model
      • Redesign your IT organizational structure
      • Conduct a RACI
      • Conduct a culture assessment and identify goal IT culture
      • Build an IT employee engagement program
      • Determine critical roles and systems/process/products they support
      • Create a list of employees to be terminated
      • Create employee transition plans
      • Create functional workplans
      Projects
      • Stop duplicate or unnecessary target organization projects
      • Communicate project intake process
      • Prioritize projects
      Products & Services
      • Ensure customer services requirements are met
      • Ensure customer interaction requirements are met
      • Select a solution for product lifecycle management
      Security
      • Conduct a security assessment of target organization
      • Develop accessibility prioritization and schedule
      • Establish an information security strategy
      • Develop a security awareness and training program
      • Develop and manage security governance, risk, and compliance
      • Identify security budget
      • Build a data privacy and classification program
      IT Processes
      • Evaluate current process models
      • Determine productivity/capacity levels of processes
      • Identify processes to be terminated
      • Identify process expectations from target organization
      • Establish a communication plan
      • Develop a change management process
      • Establish/review IT policies

      Execution & Value Realization

      Step 4.1

      Execute the Transaction

      Activities

      • 4.1.1 Rationalize the IT environment
      • 4.1.2 Continually update the project plan

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Vendor management team
      • IT transaction team
      • Company M&A team

      Outcomes of Step

      Successfully execute on the integration and strategize how to rationalize the two (or more) IT environments and update the project plan, strategizing against any roadblocks as they might come.

      Compile –› Assess –› Rationalize

      Access to critical information often does not happen until day one

      • As the transaction comes to a close and the target organization becomes the acquired organization, it’s important to start working on the rationalization of your organization.
      • One of the most important elements will be to have a complete understanding of the acquired organization’s IT environment. Specifically, assess the technology, people, and processes that might exist.
      • This rationalization will be heavily dependent on your planned integration strategy determined in the Discovery & Strategy phase of the process.
      • If your IT organization was not involved until after that phase, then determine whether your organization plans on remaining in its original state, taking on the acquired organization’s state, or forming a best-of-breed state by combining elements.
      • To execute on this, however, a holistic understanding of the new IT environment is required.

      Some Info-Tech resources to support this initiative:

      • Reduce and Manage Your Organization’s Insider Threat Risk
      • Build an Application Rationalization Framework
      • Rationalize Your Collaboration Tools
      • Consolidate IT Asset Management
      • Build Effective Enterprise Integration on the Back of Business Process
      • Consolidate Your Data Centers

      4.1.1 Rationalize the IT environment

      6-12 months

      Input: RACI chart, List of critical applications, List of vendor contracts, List of infrastructure assets, List of data assets

      Output: Rationalized IT environment

      Materials: Software Terms & Conditions Evaluation Tool

      Participants: IT executive/CIO, IT senior leadership, Vendor management

      The purpose of this activity is to rationalize the IT environment to reduce and eliminate redundant technology.

      1. Compile a list of the various applications and vendor contracts from the acquired organization and the original organization.
      2. Determine where there is repetition. Have a member of the vendor management team review those contracts and identify cost-saving opportunities.

      This will not be a quick and easy activity to complete. It will require strong negotiation on the behalf of the vendor management team.

      For additional information and support for this activity, see the blueprint Master Contract Review and Negotiations for Software Agreements.

      4.1.2 Continually update the project plan

      Reoccurring basis following transition

      Input: Prioritized integration tasks, Integration RACI, Activity owners

      Output: Updated integration project plan

      Materials: M&A Integration Project Management Tool

      Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team

      The purpose of this activity is to ensure that the project plan is continuously updated as your transaction team continues to execute on the various components outlined in the project plan.

      1. Set a regular cadence for the transaction team to meet, update and review the status of the various integration task items, and strategize how to overcome any roadblocks.
      2. Employ governance best practices in these meetings to ensure decisions can be made effectively and resources allocated strategically.

      Record the updates in the M&A Integration Project Management Tool (SharePoint).

      Record the updates in the M&A Integration Project Management Tool (Excel).

      Execution & Value Realization

      Step 4.2

      Reflection and Value Realization

      Activities

      • 4.2.1 Confirm integration costs
      • 4.2.2 Review IT’s transaction value
      • 4.2.3 Conduct a transaction and integration SWOT
      • 4.2.4 Review the playbook and prepare for future transactions

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Transition team
      • Company M&A team

      Outcomes of Step

      Review the value that IT was able to generate around the transaction and strategize on how to improve future acquisition transactions.

      4.2.1 Confirm integration costs

      3-4 hours

      Input: Integration tasks, Transition team, Previous RACI, Estimated costs

      Output: Actual integration costs

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team

      The purpose of this activity is to confirm the associated costs around integration. While the integration costs would have been estimated previously, it’s important to confirm the costs that were associated with the integration in order to provide an accurate and up-to-date report to the company’s M&A team.

      1. Taking all the original items identified previously in activity 3.2.4, identify if there were changes in the estimated costs. This can be an increase or a decrease.
      2. Ensure that each cost has a justification for why the cost changed from the original estimation.

      Record the results in the M&A Buy Playbook.

      Track synergy capture through the IT integration

      The ultimate goal of the M&A is to achieve and deliver deal objectives. Early in the M&A, IT must identify, prioritize, and execute upon synergies that deliver value to the business and its shareholders. Continue to measure IT’s contribution toward achieving the organization’s M&A goals throughout the integration by keeping track of cost savings and synergies that have been achieved. When these achievements happen, communicate them and celebrate success.

      1. Define Synergy Metrics: Select metrics to track synergies through the integration.
        1. You can track value by looking at percentages of improvement in process-level metrics depending on the synergies being pursued.
        2. For example, if the synergy being pursued is increasing asset utilization, metrics could range from capacity to revenue generated through increased capacity.
      2. Prioritize Synergistic Initiatives: Estimate the cost and benefit of each initiative's implementation to compare the amount of business value to the cost. The benefits and costs should be illustrated at a high level. Estimating the exact dollar value of fulfilling a synergy can be difficult and misleading.
          Steps
        • Determine the benefits that each initiative is expected to deliver.
        • Determine the high-level costs of implementation (capacity, time, resources, effort).
      3. Track Synergy Captures: Develop a detailed workplan to resource the roadmap and track synergy captures as the initiatives are undertaken.

      Once 80% of the necessary synergies are realized, executive pressure will diminish. However, IT must continue to work toward the technology end state to avoid delayed progression.

      4.2.2 Review IT’s transaction value

      3-4 hours

      Input: Prioritized integration tasks, Integration RACI, Activity owners, M&A company goals

      Output: Transaction value

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company's M&A team

      The purpose of this activity is to track how your IT organization performed against the originally identified metrics.

      1. If your organization did not have the opportunity to identify metrics earlier, determine from the company M&A team what those metrics might be. Review activity 3.2.7 for more information on metrics.
      2. Identify whether the metric (which should be used to support a goal) was at, below, or above the original target metric. This is a very critical task for IT to complete because it allows IT to confirm that they were successful engaging in the transaction and that the business can count on them in future transactions.
      3. Be sure to record accurate and relevant information on why the outcomes (good or bad) are supporting the M&A goals that were set out by the business.

      Record the results in the M&A Buy Playbook.

      4.2.3 Conduct a transaction and integration SWOT

      2 hours

      Input: Integration costs, Retention rates, Value IT contributed to the transaction

      Output: Strengths, weaknesses, opportunities, and threats

      Materials: Flip charts, Markers, Sticky notes

      Participants: IT executive/CIO, IT senior leadership, Business transaction team

      The purpose of this activity is to assess the positive and negative elements of the transaction.

      1. Consider the various internal and external elements that could have impacted the outcome of the transaction.
        • Strengths. Internal characteristics that are favorable as they relate to your development environment.
        • Weaknesses Internal characteristics that are unfavorable or need improvement.
        • Opportunities External characteristics that you may use to your advantage.
        • Threats External characteristics that may be potential sources of failure or risk.

      Record the results in the M&A Buy Playbook.

      M&A Buy Playbook review

      With an acquisition complete, your IT organization is now more prepared then ever to support the business through future M&As

      • Now that the transaction is more than 80% complete, take the opportunity to review the key elements that worked well and the opportunities for improvement in future transactions.
      • Critically examine the M&A Buy Playbook your IT organization created and identify what worked well to help the transaction and where your organization could adjust to do better in future transactions.
      • If your organization were to engage in another acquisition under your IT leadership, how would you go about the transaction to make sure the company meets its goals?

      4.2.4 Review the playbook and prepare for future transactions

      4 hours

      Input: Transaction and integration SWOT

      Output: Refined M&A playbook

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO

      The purpose of this activity is to revise the playbook and ensure it is ready to go for future transactions.

      1. Using the outputs from the previous activity, 4.2.3, determine what strengths and opportunities there were that should be leveraged in the next transaction.
      2. Likewise, determine which threats and weaknesses could be avoided in the future transactions.
        Remember, this is your M&A Buy Playbook, and it should reflect the most successful outcome for you in your organization.

      Record the results in the M&A Buy Playbook.

      By the end of this post-transaction phase you should:

      Have completed the integration post-transaction and be fluidly delivering the critical value that the business expected of IT.

      Key outcomes from the Execution & Value Realization phase
      • Ensure the integration tasks are being completed and that any blockers related to the transaction are being removed.
      • Determine where IT was able to realize value for the business and demonstrate IT’s involvement in meeting target goals.
      Key deliverables from the Execution & Value Realization phase
      • Rationalize the IT environment
      • Continually update the project plan for completion
      • Confirm integration costs
      • Review IT’s transaction value
      • Conduct a transaction and integration SWOT
      • Review the playbook and prepare for future transactions

      Summary of Accomplishment

      Problem Solved

      Congratulations, you have completed the M&A Buy Blueprint!

      Rather than reacting to a transaction, you have been proactive in tackling this initiative. You now have a process to fall back on in which you can be an innovative IT leader by suggesting how and why the business should engage in an acquisition. You now have:

      • Created a standardized approach for how your IT organization should address acquisitions.
      • Evaluated the target organizations successfully and established an integration project plan.
      • Delivered on the integration project plan successfully and communicated IT’s transaction value to the business.

      Now that you have done all of this, reflect on what went well and what can be improved in case if you have to do this all again in a future transaction.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information
      workshops@infotech.com 1-888-670-8899

      Research Contributors and Experts

      Ibrahim Abdel-Kader
      Research Analyst | CIO
      Info-Tech Research Group
      Brittany Lutes
      Senior Research Analyst | CIO
      Info-Tech Research Group
      John Annand
      Principal Research Director | Infrastructure
      Info-Tech Research Group
      Scott Bickley
      Principal Research Director | Vendor Management
      Info-Tech Research Group
      Cole Cioran
      Practice Lead | Applications
      Info-Tech Research Group
      Dana Daher
      Research Analyst | Strategy & Innovation
      Info-Tech Research Group
      Eric Dolinar
      Manager | M&A Consulting
      Deloitte Canada
      Christoph Egel
      Director, Solution Design & Deliver
      Cooper Tire & Rubber Company
      Nora Fisher
      Vice President | Executive Services Advisory
      Info-Tech Research Group
      Larry Fretz
      Vice President | Industry
      Info-Tech Research Group

      Research Contributors and Experts

      David Glazer
      Vice President of Analytics
      Kroll
      Jack Hakimian
      Senior Vice President | Workshops and Delivery
      Info-Tech Research Group
      Gord Harrison
      Senior Vice President | Research & Advisory
      Info-Tech Research Group
      Valence Howden
      Principal Research Director | CIO
      Info-Tech Research Group
      Jennifer Jones
      Research Director | Industry
      Info-Tech Research Group
      Nancy McCuaig
      Senior Vice President | Chief Technology and Data Office
      IGM Financial Inc.
      Carlene McCubbin
      Practice Lead | CIO
      Info-Tech Research Group
      Kenneth McGee
      Research Fellow | Strategy & Innovation
      Info-Tech Research Group
      Nayma Naser
      Associate
      Deloitte
      Andy Neill
      Practice Lead | Data & Analytics, Enterprise Architecture
      Info-Tech Research Group

      Research Contributors and Experts

      Rick Pittman
      Vice President | Research
      Info-Tech Research Group
      Rocco Rao
      Research Director | Industry
      Info-Tech Research Group
      Mark Rosa
      Senior Vice President & Chief Information Officer
      Mohegan Gaming and Entertainment
      Tracy-Lynn Reid
      Research Lead | People & Leadership
      Info-Tech Research Group
      Jim Robson
      Senior Vice President | Shared Enterprise Services (retired)
      Great-West Life
      Steven Schmidt
      Senior Managing Partner Advisory | Executive Services
      Info-Tech Research Group
      Nikki Seventikidis
      Senior Manager | Finance Initiative & Continuous Improvement
      CST Consultants Inc.
      Allison Straker
      Research Director | CIO
      Info-Tech Research Group
      Justin Waelz
      Senior Network & Systems Administrator
      Info-Tech Research Group
      Sallie Wright
      Executive Counselor
      Info-Tech Research Group

      Bibliography

      “5 Ways for CIOs to Accelerate Value During Mergers and Acquisitions.” Okta, n.d. Web.

      Altintepe, Hakan. “Mergers and acquisitions speed up digital transformation.” CIO.com, 27 July 2018. Web.

      “America’s elite law firms are booming.” The Economist, 15 July 2021. Web.

      Barbaglia, Pamela, and Joshua Franklin. “Global M&A sets Q1 record as dealmakers shape post-COVID world.” Nasdaq, 1 April 2021. Web.

      Boyce, Paul. “Mergers and Acquisitions Definition: Types, Advantages, and Disadvantages.” BoyceWire, 8 Oct. 2020. Web.

      Bradt, George. “83% Of Mergers Fail -- Leverage A 100-Day Action Plan For Success Instead.” Forbes, 27 Jan. 2015. Web.

      Capgemini. “Mergers and Acquisitions: Get CIOs, IT Leaders Involved Early.” Channel e2e, 19 June 2020. Web.

      Chandra, Sumit, et al. “Make Or Break: The Critical Role Of IT In Post-Merger Integration.” IMAA Institute, 2016. Web.

      Deloitte. “How to Calculate Technical Debt.” The Wall Street Journal, 21 Jan. 2015. Web.

      Ernst & Young. “IT As A Driver Of M&A Success.” IMAA Institute, 2017. Web.

      Fernandes, Nuno. “M&As In 2021: How To Improve The Odds Of A Successful Deal.” Forbes, 23 March 2021. Web.

      “Five steps to a better 'technology fit' in mergers and acquisitions.” BCS, 7 Nov. 2019. Web.

      Fricke, Pierre. “The Biggest Opportunity You’re Missing During an M&Aamp; IT Integration.” Rackspace, 4 Nov. 2020. Web.

      Garrison, David W. “Most Mergers Fail Because People Aren't Boxes.” Forbes, 24 June 2019. Web.

      Harroch, Richard. “What You Need To Know About Mergers & Acquisitions: 12 Key Considerations When Selling Your Company.” Forbes, 27 Aug. 2018. Web.

      Hope, Michele. “M&A Integration: New Ways To Contain The IT Cost Of Mergers, Acquisitions And Migrations.” Iron Mountain, n.d. Web.

      “How Agile Project Management Principles Can Modernize M&A.” Business.com, 13 April 2020. Web.

      Hull, Patrick. “Answer 4 Questions to Get a Great Mission Statement.” Forbes, 10 Jan. 2013. Web.

      Kanter, Rosabeth Moss. “What We Can Learn About Unity from Hostile Takeovers.” Harvard Business Review, 12 Nov. 2020. Web.

      Koller, Tim, et al. “Valuation: Measuring and Managing the Value of Companies, 7th edition.” McKinsey & Company, 2020. Web.

      Labate, John. “M&A Alternatives Take Center Stage: Survey.” The Wall Street Journal, 30 Oct. 2020. Web.

      Lerner, Maya Ber. “How to Calculate ROI on Infrastructure Automation.” DevOps.com, 1 July 2020. Web.

      Loten, Angus. “Companies Without a Tech Plan in M&A Deals Face Higher IT Costs.” The Wall Street Journal, 18 June 2019. Web.

      Low, Jia Jen. “Tackling the tech integration challenge of mergers today” Tech HQ, 6 Jan. 2020. Web.

      Lucas, Suzanne. “5 Reasons Turnover Should Scare You.” Inc. 22 March 2013. Web.

      “M&A Trends Survey: The future of M&A. Deal trends in a changing world.” Deloitte, Oct. 2020. Web.

      Maheshwari, Adi, and Manish Dabas. “Six strategies tech companies are using for successful divesting.” EY, 1 Aug. 2020. Web.

      Majaski, Christina. “Mergers and Acquisitions: What's the Difference?” Investopedia, 30 Apr. 2021.

      “Mergers & Acquisitions: Top 5 Technology Considerations.” Teksetra, 21 Jul. 2020. Web.

      “Mergers Acquisitions M&A Process.” Corporate Finance Institute, n.d. Web.

      “Mergers and acquisitions: A means to gain technology and expertise.” DLA Piper, 2020. Web.

      Nash, Kim S. “CIOs Take Larger Role in Pre-IPO Prep Work.” The Wall Street Journal, 5 March 2015. Web.

      Paszti, Laila. “Canada: Emerging Trends In Information Technology (IT) Mergers And Acquisitions.” Mondaq, 24 Oct. 2019. Web.

      Patel, Kiison. “The 8 Biggest M&A Failures of All Time” Deal Room, 9 Sept. 2021. Web.

      Peek, Sean, and Paula Fernandes. “What Is a Vision Statement?” Business News Daily, 7 May 2020. Web.

      Ravid, Barak. “Tech execs focus on growth amid increasingly competitive M&A market.” EY, 28 April 2021. Web.

      Resch, Scott. “5 Questions with a Mergers & Acquisitions Expert.” CIO, 25 June 2019. Web.

      Salsberg, Brian. “Four tips for estimating one-time M&A integration costs.” EY, 17 Oct. 2019. Web.

      Samuels, Mark. “Mergers and acquisitions: Five ways tech can smooth the way.” ZDNet, 15 Aug. 2018. Web.

      “SAP Divestiture Projects: Options, Approach and Challenges.” Cognizant, May, 2014. Web.

      Steeves, Dave. “7 Rules for Surviving a Merger & Acquisition Technology Integration.” Steeves and Associates, 5 Feb. 2020. Web.

      Tanaszi, Margaret. “Calculating IT Value in Business Terms.” CSO, 27 May 2004. Web.

      “The CIO Playbook. Nine Steps CIOs Must Take For Successful Divestitures.” SNP, 2016. Web.

      “The Role of IT in Supporting Mergers and Acquisitions.” Cognizant, Feb. 2015. Web.

      Torres, Roberto. “M&A playbook: How to prepare for the cost, staff and tech hurdles.” CIO Dive, 14 Nov. 2019. Web.

      “Valuation Methods.” Corporate Finance Institute, n.d. Web.

      Weller, Joe. “The Ultimate Guide to the M&A Process for Buyers and Sellers.” Smartsheet, 16 May 2019. Web.

      Estimate Software Delivery With Confidence

      • Buy Link or Shortcode: {j2store}147|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $50,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Estimation and planning practices set and reinforce the expectations of product delivery, which is a key driver of IT satisfaction.
      • However, today’s rapidly scaling and increasingly complex products and business needs create mounting pressure for teams to make accurate estimates with little knowledge of the problem or solution to it, risking poor-quality products.
      • Many organizations lack the critical foundations involved in making acceptable estimates in collaboration with the various perspectives and estimation stakeholders.

      Our Advice

      Critical Insight

      • Estimation reflects your culture and operating model. The accuracy of your estimates is dependent on the roles involved, which is not encouraged in traditional and top-down methodologies. Stakeholders must respect and support the team’s estimates.
      • Estimates support value delivery. IT satisfaction is driven by the delivery of valuable products and services. Estimates set the appropriate stakeholder expectations to ensure successful delivery and make the right decisions.
      • Estimates are more than just guesses. They are tools used to make critical business, product, and technical decisions and inform how to best utilize resources and funding.

      Impact and Result

      • Establish the right expectations. Gain a grounded understanding of estimation value and limitations. Discuss estimation challenges to determine if poor practices and tactics are the root causes or symptoms.
      • Strengthen analysis and estimation practices. Obtain a thorough view of the product backlog item (PBI) through good analysis tactics. Incorporate multiple analysis and estimation tactics to verify and validate assumptions.
      • Incorporate estimates into your delivery lifecycle. Review and benchmark estimates, and update expectations as more is learned.

      Estimate Software Delivery With Confidence Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize your estimation practice, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Justify estimation optimization

      Set the right stakeholder expectations for your delivery estimates and plans.

      • Estimate Software Delivery With Confidence – Phase 1: Justify Estimation Optimization
      • Estimation Quick Reference Template

      2. Commit to achievable delivery

      Adopt the analysis, estimation, commitment, and communication tactics to successfully develop your delivery plan.

      • Estimate Software Delivery With Confidence – Phase 2: Commit to Achievable Delivery

      3. Mature your estimation practice

      Build your estimation optimization roadmap.

      • Estimate Software Delivery With Confidence – Phase 3: Mature Your Estimation Practice
      [infographic]

      Workshop: Estimate Software Delivery With Confidence

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Set the Context

      The Purpose

      Discuss the decisions that estimates will help make.

      Level set estimation expectations by clarifying what they can and cannot do.

      Review the current state of your estimation practice.

      Key Benefits Achieved

      Grounded understanding of estimation that is accepted by all audiences and stakeholders.

      Identification of whether estimation practices are the root cause of estimation challenges or a symptom of a different issue.

      Activities

      1.1 Define estimation expectations.

      1.2 Reveal your root cause challenges.

      Outputs

      Estimation expectations

      Root causes of estimation challenges

      2 Build Your Estimation Practice

      The Purpose

      Discuss the estimation and planning practices used in the industry.

      Define the appropriate tactics to use to make key business and delivery decisions.

      Simulate the tactics to verify and validate their fit with your teams.

      Key Benefits Achieved

      Knowledge of good practices that can improve the effectiveness of your estimates and plans.

      Practice using new tactics.

      Activities

      2.1 Ground estimation fundamentals.

      2.2 Strengthen your analysis tactics.

      2.3 Strengthen your estimation tactics.

      2.4 Commit and communicate delivery.

      2.5 Simulate your target state planning and estimation tactics.

      Outputs

      Estimation glossary and guiding principles

      Defined analysis tactics

      Defined estimation and consensus-building tactics

      Defined commitment and communication tactics

      Lessons learned

      3 Define Your Optimization Roadmap

      The Purpose

      Review the scope and achievability of your improved estimation and planning practice.

      Key Benefits Achieved

      Realistic and achievable estimation optimization roadmap.

      Activities

      3.1 Mature your estimation practice.

      Outputs

      Estimation optimization roadmap

      The Essential COVID-19 Childcare Policy for Every Organization, Yesterday

      • Buy Link or Shortcode: {j2store}598|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Manage & Coach
      • Parent Category Link: /manage-coach
      • Helping employees navigate personal and business responsibilities to find solutions that ensure both are taken care of.
      • Reducing potential disruption to business operations through employee absenteeism due to increased care-provider responsibilities.

      Our Advice

      Critical Insight

      • Remote work is complicated by children at home with school closures. Implement alternative temporary work arrangements that allow and support employees to balance work and personal obligations.
      • Adjustments to work arrangements and pay may be necessary. Temporary work arrangements while caring for dependents over a longer-term pandemic may require adjustments to the duties carried out, number of hours worked, and adjustments to employee pay.
      • Managing remotely is more than staying in touch by phone. As a leader you will need to provide clear options that provide solutions to your employees to avoid them getting overwhelmed while taking care of the business to ensure there is a business long term.

      Impact and Result

      • Develop a policy that provides parameters around mutually agreed adjustments to performance levels while balancing dependent care with work during a pandemic.
      • Take care of the business through clear guidelines on compensation while taking care of the health and wellness of your people.
      • Develop detailed work-from-home plans that lessen disruption to your work while taking care of children or aged parents.

      The Essential COVID-19 Childcare Policy for Every Organization, Yesterday Research & Tools

      Start here. Read The Essential COVID-19 Childcare Policy for Every Organization, Yesterday

      Read our recommendations and follow the steps to develop a policy that will help your employees work productively while managing care-provider responsibilities at home.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • The Essential COVID-19 Childcare Policy for Every Organization, Yesterday Storyboard
      • Pandemic Dependent Care Policy
      • COVID-19 Dependent Care Policy Manager Action Toolkit
      • COVID-19 Dependent Care Policy Employee Guide
      • Dependent-Flextime Agreement Template
      • Workforce Planning Tool
      • Nine Ways to Support Working Caregivers Today
      • Employee Resource Group (ERG) Charter Template
      [infographic]

      Implement a New IT Organizational Structure

      • Buy Link or Shortcode: {j2store}276|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $30,999 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Organizational Design
      • Parent Category Link: /organizational-design
      • Organizational design implementations can be highly disruptive for IT staff and business partners. Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.
      • CIOs walk a tightrope as they manage the operational and emotional turbulence while aiming to improve business satisfaction within IT. Failure to achieve balance could result in irreparable failure.

      Our Advice

      Critical Insight

      • Mismanagement will hurt you. The majority of IT organizations do not manage organizational design implementations effectively, resulting in decreased satisfaction, productivity loss, and increased IT costs.
      • Preventing mismanagement is within your control. 72% of change management issues can be directly improved by managers. IT leaders have a tendency to focus their efforts on operational changes rather than on people.

      Impact and Result

      Leverage Info-Tech’s organizational design implementation process and deliverables to build and implement a detailed transition strategy and to prepare managers to lead through change.

      Follow Info-Tech’s 5-step process to:

      1. Effect change and sustain productivity through real-time employee engagement monitoring.
      2. Kick off the organizational design implementation with effective communication.
      3. Build an integrated departmental transition strategy.
      4. Train managers to effectively lead through change.
      5. Develop personalized transition plans.

      Implement a New IT Organizational Structure Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how you should implement a new organizational design, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a change communication strategy

      Create strategies to communicate the changes to staff and maintain their level of engagement.

      • Implement a New Organizational Structure – Phase 1: Build a Change Communication Strategy
      • Organizational Design Implementation FAQ
      • Organizational Design Implementation Kick-Off Presentation

      2. Build the organizational transition plan

      Build a holistic list of projects that will enable the implementation of the organizational structure.

      • Implement a New Organizational Structure – Phase 2: Build the Organizational Transition Plan
      • Organizational Design Implementation Project Planning Tool

      3. Lead staff through the reorganization

      Lead a workshop to train managers to lead their staff through the changes and build transition plans for all staff members.

      • Implement a New Organizational Structure – Phase 3: Lead Staff Through the Reorganization
      • Organizational Design Implementation Manager Training Guide
      • Organizational Design Implementation Stakeholder Engagement Plan Template
      • Organizational Design Implementation Transition Plan Template
      [infographic]

      Workshop: Implement a New IT Organizational Structure

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build Your Change Project Plan

      The Purpose

      Create a holistic change project plan to mitigate the risks of organizational change.

      Key Benefits Achieved

      Building a change project plan that encompasses both the operational changes and minimizes stakeholder and employee resistance to change.

      Activities

      1.1 Review the new organizational structure.

      1.2 Determine the scope of your organizational changes.

      1.3 Review your MLI results.

      1.4 Brainstorm a list of projects to enable the change.

      Outputs

      Project management planning and monitoring tool

      McLean Leadership Index dashboard

      2 Finalize Change Project Plan

      The Purpose

      Finalize the change project plan started on day 1.

      Key Benefits Achieved

      Finalize the tasks that need to be completed as part of the change project.

      Activities

      2.1 Brainstorm the tasks that are contained within the change projects.

      2.2 Determine the resource allocations for the projects.

      2.3 Understand the dependencies of the projects.

      2.4 Create a progress monitoring schedule.

      Outputs

      Completed project management planning and monitoring tool

      3 Enlist Your Implementation Team

      The Purpose

      Enlist key members of your team to drive the implementation of your new organizational design.

      Key Benefits Achieved

      Mitigate the risks of staff resistance to the change and low engagement that can result from major organizational change projects.

      Activities

      3.1 Determine the members that are best suited for the team.

      3.2 Build a RACI to define their roles.

      3.3 Create a change vision.

      3.4 Create your change communication strategy.

      Outputs

      Communication strategy

      4 Train Your Managers to Lead Through Change

      The Purpose

      Train your managers who are more technically focused to handle the people side of the change.

      Key Benefits Achieved

      Leverage your managers to translate how the organizational change will directly impact individuals on their teams.

      Activities

      4.1 Conduct the manager training workshop with managers.

      4.2 Review the stakeholder engagement plans.

      4.3 Review individual transition plan template with managers.

      Outputs

      Conflict style self-assessments

      Stakeholder engagement plans

      Individual transition plan template

      5 Build Your Transition Plans

      The Purpose

      Complete transition plans for individual members of your staff.

      Key Benefits Achieved

      Create individual plans for your staff members to ease the transition into their new roles.

      Activities

      5.1 Bring managers back in to complete transition plans.

      5.2 Revisit the new organizational design as a source of information.

      5.3 Complete aspects of the templates that do not require staff feedback.

      5.4 Discuss strategies for transitioning.

      Outputs

      Individual transition plan template

      Further reading

      Implement a New IT Organizational Structure

      Prioritize quick wins and critical services during IT org changes.

      This blueprint is part 3/3 in Info-Tech’s organizational design program and focuses on implementing a new structure

      Part 1: Design Part 2: Structure Part 3: Implement
      IT Organizational Architecture Organizational Sketch Organizational Structure Organizational Chart Transition Strategy Implement Structure
      1. Define the organizational design objectives.
      2. Develop strategically-aligned capability map.
      3. Create the organizational design framework.
      4. Define the future state work units.
      5. Create future state work unit mandates.
      1. Assign work to work units (accountabilities and responsibilities).
      2. Develop organizational model options (organizational sketches).
      3. Assess options and select go-forward model.
      1. Define roles by work unit.
      2. Create role mandates.
      3. Turn roles into jobs.
      4. Define reporting relationships between jobs.
      5. Define competency requirements.
      1. Determine number of positions per job.
      2. Conduct competency assessment.
      3. Assign staff to jobs.
      1. Form OD implementation team.
      2. Develop change vision.
      3. Build communication presentation.
      4. Identify and plan change projects.
      5. Develop organizational transition plan.
      1. Train managers to lead through change.
      2. Define and implement stakeholder engagement plan.
      3. Develop individual transition plans.
      4. Implement transition plans.
      Risk Management: Create, implement, and monitor risk management plan.
      HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.

      Monitor and Sustain Stakeholder Engagement →

      The sections highlighted in green are in scope for this blueprint. Click here for more information on designing or on structuring a new organization.

      Our understanding of the problem

      This Research is Designed For:

      • CIOs

      This Research Will Help You:

      • Effectively implement a new organizational structure.
      • Develop effective communications to minimize turnover and lost productivity during transition.
      • Identify a detailed transition strategy to move to your new structure with minimal interruptions to service quality.
      • Train managers to lead through change and measure ongoing employee engagement.

      This Research Will Also Assist:

      • IT Leaders

      This Research Will Help Them:

      • Effectively lead through the organizational change.
      • Manage difficult conversations with staff and mitigate staff concerns and turnover.
      • Build clear transition plans for their teams.

      Executive summary

      Situation

      • Organizational Design (OD) projects are typically undertaken in order to enable organizational priorities, improve IT performance, or to reduce IT costs. However, due to the highly disruptive nature of the change, only 25% of changes achieve their objectives over the long term. (2013 Towers Watson Change and Communication ROI Survey)

      Complication

      • OD implementations can be highly disruptive for IT staff and business partners. Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.
      • CIOs walk a tightrope as they manage the operational and emotional turbulence while aiming to improve business satisfaction within IT. Failure to achieve balance could result in irreparable failure.

      Resolution

      • Leverage Info-Tech’s organizational design implementation process and deliverables to build and implement a detailed transition strategy and to prepare managers to lead through change. Follow Info-Tech’s 5-step process to:
        1. Effect change and sustain productivity through real-time employee engagement monitoring.
        2. Kick off the organizational design implementation with effective communication.
        3. Build an integrated departmental transition strategy.
        4. Train managers to effectively lead through change.
        5. Develop personalized transition plans.

      Info-Tech Insight

      1. Mismanagement will hurt you. The majority of IT organizations do not manage OD implementations effectively, resulting in decreased satisfaction, productivity loss, and increased IT costs.
      2. Preventing mismanagement is within your control. 72% of change management issues can be directly improved by managers. (Abilla, 2009) IT leaders have a tendency to focus their efforts on operational changes rather than on people. This is a recipe for failure.

      Organizational Design Implementation

      Managing organizational design (OD) changes effectively is critical to maintaining IT service levels and retaining top talent throughout a restructure. Nevertheless, many organizations fail to invest appropriate consideration and resources into effective OD change planning and execution.

