Embarrasing Moments
Oh, you thought you were alone in facing some embarrassing moments? I can reassure you; you are not. Most companies face a myriad of issues with their IT. The key is to manage them to support your business efficiently.
Oh, you thought you were alone in facing some embarrassing moments? I can reassure you; you are not. Most companies face a myriad of issues with their IT. The key is to manage them to support your business efficiently.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Learn best practices for creating, maintaining, publishing, and managing effective SOP documentation.
Identify required documentation and prioritize them according to urgency and impact.
Review the wide variety of samples to see what works best for your needs.
"Most organizations struggle to document and maintain SOPs as required, leading to process inconsistencies and inefficiencies. These breakdowns directly impact the performance of IT operations. Effective SOPs streamline training and knowledge transfer, improve transparency and compliance, enable automation, and ultimately decrease costs as processes improve and expensive breakdowns are avoided. Documenting SOPs is not just good practice; it directly impacts IT efficiency and your bottom line."
Frank Trovato, Senior Manager, Infrastructure Research Info-Tech Research Group
This Research Is Designed For:
This Research Will Help You:
This Research Will Also Assist:
This Research Will Help Them:
Situation
Complication
Resolution
Info-Tech Insight
'It isn’t unusual for us to see infrastructure or operations documentation that is wildly out of date. We’re talking months, even years. Often it was produced as one big effort and then not reliably maintained.'
– Gary Patterson, Consultant, Quorum Resources
Organizations are most likely to update documents on an ad hoc basis or via periodic formal reviews. Less than 25% keep SOPs updated as needed.
Source: Info-Tech Research Group; N=104
| Benefits of documented SOPs | Impact of undocumented/undefined SOPs |
|---|---|
| Improved training and knowledge transfer: Routine tasks can be delegated to junior staff (freeing senior staff to work on higher priority tasks). | Without documented SOPs: Tasks will be difficult to delegate, key staff become a bottleneck, knowledge transfer is inconsistent, and there is a longer onboarding process for new staff. |
| IT automation, process optimization, and consistent operations: Defining, documenting, and then optimizing processes enables IT automation to be built on sound processes, so consistent positive results can be achieved. | Without documented SOPs: IT automation built on poorly defined, unoptimized processes leads to inconsistent results. |
| Compliance: Compliance audits are more manageable because the documentation is already in place. | Without documented SOPs: Documenting SOPs to prepare for an audit becomes a major time-intensive project. |
| Transparency: Visually documented processes answer the common business question of “why does that take so long?” | Without documented SOPs: Other areas of the organization may not understand how IT operates, which can lead to confusion and unrealistic expectations. |
| Cost savings: Work can be assigned to the lowest level of support cost, IT operations achieve greater efficiency, and expensive breakdowns are avoided. | Without documented SOPs: Work may be distributed uneconomically, money may be wasted through inefficient processes, and the organization is vulnerable to costly disruptions. |
"Being ITIL and ISO compliant hasn’t solved our documentation problem. We’re still struggling."
– Vendor Relationship Manager, Financial Services Industry
Situation
Incident
Impact
| Hard dollar recovery costs | |
|---|---|
| Backup specialist (vendor) to assist with restoring data from tape | $12,000 |
| Temps to re-enter 1 month of data | $5,000 |
| Weekend OT for 4 people (approximately 24 hours per person) | $5,538 |
| Productivity cost for affected employees for 1 day of downtime | $76,923 |
| Total | $99,462 |
Intangible costs
High “goodwill” impact for internal staff and customers.
"The data loss pointed out a glaring hole in our processes – the lack of an escalation procedure. If I knew backups weren’t being completed, I would have done something about that immediately."
– Senior Division Manager, Information Technology Division
Lean and SOPs
Atrion’s approach
Outcomes
When we initiated a formal process efficiency program a little over a year ago and began striving towards a culture of continuous improvement, documenting our SOPs became key. We capture how we do things today and how to make that process more efficient. We call it current state and future state mapping of any process.
– Michelle Pope, COO, Atrion Networking Corp.
| Common documentation challenges | Info-Tech’s methodology |
|---|---|
| Where to start. For organizations with very few (if any) documented SOPs, the challenge is where to start. | Apply a client focus to prioritize SOPs. Start with mission-critical operations, service management, and disaster recovery. |
| Lack of time. Writing SOPs is viewed as an onerous task, and IT staff typically do not like to write documentation or lack the time. | Use flowcharts, checklists, and diagrams over traditional dense manuals. Flowcharts, checklists, and diagrams take less time to create and maintain, and the output is far more usable than traditional manuals. |
| Inconsistent document management. Documents are unorganized, e.g. hard to find documents, or you don’t know if you have the correct, latest version. | Keep it simple. You don’t need a full-time SOP librarian if you stick to a simple, but consistent approach to documentation management. Simple is easier to follow (therefore, be consistent). |
| Documentation is not maintained. More urgent tasks displace documentation efforts. There is little real motivation for staff to keep documents current. | Ensure accountability at the individual and project level. Incorporate documentation requirements into performance evaluations, project planning, and change control procedures. |
Understand business requirements, clarify capabilities, and close gaps.
Improve reporting and management of incidents and build service request workflows.
Define appropriate objectives for DR, build a roadmap to close gaps, and document your incident response plan.
Position IT as an innovator.
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| 1. Prioritize, optimize, and document critical SOPs | 2. Establish a sustainable documentation process | 3. Identify a content management solution | |
| Best-Practice Toolkit |
1.1 Identify and prioritize undocumented/outdated critical processes 1.2 Reduce effort and improve usability with visual documentation 1.3 Optimize and document critical processes |
2.1 Establish guidelines for identifying and organizing SOPs 2.2 Write an SOP for creating and maintaining SOPs 2.3 Plan SOP working sessions to put a dent into your documentation backlog |
3.1 Understand the options when it comes to content management solutions 3.2 Use Info-Tech’s evaluation tool to determine the right approach for you |
| Guided Implementations |
|
|
|
| Onsite Workshop | Module 1:
Identify undocumented critical processes and review the SOP mapping process. |
Module 2:
Review and improve your documentation process and address your documentation backlog. |
Module 3:
Evaluate strategies for publishing and managing SOP documentation. |
Phase 1 Outcome:
|
Phase 2 Outcome:
|
Phase 3 Outcome:
|
| Workshop Prep | Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
|---|---|---|---|---|---|
| Activities | Scope the SOP pilot and secure resources
|
Prioritize SOPs and review methodology
1.1 Prioritize undocumented SOPs. 1.2 Review the visual approach to SOP planning. 1.3 Conduct a tabletop planning exercise. |
Review SOPs and identify process gaps
2.1 Continue the tabletop planning exercise with other critical processes. 2.2 Conduct a gap analysis to identify solutions to issues discovered during SOP mapping. |
Identify projects to meet process gaps
3.1 Develop a prioritized project roadmap to address gaps. 3.2 Define a process for documenting and maintaining SOPs. 3.3 Identify and assign actions to improve SOP management and maintenance. |
Set next steps and put a dent in your backlog
4.1 Run an SOP working session with experts and process owners to put a dent in the documentation backlog. 4.2 Identify an appropriate content management solution. |
| Deliverables |
|
|
|
|
|
| GI | Measured Value |
|---|---|
| Phase 1: Prioritize, optimize, and document critical SOPs |
|
| Phase 2: Establish a sustainable documentation process |
|
| Phase 3: Identify a content management solution |
|
| Total Savings | $14,720 |
Note: Documenting SOPs provides additional benefits that are more difficult to quantify: reducing the time spent by staff to find or execute processes, improving transparency and accountability, presenting opportunities for automation, etc.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Start with an analyst kick off call:
Then complete these activities…
With this template:
Standard Operating Procedures Workbook
Review findings with analyst:
Then complete these activities…
With these templates:
Finalize phase deliverable:
Then complete these activities…
With this tool:
SOP Project Roadmap Tool
Identify opportunities to deploy visual documentation, and follow Info-Tech’s process to capture steps, gaps, and opportunities to improve IT processes.
| Topic | Description |
|---|---|
| Mission-critical operations |
|
| Service management |
|
| Disaster recovery procedures |
|
| Criteria | Description |
|---|---|
| Is there a hard-dollar impact from downtime? |
|
| Impact on goodwill/customer trust? |
|
| Is regulatory compliance a factor? |
|
| Is there a health or safety risk? |
|
"Email and other Windows-based applications are important for our day-to-day operations, but they aren’t critical. We can still manufacture and ship clothing without them. However, our manufacturing systems, those are absolutely critical"
– Bob James, Technical Architect, Carhartt, Inc.
1.1a
15 minutes
Define criteria for high, medium, and low risks and benefits, as shown in the example below. These criteria will be used in the upcoming exercises to rank SOPs.
Note: The goal in this section is to provide high-level indicators of which SOPs should be documented first, so a high-level set of criteria is used. To conduct a detailed business impact analysis, see Info-Tech’s Create a Right-Sized Disaster Recovery Plan.
Materials
Participants
| Risk to the business | Score |
|---|---|
| Low: Affects ad hoc activities or non-critical data. | 1 |
| Moderate: Impacts productivity and internal goodwill. | 2 |
| High: Impacts revenue, safety, and external goodwill. | 3 |
| Benefit (e.g. productivity improvement) | Score |
|---|---|
| Low: Minimal impact. | 1 |
| Moderate: Items with short-term or occasional applicability, so limited benefit. | 2 |
| High: Save time for common or ongoing processes, and extensive improvement to training/knowledge transfer. | 3 |
1.1b
15 minutes
OUTPUT
Materials
Participants
| Application | SOPs | Status | Risk | Benefit |
|---|---|---|---|---|
| Enterprise Resource Planning (ERP) |
|
Red | 1 | 2 |
|
Red | 2 | 2 | |
|
Green | n/a | n/a | |
| Network services |
|
Yellow | 3 | 2 |
|
Red | 2 | 1 | |
|
Yellow | 3 | 1 |
1.1c
15 minutes
OUTPUT
Materials
Participants
| Service Type | SOPs | Status | Risk | Benefit |
|---|---|---|---|---|
| Service Request |
|
Red | 3 | 1 |
|
Yellow | 3 | 1 | |
|
Green | n/a | n/a | |
| Incident Management |
|
Yellow | 3 | 2 |
|
Red | 2 | 1 | |
|
Yellow | 3 | 1 |
1.1d
20 minutes
OUTPUT
Materials
Participants
| DR Phase | SOPs | Status | Risk | Benefit |
|---|---|---|---|---|
| Discovery and Declaration |
|
Red | 3 | 1 |
|
Yellow | 3 | 1 | |
|
Green | n/a | n/a | |
| Recover Gold Systems |
|
Red | 2 | 2 |
|
Yellow | 3 | 2 | |
| Recover Silver Systems |
|
Red | 2 | 1 |
1.1e
20 minutes
INPUT
OUTPUT
Materials
Participants
| Category | Area | SOPs | Status | Risk | Benefit |
|---|---|---|---|---|---|
| Disaster Recovery Procedures | Discovery and Declaration |
| Red | 3 | 1 |
| Yellow | 3 | 1 | ||
| Mission-Critical Operations | Network Services |
| Yellow | 3 | 2 |
| Service Management Procedures | Incident Management |
| Yellow | 3 | 2 |
"The end result for most SOPs is a 100-page document that makes anyone but the author want to stab themselves rather than read it. Even worse is when you finally decide to waste an hour of your life reading it only to be told afterwards that it might not be quite right because Bob or Stan needed to make some changes last year but never got around to it."
– Peter Church, Solutions Architect
"Without question, 300-page DRPs are not effective. I mean, auditors love them because of the detail, but give me a 10-page DRP with contact lists, process flows, diagrams, and recovery checklists that are easy to follow."
– Bernard Jones, MBCI, CBCP, CORP, Manager Disaster Recovery/BCP, ActiveHealth Management
SOPs, including those that support your disaster recovery plan (DRP), are often created to meet certification requirements. However, this often leads to lengthy overly detailed documentation that is geared to auditors and business leaders, not IT staff trying to execute a procedure in a high-pressure, time-sensitive scenario.
Staff don’t have time to flip through a 300-page manual, let alone read lengthy instructions, so organizations are transforming monster manuals into shorter, visual-based documentation. Benefits include:
Example: DRPs that include visual SOPs are easier to use — that leads to shorter recovery times and fewer mistakes.
See Info-Tech’s Incident and Service Management Procedures – Service Desk Example.
"Flowcharts are more effective when you have to explain status and next steps to upper management."
– Assistant Director-IT Operations, Healthcare Industry
Example: SOP in flowchart format
Many organizations look for an option that easily integrates with the MS Office suite. The default option is often Microsoft Visio.
Pros:
Cons:
Consider the options below if you’re looking for an alternative to Microsoft Visio:
Desktop Solutions
Note: No preference or recommendation is implied from the ordering of the options above.
This list is not intended to be comprehensive.
| Criteria | Description |
|---|---|
| Platform | What platform(s) can run the software? |
| Description | What use cases are identified by the vendor – and do these cover your needs for documenting your SOPs? Is the software open source? |
| Features | What are the noteworthy features and characteristics? |
| Usability | How easy is the program to use? What’s the learning curve like? How intuitive is the design? |
| Templates and Stencils | Availability of templates and stencils. |
| Portability | Can the solution integrate with other pieces of software? Consider whether other tools can view, open, and/or edit documents; what file formats can be published, etc. |
| Cost | Cost of the software to purchase or license. |
For two different examples of a checklist template, see:
"Our network engineers came to me and said our standard SOP template didn't work for them. They're now using a lot of diagrams and flowcharts, and that has worked out better for them."
"When contractors come onboard, they usually don't have a lot of time to learn about the organization, and we have a lot of unique requirements. Creating SOP documents with screenshots has made the process quicker and more accurate."
– Susan Bellamore, Business Analyst, Public Guardian and Trustee of British Columbia
Review Info-Tech’s Incident Response and Recovery Process Flows – DRP Example.
Example: DRP flowchart with links to supporting documents
Start, End, and Connector. Traditional flowcharting standards reserve this shape for connectors to other flowcharts or other points in the existing flowchart. Unified Modeling Language (UML) also uses the circle for start and end points.
Start, End. Traditional flowcharting standards use this for start and end. However, Info-Tech recommends using the circle shape to reduce the number of shapes and avoid confusion with other similar shapes.
Process Step. Individual process steps or activities (e.g. create ticket or escalate ticket). If it’s a series of steps, then use the sub-process symbol and flowchart the sub-process separately.
Sub-Process. A series of steps. For example, a critical incident SOP might reference a recovery process as one of the possible actions. Marking it as a sub-process, rather than listing each step within the critical incident SOP, streamlines the flowchart and avoids overlap with other flowcharts (e.g. the recovery process).
Decision. Represents decision points, typically with Yes/No branches, but you could have other branches depending on the question (e.g. a “Priority?” question could branch into separate streams for Priority 1, 2, 3, 4, and 5 issues).
Document/Report Output. For example, the output from a backup process might include an error log.
1.3a
20 minutes
OUTPUT
Materials
Participants
Info-Tech Insight
Don’t get weighed down by tools. Relying on software or other technological tools can detract from the exercise. Use simple tools such as cue cards to record steps so that you can easily rearrange steps or insert steps based on input from the group.
1.3b
20 minutes
Review the tabletop exercise. What gaps exist in current processes?
How can the process be made better? What are the outputs and checkpoints?
OUTPUT
Materials
Participants
A note on colors: Use white cards to record steps. Record gaps on yellow cards (e.g. a process step not documented) and risks on red cards (e.g. only one person knows how to execute a step) to highlight your gaps/to-dos and risks to be mitigated or accepted.
If it’s necessary to clarify complex process flows during the exercise, also use green cards for decision diamonds, purple for document/report outputs, and blue for sub-processes.
1.3
| Industry | Government (700+ FTEs) |
| Source | Info-Tech Workshop |
1.3c
20 minutes
OUTPUT
Materials
Participants
As a reminder, the steps are:
Info-Tech Insight
If you plan to document more than two or three SOPs at once, consider making it an SOP “party” to add momentum and levity to an otherwise dry process. Review section 2.3 to find out how.