      THREE REASONS WHY CIOS NEED TO EFFECTIVELY MANAGE CHANGE:

      1. Failure is the norm; not the exception. According to a study by Towers Watson, only 55% of organizations experience the initial value of a change. Even fewer organizations, a mere 25%, are actually able to sustain change over time to experience the full expected benefits. (2013 Towers Watson Change and Communication ROI Survey)
      2. People are the biggest cause of failure. Organizational design changes are one of the most difficult types of changes to manage as staff are often highly resistant. This leads to decreased productivity and poor results. The most significant people challenge is the loss of momentum through the change process which needs to be actively managed.
      3. Failure costs money. Poor IT OD implementations can result in increased turnover, lost productivity, and decreased satisfaction from the business. Managing the implementation has a clear ROI as the cost of voluntary turnover is estimated to be 150% of an employee’s annual salary. (Inc)

      86% of IT leaders believe organization and leadership processes are critical, yet the majority struggle to be effective

      PERCENTAGE OF IT LEADERS WHO BELIEVE THEIR ORGANIZATION AND LEADERSHIP PROCESSES ARE HIGHLY IMPORTANT AND HIGHLY EFFECTIVE

      A bar graph, with the following organization and leadership processes listed on the Y-axis: Human Resources Management; Leadership, Culture, Values; Organizational Change Management; and Organizational Design. The bar graph shows that over 80% of IT leaders rate these processes as High Importance, but less than 40% rate them as having High Effectiveness.

      GAP BETWEEN IMPORTANCE AND EFFECTIVENESS

      Human Resources Management - 61%

      Leadership, Culture, Values - 48%

      Organizational Change Management - 55%

      Organizational Design - 45%

      Note: Importance and effectiveness were determined by identifying the percentage of individuals who responded with 8-10/10 to the questions…

      • “How important is this process to the organization’s ability to achieve business and IT goals?” and…
      • “How effective is this process at helping the organization to achieve business and IT goals?”

      Source: Info-Tech Research Group, Management and Governance Diagnostic. N=22,800 IT Professionals

      Follow a structured approach to your OD implementation to improve stakeholder satisfaction with IT and minimize risk

      • IT reorganizations are typically undertaken to enable strategic goals, improve efficiency and performance, or because of significant changes to the IT budget. Without a structured approach to manage the organizational change, IT might get the implementation done, but fail to achieve the intended benefits, i.e. the operation succeeds, but the patient has died on the table.
      • When implementing your new organizational design, it’s critical to follow a structured approach to ensure that you can maintain IT service levels and performance and achieve the intended benefits.
      • The impact of organizational structure changes can be emotional and stressful for staff. As such, in order to limit voluntary turnover, and to maintain productivity and performance, IT leaders need to be strategic about how they communicate and respond to resistance to change.

      TOP 3 BENEFITS OF FOLLOWING A STRUCTURED APPROACH TO IMPLEMENTING ORGANIZATIONAL DESIGN

      1. Improved stakeholder satisfaction with IT. A detailed change strategy will allow you to successfully transition staff into new roles with limited service interruptions and with improved stakeholder satisfaction.
      2. Experience minimal voluntary turnover throughout the change. Know how to actively engage and minimize resistance of stakeholders throughout the change.
      3. Execute implementation on time and on budget. Effectively managed implementations are 65–80% more likely to meet initial objectives than those with poor organizational change management. (Boxley Group, LLC)

      Optimize your organizational design implementation results by actively preparing managers to lead through change

      IT leaders have a tendency to make change even more difficult by focusing on operations rather than on people. This is a recipe for failure. People pose the greatest risk to effective implementation and as such, IT managers need to be prepared and trained on how to lead their staff through the change. This includes knowing how to identify and manage resistance, communicating the change, and maintaining positive momentum with staff.

      Staff resistance and momentum are the most challenging part of leading through change (McLean & Company, N=196)

      A bar graph with the following aspects of Change Management listed on the Y-Axis, in increasing order of difficulty: Dealing with Technical Issues; Monitoring metrics to measure progress; Amending policies and processes; Coordinating with stakeholders; Getting buy-in from staff; Maintaining a positive momentum with staff.

      Reasons why change fails: 72% of failures can be directly improved by the manager (shmula)

      A pie chart showing the reasons why change fails: Management behavior not supportive of change = 33%; Employee resistance to change = 39%; Inadequate resources or budget = 14%; and All other obstacles = 14%.

      Leverage organizational change management (OCM) best practices for increased OD implementation success

      Effective change management correlates with project success

      A line graph, with Percent of respondents that met or exceeded project objectives listed on the Y-axis, and Poor, Fair, Good, and Excellent listed on the X-axis. The line represents the overall effectiveness of the change management program, and as the value on the Y-axis increases, so does the value on the X-axis.

      Source: Prosci. From Prosci’s 2012 Best Practices in Change Management benchmarking report.

      95% of projects with excellent change management met or EXCEEDED OBJECTIVES, vs. 15% of those with poor OCM. (Prosci)

      143% ROI on projects with excellent OCM. In other words, for every dollar spent on the project, the company GAINS 43 CENTS. This is in contrast to 35% ROI on projects with poor OCM. (McKinsey)

      Info-Tech’s approach to OD implementation is a practical and tactical adaptation of several successful OCM models

      BUSINESS STRATEGY-ORIENTED OCM MODELS. John Kotter’s 8-Step model, for instance, provides a strong framework for transformational change but doesn’t specifically take into account the unique needs of an IT transformation.

      GENERAL-PURPOSE OCM FRAMEWORKS such as ACMP’s Standard for Change Management, CMI’s CMBoK, and Prosci’s ADKAR model are very comprehensive and need to be configured to organizational design implementation-specific initiatives.

      COBIT MANAGEMENT PRACTICE BAI05: MANAGE ORGANIZATIONAL CHANGE ENABLEMENT follows a structured process for implementing enterprise change quickly. This framework can be adapted to OD implementation; however, it is most effective when augmented with the people and management training elements present in other frameworks.

      References and Further Reading

      Tailoring a comprehensive, general-purpose OCM framework to an OD implementation requires familiarity and experience. Info-Tech’s OD implementation model adapts the best practices from a wide range of proven OCM models and distills it into a step-by-step process that can be applied to an organizational design transformation.

      The following OD implementation symptoms can be avoided through structured planning

      IN PREVIOUS ORGANIZATIONAL CHANGES, I’VE EXPERIENCED…

      “Difficultly motivating my staff to change.”

      “Higher than average voluntary turnover during and following the implementation.”

      “An overall sense of staff frustration or decreased employee engagement.”

      “Decreased staff productivity and an inability to meet SLAs.”

      “Increased overtime caused by being asked to do two jobs at once.”

      “Confusion about the reporting structure during the change.”

      “Difficulty keeping up with the rate of change and change fatigue from staff.”

      “Business partner dissatisfaction about the change and complaints about the lack of effort or care put in by IT employees.”

      “Business partners not wanting to adjust to the change and continuing to follow outdated processes.”

      “Decrease in stakeholder satisfaction with IT.”

      “Increased prevalence of shadow IT during or following the change.”

      “Staff members vocally complaining about the IT organization and leadership team.”

      Follow this blueprint to develop and execute on your OD implementation

      IT leaders often lack the experience and time to effectively execute on organizational changes. Info-Tech’s organizational design implementation program will provide you with the needed tools, templates, and deliverables. Use these insights to drive action plans and initiatives for improvement.

      How we can help

      • Measure the ongoing engagement of your employees using Info-Tech’s MLI diagnostic. The diagnostic comes complete with easily customizable reports to track and act on employee engagement throughout the life of the change.
      • Use Info-Tech’s customizable project management tools to identify all of the critical changes, their impact on stakeholders, and mitigate potential implementation risks.
      • Develop an in-depth action plan and transition plans for individual stakeholders to ensure that productivity remains high and that service levels and project expectations are met.
      • Align communication with real-time staff engagement data to keep stakeholders motivated and focused throughout the change.
      • Use Info-Tech’s detailed facilitation guide to train managers on how to effectively communicate the change, manage difficult stakeholders, and help ensure a smooth transition.

      Leverage Info-Tech’s customizable deliverables to execute your organizational design implementation

      A graphic with 3 sections: 1.BUILD A CHANGE COMMUNICATION STRATEGY; 2.BUILD THE ORGANIZATIONAL TRANSITION PLAN; 3.1 TRAIN MANAGERS TO LEAD THROUGH CHANGE; 3.2 TRANSITION STAFF TO NEW ROLES. An arrow emerges from point one and directs right, over the rest of the steps. Text above the arrow reads: ONGOING ENGAGEMENT MONITORING AND COMMUNICATION. Dotted arrows emerge from points two and three directing back toward point one. Text below the arrow reads: COMMUNICATION STRATEGY ITERATION.

      CUSTOMIZABLE PROJECT DELIVERABLES

      1. BUILD A CHANGE COMMUNICATION STRATEGY

      • McLean Leadership Index: Real-Time Employee Engagement Dashboard
      • Organizational Design
      • Implementation Kick-Off Presentation
      • Organizational Design Implementation FAQ

      2. BUILD THE ORGANIZATIONAL TRANSITION PLAN

      • Organizational Design Implementation Project Planning Tool

      3.1 TRAIN MANAGERS TO LEAD THROUGH CHANGE

      3.2 TRANSITION STAFF TO NEW ROLES

      • Organizational Design Implementation Manager Training Guide
      • Organizational Design Implementation Transition Plan Template

      Leverage Info-Tech’s tools and templates to overcome key engagement program implementation challenges

      KEY SECTION INSIGHTS:

      BUILD A CHANGE COMMUNICATION STRATEGY

      Effective organizational design implementations mitigate the risk of turnover and lost productivity through ongoing monitoring and managing of employee engagement levels. Take a data-driven approach to managing engagement with Info-Tech’s real-time MLI engagement dashboard and adjust your communication and implementation strategy before engagement risks become issues.

      BUILD THE ORGANIZATIONAL TRANSITION PLAN

      Your organizational design implementation is made up of a series of projects and needs to be integrated into your larger project schedule. Too often, organizations attempt to fit the organizational design implementation into their existing schedules which results in poor resource planning, long delays in implementation, and overall poor results.

      LEAD STAFF THROUGH THE REORGANIZATION

      The majority of IT managers were promoted because they excelled at the technical aspect of their job rather than in people management. Not providing training is setting your organization up for failure. Train managers to effectively lead through change to see a 72% decrease in change management issues. (Abilla, 2009)

      METRICS:

      1. Voluntary turnover: Conduct an exit interview with all staff members during and after transition. Identify any staff members who cite the change as a reason for departure. For those who do leave, multiply their salary by 1.5% (the cost of a new hire) and track this over time.
      2. Business satisfaction trends: Conduct CIO Business Vision one year prior to the change vs. one year after change kick-off. Prior to the reorganization, set metrics for each category for six months after the reorganization, and one year following.
      3. Saved development costs: Number of hours to develop internal methodology, tools, templates, and process multiplied by the salary of the individual.

      Use this blueprint to save 1–3 months in implementing your new organizational structure

      Time and Effort Using Blueprint Without Blueprint
      Assess Current and Ongoing Engagement 1 person ½ day – 4 weeks 1–2 hours for diagnostic set up (allow extra 4 weeks to launch and review initial results). High Value 4–8 weeks
      Set Up the Departmental Change Workbooks 1–5 people 1 day 4–5 hours (varies based on the scope of the change). Medium Value 1–2 weeks
      Design Transition Strategy 1–2 people 1 day 2–10 hours of implementation team’s time. Medium Value 0–2 weeks
      Train Managers to Lead Through Change 1–5 people 1–2 weeks 1–2 hours to prepare training (allow for 3–4 hours per management team to execute). High Value 3–5 weeks

      These estimates are based on reviews with Info-Tech clients and our experience creating the blueprint.

      Totals:

      Workshop: 1 week

      GI/DIY: 2-6 weeks

      Time and Effort Saved: 8-17 weeks

      CIO uses holistic organizational change management strategies to overcome previous reorganization failures

      CASE STUDY

      Industry: Manufacturing

      Source: Client interview

      Problem

      When the CIO of a large manufacturing company decided to undertake a major reorganization project, he was confronted with the stigma of a previous CIO’s attempt. Senior management at the company were wary of the reorganization since the previous attempt had failed and cost a lot of money. There was major turnover since staff were not happy with their new roles costing $250,000 for new hires. The IT department saw a decline in their satisfaction scores and a 10% increase in help desk tickets. The reorganization also cost the department $400,000 in project rework.

      Solution

      The new CIO used organizational change management strategies in order to thoroughly plan the implementation of the new organizational structure. The changes were communicated to staff in order to improve adoption, every element of the change was mapped out, and the managers were trained to lead their staff through the change.

      Results

      The reorganization was successful and eagerly adopted by the staff. There was no turnover after the new organizational structure was implemented and the engagement levels of the staff remained the same.

      $250,000 - Cost of new hires and salary changes

      10% - Increase in help desk tickets

      $400,000 - Cost of project delays due to the poorly effective implementation of changes

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Implement a New Organizational Structure

      3. Lead Staff Through the Reorganization
      1. Build a Change Communication Strategy 2. Build the Organizational Transition Plan 3.1 Train Managers to Lead Through Change 3.2 Transition Staff to New Roles
      Best-Practice Toolkit

      1.1 Launch the McLean Leadership Index to set a baseline.

      1.2 Establish your implementation team.

      1.3 Build your change communication strategy and change vision.

      2.1 Build a holistic list of change projects.

      2.2 Monitor and track the progress of your change projects.

      3.1.1 Conduct a workshop with managers to prepare them to lead through the change.

      3.1.2 Build stakeholder engagement plans and conduct conflict style self-assessments.

      3.2.1 Build transition plans for each of your staff members.

      3.2.2 Transition your staff to their new roles.

      Guided Implementations
      • Set up your MLI Survey.
      • Determine the members and roles of your implementation team.
      • Review the components of a change communication strategy.
      • Review the change dimensions and how they are used to plan change projects.
      • Review the list of change projects.
      • Review the materials and practice conducting the workshop.
      • Debrief after conducting the workshop.
      • Review the individual transition plan and the process for completing it.
      • Final consultation before transitioning staff to their new roles.
      Onsite Workshop Module 1: Effectively communicate the reorganization to your staff. Module 2: Build the organizational transition plan. Module 3.1: Train your managers to lead through change. Module 3.2: Complete your transition plans

      Phase 1 Results:

      • Plans for effectively communicating with your staff.

      Phase 2 Results:

      • A holistic view of the portfolio of projects required for a successful reorg

      Phase 3.1 Results:

      • A management team that is capable of leading their staff through the reorganization

      Phase 3.2 Results:

      • Completed transition plans for your entire staff.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Build Your Change Project Plan

      1.1 Review the new organizational structure.

      1.2 Determine the scope of your organizational changes.

      1.3 Review your MLI results.

      1.4 Brainstorm a list of projects to enable the change.

      Finalize Change Project Plan

      2.1 Brainstorm the tasks that are contained within the change projects.

      2.2 Determine the resource allocation for the projects.

      2.3 Understand the dependencies of the projects.

      2.4 Create a progress monitoring schedule

      Enlist Your Implementation Team

      3.1 Determine the members that are best suited for the team.

      3.2 Build a RACI to define their roles.

      3.3 Create a change vision.

      3.4 Create your change communication strategy.

      Train Your Managers to Lead Through Change

      4.1 Conduct the manager training workshop with managers.

      4.2 Review the stakeholder engagement plans.

      4.3 Review individual transition plan template with managers

      Build Your Transition Plans

      5.1 Bring managers back in to complete transition plans.

      5.2 Revisit new organizational design as a source for information.

      5.3 Complete aspects of the template that do not require feedback.

      5.4 Discuss strategies for transitioning.

      Deliverables
      1. McLean Leadership Index Dashboard
      2. Organizational Design Implementation Project Planning Tool
      1. Completed Organizational Design Implementation Project Planning Tool
      1. Communication Strategy
      1. Stakeholder Engagement Plans
      2. Conflict Style Self-Assessments
      3. Organizational Design Implementation Transition Plan Template
      1. Organizational Design Implementation Transition Plan Template

      Phase 1

      Build a Change Communication Strategy

      Build a change communication strategy

      Outcomes of this Section:

      • Launch the McLean Leadership Index
      • Define your change team
      • Build your reorganization kick-off presentation and FAQ for staff and business stakeholders

      This section involves the following participants:

      • CIO
      • IT leadership team
      • IT staff

      Key Section Insight:

      Effective organizational design implementations mitigate the risk of turnover and lost productivity through ongoing monitoring of employee engagement levels. Take a data-driven approach to managing engagement with Info-Tech’s real-time MLI engagement dashboard and adjust your communication and implementation strategy in real-time before engagement risks become issues.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Build a Change Communication Strategy

      Proposed Time to Completion (in weeks): 1-6 weeks

      Step 1.1: Launch Your McLean Leadership Index Survey

      Start with an analyst kick off call:

      • Discuss the benefits and uses of the MLI.
      • Go over the required information (demographics, permissions, etc.).
      • Set up a live demo of the survey.

      Then complete these activities…

      • Launch the survey with your staff.
      • Have a results call with a member of the Info-Tech staff.

      With these tools & templates:

      McLean Leadership Index

      Step 1.2: Establish Your Implementation Team

      Review findings with analyst:

      • Review what members of your department should participate.
      • Build a RACI to determine the roles of your team members.

      Then complete these activities…

      • Hold a kick-off meeting with your new implementation team.
      • Build the RACI for your new team members and their roles.

      Step 1.3: Build Your Change Communication Strategy

      Finalize phase deliverable:

      • Customize your reorganization kick-off presentation.
      • Create your change vision. Review the communication strategy.

      Then complete these activities…

      • Hold your kick-off presentation with staff members.
      • Launch the reorganization communications.

      With these tools & templates:

      • Organizational Design Implementation Kick-Off Presentation
      • Organizational Design Implementation FAQ

      Set the stage for the organizational design implementation by effectively introducing and communicating the change to staff

      Persuading people to change requires a “soft,” empathetic approach to keep them motivated and engaged. But don’t mistake “soft” for easy. Managing the people and communication aspects around the change are amongst the toughest work there is, and require a comfort and competency with uncertainty, ambiguity, and conflict.

      Design Engagement Transition
      Communication

      Communication and engagement are the chains linking your design to transition. If the organizational design initiative is going to be successful it is critical that you manage this effectively. The earlier you begin planning the better. The more open and honest you are about the change the easier it will be to maintain engagement levels, business satisfaction, and overall IT productivity.

      Kick-Off Presentation Inputs

      • LAUNCH THE MCLEAN LEADERSHIP INDEX
      • IDENTIFY YOUR CHANGE TEAM
      • DETERMINE CHANGE TEAM RESPONSIBILITIES
      • DEVELOP THE CHANGE VISION
      • DEFINE KEY MESSAGES AND GOALS
      • IDENTIFY MAJOR CHANGES
      • IDENTIFY KEY MILESTONES
      • BUILD AND MAINTAIN A CHANGE FAQ

      Use the MLI engagement dashboard to measure your current state and the impact of the change in real-time

      The McLean Leadership Index diagnostic is a low-effort, high-impact program that provides real-time metrics on staff engagement levels. Use these insights to understand your employees’ engagement levels throughout the organizational design implementation to measure the impact of the change and to manage turnover and productivity levels throughout the implementation.

      WHY CARE ABOUT ENGAGEMENT DURING THE CHANGE? ENGAGED EMPLOYEES REPORT:

      39% Higher intention to stay at the organization.

      29% Higher performance and increased likelihood to work harder and longer hours. (Source: McLean and Company N=1,308 IT Employees)

      Why the McLean Leadership Index?

      Based on the Net Promoter Score (NPS), the McLean Leadership Index is one question asked monthly to assess engagement at various points in time.

      Individuals responding to the MLI question with a 9 or 10 are your Promoters and are most positive and passionate. Those who answer 7 or 8 are Passives while those who answer 0 to 6 are Detractors.

      Track your engagement distribution using our online dashboard to view MLI data at any time and view results based on teams, locations, manager, tenure, age, and gender. Assess the reactions to events and changes in real-time, analyze trends over time, and course-correct.

      Dashboard reports: Know your staff’s overall engagement and top priorities

      McLean Leadership Index

      OVERALL ENGAGEMENT RESULTS

      You get:

      • A clear breakdown of your detractors, passives, and promotors.
      • To view results by team, location, and individual manager.
      • To dig deeper into results by reviewing results by age, gender, and tenure at the organization to effectively identify areas where engagement is weak.

      TIME SERIES TRENDS

      You get:

      • View of changes in engagement levels for each team, location, and manager.
      • Breakdown of trends weekly, monthly, quarterly, and yearly.
      • To encourage leaders to monitor results to analyze root causes for changes and generate improvement initiatives.

      QUALITATIVE COMMENTS

      You get:

      • To view qualitative comments provided by staff on what is impacting their engagement.
      • To reply directly to comments without impacting the anonymity of the individuals making the comments.
      • To leverage trends in the comments to make changes to communication approaches.

      Launch the McLean Leadership Index in under three weeks

      Info-Tech’s dedicated team of program managers will facilitate this diagnostic program remotely, providing you with a convenient, low-effort, high-impact experience.

      We will guide you through the process with your goals in mind to deliver deep insight into your successes and areas to improve.

      What You Need To Do:

      1. Contact Info-Tech to launch the program and test the functionality in a live demo.
      2. Identify demographics and set access permissions.
      3. Complete manager training with assistance from Info-Tech Advisors.
      4. Participate in a results call with an Info-Tech Advisor to review results and develop an action plan.

      Info-Tech’s Program Manager Will:

      1. Collect necessary inputs and generate your custom dashboard.
      2. Launch, maintain, and support the online system in the field.
      3. Send out a survey to 25% of the staff each week.
      4. Provide ongoing support over the phone, and the needed tools and templates to communicate and train staff as well as take action on results.

      Explore your initial results in a one-hour call with an Executive Advisor to fully understand the results and draw insights from the data so you can start your action plan.

      Start Your Diagnostic Now

      We'll help you get set up as soon as you're ready.

      Start Now

      Communication has a direct impact on employee engagement; measure communication quality using your MLI results

      A line graph titled: The impact of manager communication on employee engagement. The X-axis is labeled from Strongly Disagree to Strongly Agree, and the Y-axis is labeled: Percent of Engaged Respondents. There are 3 colour-coded lines: dark blue indicates My manager provides me with high-quality feedback; light blue indicates I clearly understand what is expected of me on the job; and green indicates My manager keeps me well informed about decisions that affect me. The line turns upward as it moves to the right of the graph.

      (McLean & Company, 2015 N=17,921)

      A clear relationship exists between how effective a manager’s communication is perceived to be and an employee’s level of engagement. If engagement drops, circle back with employees to understand the root causes.

      Establish an effective implementation team to drive the organizational change

      The implementation team is responsible for developing and disseminating information around the change, developing the transition strategy, and for the ongoing management of the changes.

      The members of the implementation team should include:

      • CIO
      • Current IT leadership team
      • Project manager
      • Business relationship managers
      • Human resources advisor

      Don’t be naïve – building and executing the implementation plan will require a significant time commitment from team members. Too often, organizations attempt to “fit it in” to their existing schedules resulting in poor planning, long delays, and overall poor results. Schedule this work like you would a project.

      TOP 3 TIPS FOR DEFINING YOUR IMPLEMENTATION TEAM

      1. Select a Project Manager. Info-Tech strongly recommends having one individual accountable for key project management activities. They will be responsible for keeping the project on time and maintaining a holistic view of the implementation.
      2. Communication with Business Partners is Critical. If you have Business Relationship Managers (BRMs), involve them in the communication planning or assign someone to play this role. You need your business partners to be informed and bought in to the implementation to maintain satisfaction.
      3. Enlist Your “Volunteer Army.” (Kotter’s 8 Principles) If you have an open culture, Info-Tech encourages you to have an extended implementation team made up of volunteers interested in supporting the change. Their role will be to support the core group, assist in planning, and communicate progress with peers.

      Determine the roles of your implementation team members

      1.1 30 Minutes

      Input

      • Implementation team members

      Output

      • RACI for key transition elements

      Materials

      • RACI chart and pen

      Participants

      • Core implementation committee
      1. Each member should be actively engaged in all elements of the organizational design implementation. However, it’s important to have one individual who is accountable for key activities and ensures they are done effectively and measured.
      2. Review the chart below and as a group, brainstorm any additional key change components.
      3. For each component listed below, identify who is Accountable, Responsible, Consulted, and Informed for each (suggested responsibility below).
      CIO IT Leaders PM BRM HR
      Communication Plan A R R R C
      Employee Engagement A R R R C

      Departmental Transition Plan

      R A R I R
      Organizational Transition Plan R R A I C
      Manager Training A R R I C

      Individual Transition Plans

      R A R I I
      Technology and Logistical Changes R R A I I
      Hiring A R I I R
      Learning and Development R A R R R
      Union Negotiations R I I I A
      Process Development R R A R I

      Fast-track your communication planning with Info-Tech’s Organizational Design Implementation Kick-Off Presentation

      Organizational Design Implementation Kick-Off Presentation

      Communicate what’s important to your staff in a simple, digestible way. The communication message should reflect what is important to your stakeholders and what they want to know at the time.

      • Why is this change happening?
      • What are the goals of the reorganization?
      • What specifically is changing?
      • How will this impact me?
      • When is this changing?
      • How and where can I get more information?

      It’s important that the tone of the meeting suits the circumstances.

      • If the reorganization is going to involve lay-offs: The meeting should maintain a positive feel, but your key messages should stress the services that will be available to staff, when and how people will be communicated with about the change, and who staff can go to with concerns.
      • If the reorganization is to enable growth: Focus on celebrating where the organization is going, previous successes, and stress that the staff are critical in enabling team success.

      Modify the Organizational Design ImplementationKick-Off Presentation with your key messages and goals

      1.2 1 hour

      Input

      • New organizational structure

      Output

      • Organizational design goal statements

      Materials

      • Whiteboard & marker
      • ODI Kick-off Presentation

      Participants

      • OD implementation team
      1. Within your change implementation team, hold a meeting to identify and document the change goals and key messages.
      2. As a group, discuss what the key drivers were for the organizational redesign by asking yourselves what problem you were trying to solve.
      3. Select 3–5 key problem statements and document them on a whiteboard.
      4. For each problem statement, identify how the new organizational design will allow you to solve those problems.
      5. Document these in your Organizational Design Implementation Kick-Off Presentation.

      Modify the presentation with your unique change vision to serve as the center piece of your communication strategy

      1.3 1 hour

      Input

      • Goal statements

      Output

      • Change vision statement

      Materials

      • Sticky notes
      • Pens
      • Voting dots

      Participants

      • Change team
      1. Hold a meeting with the change implementation team to define your change vision. The change vision should provide a picture of what the organization will look like after the organizational design is implemented. It should represent the aspirational goal, and be something that staff can all rally behind.
      2. Hand out sticky notes and ask each member to write down on one note what they believe is the #1 desired outcome from the organizational change and one thing that they are hoping to avoid (you may wish to use your goal statements to drive this).
      3. As a group, review each of the sticky notes and group similar statements in categories. Provide each individual with 3 voting dots and ask them to select their three favorite statements.
      4. Select your winning statements in teams of 2–3. Review each statement and as a team work to strengthen the language to ensure that the statement provides a call to action, that it is short and to the point, and motivational.
      5. Present the statements back to the group and select the best option through a consensus vote.
      6. Document the change vision in your Organizational Design Implementation Kick-Off Presentation.

      Customize the presentation identifying key changes that will be occurring

      1.4 2 hours

      Input

      • Old and new organizational sketch

      Output

      • Identified key changes that are occurring

      Materials

      • Whiteboard
      • Sticky notes & Pens
      • Camera

      Participants

      • OD implementation team
      1. On a whiteboard, draw a high-level picture of your previous organizational sketch and your new organizational sketch.
      2. Using sticky notes, ask individuals to highlight key high-level challenges that exist in the current model (consider people, process, and technology).
      3. Consider each sticky note, and highlight and document how and where your new sketch will overcome those challenges and the key differences between the old structure and the new.
      4. Take a photo of the two sketches and comments, and document these in your Organizational Design Implementation Kick-Off Presentation.

      Modify the presentation by identifying and documenting key milestones

      1.5 1 hour

      Input

      • OD implementation team calendars

      Output

      • OD implementation team timeline

      Materials

      • OD Implementation Kick-Off Presentation

      Participants

      • OD implementation team
      1. Review the timeline in the Organizational Design Implementation Kick-Off Presentation. As a group, discuss the key milestones identified in the presentation:
        • Kick-off presentation
        • Departmental transition strategy built
        • Organizational transition strategy built
        • Manager training
        • One-on-one meetings with staff to discuss changes to roles
        • Individual transition strategy development begins
      2. Review the timeline, and keeping your other commitments in mind, estimate when each of these tasks will be completed and update the timeline.

      Build an OD implementation FAQ to proactively address key questions and concerns about the change

      Organizational Design Implementation FAQ

      Leverage this template as a starting place for building an organizational design implementation FAQ.

      This template is prepopulated with example questions and answers which are likely to arise.

      Info-Tech encourages you to use the list of questions as a basis for your FAQ and to add additional questions based on the changes occurring at your organization.

      It may also be a good idea to store the FAQ on a company intranet portal so that staff has access at all times and to provide users with a unique email address to forward questions to when they have them.

      Build your unique organizational design implementation FAQ to keep staff informed throughout the change

      1.6 1 hour + ongoing

      Input

      • OD implementation team calendars

      Output

      • OD implementation team timeline

      Materials

      • OD Implementation Kick-Off Presentation

      Participants

      • OD implementation team
      1. Download a copy of the Organizational Design Implementation FAQ and as a group, review each of the key questions.
      2. Delete any questions that are not relevant and add any additional questions you either believe you will receive or which you have already been asked.
      3. Divide the questions among team members and have each member provide a response to these questions.
      4. The CIO and the project manager should review the responses for accuracy and ensure they are ready to be shared with staff.
      5. Publish the responses on an IT intranet site and make the location known to your IT staff.

      Dispelling rumors by using a large implementation team

      CASE STUDY

      Industry: Manufacturing

      Source: CIO

      Challenge

      When rumors of the impending reorganization reached staff, there was a lot of confusion and some of the more vocal detractors in the department enforced these rumors.

      Staff were worried about changes to their jobs, demotions, and worst of all, losing their jobs. There was no communication from senior management to dispel the gossip and the line managers were also in the dark so they weren’t able to offer support.

      Staff did not feel comfortable reaching out to senior management about the rumors and they didn’t know who the change manager was.

      Solution

      The CIO and change manager put together a large implementation team that included many of the managers in the department. This allowed the managers to handle the gossip through informal conversations with their staff.

      The change manager also built a communication strategy to communicate the stages of the reorganization and used FAQs to address the more common questions.

      Results

      The reorganization was adopted very quickly since there was little confusion surrounding the changes with all staff members. Many of the personnel risks were mitigated by the communication strategy because it dispelled rumors and took some of the power away from the vocal detractors in the department.

      An engagement survey was conducted 3 months after the reorganization and the results showed that the engagement of staff had not changed after the reorganization.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1a: Launch the MLI Dashboard (Pre-Work)

      Prior to the workshop, Info-Tech’s advisors will work with you to launch the MLI diagnostic to understand the overall engagement levels of your organization.

      1b: Review Your MLI Results

      The analysts will facilitate several exercises to help you and your team identify your current engagement levels, and the variance across demographics and over time.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      1.1: Define Your Change Team Responsibilities

      Review the key responsibilities of the organizational design implementation team and define the RACI for each individual member.

      1.3: Define Your Change Vision and Goals

      Identify the change vision statement which will serve as the center piece for your change communications as well as the key message you want to deliver to your staff about the change. These messages should be clear, emotionally impactful, and inspirational.

      1.4: Identify Key Changes Which Will Impact Staff

      Collectively brainstorm all of the key changes that are happening as a result of the change, and prioritize the list based on the impact they will have on staff. Document the top 10 biggest changes – and the opportunities the change creates or problems it solves.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      1.5: Define the High-Level Change Timeline

      Identify and document the key milestones within the change as a group, and determine key dates and change owners for each of the key items. Determine the best way to discuss these timelines with staff, and whether there are any which you feel will have higher levels of resistance.

      1.5: Build the FAQ and Prepare for Objection Handling

      As a group, brainstorm the key questions you believe you will receive about the change and develop a common FAQ to provide to staff members. The advisor will assist you in preparing to manage objections to limit resistance.

      Phase 2

      Build The Organizational Transition Plan

      Build the organizational transition plan

      Outcomes of this section:

      • A holistic list of projects that will enable the implementation of the organizational structure.
      • A schedule to monitor the progress of your change projects.

      This section involves the following participants:

      • CIO
      • Reorganization Implementation Team

      Key Section Insight:

      Be careful to understand the impacts of the change on all groups and departments. For best results, you will need representation from all departments to limit conflict and ensure a smooth transition. For large IT organizations, you will need to have a plan for each department/work unit and create a larger integration project.

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Build the Organizational Transition Plan

      Proposed Time to Completion (in weeks): 2-4 weeks

      Step 2.1: Review the Change Dimensions and How They Are Used to Plan Change Projects

      Start with an analyst kick off call:

      • Review the purpose of the kick-off meeting.
      • Review the change project dimensions.
      • Review the Organizational Design Implementation Project Planning Tool.

      Then complete these activities…

      • Conduct your kick-off meeting.
      • Brainstorm a list of reorganization projects and their related tasks.

      With these tools & templates:

      • Organizational Design Implementation Project Planning Tool

      Step 2.2: Review the List of Change Projects

      Review findings with analyst:

      • Revisit the list of projects and tasks developed in the brainstorming session.
      • Assess the list and determine resourcing and dependencies for the projects.
      • Review the monitoring process.

      Then complete these activities…

      • Complete the Organizational Design Implementation Project Planning Tool.
      • Map out your project dependencies and resourcing.
      • Develop a schedule for monitoring projects.

      With these tools & templates:

      • Organizational Design Implementation Project Planning Tool

      Use Info-Tech’s Organizational Design Implementation Project Planning Tool to plan and track your reorganization

      • Use Info-Tech’s Organizational Design Implementation Project Planning Tool to document and track all of the changes that are occurring during your reorganization.
      • Automatically build Gantt charts for all of the projects that are being undertaken, track problems in the issue log, and monitor the progress of projects in the reporting tab.
      • Each department/work group will maintain its own version of this tool throughout the reorganization effort and the project manager will maintain a master copy with all of the projects listed.
      • The chart comes pre-populated with example data gathered through the research and interview process to help generate ideas for your own reorganization.
      • Review the instructions at the top of each work sheet for entering and modifying the data within each chart.

      Have a short kick-off meeting to introduce the project planning process to your implementation team

      2.1 30 minutes

      Output

      • Departmental ownership of planning tool

      Materials

      • OD Implementation Project Planning Tool

      Participants

      • Change Project Manager
      • Implementation Team
      • Senior Management (optional)
      1. The purpose of this kick-off meeting is to assign ownership of the project planning process to members of the implementation team and to begin thinking about the portfolio of projects required to successfully complete the reorganization.
      2. Use the email template included on this slide to invite your team members to the meeting.
      3. The topics that need to be covered in the meeting are:
        • Introducing the materials/templates that will be used throughout the process.
        • Assigning ownership of the Organizational Design Implementation Project Planning Tool to members of your team.
          • Ownership will be at the departmental level where each department or working group will manage their own change projects.
        • Prepare your implementation team for the next meeting where they will be brainstorming the list of projects that will need to be completed throughout the reorganization.
      4. Distribute/email the tools and templates to the team so that they may familiarize themselves with the materials before the next meeting.

      Hello [participant],

      We will be holding our kickoff meeting for our reorganization on [date]. We will be discussing the reorganization process at a high level with special attention being payed to the tools and templates that we will be using throughout the process. By the end of the meeting, we will have assigned ownership of the Project Planning Tool to department representatives and we will have scheduled the next meeting where we’ll brainstorm our list of projects for the reorganization.

      Consider Info-Tech’s four organizational change dimensions when identifying change projects

      CHANGE DIMENSIONS

      • TECHNOLOGY AND LOGISTICS
      • COMMUNICATION
      • STAFFING
      • PROCESS

      Technology and Logistics

      • These are all the projects that will impact the technology used and physical logistics of your workspace.
      • These include new devices, access/permissions, new desks, etc.

      Communication

      • All of the required changes after the reorganization to ongoing communications within IT and to the rest of the organization.
      • Also includes communication projects that are occurring during the reorganization.

      Staffing

      • These projects address the changes to your staff’s roles.
      • Includes role changes, job description building, consulting with HR, etc.

      Process

      • Projects that address changes to IT processes that will occur after the reorganization.

      Use these trigger questions to help identify all aspects of your coming changes

      STAFFING

      • Do you need to hire short or long-term staff to fill vacancies?
      • How long does it typically take to hire a new employee?
      • Will there be staff who are new to management positions?
      • Is HR on board with the reorganization?
      • Have they been consulted?
      • Have transition plans been built for all staff members who are transitioning roles/duties?
      • Will gaps in the structure need to be addressed with new hires?

      COMMUNICATION

      • When will the change be communicated to various members of the staff?
      • Will there be disruption to services during the reorganization?
      • Who, outside of IT, needs to know about the reorganization?
      • Do external communications need to be adjusted because of the reorganization? Moving/centralizing service desk, BRMs, etc.?
      • Are there plans/is there a desire to change the way IT communicates with the rest of the organization?
      • Will the reorganization affect the culture of the department? Is the new structure compatible with the current culture?

      Use these trigger questions to help identify all aspects of your coming changes (continued)

      TECHNOLOGY AND LOGISTICS

      • Will employees require new devices in their new roles?
      • Will employees be required to move their workspace?
      • What changes to the workspace are required to facilitate the new organization?
      • Does new furniture have to be purchased to accommodate new spaces/staff?
      • Is the workspace adequate/up to date technologically (telephone network, Wi-Fi coverage, etc.)?
      • Will employees require new permissions/access for their changing roles?
      • Will permissions/access need to be removed?
      • What is your budget for the reorganization?
      • If a large geographical move is occurring, have problems regarding geography, language barriers, and cultural sensitivities been addressed?

      PROCESS

      • What processes need to be developed?
      • What training for processes is required?
      • Is the daily functioning of the IT department predicted to change?
      • Are new processes being implemented during the reorganization?
      • How will the project portfolio be affected by the reorganization?
      • Is new documentation required to accompany new/changing processes?

      Brainstorm the change projects to be carried out during the reorganization for your team/department

      2.2 3 hours

      Input

      • Constructive group discussion

      Output

      • Thorough list of all reorganization projects

      Materials

      • Whiteboard, sticky notes
      • OD Implementation Project Planning Tool

      Participants

      • Implementation Team
      • CIO
      • Senior Management
      1. Before the meeting, distribute the list of trigger questions presented on the two previous slides to prepare your implementation team for the brainstorming session.
      2. Begin the meeting by dividing up your implementation team into the departments/work groups that they represent (and have ownership of the tool over).
      3. Distribute a different color of sticky notes to each team and have them write out each project they can think of for each of the change planning dimensions (Staffing, Communication, Process and Technology/Logistics) using the trigger questions.
      4. After one hour, ask the groups to place the projects that they brainstormed onto the whiteboard divided into the four change dimensions.
      5. Discuss the complete list of projects on the board.
        • Remove projects that are listed more than once since some projects will be universal to some/all departments.
        • Adjust the wording of projects for the sake of clarity.
        • Identify projects that are specific to certain departments.
      6. Document the list of high-level projects on tab 2 “Project Lists” within the OD Implementation Project Planning Tool after the activity is complete.

      Prioritize projects to assist with project planning modeling

      Prioritization is the process of ranking each project based on its importance to implementation success. Hold a meeting for the implementation team and extended team to prioritize the project list. At the conclusion of the meeting, each requirement should be assigned a priority level. The implementation teams will use these priority levels to ensure efforts are targeted towards the proper projects. A simple way to do this for your implementation is to use the MoSCoW Model of Prioritization to effectively order requirements.

      The MoSCoW Model of Prioritization

      MUST HAVE - Projects must be implemented for the organizational design to be considered successful.

      SHOULD HAVE - Projects are high priority that should be included in the implementation if possible.

      COULD HAVE - Projects are desirable but not necessary and could be included if resources are available.

      WON'T HAVE - Projects won’t be in the next release, but will be considered for the future releases.

      The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994.

      Keep the following criteria in mind as you determine your priorities

      Effective Prioritization Criteria

      Criteria Description
      Regulatory & Legal Compliance These requirements will be considered mandatory.
      Policy or Contract Compliance Unless an internal policy or contract can be altered or an exception can be made, these projects will be considered mandatory.
      Business Value Significance Give a higher priority to high-value projects.
      Business Risk Any project with the potential to jeopardize the entire project should be given a high priority and implemented early.
      Implementation Complexity Give a higher priority to quick wins.
      Alignment with Strategy Give a higher priority to requirements that enable the corporate strategy and IT strategy.
      Urgency Prioritize projects based on time sensitivity.
      Dependencies A project on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it.
      Funding Availability Do we have the funding required to make this change?

      Prioritize the change projects within your team/department to be executed during the reorganization

      2.3 3 hours

      Input

      • Organizational Design Implementation Project Planning Tool

      Output

      • Prioritized list of projects

      Materials

      • Whiteboard, sticky notes
      • OD Implementation Project Planning Tool

      Participants

      • Implementation Team
      • Extended Implementation Team
      1. Divide the group into their department teams. Draw 4 columns on a whiteboard, including the following:
        • Must have
        • Should have
        • Could have
        • Won’t have
      2. As a group, review each project and collaboratively identify which projects fall within each category. You should have a strong balance between each of the categories.
      3. Beginning with the “must have” projects, determine if each has any dependencies. If any of the projects are dependent on another, add the dependency project to the “must have” category. Group and circle the dependent projects.
      4. Continue the same exercise with the “should have” and “could have” options.
      5. Record the results on tab “2. Project List” of the Organizational Design Implementation Project Planning Tool using the drop down option.

      Determine resource availability for completing your change projects

      2.4 2 hours

      Input

      • Constructive group discussion

      Output

      • Thorough list of all reorganization projects

      Materials

      • Whiteboard, sticky notes
      • OD Implementation Project Planning Tool

      Participants

      • Implementation Team
      • CIO
      • Senior Management
      1. Divide the group into their department teams to plan the execution of the high-level list of projects developed in activity 2.2.
      2. Review the list of high-level projects and starting with the “must do” projects, consider each in turn and brainstorm all of the tasks required to complete these projects. Write down each task on a sticky note and place it under the high-level project.
      3. On the same sticky note as the task, estimate how much time would be required to complete each task. Be realistic about time frames since these projects will be on top of all of the regular day-to-day work.
      4. Along with the time frame, document the resources that will be required and who will be responsible for the tasks. If you have a documented Project Portfolio, use this to determine resourcing.
      5. After mapping out the tasks, bring the group back together to present their list of projects, tasks, and required resources.
        • Go through the project task lists to make sure that nothing is missed.
        • Review the timelines to make sure they are feasible.
        • Review the resources to ensure that they are available and realistic based on constraints (time, current workload, etc.).
        • Repeat the process for the Should do and Could do projects.
      1. Document the tasks and resources in tab “3. Task Monitoring” in the OD Implementation Project Planning Tool after the activity is complete.

      Map out the change project dependencies at the departmental level

      2.5 2 hours

      Input

      • Constructive group discussion

      Output

      • Thorough list of all reorganization projects

      Materials

      • Whiteboard, sticky notes
      • OD Implementation Project Planning Tool

      Participants

      • Implementation Team
      • CIO
      • Senior Management
      1. Divide the group into their department teams to map the dependencies of their tasks created in activity 2.3.
      2. Take the project task sticky notes created in the previous activity and lay them out along a timeline from start to finish.
      3. Determine the dependencies of the tasks internal to the department. Map out the types of dependencies.
        • Finish to Start: Preceding task must be completed before the next can start.
        • Start to Start: Preceding task must start before the next task can start.
        • Finish to Finish: Predecessor must finish before successor can finish.
        • Start to Finish: Predecessor must start before successor can finish.
      4. Bring the group back together and review each group’s timeline and dependencies to make sure that nothing has been missed.
      5. As a group, determine whether there are dependencies that span the departmental lists of projects.
      6. Document all of the dependencies within the department and between departmental lists of projects and tasks in the OD Implementation Project Planning Tool.

      Amalgamate all of the departmental change planning tools into a master copy

      2.6 3 hours

      Input

      • Department-specific copies of the OD Implementation Project Planning Tool

      Output

      • Universal list of all of the change projects

      Materials

      • Whiteboard and sticky notes

      Participants

      • Implementation Project Manager
      • Members of the implementation team for support (optional)
      1. Before starting the activity, gather all of the OD Implementation Project Planning Tools completed at the departmental level.
      2. Review each completed tool and write all of the individual projects with their timelines on sticky notes and place them on the whiteboard.
      3. Build timelines using the documented dependencies for each department. Verify that the resources (time, people, physical) are adequate and feasible.
      4. Combine all of the departmental project planning tools into one master tool to be used to monitor the overall status of the reorganization. Separate the projects based on the departments they are specific to.
      5. Finalize the timeline based on resource approval and using the dependencies mapped out in the previous exercise.
      6. Approve the planning tools and store them in a shared drive so they can be accessed by the implementation team members.

      Create a progress monitoring schedule

      2.7 1 hour weekly

      Input

      • OD Implementation Project Planning Tools (departmental & organizational)

      Output

      • Actions to be taken before the next pulse meeting

      Participants

      • Implementation Project Manager
      • Members of the implementation team for support
      • Senior Management
      1. Hold weekly pulse meetings to keep track of project progress.
      2. The agenda of each meeting should include:
        • Resolutions to problems/complications raised at the previous week’s meeting.
        • Updates on each department’s progress.
        • Raising any issues/complications that have appeared that week.
        • A discussion of potential solutions to the issues/complications.
        • Validating the work that will be completed before the next meeting.
        • Raising any general questions or concerns that have been voiced by staff about the reorganization.
      3. Upload notes from the meeting about resolutions and changes to the schedules to the shared drive containing the tools.
      4. Increase the frequency of the meetings towards the end of the project if necessary.

      Building a holistic change plan enables adoption of the new organizational structure

      CASE STUDY

      Industry: Manufacturing

      Source: CIO

      Challenge

      The CIO was worried about the impending reorganization due to problems that they had run into during the last reorganization they had conducted. The change management projects were not planned well and they led to a lot of uncertainty before and after the implementation.

      No one on the staff was ready for the reorganization. Change projects were completed four months after implementation since many of them had not been predicted and cataloged. This caused major disruptions to their user services leading to drops in user satisfaction.

      Solution

      Using their large and diverse implementation team, they spent a great deal of time during the early stages of planning devoted to brainstorming and documenting all of the potential change projects.

      Through regular meetings, the implementation team was able to iteratively adjust the portfolio of change projects to fit changing needs.

      Results

      Despite having to undergo a major reorganization that involved centralizing their service desk in a different state, there were no disruptions to their user services.

      Since all of the change projects were documented and completed, they were able to move their service desk staff over a weekend to a workspace that was already set up. There were no changes to the user satisfaction scores over the period of their reorganization.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.2 Brainstorm Your List of Change Projects

      Review your reorganization plans and facilitate a brainstorming session to identify a complete list of all of the projects needed to implement your new organizational design.

      2.5 Map Out the Dependencies and Resources for Your Change Projects

      Examine your complete list of change projects and determine the dependencies between all of your change projects. Align your project portfolio and resource levels to the projects in order to resource them adequately.

      Phase 3

      Lead Staff Through the Reorganization

      Train managers to lead through change

      Outcomes of this Section:

      • Completed the workshop: Lead Staff Through Organizational Change
      • Managers possess stakeholder engagement plans for each employee
      • Managers are prepared to fulfil their roles in implementing the organizational change

      This section involves the following participants:

      • CIO
      • IT leadership team
      • IT staff

      Key Section Insight:

      The majority of IT managers were promoted because they excelled at the technical aspect of their job rather than in people management. Not providing training is setting your organization up for failure. Train managers to effectively lead through change to see a 72% decrease in change management issues. (Source: Abilla, 2009)

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Train Managers to Lead Through Change

      Proposed Time to Completion (in weeks): 1-2 weeks

      Step 3.1: Train Your Managers to Lead Through the Change

      Start with an analyst kick off call:

      • Go over the manager training workshop section of this deck.
      • Review the deliverables generated from the workshop (stakeholder engagement plan and conflict style self-assessment).

      Then complete these activities…

      • Conduct the workshop with your managers.

      With these tools & templates:

      • Organizational Design Implementation Manager Training Guide
      • Organizational Design Implementation Stakeholder Engagement Plan Template

      Step 3.2: Debrief After the Workshop

      Review findings with analyst:

      • Discuss the outcomes of the manager training.
      • Mention any feedback.
      • High-level overview of the workshop deliverables.

      Then complete these activities…

      • Encourage participants to review and revise their stakeholder engagement plans.
      • Review the Organizational Design Implementation Transition Plan Template and next steps.

      Get managers involved to address the majority of obstacles to successful change

      Managers all well-positioned to translate how the organizational change will directly impact individuals on their teams.

      Reasons Why Change Fails

      EMPLOYEE RESISTANCE TO CHANGE - 39%

      MANAGEMENT BEHAVIOR NOT SUPPORTIVE OF CHANGE - 33%

      INADEQUATE RESOURCE OR BUDGET - 14%

      OTHER OBSTACLES - 14%

      72% of change management issues can be directly improved by management.

      (Source: shmula)

      Why are managers crucial to organizational change?

      • Managers are extremely well-connected.
        • They have extensive horizontal and vertical networks spanning the organization.
        • Managers understand the informal networks of the organization.
      • Managers are valuable communicators.
        • Managers have established strong relationships with employees.
        • Managers influence the way staff perceive messaging.

      Conduct a workshop with managers to help them lead their teams through change

      Organizational Design Implementation Manager Training Guide

      Give managers the tools and skills to support their employees and carry out difficult conversations.

      Understand the role of management in communicating the change

      Understand reactions to change

      Resolve conflict

      Respond to FAQs

      Monitor and measure employee engagement

      Prepare managers to effectively execute their role in the organizational change by running a 2-hour training workshop.

      Complete the activities on the following slides to:

      • Plan and prepare for the workshop.
      • Execute the group exercises.
      • Help managers develop stakeholder engagement plans for each of their employees.
      • Initiate the McLean Leadership Index™ survey to measure employee engagement.

      Plan and prepare for the workshop

      3.1 Plan and prepare for the workshop.

      Output

      • Workshop participants
      • Completed workshop prep

      Materials

      • Organizational Design Implementation Manager Training Guide

      Instructions

      1. Create a list of all managers that will be responsible for leading their teams through the change.
      2. Select a date for the workshop.
        • The training session will run approximately 2 hours and should be scheduled within a week of when the implementation plan is communicated organization-wide.
      3. Review the material outlined in the presentation and prepare the Organizational Design Implementation Manager Training Guide for the workshop:
        • Copy and print the “Pre-workshop Facilitator Instructions” and “Facilitator Notes” located in the notes section below each slide.
        • Revise frequently asked questions (FAQs) and responses.
        • Delete instruction slides.

      Invite managers to the workshop

      Workshop Invitation Email Template

      Make necessary modifications to the Workshop Invitation Email Template and send invitations to managers.

      Hi ________,

      As you are aware, we are starting to roll out some of the initiatives associated with our organizational change mandate. A key component of our implementation plan is to ensure that managers are well-prepared to lead their teams through the transition.

      To help you proactively address the questions and concerns of your staff, and to ensure that the changes are implemented effectively, we will be conducting a workshop for managers on .

      While the change team is tasked with most of the duties around planning, implementing, and communicating the change organization-wide, you and other managers are responsible for ensuring that your employees understand how the change will impact them specifically. The workshop will prepare you for your role in implementing the organizational changes in the coming weeks, and help you refine the skills and techniques necessary to engage in challenging conversations, resolve conflicts, and reduce uncertainty.

      Please confirm your attendance for the workshop. We look forward to your participation.

      Kind regards,

      Change team

      Prepare managers for the change by helping them build useful deliverables

      ODI Stakeholder Engagement Plan Template & Conflict Style Self-Assessment

      Help managers create useful deliverables that continue to provide value after the workshop is completed.

      Workshop Deliverables

      Organizational Design Implementation Stakeholder Engagement Plan Template

      • Document the areas of change resistance, detachment, uncertainty, and support for each employee.
      • Document strategies to overcome resistance, increase engagement, reduce uncertainty, and leverage their support.
      • Create action items to execute after the workshop.

      Conflict Style Self-Assessment

      • Determine how you approach conflicts.
      • Analyze the strengths and weaknesses of this approach.
      • Identify ways to adopt different conflict styles depending on the situation.

      Book a follow-up meeting with managers and determine which strategies to Start, Stop, or Continue

      3.2 1 hour

      Output

      • Stakeholder engagement templates

      Materials

      • Sticky notes
      • Pen and paper

      Participants

      • Implementation Team
      • Managers
      1. Schedule a follow-up meeting 2–3 weeks after the workshop.
      2. Facilitate an open conversation on approaches and strategies that have been used or could be used to:
        • Overcome resistance
        • Increase engagement
        • Reduce uncertainty
        • Leverage support
      3. During the discussion, document ideas on the whiteboard.
      4. Have participants vote on whether the approaches and strategies should be started, stopped, or continued.
        • Start: actions that the team would like to begin.
        • Stop: actions that the team would like to stop.
        • Continue: actions that work for the team and should proceed.
      5. Encourage participants to review and revise their stakeholder engagement plans.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1 The Change Maze

      Break the ice with an activity that illustrates the discomfort of unexpected change, and the value of timely and instructive communication.

      3.2 Perform a Change Management Retrospective

      Leverage the collective experience of the group. Share challenges and successes from previous organizational changes and apply those lessons to the current transition.

      3.3 Create a Stakeholder Engagement Plan

      Have managers identify areas of resistance, detachment, uncertainty, and support for each employee and share strategies for overcoming resistance and leveraging support to craft an action plan for each of their employees.

      3.4 Conduct a Conflict Style Self-Assessment

      Give participants an opportunity to better understand how they approach conflicts. Administer the Conflict Style Self-Assessment to identify conflict styles and jumpstart a conversation about how to effectively resolve conflicts.

      Transition your staff to their new roles

      Outcomes of this Section:

      • Identified key responsibilities to transition
      • Identified key relationships to be built
      • Built staff individual transition plans and timing

      This section involves the following participants:

      • All IT staff members

      Key Section Insight

      In order to ensure a smooth transition, you need to identify the transition scheduled for each employee. Knowing when they will retire and assume responsibilities and aligning this with the organizational transition will be crucial.

      Phase 3b outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3b: Transition Staff to New Roles

      Proposed Time to Completion (in weeks): 2-4

      Step 4.1: Build Your Transition Plans

      Start with an analyst kick off call:

      • Review the Organizational Design Implementation Transition Plan Template and its contents.
      • Return to the new org structure and project planning tool for information to fill in the template.

      Then complete these activities…

      • Present the template to your managers.
      • Have them fill in the template with their staff.
      • Approve the completed templates.

      With these tools & templates:

      • Organizational Design Implementation Project Planning Tool
      • Organizational Design Implementation Transition Plan Template

      Step 4.2: Finalize Your Transition Plans

      Review findings with analyst:

      • Discuss strategies for timing the transition of your employees.
      • Determine the readiness of your departments for transitioning.

      Then complete these activities…

      • Build a transition readiness timeline of your departments.
      • Move your employees to their new roles.

      With these tools & templates:

      • Organizational Design Implementation Project Planning Tool
      • Organizational Design Implementation Transition Plan Template

      Use Info-Tech’s transition plan template to map out all of the changes your employees will face during reorganization

      Organizational Design Implementation Transition Plan Template

      • Use Info-Tech’s Organizational Design Implementation Transition Plan Template to document (in consultation with your employees) all of the changes individual staff members need to go through in order to transition into their new roles.
      • It provides a holistic view of all of the changes aligned to the change planning dimensions, including:
        • Current and new job responsibilities
        • Outstanding projects
        • Documenting where the employee may be moving
        • Technology changes
        • Required training
        • New relationships that need to be made
        • Risk mitigation
      • The template is designed to be completed by managers for their direct reports.

      Customize the transition plan template for all affected staff members

      4.1 30 minutes per employee

      Output

      • Completed transition plans

      Materials

      • Individual transition plan templates (for each employee)

      Participants

      • Implementation Team
      • Managers
      1. Implementation team members should hold one-on-one meetings with the managers from the departments they represent to go through the transition plan template.
      2. Some elements of the transition plan can be completed at the initial meeting with knowledge from the implementation team and documentation from the new organizational structure:
        • Employee information (except for the planned transition date)
        • New job responsibilities
        • Logistics and technology changes
        • Relationships (recommendations can be made about beneficial relationships to form if the employee is transitioning to a new role)
      3. After the meeting, managers can continue filling in information based on their own knowledge of their employees:
        • Current job responsibilities
        • Outstanding projects
        • Training (identify gaps in the employee’s knowledge if their role is changing)
        • Risks (potential concerns or problems for the employee during the reorganization)

      Verify and complete the individual transition plans by holding one-on-one meetings with the staff

      4.2 30 minutes per employee

      Output

      • Completed transition plans

      Materials

      • Individual transition plan templates (for each employee)

      Participants

      • Managers
      • Staff (Managers’ Direct Reports)
      1. After the managers complete everything they can in the transition plan templates, they should schedule one-on-one meetings with their staff to review the completed document to ensure the information is correct.
      2. Begin the meeting by verifying the elements that require the most information from the employee:
        • Current job responsibilities
        • Outstanding projects
        • Risks (ask about any problems or concerns they may have about the reorganization)
      3. Discuss the following elements of the transition plan to get feedback:
        • Training (ask if there is any training they feel they may need to be successful at the organization)
        • Relationships (determine if there are any relationships that the employee would like to develop that you may have missed)
      4. Since this may be the first opportunity that the staff member has had to discuss their new role (if they are moving to one), review their new job title and new job responsibilities with them. If employees are prepared for their new role, they may feel more accountable for quickly adopting the reorganization.
      5. Document any questions that they may have so that they can be answered in future communications from the implementation team.
      6. After completing the template, managers will sign off on the document in the approval section.

      Validate plans with organizational change project manager and build the transition timeline

      4.3 3 hours

      Input

      • Individual transition plans
      • Organizational Design Implementation Project Planning Tool

      Output

      • Timeline outlining departmental transition readiness

      Materials

      • Whiteboard

      Participants

      • Implementation Project Manager
      • Implementation Team
      • Managers
      1. After receiving all of the completed individual transition plan templates from managers, members of the implementation team need to approve the contents of the templates (for the departments that they represent).
      2. Review the logistics and technology requirements for transition in each of the templates and align them with the completion dates of the related projects in the Project Planning Tool. These dates will serve as the earliest possible time to transition the employee. Use the latest date from the list to serve as the date that the whole department will be ready to transition.
      3. Hand the approved transition plan templates and the dates at which the departments will be ready for transitioning to the Implementation Project Manager.
      4. The Project Manager needs to verify the contents of the transition plans and approve them.
      5. On a calendar or whiteboard, list the dates that each department will be ready for transitioning.
      6. Review the master copy of the Project Planning Tool. Determine if the outstanding projects limit your ability to transition the departments (when they are ready to transition). Change the ready dates of the departments to align with the completion dates of those projects.
      7. Use these dates to determine the timeline for when you would like to transition your employees to their new roles.

      Overcoming inexperience by training managers to lead through change

      CASE STUDY

      Industry: Manufacturing

      Source: CIO

      Challenge

      The IT department had not undergone a major reorganization in several years. When they last reorganized, they experienced high turnover and decreased business satisfaction with IT.

      Many of the managers were new to their roles and only one of them had been around for the earlier reorganization. They lacked experience in leading their staff through major organizational changes.

      One of the major problems they faced was addressing the concerns, fears, and resistance of their staff properly.

      Solution

      The implementation team ran a workshop for all of the managers in the department to train them on the change and how to communicate the impending changes to their staff. The workshop included information on resistance and conflict resolution.

      The workshop was conducted early on in the planning phases of the reorganization so that any rumors or gossip could be addressed properly and quickly.

      Results

      The reorganization was well accepted by the staff due to the positive reinforcement from their managers. Rumors and gossip about the reorganization were under control and the staff adopted the new organizational structure quickly.

      Engagement levels of the staff were maintained and actually improved by 5% immediately after the reorganization.

      Voluntary turnover was minimal throughout the change as opposed to the previous reorganization where they lost 10% of their staff. There was an estimated cost savings of $250,000–$300,000.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.2.1 Build Your Staff Transition Plan

      Review the contends of the staff transition plan, and using the organizational change map as a guide, build the transition schedule for one employee.

      3.2.1 Review the Transition Plan With the Transition Team

      Review and validate the results for your transition team schedule with other team members. As a group, discuss what makes this exercise difficult and any ideas for how to simplify the exercise.

      Works cited

      American Productivity and Quality Center. “Motivation Strategies.” Potentials Magazine. Dec. 2004. Web. November 2014.

      Bersin, Josh. “Time to Scrap Performance Appraisals?” Forbes Magazine. 5 June 2013. Web. 30 Oct 2013.

      Bridges, William. Managing Transitions, 3rd Ed. Philadelphia: Da Capo Press, 2009.

      Buckley, Phil. Change with Confidence – Answers to the 50 Biggest Questions that Keep Change Leaders up at Night. Canada: Jossey-Bass, 2013.

      “Change and project management.” Change First. 2014. Web. December 2009. <http://www.changefirst.com/uploads/documents/Change_and_project_management.pdf>.

      Cheese, Peter, et al. “Creating an Agile Organization.” Accenture. Oct. 2009. Web. Nov. 2013.

      Croxon, Bruce et al. “Dinner Series: Performance Management with Bruce Croxon from CBC's 'Dragon's Den.'” HRPA Toronto Chapter. Sheraton Hotel, Toronto, ON. 12 Nov. 2013. Panel discussion.

      Culbert, Samuel. “10 Reasons to Get Rid of Performance Reviews.” Huffington Post Business. 18 Dec. 2012. Web. 28 Oct. 2013. <http://www.huffingtonpost.com/samuel-culbert/performance-reviews_b_2325104.html>.

      Denning, Steve. “The Case Against Agile: Ten Perennial Management Objections.” Forbes Magazine. 17 Apr. 2012. Web. Nov. 2013.

      Works cited cont.

      “Establish A Change Management Structure.” Human Technology. Web. December 2014.

      Estis, Ryan. “Blowing up the Performance Review: Interview with Adobe’s Donna Morris.” Ryan Estis & Associates. 17 June 2013. Web. Oct. 2013. <http://ryanestis.com/adobe-interview/>.

      Ford, Edward L. “Leveraging Recognition: Noncash incentives to Improve Performance.” Workspan Magazine. Nov 2006. Web. Accessed May 12, 2014.

      Gallup, Inc. “Gallup Study: Engaged Employees Inspire Company Innovation.” Gallup Management Journal. 12 Oct. 2006. Web. 12 Jan 2012.

      Gartside, David, et al. “Trends Reshaping the Future of HR.” Accenture. 2013. Web. 5 Nov. 2013.

      Grenville-Cleave, Bridget. “Change and Negative Emotions.” Positive Psychology News Daily. 2009.

      Heath, Chip, and Dan Heath. Switch: How to Change Things When Change Is Hard. Portland: Broadway Books. 2010.

      HR Commitment AB. Communicating organizational change. 2008.

      Keller, Scott, and Carolyn Aiken. “The Inconvenient Truth about Change Management.” McKinsey & Company, 2009. <http://www.mckinsey.com/en.aspx>.

      Works cited cont.

      Kotter, John. “LeadingChange: Why Transformation Efforts Fail.” Harvard Business Review. March-April 1995. <http://hbr.org>.

      Kubler-Ross, Elisabeth and David Kessler. On Grief and Grieving: Finding the Meaning of Grief Through the Five Stages of Loss. New York: Scribner. 2007.

      Lowlings, Caroline. “The Dangers of Changing without Change Management.” The Project Manager Magazine. December 2012. Web. December 2014. <http://changestory.co.za/the-dangers-of-changing-without-change-management/>.

      “Managing Change.” Innovative Edge, Inc. 2011. Web. January 2015. <http://www.getcoherent.com/managing.html>.

      Muchinsky, Paul M. Psychology Applied to Work. Florence: Thomson Wadsworth, 2006.

      Nelson, Kate and Stacy Aaron. The Change Management Pocket Guide, First Ed., USA: Change Guides LLC, 2005.

      Nguyen Huy, Quy. “In Praise of Middle Managers.” Harvard Business Review. 2001. Web. December 2014. <https://hbr.org/2001/09/in-praise-of-middle-managers/ar/1>

      “Only One-Quarter of Employers Are Sustaining Gains From Change Management Initiatives, Towers Watson Survey Finds.” Towers Watson. August 2013. Web. January 2015. <http://www.towerswatson.com/en/Press/2013/08/Only-One-Quarter-of-Employers-Are-Sustaining-Gains-From-Change-Management>.

      Shmula. “Why Transformation Efforts Fail.” Shmula.com. September 28, 2009. <http://www.shmula.com/why-transformation-efforts-fail/1510/>

      Measure and Manage Customer Satisfaction Metrics That Matter the Most

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Lack of understanding of what is truly driving customer satisfaction or dissatisfaction.
      • Lack of insight into who our satisfied and dissatisfied customers are.
      • Lack of a system for early detection of declines in satisfaction.
      • Lack of clarity on what to improve and how resources should be allocated.

      Our Advice

      Critical Insight

      • All software companies measure satisfaction in some way, but many lack understanding of what’s truly driving customers to stay or leave. By understanding the true drivers of satisfaction, solution providers can measure and monitor satisfaction more effectively, pull actionable insights and feedback, and make changes to products and services that customers really care about and will keep them coming back to you to have their needs met.
      • Obstacles:
        • Use of metrics that don’t provide the insight needed to make impactful changes that will boost satisfaction and ultimately, retention and profit.
        • Lack of a clear definition of what satisfaction means to customers, metric definitions and/or standard methods of measurement, and a consistent monitoring cadence.

      Impact and Result

      • Understanding of who your satisfied and dissatisfied customers are.
      • Understanding of the true drivers of satisfaction and dissatisfaction among your customer segments.
      • Establishment of a repeatable process and cadence for effective satisfaction measurement and monitoring.
      • Development of an executable customer satisfaction improvement plan that identifies customer journey pain points and areas of dissatisfaction, and outlines how to improve them.
      • Knowledge of where money, time, and other resources are needed most to improve satisfaction levels and ultimately increase retention.

      Measure and Manage Customer Satisfaction Metrics That Matter the Most Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Measure and Manage the Customer Satisfaction Metrics that Matter the Most Deck – An overview of how to understand what drives customer satisfaction and how to measure and manage it for improved business outcomes.

      Understand the true drivers of customer satisfaction and build a process for managing and improving customer satisfaction.

      [infographic]

      Further reading

      Measure and Manage the Customer Satisfaction Metrics that Matter the Most

      Understand what truly keeps your customer satisfied. Start to measure what matters to improve customer experience and increase satisfaction and advocacy. 

      EXECUTIVE BRIEF

      Analyst perspective

      Understanding and measuring the true drivers of satisfaction enable the delivery of real customer value

      The image contains a picture of Emily Wright.