Get started by prioritizing SOPs
Ensure the SOP project remains business focused, and kick off the project by analyzing critical business services. Identify key IT services that support the relevant business services. Conduct a benefit/risk analysis to prioritize which SOPs should become the focus of the workshop.
Document the SOPs from the tabletop exercise
Leverage a tabletop planning exercise to walk the team through the SOP. During the exercise, focus on identifying timelines, current gaps, and potential risks. Document the steps via que cards first and transpose the hard copies to an electronic version.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 4 weeks
Start with an analyst call:
Then complete these activities…
With these tools & templates:
Review findings with analyst:
Then complete these activities…
With these tools & templates:
Finalize phase deliverable:
Then complete these activities…
With these tools & templates:
Improve the process for documenting and maintaining your SOPs, while putting a dent in your documentation backlog and gaining buy-in with staff.
What is the current state of your content management practices?
Are you using a content management system? If not, where are documents kept?
Are your organizational or departmental SOPs easy to find?
Is version control a problem? What about file naming standards?
Get everyone on the same page on the current state of your SOP document management system, using the questions above as the starting point.
Whether you store SOPs in a sophisticated content management system (CMS) or on a shared network drive, keep it simple and focus on these primary goals:
Include a document information block on the first page of every document to identify key attributes. This strategy is as much about minimizing resistance as it is ensuring key attributes are captured.
Note: The Info-Tech templates in this blueprint include a copy of the document information block shown in this example. Add more fields if necessary for your organization’s needs.
For an example of a completed document information block, see Network Backup for Atlanta Data Center – Backups Example
Info-Tech Insight
For organizations with more advanced document management requirements, consider more sophisticated strategies (e.g. using metadata) as described in Info-Tech’s Use SharePoint for Enterprise Content Management and Reintroduce the Information Lifecycle to the Content Management Strategy. However, the basic concepts above still apply: establish standard attributes you need to capture and do so in a consistent manner.
2.1a
15 minutes
OUTPUT
Materials
Participants
Use the following filename format to create consistent, searchable, and descriptive filenames:
Topic – Document Title – Document Type – Version Date
| Filename Component | Purpose |
|---|---|
| Topic |
|
| Document Title |
|
| Document Type | Further distinguishes similar files (e.g. Maintenance SOP vs. a Maintenance Checklist). |
| Version Date (for local files or if not using a CMS) |
|
For example:
2.1b
15 minutes
INPUT
OUTPUT
Materials
Participants
Always keep one master version of a document:
Ideally, staff would never keep local copies of files. However, there are times when it is practical or preferable to work from a local copy: for example, when creating or updating an SOP, or when working remotely if the CMS is not easily accessible.
Implement the following policies to govern these circumstances:
Reduce the need for version updates by isolating volatile information in a separate, linked document. For example:
2.1c
15 minutes
OUTPUT
Materials
Participants
See Info-Tech’s Document Management Checklist.
The following best practices were measured in this chart, and will be discussed further in this section:
Info-Tech Insight
Audits for compliance requirements have little impact on getting SOPs done in a timely manner or the actual usefulness of those SOPs, because the focus is on passing the audit instead of creating SOPs that improve operations. The frantic annual push to complete SOPs in time for an audit is also typically a much greater effort than maintaining documents as part of ongoing change management.
When are documentation requirements captured, including required changes to SOPs?
Make documentation requirements a clearly defined deliverable. As with any other task, this should include:
Info-Tech Insight
Realistically, documentation will typically be a far less urgent task than the actual application or system changes. However, if you want the necessary documentation to be ultimately completed, even if it’s done after more urgent tasks, it must be tracked.
How do you currently review and validate SOP documents?
Require a manager or supervisor to review and approve SOPs.
Check documentation status as part of change management.

"Our directors and our CIO have tied SOP work to performance evaluations and SOP status is reviewed during management meetings. People have now found time to get this work done."
– Assistant Director-IT Operations, Healthcare Industry
Industry
Public service organization
Source
Info-Tech client engagement
The bottom line: ensure that there’s one approver per process to drive process efficiency and accountability and avoid problems down the road.
Are SOP updates treated as optional or “when I have time” work?
Hold staff directly accountable for SOP work.
Holding staff accountable is really about emphasizing the importance of ensuring SOPs stay current. If management doesn’t treat SOPs as a priority, then neither will your staff. Strategies include:
Info-Tech Insight
Holding staff accountable does not by itself make a significant impact on SOP quality (and therefore the typical benefits of SOPs), but it minimizes procrastination, so the work is ultimately done in a more timely manner. This ensures SOPs are current and usable, so they can drive benefits such as consistent operations, improved training, and so on.
2.2
| Challenge | Action Items | Action Item Owner |
|---|---|---|
| Documentation requirements are identified at the end of a project. |
|
Bob Ryan |
| SOPs are not reviewed. |
|
Susan Jones |
2.3
| SOP or Task | Action Items | Action Item Owner |
|---|---|---|
| Ticket escalation SOP |
|
Jeff Sutter |
| SOP party |
|
Bob Smith |
Identify current content management practices
As a group, identify current pain points and opportunities for improvement in your current content management practices.
Assign action items to address documentation process challenges
Develop a list of action items to address gaps in the SOP documentation and maintenance process.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1 week
Start with an analyst kick off call:
Then complete these activities…
Review findings with analyst:
Then complete these activities…
With these tools & templates:
Choose an approach to content management that will best support your organization’s SOP documentation and maintenance process.
This section reviews the following approaches, their pros and cons, and how they meet publishing and document management requirements:
Source: Info-Tech Research Group; N=118
Note: Percentages total more than 100% due to respondents using more than one portability strategy.
Segment
Mid-market company
Source
Info-Tech Interview
| Role | How myPolicies helps you | |
|---|---|---|
| Policy Sponsors |
|
Reduced Corporate Risk Avoid being issued a regulatory fine or sanction that could jeopardize operations or hurt brand image. |
| Policy Reviewers |
|
A Culture of Compliance Adherence with regulatory requirements as well as documented audit trail of all critical policy activities. |
| Policy Owners |
|
Less Administrative Burden Automation and simplification of policy creation, distribution, and tracking. |
| Policy Users |
|
Policy Clarity Well-written policies are stored in one reliable, easy to navigate location. |
myPolicies is a web-based solution to create, distribute, and manage corporate policies, procedures, and forms, built around best practices identified by our research.
Contact your Account Manager today to find out if myPolicies is right for you.
SOP tools such as Princeton Center’s SOP ExpressTM and SOP Tracks or MasterControl’s SOP Management and eSOP allow organizations to create, manage, and access SOPs. These programs typically offer a range of SOP templates and formats, electronic signatures, version control, and review options and training features such as quizzes and monitoring.
Similarly, DR planning solutions (e.g. eBRP, Recovery Planner, LDRPS, etc.) provide templates, tools, and document management to create DR documentation including SOPs.
For more information on SharePoint as a content management solution, see Info-Tech’s Use SharePoint for Enterprise Content Management.
Most SOP documents start as MS Office documents, even if there is an SOP tool available (some SOP tools actually run within MS Office on the desktop). For organizations that decide to bypass a formal SOP tool, the biggest gap they have to overcome is document management.
Many organizations are turning to SharePoint to meet this need. For those that already have SharePoint in place, it makes sense to further leverage SharePoint for SOP documentation.
For SharePoint to be a practical solution, the documentation must still be accessible if the primary data center is down, e.g. by having redundant SharePoint instance at multiple in-house locations or using a cloud-based SharePoint solution.
As an alternative to SharePoint, SaaS tools such as Power DMS, NetDocuments, Xythos on Demand, Knowledge Tree, Spring CM, and Zoho Docs offer cloud-based document management, authoring, and distribution services that can work well for SOPs. Some of these, such as Power DMS and Spring CM, are geared specifically toward workflows.
Wiki sites are websites where users collaborate to create and edit the content. Wikipedia is an example.
While wiki sites are typically used for collaboration and dynamic content development, the traditional collaborative authoring model can be restricted to provide structure and an approval process.
Several tools are available to create and manage wiki sites (and other collaboration solutions), as outlined in the following research:
An approach that I’ve seen work well is to consult the wiki for any task, activity, job, etc. Is it documented? If not, then document it there and then. Sure, this led to 6-8 weeks of huge effort, but the documentation grew in terms of volume and quality at an alarming but pleasantly surprising rate. Providing an environment to create the documentation is important and a wiki is ideal. Fast, lightweight, in-browser editing leads to little resistance in creating documents.
- Lee Blackwell, Global IT Operation Services Manager, Avid Technology
With this strategy, SOP documents are stored and managed locally on a shared network drive. Only process owners and administrators have read-write permissions on documents on the shared drive.
The administrator grants access and manages security permissions.
Info-Tech Insight
For small organizations, the shared network drive approach can work, but this is ultimately a short-term solution. Move to an online library by creating a wiki site. Start slow by beginning with a particular department or project, then evaluate how well your staff adapt to this technology as well as its potential effectiveness in your organization. Refer to the Info-Tech collaboration strategy research cited on the previous slide for additional guidance.
Traditionally, SOPs were printed and kept somewhere in a large binder (or several large binders). This isn’t adequate to the needs of most organizations and typically results in documents that aren’t up to date or effective.
All organizations have existing document management methodologies, even if it’s simply storing documents on a network drive.
Use Info-Tech’s solution evaluation tool to decide whether your existing solution meets the portability/external access, maintainability/usability, and cost/effort criteria, or whether you need to explore a different option.
Note: This tool was originally built to evaluate DRP publishing options, so the tool name and terminology refers to DR. However, the same tool can be used to evaluate general SOP publishing and document management solutions.
Info-Tech Insight
There is no absolute ranking for possible solutions. The right choice will depend on factors such as current in-house tools, maturity around document management, the size of your IT department, and so on. For example, a small shop may do very well with the USB drive strategy, whereas a multi-national company will need a more formal strategy to ensure consistent application of corporate guidelines.
Decide on a publishing and document management strategy
Review the pros and cons of different strategies for publishing and document management. Identify needs, priorities, and limitations of your environment. Create a shortlist of options that can meet your organization’s needs and priorities.
Complete the solution evaluation tool
Evaluate solutions on the shortlist to identify the strongest option for your organization, based on the criteria of maintainability, affordability, effort to implement, and accessibility/portability.
SOPs may not be exciting, but they’re very important to organizational consistency, efficiency, and improvement.
This blueprint outlined how to:
As part of completing this project, the following deliverables were completed:
Client Project: Create and maintain visual SOP documentation.
Info-Tech Insight
This project has the ability to fit the following formats:
Anderson, Chris. “What is a Standard Operating Procedure (SOP)?” Bizmanualz, Inc. No date. Web. 25 Jan. 2016. https://www.bizmanualz.com/save-time-writing-procedures/what-are-policies-and-procedures-sop.html
Grusenmeyer, David. “Developing Effective Standard Operating Procedures.” Dairy Business Management. 1 Feb. 2003. Web. 25 Jan. 2016. https://ecommons.cornell.edu/handle/1813/36910
Mosaic. “The Value of Standard Operating Procedures.” 22 Oct. 2012. Web. 25 Jan. 2016. ttp://www.mosaicprojects.com.au/WhitePapers/WP1086_Standard_Operating_Procedures.pdf
Sinn, John W. “Lean, Six Sigma, Quality Transformation Toolkit (LSSQTT) Tool #17 Courseware Content – Standard Operating Procedures (SOP) For Lean and Six Sigma: Infrastructure for Understanding Process.” Summer 2006. Web. 25 Jan. 2016. https://www.bgsu.edu/content/dam/BGSU/college-of-technology/documents/LSSQTT/LSSQTT%20Toolkit/toolkit3/LSSQTT-Tool-17.pdf
United States Environmental Protection Agency. “Guidance for Preparing Standard Operating Procedures (SOPs).” April 2007. Web. 25 Jan. 2016. http://www.epa.gov/sites/production/files/2015-06/documents/g6-final.pdf
We have the highest respect for your person. We contact you only with responses to your questions. Our company ethics insist on transparency and honesty.
This 2023-Q1 research agenda slide deck provides you with a comprehensive overview of our most up-to-date published research. Each piece offers you valuable insights, allowing you to take effective decisions and informed actions. All TY|Info-tech research is backed by our team of expert analysts who share decades of IT and industry experience.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Learn how to apply the Digital Value Pools thought model and scope strategy around them.
Identify business imperatives, define digital outcomes, and define the strategy’s guiding principles.
Define, prioritize, and roadmap digital initiatives and plan contingencies.
Create, polish, and socialize the Digital Strategy-on-a-Page.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify the need for and use of digital strategy and determine a realistic scope for the digital strategy.
The digital strategy project is planned and scoped around a subset of the five digital value pools.
1.1 Introduction to digital strategy.
1.2 Establish motivation for digital.
1.3 Discuss in-flight digital investments.
1.4 Define the scope of digital.
1.5 Identify stakeholders.
1.6 Perform discovery interviews.
1.7 Select two value pools to focus day 2, 3, and 4 activities.
Business model canvas
Stakeholder power map
Discovery interview results
Two value pools for focus throughout the workshop
Create guiding principles to help define future digital initiatives. Generate the target state with the help of strategic goals.
Establish the basis for planning out the initiatives needed to achieve the target state from the current state.
2.1 Identify digital imperatives.
2.2 Define key digital outcomes.
2.3 Create a digital investment thesis.
2.4 Define digital guiding principles.
Corporate strategy analysis, PESTLE analysis, documented operational pain points (value streams)
Customer needs assessment (journey maps)
Digital investment thesis
Digital guiding principles
Understand the gap between the current and target state. Create transition options and assessment against qualitative and quantitative metrics to generate a list of initiatives the organization will pursue to reach the target state. Build a roadmap to plan out when each transition initiative will be implemented.
Finalize the initiatives the organization will use to achieve the target digital state. Create a roadmap to plan out the timing of each initiative and generate an easy-to-present document for digital strategy approval.
3.1 Identify initiatives to achieve digital outcomes.
3.2 Align in-flight initiatives to digital initiatives.
3.3 Prioritize digital initiatives.
3.4 Document architecturally significant requirements for high-priority initiatives.
Digital outcomes and KPIs
Investment/value pool matrix
Digital initiative prioritization
Architecturally significant requirements for high-priority initiatives
Plan your approach to socializing the digital strategy to help facilitate the cultural changes necessary for digital transformation.
Plant the seed of digital and innovation to start making digital a part of the organization’s DNA.
4.1 Review and refine Digital Strategy on a Page.
4.2 Assess company culture.
4.3 Define high-level cultural changes needed for successful transformation.
4.4 Define the role of the digital transformation team.
4.5 Establish digital transformation team membership and desired outcomes.
Digital Strategy on a Page
Strategyzer Culture Map
Digital transformation team charter
Once upon a time, a young woman named Emma lived a hectic professional life. She was always running around, making decisions, and trying to stay ahead in the competitive world of entrepreneurship. However, she felt overwhelmed and stressed on the battlefield, and she couldn't seem to make the right choices no matter how hard she tried.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create your minimum viable business architecture.
If there are a handful of capabilities that your business needs to focus on right now, what are they?
Identify business opportunities.
Enrich your capability model.
Organizations risk being locked in a circular trap of inertia from auto-renewing their software. With inertia comes complacency, leading to a decrease in overall satisfaction. Indeed, organizations are uniformly choosing to renew their software – even if they don’t like the vendor!
Renewal is an opportunity cost. Switching poorly performing software substantially drives increased satisfaction, and it potentially lowers vendor costs in the process. To realize maximum gains, it’s essential to have a repeatable process in place.
Realize the benefits of switching by using Info-Tech’s five action steps to optimize your vendor switching processes:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this outline of key statistics to help make the business case for switching poorly performing software.
Optimize your software vendor switching processes with five action steps.
Despite the universally agreed-upon benefit of formulating a coherent strategy, several obstacles make execution difficult:
A cloud strategy might seem like a big project, but it’s just a series of smaller conversations. The methodology presented here is designed to facilitate those conversations, using a curated list of topics, prompts, participant lists, and sample outcomes. We have divided the strategy into four key areas:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard comprises four phases, covering mission and vision, people, governance, and technology, and how each of these areas requires forethought when migrating to the cloud.
Each section of Document Your Cloud Strategy corresponds to a section in the document template. Once you’ve completed each exercise, you can record your results in the document template, leaving you with an artifact you can share with stakeholders.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand and document your cloud vision and its alignment with your other strategic priorities.
A complete understanding of your strategy, vision, alignment, and a list of success metrics that will help you find your way.
1.1 Record your cloud mission and vision.
1.2 Document your cloud strategy’s alignment with other strategic plans.
1.3 Record your cloud guiding principles.
Documented strategy, vision, and alignment.
Defined success metrics.
Define how people, skills, and roles will contribute to the broader cloud strategy.
Sections of the strategy that highlight skills, roles, culture, adoption, and the creation of a governance body.
2.1 Outline your skills and roles strategy.
2.2 Document your approach to culture and adoption
2.3 Create a cloud governing body.
Documented people strategy.
This section facilitates governance in the cloud, developing principles that apply to architecture, integration, finance management, and more.
Sections of the strategy that define governance principles.
3.1 Conduct discussion on architecture.
3.2 Conduct discussion on integration and interoperability.
3.3 Conduct discussion on operations management.
3.4 Conduct discussion on cloud portfolio management.
3.5 Conduct discussion on cloud vendor management.
3.6 Conduct discussion on finance management.
3.7 Conduct discussion on security.
3.8 Conduct discussion on data controls.
Documented cloud governance strategy.
Creation of a formal cloud strategy relating to technology around provisioning, monitoring, and migration.
Completed strategy sections of the document that cover technology areas.
4.1 Formalize organizational approach to monitoring.
4.2 Document provisioning process.
4.3 Outline migration processes and procedures.
Documented cloud technology strategy.
Moving to the cloud is a big, scary transition, like moving from gas-powered to electric cars, or from cable to streaming, or even from the office to working from home. There are some undeniable benefits, but we must reorient our lives a bit to accommodate those changes, and the results aren’t always one-for-one. A strategy helps you make decisions about your future direction and how you should respond to changes and challenges. In Document Your Cloud Strategy we hope to help you accomplish just that: clarifying your overall mission and vision (as it relates to the cloud) and helping you develop an approach to changes in technology, people management, and, of course, governance. The cloud is not a panacea. Taken on its own, it will not solve your problems. But it can be an important tool in your IT toolkit, and you should aim to make the best use of it – whatever “best” happens to mean for you.
Jeremy Roberts
Research Director, Infrastructure and Operations
Info-Tech Research Group
The cloud is multifaceted. It can be complicated. It can be expensive. Everyone has an opinion on the best way to proceed – and in many cases has already begun the process without bothering to get clearance from IT. The core challenge is creating a coherent strategy to facilitate your overall goals while making the best use of cloud technology, your financial resources, and your people.
Despite the universally agreed-upon benefit of formulating a coherent strategy, several obstacles make execution difficult:
A cloud strategy might seem like a big project, but it’s just a series of smaller conversations. The methodology presented here is designed to facilitate those conversations, using a curated list of topics, prompts, participant lists, and sample outcomes. We have divided the strategy into four key areas:
The answers might be different, but the questions are the same
Every organization will approach the cloud differently, but they all need to ask the same questions: When will we use the cloud? What forms will our cloud usage take? How will we manage governance? What will we do about people? How will we incorporate new technology into our environment? The answers to these questions are as numerous as there are people to answer them, but the questions must be asked.
Grappling with a cloud strategy is a top initiative: 43% of respondents report progressing on a cloud-first strategy as a top cloud initiative.
A document providing a systematic overview of cloud services, their appropriate use, and the steps that an organization will take to maximize value and minimize risk.
Define Your Cloud Vision |
→ |
Vision and alignment
|
→ | Technology
|
Governance
|
||||
|
People
|
Your cloud strategy will comprise the elements listed under “vision and alignment,” “technology,” “governance,” and “people.” The Info-Tech methodology involves breaking the strategy down into subcomponents and going through a three-step process for each one. Start by reviewing a standard set of questions and understanding the goal of the exercise: What do we need to know? What are some common considerations and best practices? Once you’ve had a chance to review, discuss your current state and any gaps: What has been done? What still needs to be done? Finally, outline how you plan to go forward: What are your next steps? Who needs to be involved?
1. Document your vision and alignment |
2. Record your people strategy |
3. Document governance principles |
4. Formalize your technology strategy |
|
|---|---|---|---|---|
Phase Steps |
|
|
Document official organizational positions in these governance areas:
|
|
Phase Outcomes |
Documented strategy: vision and alignment |
Documented people strategy |
Documented cloud governance strategy |
Documented cloud technology strategy |
Separate strategy from tactics
Separate strategy from tactics! A strategy requires building out the framework for ongoing decision making. It is meant to be high level and achieve a large goal. The outcome of a strategy is often a sense of commitment to the goal and better communication on the topic.
The cloud does not exist in a vacuum
Your cloud strategy flows from your cloud vision and should align with the broader IT strategy. It is also part of a pantheon of strategies and should exist harmoniously with other strategies – data, security, etc.
People problems needn’t preponderate
The cloud doesn’t have to be a great disruptor. If you handle the transition well, you can focus your people on doing more valuable work – and this is generally engaging.
Governance is a means to an end
Governing your deployment for its own sake will only frustrate your end users. Articulate the benefits users and the organization can expect to see and you’re more likely to receive the necessary buy-in.
Technology isn’t a panacea
Technology won’t solve all your problems. Technology is a force multiplier, but you will still have to design processes and train your people to fully leverage it.
Cloud Strategy Document template
Inconsistency and informality are the enemies of efficiency. Capture the results of the cloud strategy generation exercises in the Cloud Strategy Document template.
IT benefits |
Business benefits |
|---|---|
|
|
8.8/10 Average reported satisfaction
13 Days Average reported time savings
$46,499 Average cost savings
INDUSTRY: Pharmaceuticals
SOURCE: Info-Tech workshop
The unnamed pharmaceutical company that is the subject of this case study was looking to make the transition to the cloud. In the absence of a coherent strategy, the organization had a few cloud deployments with no easily discernable overall approach. Representatives of several distinct functions (legal, infrastructure, data, etc.) all had opinions on the uses and abuses of cloud services, but it had been difficult to round everyone up and have the necessary conversations. As a result, the strategy exercise had not proceeded in a speedy or well-governed way. This lack of strategic readiness presented a roadblock to moving forward with the cloud strategy and to work with the cloud implementation partner, tasked with execution.
Results
The company engaged Info-Tech for a four-day workshop on cloud strategy documentation. Over the course of four days, participants drawn from across the organization discussed the strategic components and generated consensus statements and next steps. The team was able to formalize the cloud strategy and described the experience as saving 10 days.
Example output: Document your cloud strategy workshop exercise
Anything in green, the team was reasonably sure they had good alignment and next steps. Those yellow flags warranted more discussion and were not ready for documentation.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
Document your vision and alignment |
Record your people strategy |
Document governance principles |
Formalize your technology strategy |
|---|---|---|---|
Call #1: Review existing vision/strategy documentation. |
Call #2: Review progress on skills, roles, and governance bodies. |
Call #3: Work through integration, architecture, finance management, etc. based on reqs. (May be more than one call.) |
Call #4: Discuss challenges with monitoring, provisioning, and migration as-needed. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is 4 to 6 calls over the course of 1 to 3 months
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Day 1 |
Day 2 |
Day 3 |
Day 4 |
Day 5 |
|
|---|---|---|---|---|---|
Answer |
Define the |
Assess the IT |
Bridge the gap and |
Next steps and |
|
Activities |
1.1 Introduction 1.2 Discuss cloud mission and vision 1.3 Discuss alignment with other strategic plans 1.4 Discuss guiding principles 1.5 Define success metrics |
2.1 Discuss skills and roles 2.2 Review culture and adoption 2.3 Discuss a cloud governing body 2.4 Review architecture position 2.5 Discuss integration and interoperability |
3.1 Discuss cloud operations management 3.2 Review cloud portfolio management 3.3 Discuss cloud vendor management 3.4 Discuss cloud finance management 3.5 Discuss cloud security |
4.1 Review and formalize data controls 4.2 Design a monitoring approach 4.3 Document the workload provisioning process 4.4 Outline migration processes and procedures |
5.1 Populate the Cloud Strategy Document |
Deliverables |
Formalized cloud mission and vision, along with alignment with strategic plans, guiding principles, and success metrics |
Position statement on skills and roles, culture and adoption, governing bodies, architecture, and integration/interoperability |
Position statements on cloud operations management, portfolio management, vendor management, finance management, and cloud security |
Position statements on data controls, monitoring, provisioning, and migration |
Completed Cloud Strategy Document |
Phase 1 |
Phase 2 |
Phase 3 |
Phase 4 |
|---|---|---|---|
|
1.1 Document your mission and vision 1.2 Document alignment to other strategic plans 1.3 Document guiding principles 1.4 Document success metrics |
2.1 Define approach to skills and roles 2.2 Define approach to culture and adoption 2.3 Define cloud governing bodies |
3.1 Define architecture direction 3.2 Define integration approach 3.3 Define operations management process 3.4 Define portfolio management direction 3.5 Define vendor management direction 3.6 Document finance management tactics 3.7 Define approach to cloud security 3.8 Define data controls in the cloud |
4.1 Define cloud monitoring strategy 4.2 Define cloud provisioning strategy 4.3 Define cloud migration strategy |
This phase will walk you through the following activities:
This phase has the following outcome:
Before formally documenting your cloud strategy, you should ensure that you have a good understanding of your overall cloud vision. How do you plan to leverage the cloud? What goals are you looking to accomplish? How will you distribute your workloads between different cloud service models (SaaS, PaaS, IaaS)? What will your preferred delivery model be (public, private, hybrid)? Will you support your cloud deployment internally or use the services of various consultants or managed service providers?
The answers to these questions will inform the first section of your cloud strategy. If you haven’t put much thought into this or think you could use a deep dive on the fundamentals of your cloud vision and cloud archetypes, consider reviewing Define Your Cloud Vision, the companion blueprint to this one.
Once you understand your cloud vision and what you’re trying to accomplish with your cloud strategy, this phase will walk you through aligning the strategy with other strategic initiatives. What decisions have others made that will impact the cloud strategy (or that the cloud strategy will impact)? Who must be involved/informed? What callouts must be involved at what point? Do users have access to the appropriate strategic documentation (and would they understand it if they did)?
You must also capture some guiding principles. A strategy by its nature provides direction, helping readers understand the decisions they should make and why those decisions align with organizational interests. Creating some top-level principles is a useful exercise because those principles facilitate comprehension and ensure the strategy’s applicability.
Finally, this phase will walk you through the process of measuring success. Once you know where you’d like to go, the principles that underpin your direction, and how your cloud strategy figures into the broader strategic pantheon, you should record what success actually means. If you’re looking to save money, overall cost should be a metric you track. If the cloud is all about productivity, generate appropriate productivity metrics. If you’re looking to expand into new technology or close a datacenter, you will need to track output specific to those overall goals.
The overall organizational mission is a key foundational element of the cloud strategy. If you don’t understand where you’re going, how can you begin the journey to get there? This section of the strategy has four key parts that you should understand and incorporate into the beginning of the strategy document. If you haven’t already, review Define Your Cloud Vision for instructions on how to generate these elements.
|
1. Cloud vision statement: This is a succinct encapsulation of your overall perspective on the suitability of cloud services for your environment – what you hope to accomplish. The ideal statement includes a scope (who/what does the strategy impact?), a goal (what will it accomplish?), and a key differentiator (what will make it happen?). This is an example: “[Organization] will leverage public cloud solutions and retire existing datacenter and colocation facilities. This transition will simplify infrastructure administration, support and security, while modernizing legacy infrastructure and reducing the need for additional capital expenditure.” You might also consider reviewing your overall cloud archetype (next slide) and including the output of that exercise in the document |
2. Service model decision framework: Services can be provided as software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), or they can be colocated or remain on premises. Not all cloud service models serve the same purpose or provide equal value in all circumstances. Understanding how you plan to take advantage of these distinct service models is an important component of the cloud strategy. In this section of the strategy, a rubric that captures the characteristics of the ideal workload for each of the named service models, along with some justification for the selection, is essential. This is a core component of Define Your Cloud Vision, and if you would like to analyze individual workloads, you can use the Cloud Vision Workbook for that purpose. |
|
3. Delivery model decision framework: Just as there are different cloud service models that have unique value propositions, there are several unique cloud delivery models as well, distinguished by ownership, operation, and customer base. Public clouds are the purview of third-party providers who make them available to paying customers. Private clouds are built for the exclusive use of a designated organization or group of organizations with internal clients to serve. Hybrid clouds involve the use of multiple, interoperable delivery models (interoperability is the key term here), while multi-cloud deployment models incorporate multiple delivery and service models into a single coherent strategy. What will your preferred delivery model be? Why? |
4. Support model decision framework: Once you have a service model nailed down and understand how you will execute on the delivery, the question then becomes about how you will support your cloud deployment going forward. Broadly speaking, you can choose to manage your deployment in house using internal resources (e.g. staff), to use managed service providers for ongoing support, or to hire consultants to handle specific projects/tasks. Each approach has its strengths and weaknesses, and many cloud customers will deploy multiple support models across time and different workloads. A foundational perspective on the support model is a key component of the cloud vision and should appear early in the strategy. |
Once you understand the value of the cloud, your workloads’ general suitability for the cloud, and your proposed risks and mitigations, the next step is to define your cloud archetype. Your organization’s cloud archetype is the strategic posture that IT adopts to best support the organization’s goals. Info-Tech’s model recognizes seven archetypes, divided into three high-level archetypes. After consultation with your stakeholders, and based on the results of the suitability and risk assessment activities, define your archetype. The archetype feeds into the overall cloud vision and provides simple insight into the cloud future state for all stakeholders. The cloud vision itself is captured in a “vision statement,” a short summary of the overall approach that includes the overall cloud archetype.
We can best support the organization’s goals by: |
||
Cloud-Focused |
Cloud-Centric |
Providing all workloads through cloud delivery. |
Cloud-First |
Using the cloud as our default deployment model. For each workload, we should ask “why NOT cloud?” |
|
Cloud-Opportunistic |
Hybrid |
Enabling the ability to transition seamlessly between on-premises and cloud resources for many workloads. |
Integrated |
Combining cloud and traditional infrastructure resources, integrating data and applications through APIs or middleware. |
|
Split |
Using the cloud for some workloads and traditional infrastructure resources for others. |
|
Cloud-Averse |
Cloud-Light |
Using traditional infrastructure resources and limiting our use of the cloud to when it is absolutely necessary. |
Anti-Cloud |
Using traditional infrastructure resources and avoiding the use of cloud wherever possible. |
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Enter your data into our tool. Compare your own ITSM ticket fields to improve ticket data moving forward.
Use the ticket analysis tool as a guide to build your own operational dashboards to measure metrics over time. Gain actionable insights from your data.
Use the data to communicate your findings to the business and leadership using the Ticket Analysis Report.
![]() Benedict Chang
|
![]() Ken Weston ITIL MP, PMP, Cert.APM, SMC
|
Service desks improve their services by leveraging ticket data to inform their actions. However, many organizations don’t know where to start. It’s tempting to wait for perfect data, but there’s a lot of value in analyzing your ticket data as it exists today.
Start small. Track key tension metrics based on the out-of-the-box functionality in your tool. Review the metrics regularly to stay on track.
By reviewing your ticket data, you’re going to get better organically. You’re going to learn about the state of your environment, the health of your processes, and the quality of your services. Regularly analyze your data to drive improvements.
Make ticket analysis a weekly habit. Every week, you should be evaluating how the past week went. Every month, you should be looking for patterns and trends.
Leverage your service desk ticket data to gain insights for improving your operations:
Properly analyzing ticket data is challenging for the following reasons:
Info-Tech’s approach to improvement:
Analyze your ticket data to help continually improve your service desk.