      “Healthy customer relationships are the paramount to long-term growth. When customers are satisfied, they remain loyal, spend more, and promote your company to others in their network. The key to high satisfaction is understanding and measuring the true drivers of satisfaction to enable the delivery of real customer value.

      Most companies believe they know who their satisfied customers are and what keeps them satisfied, and 76% of B2B buyers expect that providers understand their unique needs (Salesforce Research, 2020). However, on average B2B companies have customer experience scores of less than 50% (McKinsey, 2016). This disconnect between customer expectations and provider experience indicates that businesses are not effectively measuring and monitoring satisfaction and therefore are not making meaningful enhancements to their service, offerings, and overall experience.

      By focusing on the underlying drivers of customer satisfaction, organizations develop a truly accurate picture of what is driving deep satisfaction and loyalty, ensuring that their company will achieve sustainable growth and stay competitive in a highly competitive market.”

      Emily Wright

      Senior Research Analyst, Advisory

      SoftwareReviews

      Executive summary

      Your Challenge

      Common Obstacles

      SoftwareReviews’ Approach

      Getting a truly accurate picture of satisfaction levels among customers, and where to focus efforts to improve satisfaction, is challenging. Providers often find themselves reacting to customer challenges and being blindsided when customers leave. More effective customer satisfaction measurement is possible when providers self-assess for the following challenges:

      • Lack of understanding of what is truly driving customer satisfaction or dissatisfaction.
      • Lack of insight into who our satisfied and dissatisfied customers are.
      • Lack of a system for early detection of declines in satisfaction.
      • Lack of clarity of what needs to be improved and how resources should be allocated.
      • Lack of reliable internal data for effective customer satisfaction monitoring.

      What separates customer success leaders from developing a full view of their customers are several nagging obstacles:

      • Use of metrics that don’t provide the insight needed to make impactful changes that will boost satisfaction and ultimately, retention and profit.
      • Friction from customers participating in customer satisfaction studies.
      • Lack of data, or integrated databases from which to track, pull, and analyze customer satisfaction data.
      • Lack a clear definition of what satisfaction means to customers, metric definitions, and/or standard methods of measurement and a consistent monitoring cadence.
      • Lack of time, resources, or technology to uncover and effectively measure and monitor satisfaction drivers.

      Through the SoftwareReviews’ approach, customer success leaders will:

      • Understand who your satisfied and dissatisfied customers are.
      • Understand the true drivers of satisfaction and dissatisfaction among your customer segments.
      • Establish a repeatable process and cadence for effective satisfaction measurement and monitoring.
      • Develop an executable customer satisfaction improvement plan that identifies customer journey pain points and areas of dissatisfaction, and outlines how to improve them.
      • Know where money, time, and resources are needed most to improve satisfaction levels and ultimately retention.

      Overarching SoftwareReviews Advisory Insight:

      All companies measure satisfaction in some way, but many lack understanding of what’s truly driving customers to stay or leave. By understanding the true drivers of satisfaction, solution providers can measure and monitor satisfaction more effectively, pull actionable insights and feedback, and make changes to products and services that customers really care about. This will keep them coming back to you to have their needs met.

      Healthy Customer Relationships are vital for long-term success and growth

      Measuring customer satisfaction is critical to understanding the overall health of your customer relationships and driving growth.

      Through effective customer satisfaction measurement, organizations can:

      Improve Customer Experience

      Increase Retention and CLV

      Increase Profitability

      Reduce Costs

      • Provide insight into where and how to improve.
      • Enhance experience, increase loyalty.
      • By providing strong CX, organizations can increase revenue by 10-15% (McKinsey, 2014).
      • Far easier to retain existing customers than to acquire new ones.
      • Ensuring high satisfaction among customers increases Customer Lifetime Value (CLV) through longer tenure and higher spending.
      • NPS Promoter score has a customer lifetime value that's 600%-1,400% higher than a Detractor (Bain & Company, 2015).
      • Highly satisfied customers spend more through expansions and add-ons, as well as through their long tenure with your company.
      • They also spread positive word of mouth, which brings in new customers.
      • “Studies demonstrate a strong correlation between customer satisfaction and increased profits — with companies with high customer satisfaction reporting 5.7 times more revenue than competitors.” (Matthew Loper, CEO and Co-Founder of WELLTH, 2022)
      • Measuring, monitoring, and maintaining high satisfaction levels reduces costs across the board.
      • “Providing a high-quality customer experience can save up to 33% of customer service costs” (Deloitte, 2018).
      • Satisfied customers are more likely to spread positive word of mouth which reduces acquisition / marketing costs for your company.

      “Measuring customer satisfaction is vital for growth in any organization; it provides insights into what works and offers opportunities for optimization. Customer satisfaction is essential for improving loyalty rate, reducing costs and retaining your customers.”

      -Ken Brisco, NICE, 2019

      Poor customer satisfaction measurement is costly

      Virtually all companies measure customer satisfaction, but few truly do it well. All too often, customer satisfaction measurement consists of a set of vanity metrics that do not result in actionable insight for product/service improvement. Improper measurement can result in numerous consequences:

      Direct and Indirect Costs

      Being unaware of true drivers of satisfaction that are never remedied costs your business directly through customer churn, service costs, etc.

      Tarnished Brand

      Tarnished brand through not resolving issues drives dissatisfaction; dissatisfied customers share their negative experiences, which can damage brand image and reputation.

      Waste Limited Resources

      Putting limited resources towards vanity programs and/or fixes that have little to no bearing on core satisfaction drivers wastes time and money.

      “When customer dissatisfaction goes unnoticed, it can slowly kill a company. Because of the intangible nature of customer dissatisfaction, managers regularly underestimate the magnitude of customer dissatisfaction and its impact on the bottom line.”

      - Lakshmiu Tatikonda, “The Hidden Costs of Customer Dissatisfaction”, 2013

      SoftwareReviews Advisory Insight:

      Most companies struggle to understand what’s truly driving customers to stay or leave. By understanding the true satisfaction drivers, tech providers can measure and monitor satisfaction more effectively, avoiding the numerous harmful consequences that result from average customer satisfaction measurement.

      Does your customer satisfaction measurement process need improvement?

      Getting an accurate picture of customer satisfaction is no easy task. Struggling with any of the following means you are ready for a detailed review of your customer satisfaction measurement efforts:

      • Not knowing who your most satisfied customers are.
      • Lacking early detection for declining satisfaction – either reactive, or unaware of dissatisfaction as it’s occurring.
      • Lacking a process for monitoring changes in satisfaction and lack ability to be proactive; you feel blindsided when customers leave.
      • Inability to fix the problem and wasting money on the wrong areas, like vanity metrics that don’t bring value to customers.
      • Spending money and other resources towards fixes based on a gut feeling, without quantifying the real root cause drivers and investing in their improvement.
      • Having metrics and data but lacking context; don’t know what contributed to the metrics/results, why people are dissatisfied or what contributes to satisfaction.
      • Lacking clear definition of what satisfaction means to customers / customer segments.
      • Difficulty tying satisfaction back to financial results.

      Customers are more satisfied with software vendors who understand the difference between surface level and short-term satisfaction, and deep or long-term satisfaction

      Surface-level satisfaction

      Surface-level satisfaction has immediate effects, but they are usually short-term or limited to certain groups of users. There are several factors that contribute to satisfaction including:

      • Novelty of new software
      • Ease of implementation
      • Financial savings
      • Breadth of features

      Software Leaders Drive Deep Satisfaction

      Deep satisfaction has long-term and meaningful impacts on the way that organizations work. Deep satisfaction has staying power and increases or maintains satisfaction over time, by reducing complexity and delivering exceptional quality for end-users and IT alike. This report found that the following capabilities provided the deepest levels of satisfaction:

      • Usability and intuitiveness
      • Quality of features
      • Ease of customization
      • Vendor-specific capabilities

      The above solve issues that are part of everyday problems, and each drives satisfaction in deep and meaningful ways. While surface-level satisfaction is important, deep and impactful capabilities can sustain satisfaction for a longer time.

      Deep Customer Satisfaction Among Software Buyers Correlates Highly to “Emotional Attributes”

      Vendor Capabilities and Product Features remain significant but are not the primary drivers

      The image contains a graph to demonstrate a correlation to Satisfaction, all Software Categories.
      Source: SoftwareReviews buyer reviews (based on 82,560 unique reviews).

      Driving deep satisfaction among software customers vs. surface-level measures is key

      Vendor capabilities and product features correlate significantly to buyer satisfaction

      Yet, it’s the emotional attributes – what we call the “Emotional Footprint”, that correlate more strongly

      Business-Value Created and Emotional Attributes are what drives software customer satisfaction the most

      The image contains a screenshot of a graph to demonstrate Software Buyer Satisfaction Drivers and Emotional Attributes are what drives software customer satisfaction.

      Software companies looking to improve customer satisfaction will focus on business value created and the Emotional Footprint attributes outlined here.

      The essential ingredient is understanding how each is defined by your customers.

      Leaders focus on driving improvements as described by customers.

      SoftwareReviews Insight:

      These true drivers of satisfaction should be considered in your customer satisfaction measurement and monitoring efforts. The experience customers have with your product and brand is what will differentiate your brand from competitors, and ultimately, power business growth. Talk to a SoftwareReviews Advisor to learn how users rate your product on these satisfaction drivers in the SoftwareReviews Emotional Footprint Report.

      Benefits of Effective Customer Satisfaction Measurement

      Our research provides Customer Success leaders with the following key benefits:

      • Ability to know who is satisfied, dissatisfied, and why.
      • Confidence in how to understand or uncover the factors behind customer satisfaction; understand and identify factors driving satisfaction, dissatisfaction.
      • Ability to develop a clear plan for improving customer satisfaction.
      • Knowledge of how to establish a repeatable process for customer satisfaction measurement and monitoring that allows for proactivity when declines in satisfaction are detected.
      • Understanding of what metrics to use, how to measure them, and where to find the right information/data.
      • Knowledge of where money, time, and other resources are needed most to drive tangible customer value.

      “81% of organizations cite CX as a competitive differentiator. The top factor driving digital transformation is improving CX […] with companies reporting benefits associated with improving CX including:

      • Increased customer loyalty (92%)
      • An uplift in revenue (84%)
      • Cost savings (79%).”

      – Dan Cote, “Advocacy Blooms and Business Booms When Customers and Employees Engage”, Influitive, 2021

      The image contains a screenshot of a thought model that focuses on Measure & Manage the Customer Satisfaction Metrics That Matter the Most.

      Who benefits from improving the measurement and monitoring of customer satisfaction?

      This Research Is Designed for:

      • Customer Success leaders and marketers who are:
        • Responsible for understanding how to benchmark, measure, and understand customer satisfaction to improve satisfaction, NPS, and ROI.
        • Looking to take a more proactive and structured approach to customer satisfaction measurement and monitoring.
        • Looking for a more effective and accurate way to measure and understand how to improve customer satisfaction around products and services.

      This Research Will Help You:

      • Understand the factors driving satisfaction and dissatisfaction.
      • Know which customers are satisfied/dissatisfied.
      • Know where time, money, and resources are needed the most in order to improve or maintain satisfaction levels.
      • Develop a formal plan to improve customer satisfaction.
      • Establish a repeatable process for customer satisfaction measurement and monitoring that allows for proactivity when declines in satisfaction are detected.

      This Research Will Also Assist:

      • Customer Success Leaders, Marketing and Sales Directors and Managers, Product Marketing Managers, and Advocacy Managers/Coordinators who are responsible for:
        • Product improvements and enhancements
        • Customer service and onboarding
        • Customer advocacy programs
        • Referral/VoC programs

      This Research Will Help Them:

      • Coordinate and align on customer experience efforts and actions.
      • Gather and make use of customer feedback to improve products, solutions, and services provided.
      • Provide an amazing customer experience throughout the entirety of the customer journey.

      SoftwareReviews’ methodology for measuring the customer satisfaction metrics that matter the most

      1. Identify true customer satisfaction drivers

      2. Develop metrics dashboard

      3. Develop customer satisfaction measurement and management plan

      Phase Steps

      1. Identify data sources, documenting any gaps in data
      2. Analyze all relevant data on customer experiences and outcomes
      3. Document top satisfaction drivers
      1. Identify business goals, problems to be solved / define business challenges and marketing/customer success goals
      2. Use SR diagnostic to assess current state of satisfaction measurement, assessing metric alignment to satisfaction drivers
      3. Define your metrics dashboard
      4. Develop common metric definitions, language for discussing, and standards for measuring customer satisfaction
      1. Determine committee structure to measure performance metrics over time
      2. Map out gaps in satisfaction along customer journey/common points in journey where customers are least dissatisfied
      3. Build plan that identifies weak areas and shows how to fix using SR’s emotional footprint, other measures
      4. Create plan and roadmap for CSat improvement
      5. Create communication deck

      Phase Outcomes

      1. Documented satisfaction drivers
      2. Documented data sources and gaps in data
      1. Current state customer satisfaction measurement analysis
      2. Common metric definitions and measurement standards
      3. Metrics dashboard
      1. Customer satisfaction measurement plan
      2. Customer satisfaction improvement plan
      3. Customer journey maps
      4. Customer satisfaction improvement communication deck
      5. Customer Satisfaction Committee created

      Insight summary

      Understanding and measuring the true drivers of satisfaction enable the delivery of real customer value

      All software companies measure satisfaction in some way, but many lack understanding of what’s truly driving customers to stay or leave. By understanding the true drivers of satisfaction, solution providers can measure and monitor satisfaction more effectively, pull actionable insights and feedback, and make changes to products and services that customers really care about and which will keep them coming back to you to have their needs met.

      Positive experiences drive satisfaction more so than features and cost

      According to our analysis of software buyer reviews data*, the biggest drivers of satisfaction and likeliness to recommend are the positive experiences customers have with vendors and their products. Customers want to feel that:

      1. Their productivity and performance is enhanced, and the vendor is helping them innovate and grow as a company.
      2. Their vendor inspires them and helps them to continually improve.
      3. They can rely on the vendor and the product they purchased.
      4. They are respected by the vendor.
      5. They can trust that the vendor will be on their side and save them time.
      *8 million data points across all software categories

      Measure Key Relationship KPIs to gauge satisfaction

      Key metrics to track include the Business Value Created score, Net Emotional Footprint, and the Love/Hate score (the strength of emotional connection).

      Orient the organization around customer experience excellence

      1. Arrange staff incentives around customer value instead of metrics that are unrelated to satisfaction.
      2. Embed customer experience as a core company value and integrate it into all functions.
      3. Make working with your organization easy and seamless for customers.

      Have a designated committee for customer satisfaction measurement

      Best in class organizations create customer satisfaction committees that meet regularly to measure and monitor customer satisfaction, resolve issues quickly, and work towards improved customer experience and profit outcomes.

      Use metrics that align to top satisfaction drivers

      This will give you a more accurate and fulsome view of customer satisfaction than standard satisfaction metrics alone will.

      Guided Implementation

      What is our GI on measuring and managing the customer satisfaction metrics that matter most?

      Identify True Customer Satisfaction Drivers

      Develop Metrics Dashboard Develop Customer Satisfaction Measurement and Management Plan

      Call #1: Discuss current pain points and barriers to successful customer satisfaction measurement, monitoring and maintenance. Plan next call – 1 week.

      Call #2: Discuss all available data, noting any gaps. Develop plan to fill gaps, discuss feasibility and timelines. Plan next call – 1 week.

      Call #3: Walk through SoftwareReviews reports to understand EF and satisfaction drivers. Plan next call – 3 days.

      Call #4: Segment customers and document key satisfaction drivers. Plan next call – 2 week.

      Call #5: Document business goals and align them to metrics. Plan next call – 1 week.

      Call #6: Complete the SoftwareReviews satisfaction measurement diagnostic. Plan next call – 3 days.

      Call #7: Score list of metrics that align to satisfaction drivers. Plan next call – 2 days.

      Call #8: Develop metrics dashboard and definitions. Plan next call – 2 weeks.

      Call #9: Finalize metrics dashboard and definitions. Plan next call – 1 week.

      Call #10: Discuss committee and determine governance. Plan next call – 2 weeks.

      Call #11: Map out gaps in satisfaction along customer journey as they relate to top satisfaction drivers. Plan next call –2 weeks.

      Call #12: Develop plan and roadmap for satisfaction improvement. Plan next call – 1 week.

      Call #13: Finalize plan and roadmap. Plan next call – 1 week.

      Call # 14: Review and coach on communication deck.

      A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization.

      For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst.

      Your engagement managers will work with you to schedule analyst calls.

      Software Reviews offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
      Included within Advisory Membership Optional add-ons

      Bibliography

      “Are you experienced?” Bain & Company, Apr. 2015. Accessed 6 June. 2022.

      Brisco, Ken. “Measuring Customer Satisfaction and Why It’s So Important.” NICE, Feb. 2019. Accessed 6 June. 2022.

      CMO.com Team. “The Customer Experience Management Mandate.” Adobe Experience Cloud Blog, July 2019. Accessed 14 June. 2022.

      Cote, Dan. “Advocacy Blooms and Business Booms When Customers and Employees Engage.” Influitive, Dec. 2021. Accessed 15 June. 2022.

      Fanderl, Harald and Perrey, Jesko. “Best of both worlds: Customer experience for more revenues and lower costs.” McKinsey & Company, Apr. 2014. Accessed 15 June. 2022.

      Gallemard, Jeremy. “Why – And How – Should Customer Satisfaction Be Measured?” Smart Tribune, Feb. 2020. Accessed 6 June. 2022.

      Kumar, Swagata. “Customer Success Statistics in 2021.” Customer Success Box, 2021. Accessed 17 June. 2022.

      Lakshmiu Tatikonda, “The Hidden Costs of Customer Dissatisfaction”, Management Accounting Quarterly, vol. 14, no. 3, 2013, pp 38. Accessed 17 June. 2022.

      Loper, Matthew. “Why ‘Customer Satisfaction’ Misses the Mark – And What to Measure Instead.” Newsweek, Jan. 2022. Accessed 16 June. 2022.

      Maechler, Nicolas, et al. “Improving the business-to-business customer experience.” McKinsey & Company, Mar. 2016. Accessed 16 June.

      “New Research from Dimension Data Reveals Uncomfortable CX Truths.” CISION PR Newswire, Apr. 2017. Accessed 7 June. 2022.

      Sheth, Rohan. 75 Must-Know Customer Experience Statistics to move Your Business Forward in 2022.” SmartKarrot, Feb. 2022. Accessed 17 June. 2022.

      Smith, Mercer. “111 Customer Service Statistics and Facts You Shouldn’t Ignore.” HelpScout, May 2022. Accessed 17 June. 2022.

      “State of the Connected Customer.” Salesforce, 2020. Accessed 14 June. 2022

      “The true value of customer experiences.” Deloitte, 2018. Accessed 15 June. 2022.

      Build a Security Compliance Program

      • Buy Link or Shortcode: {j2store}257|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $23,879 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Most organizations spend between 25 and 40 percent of their security budget on compliance-related activities.
      • Despite this growing investment in compliance, only 28% of organizations believe that government regulations help them improve cybersecurity.
      • The cost of complying with cybersecurity and data protection requirements has risen to the point where 58% of companies see compliance costs as barriers to entering new markets.
      • However, recent reports suggest that while the costs of complying are higher, the costs of non-compliance are almost three times greater.

      Our Advice

      Critical Insight

      • Test once, attest many. Having a control framework allows you to satisfy multiple compliance requirements by testing a single control.
      • Choose your own conformance adventure. Conformance levels allow your organization to make informed business decisions on how compliance resources will be allocated.
      • Put the horse before the cart. Take charge of your audit costs by preparing test scripts and evidence repositories in advance.

      Impact and Result

      • Reduce complexity within the control environment by using a single framework to align multiple compliance regimes.
      • Provide senior management with a structured framework for making business decisions on allocating costs and efforts related to cybersecurity and data protection compliance obligations.
      • Reduces costs and efforts related to managing IT audits through planning and preparation.
      • This blueprint can help you comply with NIST, ISO, CMMC, SOC2, PCI, CIS, and other cybersecurity and data protection requirements.

      Build a Security Compliance Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should manage your security compliance obligations, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Infographic

      Workshop: Build a Security Compliance Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Program

      The Purpose

      Establish the security compliance management program.

      Key Benefits Achieved

      Reviewing and adopting an information security control framework.

      Understanding and establishing roles and responsibilities for security compliance management.

      Identifying and scoping operational environments for applicable compliance obligations.

      Activities

      1.1 Review the business context.

      1.2 Review the Info-Tech security control framework.

      1.3 Establish roles and responsibilities.

      1.4 Define operational environments.

      Outputs

      RACI matrix

      Environments list and definitions

      2 Identify Obligations

      The Purpose

      Identify security and data protection compliance obligations.

      Key Benefits Achieved

      Identifying the security compliance obligations that apply to your organization.

      Documenting obligations and obtaining direction from management on conformance levels.

      Mapping compliance obligation requirements into your control framework.

      Activities

      2.1 Identify relevant security and data protection compliance obligations.

      2.2 Develop conformance level recommendations.

      2.3 Map compliance obligations into control framework.

      2.4 Develop process for operationalizing identification activities.

      Outputs

      List of compliance obligations

      Completed Conformance Level Approval forms

      (Optional) Mapped compliance obligation

      (Optional) Identification process diagram

      3 Implement Compliance Strategy

      The Purpose

      Understand how to build a compliance strategy.

      Key Benefits Achieved

      Updating security policies and other control design documents to reflect required controls.

      Aligning your compliance obligations with your information security strategy.

      Activities

      3.1 Review state of information security policies.

      3.2 Recommend updates to policies to address control requirements.

      3.3 Review information security strategy.

      3.4 Identify alignment points between compliance obligations and information security strategy.

      3.5 Develop compliance exception process and forms.

      Outputs

      Recommendations and plan for updates to information security policies

      Compliance exception forms

      4 Track and Report

      The Purpose

      Track the status of your compliance program.

      Key Benefits Achieved

      Tracking the status of your compliance obligations.

      Managing exceptions to compliance requirements.

      Reporting on the compliance management program to senior stakeholders.

      Activities

      4.1 Define process and forms for self-attestation.

      4.2 Develop audit test scripts for selected controls.

      4.3 Review process and entity control types.

      4.4 Develop self-assessment process.

      4.5 Integrate compliance management with risk register.

      4.6 Develop metrics and reporting process.

      Outputs

      Self-attestation forms

      Completed test scripts for selected controls

      Self-assessment process

      Reporting process

      Recommended metrics

      Build a More Effective Brand Architecture

      • Buy Link or Shortcode: {j2store}571|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions

      Neglecting to maintain the brand architecture can have the following consequences:

      • Inconsistent branding across product lines, services, and marketing communications.
      • Employee confusion regarding product lines, services, and brand structure.
      • Difficulties in launching new products or services or integrating acquired brands.
      • Poor customer experience in navigating the website or understanding the offerings.
      • Inability to differentiate from competitors.
      • Weak brand equity and a lack of brand loyalty.

      Our Advice

      Critical Insight

      Brand architecture is the way a company organizes and manages its portfolio of brands to achieve strategic goals. It encompasses the relationships between brands, from sub-brands to endorsed brands to independent brands, and how they interact with each other and with the master brand. With a clear brand architecture, businesses can optimize their portfolio, enhance their competitive position, and achieve sustainable growth and success in the long run.

      Impact and Result

      Establishing and upholding a well-defined brand architecture is critical to achieve:

      • Easy recognition and visibility
      • Consistent branding
      • Operational efficiency
      • Customer loyalty
      • Ability to easily adapt to changes
      • Competitive differentiation
      • Distinctive brand image
      • Business success

      Build a More Effective Brand Architecture Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a More Effective Brand Architecture Storyboard – Develop a brand architecture that supports your business goals, clarifies your brand portfolio, and enhances your overall brand equity.

      We recommend a two-step approach that involves defining or reimagining the brand architecture. This means choosing the right strategy by analyzing the current brand portfolio, identifying the core brand elements, and determining and developing the structure that fits with the brand and business goals. A well-thought-out brand architecture also facilitates the integration of new brands and new product launches.

      • Build a More Effective Brand Architecture Storyboard

      2. Brand Architecture Strategy Template – The brand architecture template is a tool for creating a coherent brand identity.

      Create a brand identity that helps you launch new products and services, prepare for acquisitions, and modify your brand strategy. Allocate resources more effectively and identify new opportunities for growth. A brand architecture can provide insights into how different brands fit together and contribute to the overall brand strategy.

      • Brand Architecture Strategy Template

      Infographic

      Workshop: Build a More Effective Brand Architecture

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Brand Mind Mapping

      The Purpose

      The brand mind mapping workshop is an exercise that helps with visualizing brand architecture and improving coherence and effectiveness in brand portfolio management.

      Key Benefits Achieved

      This exercise can help businesses:

      Allocate their resources more effectively.

      Identify new opportunities for growth.

      Gain a competitive advantage in their market.

      Activities

      1.1 Brand Mind Mapping

      Outputs

      Visual representation of the brand architecture and its various components

      Further reading

      Build a More Effective Brand Architecture

      Strategically optimize your portfolio to increase brand recognition and value.

      Analyst perspective

      Brand Architecture

      Nathalie Vezina, Marketing Research Director, SoftwareReviews Advisory

      Nathalie Vezina
      Marketing Research Director
      SoftwareReviews Advisory

      This blueprint highlights common brand issues faced by companies, such as inconsistencies in branding and sub-branding due to absent or inadequate planning and documentation or non-compliance with the brand architecture. It emphasizes the importance of aligning or modifying the company's brand strategy with the existing architecture to create a consistent brand when launching new products, services, or divisions or preparing for acquisitions.

      Changing the brand architecture can be challenging, as it often requires significant resources, time, and effort. Additionally, there may be resistance from stakeholders who have become attached to the existing brand architecture and may not see the value in making changes. However, it's important for companies to address suboptimal brand architecture to ensure consistency and clarity in brand messaging and support business growth and success.

      This blueprint guides brand leaders on building and updating their brand architecture for optimal clarity, consistency, adaptability, and efficiency.

      Executive summary

      Your Challenge Common Obstacles SoftwareReviews’ Approach
      A company's brand architecture can help brand managers build a stronger brand that supports the company's goals and increases brand value. Failing to maintain the brand architecture can have the following consequences:
      • Inconsistent branding across product lines, services, and marketing communications
      • Employee confusion regarding product lines, services, and brand structure.
      • Difficulties in launching new products or services or integrating acquired brands.
      • Poor customer experience in navigating the website or understanding the offerings.
      • Inability to differentiate from competitors.
      • Weak brand equity and a lack of brand loyalty.
      Establishing and maintaining a clear brand architecture can pose significant issues for brand leaders. Despite these obstacles, defining the brand architecture can yield substantial benefits for businesses. Common constraints are:
      • Lack of knowledge on the subject, resulting in difficulties securing buy-in from stakeholders.
      • Siloed teams and competing priorities.
      • Limited resources and time constraints.
      • Resistance to change from employees or customers.
      • Inconsistent execution and adherence to brand guidelines.
      • Lack of communication and coordination when acquiring new brands.
      With focused and effective efforts and guidance, brand leaders can define or reimagine their brand architecture. Developing and maintaining a clear and consistent brand architecture involves:
      • Defining the brand architecture strategy.
      • Analyzing the current brand portfolio and identifying the core brand elements.
      • Determining and developing the proper brand structure.
      • Updating brand guidelines and messaging.
      • Rolling out the brand architecture across touchpoints and assets.
      • Facilitating the integration of new brands.
      • Monitoring and adjusting the architecture as needed for relevance to business goals.

      "[B]rand architecture is like a blueprint for a house...the foundation that holds all the pieces together, making sure everything fits and works seamlessly."
      Source: Verge Marketing

      The basics of brand architecture

      The significance of brand hierarchy organization

      Brand architecture is the hierarchical organization and its interrelationships. This includes shaping the brand strategy and structuring the company's product and service portfolio.

      A well-designed brand architecture helps buyers navigate a company's product offerings and creates a strong brand image and loyalty.

      A company's brand architecture typically includes three levels:

      • Master or parent brand
      • Sub-brands
      • Endorsed brands

      Choosing the right architecture depends on business strategy, products and services, and target audience. It should be reviewed periodically as the brand evolves, new products and services are launched, or new brands are acquired.

      "A brand architecture is the logical, strategic, and relational structure for your brands, or put another way, it is the entity's 'family tree' of brands, sub-brands, and named products."
      Source: Branding Strategy Insider

      Enhancing a company's brand hierarchy for better business outcomes

      Maximize brand strategy with a well-defined and managed brand architecture.

      Align brand architecture with business goals
      A well-defined brand architecture aligned with business objectives contributes to building brand recognition, facilitating brand extension, and streamlining brand portfolio management. In addition, it improves marketing effectiveness and customer experience.
      With a clear and consistent brand architecture, companies can strengthen their brand equity, increase awareness and loyalty, and grow in their competitive environment.

      Effectively engage with the desired buyers
      A clear and consistent brand architecture enables companies to align their brand identity and value proposition with the needs and preferences of their target audience, resulting in increased customer loyalty and satisfaction.
      Establishing a unique market position and reinforcing brand messaging and positioning allows companies to create a more personalized and engaging customer experience, driving business growth.

      Maintain a competitive edge
      An effective brand architecture allows companies to differentiate themselves from their competitors by establishing their unique position in the market. It also provides a structured framework for introducing new products or services under the same brand, leveraging the existing one.
      By aligning their brand architecture with their business objectives, companies can achieve sustainable growth and outperform their competitors in the marketplace.

      "A well-defined brand architecture provides clarity and consistency in how a brand is perceived by its audience. It helps to create a logical framework that aligns with a brand's overall vision and objectives."
      Source: LinkedIn

      Pitfalls of neglecting brand guidelines

      Identifying the negative effects on business and brand value.

      Deficient brand architecture can manifest in various ways.

      Here are some common symptoms:

      • Lack of clarity around the brand's personality and values
      • Inconsistent messaging and branding
      • Inability to differentiate from competitors
      • Weak brand identity
      • Confusion among customers and employees
      • Difficulty launching new products/services or integrating acquired brands
      • Lack of recognition and trust from consumers, leading to potential negative impacts on the bottom line

      Brand architecture helps to ensure that your company's brands are aligned with your business goals and objectives, and that they work together to create a cohesive and consistent brand image.

      The most common obstacles in developing and maintaining a clear brand architecture

      Establishing and maintaining a clear brand architecture requires the commitment of the entire organization and a collaborative effort.

      Lack of stakeholder buy-in > Resistance to change

      Siloed teams > Inconsistent execution

      Limited resources > Lack of education and communication

      Types of brand architectures

      Different approaches to structuring brand hierarchy

      Brand architecture is a framework that encompasses three distinct levels, each comprising a different type of branding strategy.

      Types of brand architectures

      Examples of types of brand architectures

      Well-known brands with different brand and sub-brands structures

      Examples of types of brand architectures

      Pros and cons of each architecture types

      Different approaches to organizing a brand portfolio

      The brand architecture impacts the cohesiveness, effectiveness, and market reach. Defining or redefining organization changes is crucial for company performance.

      Branded House Endorsed Brands House of Brands
      Other Designations
      • "Monolithic brands"
      • "Sub-brands"
      • "Freestanding brands"
      Description
      • Single brand name for all products/services
      • Creates a unique and powerful image that can easily be identified
      • The master brand name endorses a range of products/services marketed under different sub-brands
      • Decentralized brands
      • Can target diverse markets with separate brand names for each product/service
      Marketing & Comms
      • Highly efficient
      • Eliminates split branding efforts by product/service
      • Product differentiation and tailoring messages to specific customer segments are limited
      • Each brand has its unique identity
      • Benefit from the support and resources of the master brand
      • Allows for unique branding and messaging per products/services for specific customer segments
      • Can experiment with different offerings and strategies
      Impact on Sales
      • Good cross-selling opportunities by leveraging a strong brand name
      • Benefit from the master brand's credibility, building customer trust and increasing sales
      • Tailored marketing to specific segments can increase market share and profitability
      • Creates competitive advantage and builds loyalty
      Cost Effectiveness
      • Cost-effective
      • No separate branding efforts per product/service
      • Lack of economy of scale
      • Fragmentation of resources and duplication of effort
      • Lack of economy of scale
      • Fragmentation of resources and duplication of effort
      Reputation and Image
      • More control over the brand image, messages, and perception, leading to strong recognition
      • Increased vulnerability to negative events can damage the entire brand, products/services offered
      • Mitigated risk, protecting the master brand's reputation and financial performance
      • Negative events with one brand can damage the master and other brands, causing a loss of credibility
      • Reduced risk, safeguarding the master brand's reputation and financial performance
      • Each brand builds its own equity, enhancing the company's financial performance and value
      Consistency
      • Ensures consistency with the company's brand image, values, and messaging
      • Helps build trust and loyalty
      • Inconsistent branding and messaging can cause confusion and misunderstandings
      • Unclear link between master/endorsed brands
      • Reduces trust and brand loyalty
      • Difficult to establish a clear and consistent corporate identity
      • Can reduce overall brand recognition and loyalty

      Brand naming decision tree

      Create a naming process for brand alignment and resonance with the target audience

      To ensure a chosen name is effective and legally/ethically sound, consider the ease of pronunciation/spelling, the availability for registration of brand/domain name, any negative connotations/associations in any language/culture, and potential legal/ethical issues.

      Brand naming decision tree

      To ensure a chosen name is effective and legally/ethically sound, consider the ease of pronunciation/spelling, the availability for registration of brand/domain name, any negative connotations/associations in any language/culture, and potential legal/ethical issues.

      Advantages of defining brand architecture

      Maximize your brand potential with a clear architecture strategy.