Give yourself time to observe the new metrics and draw enough insights to make recommendations for improvement. Then, execute on those recommendations. Slow and steady improvement of the service desk only adds business value and will have a positive impact on customer satisfaction.
Analyzing ticket data involves:
36% of organizations are prioritizing ticket handling in IT for 2021 (Source: SDI, 2021)
12% of organizations are focusing directly on service desk improvement (Source: SDI, 2021)
Missing or Inaccurate Information
Missing Updates
Correlating Tickets to Identify Trends
|
No Time
Ineffective Categorization Schemes
Tool Limitations
|
Your data will show you where you can improve.
As you act on your data, you should see:
See Info-Tech’s blueprint Optimize the Service Desk With a Shift-Left Strategy.
| 1. Import Your Ticket Data | 2. Analyze Your Ticket Data | 3. Communicate Your Insights | |
| Phase Steps |
|
|
|
| Phase Outcomes | Enter your data into our tool. Compare your own ITSM ticket fields to improve ticket data moving forward. | Use the Service Desk Ticket Analysis Tool as a guide to build your own operational dashboards to measure metrics over time. Gain actionable insights from your data. | Use the data to communicate your findings to the business and leadership using the Ticket Analysis Report. |
Give yourself time to observe the new metrics and draw enough insights to make recommendations for improvement. Then, execute on those recommendations. Slow and steady improvement of the service desk only adds business value and will have a positive impact on customer satisfaction.
Tracking the right data in your ticket can be challenging if you don’t know what you’re looking for. Start with standardized fields and iterate on your data analysis to figure out your gaps and needs.
If you have service desk challenges, you will need to allocate time to process improvement. However, prioritizing your initiatives is easier if you have the ticket data to point you in the right direction.
Service desks don’t need three years’ worth of data. Focus on gathering data for one business cycle (e.g. three months). That will give you enough information to start generating value.
Leverage the data to drive organizational and process change in your organization by tracking meaningful metrics. Choose those metrics using business-aligned goals.
Single metrics in isolation, even if measured over time, may not tell the whole story. Make sure you design tension metrics where necessary to get a holistic view of your service desk.
| This blueprint’s key deliverable is a ticket analysis tool. Many of the activities throughout this blueprint will direct you to complete and interpret this tool. | The other main deliverable is a stakeholder presentation template to help you document the outcomes of the project. |
| Service Desk Ticket Analysis Tool | Ticket Analysis Report |
| Use this tool to identify trends and patterns in your ticket data to action improvement initiatives.
|
Use this template to document the justification for addressing service desk improvement, the results of your analysis, and your next steps.
|
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 3-4 calls over the course of 2-3 months.
What does a typical GI on this topic look like?
Input: Understanding of current service desk process and ticket routing
Output: Defined objectives for the project
Materials: Whiteboard/flip charts, Ticket Analysis Report
Participants: Service Desk Staff, Service Desk Manager, IT Director, CIO
Document in the Ticket Analysis Report.
Input: Understanding of current service desk process and ticket routing
Output: Defined objectives for the project
Materials: Whiteboard/flip charts, Ticket Analysis Report
Participants: Service Desk Manager, IT Director, CIO
| Demonstrate value to the business by improving customer service | |||
| Ticket trends by category by month | # tickets by business department | % SLAs met by IT teams | |
| Average customer satisfaction rating | % incident tickets closed in one day | Service request SLAs met by % | Annual IT satisfaction survey result |
| Improve service desk operations | |||
| Incident tickets assigned, sorted by age and priority | Scheduled requests for today and tomorrow | Knowledgebase articles due for renewal this month | Top 5-10 tickets for the quarter |
| Unassigned tickets by age | # incident tickets assigned by tech | Open tickets by category | Backlog summary by age |
| Reducing the number of recurring incidents | |||
| # incidents by category and resolution code | Number of problem tickets opened and resolved | Correlation of ticket volume trends to events | Reduction of volume of recurring tickets |
| Use of knowledgebase by users | Use of self-service for ticket creation | Use of service catalog | Use of automated features (e.g. password resets) |
| Average call hold time | % calls abandoned | Average resolution time | Number of tickets reopened |
Document in the Ticket Analysis Report.
Ticket handling ensures clean handovers, whether it is to higher tiers or back to the customer. When filling the ticket out with information intended for another party, ensure the information is written for their benefit and from their point of view.
TABS 1 & 2INSTRUCTIONS & DATA ENTRY |
TAB 3 : TICKET SUMMARYTICKET SUMMARY DASHBOARDS |
TABS 4 to 8: DASHBOARDSINCIDENT SERVICE REQUEST CATEGORY |
![]() Input at least three months of your exported ticket data into the corresponding columns in the tool to feed into the common analysis graphs in the other tabs. |
![]() This tab contains multiple dashboards analyzing how tickets come in, who requests them, who resolves them, and how long it takes to resolve them. |
![]() These tabs each have dashboards outlining analysis on incidents and service requests. The category tab will allow you to dive deeper on commonly reported issues. |
You can still leverage your current data, but use this opportunity to improve your service desk ticket fields down the line
Input: ITSM data log
Output: Populated Service Desk Ticket Data Analysis Tool
Materials: Whiteboard/flip charts, Service Desk Ticket Analysis Tool
Participants: Service Desk Manager, Service Desk Technicians
Start here:
| Fields Captured | |
| Ticket Number | Open Date |
| Open Time | Closed Date |
| Closed Time | Intake Channel |
| Time to Resolve | Site Location |
| First Contact Resolution | Resolution Code |
| Category (I, II, III) | Ticket Type (Request or Incident) |
| Status of Ticket | Resolved by Tier |
| Ticket Priority | Requestor/Department |
| SLA Fulfilled | Subject |
| Technician | |
When entering your data, pay close attention to the following fields:
| Fields Captured | |
| Ticket Number | Open Date |
| Open Time | Closed Date |
| Closed Time | Intake Channel |
| Time to Resolve | Site Location |
| First Contact Resolution | Resolution Code |
| Category (I, II, III) | Ticket Type (Request or Incident) |
| Status of Ticket | Resolved by Tier |
| Ticket Priority | Requestor/Department |
| SLA Fulfilled | Subject |
| Technician | |
Use Info-Tech’s tool instead of building your own. Download the Service Desk Ticket Analysis Tool.
Input: Populated Service Desk Ticket Data Analysis Tool
Output: New ticket fields to track
Materials: Whiteboard/flip charts, Service Desk Ticket Analysis Tool
Participants: Service Desk Manager, Service Desk Technicians
As a group, pay attention to the ticket fields populated in the tool as well as the ticket fields that you were not able to populate. Use the example “Fields Captured” table to the right, which lists all fields present in the ticket analysis tool.
Discuss the following questions:
| Example: Fields Captured - Fields Not Captured | |
| Ticket Number | Open Date |
| Open Time | Closed Date |
| Closed Time | Intake Channel |
| Time to Resolve | Site Location |
| First Contact Resolution | Resolution Code |
| Category (I, II, III) | Ticket Type (Request or Incident) |
| Status of Ticket | Resolved by Tier |
| Ticket Priority | Requestor/Department |
| SLA Fulfilled | Subject |
| Technician | |
Document in the Ticket Analysis Report.
Don’t wait for your ticket quality to be perfect. You can still draw actions from your ticket data. They will likely be process improvements initially, but the exercise of pulling the data is a necessary first step.
Which of these metrics do you track and action?
For each metric that you end up tracking:
Associate a metric with each improvement you execute.
(Source: Info-Tech survey, 2021; N=20)
Start your analysis with common visuals employed by other service desk professionals
“Being able to tell stories with data is a skill that’s becoming ever more important in our world of increasing data and desire for data-driven decision making. An effective data visualization can mean the difference between success and failure when it comes to communicating the findings of your study, raising money for your nonprofit, presenting to your board, or simply getting your point across to your audience.” - Cole Knaflic, Founder and CEO, Storytelling with Data: A Data Visualization Guide for Business Professionals
A single number doesn’t tell the whole picture
Look for seasonal trends. In this example, we see high ticket volumes in May and January, with lower ticket volumes in June and July when many staff are taking holidays. However, also be careful to look at the big picture of how you pulled the data. August through October sees a high volume of open tickets because the data set is pulled in November, not because there’s a seasonal spike on tickets not closing at the end of the fiscal year.
Don’t rush to a decision based off the first numbers you see
Ideally, you should track ticket patterns over an entire year to get a full sense of trends within each month of the year. At minimum, track for 30 days, then 60, then 90, and see if anything changes. The longer you can track ticket patterns, the more accurate your picture will be.
If you separate incidents and service requests, and you have accurate ticket categories, then you can use these dashboards to further break down the data to identify ticket trends.
The output of the ticket analysis will only be as accurate as its input.
To get the most accurate results, first ensure your data is accurate, then analyze it over as much time as possible. Aggregating with accurate data will give you a better picture of the trends in demand that your service desk sees.
Not separating incidents and service requests? Need to fix your ticket categories? Visit Standardize the Service Desk to get started.
An unanticipated interruption of a service.
The goal of incident management is to restore the service as soon as possible, even if the resolution involves a workaround.
A generic description for a small change or service access.
Requests are small, frequent, and low risk. They are best handled by a process distinct from incident, change, and project management.
Not separating incidents and service requests? Need to fix your ticket categories? Visit Standardize the Service Desk to get started.
Visualize the current state of your service desk.
Build your metrics baseline to compare with future metric results.
Visualize your incident and service request ticket load and analyze trends. Use this information and cross reference data sets to gain a holistic view of how the service desk interacts with IT and the business.
Gain actionable, data-driven improvements based on your incident and service request data. Show the value of the service desk and highlight improvements needed.
Investigate whether there are trends in ticket volume and resolution times within specific categories and subcategories
Tab 6, Category Dashboard; tab 7, Resolution Time Dashboard; and tab 8, Resolution Code Dashboard are PivotCharts. Use these tabs to investigate whether there are trends in ticket volume, resolution times, and resolution codes within specific categories and subcategories.
Start with the charts that are available. The +/- buttons will allow you to show more granular information. By default, this granularity will be into the levels of the ticket categorization scheme.
For most categorization schemes, there will be too many categories to properly graph. You can apply a filter to investigate specific categories by clicking on the drop-down buttons.
TAB 6CATEGORY DASHBOARD |
TAB 7RESOLUTION TIME DASHBOARD |
TAB 8RESOLUTION TIME DASHBOARD |
![]() Investigate ticket distributions in first, second, and third levels. Are certain categories overcrowded, suggesting they can be split? Are certain categories not being used? |
![]() Do average resolution times match your service level agreements? Do certain categories have significantly different resolution times? Are there areas that can benefit from shift-left? |
![]() Are resolution codes being accurately used? Are there trends in resolution codes? Are these codes providing sufficient information for problem management? |
Review common recommendations as a first step to extracting insights from your own data.
You will gain an understanding of the common challenges with service desks and ticket analysis in general. See which ones apply to you to inform your ticket data analysis moving forward.
Review your service desk processes and tools for optimization opportunities:
This project will help you build and improve essential service desk processes, including incident management, request fulfillment, and knowledge management.
This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.
Organize your scrums to report on the metrics that will inform daily and monthly operations.
Use the dashboards and data to inform your daily and monthly scrums.
Clean data is still useless if not used properly
Explain your metric spikes and trends
Use your data to help improve business relationships
Review the following with business leaders:
Use your data to show the value you provide to the group. Schedule quarterly meetings with the heads of different business groups to discuss the work that the service desk does for each group.
Show trends in incidents and service requests: “I see you have a spike in CRM tickets. I’ve been working with the CRM team to address this issue.”
Effectively communicate with the business and leadership
Download the Ticket Analysis Report.
Download the Ticket Analysis Report.
You now have a better understanding of how to action your service desk ticket data, including improvements to your current ticket templates for incidents and service requests.
You also have the data to craft a story to different stakeholder groups to celebrate the successes of the service desk and highlight possible improvements. Continue this exercise iteratively to continue improving the service desk.
Remember, ticket analysis is not a single event but an ongoing initiative. As you track, analyze, and action more data, you will find more improvements.
Contact your account representative for more information.
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information.
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
|
|
| Analyze your dashboards
An analyst will walk through the ticket data and dashboards with you and your team to help interpret the data and tailor improvements |
Populate your ticket data report
Given the action items from this solution set, an analyst will help you craft a report to celebrate the successes and highlight needed improvements in the service desk. |
The best type of service desk ticket is the one that doesn’t exist.
Don’t let persistent problems govern your department.
Improve user satisfaction with IT with a convenient menu-like catalog.
Bayes, Scarlett. “ITSM: 2021 & Beyond.” Service Desk Institute, 2021. Web.
“Benchmarking Report v.9.” Service Desk Institute, 17 Jan. 2020. Web.
Bennett, Micah. “The 9 Help Desk Metrics That Should Guide Your Customer Support.” Zapier, 3 Dec. 2015. Web.
“Global State of Customer Service: The transformation of customer service from 2015 to present day.” Microsoft Dynamics 365, Microsoft, 2020. Web.
Goodey, Ben. “How to Manually Analyze Support Tickets.” SentiSum, 26 July 2021. Web.
Jadhav, Megha. “Four Metrics to Analyze When Using Ticketing Software.” Vision Helpdesk Blog, 21 Mar. 2016. Web.
Knaflic, Cole Nussbaumer. Storytelling with Data: A Data Visualization Guide for Business Professionals. Wiley, 2015.
Li, Ta Hsin, et al. “Incident Ticket Analytics for IT Application Management Services.” 2014 IEEE International Conference on Services Computing, 2014. Web.
Olson, Sarah. “10 Help Desk Metrics for Service Desks and Internal Help Desks.” Zendesk Blog, Sept. 2021. Web.
Paramesh, S.P., et al. “Classifying the Unstructured IT Service Desk Tickets Using Ensemble of Classifiers.” 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), 2018. Web.
Volini, Erica, et al. “2021 Global Human Capital Trends: Special Report.” Deloitte Insights, 21 July 2021. Web.
“What Kind of Analysis You Can Perform on a Ticket Management System.” Commence, 3 Dec. 2019. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess the organization’s readiness for change and evaluate the PMO’s OCM capabilities.
Build an organic desire for change throughout the organization by developing a sponsorship action plan through the PMO and taking a proactive approach to change impacts.
Ensure stakeholders are engaged and ready for change by developing effective communication, transition, and training plans.
Determine accountabilities and establish a process for tracking business outcomes after the project team has packed up and moved onto the next project.
Institute an Organizational Change Management Playbook through the PMO that covers tools, processes, and tactics that will scale all of the organization’s project efforts.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Assess the organization’s readiness for change and evaluate the PMO’s OCM capabilities.
Estimate the relative difficulty and effort required for managing organizational change through a specific project.
Create a rough but concrete timeline that aligns organizational change management activities with project scope.
A better understanding of the cultural appetite for change and of where the PMO needs to focus its efforts to improve OCM capabilities.
A project plan that includes disciplined organizational change management from start to finish.
1.1 Assess the organization’s current readiness for change.
1.2 Perform a change management SWOT analysis to assess the PMO’s capabilities.
1.3 Define OCM success metrics.
1.4 Establish and map out a core OCM project to pilot through the workshop.
Organizational Change Management Capabilities Assessment
A diagnosis of the PMO’s strengths and weaknesses around change management, as well as the opportunities and threats associated with driving an OCM strategy through the PMO
Criteria for implementation success
Project Level Assessment
Analyze the impact of the change across various dimensions of the business.
Develop a strategy to manage change impacts to best ensure stakeholder adoption.
Improved planning for both your project management and organizational change management efforts.
A more empathetic understanding of how the change will be received in order to rightsize the PMO’s OCM effort and maximize adoption.
2.1 Develop a sponsorship action plan through the PMO.
2.2 Determine the relevant considerations for analyzing the change impacts of a project.
2.3 Analyze the depth of each impact for each stakeholder group.
2.4 Establish a game plan to manage individual change impacts.
2.5 Document the risk assumptions and opportunities stemming from the impact analysis.
Sponsorship Action Plan
Organizational Change Management Capabilities Assessment
Risk and Opportunity Assessment
Define a clear and compelling vision for change.
Define roles and responsibilities of the core project team for OCM.
Identify potential types and sources of resistance and enthusiasm.
Create a stakeholder map that visualizes relative influence and interest of stakeholders.
Develop an engagement plan for cultivating support for change while eliciting requirements.
Begin to communicate a compelling vision for change.
Delegate and divide work on elements of the transition plan among the project team and support staff.
Begin developing a communications plan that appeals to unique needs and attitudes of different stakeholders.
Cultivate support for change while eliciting requirements.
3.1 Involve the right people to drive and facilitate change.
3.2 Solidify the vision of change to reinforce and sustain leadership and commitment.
3.3 Proactively identify potential skeptics in order to engage them early and address their concerns.
3.4 Stay one step ahead of potential saboteurs to prevent them from spreading dissent.
3.5 Find opportunities to empower enthusiasts to stay motivated and promote change by encouraging others.
3.6 Formalize the stakeholder analysis to identify change champions and blockers.
3.7 Formalize the engagement plan to begin cultivating support while eliciting requirements.
RACI table
Stakeholder Analysis
Engagement Plan
Communications plan requirements
Develop a realistic, effective, and adaptable transition plan, including:Clarity around leadership and vision.Well-defined plans for targeting unique groups with specific messages.Resistance and contingency plans.Templates for gathering feedback and evaluating success.
Clarity around leadership and vision.
Well-defined plans for targeting unique groups with specific messages.
Resistance and contingency plans.
Templates for gathering feedback and evaluating success.
Execute the transition in coordination with the timeline and structure of the core project.
Communicate the action plan and vision for change.
Target specific stakeholder and user groups with unique messages.
Deal with risks, resistance, and contingencies.
Evaluate success through feedback and metrics.
4.1 Sustain changes by adapting people, processes, and technologies to accept the transition.
4.2 Decide which action to take on enablers and blockers.
4.3 Start developing the training plan early to ensure training is properly timed and communicated.
4.4 Sketch a communications timeline based on a classic change curve to accommodate natural resistance.
4.5 Define plans to deal with resistance to change, objections, and fatigue.
4.6 Consolidate and refine communication plan requirements for each stakeholder and group.
4.7 Build the communications delivery plan.
4.8 Define the feedback and evaluation process to ensure the project achieves its objectives.
4.9 Formalize the transition plan.
Training Plan
Resistance Plan
Communications Plan
Transition Plan
Establish post-project benefits tracking timeline and commitment plans.
Institute a playbook for managing organizational change, including:
A process for ensuring the intended business outcomes are tracked and monitored after the project is completed.
Repeat and scale best practices around organizational change to future PMO projects.
Continue to build your capabilities around managing organizational change.
Increase the effectiveness and value of organizational change management.
5.1 Review lessons learned to improve organizational change management as a core PM discipline.
5.2 Monitor capacity for change.
5.3 Define roles and responsibilities.
5.4 Formalize and communicate the organizational change management playbook.
5.5 Regularly reassess the value and success of organizational change management.
Lessons learned
Organizational Change Capability Assessment
Organizational Change Management Playbook
PMOs, if you don't know who is responsible for org change, it's you.
"Organizational change management has been a huge weakness for IT departments and business units, putting projects and programs at risk – especially large, complex, transformational projects.
During workshops with clients, I find that the root of this problem is twofold: project planning tends to fixate on technology and neglects the behavioral and cultural factors that inhibit user adoption; further, accountabilities for managing change and helping to realize the intended business outcomes post-project are not properly defined.
It makes sense for the PMO to be the org-change leader. In project ecosystems where no one seems willing to seize this opportunity, the PMO can take action and realize the benefits and accolades that will come from coordinating and consistently driving successful project outcomes."
Matt Burton,
Senior Manager, Project Portfolio Management
Info-Tech Research Group
Make your PMO the change leader it’s already expected to be. Unless accountabilities for organizational change management (OCM) have been otherwise explicitly defined, you should accept that, to the rest of the organization – including its chief officers – the PMO is already assumed to be the change leader.
Don’t shy away from or neglect this role. It’s not just the business outcomes of the organization’s projects that will benefit; the long-term sustainability of the PMO itself will be significantly strengthened by making OCM a core competency.
The constraints that drive project management (time, scope, and budget) are insufficient for driving the overall success of project efforts.
For instance, a project may come in on time, on budget, and in scope, but…
…then that “successful project” represents a massive waste of the organization’s time and resources.
A supplement to project management is needed to ensure that the intended value is realized.
Mission (Not) Accomplished
50% Fifty percent of respondents in a KPMG survey indicated that projects fail to achieve what they originally intended. (Source: NZ Project management survey)
56% Only fifty-six percent of strategic projects meet their original business goals. (Source: PMI)
70% Lack of user adoption is the main cause for seventy percent of failed projects. (Source: Collins, 2013)
Organizational change management is the practice through which the PMO can improve user adoption rates and maximize project benefits.
Why OCM effectiveness correlates to project success:
Without OCM, IT might finish the project but fail to realize the intended outcomes.
In the long term, a lack of OCM could erode IT’s ability to work with the business.
OCM is a framework for managing the introduction of new business processes and technologies to ensure stakeholder adoption.
OCM involves tools, templates, and processes that are intended to help project leaders analyze the impacts of a change during the planning phase, engage stakeholders throughout the project lifecycle, as well as train and transition users towards the new technologies and processes being implemented.
OCM is a separate body of knowledge, but as a practice it is inseparable from both project management or business analysis.
Anytime you are starting a project or program that will depend on users and stakeholders to give up their old way of doing things, change will force people to become novices again, leading to lost productivity and added stress.
CM can help improve project outcomes on any project where you need people to adopt new tools and procedures, comply with new policies, learn new skills and behaviors, or understand and support new processes.
"What is the goal of change management? Getting people to adopt a new way of doing business." – BA, Natural Resources Company
82% of CEOs identify organizational change management as a priority. (D&B Consulting) But Only 18% of organizations characterize themselves as “Highly Effective” at OCM. (PMI)
On average, 95% percent of projects with excellent OCM meet or exceed their objectives. (Prosci) VS For projects with poor OCM, the number of projects that meet objectives drops to 15%. (Prosci)
82% of projects with excellent OCM practices are completed on budget. (Prosci) VS For projects with poor OCM, the number of projects that stay on budget drops to 51%. (Prosci)
71% of projects with excellent OCM practices stay on schedule. (Prosci) VS For projects with poor OCM practices, only 16% stay on schedule. (Prosci)
IT Processes Ranked by Effectiveness:
IT Processes Ranked by Importance:
Based on 3,884 responses to Info-Tech’s Management and Governance Diagnostic, June 2016
While the importance of change management is widely recognized across organizations, the statistics around change remain dismal.
Indeed, it’s an understatement to say that change is difficult.
People are generally – in the near-term at least – resistant to change, especially large, transformational changes that will impact the day-to-day way of doing things, or that involve changing personal values, social norms, and other deep-seated assumptions.
"There is nothing more difficult to take in hand, more perilous to conduct, or more uncertain in its success, than to take the lead in the introduction of a new order of things." – Niccolo Machiavelli
70% - Change failure rates are extremely high. It is estimated that up to seventy percent of all change initiatives fail – a figure that has held steady since the 1990s. (McKinsey & Company)
25% - In a recent survey of 276 large and midsize organizations, only twenty-five percent of respondents felt that the gains from projects were sustained over time. (Towers Watson)
22% - While eighty-seven percent of survey respondents trained their managers to “manage change,” only 22% felt the training was truly effective. (Towers Watson)
Who is accountable for change success? …anyone?...
To its peril, OCM commonly falls into a grey area, somewhere in between project management and portfolio management, and somewhere in between being a concern of IT and a concern of the business.
While OCM is a separate discipline from project management, it is commonly thought that OCM is something that project managers and project teams do. While in some cases this might be true, it is far from a universal truth.
The end result: without a centralized approach, accountabilities for key OCM tasks are opaque at best – and the ball for these tasks is, more often than not, dropped altogether.
29% - Twenty-nine percent of change initiatives are launched without any formal OCM plan whatsoever.
"That’s 29 percent of leaders with blind faith in the power of prayer to Saint Jude, the patron saint of desperate cases and lost causes." – Torben Rick
#1 Organizational resistance to change is cited as the #1 challenge to project success that PMOs face. (Source: PM Solutions)
90% Companies with mature PMOs that effectively manage change meet expectations 90% of the time. (Source: Jacobs-Long)
A centralized approach to OCM is most effective, and the PMO is already a centralized project office and is already accountable for project outcomes.
What’s more, in organizations where accountabilities for OCM are not explicitly defined, the PMO will likely already be assumed to be the default change leader by the wider organization.
It makes sense for the PMO to accept this accountability – in the short term at least – and claim the benefits that will come from coordinating and consistently driving successful project outcomes.
In the long term, OCM leadership will help the PMO to become a strategic partner with the executive layer and the business side.
Short-term gains made by the PMO can be used to spark dialogues with those who authorize project spending and have the implicit fiduciary obligation to drive project benefits.
Ultimately, it’s their job to explicitly transfer that obligation, along with the commensurate resourcing and authority for OCM activities.
"With organizations demanding increasing value, PMOs will need to focus more and more on strategy, innovation, agility, and stakeholder engagement. And, in particular, developing expertise in organizational change management will be essential to their success." – PM Solutions, 2014
28% PMOs that are highly agile and able to respond quickly to changing conditions are 28% more likely to successfully complete strategic initiatives (69% vs. 41%). (PMI)
In other words, without heightened competencies around org-change, the PMO of tomorrow will surely sink like a stone in the face of increasingly unstable external factors and accelerated project demands.
With the advice and tools in Info-Tech’s Drive Organizational Change from the PMO blueprint, the PMO can provide the right OCM expertise at each phase of a project.
Business strategy-oriented OCM models such as John Kotter’s 8-Step model assume the change agent is in a position of senior leadership, able to shape corporate vision, culture, and values.
General-purpose OCM frameworks such as ACMP’s Standard for Change Management, CMI’s CMBoK, and Prosci’s ADKAR model are very comprehensive and need to be configured to PMO-specific initiatives.
References and Further Reading
Info-Tech’s organizational change management model adapts the best practices from a wide range of proven models and distills it into a step-by-step process that can be applied to any IT-enabled project.
| COBIT Section | COBIT Management Practice | Related Blueprint Steps |
|---|---|---|
| BAI05.01 | Establish the desire to change. | 1.1 / 2.1 / 2.2 |
| BAI05.02 | Form an effective implementation team. | 1.2 |
| BAI05.03 | Communicate the desired vision. | 2.1 / 3.2 |
| BAI05.03 | Empower role players and identify short-term wins. | 3.2 / 3.3 |
| BAI05.05 | Enable operation and use. | 3.1 |
| BAI05.06 | Embed new approaches. | 4.1 / 5.1 |
| BAI05.07 | Sustain changes. | 5.1 |
COBIT 5 is the leading framework for the governance and management of enterprise IT.
Screenshot of Info-Tech’s IT Management & Governance Framework.
Human behavior is largely a blind spot during the planning phase.
In IT especially, project planning tends to fixate on technology and underestimate the behavioral and cultural factors that inhibit user adoption. Whether change is project-specific or continuous, it’s more important to instill the desire to change than to apply specific tools and techniques. Accountability for instilling this desire should start with the project sponsor, with direct support from the PMO.
Don’t mistake change management for a “soft” skill.
Persuading people to change requires a “soft,” empathetic approach to keep them motivated and engaged. But don’t mistake “soft” for easy. Managing the people part of change is amongst the toughest work there is, and it requires a comfort and competency with uncertainty, ambiguity, and conflict. If a change initiative is going to be successful (especially a large, transformational change), this tough work needs to be done – and the more impactful the change, the earlier it is done, the better.
In “continuous change” environments, change still needs to be managed.
Transformation and change are increasingly becoming the new normal. While this normality may help make people more open to change in general, specific changes still need to be planned, communicated, and managed. Agility and continuous improvement are good, but can degenerate into volatility if change isn’t managed properly. People will perceive change to be volatile and undesirable if their expectations aren’t managed through communications and engagement planning.
Info-Tech’s Drive Organizational Change from the PMO blueprint can be implemented quickly and can usually be done with the PMO’s own authority, without the need for additional or dedicated change resources.
15% - The average costs for effective OCM are 10%–15% of the overall project budget. (AMR Research)
200% - Small projects with excellent OCM practices report a 200% return-on-investment. (Change First)
650% - Large projects with excellent OCM practices report a 650% return-on-investment. (Change First)
Industry Manufacturing
Source Info-Tech Client
A medium-sized manufacturing company with offices all over the world was going through a consolidation of processes and data by implementing a corporate-wide ERP system to replace the fragmented systems that were previously in place. The goal was to have consistency in process, expectations, and quality, as well as improve efficiency in interdepartmental processes.
Up to this point, every subsidiary was using their own system to track data and sharing information was complicated and slow. It was causing key business opportunities to be compromised or even lost.
The organization was not very good in closing out projects. Initiatives went on for too long, and the original business benefits were usually not realized.
The primary culprit was recognized as mismanaged organizational change. People weren’t aware early enough, and were often left out of the feedback process.
Employees often felt like changes were being dictated to them, and they didn’t understand the wider benefits of the changes. This led to an unnecessary number of resistors, adding to the complexity of successfully completing a project.
Implementing an ERP worldwide was something that the company couldn’t gamble on, so proper organizational change management was a focus.
A thorough stakeholder analysis was done, and champions were identified for each stakeholder group throughout the organization.
Involving these champions early gave them the time to work within their groups and to manage expectations. The result was savings of 2–4 weeks of implementation time and $10,000.
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Diagnostics and consistent frameworks used throughout all four options
| Phase 1 | Phase 2 | Phase 3 | Phase 4 | Phase 5 | |
|---|---|---|---|---|---|
| Best-Practice Toolkit |
1.1 Assess the organization’s readiness for change. 1.2 Define the structure and scope of the PMO’s pilot OCM initiative. |
2.1 Foster OCM considerations during the ideation phase. 2.2 Perform an organizational change impact assessment. |
3.1 Ensure stakeholders are engaged and ready for change. 3.2 Develop and execute the transition plan. 3.3 Establish HR and training plans. |
4.1 Determine accountabilities for benefits attainment. | 5.1 Institute an OCM playbook. |
| Guided Implementations |
|
|
|
|
|
| Onsite Workshop |
Module 1: Prepare the PMO for change leadership. |
Module 2: Plant the seeds for change during planning and initiation. |
Module 3: Facilitate change adoption throughout the organization. |
Module 4: Establish a post-project benefits attainment process. |
Module 5: Solidify the PMO’s role as change leader. |
|
Phase 1 Results: OCM Capabilities Assessment |
Phase 2 Results: Change Impact Analysis |
Phase 3 Results: Communications and Transition Plans |
Phase 4 Results: A benefits tracking process for sponsors |
Phase 5 Results: OCM Playbook |
Contact your account representative or email Workshops@InfoTech.com for more information.
| Preparation | Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
|---|---|---|---|---|---|
| Activities |
Organize and Plan Workshop
|
Assess OCM Capabilities
|
Analyze Impact of the Change
|
Develop Engagement & Transition Plans
|
Institute an OCM Playbook
|
| Deliverables |
|
|
|
|
|
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1 week
Start with an analyst kick off call:
Then complete these activities…
With these tools & templates:
Work with an analyst to:
Then complete these activities…
With these tools & templates:
Continuous change and transition are increasingly common in organizations in 2016.
A state of constant change can make managing change more difficult in some ways, but easier in others.
By managing organizational change more effectively, the PMO can build credibility to manage both business and IT projects.
"The greatest danger in times of turbulence is not the turbulence; it is to act with yesterday’s logic." – Peter Drucker
In this phase, we will gauge your PMO’s abilities to effectively facilitate change based upon your change management capability levels and your wider organization’s responsiveness to change.
There are many moving parts involved in successfully realizing an organizational change.
For instance, even with an effective change toolkit and strong leadership support, you may still fail to achieve project benefits due to such factors as a staff environment resistant to change or poor process discipline.