      Clear offering

      Adaptability

      Consistent branding

      Competitive differentiation

      Operational efficiency

      Strong brand identity

      Customer loyalty

      Business success

      "Responding to external influences, all brands must adapt and change over time. A clear system can aid in managing the process, ensuring that necessary changes are implemented effectively and efficiently."
      Source: The Branding Journal

      SoftwareReviews' brand architecture creation methodology

      Develop and Implement a Robust Brand Architecture

      Phase Steps

      Step 1 Research and Analysis
      1.1 Define brand architecture strategy
      1.2 Brand audit
      1.3 Identify brand core elements

      Step 2 Development and Implementation
      2.1 Determine brand hierarchy
      2.2 Develop or update brand guidelines
      2.3 Roll out brand architecture

      Phase Outcomes
      • Brand current performance is assessed
      • Issues are highlighted and can be addressed
      • Brand structure is developed and implemented across touchpoints and assets
      • Adjustments are made on an ongoing basis for consistency and relevance to business goals

      Insight summary

      Brand Architecture: Organize and manage your portfolio of brands
      Brand architecture is the way a company organizes and manages its portfolio of brands to achieve strategic goals. It encompasses the relationships between brands, from sub-brands to endorsed brands to independent brands, and how they interact with each other and with the master brand. With a clear brand architecture, businesses can optimize their portfolio, enhance their competitive position, and achieve sustainable growth and success in the long run.

      Aligning brand architecture to business strategy
      Effective brand architecture aligns with the company's business strategy, marketing objectives, and customer needs. It provides clarity and coherence to the brand portfolio, helps customers navigate product offerings, and maximizes overall equity of the brand.

      Choosing between three types of brand architecture
      A company's choice of brand architecture depends on factors like product range, target markets, and strategic objectives. Each approach, Branded House, Endorsed, or House of Brands, has its own pros and cons, and the proper option relies on the company's goals, resources, and constraints.

      A logical brand hierarchy for more clarity
      The order of importance of brands in the portfolio, including the relationships between the master and sub-brands, and the positioning of each in the market is fundamental. A clear and logical hierarchy helps customers understand the value proposition of each brand and reduces confusion.

      A win-win approach
      Clear brand architecture can help customers easily navigate and understand the product offering, reinforce the brand identity and values, and improve customer loyalty and retention. Additionally, it can help companies optimize their marketing strategies, streamline their product development and production processes, and maximize their revenue and profitability.

      Brand architecture, an ongoing process
      Brand architecture is not a one-time decision but an ongoing process that requires regular review and adjustment. As business conditions change, companies may need to revise their brand portfolio, brand hierarchy, or brand extension and acquisition strategies to remain competitive and meet customer needs.

      Brand architecture creation tools

      This blueprint comes with tools to help you develop your brand architecture.

      Brand Architecture Toolkit

      This kit includes a Brand Architecture Mini-Audit, a Brand Architecture template, and templates for Brand Matrix, Ecosystem, and Development Strategy.

      Use this kit to develop a strong brand architecture that aligns with your business goals, clarifies your brand portfolio, and enhances overall brand equity.

      Brand Architecture Toolkit

      Brand Architecture

      Develop a robust brand architecture that supports your business goals, clarifies your brand portfolio, and enhances your overall brand equity.

      "A brand architecture is the logical, strategic, and relational structure for your brands, or put another way, it is the entity's 'family tree' of brands, sub-brands, and named products."
      Source: Branding Strategy Insider

      Consequences of Neglected Brand Guidelines

      When a company neglects its brand architecture and guidelines, it can result in a number of negative consequences, such as:

      • Lack of clarity around the brand's personality and values
      • Inconsistent messaging and branding
      • Inability to differentiate from competitors
      • Weak brand identity
      • Confusion among customers and employees
      • Difficulty launching new products/services or integrating acquired brands
      • Lack of recognition and trust from consumers, leading to potential negative impacts on the bottom line.

      Benefits of SoftwareReviews' Methodology

      By following SoftwareReviews' methodology to develop and maintain a brand architecture, businesses can:

      • Establish a unique market position and stand out from competitors
      • Ensure that marketing efforts are focused and effective
      • Create personalized and engaging customer experiences
      • Reinforce messaging and positioning
      • Increase customer loyalty and satisfaction
      • Build brand recognition and awareness

      Marq, formerly Lucidpress, surveyed over 400 brand management experts and found that "if the brand was consistent, revenue would increase by 10-20%."

      Methodology for Defining Brand Architecture

      Who benefits from this research?

      This research is designed for:

      • Organizations that value their brand and want to ensure that it is communicated effectively and consistently across all touchpoints.
      • Business owners, marketers, brand managers, creative teams, and anyone involved in the development and implementation of brand strategy.

      This research will also assist:

      • Sales and customer experience teams
      • Channel partners
      • Buyers

      This research will help you:

      • Establish a unique market position and stand out from competitors.
      • Create a more personalized and engaging customer experience.
      • Ensure that marketing efforts are focused and effective.
      • Reinforce brand messaging and positioning.

      This research will help them:

      • Increase customer loyalty and satisfaction
      • Build brand recognition and awareness
      • Drive business growth and profitability.

      SoftwareReviews offers various levels of support to best suit your needs

      DIY Toolkit
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
      Guided Implementation
      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
      Workshop
      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
      Consulting
      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
      Included Within Advisory Membership Optional Add-Ons

      Guided Implementation

      What does a typical GI on this topic look like?

      Research & Analysis
      Call #1: Discuss brand architecture strategy (define objectives, scope and stakeholders). Call #3: Identify core brand components and ensure they align with the brand strategy. Call #5: Develop or update brand guidelines. Optional Calls:
      • Brand Diagnostic
      • Brand Strategy and Tactics
      • Brand Voice Guidelines
      • Asset Creation and Management
      • Brand Messaging
      Call #2: Conduct a brand audit. Call #4: Define and document the brand hierarchy. Call #6: Roll out the brand architecture and monitoring.

      A Guided Implementation (GI) is a series of calls with a SoftwareReviews Marketing Analyst to help implement our best practices in your organization.

      Your engagement managers will work with you to schedule analyst calls.

      Brand Mind Mapping Workshop Overview

      Total duration: 3-4 hours

      Activities
      Visually map out the different elements of your brand portfolio, including corporate brands, sub-brands, product brands, and their relationships with each other.

      The workshop also aims to explore additional elements, such as brand expansions, acquisitions, and extensions, and brand attributes and positioning.

      Deliverables
      Get a mind map that represents the brand architecture and its various components, which can be used to evaluate and improve the overall coherence and effectiveness of the brand portfolio. The mind map can also provide insights into how different brands fit together and contribute to the overall brand strategy.

      Participants

      • Business owners
      • Head of Branding and anyone involved with the brand strategy

      Tools

      • Brand Architecture Template, slides 7 and 8

      Brand Mind Mapping

      Contact your account representative for more information
      workshops@infotech.com | 1-888-670-8889

      Get started!

      Develop a brand architecture that supports your business goals, clarifies your brand portfolio, and enhances your overall brand equity.

      Develop and Implement a Robust Brand Architecture

      Step 1 Research and Analysis
      1.1 Define architecture strategy
      1.2 Perform brand audit
      1.3 Identify brand core elements

      Step 2 Development and Implementation
      2.1 Determine brand hierarchy
      2.2 Develop or update brand guidelines
      2.3 Roll out brand architecture

      Phase Outcome

      • Brand current performance is assessed
      • Issues are highlighted and can be addressed
      • Brand structure is developed and implemented across touchpoints and assets
      • Adjustments made on an ongoing basis for consistency and relevance to business goals

      Develop and implement a robust brand architecture

      Steps 1.1, 1.2 & 1.3 Define architecture strategy, audit brand, and identify core elements.

      Total duration: 2.5-4.5 hours

      Objective
      Define brand objectives (hierarchy, acquired brand inclusion, product distinction), scope, and stakeholders. Analyze the brand portfolio to identify gaps or inconsistencies. Identify brand components (name, logo, tagline, personality) and align them with the brand and business strategy.

      Output
      By completing these steps, you will assess your current brand portfolio and evaluate its consistency and alignment with the overall brand strategy.

      Participants

      • Business owners
      • Head of Branding and anyone involved with the brand strategy

      Tools

      • Diagnose Brand Health to Improve Business Growth Blueprint (optional)
      • Brand Awareness Strategy Template (optional)

      1.1 Define Brand Architecture Strategy
      (60-120 min.)

      Define

      Define brand objectives (hierarchy, inclusion of an acquired brand, product distinction), scope, and stakeholders.

      1.2 Conduct Brand Audit
      (30-60 min.)

      Assess

      Assess the state of your brand architecture using the "Brand architecture mini-audit checklist," slide 9 of the Brand Architecture Strategy Template. Check the boxes that correspond to the state of your brand architecture. Those left unchecked represent areas for improvement.

      For a more in-depth analysis of your brand performance, follow the instructions and use the tools provided in the Diagnose Brand Health to Improve Business Growth blueprint (optional).

      1.3 Identify Core Brand Elements
      (60-90 min.)

      Identify

      Define brand components (name, logo, tagline, personality). Align usage with strategy. You can develop your brand strategy, if not already existing, using the Brand Awareness Strategy Template (optional).

      Tip!

      Continuously monitor and adjust your brand architecture - it's not static and should evolve over time. You can also adapt your brand strategy as needed to stay relevant and competitive.

      Develop and implement a robust brand architecture

      Steps 2.1. 2.2 & 2.3 Develop brand hierarchy, guidelines, and rollout architecture.

      Total duration: 3.5-5.5 hours

      Objective
      Define your brand structure and clarify the role and market position of each. Create concise brand expression guidelines, implement them across all touchpoints and assets, and adjust as needed to stay aligned with your business goals.

      Output
      This exercise will help you establish and apply your brand structure, with a plan for ongoing updates and adjustments to maintain consistency and relevance.

      Participants

      • Business owners
      • Head of Branding and anyone involved with the brand strategy

      Tools

      • Brand Architecture Template
      • Brand Voice Guidelines
      • Brand Messaging Template
      • Asset Creation and Management List Template

      2.1 Determine Brand Hierarchy
      (30-60 min.)

      Analyze & Document

      In the Brand Architecture Strategy Template, complete the brand matrix, ecosystem, development strategy matrix, mind mapping, and architecture, to develop a strong brand architecture that aligns with your business goals and clarifies your brand portfolio and market position.

      2.2 Develop/Update Brand Guidelines
      (120-180 min.)

      Develop/Update

      Develop (or update existing) clear, concise, and actionable brand expression guidelines using the Brand Voice Guidelines and Brand Messaging Template.

      2.2 Rollout Brand Architecture
      Preparation (60-90 min.)

      Create & Implement

      Use the Asset Creation and Management List Template to implement brand architecture across touchpoints and assets.

      Monitor and Adjust

      Use slide 8, "Brand Strategy Development Matrix," of the Brand Architecture Strategy Template to identify potential and future brand development strategies to build or enhance your brand based on your current brand positioning and business goals. Monitor, and adjust as needed, for relevance to the brand and business strategy.

      Tip!

      Make your brand architecture clear and simple for your target audience, employees, and stakeholders. This will avoid confusion and help your audience understand your brand structure.

      Prioritizing clarity and simplicity will communicate your brand's value proposition effectively and create a strong brand that resonates with your audience and supports your business goals.

      Related SoftwareReviews research

      Diagnose Brand Health to Improve Business Growth

      Have a significant and well-targeted impact on business success and growth by knowing how your brand performs, identifying areas of improvement, and making data-driven decisions to fix them.

      • Increase brand awareness and equity.
      • Build trust and improve customer retention and loyalty.
      • Achieve higher and faster growth.

      Accelerate Business Growth and Valuation by Building Brand Awareness

      Successfully build awareness and help the business grow. Stand out from the competition and continue to grow in a sustainable way.

      • Get a clear understanding of the buyer's needs and your key differentiator.
      • Achieve strategy alignment and readiness.
      • Create and manage assets.

      Bibliography

      "Brand Architecture: Definition, Types, Strategies, and Examples." The Branding Journal, 2022.

      "Brand Architecture: What It Is and How to Build Your Brand's Framework." HubSpot, 2021.

      "Brand Architecture Framework." Verge Marketing, 2021.

      "Brand consistency-the competitive advantage and how to achieve it." Marq/Lucidpress, 2021.

      "Building brands for growth: A fresh perspective." McKinsey & Company. Accessed on 31 March 2023.

      Daye, Derrick. "Brand Architecture Strategy Guide." Branding Strategy Insider, The Blake Project, 13 May 2021.

      Todoran, Adrian. "Choosing the Perfect Brand Architecture Strategy for Your Business." LinkedIn, 2023.

      IT Strategy

      • Buy Link or Shortcode: {j2store}20|cart{/j2store}
      • Related Products: {j2store}20|crosssells{/j2store}
      • Up-Sell: {j2store}20|upsells{/j2store}
      • member rating overall impact: 9.3/10
      • member rating average dollars saved: $105,465
      • member rating average days saved: 35
      • Parent Category Name: Strategy and Governance
      • Parent Category Link: strategy-and-governance
      Success depends on IT initiatives clearly aligned to business goals.

      Drive Successful Sourcing Outcomes With a Robust RFP Process

      • Buy Link or Shortcode: {j2store}216|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $25,860 Average $ Saved
      • member rating average days saved: 14 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Most IT organizations do not have standard RFP templates and tools.
      • Many RFPs lack sufficient requirements.
      • Most RFP team members are not adequately trained on RFP best practices.
      • Most IT departments underestimate the amount of time that is required to perform an effective RFP.

      Our Advice

      Critical Insight

      • Vendors generally do not like RFPs
        Vendors view RFPs as time consuming and costly to respond to and believe that the decision is already made.
      • Dont ignore the benefits of an RFI
        An RFI is too often overlooked as a tool for collecting information from vendors about their product offerings and services.
      • Leverage a pre-proposal conference to maintain an equal and level playing field
        Pre-proposal conference is a convenient and effective way to respond to vendors’ questions ensuring all vendors have the same information to provide a quality response.

      Impact and Result

      • A bad or incomplete RFP results in confusing and incomplete vendor RFP responses which consume time and resources.
      • Incomplete or misunderstood requirements add cost to your project due to the change orders required to complete the project.

      Drive Successful Sourcing Outcomes With a Robust RFP Process Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Storyboard – Leverage your vendor sourcing process to get better results

      Discover a proven process for your RFPs. Review Info-Tech’s process and understand how you can prevent your organization from leaking negotiation leverage while preventing vendors from taking control of your RFP. Our 7-phase process prevents a bad RFP from taking your time, money, and resources.

      • Drive Successful Sourcing Outcomes With a Robust RFP Process Storyboard

      2. Define your RFP Requirements Tool – A convenient tool to gather your requirements and align them to your negotiation strategy.

      Use this tool to assist you and your team in documenting the requirements for your RFP. Use the results of this tool to populate the requirements section of your RFP.

      • RFP Requirements Worksheet

      3. RFP Development Suite of Tools – Use Info-Tech’s RFP, pricing, and vendor response tools and templates to increase your efficiency in your RFP process.

      Configure this time-saving suite of tools to your organizational culture, needs, and most importantly the desired outcome of your RFP initiative. This suite contains four unique RFP templates. Evaluate which template is appropriate for your RFP. Also included in this suite are a response evaluation guidebook and several evaluation scoring tools along with a template to report the RFP results to stakeholders.

      • RFP Calendar and Key Date Tool
      • Vendor Pricing Tool
      • Lean RFP Template
      • Short-Form RFP Template
      • Long-Form RFP Template
      • Excel Form RFP Tool
      • RFP Evaluation Guidebook
      • RFP Evaluation Tool
      • Vendor TCO Tool
      • Consolidated Vendor RFP Response Evaluation Summary
      • Vendor Recommendation Presentation

      Infographic

      Workshop: Drive Successful Sourcing Outcomes With a Robust RFP Process

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Foundation for Creating Requirements

      The Purpose

      Problem Identification

      Key Benefits Achieved

      Current process mapped and requirements template configured

      Activities

      1.1 Overview and level-setting

      1.2 Identify needs and drivers

      1.3 Define and prioritize requirements

      1.4 Gain business authorization and ensure internal alignment

      Outputs

      Map Your Process With Gap Identification

      Requirements Template

      Map Your Process With Gap Identification

      Requirements Template

      Map Your Process With Gap Identification

      Requirements Template

      Map Your Process With Gap Identification

      Requirements Template

      2 Creating a Sourcing Process

      The Purpose

      Define Success Target

      Key Benefits Achieved

      Baseline RFP and evaluation templates

      Activities

      2.1 Create and issue RFP

      2.2 Evaluate responses/proposals and negotiate the agreement

      2.3 Purchase goods and services

      Outputs

      RFP Calendar Tool

      RFP Evaluation Guidebook

      RFP Respondent Evaluation Tool

      3 Configure Templates

      The Purpose

      Configure Templates

      Key Benefits Achieved

      Configured Templates

      Activities

      3.1 Assess and measure

      3.2 Review templates

      Outputs

      Long-Form RFP Template

      Short-Form RFP Template

      Excel-Based RFP Template

      Further reading

      Drive Successful Sourcing Outcomes With a Robust RFP Process

      Leverage your vendor sourcing process to get better results.

      EXECUTIVE BRIEF

      Drive Successful Sourcing Outcomes with a Robust RFP Process

      Lack of RFP Process Causes...
      • Stress
      • Confusion
      • Frustration
      • Directionless
      • Exhaustion
      • Uncertainty
      • Disappointment
      Solution: RFP Process
      Steps in an RFP Process, 'Identify Need', 'Define Business Requirements', 'Gain Business Authorization', 'Perform RFI/RFP', 'Negotiate Agreement', 'Purchase Good and Services', and 'Assess and Measure Performance'.
      • Best value solutions
      • Right-sized solutions
      • Competitive Negotiations
      • Better requirements that feed negotiations
      • Internal alignment on requirements and solutions
      • Vendor Management Governance Plan
      Requirements
      • Risk
      • Legal
      • Support
      • Security
      • Technical
      • Commercial
      • Operational
      • Vendor Management Governance
      Templates, Tools, Governance
      • RFP Template
      • Your Contracts
      • RFP Procedures
      • Pricing Template
      • Evaluation Guide
      • Evaluation Matrix
      Vendor Management
      • Scorecards
      • Classification
      • Business Review Meetings
      • Key Performance Indicators
      • Contract Management
      • Satisfaction Survey

      Analyst Perspective

      Consequences of a bad RFP

      Photo of Steven Jeffery, Principal Research Director, Vendor Management, Co-Author: The Art of Creating a Quality RFP, Info-Tech Research Group

      “A bad request for proposal (RFP) is the gift that keeps on taking – your time, your resources, your energy, and your ability to accomplish your goal. A bad RFP is ineffective and incomplete, it creates more questions than it answers, and, perhaps most importantly, it does not meet your organization’s expectations.”

      Steven Jeffery
      Principal Research Director, Vendor Management
      Co-Author: The Art of Creating a Quality RFP
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Most IT organizations are absent of standard RFP templates, tools, and processes.
      • Many RFPs lack sufficient requirements from across the business (Legal, Finance, Security, Risk, Procurement, VMO).
      • Most RFP team members are not adequately trained on RFP best practices.
      • Most IT departments underestimate the amount of time required to perform an effective RFP.
      • An ad hoc sourcing process is a common recipe for vendor performance failure.

      Common Obstacles

      • Lack of time
      • Lack of resources
      • Right team members not engaged
      • Poorly defined requirements
      • Too difficult to change supplier
      • Lack of a process
      • Lack of adequate tools/processes
      • Lack of a vendor communications plan that includes all business stakeholders.
      • Lack of consensus as to what the ideal result should look like.

      Info-Tech’s Approach

      • Establish a repeatable, consistent RFP process that maintains negotiation leverage and includes all key components.
      • Create reusable templates to expedite the RFP evaluation and selection process.
      • Maximize the competition by creating an equal and level playing field that encourages all the vendors to respond to your RFP.
      • Create a process that is clear and understandable for both the business unit and the vendor to follow.
      • Include Vendor Management concepts in the process.

      Info-Tech Insight

      A well planned and executed sourcing strategy that focuses on solid requirements, evaluation criteria, and vendor management will improve vendor performance.

      Executive Summary

      Your Challenge

      Your challenge is to determine the best sourcing tool to obtain vendor information on capabilities, solution(s), pricing and contracting: RFI, RFP, eRFX.

      Depending on your organization’s knowledge of the market, your available funding, and where you are in the sourcing process, there are several approaches to getting the information you need.

      An additional challenge is to answer the question “What is the purpose of our RFX?”

      If you do not have in-depth knowledge of the market, available solutions, and viable vendors, you may want to perform an RFI to provide available market information to guide your RFP strategy.

      If you have defined requirements, approved funding, and enough time, you can issue a detailed, concise RFP.

      If you have “the basics” about the solution to be acquired and are on a tight timeframe, an “enhanced RFI” may fit your needs.

      This blueprint will provide you with the tools and processes and insights to affect the best possible outcome.

      Executive Summary

      Common Obstacles

      • Lack of process/tools
      • Lack of input from stakeholders
      • Stakeholders circumventing the process to vendors
      • Vendors circumventing the process to key stakeholders
      • Lack of clear, concise, and thoroughly articulated requirements
      • Waiting until the vendor is selected to start contract negotiations
      • Waiting until the RFP responses are back to consider vendor management requirements
      • Lack of clear communication strategy to the vendor community that the team adheres to

      Many organizations underestimate the time commitment for an RFP

      70 Days is the average duration of an IT RFP.

      The average number of evaluators is 5-6

      4 Is the average number of vendor submissions, each requiring an average of two to three hours to review. (Source: Bonfire, 2019. Note: The 2019 Bonfire report on the “State of the RFP” is the most recent published.)

      “IT RFPs take the longest from posting to award and have the most evaluators. This may be because IT is regarded as a complex subject requiring complex evaluation. Certainly, of all categories, IT offers the most alternative solutions. The technology is also changing rapidly, as are the requirements of IT users – the half-life of an IT requirement is less than six months (half the requirements specified now will be invalid six months from now). And when the RFP process takes up two of those months, vendors may be unable to meet changed requirements when the time to implement arrives. This is why IT RFPs should specify the problem to be resolved rather than the solution to be provided. If the problem resolution is the goal, vendors are free to implement the latest technologies to meet that need.” (Bonfire, “2019 State of the RFP”)

      Why Vendors Don’t Like RFPs

      Vendors’ win rate

      44%

      Vendors only win an average of 44% of the RFPs they respond to (Loopio, 2022).
      High cost to respond

      3-5%

      Vendors budget 3-5% of the anticipated contract value to respond (LinkedIn, 2017, Note: LinkedIn source is the latest information available).
      Time spent writing response

      23.8 hours

      Vendors spend on average 23.8 hours to write or respond to your RFP (Marketingprofs, 2021).

      Negative effects on your organization from a lack of RFP process

      Visualization titled 'Lack of RFP Process Causes' with the following seven items listed.

      Stress, because roles and responsibilities aren’t clearly defined and communication is haphazard, resulting in strained relationships.

      Confusion, because you don’t know what the expected or desired results are.

      Directionless, because you don’t know where the team is going.

      Uncertainty, with many questions of your own and many more from other team members.

      Frustration, because of all the questions the vendors ask as a result of unclear or incomplete requirements.

      Exhaustion, because reviewing RFP responses of insufficient quality is tedious.

      Disappointment in the results your company realizes.

      (Source: The Art of Creating a Quality RFP)

      Info-Tech’s approach

      Develop an inclusive and thorough approach to the RFP Process

      Steps in an RFP Process, 'Identify Need', 'Define Business Requirements', 'Gain Business Authorization', 'Perform RFI/RFP', 'Negotiate Agreement', 'Purchase Good and Services', and 'Assess and Measure Performance'.

      The Info-Tech difference:

      1. The secret to managing an RFP is to make it as manageable and as thorough as possible. The RFP process should be like any other aspect of business – by developing a standard process. With a process in place, you are better able to handle whatever comes your way, because you know the steps you need to follow to produce a top-notch RFP.
      2. The business then identifies the need for more information about a product/service or determines that a purchase is required.
      3. A team of stakeholders from each area impacted gather all business, technical, legal, and risk requirements. What are the expectations of the vendor relationship post-RFP? How will the vendors be evaluated?
      4. Based on the predetermined requirements, either an RFI or an RFP is issued to vendors with a predetermined due date.

      Insight Summary

      Overarching insight

      Without a well defined, consistent RFP process, with input from all key stakeholders, the organization will not achieve the best possible results from its sourcing efforts.

      Phase 1 insight

      Vendors are choosing to not respond to RFPs due to their length and lack of complete requirements.

      Phase 2 insight

      Be clear and concise in stating your requirements and include, in addition to IT requirements, procurement, security, legal, and risk requirements.

      Phase 3 insight

      Consider adding vendor management requirements to manage the ongoing relationship post contract.

      Tactical insight

      Consider the RFP Evaluation Process as you draft the RFP, including weighting the RFP components. Don’t underestimate the level of effort required to effectively evaluate responses – write the RFP with this in mind.

      Tactical insight

      Provide strict, prescriptive instructions detailing how the vendor should submit their responses. Controlling vendor responses will increase your team’s efficiency in evaluations while providing ease of reference responses across multiple vendors.

      Key deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Key deliverables:

      Info-Tech provides you with the tools you need to go to market in the most efficient manner possible, with guidance on how to achieve your goals.

      Sample of

      Long-Form RFP Template
      For when you have complete requirements and time to develop a thorough RFP.
      Sample of the Long-Form RFP Template deliverable. Short-Form RFP Template
      When the requirements are not as extensive, time is short, and you are familiar with the market.
      Sample of the Short-Form RFP Template deliverable.
      Lean RFP Template
      When you have limited time and some knowledge of the market and wish to include only a few vendors.
      Sample of the Lean RFP Template deliverable. Excel-Form RFP Template
      When there are many requirements, many options, multiple vendors, and a broad evaluation team.
      Sample of the Excel-Form RFP Template deliverable.

      Blueprint benefits

      IT Benefits
      • Side-by-side comparison of vendor capabilities
      • Pricing alternatives
      • No surprises
      • Competitive solutions to deliver the best results
      Mutual IT and Business Benefits
      • Reduced time to implement
      • Improved alignment between IT /Business
      • Improved vendor performance
      • Improved vendor relations
      Business Benefits
      • Budget alignment, reduced cost
      • Best value
      • Risk mitigation
      • Legal and risk protections

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is seven to twelve calls over the course of four to six months.

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      Phase 5

      Phase 6

      Phase 7

      Call #1: Identify the need Call #3: Gain business authorization Call #5: Negotiate agreement strategy Call #7: Assess and measure performance
      Call #2: Define business requirements Call #4: Review and perform the RFX or RFP Call #6: Purchase goods and services

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889

      Day 1 Day 2 Day 3
      Activities
      Answer “What problem do we need to solve?”

      1.1 Overview and level-setting

      1.2 Identify needs and drivers

      1.3 Define and prioritize requirements

      1.4 Gain business authorization and ensure internal alignment

      Define what success looks like?

      2.1 Create and issue RFP

      2.2 Evaluate responses/ proposals and negotiate the agreement.

      2.3 Purchase goods and services

      Configure Templates

      3.1 Assess and measure

      3.2 Review tools

      Deliverables
      1. Map your process with gap identification
      2. RFP Requirements Worksheet
      1. RFP Calendar and Key Date Tool
      2. RFP Evaluation Guidebook
      3. RFP Evaluation Tool
      1. Long-form RFP Template
      2. Short-form RFP Template
      3. Excel-based RFP Tool
      4. Lean RFP Template

      Phase 1

      Identify Need

      Steps

      1.1 Establish the need to either purchase goods/services (RFP) or acquire additional information from the market (RFI).

      Steps in an RFP Process with the first step, 'Identify Need', highlighted.

      This phase involves the following participants:

      • Business stakeholders
      • IT
      • Sourcing/Procurement
      • Finance

      Identify the need based on business requirements, changing technology, increasing vendor costs, expiring contracts, and changing regulatory requirements.

      Outcomes of this phase

      Agreement on the need to go to market to make a purchase (RFP) or to acquire additional information (RFI) along with a high-level agreement on requirements, rough schedule (is there time to do a full blown RFP or are you time constrained, which may result in an eRFP) and the RFP team is identified.

      Identify Need
      Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

      Identify the Need for Your RFP

      • An RFP is issued to the market when you are certain that you intend to purchase a product/service and have identified an adequate vendor base from which to choose as a result of:

        • IT Strategy
        • Changes in technology
        • Marketplace assessment
        • Contract expiration/renewal
        • Changes in regulatory requirements
        • Changes in the business’ requirements
      • An RFI is issued to the market when you are uncertain as to available technologies or supplier capabilities and need budgetary costs for planning purposes.
      • Be sure to choose the right RFx tool for your situation!
      Stock photo of a pen circling the word 'needs' on a printed document.

      Phase 2

      Define Your RFP Requirements

      Steps

      2.1 Define and classify the technical, business, financial, legal, and support and security requirements for your business.

      Steps in an RFP Process with the second step, 'Define Business Requirements', highlighted.

      This phase involves the following participants:

      • IT
      • Legal
      • Finance
      • Risk management
      • Sourcing/Procurement
      • Business stakeholders

      Outcomes of this phase

      A detailed list of required business, technical, legal and procurement requirements classified as to absolute need(s), bargaining and concession need(s), and “nice to haves.”

      Define Business Requirements

      Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

      Define RFP Requirements

      Key things to consider when defining requirements

      • Must be inclusive of the needs of all stakeholders: business, technical, financial, and legal
      • Strive for clarity and completeness in each area of consideration.
      • Begin defining your “absolute,” “bargaining,” “concession,” and ‘”dropped/out of scope” requirements to streamline the evaluation process.
      • Keep the requirements identified as “absolute” to a minimum, because vendors that do not meet absolute requirements will be removed from consideration.
      • Do you have a standard contract that can be included or do you want to review the vendor’s contract?
      • Don’t forget Data Security!
      • Begin defining your vendor selection criteria.
      • What do you want the end result to look like?
      • How will you manage the selected vendor after the contract? Include key VM requirements.
      • Defining requirements can’t be rushed or you’ll find yourself answering many questions, which may create confusion.
      • Collect all your current spend and budget considerations regarding the needed product(s) and service(s).

      “Concentrate on the needs of the organization and not the wants of the individuals when creating requirements to avoid scope creep.” (Donna Glidden, ITRG Research Director)

      Leverage the “ABCD” approach found in our Prepare for Negotiations More Effectively blueprint:
      https://tymansgrpup.com/research/ss/prepare-for-negotiations-more-effectively

      2.1 Prioritize your requirements

      1 hr to several days

      Input: List of all requirements from IT and IT Security, Business, Sourcing/Procurement, Risk Management, and Legal

      Output: Prioritized list of RFP requirements approved by the stakeholder team

      Materials: The RFP Requirements Worksheet

      Participants: All stakeholders impacted by the RFP: IT, IT Security, the Business, Sourcing/ Procurement, Risk Management, Legal

      1. Use this tool to assist you and your team in documenting the requirements for your RFP. Leverage it to collect and categorize your requirements in preparation for negotiations. Use the results of this tool to populate the requirements section of your RFP.
      2. As a group, review each of the requirements and determine their priority as they will ultimately relate to the negotiations.
        • Prioritizing your requirements will set up your negotiation strategy and streamline the process.
        • By establishing the priority of each requirement upfront, you will save time and effort in the selection process.
      3. Review RFP requirements with stakeholders for approval.

      Download the RFP Requirements Worksheet

      Phase 3

      Gain Business Authorization

      Steps

      3.1 Obtain business authorization from the business, technology, finance and Sourcing/Procurement

      Steps in an RFP Process with the third step, 'Gain Business Authorization', highlighted.

      This phase involves the following participants:

      • Business stakeholders
      • Technology and finance (depending upon the business)
      • Sourcing/Procurement

      Outcomes of this phase

      Approval by all key stakeholders to proceed with the issuing of the RFP and to make a purchase as a result.

      Gain Business Authorization

      Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

      Gain Business Authorization

      Gain authorization for your RFP from all relevant stakeholders
      • Alignment of stakeholders
      • Agreement on final requirements
      • Financial authorization
      • Commitment of resources
      • Agreement on what constitutes vendor qualification
      • Finalization of selection criteria and their prioritization

      Obtaining cross-function alignment will clear the way for contract, SOW, and budget approvals and not waste any of your and your vendor’s resources in performing an RFP that your organization is not ready to implement or invest financial and human resources in.

      Stock photo of the word 'AUTHORIZED' stamped onto a white background with a much smaller stamp laying beside it.

      Phase 4

      Create and Issue

      Steps

      4.1 Build your RFP

      4.2 Decide RFI or not

      4.3 Create your RFP

      4.4 Receive & answer questions

      4.5 Perform Pre-Proposal Conference

      4.6 Evaluate responses

      Steps in an RFP Process with the fourth step, 'Perform RFI/RFP', highlighted.

      This phase involves the following participants:

      • The RFP owner
      • IT
      • Business SMEs/stakeholders

      Outcomes of this phase

      RFP package is issued to vendors and includes the date of the Pre-Proposal Conference, which should be held shortly after RFP release and includes all parties.

      SME’s/stakeholders participate in providing answers to RFP contact for response to vendors.

      Create and Issue Your RFP/RFI

      Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

      Six Steps to Perform RFI/RFP

      Step 1

      • Build your RFP with evaluation in mind.

      Step 2

      • RFI or no RFI
      • Consider a Lean RFP

      Step 3

      • Create your RFP
      • Establish your RFP dates
      • Decide on RFP template
        • Short
        • Long
        • Excel
      • Create a template for vendors’ response
      • Create your Pricing Template

      Step 4

      • Receive RFP questions from vendors
      • Review and prepare answers to questions for the Pre-Proposal Conference

      Step 5

      • Conduct a Pre-Proposal Conference

      Step 6

      • Receive vendors’ proposals
      • Review for compliance and completion
      • Team evaluates vendors’ proposals.
      • Prepare TCO
      • Draft executive recommendation report

      Build your RFP with evaluation in mind

      Easing evaluation frustrations

      At the beginning of your RFP creation process consider how your requirements will impact the vendor’s response. Concentrate on the instructions you provide the vendors and how you wish to receive their responses. View the RFP through the lens of the vendors and envision how they are going to respond to the proposal.

      Limiting the number of requirements included in the RFP will increase the evaluation team’s speed when reviewing vendors’ responses. This is accomplished by not asking questions for common features and functionality that all vendors provide. Don’t ask multiple questions within a question. Avoid “lifting” vendor-specific language to copy into the RFP as this will signal to vendors who their competition might be and may deter their participation. Concentrate your requirement questions to those areas that are unique to your solution to reduce the amount of time required to evaluate the vendors’ response.

      Things to Consider When Creating Your RFP:

      • Consistency is the foundation for ease of evaluation.
      • Provide templates, such as an Excel worksheet, for the vendor’s pricing submissions and for its responses to close-ended questions.
      • Give detailed instructions on how the vendor should organize their response.
      • Limit the number of open-ended questions requiring a long narrative response to must-have requirements.
      • Organize your requirements and objectives in a numerical outline and have the vendor respond in the same manner, such as the following:
        • 1
        • 1.1
        • 1.1.1

      Increase your response quality

      Inconsistent formatting of vendor responses prevents an apples-to-apples evaluation between vendor responses. Evaluation teams are frequently challenged and are unable to evaluate vendors’ responses equally against each other for the following reasons:

      Challenges
      • Vendor responses are submitted with different and confusing nomenclature
      • Inconsistent format in response
      • Disparate order of sections in the vendors responses
      • Different style of outlining their responses, e.g. 1.1 vs. I.(i)
      • Pricing proposal included throughout their response
      • Responses are comingled with marketing messages
      • Vendor answers to requirements or objectives are not consolidated in a uniform manner
      • Disparate descriptions for response subsections
      Prevention
      • Provide specific instructions as to how the vendor is to organize their response:
        • How to format and outline the response
        • No marketing material
        • No pricing in the body of the response
      • Provide templates for pricing, technical, operational, and legal aspects.

      Six Steps to Perform RFI/RFP

      Step 1

      • Build your RFP with evaluation in mind.

      Step 2

      • RFI or no RFI
      • Consider a Lean RFP

      Step 3

      • Create your RFP
      • Establish your RFP dates
      • Decide on RFP template
        • Short
        • Long
        • Excel
      • Create a template for vendors’ response
      • Create your Pricing Template

      Step 4

      • Receive RFP questions from vendors
      • Review and prepare answers to questions for the Pre-Proposal Conference

      Step 5

      • Conduct a Pre-Proposal Conference

      Step 6

      • Receive vendors’ proposals
      • Review for compliance and completion
      • Team evaluates vendors’ proposals.
      • Prepare TCO
      • Draft executive recommendation report

      Perform Request for Information

      Don’t underestimate the importance of the RFI

      As the name implies, a request for information (RFI) is a tool for collecting information from vendors about the companies, their products, and their services. We find RFIs useful when faced with a lot of vendors that we don’t know much about, when we want to benchmark the marketplace for products and services, including budgetary information, and when we have identified more potential vendors than we care to commit a full RFP to.

      RFIs are simpler and less time-consuming than RFPs to prepare and evaluate, so it can make a lot of sense to start with an RFI. Eliminating unqualified vendors from further consideration will save your team from weeding through RFP responses that do not meet your objectives. For their part, your vendors will appreciate your efforts to determine up-front which of them are the best bets before asking them to spend resources and money producing a costly proposal.

      While many organizations rarely use RFIs, they can be an effective tool in the vendor manager’s toolbox when used at the right time in the right way. RFIs can be deployed in competitive targeted negotiations.

      A Lean RFP is a two-stage strategy that speeds up the typical RFP process. The first stage is like an RFI on steroids, and the second stage is targeted competitive negotiation.

      Don’t rely solely on the internet to qualify vendors; use an RFI to acquire additional information before finalizing an RFP.

      4.2.1 In a hurry? Consider a Lean RFP instead of an RFP

      Several days
      1. Create an RFI with all of the normal and customary components. Next, add a few additional RFP-like requirements (e.g. operational, technical, and legal requirements). Make sure you include a request for budgetary pricing and provide any significant features and functionality requirements so that the vendors have enough information to propose solutions. In addition, allow the vendors to ask questions through your single point of coordination and share answers with all of the vendors. Finally, notify the vendors that you will not be doing an RFP.
      2. Review the vendors’ proposals and evaluate their proposals against your requirements along with their notional or budgetary pricing.
      3. Have the evaluators utilize the Lean RFP Template to record their scores accordingly.
      4. After collecting the scores from the evaluators, consolidate the scores together to discuss which vendors – we recommend two or three – you want to present demos.
      5. Based on the vendors’ demos, the team selects at least two vendors to negotiate contract and pricing terms with intent of selecting the best-value vendor.
      6. The Lean RFP shortens the typical RFP process, maintains leverage for your organization, and works great with low- to medium-spend items (however your organization defines them). You’ll get clarification on vendors’ competencies and capabilities, obtain a fair market price, and meet your internal clients’ aggressive timelines while still taking steps to protect your organization.

      Download the Lean RFP Template

      Download the RFP Evaluation Tool

      4.2.1 In a hurry? Consider a Lean RFP instead of an RFP continued

      Input

      • List of technical, operational, business, and legal requirements
      • Budgetary pricing ask

      Output

      • A Lean RFP document that includes the primary components of an RFP
      • Lean RFP vendors response evaluation

      Materials

      • Lean RFP Template
      • RFP Evaluation Tool
      • Contracting requirements
      • Pricing

      Participants

      • IT
      • Business
      • Finance
      • Sourcing/Procurement

      Case Study

      A Lean RFP saves time
      INDUSTRY: Pharmaceutical
      SOURCE: Guided Implementation
      Challenge
      • The vendor manager (VM) was experiencing pressure to shorten the expected five-month duration to perform an RFP for software that planned, coordinated, and submitted regulatory documents to the US Food and Drug Administration.
      • The VM team was not completely familiar with the qualified vendors and their solutions.
      • The organization wanted to capitalize on this opportunity to enhance its current processes with the intent of improving efficiencies in documentation submissions.
      Solution
      • Leveraging the Lean RFP process, the team reduced the 200+ RFP questionnaire into a more manageable list of 34 significant questions to evaluate vendor responses.
      • The team issued the Lean RFP and requested the vendors’ responses in three weeks instead of the five weeks planned for the RFP process.
      • The team modified the scoring process to utilize a simple weighted-scoring methodology, using a scale of 1-5.
      Results
      • The Lean RFP scaled back the complexity of a large RFP.
      • The customer received three vendor responses ranging from 19 to 43 pages and 60-80% shorter than expected if the RFP had been used. This allowed the team to reduce the evaluation period by three weeks.
      • The duration of the RFx process was reduced by more than two months – from five months to just under three months.

      Six Steps to Perform RFI/RFP

      Step 1

      • Build your RFP with evaluation in mind.

      Step 2

      • RFI or no RFI
      • Consider a Lean RFP

      Step 3

      • Create your RFP
      • Establish your RFP dates
      • Decide on RFP template
        • Short
        • Long
        • Excel
      • Create a template for vendors’ response
      • Create your Pricing Template

      Step 4

      • Receive RFP questions from vendors
      • Review and prepare answers to questions for the Pre-Proposal Conference

      Step 5

      • Conduct a Pre-Proposal Conference

      Step 6

      • Receive vendors’ proposals
      • Review for compliance and completion
      • Team evaluates vendors’ proposals.
      • Prepare TCO
      • Draft executive recommendation report

      4.3.1 RFP Calendar

      1 hour

      Input: List duration in days of key activities, RFP Calendar and Key Date Tool, For all vendor-inclusive meetings, include the dates on your RFP calendar and reference them in the RFP

      Output: A timeline to complete the RFP that has the support of each stakeholder involved in the process and that allows for a complete and thorough vendor response.

      Materials: RFP Calendar and Key Date Tool

      Participants: IT management, Business stakeholder(s), Legal (as required), Risk management (as required), Sourcing/Procurement, Vendor management

      1. As a group, identify the key activities to be accomplished and the amount of time estimated to complete each task:
        1. Identify who is ultimately accountable for the completion of each task
        2. Determine the length of time required to complete each task
      2. Use the RFP Calendar and Key Date Tool to build the calendar specific to your needs.
      3. Include vendor-related dates in the RFP, i.e., Pre-Proposal Conference, deadline for RFP questions as well as response.

      Download the RFP Calendar and Key Date Tool

      Draft your RFP

      Create and issue your RFP, which should contain at least the following:
      • The ability for the vendors to ask clarifying questions (in writing, sent to the predetermined RFP contact)
      • Pre-Proposal/Pre-Bid Conference schedule where vendors can receive the same answer to all clarifying written questions
      • A calendar of events (block the time on stakeholder calendars – see template).
      • Instructions to potential vendors on how they should construct and return their response to enable effective and timely evaluation of each offer.
      • Requirements; for example: Functional, Operational, Technical, and Legal.
      • Specification drawings as if applicable.
      • Consider adding vendor management requirements – how do you want to manage the relationship after the deal is done?
      • A pricing template for vendors to complete that facilitates comparison across multiple vendors.
      • Contract terms required by your legal team (or your standard contract for vendors to redline as part of their response and rated/ranked accordingly).
      • Create your RFP with the evaluation process and team in mind to ensure efficiency and timeliness in the process. Be clear, concise, and complete in the document.
      • Consistency and completeness is the foundation for ease of evaluation.
      • Give vendors detailed instruction on how to structure and organize their response.
      • Limit the number of open-ended questions requiring a long narrative response.
      • Be sure to leverage Info-Tech’s proven and field-tested Short-Form, Long-Form, and Lean RFP Templates provided in this blueprint.

      Create a template for the vendors’ response

      Dictating to the vendors the format of their response will increase your evaluation efficiency
      Narrative Response:

      Create either a Word or Excel document that provides the vendor with an easy vehicle for their response. This template should include the question identifier that ties the response back to the requirement in the RFP. Instruct vendors to include the question number on any ancillary materials they wish to include.

      Pricing Response:

      Create a separate Excel template that the vendors must use to provide their financial offer. This template should include pricing for hardware, software, training, implementation, and professional services, as well as placeholders for any additional fees.

      Always be flexible in accepting alternative proposals after the vendor has responded with the information you requested in the format you require.

      Stock image of a paper checklist in front of a laptop computer's screen.

      4.3.2 Vendor Pricing Tool

      1 hour

      Input: Identify pricing components for hardware, software, training, consulting/services, support, and additional licenses (if needed)

      Output: Vendor Pricing Tool

      Materials: RFP Requirements Worksheet, Pricing template

      Participants: IT, Finance, Business stakeholders, Sourcing/Procurement, Vendor management

      1. Using a good pricing template will prevent vendors from providing pricing offers that create a strategic advantage designed to prevent you from performing an apples-to-apples comparison.
      2. Provide specific instructions as to how the vendor is to organize their pricing response, which should be submitted separate from the RFP response.
      3. Configure and tailor pricing templates that are specific to the product and/or services.
      4. Upon receipt of all the vendor’s responses, simply cut and paste their total response to your base template for an easy side-by-side pricing comparison.
      5. Do not allow vendors to submit financial proposals outside of your template.

      Download the Vendor Pricing Tool

      Three RFP Templates

      Choose the right template for the right sourcing initiative

      • Short-Form
      • Use the Short-Form RFP Template for simple, non-complex solutions that are medium to low dollar amounts that do not require numerous requirements.

      • Long-Form
      • We recommend the Long-Form RFP Template for highly technical and complex solutions that are high dollar and have long implementation duration.

      • Excel-Form
      • Leverage the Excel-Form RFP Tool for requirements that are more specific in nature to evaluate a vendor’s capability for their solution. This template is designed to be complete and inclusive of the RFP process, e.g., requirements, vendor response, and vendor response evaluation scoring.

      Like tools in a carpenters’ tool box or truck, there is no right or wrong template for any job. Take into account your organization culture, resources available, time frame, policies, and procedures to pick the right tool for the job. (Steve Jeffery, Principal Research Director, Vendor Management, Co-Author: The Art of Creating a Quality RFP, Info-Tech Research Group)

      4.3.3 Short-Form RFP Template

      1-2 hours

      Input: List of technical, legal, business, and data security requirements

      Output: Full set of requirements, prioritized, that all participants agree to

      Materials: Short-Form RFP Template, Vendor Pricing Tool, Supporting exhibits

      Participants: IT management, Business stakeholder(s), Legal (as required), Risk management (as required), Sourcing/Procurement, Vendor management

      • This is a less complex RFP that has relatively basic requirements and perhaps a small window in which the vendors can respond. As with the long-form RFP, exhibits are placed at the end of the RFP, an arrangement that saves both your team and the vendors time. Of course, the short-form RFP contains less-specific instructions, guidelines, and rules for vendors’ proposal submissions.
      • We find that short-form RFPs are a good choice when you need to use something more than a request for quote (RFQ) but less than an RFP running 20 or more pages. It’s ideal, for example, when you want to send an RFP to only one vendor or to acquire items such as office supplies, contingent labor, or commodity items that don’t require significant vendor risk assessment.

      Download the Short-Form RFP Template

      4.3.4 Long-Form RFP Template

      1-3 hours

      Input: List of technical, legal, business, and data security requirements

      Output: Full set of requirements, prioritized, that all stakeholders agree to

      Materials: Long-Form RFP Template, Vendor Pricing Tool, Supporting exhibits

      Participants: IT management, Business stakeholder(s), Legal (as required), Risk management (as required), Sourcing/Procurement, Vendor management

      • A long-form or major RFP is an excellent tool for more complex and complicated requirements. This template is for a baseline RFP.
      • It starts with best-in-class RFP terms and conditions that are essential to maintaining your control throughout the RFP process. The specific requirements for the business, functional, technical, legal, and pricing areas should be included in the exhibits at the end of the template. That makes it easier to tailor the RFP for each deal, since you and your team can quickly identify specific areas that need modification. Grouping the exhibits together also makes it convenient for both your team to review and the vendors to respond.
      • You can use this sample RFP as the basis for your template RFP, taking it all as is or picking and choosing the sections that best meet the mission and objectives of the RFP and your organization.

      Download the Long-Form RFP Template

      4.3.5 Excel-Form RFP Tool

      Several weeks

      Input: List of technical, legal, business, and data security requirements

      Output: Full set of requirements, prioritized, that all stakeholders agree to

      Materials: Excel-Form RFP Template, Vendor Pricing Tool, Supporting exhibits

      Participants: IT management, Business stakeholder(s), Legal (as required), Risk management (as required), Sourcing/Procurement, Vendor management

      • The Excel-Form RFP Tool is used as an alternative to the other RFP toolsets if you have multiple requirements and have multiple vendors to choose from.
      • Requirements are written as a “statement” and the vendor can select from five answers as to their ability to meet the requirements, with the ability to provide additional context and materials to augment their answers, as needed.
      • Requirements are listed separately in each tab, for example, Business, Legal, Technical, Security, Support, Professional Services, etc.

      Download the Excel-Form RFP Template

      Six Steps to Perform RFI/RFP

      Step 1

      • Build your RFP with evaluation in mind.

      Step 2

      • RFI or no RFI
      • Consider a Lean RFP

      Step 3

      • Create your RFP
      • Establish your RFP dates
      • Decide on RFP template
        • Short
        • Long
        • Excel
      • Create a template for vendors’ response
      • Create your Pricing Template

      Step 4

      • Receive RFP questions from vendors
      • Review and prepare answers to questions for the Pre-Proposal Conference

      Step 5

      • Conduct a Pre-Proposal Conference

      Step 6

      • Receive vendors’ proposals
      • Review for compliance and completion
      • Team evaluates vendors’ proposals.
      • Prepare TCO
      • Draft executive recommendation report

      Answer Vendor Questions

      Maintaining your equal and level playing field among vendors

      • Provide an adequate amount of time from the RFP issue date to the deadline for vendor questions. There may be multiple vendor staff/departments that need to read the RFP and then discuss their response approach and gather any clarifying questions, so we generally recommend three to five business days.
      • There should be one point of contact for all Q&A, which should be submitted in writing via email only. Be sure to plan for enough time to get the answers back from the RFP stakeholders.
      • After the deadline, collect all Q&A and begin the process of consolidating into one document.
      Large silver question mark.
      • Be sure to anonymize both vendor questions and your responses, so as not to reveal who asked or answered the question.
      • Send the document to all RFP respondents via your sourcing tool or BCC in an email to the point of contact, with read receipt requested. That way, you can track who has received and opened the correspondence.
      • Provide the answers a few days prior to the Pre-Proposal Conference to allow all respondents time to review the document and prepare any additional questions.
      • Begin the preparation for the Pre-Proposal Conference.

      Six Steps to Perform RFI/RFP

      Step 1

      • Build your RFP with evaluation in mind.

      Step 2

      • RFI or no RFI
      • Consider a Lean RFP

      Step 3

      • Create your RFP
      • Establish your RFP dates
      • Decide on RFP template
        • Short
        • Long
        • Excel
      • Create a template for vendors’ response
      • Create your Pricing Template

      Step 4

      • Receive RFP questions from vendors
      • Review and prepare answers to questions for the Pre-Proposal Conference

      Step 5

      • Conduct a Pre-Proposal Conference

      Step 6

      • Receive vendors’ proposals
      • Review for compliance and completion
      • Team evaluates vendors’ proposals.
      • Prepare TCO
      • Draft executive recommendation report

      Conduct Pre-Proposal Conference

      Maintain an equal and level playing field

      • Consolidate all Q&A to be presented to all vendors during the Pre-Proposal Conference.
      • If the Pre-Proposal Conference is conducted via conference call, be sure to record the session and advise all participants at the beginning of the call.
      • Be sure to have key stakeholders present on the call to answer questions.
      • Read each question and answer, after which ask if there are any follow up questions. Be sure to capture them and then add them to the Q&A document.
      • Remind respondents that no further questions will be entertained during the remainder of the RFP response period.
      • Send the updated and completed document to all vendors (even if circumstances prevented their attending the Pre-Proposal Conference). Use the same process as when you sent out the initial answers: via email, blind copy the respondents and request read/receipt.

      “Using a Pre-Proposal Conference allows you to reinforce that there is a level playing field for all of the vendors…that each vendor has an equal chance to earn your business. This encourages and maximizes competition, and when that happens, the customer wins.” (Phil Bode, Principal Research Director, Co-Author: The Art of Creating a Quality RFP, Info-Tech Research Group)

      Pre-Proposal Conference Agenda

      Modify this agenda for your specific organization’s culture
      1. Opening Remarks & Welcome – RFP Manager
        1. Agenda review
        2. Purpose of the Pre-Proposal Conference
      2. Review Agenda
        1. Introduction of your (customer) attendees
      3. Participating Vendor Introduction (company name)
      4. Executive or Sr. Leadership Comments (limit to five minutes)
        1. Importance of the RFP
        2. High-level business objective or definition of success
      5. Review Key Dates in the RFP

      (Source: The Art of Creating a Quality RFP, Jeffery et al., 2019)
      1. Review of any Technical Drawings or Information
        1. Key technical requirements and constraints
        2. Key infrastructure requirements and constraints
      2. Review of any complex RFP Issues
        1. Project scope/out of scope
      3. Question &Answer
        1. Vendors’ questions in alphabetical order
      4. Review of Any Specific Instructions for the Respondents
      5. Conclusion/Closing
        1. Review how to submit additional questions
        2. Remind vendors of the single point of contact

      Allow your executive or leadership sponsor to leave the Pre-Proposal Conference after they provide their comments to allow them to continue their day while demonstrating to the vendors the importance of the project.

      Six Steps to Perform RFI/RFP

      Step 1

      • Build your RFP with evaluation in mind.

      Step 2

      • RFI or no RFI
      • Consider a Lean RFP

      Step 3

      • Create your RFP
      • Establish your RFP dates
      • Decide on RFP template
        • Short
        • Long
        • Excel
      • Create a template for vendors’ response
      • Create your Pricing Template

      Step 4

      • Receive RFP questions from vendors
      • Review and prepare answers to questions for the Pre-Proposal Conference

      Step 5

      • Conduct a Pre-Proposal Conference

      Step 6

      • Receive vendors’ proposals
      • Review for compliance and completion
      • Team evaluates vendors’ proposals.
      • Prepare TCO
      • Draft executive recommendation report

      Evaluate Responses

      Other important information

      • Consider separating the pricing component from the RFP responses before sending them to reviewers to maintain objectivity until after you have received all ratings on the proposals themselves.
      • Each reviewer should set aside focused time to carefully read each vendor’s response
      • Read the entire vendor proposal – they spent a lot time and money responding to your request, so please read everything.
      • Remind reviewers that they should route any questions to the vendor through the RFP manager.
      • Using the predetermined ranking system for each section, rate each section of the response, capturing any notes, questions, or concerns as you proceed through the document(s).
      Stock photo of a 'Rating' meter with values 'Very Bad to 'Excellent'.

      Use a proven evaluation method

      Two proven methods to reviewing vendors’ proposals are by response and by objective

      The first, by response, is when the evaluator reviews each vendor’s response in its entirety.

      The second, reviewing by objective, is when the evaluator reviews each vendor’s response to a single objective before moving on to the next.

      By Response

      Two-way arrow with '+ Pros' in green on the left and 'Cons -' in red on the right.

      By Objective

      Two-way arrow with '+ Pros' in green on the left and 'Cons -' in red on the right.

      • Each response is thoroughly read all the way through.
      • Response inconsistencies are easily noticed.
      • Evaluators obtain a good feel for the vendor's response.
      • Evaluators will lose interest as they move from one response to another.
      • Evaluation will be biased if the beginning of response is subpar, influencing the rest of the evaluation.
      • Deficiencies of the perceived favorite vendor are overlooked.
      • Evaluators concentrate on how each objective is addressed.
      • Evaluators better understand the responses, resulting in identifying the best response for the objective.
      • Evaluators are less susceptible to supplier bias.
      • Electronic format of the response hampers response review per objective.
      • If a hard copy is necessary, converting electronic responses to hard copy is costly and cumbersome.
      • Discipline is required to score each vendor's response as they go.

      Maintain evaluation objectivity by reducing response evaluation biases

      Evaluation teams can be naturally biased during their review of the vendors’ responses.

      You cannot eliminate bias completely – the best you can do is manage it by identifying these biases with the team and mitigating their influence in the evaluation process.

      Vendor

      The evaluator only trusts a certain vendor and is uncomfortable with any other vendor.
      • Evaluate the responses blind of vendor names, if possible.
      Centerpiece for this table, titled 'BIAS' and surrounding by iconized representations of the four types listed.

      Account Representatives

      Relationships extend beyond business, and an evaluator doesn't want to jeopardize them.
      • Craft RFP objectives that are vendor neutral.

      Technical

      A vendor is the only technical solution the evaluator is looking for, and they will not consider anything else.
      • Conduct fair and open solution demonstrations.

      Price

      As humans, we can justify anything at a good price.
      • Evaluate proposals without awareness of price.

      Additional insights when evaluating RFPs

      When your evaluation team includes a member of the C-suite or senior leadership, ensure you give them extra time to sufficiently review the vendor's responses. When your questions require a definitive “Yes”/“True” or “No”/“False” responses, we recommend giving the maximum score for “Yes”/“True” and the minimum score for “No”/“False”.
      Increase your efficiency and speed of evaluation by evaluating the mandatory requirements first. If a vendor's response doesn't meet the minimum requirements, save time by not reviewing the remainder of the response. Group your RFP questions with a high-level qualifying question, then the supporting detailed requirements. The evaluation team can save time by not evaluating a response that does not meet a high-level qualifying requirement.

      Establish your evaluation scoring scale

      Define your ranking scale to ensure consistency in ratings

      Within each section of your RFP are objectives, each of which should be given its own score. Our recommended approach is to award on a scale of 0 to 5. With such a scale, you need to define every level. Below are the recommended definitions for a 0 to 5 scoring scale.

      Score Criteria for Rating
      5 Outstanding – Complete understanding of current and future needs; solution addresses current and future needs
      4 Competent – Complete understanding and adequate solution
      3 Average – Average understanding and adequate solution
      2 Questionable – Average understanding; proposal questionable
      1 Poor – Minimal understanding
      0 Not acceptable – Lacks understanding
      Stock photo of judges holding up their ratings.

      Weigh the sections of your RFP on how important or critical they are to the RFP

      Obtain Alignment on Weighting the Scores of Each Section
      • There are many ways to score responses, ranging from extremely simple to highly complicated. The most important thing is that everyone responsible for completing scorecards is in total agreement about how the scoring system should work. Otherwise, the scorecards will lose their value, since different weighting and scoring templates were used to arrive at their scores.
      • You can start by weighting the scores by section, with all sections adding up to 100%.
      Example RFP Section Weights
      Pie chart of example RFP section weights, 'Operational, 20%', 'Service-Level Agreements, 20%', 'Financial, 20%', 'Legal/Contractual, 15%', 'Technical, 10%' 'Functional, 15%'.
      (Source: The Art of Creating a Quality RFP, Jeffery et al., 2019)

      Protect your negotiation leverage with these best practices

      Protect your organization's reputation within the vendor community with a fair and balanced process.
      • Unless you regularly have the evaluators on your evaluation team, always assume that the team members are not familiar nor experienced with your process and procedures.
      • Do not underestimate the amount of preparations required to ensure that your evaluation team has everything they need to evaluate vendors’ responses without bias.
      • Be very specific about the expectations and time commitment required for the evaluation team to evaluate the responses.
      • Explain to the team members the importance of evaluating responses without conflicts of interest, including the fact that information contained within the responses and all discussions within the team are considered company owned and confidential.
      • Include examples of the evaluation and scoring processes to help the evaluators understand what they should be doing.
      • Finally – don’t forget to the thank the evaluation team and their managers for their time and commitment in contributing to this essential decision.
      Stock photo of a cork board with 'best practice' spelled out by tacked bits of paper, each with a letter in a different font.

      Evaluation teams must balance commercial vs. technical requirements

      Do not alter the evaluation weights after responses are submitted.
      • Evaluation teams are always challenged by weighing the importance of price, budget, and value against the technical requirements of “must-haves” and super cool “nice-to-haves.”
      • Encouraging the evaluation team not to inadvertently convert the nice-to-haves to must-haves will prevent scope creep and budget pressure. The evaluation team must concentrate on the vendors’ responses that drive the best value when balancing both commercial and technical requirements.
      Two blocks labelled 'Commercial Requirements' and 'Technical Requirements' balancing on either end of a flat sheet, which is balancing on a silver ball.

      4.6.1 Evaluation Guidebook

      1 hour

      Input: RFP responses, Weighted Scoring Matrix, Vendor Response Scorecard

      Output: One or two finalists for which negotiations will proceed

      Materials: RFP Evaluation Guidebook

      Participants: IT, Finance, Business stakeholders, Sourcing/Procurement, Vendor management

      1. Info-Tech provides an excellent resource for your evaluation team to better understand the process of evaluating vendor response. The guidebook is designed to be configured to the specifics of your RFP, with guidance and instructions to the team.
      2. Use this guidebook to provide instruction to the evaluation team as to how best to score and rate the RFP responses.
      3. Specific definitions are provided for applying the numerical scores to the RFP objectives will ensure consistency among the appropriate numerical score.

      Download the RFP Evaluation Guidebook

      4.6.2 RFP Vendor Proposal Scoring Tool

      1-4 hours

      Input: Each vendor’s RFP response, A copy of the RFP (less pricing), A list of the weighted criteria incorporated into a vendor response scorecard

      Output: A consolidated ranked and weighted comparison of the vendor responses with pricing

      Materials: Vendor responses, RFP Evaluation Tool

      Participants: Sourcing/Procurement, Vendor management

      1. Using the RFP outline as a base, develop a scorecard to evaluate and rate each section of the vendor response, based on the criteria predetermined by the team.
      2. Provide each stakeholder with the scorecard when you provide the vendor responses for them to review and provide the team with adequate time to review each response thoroughly and completely.
      3. Do not, at this stage, provide the pricing. Allow stakeholders to review the responses based on the technical, business, operational criteria without prejudice as to pricing.
      4. Evaluators should always be reminded that they are evaluating each vendor’s response against the objectives and requirements of the RFP. The evaluators should not be evaluating each vendor’s response against one another.
      5. While the team is reviewing and scoring responses, review and consolidate the vendor pricing submissions into one document for a side-by-side comparison.

      Download the RFP Evaluation Tool

      4.6.3 Total Cost of Owners (TCO)

      1-2 hours

      Input: Consolidated vendor pricing responses, Consolidated vendor RFP responses, Current spend within your organization for the product/service, if available, Budget

      Output: A completed TCO model summarizing the financial results of the RFP showing the anticipated costs over the term of the agreement, taking into consideration the impact of renewals.

      Materials: Vendor TCO Tool, Vendor pricing responses

      Participants: IT, Finance, Business stakeholders, Sourcing/Procurement

      • Use Info-Tech’s Vendor TCO Tool to normalize each vendor’s pricing proposal and account for the lifetime cost of the product.
      • Fill in pricing information (the total of all annual costs) from each vendor's returned Pricing Proposal.
      • The tool will summarize the net present value of the TCO for each vendor proposal.
      • The tool will also provide the rank of each pricing proposal.

      Download the Vendor TCO Tool

      Conduct an evaluation team results meeting

      Follow the checklist below to ensure an effective evaluation results meeting

      • Schedule the evaluation team’s review meeting well in advance to ensure there are no scheduling conflicts.
      • Collect the evaluation team’s scores in advance.
      • Collate scores and provide an initial ranking.
      • Do not reveal the pricing evaluation results until after initial discussions and review of the scoring results.
      • Examine both high and low scores to understand why the team members scored the response as they did.
      • Allow the team to discuss, debate, and arrive at consensus on the ranking.
      • After consensus, reveal the pricing to examine if or how it changes the ranking.
      • Align the team on the next steps with the applicable vendors.

      4.6.4 Consolidated RFP Response Scoring

      1-2 hours

      Input: Vendor Response Scorecard from each stakeholder, Consolidated RFP responses and pricing, Any follow up questions or items requiring further vendor clarification.

      Output: An RFP Response Evaluation Summary that identifies the finalists based on pre-determined criteria.

      Materials: RFP Evaluation Tool from each stakeholder, Consolidated RFP responses and pricing.

      Participants: IT, Finance, Business stakeholders, Sourcing/Procurement, Vendor management

      1. Collect from the evaluation team all scorecards and any associated questions requiring further clarification from the vendor(s). Consolidate the scorecards into one for presentation to the team and key decision makers.
      2. Present the final scores to the team, with the pricing evaluation, to determine, based on your needs, two or three finalists that will move forward to the next steps of negotiations.
      3. Discuss any scores that are have large gaps, e.g., a requirement with a score of one from one evaluator and the same requirement with a score five from different evaluator.
      4. Arrive at a consensus of your top one or two potential vendors.
      5. Determine any required follow-up actions with the vendors and include them in the Evaluation Summary.

      Download the Consolidated Vender RFP Response Evaluation Summary

      4.6.5 Vendor Recommendation Presentation

      1-3 hours
      1. Use the Vendor Recommendation Presentation to present your finalist and obtain final approval to negotiate and execute any agreements.
      2. The Vendor Recommendation Presentation provides leadership with:
        1. An overview of the RFP, its primary goals, and key requirements
        2. A summary of the vendors invited to participate and why
        3. A summary of each component of the RFP
        4. A side-by-side comparison of key vendor responses to each of the key/primary requirements, with ranking/weighting results
        5. A summary of the vendor’s responses to key legal terms
        6. A consolidated summary of the vendors’ pricing, augmented by the TCO calculations for the finalist(s).
        7. The RFP team’s vendor recommendations based on its findings
        8. A summary of next steps with dates
        9. Request approval to proceed to next steps of negotiations with the primary and secondary vendor

      Download the Vendor Recommendation Presentation

      4.6.5 Vendor Recommendation Presentation

      Input

      • Consolidated RFP responses, with a focus on key RFP goals
      • Consolidated pricing responses
      • TCO Model completed, approved by Finance, stakeholders

      Output

      • Presentation deck summarizing the key findings of the RFP results, cost estimates and TCO and the recommendation for approval to move to contract negotiations with the finalists

      Materials

      • Consolidated RFP responses, including legal requirements
      • Consolidated pricing
      • TCO Model
      • Evaluators scoring results

      Participants

      • IT
      • Finance
      • Business stakeholders
      • Legal
      • Sourcing/Procurement

      Caution: Configure templates and tools to align with RFP objectives

      Templates and tools are invaluable assets to any RFP process

      • Leveraging templates and tools saves time and provides consistency to your vendors.
      • Maintain a common repository of your templates and tools with different versions and variations. Include a few sentences with instructions on how to use the template and tools for team members who might not be familiar with them.

      Templates/Tools

      RFP templates and tools are found in a variety of places, such as previous projects, your favorite search engine, or by asking a colleague.