Use Info-Tech’s Organizational Change Management Capabilities Assessment to assess your readiness for change across 7 categories:
Download Info-Tech’s Organizational Change Management Capabilities Assessment.
Use the drop downs to indicate the degree to which you agree or disagree with each of the statements in the survey.
Info-Tech Insight
Every organization has some change management capability.
Even if you find yourself in a fledgling or nascent PMO, with no formal change management tools or processes, you can still leverage other categories of change management effectiveness.
If you can, build upon people-related assets like “Organizational Knowledge” and “Cultural Readiness” as you start to hone your OCM toolkit and process.
Tab 3 of the Assessment tool shows your capabilities graph.
Focus on improving the first capability dimension (from left/front to right/back) that rates below 10.
Tab 4 of the Assessment tool reveals Info-Tech’s recommendations based upon your survey responses.
Use the red/yellow/green boxes to focus your efforts.
The content in the recommendations boxes is based around these categories and the advice therein is designed to help you to, in the near term, bring your capabilities up to the next level.
Each of Info-Tech’s seven OCM capabilities match up with different steps and phases in this blueprint.
We recommend that you consume this blueprint in a linear fashion, as each phase matches up to a different set of OCM activities to be executed at each phase of a project. However, you can use the legend below to locate how and where this blueprint will address each capability.
| Cultural Readiness | 2.1 / 2.2 / 3.1 / 3.2 / 3.3 |
|---|---|
| Leadership Support | 2.1 / 4.1 / 5.1 |
| Organizational Knowledge | 2.1 / 3.1 / 3.2 |
| Change Management Skills | 2.1 / 2.2 / 3.1 / 3.2 / 3.3 |
| Toolkit & Templates | 2.1 / 2.2 / 3.1 / 3.2 / 3.3 / 4.1 / 5.1 |
| Process Discipline | 2.1 / 2.2 / 3.1 / 3.2 / 3.3 / 4.1 / 5.1 |
| KPIs & Metrics | 3.2 / 5.1 |
Info-Tech Insight
Organizational change must be planned in advance and managed through all phases of a project.
Organizational change management must be embedded as a key aspect throughout the project, not merely a set of tactics added to execution phases.
Now that you have a sense of your change management strengths and weaknesses, you can begin to formalize the organizational specifics of these.
Gather PMO and IT staff, as well as other key project and business stakeholders, and perform a SWOT analysis based on your Capabilities Assessment.
Follow these steps to complete the SWOT analysis:
Use the SWOT Analysis Template on the next slide to document results.
Use the examples provided in the SWOT analysis to kick-start the discussion.
The purpose of the SWOT is to begin to define the goals of this implementation by assessing your change management capabilities and cultivating executive level, business unit, PMO, and IT alignment around the most critical opportunities and challenges.
|
Strengths
|
Weaknesses
|
|
Opportunities
|
Threats
|
Before you move on to develop and implement your OCM processes, spend some time documenting how change management success will be defined for your organization and what conditions will be necessary for success to be achieved.
With the same group of individuals who participated in the SWOT exercise, discuss the below criteria. You can make this a sticky note or a whiteboard activity to help document discussion points.
| What conditions are necessary for OCM to succeed? | How will success be defined? |
|---|---|
|
|
|
|
Use the table below to document any additional factors or uncertainties that could impact implementation success.
These could be external factors that may impact the PMO, or they could be logistical considerations pertaining to staffing or infrastructure that may be required to support additional change management processes and procedures.
"[A]ll bets are off when it comes to change. People scatter in all directions. Your past experiences may help in some way, but what you do today and how you do it are the new measures people will use to evaluate you." – Tres Roeder
| Consideration | Description of Need | Potential Resource Implications | Potential Next Steps | Timeline |
|---|---|---|---|---|
| e.g. The PMO will need to train PMs concerning new processes. | We will not only need to train PM staff in the new processes and documentation requirements, but we will also have to provide ongoing training, be it monthly, quarterly, or yearly. | Members of PMO staff will be required to support this training. | Analyze impact of redeploying existing resources vs. outsourcing. | Q3 2016 |
| e.g. We will need to communicate new OCM requirements to the business and wider organization. | The PMO will be taking on added communication requirements, needing to advertise to a wider audience than it has before. | None | Work with business side to expand the PMO’s communications network and look into leveraging existing communication portals. | Next month |
In subsequent phases of this blueprint, we will help the PMO develop an OCM strategy that aligns with your organization’s project timelines.
In this step (1.2), we will do some pre-work for you by determining a change initiative to pilot during this process and defining some of the roles and responsibilities for the OCM activities that we’ll develop in this blueprint.
In keeping with the need to align organizational change management activities with the actual timeline of the project, the next three phases of this blueprint will move from discussing OCM in general to applying OCM considerations to a single project.
As you narrow your focus to the organizational change stemming from a specific initiative, review the below considerations to help inform the decisions that you make during the activities in this step.
The need for OCM rigor will vary depending on project size and complexity.
While we recommend that every project has some aspect of change management to it, you can adjust OCM requirements accordingly, depending on the type of change being introduced.
| Incremental Change | → | Transformational Change |
|---|---|---|
|
Organizational change management is highly recommended and beneficial for projects that require people to:
|
Organizational change management is required for projects that require people to:
|
Phases 2, 3, and 4 of this blueprint will guide you through the process of managing organizational change around a specific project. Select one now that is currently in your request or planning stages to pilot through the activities in this blueprint. We recommend choosing one that involves a large, transformational change.
Use Info-Tech’s project levels to define the complexity of the project that you’ve chosen to pilot.
Defining your project level will help determine how much effort and detail is required to complete steps in this blueprint – and, beyond this, these levels can help you determine how much OCM rigor to apply across each of the projects in your portfolio.
| Incremental Change | → | Transformational Change |
|---|---|---|
| Level 1 | Level 2 | Level 3 |
|
|
|
For a more comprehensive assessment of project levels and degrees of risk, see Info-Tech’s Create Project Management Success blueprint – and in particular, our Project Level Assessment Tool.
What is the project changing?
How will it work?
What are the implications of doing nothing?
What are the phases in execution?
What is the desired outcome?
What can be measured? How?
When should it be measured?
List the goals.
Align with business and IT goals.
List the costs:
Software costs
Hardware costs
Implementation costs
List the risks:
Business risks
Technology risks
Implementation risks
| Planned Project Activities & Milestones | Timeline | Owner(s) | Status | |
|---|---|---|---|---|
| 1. | Example: Vendor Evaluation | Finish by Q4-17 | Jessie Villar | In progress |
| 2. | Example: Define Administrative Policies | Finish by Q4-17 | Gerry Anantha | Starting Q2 |
The key to change management success is ensuring that the right OCM activities are carried out at the right time. The below graphic serves as a quick view of what OCM activities entail and when they should be done.
| Project Phase or Milestone | Estimated Start Date | Estimated End Date | Associated OCM Requirement(s) |
|---|---|---|---|
| e.g. Planning | e.g. Already in progress | e.g. July | e.g. Impact Assessment |
| e.g. Requirements & Design | e.g. August | e.g. October | e.g. Stakeholder Engagement & Transition Planning |
Info-Tech Insight
Proactive change management is easier to execute and infinitely more effective than managing change reactively. A reactive approach to OCM is bound to fail. The better equipped the PMO is to plan OCM activities in advance of projects, the more effective those OCM efforts will be.
The PMO leader will need to delegate responsibility for many to all of these OCM activities throughout the project lifecycle.
Compile a list of PMO staff, project workers, and other stakeholders who will likely be required to support these processes at each step, keeping in mind that we will be doing a more thorough consideration of the resources required to support an OCM program in Phase 3.
| OCM Activity | Resources Available to Support |
|---|---|
| Impact Assessment | |
| Stakeholder Engagement | |
| Transition Planning | |
| Training | |
| Communications | |
| Evaluation and Monitoring |
Info-Tech Insight
OCM processes require a diverse network to support them.
While we advocate an approach to org change that is centralized through the PMO, this doesn’t change the fact that the PMO’s OCM processes will need to engage the entirety of the project eco-system.
In addition to IT/PMO directors, org change processes will engage a group as varied as project sponsors, project managers, business analysts, communications leads, and HR/training leads.
Ensure that you are considering resources and infrastructure beyond IT as you plan your OCM processes – and engage these stakeholders early in this planning process.
In many cases, the core team only has one or two people responsible for impact analysis and plan development in addition to you, the sponsor, who is accountable for leadership and benefits realization.
For larger initiatives, the core team might include several co-sponsors or advisors from different departments or lines of business, along with a handful of staff working together on analysis and planning.
Some team structure templates/examples:
Small (e.g. Office 365)
Medium-Large (e.g. business process initiative)
Complex Transformational (e.g. business model initiative, company reorg)
In keeping with the eclectic network of stakeholders that is required to support OCM processes, Phase 2 is broken up into sections that will, by turn, engage project sponsors, project managers, business analysts, communications leads, and HR/training leads.
At each step, our intention is to arm the PMO with a toolkit and a set of processes that will help foster a project culture that is proactive about change.
"It is amazing what you can accomplish if you do not care who gets the credit." – Harry Truman
| Project Step | PMO | Sponsor | Project Manager | Business Analyst | Blueprint Reference |
|---|---|---|---|---|---|
| Make a high-level case for change. |
A |
R | R/C | C | 1.1 |
| Initiate project/change planning. | A | C | R | C | 1.2 |
| Analyze full breadth and depth of impact. | A | C | R | R | 1.3 |
| Assess communications and training requirements. | A | C | R | R | 2.1 |
| Develop communications, training, and other transition plans. | A | R | C | R | 2.2-3 |
| Approve and communicate transition plans. | A | C | R | C | 2.4 |
| Analyze impact and progress. | A | C | R | R | 3.1 |
| Revise project/change planning. | A | C | R | C | 3.2 |
| Highlight and leverage successes. | A | R | C | C | 3.3 |
Use Info-Tech’s Transition Team Communications Template to help communicate the outcomes of this step.
Download Info-Tech’s Transition Team Communications Template.
"Managers and user communities need to feel like they are a part of a project instead of feeling like the project is happening to them. It isn't just a matter of sending a few emails or putting up a page on a project website." – Ross Latham
Industry Natural Resources
Source Interview
"The hard systems – they’re easy. It’s the soft systems that are challenging... Be hard on the process. Be easy on the people." – Business Analyst, natural resources company
Take Info-Tech’s OCM capabilities questionnaire and receive custom analyst recommendations concerning next steps.
Work with a seasoned analyst to assess your PMO’s strengths, weaknesses, opportunities, and threats to becoming an org change leader.
Work with an analyst to clarify how the success of this initiative will be measured and what conditions are necessary for success.
Receive custom analyst insights on rightsizing your OCM planning efforts based on project size, timeline, and resource availability.
Harness analyst experience to develop a project-specific timeline for the PMO’s change management activities to better plan your efforts and resources.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1 week
Discuss these issues with an analyst:
Then complete these activities…
With these tools & templates:
Work with an analyst to:
Then complete these activities…
With these tools & templates:
Org Change Step #1: Make the case for change during the request phase
Initiation→Planning→Execution→Monitoring & Controlling→Closing
Even before project planning and initiation begin, sponsors and requestors have org change responsibilities around communicating the need for a change and demonstrating their commitment to that change.
In this step, we will look at the OCM considerations that need to be factored in during project ideation.
The slides ahead will cover what the PMO can do to help foster these considerations among project sponsors and requestors.
While this project may already be in the planning phase, the activities in the slides ahead will help lay a solid OCM foundation as you move ahead into the impact assessment and stakeholder engagement steps in this phase.
Strongly recommended: include the sponsor for your pilot OCM project in many of the following activities (see individual activity slides for direction).
Info-Tech Insight
Make active sponsorship a criteria when scoring new requests.
Projects with active sponsors are far more likely to succeed than those where the sponsor cannot be identified or where she/he is unable or unwilling to champion the initiative throughout the organization.
Consider the engagement level of sponsors when prioritizing new requests. Without this support, the likelihood of a change initiative succeeding is far diminished.
Somewhere along the way a stereotype arose of the project sponsor as a disengaged executive who dreams up a project idea and – regardless of that idea’s feasibility or merit – secures funding, pats themselves on the back, and does not materialize again until the project is over to pat themselves on the back again.
Indeed, it’s exaggerated, based partly on the fact that sponsors are almost always extremely busy individuals, with very demanding day jobs on top of their responsibilities as sponsors. The stereotype doesn’t capture the very real day-to-day project-level responsibilities of project sponsors.
Leading change management institute, Prosci, has developed a checklist of 10 identifiable traits and responsibilities that PMO leaders and project managers should help to foster among project sponsors. As Prosci states, the checklist “can be used as an audit tool to see if you are utilizing best practices in how you engage senior leaders on your change initiatives.”
Are your sponsors:
Many change initiatives require significant investments of political capital to garner approval, funding, and involvement from key executives. This process can take months or even years before the project is staffed and implementation begins.
| Executive/Stakeholder | Degree of Support | Ability to Influence | Potential Contribution/Engagement Strategy |
|---|---|---|---|
| Board of Directors | Med | High | |
| CEO | |||
| CFO | |||
| CIO | |||
| CxO |
“The stakes of having poorly engaged executive sponsors are high, as are the consequences and costs. PMI research into executive sponsorship shows that one in three unsuccessful projects fail to meet goals due to poorly engaged executive sponsors.”
– PMI, 2014
Build desire for change.
The project sponsor is accountable for defining the high-level scope and benefits of the project. The PMO needs to work with the sponsor during the ideation phase to help establish the need for the proposed change.
Use the table below to begin developing a compelling vision and story of change. If you have not already defined high-level goals and deliverables for your project, download Info-Tech’s Light Project Request Form (a Detailed Project Request Form is also available).
| Why is there a need to change? | |
|---|---|
| How will change benefit the organization? | |
| How did we determine this is the right change? | |
| What would happen if we didn’t change? | |
| How will we measure success? |
See Info-Tech’s Optimize Project Intake, Approval, and Prioritization blueprint for more detailed advice on working with requestors to define requirements and business value of new requests.
Crucial facts, data, and figures are made more digestible, memorable, and actionable when they are conveyed through a compelling storyline.
While you certainly need high-level scope elements and a rigorous cost-benefit analysis in your business case, projects that require organizational change also need a compelling story or vision to influence groups of stakeholders.
As the PMO works with sponsors to identify and document the goals and benefits of change, begin to sketch a narrative that will be compelling to the organization’s varied audiences.
Structuring an effective project narrative:
Research shows (Research and impacts cited in Torben Rick’s “Change Management Require[s] a Compelling Story,” 2014) that when managers and employees are asked about what most inspires them in their work, their responses are evenly split across five forms of impact:
"Storytelling enables the individuals in an organization to see themselves and the organization in a different light, and accordingly take decisions and change their behavior in accordance with these new perceptions, insights, and identities." – Steve Denning
Info-Tech Insight
A micro-to-macro change narrative. A compelling org change story needs to address all five of these impacts in order to optimally engage employees in change. In crafting a narrative that covers both the micro and macro levels, you will be laying a solid foundation for adoption throughout the organization.
Using a whiteboard to capture the discussion, address the 5 levels of change impact covered on the previous slide.
Whatever story you develop to communicate the goals and the benefits of the change, ultimately it should be the sponsor who communicates this message to the organization at large.
Given the competing demands that senior leaders face, the PMO still has a pivotal role to play in helping to plan and facilitate these communications.
The PMO should help sponsors by providing insights to shape change messaging (refer to the characteristics outlined in the table below for assistance) and by developing a sponsorship action plan (Activity 2.1.4).
| Tips for communicating a change story effectively: | |
|---|---|
| Identify and appeal to the audience’s unique frames of reference. | e.g. “Most of you remember when we…” |
| Include concrete, vivid details to help visualize change. | e.g. “In the future, when a sales rep visits a customer in Wisconsin, they’ll be able to process a $100,000 order in seconds instead of hours.” |
| Connect the past, present, and future with at least one continuous theme. | e.g. “These new capabilities reaffirm our long-standing commitment to customers, as well as our philosophy of continuously finding ways to be more responsive to their needs.” |
“[T]he sponsor is the preferred sender of messages related to the business reasons and organizational implications for a particular initiative; therefore, effective sponsorship is crucial in building an awareness of the need for change.