      Sourcing

      Regardless of the source of these documents, you must take great care and consideration to sanitize any reference to another vendor, company, or name of the deal.

      Review

      Then you must carefully examine the components of the deal before creating your final documents.

      Popular RFP templates include:

      • RFP documents
      • Pricing templates
      • Evaluation and scoring templates
      • RFP requirements
      • Info-Tech research

      Phase 5

      Negotiate Agreement(s)

      Steps

      5.1 Perform negotiation process

      Steps in an RFP Process with the fifth step, 'Negotiate Agreement', highlighted.

      This phase involves the following participants:

      • Procurement
      • Vendor management
      • Legal
      • IT stakeholders
      • Finance

      Outcomes of this phase

      A negotiated agreement or agreements that are a result of competitive negotiations.

      Negotiate Agreement(s)

      Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

      Negotiate Agreement

      You should evaluate your RFP responses first to see if they are complete and the vendor followed your instructions.


      Then you should:

      • Plan negotiation(s) with one or more vendors based on your questions and opportunities identified during evaluation.
      • Select finalist(s).
      • Apply selection criteria.
      • Resolve vendors’ exceptions.

      Info-Tech Insight

      Be certain to include any commitments made in the RFP, presentations, and proposals in the agreement – dovetails to underperforming vendor.

      Centerpiece of the table, titled 'Negotiation Process'.

      Leverage Info-Tech's negotiation process research for additional information

      Negotiate before you select your vendor:
      • Negotiating with two or more vendors will maintain your competitive leverage while decreasing the time it takes to negotiate the deal.
      • Perform legal reviews as necessary.
      • Use sound competitive negotiations principles.

      Info-Tech Insight

      Providing contract terms in an RFP can dramatically reduce time for this step by understanding the vendor’s initial contractual position for negotiation.

      Phase 6

      Purchase Goods and Services

      Steps

      6.1 Purchase Goods & Services

      Steps in an RFP Process with the sixth step, 'Purchase Goods and Services', highlighted.

      This phase involves the following participants:

      • Procurement
      • Vendor management
      • IT stakeholders

      Outcomes of this phase

      A purchase order that completes the RFP process.

      The beginning of the vendor management process.

      Purchase Goods and Services

      Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

      Purchase Goods and Services

      Prepare to purchase goods and services

      Prepare to purchase goods and services by completing all items on your organization’s onboarding checklist.
      • Have the vendor complete applicable tax forms.
      • Set up the vendor in accounts payable for electronic payment (ACH) set-up.
      Then transact day-to-day business:
      • Provide purchasing forecasts.
      • Complete applicable purchase requisition and purchase orders. Be sure to reference the agreement in the PO.
      Stock image of a computer monitor with a full grocery cart shown on the screen.

      Info-Tech Insight

      As a customer, honoring your contractual obligations and commitments will ensure that your organization is not only well respected but considered a customer of choice.

      Phase 7

      Assess and Measure Performance

      Steps

      7.1 Assess and measure performance against the agreement

      Steps in an RFP Process with the seventh step, 'Assess and Measure Performance', highlighted.

      This phase involves the following participants:

      • Vendor management
      • Business stakeholders
      • Senior leadership (as needed)
      • IT stakeholders
      • Vendor representatives & senior management

      Outcomes of this phase

      A list of what went well during the period – it’s important to recognize successes

      A list of areas needing improvement that includes:

      • A timeline for each item to be completed
      • The team member(s) responsible

      Purchase Goods and Services

      Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7

      Assess and Measure Performance

      Measure to manage: the job doesn’t end when the contract is signed.

      • Classify vendor
      • Assess vendor performance
      • Manage improvement
      • Conduct periodic vendor performance reviews or quarterly business reviews
      • Ensure contract compliance for both the vendor and your organization
      • Build knowledgebase for future
      • Re-evaluate and improve appropriately your RFP processes

      Info-Tech Insight

      To be an objective vendor manager, you should also assess and measure your company’s performance along with the vendor’s performance.

      Summary of Accomplishment

      Problem Solved

      Upon completion of this blueprint, guided implementation, or workshop, your team should have a comprehensive, well-defined end-to-end approach to performing a quality sourcing event. Leverage Info-Tech’s industry-proven tools and templates to provide your organization with an effective approach to maintain your negotiation leverage, improve the ease with which you evaluate vendor proposals, and reduce your risk while obtaining the best market value for your goods and services.

      Additionally, your team will have a foundation to execute your vendor management principles. These principles will assist your organization in ensuring you receive the perceived value from the vendor as a result of your competitive negotiations.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Final Thoughts: RFP Do’s and Don’ts

      DO

      • Leverage your team’s knowledge
      • Document and explain your RFP process to stakeholders and vendors
      • Include contract terms in your RFP
      • Consider vendor management requirements up front
      • Plan to measure and manage performance after contract award leveraging RFP objectives
      • Seek feedback from the RFP team for process improvements

      DON'T

      • Reveal your budget
      • Do an RFP in a vacuum
      • Send an RFP to a vendor your team is not willing to award the business to
      • Hold separate conversations with candidate vendors during your RFP process
      • Skimp on the requirements definition to speed the process
      • Tell the vendor they are selected before negotiating

      Bibliography

      “2022 RFP Response Trends & Benchmarks.” Loopio, 2022. Web.

      Corrigan, Tony. “How Much Does it Cost to Respond to an RFP?” LinkedIn, March 2017. Accessed 10 Dec. 2019

      “Death by RFP:7 Reasons Not to Respond.” Inc. Magazine, 2013. Web.

      Jeffery, Steven, George Bordon, and Phil Bode. The Art of Creating a Quality RFP, 3rd ed. Info-Tech Research Group, 2019.

      “RFP Benchmarks: How Much Time and Staff Firms Devote to Proposals.” MarketingProfs, 2020. Web.

      “State of the RFP 2019.” Bonfire, 2019. Web.

      “What Vendors Want (in RFPs).” Vendorful, 2020. Web.

      Related Info-Tech Research

      Stock photo of two people looking at a tablet. Prepare for Negotiations More Effectively
      • Negotiations are about allocating risk and money – how much risk is a party willing to accept at what price point?
      • Using a cross-functional/cross-insight team structure for negotiation preparation yields better results.
      • Soft skills aren’t enough and theatrical negotiation tactics aren’t effective.
      Stock photo of two people in suits shaking hands. Understand Common IT Contract Provisions to Negotiate More Effectively
      • Focus on the terms and conditions, not just the price. Too often, organizations focus on the price contained within their contracts, neglecting to address core terms and conditions that can end up costing multiples of the initial price.
      • Lawyers can’t ensure you get the best business deal. Lawyers tend to look at general terms and conditions for legal risk and may not understand IT-specific components and business needs.
      Stock photo of three people gathered around a computer. Jump Start Your Vendor Management Initiative
      • Vendor management must be an IT strategy. Solid vendor management is an imperative – IT organizations must develop capabilities to ensure that services are delivered by vendors according to service-level objectives and that risks are mitigated according to the organization's risk tolerance.
      • Visibility into your IT vendor community. Understand how much you spend with each vendor and rank their criticality and risk to focus on the vendors you should be concentrating on for innovative solutions.

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      • Buy Link or Shortcode: {j2store}563|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Organizations are unaware of the capabilities of web analytics tools and unsure how to leverage these new technologies to enhance their web experience.
      • Traditional solutions offer only information and data about the activity on the website. It is difficult for organizations to understand the customer motivations and behavioral patterns using the data.
      • In addition, there is an overwhelming number of vendors offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.

      Our Advice

      Critical Insight

      • Understanding organizational goals and business objectives is essential in effectively leveraging web analytics.
      • It is easy to get lost in a sea of expensive web analytical tools. Choosing tools that align with the business objectives will keep the costs of customer acquisition and retention to a minimum.
      • Beyond selection and implementation, leveraging web analytic tools requires commitment from the organization to continuously monitor key KPIs to ensure good customer web experience.

      Impact and Result

      • Understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help understand user behavior.
      • Discover top vendors in the market space and some of the top-level features they offer.
      • Understand how to use the metrics to gather critical insights about the website’s use and key initiatives for successful implementation.

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Research & Tools

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard – A deck outlining the importance of web analytic tools and how they can be leveraged to meet your business needs.

      This research offers insight into web analytic tools, key trends in the market space, and an introduction to advanced web analytics techniques. Follow our five-step initiative to successfully select and implement web analytics tools and identify which baseline metrics to measure and continuously monitor for best results.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard
      [infographic]

      Further reading

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      Web analytics tools are the gateway to understanding customer behavior.

      EXECUTIVE BRIEF

      Analyst Perspective

      In today’s world, users want to consume concise content and information quickly. Websites have a limited time to prove their usefulness to a new user. Content needs to be as few clicks away from the user as possible. Analyzing user behavior using advanced analytics techniques can help website designers better understand their audience.

      Organizations need to implement sophisticated analytics tools to track user data from their website. However, simply extracting data is not enough to understand the user motivation. A successful implementation of a web analytics tool will comprise both understanding what a customer does on the website and why the customer does what they do.

      This research will introduce some fundamental and advanced analytics tools and provide insight into some of the vendors in the market space.

      Photo of Sai Krishna Rajaramagopalan, Research Specialist, Applications − Enterprise Applications, Info-Tech Research Group. Sai Krishna Rajaramagopalan
      Research Specialist, Applications − Enterprise Applications
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Web analytics solutions have emerged as applications that provide extensive information and data about users visiting your webpage. However, many organizations are unaware of the capabilities of these tools and unsure how to leverage these new technologies to enhance user experience.
      Common Obstacles
      • Traditional solutions offer information and data about customers’ activity on the website but no insight into their motivations and behavioral patterns.
      • In addition, an overwhelming number of vendors are offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.
      Info-Tech’s Approach
      • This research is aimed to help you understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help you understand user behavior. Discover top vendors in the market space and some of the high-level features offered.
      • This research also explains techniques and metrics to gather critical insights about your website’s use and will aid in understanding users’ motivations and patterns and better predict their behavior on the website.

      Info-Tech Insight

      It is easy to get lost in a sea of expensive web analytics tools. Choose tools that align with your business objectives to keep the costs of customer acquisition and retention to a minimum.

      Ensure the success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      Web Analytics Introduction

      Understand traditional and advanced tools and their capabilities.

      Understanding web analytics

      • Web analytics is the branch of analytics that deals with the collection, reporting, and analysis of data generated by users visiting and interacting with a website.
      • The purpose of web analytics is to measure user behavior, optimize the website’s user experience and flow, and gain insights that help meet business objectives like increasing conversions and sales.
      • Web analytics allows you to see how your website is performing and how people are acting while on your website. What’s important is what you can do with this knowledge.
      • Data collected through web analytics may include traffic sources, referring sites, page views, paths taken, and conversion rates. The compiled data often forms a part of customer relationship management analytics to facilitate and streamline better business decisions.
      • Having strong web analytics is important in understanding customer behavior and fine-tuning marketing and product development approaches accordingly.
      Example of a web analytics dashboard.

      Why you should leverage web analytics

      Leveraging web analytics allows organizations to better understand their customers and achieve their business goals.

      The global web analytics market size is projected to reach US$5,156.3 million by 2026, from US$2,564 million in 2019, at a CAGR of 10.4% during 2021-2026. (Source: 360 Research Reports, 2021) Of the top 1 million websites with the highest traffic, there are over 3 million analytics technologies used. Google Analytics has the highest market share, with 50.3%. (Source: “Top 1 Million Sites,” BuiltWith, 2022)
      Of the 200 million active websites, 57.3% employ some form of web analytics tool. This trend is expected to grow as more sophisticated tools are readily available at a cheaper cost. (Source: “On the Entire Internet,” BuiltWith, 2022; Siteefy, 2022) A three-month study by Contentsquare showed a 6.9% increase in traffic, 11.8% increase in page views, 12.4% increase in transactions, and 3.6% increase in conversion rates through leveraging web analytics. (Source: Mordor Intelligence, 2022)

      Case Study

      Logo for Ryanair.
      INDUSTRY
      Aviation
      SOURCE
      AT Internet
      Web analytics

      Ryanair is a low-fare airline in Europe that receives nearly all of its bookings via its website. Unhappy with its current web analytics platform, which was difficult to understand and use, Ryanair was looking for a solution that could adapt to its requirements and provide continuous support and long-term collaboration.

      Ryanair chose AT Internet for its intuitive user interface that could effectively and easily manage all the online activity. AT was the ideal partner to work closely with the airline to strengthen strategic decision making over the long term, increase conversions in an increasingly competitive market, and increase transactions on the website.

      Results

      By using AT Internet Web Analytics to improve email campaigns and understand the behavior of website visitors, Ryanair was able to triple click-through rates, increase visitor traffic by 16%, and decrease bounce rate by 18%.

      Arrows denoting increases or decreases in certain metrics: '3x increase in click-through rates', '16% increase in visitor traffic', '18% decrease in bounce rate'.

      Use traditional web analytics tools to understand your consumer

      What does the customer do?
      • Traditional web analytics allows organizations to understand what is happening on their website and what customers are doing. These tools deliver hard data to measure the performance of a website. Some of the data measured through traditional web analytics are:
      • Visit count: The number of visits received by a webpage.
      • Bounce rate: The percentage of visitors that leave the website after only viewing the first page compared to total visitors.
      • Referrer: The previous website that sent the user traffic to a specific website.
      • CTA clicks: The number of times a user clicks on a call to action (CTA) button.
      • Conversion rate: Proportion of users that reach the final outcome of the website.
      Example of a traditional web analytics dashboard.

      Use advanced web analytics techniques to understand your consumer

      Why does the customer do what they do?
      • Traditional web analytic tools fail to explain the motivation of users. Advanced analytic techniques help organizations understand user behavior and measure user satisfaction. The techniques help answer questions like: Why did a user come to a webpage? Why did they leave? Did they find what they were looking for? Some of the advanced tools include:
      • Heatmapping: A visual representation of where the users click, scroll, and move on a webpage.
      • Recordings: A recording of the mouse movement and clicks for the entire duration of a user’s visit.
      • Feedback forms and surveys: Voice of the customer tools allowing users to give direct feedback about websites.
      • Funnel exploration: The ability to visualize the steps users take to complete tasks on your site or app.
      Example of an advanced web analytics dashboard.

      Apply industry-leading techniques to leverage web analytics

      Heatmapping
      • Heatmaps are used to visualize where users move their mouse, click, and scroll in a webpage.
      • Website heatmaps use a warm-to-cold color scheme to indicate user activity, with the warmest color indicating the highest visitor engagement and the coolest indicating the lowest visitor engagement.
      • Organizations can use this tool to evaluate the elements of the website that attract users and identify which sections require improvement to increase user engagement.
      • Website designers can make changes and compare the difference in user interaction to measure the effectiveness of the changes.
      • Scrollmaps help designers understand what the most popular scroll-depth of your webpage is – and that’s usually a prime spot for an important call to action.
      Example of a website with heatmapping overlaid.
      (Source: An example of a heatmap layered with a scrollmap from Crazy Egg, 2020)

      Apply industry-leading techniques to leverage web analytics

      Funneling

      • Funnels are graphical representations of a customer’s journey while navigating through the website.
      • Funnels help organizations identify which webpage users land on and where users drop off.
      • Organizations can capture every user step to find the unique challenges between entry and completion. Identifying what friction stands between browsing product grids and completing a transaction allows web designers to then eliminate it.
      • Designers can use A/B testing to experiment with different design philosophies to compare conversion statistics.
      • Funneling can be expanded to cross-channel analytics by incorporating referral data, cookies, and social media analytics.
      Example of a bar chart created through funneling.

      Apply industry-leading techniques to leverage web analytics

      Session recordings

      • Session recordings are playbacks of users’ interaction with the website on a single session. User interaction can vary between mouse clicks, keyboard input, and mouse scroll.
      • Recordings help organizations understand user motivation and help identify why users undertake certain tasks or actions on the webpage.
      • Playbacks can also be used to see if users are confused anywhere between the landing page and final transaction phase. This way, playbacks further help ensure visitors complete the funneling seamlessly.
      Example of a session recording featuring a line created by the mouse's journey.

      Apply industry-leading techniques to leverage web analytics

      Feedback and microsurveys

      • Feedback can be received directly from end users to help organizations improve the website.
      • Receiving feedback from users can be difficult, since not every user is willing to spend time to submit constructive and detailed feedback. Microsurveys are an excellent alternative.
      • Users can submit short feedback forms consisting of a single line or emojis or thumbs up or down.
      • Users can directly highlight sections of the page about which to submit feedback. This allows designers to quickly pinpoint areas for improvement. Additionally, web designers can play back recordings when feedback is submitted to get a clear idea about the challenges users face.
      Example of a website with a microsurvey in the corner.

      Market Overview

      Choose vendors and tools that best match your business needs.

      Top-level traditional features

      Feature Name

      Description

      Visitor Count Tracking Counts the number of visits received by a website or webpage.
      Geographic Analytics Uses location information to enable the organization to provide location-based services for various demographics.
      Conversion Tracking Measures the proportion of users that complete a certain task compared to total number of users.
      Device and Browser Analytics Captures and summarizes device and browser information.
      Bounce and Exit Tracking Calculates exit rate and bounce rate on a webpage.
      CTA Tracking Measures the number of times users click on a call to action (CTA) button.
      Audience Demographics Captures, analyzes, and displays customer demographic/firmographic data from different channels.
      Aggregate Traffic Reporting Works backward from a conversion or other key event to analyze the differences, trends, or patterns in the paths users took to get there.
      Social Media Analytics Captures information on social signals from popular services (Twitter, Facebook, LinkedIn, etc.).

      Top-level advanced features

      Feature Name

      Description

      HeatmappingShows where users have clicked on a page and how far they have scrolled down a page or displays the results of eye-tracking tests through the graphical representation of heatmaps.
      Funnel ExplorationVisualizes the steps users take to complete tasks on your site or app.
      A/B TestingEnables you to test the success of various website features.
      Customer Journey ModellingEffectively models and displays customer behaviors or journeys through multiple channels and touchpoints.
      Audience SegmentationCreates and analyzes discrete customer audience segments based on user-defined criteria or variables.
      Feedback and SurveysEnables users to give feedback and share their satisfaction and experience with website designers.
      Paid Search IntegrationIntegrates with popular search advertising services (i.e. AdWords) and can make predictive recommendations around areas like keywords.
      Search Engine OptimizationProvides targeted recommendations for improving and optimizing a page for organic search rankings (i.e. via A/B testing or multivariate testing).
      Session RecordingRecords playbacks of users scrolling, moving, u-turning, and rage clicking on your site.

      Evaluate software category leaders using SoftwareReviews’ vendor rankings and awards

      Logo for SoftwareReviews.
      Sample of SoftwareReviews' The Data Quadrant. The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

      Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      Sample of SoftwareReviews' The Emotional Footprint. The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

      Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Speak with category experts to dive deeper into the vendor landscape

      Logo for SoftwareReviews.
      Fact-based reviews of business software from IT professionals. Top-tier data quality backed by a rigorous quality assurance process. CLICK HERE to ACCESS

      Comprehensive software reviews
      to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      Product and category reports with state-of-the-art data visualization. User-experience insight that reveals the intangibles of working with a vendor.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.

      Top vendors in the web analytics space

      Logo for Google Analytics. Google Analytics provides comprehensive traditional analytics tools, free of charge, to understand the customer journey and improve marketing ROI. Twenty-four percent of all web analytical tools used on the internet are provided by Google analytics.
      Logo for Hotjar. Hotjar is a behavior analytics and product experience insights service that helps you empathize with and understand your users through their feedback via tools like heatmaps, session recordings, and surveys. Hotjar complements the data and insights you get from traditional web analytics tools like Google Analytics.
      Logo for Crazy Egg. Crazy Egg is a website analytics tool that helps you optimize your site to make it more user-friendly, more engaging, and more conversion-oriented. It does this through heatmaps and A/B testing, which allow you to see how people are interacting with your site.
      Logo for Amplitude Analytics. Amplitude Analytics provides intelligent insight into customer behavior. It offers basic functionalities like measuring conversion rate and engagement metrics and also provides more advanced tools like customer journey maps and predictive analytics capabilities through AI.

      Case Study

      Logo for Miller & Smith.
      INDUSTRY
      Real Estate
      SOURCE
      Crazy Egg

      Heatmaps and playback recordings

      Challenge

      Miller & Smith had just redesigned their website, but the organization wanted to make sure it was user-friendly as well as visually appealing. They needed an analytics platform that could provide information about where visitors were coming from and measure the effectiveness of the marketing campaigns.

      Solution

      Miller & Smith turned to Crazy Egg to obtain visual insights and track user behavior. They used heatmaps and playback recordings to see user activity within webpages and pinpoint any issues with user interface. In just a few weeks, Miller & Smith gained valuable data to work with: the session recordings helped them understand how users were navigating the site, and the heatmaps allowed them to see where users were clicking – and what they were skipping.

      Results

      Detailed reports generated by the solution allowed Miller & Smith team to convince key stakeholders and implement the changes easily. They were able to pinpoint what changes needed to be made and why these changes would improve their experience.

      Within few weeks, the bounce rate improved by 7.5% and goal conversion increased by 8.5% over a similar period the previous year.

      Operationalizing Web Analytics Tools

      Execute initiatives for successful implementation.

      Ensure success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      1.1 Understand your organization’s goals

      30 minutes

      Output: Organization’s goal list

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key organizational goals for both the short term and the long term.
      2. Arrange the goals in descending order of priority.

      Example table of goals ranked by priority and labeled short or long term.

      1.2 Align business objectives with organizational goals

      30 minutes

      Output: Business objectives

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key business objectives that help attain organization goals.
      2. Match each business objective with the corresponding organizational goals it helps achieve.
      3. Arrange the objectives in descending order of priority.

      Example table of business objectives ranked by priority and which organization goal they're linked to.

      Establish baseline metrics

      Baseline metrics will be improved through:

      1. Efficiently using website elements and CTA button placement
      2. Reducing friction between the landing page and end point
      3. Leveraging direct feedback from users to continuously improve customer experience

      1.3 Establish baseline metrics that you intend to improve via your web analytics tools

      30 minutes

      Example table with metrics, each with a current state and goal state.

      Accelerate your software selection project

      Vendor selection projects often demand extensive and unnecessary documentation.

      Software Selection Insight

      Balance the effort-to-information ratio required for a business impact assessment to keep stakeholders engaged. Use documentation that captures the key data points and critical requirements without taking days to complete. Stakeholders are more receptive to formal selection processes that are friction free.

      The Software Selection Workbook

      Work through the straightforward templates that tie to each phase of the Rapid Application Selection Framework, from assessing the business impact to requirements gathering.

      Sample of the Software Selection Workbook deliverable.

      The Vendor Evaluation Workbook

      Consolidate the vendor evaluation process into a single document. Easily compare vendors as you narrow the field to finalists.

      Sample of the Vendor Evaluation Workbook deliverable.

      The Guide to Software Selection: A Business Stakeholder Manual

      Quickly explain the Rapid Application Selection Framework to your team while also highlighting its benefits to stakeholders.

      Sample of the Guide to Software Selection: A Business Stakeholder Manual deliverable.

      Revisit the metrics you identified and revise your goals

      Track the post-deployment results, compare the metrics, and set new targets for the next fiscal year.

      Example table of 'Baseline Website Performance Metrics' with the column 'Revised Target' highlighted.

      Related Info-Tech Research

      Stock image of two people going over a contract. Modernize Your Corporate Website to Drive Business Value

      Drive higher user satisfaction and value through UX-driven websites.

      Stock image of a person using the cloud on their smartphone. Select and Implement a Web Experience Management Solution

      Your website is your company’s face to the world: select a best-of-breed platform to ensure you make a rock-star impression with your prospects and customers!

      Stock image of people studying analytics. Create an Effective Web Redesign Strategy

      Ninety percent of web redesign projects, executed without an effective strategy, fail to accomplish their goals.

      Bibliography

      "11 Essential Website Data Factors and What They Mean." CivicPlus, n.d. Accessed 26 July 2022.

      “Analytics Usage Distribution in the Top 1 Million Sites.” BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      "Analytics Usage Distribution on the Entire Internet." BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      Bell, Erica. “How Miller and Smith Used Crazy Egg to Create an Actionable Plan to Improve Website Usability.” Crazy Egg, n.d. Accessed 26 July 2022.

      Brannon, Jordan. "User Behavior Analytics | Enhance The Customer Journey." Coalition Technologies, 8 Nov 2021. Accessed 26 July 2022.

      Cardona, Mercedes. "7 Consumer Trends That Will Define The Digital Economy In 2021." Adobe Blog, 7 Dec 2020. Accessed 26 July 2022.

      “The Finer Points.“ Analytics Features. Google Marketing Platform, 2022. Accessed 26 July 2022.

      Fitzgerald, Anna. "A Beginner’s Guide to Web Analytics." HubSpot, 21 Sept 2022. Accessed 26 July 2022.

      "Form Abandonment: How to Avoid It and Increase Your Conversion Rates." Fullstory Blog, 7 April 2022. Accessed 26 July 2022.

      Fries, Dan. "Plug Sales Funnel Gaps by Identifying and Tracking Micro-Conversions." Clicky Blog, 9 Dec 2019. Accessed 7 July 2022.

      "Funnel Metrics in Saas: What to Track and How to Improve Them?" Userpilot Blog, 23 May 2022. Accessed 26 July 2022.

      Garg, Neha. "Digital Experimentation: 3 Key Steps to Building a Culture of Testing." Contentsquare, 21 June 2021. Accessed 26 July 2022.

      “Global Web Analytics Market Size, Status and Forecast 2021-2027.” 360 Research Reports, 25 Jan. 2021. Web.

      Hamilton, Stephanie. "5 Components of Successful Web Analytics." The Daily Egg, 2011. Accessed 26 July 2022.

      "Hammond, Patrick. "Step-by-Step Guide to Cohort Analysis & Reducing Churn Rate." Amplitude, 15 July 2022. Accessed 26 July 2022.

      Hawes, Carry. "What Is Session Replay? Discover User Pain Points With Session Recordings." Dynatrace, 20 Dec 2021. Accessed 26 July 2022.

      Huss, Nick. “How Many Websites Are There in the World?” Siteefy, 8 Oct. 2022. Web.

      Nelson, Hunter. "Establish Web Analytics and Conversion Tracking Foundations Using the Google Marketing Platform.” Tortoise & Hare Software, 29 Oct 2022. Accessed 26 July 2022.

      "Product Analytics Vs Product Experience Insights: What’s the Difference?" Hotjar, 14 Sept 2021. Accessed 26 July 2022.

      “Record and watch everything your visitors do." Inspectlet, n.d. Accessed 26 July 2022.

      “Ryanair: Using Web Analytics to Manage the Site’s Performance More Effectively and Improve Profitability." AT Internet, 1 April 2020. Accessed 26 July 2022.

      Sibor, Vojtech. "Introducing Cross-Platform Analytics.” Smartlook Blog, 5 Nov 2022. Accessed 26 July 2022.

      "Visualize Visitor Journeys Through Funnels.” VWO, n.d. Accessed 26 July 2022.

      "Web Analytics Market Share – Growth, Trends, COVID-19 Impact, and Forecasts (2022-2027)." Mordor Intelligence, 2022. Accessed 26 July 2022.

      “What is the Best Heatmap Tool for Real Results?” Crazy Egg, 27 April 2020. Web.

      "What Is Visitor Behavior Analysis?" VWO, 2022. Accessed 26 July 2022.

      Zheng, Jack G., and Svetlana Peltsverger. “Web Analytics Overview.” IGI Global, 2015. Accessed 26 July 2022.

      Effectively Manage CxO Relations

      • Buy Link or Shortcode: {j2store}384|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Manage Business Relationships
      • Parent Category Link: /manage-business-relationships

      With the exponential pace of technological change, an organization's success will depend largely on how well CIOs can evolve from technology evangelists to strategic business partners. This will require CIOs to effectively broker relationships to improve IT's effectiveness and create business value. A confidential journal can help you stay committed to fostering productive relationships while building trust to expand your sphere of influence.

      Our Advice

      Critical Insight

      Highly effective executives have in common the ability to successfully balance three things: time, personal capabilities, and relationships. Whether you are a new CIO or an experienced leader, the relentless demands on your time and unpredictable shifts in the organization’s strategy require a personal game plan to deliver business value. Rather than managing stakeholders one IT project at a time, you need an action plan that is tailored for unique work styles.

      Impact and Result

      A personal relationship journal will help you:

      • Understand the context in which key stakeholders operate.
      • Identify the best communication approach to engage with different workstyles.
      • Stay committed to fostering relationships through difficult periods.

      Effectively Manage CxO Relations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Effectively Manage CxO Relations Storyboard – A guide to creating a personal action plan to help effectively manage relationships across key stakeholders.

      Use this research to create a personal relationship journal in four steps:

      • Effectively Manage CxO Relations Storyboard

      2. Personal Relationship Management Journal Template – An exemplar to help you build your personal relationship journal.

      Use this exemplar to build a journal that is readily accessible, flexible, and easy to maintain.

      • Personal Relationship Management Journal Template

      Infographic

      Further reading

      Effectively Manage CxO Relations

      Make relationship management a daily habit with a personalized action plan.

      Analyst Perspective

      "Technology does not run an enterprise, relationships do." – Patricia Fripp

      As technology becomes increasingly important, an organization's success depends on the evolution of the modern CIO from a technology evangelist to a strategic business leader. The modern CIO will need to leverage their expansive partnerships to demonstrate the value of technology to the business while safeguarding their time and effort on activities that support their strategic priorities. CIOs struggling to transition risk obsolescence with the emergence of new C-suite roles like the Digital Transformation Officer, Chief Digital Officer, Chief Data Officer, and so on.

      CIOs will need to flex new social skills to accommodate diverse styles of work and better predict dynamic situations. This means expanding beyond their comfort level to acquire new social skills. Having a clear understanding of one's own work style (preferences, natural tendencies, motivations, and blind spots) is critical to identify effective communication and engagement tactics.

      Building trust is an art. Striking a balance between fulfilling your own goals and supporting others will require a carefully curated approach to navigate the myriad of personalities and work styles. A personal relationship journal will help you stay committed through these peaks and troughs to foster productive partnerships and expand your sphere of influence over the long term.

      Photo of Joanne Lee
      Joanne Lee
      Principal, Research Director, CIO Advisory
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      In today's unpredictable markets and rapid pace of technological disruptions, CIOs need to create business value by effectively brokering relationships to improve IT's performance. Challenges they face:

      • Operate in silos to run the IT factory.
      • Lack insights into their stakeholders and the context in which they operate.
      • Competing priorities and limited time to spend on fostering relationships.
      • Relationship management programs are narrowly focused on associated change management in IT project delivery.

      Common Obstacles

      Limited span of influence.

      Mistaking formal roles in organizations for influence.

      Understanding what key individuals want and, more importantly, what they don't want.

      Lack of situational awareness to adapt communication styles to individual preferences and context.

      Leveraging different work styles to create a tangible action plan.

      Perceiving relationships as "one and done."

      Info-Tech's Approach

      A personal relationship journal will help you stay committed to fostering productive relationships while building trust to expand your sphere of influence.

      • Identify your key stakeholders.
      • Understand the context in which they operate to define a profile of their mandate, priorities, commitments, and situation.
      • Choose the most effective engagement and communication strategies for different work styles.
      • Create an action plan to monitor and measure your progress.

      Info-Tech Insight

      Highly effective executives have in common the ability to balance three things: time, personal capabilities, and relationships. Whether you are a new CIO or an experienced leader, the relentless demand on your time and unpredictable shifts in the organization's strategy will require a personal game plan to deliver business value. This will require more than managing stakeholders one IT project at a time: It requires an action plan that fosters relationships over the long term.

      Key Concepts

      Stakeholder Management
      A common term used in project management to describe the successful delivery of any project, program, or activity that is associated with organizational change management. The goal of stakeholder management is intricately tied to the goals of the project or activity with a finite end. Not the focus of this advisory research.

      Relationship Management
      A broad term used to describe the relationship between two parties (individuals and/or stakeholder groups) that exists to create connection, inclusion, and influence. The goals are typically associated with the individual's personal objectives and the nature of the interaction is seen as ongoing and long-term.

      Continuum of Commitment
      Info-Tech's framework that illustrates the different levels of commitment in a relationship. It spans from active resistance to those who are committed to actively supporting your personal priorities and objectives. This can be used to baseline where you are today and where you want the relationship to be in the future.

      Work Style
      A reference to an individual's natural tendencies and expectations that manifest itself in their communication, motivations, and leadership skills. This is not a behavior assessment nor a commentary on different personalities but observable behaviors that can indicate different ways people communicate, interact, and lead.

      Glossary
      CDxO: Chief Digital Officer
      CDO: Chief Data Officer
      CxO: C-Suite Executives

      The C-suite is getting crowded, and CIOs need to foster relationships to remain relevant

      The span of influence and authority for CIOs is diminishing with the emergence of Chief Digital Officers and Chief Data Officers.

      63% of CDxOs report directly to the CEO ("Rise of the Chief Digital Officer," CIO.com)

      44% of organizations with a dedicated CDxO in place have a clear digital strategy versus 22% of those without a CDxO (KPMG/Harvey Nash CIO Survey)

      The "good news": CIOs tend to have a longer tenure than CDxOs.

      A diagram that shows the average tenure of C-Suites in years.
      Source: "Age and Tenure of C-Suites," Korn Ferry

      The "bad news": The c-suite is getting overcrowded with other roles like Chief Data Officer.

      A diagram that shows the number of CDOs hired from 2017 to 2021.
      Source: "Chief Data Officer Study," PwC, 2022

      An image of 7 lies technology executives tell ourselves.

      Info-Tech Insight

      The digital evolution has created the emergence of new roles like the Chief Digital Officer and Chief Data Officer. They are a response to bridge the skill gap that exists between the business and technology. CIOs need to focus on building effective partnerships to better communicate the business value generated by technology or they risk becoming obsolete.

      Create a relationship journal to effectively manage your stakeholders

      A diagram of relationship journal

      Info-Tech's approach

      From managing relationships with friends to key business partners, your success will come from having the right game plan. Productive relationships are more than managing stakeholders to support IT initiatives. You need to effectively influence those who have the potential to champion or derail your strategic priorities. Understanding differences in work styles is fundamental to adapting your communication approach to various personalities and situations.

      A diagram that shows from 1.1 to 4.1

      A diagram of business archetypes

      Summary of Insights

      Insight 1: Expand your sphere of influence
      It's not just about gaining a volume of acquaintances. Figure out where you want to spend your limited time, energy, and effort to develop a network of professional allies who will support and help you achieve your strategic priorities.

      Insight 2: Know thyself first and foremost
      Healthy relationships start with understanding your own working style, preferences, and underlying motivations that drive your behavior and ultimately your expectations of others. A win/win scenario emerges when both parties' needs for inclusion, influence, and connection are met or mutually conceded.

      Insight 3: Walk a mile in their shoes
      If you want to build successful partnerships, you need to understand the context in which your stakeholder operates: their motivations, desires, priorities, commitments, and challenges. This will help you adapt as their needs shift and, moreover, leverage empathy to identify the best tactics for different working styles.

      Insight 4: Nurturing relationships is a daily commitment
      Building, fostering, and maintaining professional relationships requires a daily commitment to a plan to get through tough times, competing priorities, and conflicts to build trust, respect, and a shared sense of purpose.

      Related Info-Tech Research

      Supplement your CIO journey with these related blueprints.

      Photo of First 100 Days as CIO

      First 100 Days as CIO

      Photo of Become a Strategic CIO

      Become a Strategic CIO

      Photo of Improve IT Team Effectiveness

      Improve IT Team Effectiveness

      Photo of Become a Transformational CIO

      Become a Transformational CIO

      Executive Brief Case Study

      Logo of Multicap Limited

      • Industry: Community Services
      • Source: Scott Lawry, Head of Digital

      Conversation From Down Under

      What are the hallmarks of a healthy relationship with your key stakeholders?
      "In my view, I work with partners like they are an extension of my team, as we rely on each other to achieve mutual success. Partnerships involve a deeper, more intimate relationship, where both parties are invested in the long-term success of the business."

      Why is it important to understand your stakeholder's situation?
      "It's crucial to remember that every IT project is a business project, and vice versa. As technology leaders, our role is to demystify technology by focusing on its business value. Empathy is a critical trait in this endeavor, as it allows us to see a stakeholder's situation from a business perspective, align better with the business vision and goals, and ultimately connect with people, rather than just technology."

      How do you stay committed during tough times?
      "I strive to leave emotions at the door and avoid taking a defensive stance. It's important to remain neutral and not personalize the issue. Instead, stay focused on the bigger picture and goals, and try to find a common purpose. To build credibility, it's also essential to fact-check assumptions regularly. By following these principles, I approach situations with a clear mind and better perspective, which ultimately helps achieve success."

      Photo of Scott Lawry, Head Of Digital at Multicap Limited

      Key Takeaways

      In a recent conversation with a business executive about the evolving role of CIOs, she expressed: "It's the worst time to be perceived as a technology evangelist and even worse to be perceived as an average CIO who can't communicate the business value of technology."

      This highlights the immense pressure many CIOs face when evolving beyond just managing the IT factory.

      The modern CIO is a business leader who can forge relationships and expand their influence to transform IT into a core driver of business value.

      Stakeholder Sentiment

      Identify key stakeholders and their perception of IT's effectiveness

      1.1 Identify Key Stakeholders

      A diagram of Identify Key Stakeholders

      Identify and prioritize your key stakeholders. Be diligent with stakeholder identification. Use a broad view to identify stakeholders who are known versus those who are "hidden." If stakeholders are missed, then so are opportunities to expand your sphere of influence.

      1.2 Understand Stakeholder's Perception of IT

      A diagram that shows Info-Tech's Diagnostic Reports and Hospital Authority XYZ

      Assess stakeholder sentiments from Info-Tech's diagnostic reports and/or your organization's satisfaction surveys to help identify individuals who may have the greatest influence to support or detract IT's performance and those who are passive observers that can become your greatest allies. Determine where best to focus your limited time amid competing priorities by focusing on the long-term goals that support the organization's vision.

      Info-Tech Insight

      Understand which individuals can directly or indirectly influence your ability to achieve your priorities. Look inside and out, as you may find influencers beyond the obvious peers or executives in an organization. Influence can result from expansive connections, power of persuasion, and trust to get things done.

      Visit Info-Tech's Diagnostic Programs

      Activity: Identify and Prioritize Stakeholders

      30-60 minutes

      1.1 Identify Key Stakeholders

      Start with the key stakeholders that are known to you. Take a 360-degree view of both internal and external connections. Leverage external professional & network platforms (e.g. LinkedIn), alumni connections, professional associations, forums, and others that can help flush out hidden stakeholders.

      1.2 Prioritize Key Stakeholders

      Use stakeholder satisfaction surveys like Info-Tech's Business Vision diagnostic as a starting point to identify those who are your allies and those who have the potential to derail IT's success, your professional brand, and your strategic priorities. Review the results of the diagnostic reports to flush out those who are:

      • Resisters: Vocal about their dissatisfaction with IT's performance and actively sabotage or disrupt
      • Skeptics: Disengaged, passive observers
      • Ambassadors: Aligned but don't proactively support
      • Champions: Actively engaged and will proactively support your success

      Consider the following:

      • Influencers may not have formal authority within an organization but have relationships with your stakeholders.
      • Influencers may be hiding in many places, like the coach of your daughter's soccer team who rows with your CEO.
      • Prioritize, i.e. three degrees of separation due to potential diverse reach of influence.

      Key Output: Create a tab for your most critical stakeholders.

      A diagram that shows profile tabs

      Download the Personal Relationship Management Journal Template.

      Understand stakeholders' business

      Create a stakeholder profile to understand the context in which stakeholders operate.

      2.1 Create individual profile for each stakeholder

      A diagram that shows different stakeholder questions

      Collect and analyze key information to understand the context in which your stakeholders operate. Use the information to derive insights about their mandate, accountabilities, strategic goals, investment priorities, and performance metrics and challenges they may be facing.

      Stakeholder profiles can be used to help design the best approach for personal interactions with individuals as their business context changes.

      If you are short on time, use this checklist to gather information:

      • Stakeholder's business unit (BU) strategy goals
      • High-level organizational chart
      • BU operational model or capability map
      • Key performance metrics
      • Projects underway and planned
      • Financial budget (if available)
      • Milestone dates for key commitments and events
      • External platforms like LinkedIn, Facebook, Twitter, Slack, Instagram, Meetup, blogs

      Info-Tech Insight

      Understanding what stakeholders want (and more importantly, what they don't) requires knowing their business and the personal and social circumstances underlying their priorities and behaviors.

      Activity: Create a stakeholder profile

      30-60 minutes

      2.1.0 Understand stakeholder's business context

      Create a profile for each of your priority stakeholders to document their business context. Review all the information collected to understand their mandate, core accountability, and business capabilities. The context in which individuals operate is a window into the motivations, pressures, and vested interests that will influence the intersectionality between their expectations and yours.

      2.1.1 Document Observable Challenges as Private Notes

      Crushing demands and competing priorities can lead to tension and stress as people jockey to safeguard their time. Identify some observable challenges to create greater situational awareness. Possible underlying factors:

      • Sudden shifts/changes in mandate
      • Performance (operations, projects)
      • Finance
      • Resource and talent gaps
      • Politics
      • Personal circumstances
      • Capability gaps/limitations
      • Capacity challenges

      A diagram that shows considerations of this activity.

      Analyze Stakeholder's Work Style

      Adapt communication styles to the situational context in which your stakeholders operate

      2.2 Determine the ideal approach for engaging each stakeholder

      Each stakeholder has a preferred modality of working which is further influenced by dynamic situations. Some prefer to meet frequently to collaborate on solutions while others prefer to analyze data in solitude before presenting information to substantiate recommendations. However, fostering trust requires:

      1. Understanding your preferred default when engaging others.
      2. Knowing where you need to expand your skills.
      3. Identifying which skills to activate for different professional scenarios.

      Adapting your communication style to create productive interactions will require a diverse arsenal of interpersonal skills that you can draw upon as situations shift. The ability to adapt your work style to dial any specific trait up or down will help to increase your powers of persuasion and influence.

      "There are only two ways to influence human behavior: you can manipulate it, or you can inspire it." – Simon Sinek

      Activity: Identify Engagement Strategies

      30 minutes

      2.2.0 Establish work styles

      Every individual has a preferred style of working. Determine work styles starting with self-awareness:

      • Express myself - How you communicate and interact with others
      • Expression by others - How you want others to communicate and interact with you

      Through observation and situational awareness, we can make inferences about people's work style.

      • Observations - Observable traits of other people's work style
      • Situations - Personal and professional circumstances that influence how we communicate and interact with one another

      Where appropriate and when opportunities arise, ask individuals directly about their preferred work styles and method for communication. What is their preferred method of communication? During a normal course of interaction vs. for urgent priorities?

      2.2.1 Brainstorm possible engagement strategies

      Consider the following when brainstorming engagement strategies for different work styles.

      A table of involvement, influence, and connection.

      Think engagement strategies in different professional scenarios:

      • Meetings - Where and how you connect
      • Communicating - How and what you communicate to create connection
      • Collaborating - What degree of involved in shared activities
      • Persuading - How you influence or direct others to get things done

      Expand New Interpersonal Skills

      Use the Business Archetypes to brainstorm possible approaches for engaging with different work styles. Additional communication and engagement tactics may need to be considered based on circumstances and changing situations.

      A diagram that shows business archetypes and engagement strategies.

      Communicate Effectively

      Productive communication is a dialogue that requires active listening, tailoring messages to fluid situations, and seeking feedback to adapt.

      A diagram of elements that contributes to better align intention and impact

      Be Relevant

      • Understand why you need to communicate
      • Determine what you need to convey
      • Tailor your message to what matters to the audience and their context
      • Identify the most appropriate medium based on the situation

      Be Consistent and Accurate

      • Say what you mean and mean what you say to avoid duplicity
      • Information should be accurate and complete
      • Communicate truthfully; do not make false promises or hide bad news
      • Don't gossip

      Be Clear and Concise

      • Keep it simple and avoid excessive jargon
      • State asks upfront to set intention and transparency
      • Avoid ambiguity and focus on outcomes over details
      • Be brief and to the point or risk losing stakeholder's attention

      Be Attentive and Authentic

      • Stay engaged and listen actively
      • Be curious and inquire for clarification or explanation
      • Be flexible to adapt to both verbal and non-verbal cues
      • Be authentic in your approach to sharing yourself
      • Avoid "canned" approaches

      A diagram of listen, observe, reflect.


      "Good communication is the bridge between confusion and clarity."– Nat Turner (LinkedIn, 2020)

      Exemplar: Engaging With Jane

      A diagram that shows Exemplar: Engaging With Jane

      Exemplar: Engaging With Ali

      A diagram that shows Exemplar: Engaging With Ali

      Develop an Action Plan

      Moving from intent to action requires a plan to ensure you stay committed through the peaks and troughs.

      Create Your 120-Day Plan

      An action plan example

      Key elements of the action plan:

      • Strategic priorities – Your top focus
      • Objective – Your goals
      • 30-60-90-120 Day Topics – Key agenda items
      • Meeting Progress Notes – Key takeaways from meetings
      • Private Notes – Confidential observations

      Investing in relationships is a long-term process. You need to accumulate enough trust to trade or establish coalitions to expand your sphere of influence. Even the strongest of professional ties will have their bouts of discord. To remain committed to building the relationship during difficult periods, use an action plan that helps you stay grounded around:

      • Shared purpose
      • Removing emotion from the situation
      • Continuously learning from every interaction

      Photo of Angela Diop
      "Make intentional actions to set intentionality. Plans are good to keep you grounded and focused especially when relationship go through ups and down and there are changes: to new people and new relationships."
      – Angela Diop, Senior Director, Executive Services, Info-Tech & former VP of Information Services with Unity Health Care

      Activity: Design a Tailored Action Plan

      30-60 minutes

      3.1.0 Determine your personal expectations

      Establish your personal goals and expectations around what you are seeking from the relationship. Determine the strength of your current connection and identify where you want to move the relationship across the continuum of commitment.

      Use insights from your stakeholder's profile to explore their span of influence and degree of interest in supporting your strategic priorities.

      3.1.1 Determine what you want from the relationship

      Based on your personal goals, identify where you want to move the relationship across the continuum of commitment: What are you hoping to achieve from the relationship? How will this help create a win/win situation for both you and the key stakeholder?

      A diagram of Continuum of Commitment.

      3.1.2 Identify your metrics for progress

      Fostering relationships take time and commitment. Utilizing metrics or personal success criteria for each of your focus areas will help you stay on track and find opportunities to make each engagement valuable instead of being transactional.

      A graph that shows influence vs interest.

      Make your action plan impactful

      Level of Connection

      The strength of the relationship will help inform the level of time and effort needed to achieve your goals.

      • Is this a new or existing relationship?
      • How often do you connect with this individual?
      • Are the connections driven by a shared purpose or transactional as needs arise?

      Focus on Relational Value

      Cultivate your network and relationship with the goal of building emotional connection, understanding, and trust around your shared purpose and organization's vision through regular dialogue. Be mindful of transactional exchanges ("quid pro quo") to be strategic about its use. Treat every interaction as equally important regardless of agenda, duration, or channel of communication.

      Plan and Prepare

      Everyone's time is valuable, and you need to come prepared with a clear understanding of why you are engaging. Think about the intentionality of the conversation:

      • Gain buy-in
      • Create transparency
      • Specific ask
      • Build trust and respect
      • Provide information to clarify, clear, or contain a situation

      Non-Verbal Communication Matters

      Communication is built on both overt expressions and subtext. While verbal communication is the most recognizable form, non-lexical components of verbal communication (i.e. paralanguage) can alter stated vs. intended meaning. Engage with the following in mind:

      • Tone, pitch, speed, and hesitation
      • Facial expressions and gestures
      • Choice of channel for engagement

      Exemplar: Action Plan for VP, Digital

      A diagram that shows Exemplar: Action Plan for VP, Digital

      Make Relationship Management a Daily Habit

      Management plans are living documents and need to be flexible to adapt to changes in stakeholder context.

      Monitor and Adjust to Communicate Strategically

      A diagram that shows Principles for Effective Communication and Key Measures

      Building trust takes time and commitment. Treat every conversation with your key stakeholders as an investment in building the social capital to expand your span of influence when and where you need it to go. This requires making relationship management a daily habit. Action plans need to be a living document that is your personal journal to document your observations, feelings, and actions. Such a plan enables you to make constant adjustments along the relationship journey.

      "Without involvement, there is no commitment. Mark it down, asterisk it, circle it, underline it."– Stephen Convey (LinkedIn, 2016)

      Capture some simple metrics

      If you can't measure your actions, you can't manage the relationship.

      An example of measures: what, why, how - metrics, and intended outcome.

      While a personal relationship journal is not a formal performance management tool, identifying some tangible measures will improve the likelihood of aligning your intent with outcomes. Good measures will help you focus your efforts, time, and resources appropriately.

      Keep the following in mind:

      1. WHAT are you trying to measure?
        Specific to the situation or scenario
      2. WHY is this important?
        Relevant to your personal goals
      3. HOW will you measure?
        Achievable and quantifiable
      4. WHAT will the results tell you?
        Intended outcome that is directional

      Summary of accomplishments

      Knowledge Gained

      • Relationship management is critical to a CIO's success
      • A personal relationship journal will help build:
        • Customized approach to engaging stakeholders
        • New communication skills to adapt to different work styles

      New Concepts

      • Work style assessment framework and engagement strategies
      • Effective communication strategies
      • Continuum of commitment to establish personal goals

      Approach to Creating a Personal Journal

      • Step-by-step approach to create a personal journal
      • Key elements for inclusion in a journal
      • Exemplar and recommendations

      Related Info-Tech Research

      Photo of Tech Trends and Priorities Research Centre

      Tech Trends and Priorities Research Centre

      Access Info-Tech's Tech Trend reports and research center to learn about current industry trends, shifts in markets, and disruptions that are impacting your industry and sector. This is a great starting place to gain insights into how the ecosystem is changing your business and the role of IT within it.

      Photo of Embed Business Relationship Management in IT

      Embed Business Relationship Management in IT

      Create a business relationship management (BRM) function in your program to foster a more effective partnership with the business and drive IT's value to the organization.

      Photo of Become a Transformational CIO

      Become a Transformational CIO

      Collaborate with the business to lead transformation and leave behind a legacy of growth.

      Appendix: Framework

      Content:

      • Adaptation of DiSC profile assessment
      • DiSC Profile Assessment
      • FIRO-B Framework
      • Experience Cube

      Info-Tech's Adaption of DiSC Assessment

      A diagram of business archetypes

      Info-Tech's Business Archetypes was created based on our analysis of the DiSC Profile and Myers-Briggs FIRO-B personality assessment tools that are focused on assessing interpersonal traits to better understand personalities.

      The adaptation is due in part to Info-Tech's focus on not designing a personality assessment tool as this is neither the intent nor the expertise of our services. Instead, the primary purpose of this adaptation is to create a simple framework for our members to base their observations of behavioral cues to identify appropriate communication styles to better interact with key stakeholders.

      Cautionary note:
      Business archetypes are personas and should not be used to label, make assumptions and/or any other biased judgements about individual personalities. Every individual has all elements and aspects of traits across various spectrums. This must always remain at the forefront when utilizing any type of personality assessments or frameworks.

      Click here to learn about DiSC Profile
      Click here learn about FIRO-B
      Click here learn about Experience Cube

      DiSC Profile Assessment

      A photo of DiSC Profile Assessment

      What is DiSC?

      DisC® is a personal assessment tool that was originally developed in 1928 by psychologist William Moulton Marston, who designed it to predict job performance. The tool has evolved and is now widely used by thousands of organizations around the world, from large government agencies and Fortune 500 companies to nonprofit and small businesses, to help improve teamwork, communication, and productivity in the workplace. The tool provides a common language people can use to better understand themselves and those they interact with - and use this knowledge to reduce conflict and improve working relationships.

      What does DiSC mean?

      DiSC is an acronym that stands for the four main personality profiles described in the Everything DiSC model: (D)ominance, (i)nfluence, (S)teadiness, (C)onscientiousness

      People with (D) personalities tend to be confident and emphasize accomplishing bottom-line results.
      People with (i) personalities tend to be more open and emphasize relationships and influencing or persuading others.
      People with (S) personalities tend to be dependable and emphasize cooperation and sincerity.
      People with (C) personalities tend to emphasize quality, accuracy, expertise, and competency.

      Go to this link to explore the DiSC styles

      FIRO-B® – Interpersonal Assessment

      A diagram of FIRO framework

      What is FIRO workplace relations?

      The Fundamental Interpersonal Relations Orientation Behavior (FIRO-B®) tool has been around for forty years. The tool assesses your interpersonal needs and the impact of your behavior in the workplace. The framework reveals how individuals can shape and adapt their individual behaviors, influence others effectively, and build trust among colleagues. It has been an excellent resource for coaching individuals and teams about the underlying drivers behind their interactions with others to effectively build successful working relationships.

      What does the FIRO framework measure?

      The FIRO framework addresses five key questions that revolve around three interpersonal needs. Fundamentally, the framework focuses on how you want to express yourself toward others and how you want others to behave toward you. This interaction will ultimately result in the universal needs for (a) inclusion, (b) control, and (c) affection. The insights from the results are intended to help individuals adjust their behavior in relationships to get what they need while also building trust with others. This will allow you to better predict and adapt to different situations in the workplace.

      How can FIRO influence individual and team performance in the workplace?

      FIRO helps people recognize where they may be giving out mixed messages and prompts them to adapt their exhibited behaviors to build trust in their relationships. It also reveals ways of improving relationships by showing individuals how they are seen by others, and how this external view may differ from how they see themselves. Using this lens empowers people to adjust their behavior, enabling them to effectively influence others to achieve high performance.

      In team settings, it is a rich source of information to explore motivations, underlying tensions, inconsistent behaviors, and the mixed messages that can lead to mistrust and derailment. It demonstrates how people may approach teamwork differently and explains the potential for inefficiencies and delays in delivery. Through the concept of behavioral flexibility, it helps defuse cultural stereotypes and streamline cross-cultural teams within organizations.

      Go to this link to explore FIRO-B for Business

      Experience Cube

      A diagram of experience cube model.

      What is an experience cube?

      The Experience Cube model was developed by Gervase Bushe, a professor of Leadership and Organization at the Simon Fraser University's school of Business and a thought leader in the field of organizational behavior. The experience cube is intended as a tool to plan and manage conversations to communicate more effectively in the moment. It does this by promoting self-awareness to better reduce anxiety and adapt to evolving and uncertain situations.

      How does the experience cube work?

      Using the four elements of the experience cube (Observations, Thoughts, Feelings, and Wants) helps you to separate your experience with the situation from your potential judgements about the situation. This approach removes blame and minimizes defensiveness, facilitating a positive discussion. The goal is to engage in a continuous internal feedback loop that allows you to walk through all four quadrants in the moment to help promote self-awareness. With heightened self-awareness, you may (1) remain curious and ask questions, (2) check-in for understanding and clarification, and (3) build consensus through agreement on shared purpose and next steps.

      Observations: Sensory data (information you take in through your senses), primarily what you see and hear. What a video camera would record.

      Thoughts: The meaning you add to your observations (i.e. the way you make sense of them, including your beliefs, expectations, assumptions, judgments, values, and principles). We call this the "story you make up."

      Feelings: Your emotional or physiological response to the thoughts and observations. Feelings words such as sad, mad, glad, scared, or a description of what is happening in your body.

      Wants: Clear description of the outcome you seek. Wants go deeper than a simple request for action. Once you clearly state what you want, there may be different ways to achieve it.

      Go to this link to explore more: Experience Cube

      Research Contributors and Experts

      Photo of Joanne Lee
      Joanne Lee
      Principal, Research Director, CIO Advisory
      Info-Tech Research Group

      Joanne is a professional executive with over twenty-five years of experience in digital technology and management consulting spanning healthcare, government, municipal, and commercial sectors across Canada and globally. She has successfully led several large, complex digital and business transformation programs. A consummate strategist, her expertise spans digital and technology strategy, organizational redesign, large complex digital and business transformation, governance, process redesign, and PPM. Prior to joining Info-Tech Research Group, Joanne was a Director with KPMG's CIO Advisory management consulting services and the Digital Health practice lead for Western Canada. She brings a practical and evidence-based approach to complex problems enabled by technology.

      Joanne holds a Master's degree in Business and Health Policy from the University of Toronto and a Bachelor of Science (Nursing) from the University of British Columbia.



      Photo of Gord Harrison
      Gord Harrison
      Senior Vice President, Research and Advisory
      Info-Tech Research Group

      Gord Harrison, SVP, Research and Consulting, has been with Info-Tech Research Group since 2002. In that time, Gord leveraged his experience as the company's CIO, VP Research Operations, and SVP Research to bring the consulting and research teams together under his current role, and to further develop Info-Tech's practical, tactical, and value-oriented research product to the benefit of both organizations.

      Prior to Info-Tech, Gord was an IT consultant for many years with a focus on business analysis, software development, technical architecture, and project management. His background of educational game software development, and later, insurance industry application development gave him a well-rounded foundation in many IT topics. Gord prides himself on bringing order out of chaos and his customer-first, early value agile philosophy keeps him focused on delivering exceptional experiences to our customers.



      Photo of Angela Diop
      Angela Diop
      Senior Director, Executive Services
      Info-Tech Research Group

      Angela has over twenty-five years of experience in healthcare, as both a healthcare provider and IT professional. She has spent over fifteen years leading technology departments and implementing, integrating, managing, and optimizing patient-facing and clinical information systems. She believes that a key to a healthcare organization's ability to optimize health information systems and infrastructure is to break the silos that exist in healthcare organizations.

      Prior to joining Info-Tech, Angela was the Vice President of Information Services with Unity Health Care. She has demonstrated leadership and success in this area by fostering environments where business and IT collaborate to create systems and governance that are critical to providing patient care and sustaining organizational health.

      Angela has a Bachelor of Science in Systems Engineering and Design from the University of Illinois and a Doctorate of Naturopathic Medicine from Bastyr University. She is a Certified CIO with the College of Healthcare Information Management Executives. She is a two-time Health Information Systems Society (HIMSS) Davies winner.



      Photo of Edison Barreto
      Edison Barreto
      Senior Director, Executive Services
      Info-Tech Research Group

      Edison is a dynamic technology leader with experience growing different enterprises and changing IT through creating fast-paced organizations with cultural, modernization, and digital transformation initiatives. He is well versed in creating IT and business cross-functional leadership teams to align business goals with IT modernization and revenue growth. Over twenty-five years of Gaming, Hospitality, Retail, and F&B experience has given him a unique perspective on guiding and coaching the creation of IT department roadmaps to focus on business needs and execute successful changes.

      Edison has broad business sector experience, including:
      Hospitality, Gaming, Sports and Entertainment, IT policy and oversight, IT modernization, Cloud first programs, R&D, PCI, GRDP, Regulatory oversight, Mergers acquisitions and divestitures.



      Photo of Mike Tweedie
      Mike Tweedie
      Practice Lead, CIO Strategy
      Info-Tech Research Group

      Michael Tweedie is the Practice Lead, CIO – IT Strategy at Info-Tech Research Group, specializing in creating and delivering client-driven, project-based, practical research, and advisory. He brings more than twenty-five years of experience in technology and IT services as well as success in large enterprise digital transformations.

      Prior to joining Info-Tech, Mike was responsible for technology at ADP Canada. In that role, Mike led several large transformation projects that covered core infrastructure, applications, and services and worked closely with and aligned vendors and partners. The results were seamless and transparent migrations to current services, like public cloud, and a completely revamped end-user landscape that allowed for and supported a fully remote workforce.

      Prior to ADP, Mike was the North American Head of Engineering and Service Offerings for a large French IT services firm, with a focus on cloud adoption and complex ERP deployment and management; he managed large, diverse global teams and had responsibilities for end-to-end P&L management.

      Mike holds a Bachelor's degree in Architecture from Ryerson University.



      Photo of Carlene McCubbin
      Carlene McCubbin
      Practice Lead, People and Leadership
      Info-Tech Research Group

      Carlene McCubbin is a Research Lead for the CIO Advisory Practice at Info-Tech Research Group covering key topics in operating models & design, governance, and human capital development.

      During her tenure at Info-Tech, Carlene has led the development of Info-Tech's Organization and Leadership practice and worked with multiple clients to leverage the methodologies by creating custom programs to fit each organization's needs.

      Before joining Info-Tech, Carlene received her Master of Communications Management from McGill University, where she studied development of internal and external communications, government relations, and change management. Her education honed her abilities in rigorous research, data analysis, writing, and understanding the organization holistically, which has served her well in the business IT world.



      Photo of Anubhav Sharma
      Anubhav Sharma
      Research Director, CIO Strategy
      Info-Tech Research Group

      Anubhav is a digital strategy and execution professional with extensive experience in leading large-scale transformation mandates for organizations both in North America and globally, including defining digital strategies for leading banks and spearheading a large-scale transformation project for a global logistics pioneer across ten countries. Prior to joining Info-Tech Research Group, he held several industry and consulting positions in Fortune 500 companies driving their business and technology strategies. In 2023, he was recognized as a "Top 50 Digital Innovator in Banking" by industry peers.

      Anubhav holds an MBA in Strategy from HEC Paris, a Master's degree in Finance from IIT-Delhi, and a Bachelor's degree in Engineering.



      Photo of Kim Osborne-Rodriguez
      Kim Osborne-Rodriguez
      Research Director, CIO Strategy
      Info-Tech Research Group

      Kim is a professional engineer and Registered Communications Distribution Designer (RCDD) with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach to digital transformation, with a track record of supporting successful implementations.

      Kim holds a Bachelor's degree in Mechatronics Engineering from University of Waterloo.



      Photo of Amanda Mathieson
      Amanda Mathieson
      Research Director, People and Leadership
      Info-Tech Research Group

      Amanda joined Info-Tech Research Group in 2019 and brings twenty years of expertise working in Canada, the US, and globally. Her expertise in leadership development, organizational change management, and performance and talent management comes from her experience in various industries spanning pharmaceutical, retail insurance, and financial services. She takes a practical, experiential approach to people and leadership development that is grounded in adult learning methodologies and leadership theory. She is passionate about identifying and developing potential talent, as well as ensuring the success of leaders as they transition into more senior roles.

      Amanda has a Bachelor of Commerce degree and Master of Arts in Organization and Leadership Development from Fielding Graduate University, as well as a post-graduate diploma in Adult Learning Methodologies from St. Francis Xavier University. She also has certifications in Emotional Intelligence – EQ-i 2.0 & 360, Prosci ADKAR® Change Management, and Myers-Briggs Type Indicator Step I and II.

      Bibliography

      Bacey, Christopher. "KPMG/Harvey Nash CIO Survey finds most organizations lack enterprise-wide digital strategy." Harvey Nash/KPMG CIO Survey. Accessed Jan. 6, 2023. KPMG News Perspective - KPMG.us.com

      Calvert, Wu-Pong Susanna. "The Importance of Rapport. Five tips for creating conversational reciprocity." Psychology Today Magazine. June 30, 2022. Accessed Feb. 10, 2023. psychologytoday.com/blog

      Coaches Council. "14 Ways to Build More Meaningful Professional Relationships." Forbes Magazine. September 16, 2020. Accessed Feb. 20, 2023. forbes.com/forbescoachescouncil

      Council members. "How to Build Authentic Business Relationships." Forbes Magazine. June 15, 2021. Accessed Jan. 15, 2023. Forbes.com/business council

      Deloitte. "Chief Information Officer (CIO) Labs. Transform and advance the role of the CIO." The CIO program. Accessed Feb. 5, 2021.

      Dharsarathy, Anusha et al. "The CIO challenge: Modern business needs a new kind of tech leader." McKinsey and Company. January 27, 2020. Accessed Feb 2023. Mckinsey.com

      DiSC profile. "What is DiSC?" DiSC Profile Website. Accessed Feb. 5, 2023. discprofile.com

      FIRO Assessment. "Better working relationships". Myers Brigg Website. Resource document downloaded Feb. 10, 2023. myersbriggs.com/article

      Fripp, Patricia. "Frippicisms." Website. Accessed Feb. 25, 2023. fripp.com

      Grossman, Rhys. "The Rise of the Chief Digital Officer." Russell Reynolds Insights, January 1, 2012. Accessed Jan. 5, 2023. Rise of the Chief Digital Officer - russellreynolds.com

      Kambil, Ajit. "Influencing stakeholders: Persuade, trade, or compel." Deloitte Article. August 9, 2017. Accessed Feb. 19, 2023. www2.deloitte.com/insights

      Kambil, Ajit. "Navigating the C-suite: Managing Stakeholder Relationships." Deloitte Article. March 8, 2017. Accessed Feb. 19, 2023. www2.deloitte.com/insights

      Korn Ferry. "Age and tenure in the C-suite." Kornferry.com. Accessed Jan. 6, 2023. Korn Ferry Study Reveals Trends by Title and Industry

      Kumthekar, Uday. "Communication Channels in Project". Linkedin.com, 3 March 2020. Accessed April 27, 2023. Linkedin.com/Pulse/Communication Channels

      McWilliams, Allison. "Why You Need Effective Relationships at Work." Psychology Today Magazine. May 5, 2022. Accessed Feb. 11, 2023. psychologytoday.com/blog

      McKinsey & Company. "Why do most transformations fail? A conversation with Harry Robinson." Transformation Practice. July 2019. Accessed Jan. 10, 2023. Mckinsey.com

      Mind Tools Content Team. "Building Good Work Relationships." MindTools Article. Accessed Feb. 11, 2023. mindtools.com/building good work relationships

      Pratt, Mary. "Why the CIO-CFO relationship is key to digital success." TechTarget Magazine. November 11, 2021. Accessed Feb. 2023. Techtarget.com

      LaMountain, Dennis. "Quote of the Week: No Involvement, No Commitment". Linkedin.com, 3 April 2016. Accessed April 27, 2023. Linkedin.com/pulse/quote-week-involvement

      PwC Pulse Survey. "Managing Business Risks". PwC Library. 2022. Accessed Jan. 30, 2023. pwc.com/pulse-survey

      Rowell, Darin. "3 Traits of a Strong Professional Relationship." Harvard Business Review. August 8, 2019. Accessed Feb. 20, 2023. hbr.org/2019/Traits of a strong professional relationship

      Sinek, Simon. "The Optimism Company from Simon Sinek." Website. Image Source. Accessed, Feb. 21, 2023. simonsinek.com

      Sinek, Simon. "There are only two ways to influence human behavior: you can manipulate it or you can inspire it." Twitter. Dec 9, 2022. Accessed Feb. 20, 2023. twitter.com/simonsinek

      Whitbourne, Susan Krauss. "10 Ways to Measure the Health of Relationship." Psychology Today Magazine. Aug. 7, 2021. Accessed Jan. 30, 2023. psychologytoday.com/blog