Sponsorship is also critical in building the desire to participate and support the change with each employee and in reinforcing the change.”
– Prosci
Use the below dimensions to gauge your organization’s appetite for change. Analyzing this will help determine the form and force of communications.
In the next slide, we will base aspects of your sponsorship action plan on whether an organization’s indicator is “high” or “low” across these three dimensions.
Three key dimensions determine the appetite for cultural change (Dimensions taken from Joanna Malgorzata Michalak’s “Cultural Catalysts and Barriers of Organizational Change Management: a Preliminary Overview,” 2010):
| Power Distance | Refers to the acceptance that power is distributed unequally throughout the organization. Organizations with a high power distance indicator show that the unequal power distribution is accepted by the less powerful employees. |
|---|---|
| Individualism | Organizations that score high in individualism have employees who are more independent; those who score low in individualism fall into the collectivism side where employees are strongly tied to one another or their groups. |
| Uncertainty Avoidance | Describes the level of acceptance that an organization has towards uncertainty. Those who score high in this area find that their employees do not favor “uncertain” situations, while those that score low in this area find that their employees are comfortable with change and uncertainty. |
"Societies with a high indicator of power distance, individualism, and uncertainty avoidance create vital inertial forces against transformation." – Michalak
| Group | Activity | Est. Weekly Effort | Comments/Frequency |
|---|---|---|---|
| Project Team | Ad hoc check-in on progress | 30 mins | Try to be visible at least once a week |
| Attend status meetings | 30 mins | Every second Tuesday, 9 am | |
| Senior Managers | Touch base informally | 45 mins | Aim for bi-weekly, one-on-one touchpoints |
| Lead steering committee meetings | 60 mins | First Thursday of the month, 3 pm | |
| End Users | Organization-wide emails | Ad hoc, 20 mins | As required, with PMO assistance |
"To manage change is to tell people what to do... but to lead change is to show people how to be." – Weick & Quinn
Use Info-Tech’s Transition Team Communications Template to help communicate the outcomes of this step.
The following activities should be recorded in the template:
Activity 2.1.2
In addition, the outcome of Activity 2.1.4, the “Sponsorship Action Plan,” should be converted to a format such as Word and provided to the project sponsor.
Download Info-Tech’s Transition Team Communications Template.
"In most work situations, the meaning of a change is likely to be as important, if not more so, than the change itself."
– Roethlisberger (cited in Burke)
In the previous step, we established a process and some accountabilities to help the PMO and project sponsors make the case for change during the ideation and initiation phase of a project.
In this step, we will help with the project planning phase by establishing a process for analyzing how the change will impact various dimensions of the business and how to manage these impacts to best ensure stakeholder adoption.
Brace for Impact…
A thorough analysis of change impacts will help the PMO:
In the absence of an assigned change manager, organizational change impact assessments are typically performed by a business analyst or the project manager assigned to the change initiative.
Sample RACI for this activity. Define these accountabilities for your organization before proceeding with this step.
| Project Sponsor | PMO | PM or BA | |
|---|---|---|---|
| Survey impact dimensions | I | A | R |
| Analyze impacts across multiple stakeholder groups | I | A | R |
| Assess required OCM rigor | I | A/R | C |
| Manage individual impacts | I | A | R |
Info-Tech Insight
Bring perspective to an imperfect view.
No individual has a comprehensive view of the potential impact of change.
Impact assessment and analysis is most effective when multiple viewpoints are coordinated using a well-defined list of considerations that cover a wide breadth of dimensions.
Revisit and refine the impact analysis throughout planning and execution, as challenges to adoption become more clear.
Info-Tech’s Organizational Change Management Impact Analysis Tool helps to document the change impact across multiple dimensions, enabling the PMO to review the analysis with others to ensure that the most important impacts are captured. The tool also helps to effectively monitor each impact throughout project execution.
Download Info-Tech’s Organizational Change Impact Analysis Tool.
Info-Tech Insight
Anticipate the unexpected. Impact analysis is the cornerstone of any OCM strategy. By shining a light on considerations that might have otherwise escaped project planners and decision makers, an impact analysis is an essential component to change management and project success.
The “2. Set Up” tab of the Impact Tool is where you enter project-specific data pertaining to the change initiative.
The inputs on this tab are used to auto-populate fields and drop-downs on subsequent tabs of the analysis.
Document the stakeholders (by individual or group) associated with the project who will be subject to the impacts.
You are allowed up to 15 entries. Try to make this list comprehensive. Missing any key stakeholders will threaten the value of this activity as a whole.
If you find that you have more than 15 individual stakeholders, you can group individuals into stakeholder groups.
Keep in mind...
An impact analysis is not a stakeholder management exercise.
Impact assessments cover:
Stakeholder management covers:
We will cover the latter in the next step.
“As a general principle, project teams should always treat every stakeholder initially as a recipient of change. Every stakeholder management plan should have, as an end goal, to change recipients’ habits or behaviors.”
– PMI, 2015
Use the survey on tab 3 of the Impact Analysis Tool to determine the dimensions of change that are relevant.
The impact analysis is fueled by the thirteen-question survey on tab 3 of the tool.
This survey addresses a comprehensive assortment of change dimensions, ranging from customer-facing considerations, to employee concerns, to resourcing, logistical, and technological questions.
Once you have determined the dimensions that are impacted by the change, you can go on to assess how individual stakeholders and stakeholder groups are affected by the change.
Screenshot of tab “3. Impact Survey,” showing the 13-question survey that drives the impact analysis.
Ideally, the survey should be performed by a group of project stakeholders together. Use the drop-downs in column K to record your responses.
"A new system will impact roles, responsibilities, and how business is conducted within an organization. A clear understanding of the impact of change allows the business to design a plan and address the different levels of changes accordingly. This approach creates user acceptance and buy-in."
– January Paulk, Panorama Consulting
As you assess change impacts, keep in mind that no impact will be felt the same across the organization. Depth of impact can vary depending on the frequency (will the impact be felt daily, weekly, monthly?), the actions necessitated by it (e.g. will it change the way the job is done or is it simply a minor process tweak?), and the anticipated response of the stakeholder (support, resistance, indifference?).
Use the Organizational Change Depth Scale below to help visualize various depths of impact. The deeper the impact, the tougher the job of managing change will be.
| Procedural | Behavioral | Interpersonal | Vocational | Cultural |
|---|---|---|---|---|
| Procedural change involves changes to explicit procedures, rules, policies, processes, etc. | Behavioral change is similar to procedural change, but goes deeper to involve the changing tacit or unconscious habits. | Interpersonal change goes beyond behavioral change to involve changing relationships, teams, locations, reporting structures, and other social interactions. | Vocational change requires acquiring new knowledge and skills, and accepting the loss or decline in the value or relevance of previously acquired knowledge and skills. | Cultural change goes beyond interpersonal and vocational change to involve changing personal values, social norms, and assumptions about the meaning of good vs. bad or right vs. wrong. |
| Example: providing sales reps with mobile access to the CRM application to let them update records from the field. | Example: requiring sales reps to use tablets equipped with a custom mobile application for placing orders from the field. | Example: migrating sales reps to work 100% remotely. | Example: migrating technical support staff to field service and sales support roles. | Example: changing the operating model to a more service-based value proposition or focus. |
See the next slide for an accompanying screenshot of a change impact table from tab 4 of the Analysis Tool.
The stakeholder groups entered on the Set Up will auto-populate in column B of each table.
Your “yes” responses from the survey tab will auto-populate in the cells to the right of the “Change Impact” cells.
Use the drop-downs in this column to select how often the impact will be felt for each group (e.g. daily, weekly, periodically, one time, or never).
“Actions” include “change to core job duties,” “change to how time is spent,” “confirm awareness of change,” etc.
Use the drop-downs to hypothesize what the stakeholder response might be. For now, for the purpose of the impact analysis, a guess is fine. We will come back to build a communications plan based on actual responses in Phase 3 of this blueprint.
Based upon your assessment of each individual impact, the Analysis Tool will provide you with an “Overall Impact Rating” in tab 5.
Projects in the red should have maximum change governance, applying a full suite of OCM tools and templates, as well as revisiting the impact analysis exercise regularly to help monitor progress.
Increased communication and training efforts, as well as cross-functional partnerships, will also be key for success.
Projects in the yellow also require a high level of change governance. Follow the steps and activities in this blueprint closely, paying close attention to the stakeholder engagement activities in the next step to help sway resistors and leverage change champions.
In order to free up resources for those OCM initiatives that require more discipline, projects in green can ease up in their OCM efforts somewhat. With a high likelihood of adoption as is, stakeholder engagement and communication efforts can be minimized somewhat for these projects, so long as the PMO is in regular contact with key stakeholders.
"All change is personal. Each person typically asks: 'What’s in it for me?'" – William T. Craddock
Top-Five Highest Risk Impacts table: This table displays the highest risk impacts based on frequency and action inputs on Tab 4.
Top-Five Most Impacted Stakeholders table: Here you’ll find the stakeholders, ranked again based on frequency and action, who will be most impacted by the proposed changes.
Top Five Supporters table: These are the 5 stakeholders most likely to support changes, based on the Anticipated Response column on Tab 4.
The stakeholder groups entered on the Set Up Tab will auto-populate in column B of each table.
In addition to these outputs, this tab also lists top five change resistors, and has an impact register and list of potential impacts to watch out for (i.e. your “maybe” responses from tab 3).
A proper risk analysis often reveals risks and mitigations that are more important to other people in the organization than those managing the change. Failure to do a risk analysis on other people’s behalf can be viewed as negligence.
In the table below, document the risks related to the assumptions being made about the upcoming change. What are the risks that your assumptions are wrong? Can steps be taken to avoid these risks?
| Risk Assumption | Magnitude if Assumption Wrong | Likelihood That Assumption Is Wrong | Mitigation Strategy | Assessment |
|---|---|---|---|---|
| e.g. Customers will accept shipping fees for overweight items > 10 pounds | Low | High | It's a percentage of our business, and usually accompanies a sharply discounted product. We need to extend discretionary discounting on shipping to supervisory staff to mitigate the risk of lost business. | Re-assess after each quarter. |
"One strategy to minimize the impact is to determine the right implementation pace, which will vary depending on the size of the company and the complexity of the project" – Chirantan Basu
Use the table below to brainstorm the business opportunities arising from your change initiative. Consider if the PMO can take steps to help improve the outcomes either through supporting the project execution or through providing support to the business.
| Opportunity Assumption | Potential Value | Likelihood That Assumption Is Wrong | Leverage Strategy | Assessment |
|---|---|---|---|---|
| e.g. Customer satisfaction can increase as delivery time frames for the remaining custom products radically shrink and services extend greatly. | High | Medium | Reset the expectations of this market segment so that they go from being surprised by good service to expecting it. | Our competitors will not be able to react to this. |
Info-Tech Insight
The bigger the change, the bigger the opportunity. Project and change management has traditionally focused on a defensive posture because organizations so often fail to mitigate risk. Good change managers also watch for opportunities to improve and exploit the outcomes of the change.
Now that you’ve assessed the impacts of the change, and the accompanying risks and opportunities, use the table below to document metrics that can be used to help assess the management of the change.
| Metric | Calculation | How to Collect | Who to Report to | Frequency |
|---|---|---|---|---|
| Price overrides for new shipping costs | It is entered as a line item on invoices, so it can be calculated as % of shipping fees discounted. | Custom report from CRM (already developed). | Project Steering Committee | Project Steering Committee |
If your organization doesn’t have a standard business case document, use one of Info-Tech’s templates. We have two templates to choose from, depending on the size of the project and the amount of rigor required:
Download Info-Tech’s Comprehensive Business Case Template for large, complex projects or our Fast Track Business Case Template for smaller ones.
Work with an analyst to exercise your storytelling muscles, building out a process to help make the case for change throughout the organization.
Utilize analyst experience to help develop a sponsorship action plan to help facilitate more engaged change project sponsors.
Get an analyst perspective on how each impact may affect different stakeholders in order to assist with the project and OCM planning process.
Rightsize your response to change impacts by developing a game plan to mitigate each one according to adoption likelihood.
Work with the analyst to translate the risks and opportunities identified during the impact analysis into points of consideration to help inform and improve the business case for the project.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 4 to 6 weeks
Discuss these issues with analyst:
Then complete these activities…
With these tools & templates:
Discuss these issues with analyst:
Then complete these activities…
With these tools & templates:
Discuss these issues with analyst:
Then complete these activities…
With these tools & templates:
Empowerment: Increased worker mobility, effect of millennials in the workforce, and lower average tenure means that people are less tolerant of a hierarchical, command-and-control approach to change.
Noise: Inundation with communications and diversity of channels means the traditional “broadcast” approach to communicating change doesn’t work (i.e. you can’t expect every email to get everyone’s attention).
As a result, disciplines around organizational change tend to be less linear and deliberate than they were in the past.
"People don’t resist change. They resist being changed."
How to manage change in organizations of today and the future:
Accountabilities for change management are still required. While change management needs to adopt more collaborative and organic approaches, org change success still depends on assigning appropriate accountabilities. What’s changed in the move to matrix structure is that accountabilities need to be facilitated more collaboratively.
PMO leaders and IT experts often find themselves asked to help implement or troubleshoot technology-related business projects that are already in flight.
The PMO will end up with perceived or de facto responsibility for inadequate planning, communications, and training around technology-enabled change.
Projects led by the IT PMO tend to be more vulnerable to underestimating the impact on people and processes on the business side.
Make sure you engage stakeholders and representatives (e.g. “power users”) from user populations early enough to refine and validate your impact assessments.
Projects led by people on the business side tend to be more vulnerable to underestimating the implications of technology changes.
Make sure IT is involved early enough to identify and prepare for challenges and opportunities involving integration, user training, etc.
"A major impediment to more successful software development projects is a corporate culture that results in a lack of collaboration because business executives view the IT departments as "order takers," a view disputed by IT leaders."
– David Ramel (cited by Ben Linders)
Stakeholders will not only be highly involved in the process improvement initiative, but they also may be participants, so it’s essential that you get their buy-in for the initiative upfront.
Use Info-Tech’s Stakeholder Engagement Workbook to help plan how stakeholders rate in terms of engagement with the project.
Once you have identified where different stakeholders fall in terms of interests, influence, and support for/engagement with the change initiative, you can structure your communication plan (to be developed in step 3.2) based on where individuals and stakeholder groups fall.
Download Info-Tech’s Stakeholder Engagement Workbook.
The engagement plan is a structured and documented approach for:
Download Info-Tech’s Stakeholder Engagement Workbook.
Refer to your project level assessment from 1.2.2:
Info-Tech Insight
The more transformational the change, the more it will affect the org chart – not just after the implementation, but also through the transition.
Take time early in the project to define the reporting structure for the project/transition team, as well as any teams and roles supporting the transition.
Use the RACI table on the next slide to clarify who will be accountable, responsible, consulted, and informed for key tasks and activities around this change initiative.
Perform a RACI exercise pertaining to your pilot change initiative to clarify who to include in the stakeholder engagement activity.
Don’t reinvent the wheel: revisit the list of stakeholders and stakeholder groups from your impact assessment. The purpose of the RACI is to bring some clarity to project-specific responsibilities.
| Tasks | PMO | Project Manager | Sr. Executives | Technology SME | Business Lead | Process Owner | HR | Trainers | Communications |
|---|---|---|---|---|---|---|---|---|---|
| Meeting project objectives | A | R | A | R | R | ||||
| Identifying risks and opportunities | A | R | A | C | C | C | C | I | I |
| Building the action plan | A | R | C | R | R | R | R | R | R |
| Planning and delivering communications | A | R | C | C | C | C | C | R | A |
| Planning and delivering training | A | R | C | C | C | C | R | A | C |
| Gathering and analyzing feedback and KPIs | A | R | C | C | C | C | C | R | R |
Copy the results of this RACI exercise into tab 1 of the Stakeholder Engagement Workbook. In addition, it can be used to inform the designated RACI section in the Transition Plan Template. Revise the RACI Table there as needed.
Define key stakeholders (or stakeholder groups) who are affected by the project or are in positions to enable or block change.
In tab three of the Stakeholder Engagement Workbook, compile the list of stakeholders who are touched by the change and whose adoption of the change will be key to project success.
To save time, you can copy and paste your stakeholder list from the Set Up tab of the Organizational Change Management Impact Analysis Tool into the table below and edit the list as needed.
Formal stakeholder analysis should be:
Info-Tech Insight
Resistance is, in many cases, avoidable. Resistance is commonly provided by people who are upset about not being involved in the communication. Missed opportunities are the same: they usually could have been avoided easily had somebody known in time. Use the steps ahead as an opportunity to ensure no one has been missed.
Use tab 4 of the Stakeholder Engagement Workbook to systematically assess each stakeholder's influence, interest, and potential contribution to the project as well as to develop plans for engaging each stakeholder or stakeholder group.
Use the drop-downs to select stakeholders and stakeholder groups. These will automatically populate based on your inputs in tab 3.
Rate each stakeholder on a scale of 1 to 10 in terms of her/his influence in the organization. Not only do these rankings feed the stakeholder map that gets generated on the next slide, but they will help you identify change champions and resistors with influence.
Similar to the ranking under “Influence,” rate the “Interest” and “Potential Contribution” to help identify stakeholder engagement.
Document how you will engage each stakeholder and stakeholder group and document how soon you should communicate with them concerning the change. See the following slides for advice on eliciting change input.
Use the elicitation methods on the following slides to engage stakeholders and gather change requirements.
| Method | Description | Assessment and Best Practices | Stakeholder Effort | BA/PMO Effort |
|---|---|---|---|---|
| Casual Observation | The process of observing stakeholders performing tasks where the stakeholders are unaware they are being observed. | Capture true behavior through observation of stakeholders performing tasks without informing them that they are being observed. This information can be valuable for mapping business process; however, it is difficult to isolate the core business activities from unnecessary actions. | Low | Medium |
| Formal Observation | The process of observing stakeholders performing tasks where the stakeholders are aware they are being observed. | Formal observation allows business analysts to isolate and study the core activities in a business process because the stakeholder is aware they are being observed. Stakeholders may become distrusting of the business analyst and modify their behavior if they feel their job responsibilities or job security are at risk. | Low | Medium |
Info-Tech Insight
Observing stakeholders does not uncover any information about the target state. Be sure to use contextual observation in conjunction with other techniques to discover the target state.
| Method | Description | Assessment and Best Practices | Stakeholder Effort | BA/PMO Effort |
|---|---|---|---|---|
| Closed-Response Survey | A survey that has fixed responses for each answer. A Likert-scale (or similar measures) can be used to have respondents evaluate and prioritize possible requirements. | Closed-response surveys can be sent to large groups and used to quickly gauge user interest in different functional areas. They are easy for users to fill out and don’t require a high investment of time. However, their main deficit is that they are likely to miss novel requirements that are not listed. As such, closed-response surveys are best used after initial elicitation or brainstorming to validate feature groups. | Low | Medium |
| Open-Response Survey | A survey that has open-ended response fields. Questions are fixed, but respondents are free to populate the field in their own words. Open-response surveys take longer to fill out than closed, but can garner deeper insights. | Open-response surveys are a useful supplement (and occasionally a replacement) for group elicitation techniques, like focus groups, when you need to receive an initial list of requirements from a broad cross-section of stakeholders. Their primary shortcoming is the analyst can’t immediately follow up on interesting points. However, they are particularly useful for reaching stakeholders who are unavailable for individual one-on-ones or group meetings. | Medium | Medium |
Info-Tech Insight
Surveys can be useful mechanisms for initial drafting of raw requirements (open response) and gauging user interest in proposed requirements or feature sets (closed response). However, they should not be the sole focus of your elicitation program due to lack of interactivity and two-way dialogue with the business analyst.
| Method | Description | Assessment and Best Practices | Stakeholder Effort | BA/PMO Effort |
|---|---|---|---|---|
|
Structured One-on-One Interview |
In a structured one-on-one interview, the business analyst has a fixed list of questions to ask the stakeholder and follows up where necessary. | Structured interviews provide the opportunity to quickly hone in on areas of concern that were identified during process mapping or group elicitation techniques. They should be employed with purpose – to receive specific stakeholder feedback on proposed requirements or help identify systemic constraints. Generally speaking, they should take 30 minutes or less to complete. | Low | Medium |
|
Unstructured One-on-One Interview |
In an unstructured one-on-one interview, the business analyst allows the conversation to flow freely. The BA may have broad themes to touch on, but does not run down a specific question list. | Unstructured interviews are most useful for initial elicitation when brainstorming a draft list of potential requirements is paramount. Unstructured interviews work best with senior stakeholders (sponsors or power users), since they can be time consuming if they’re applied to a large sample size. It’s important for BAs not to stifle open dialogue and allow the participants to speak openly. They should take 60 minutes or less to complete. | Medium | Low |
Info-Tech Insight
Interviews should be used with “high-value targets.” Those who receive one-on-one face time can help generate good requirements, as well as allow effective communication around requirements at a later point (i.e. during the analysis and validation phases).
| Method | Description | Assessment and Best Practices | Stakeholder Effort | BA/PMO Effort |
|---|---|---|---|---|
| Focus Group | Focus groups are sessions held between a small group (typically ten individuals or less) and an experienced facilitator who leads the conversation in a productive direction. | Focus groups are highly effective for initial requirements brainstorming. The best practice is to structure them in a cross-functional manner to ensure multiple viewpoints are represented and the conversation doesn’t become dominated by one particular individual. Facilitators must be wary of “groupthink” in these meetings (the tendency to converge on a single POV). | Medium | Medium |
Info-Tech Insight
Group elicitation techniques are most useful for gathering a wide spectrum of requirements from a broad group of stakeholders. Individual or observational techniques are typically needed for further follow-up and in-depth analysis with critical power users or sponsors.
"Each person has a learning curve. Take the time to assess staff individually as some don’t adjust to change as well as others. Some never will." – CEO, Manufacturing Firm
Review all of these elicitation methods as you go through the workbook as a group. Be sure to document and discuss any other elicitation methods that might be specific to your organization.
| Elicitation method | Target stakeholder group(s) | PMO staff responsible for eliciting input | Next update to PMO |
|---|---|---|---|
| One-on-one structured interview | HR and Sales | Karla Molina | August 1 |
Info-Tech Insight
Engagement paves the way for smoother communications. The “engagement” approach (rather than simply “communication”) turns stakeholders and users into advocates who help boost your message, sustain change, and realize benefits without constant, direct intervention.
Tab 5 of the Workbook provides an output – a stakeholder map – based on your inputs in the previous tab. Use the stakeholder map to inform your communications requirements considerations in the next tab of the workbook as well as your transition plan in the next step.
This is a screenshot of the “Stakeholder Analysis” from tab 5 of the Workbook. The four quadrants of the map are:
Top Quadrants: Supporters
Bottom Quadrant: Blockers
Use the Communications Requirements tab in the Stakeholder Engagement Workbook.
Do this as a 1–2 hour project team planning session.
The table will automatically generate a list of stakeholders based on your stakeholder analysis.
Update the assumptions that you made about the impact of the change in the Impact Analysis with results of stakeholder engagement and elicitation activities.
Use the table on this tab to refine these assumptions as needed before solidifying your communications plan.
Define the action required from each stakeholder or stakeholder group (if any) for change to be successful.
Continually refine messages and methods for communicating with each stakeholder and stakeholder group.
Note words that work well and words that don’t. For example, some buzzwords might have negative connotations from previous failed initiatives.
Designate who is responsible for developing and honing the communications plan (see details in the following section on developing the transition plan).
After completing this section you will have a realistic, effective, and adaptable transition plan that includes:
These activities will enable you to:
"Everyone loves change: take what you know and replace it with a promise. Then overlay that promise with the memory of accumulated missed efforts, half-baked attempts, and roads of abandoned promises."
Once the stakeholder engagement step has been completed, the PMO needs to facilitate the involvement of the transition team to help carry out transition planning and communications strategies.
You should have already sketched out a core transition team in step 1.2.6 of this blueprint. As with all org change activities, ensuring that individuals are made accountable for the execution of the following activities will be key for the long-term success of your change initiative.
Refer to the team structure examples from Activity 1.2.6 of this blueprint if you are still finalizing your transition team.
Download Info-Tech’s Transition Plan Template to help capture and record the outcomes of the activities in this step.
By now the project sponsor, project manager, and business analysts (or equivalent) should have defined project timelines, requirements, and other key details. Use these to start your communications planning process.
If your members of the transition team are also part of the core project team, meet with them to elicit the project timeline and requirements.
| Project Milestone | Milestone Time Frame | Communications Activities | Activity Timing | Notes |
|---|---|---|---|---|
| Business Case Approval |
|
|||
| Pilot Go-Live |
|
|||
| Full Rollout Approval |
|
|||
| Full Rollout |
|
|||
| Benefits Assessment |
|
Info-Tech Insight
Communicate, communicate, communicate.
Staff are 34% more likely to adapt to change quickly during the implementation and adoption phases when they are provided with a timeline of impending changes specific to their department. (Source: McLean & Company)
OCM experts use terms like “Valley of Despair” to describe temporary drops in support and morale that inevitably occur with any significant change. Don’t let these temporary drops derail your change efforts.
Anticipate setbacks and make sure the project plan accommodates the time and energy required to sustain and reinforce the initiative as people move through stages of resistance.
Based on Don Kelley and Daryl Conner’s Emotional Cycle of Change.
Identify critical points in the change curve:
Leveraging the stakeholder analyses you’ve already performed in steps 2.2 and 3.1, customize your communications strategy for the individual stakeholder groups.
Think about where each of the groups falls within the Organizational Change Depth Scale (below) to determine the type of communications approach required. Don’t forget: the deeper the change, the tougher the job of managing change will be.
| Procedural | Behavioral | Interpersonal | Vocational | Cultural |
|---|---|---|---|---|
|
Position
|
Incentivize
|
Empathize
|
Educate
|
Inspire
|
| Depth Levels | Stakeholder Groups | Tactics |
|---|---|---|
| Procedural | Position: Provide explanation of what exactly has changed and specific procedural instructions of what exactly people must do differently to ensure they remember to make adjustments as effortlessly as possible. | |
| Behavioral | Incentivize: Break old habits and establish new ones by adjusting the context of formal and informal incentives (including objective rewards, contextual nudges, cues, and informal recognition). | |
| Interpersonal | Empathize: Offer genuine recognition and support for disruptions of personal networks (a significant source of personal well-being) that may result from changing work relationships. Show how leadership shares the burden of such sacrifices. | |
| Vocational | Educate: Provide a range of learning options (formal and self-directed) to provide the knowledge and skills people need to learn and succeed in changed roles. | |
| Cultural | Inspire: Frame incentives in a vocabulary that reflects any shift in what types of things are seen as “good” or “normal” in the organization. |
Straightforward → Complex
When managing interpersonal, vocational, or cultural changes, you will be required to incorporate more inspirational messaging and gestures of empathy than you typically might in a business communication.
Communications that require an appeal to people’s emotions can be, of course, very powerful, but they are difficult to craft. As a result, oftentimes messages that are meant to inspire do the exact opposite, coming across as farfetched or meaningless platitudes, rather than evocative and actionable calls to change.
Refer to the tactics below for assistance when crafting more complex change communications that require an appeal to people’s emotions and imaginations.
"Instead of resisting any emotion, the best way to dispel it is to enter it fully, embrace it and see through your resistance."
Build upon the more high-level change story that you developed in step 1.1 by giving more specificity to the change for specific stakeholder groups.
Questions to address in your communication strategy include: How will the change benefit the organization and its people? How have we confirmed there is a need for change? What would happen if we didn’t change? How will the change leverage existing strengths – what will stay the same? How will we know when we get to the desired state?
Remember these guidelines to help your messages resonate:
Info-Tech Insight
Change thy language, change thyself.
Jargon, acronyms, and technical terms represent deeply entrenched cultural habits and assumptions.
Continuing to use jargon or acronyms after a transition tends to drag people back to old ways of thinking and working.
You don’t need to invent a new batch of buzzwords for every change (nor should you), but every change is an opportunity to listen for words and phrases that have lost their meaning through overuse and abuse.
If there are multiple messages or impacts that need to be communicated to a single group or audience, you may need to do multiple Message Canvases per group. Refer back to your Stakeholder Engagement Workbook to help inform the stakeholder groups and messages that this activity should address.
Go to tab 6 of the Organizational Change Impact Analysis Toolfor multiple message canvas template boxes that you can use. These messages can then help inform your communication plan on tab 7 of that tool.
Review your options for communicating your change. This slide covers traditional methods of communication, while the following slides cover some options for multimedia mass-communications.
| Method | Best Practices |
|---|---|
| Email announcements are necessary for every organizational change initiative but are never sufficient. Treat email as a formalizing medium, not a medium of effective communication when organizational change is concerned. Use email to invite people to in-person meetings, make announcements across teams and geographical areas at the same time, and share formal details. | |
| Team Meeting | Team meetings help sell change. Body language and other in-person cues are invaluable when trying to influence people. Team meetings also provide an opportunity to gauge a group’s response to an announcement and gives the audience an opportunity to ask questions and get clarification. |
| One-on-One | One-on-ones are more effective than team meetings in their power to influence and gauge individual responses, but aren’t feasible for large numbers of stakeholders. Use one-on-ones selectively: identify key stakeholders and influencers who are most able to either advocate change on your behalf or provide feedback (or both). |
| Internal Site / Repository | Internal sites and repositories help sustain change by making knowledge available after the implementation. People don’t retain information very well when it isn’t relevant to them. Much of their training will be forgotten if they don’t apply that knowledge for several weeks or months. Use internal sites and repositories for how-to guides and standard operating procedures. |
| Method | Best Practices |
|---|---|
| User Interfaces | User interface (UI) design is overlooked as a communication method. Often a simple UI refinement with the clearer prompts or warnings is more effective and efficient than additional training and repeated email reminders. |
| Social Media | Social media is widely and deeply embraced by people publicly, and is increasingly useful within organizations. Look for ways to leverage existing internal social tools. Avoid trying to introduce new social channels to communicate change unless social transformation is within the scope of the core project’s goals; the social tool itself might become as much of an organizational change management challenge as the original project. |
| Posters & Marketing Collateral | Posters and other marketing collateral are common communication tools in retail and hospitality industries that change managers in other industries often don’t think of. Making key messages a vivid, visual part of people’s everyday environment is a very effective way to communicate. On the down side, marketing collateral requires professional design skills and can be costly to create. Professional copywriting is also advisable to ensure your message resonates. |
| Video | Videos are well worth the cost to produce when the change is transformational in nature, as in cultural changes. Videos are useful for both communicating the vision and as part of the training plan. |
This is a screenshot from the “Stakeholder/Audience” section of Info-Tech’s Transition Plan Template. Use the template to document your communication strategy for each audience and your delivery plan.
"The role of project communication is to inspire, instigate, inform or educate and ultimately lead to a desired action. Project communication is not a well presented collection of words; rather it is something that propels a series of actions."
Info-Tech Insight
Repetition is crucial. People need to be exposed to a message 7 times before it sticks. Using a variety of delivery formats helps ensure people will notice and remember key messages. Mix things up to keep employees engaged and looking forward to the next update.
"While creating and administering a survey represent(s) additional time and cost to the project, there are a number of benefits to be considered: 1) Collecting this information forces regular and systematic review of the project as it is perceived by the impacted organizations, 2) As the survey is used from project to project it can be improved and reused, 3) The survey can quickly collect feedback from a large part of the organization, increasing the visibility of the project and reducing unanticipated or unwelcome reactions."
Use the survey and questionnaire templates on the following two slides for assistance in eliciting feedback. Record the evaluation and feedback gathering process in the Transition Plan Template.
Use email to distribute a questionnaire (such as the example below) to project stakeholders to elicit feedback.
In addition to receiving invaluable opinions from key stakeholders and the frontline workers, utilizing questionnaires will also help involve employees in the change, making them feel more engaged and part of the change process.
| Interviewee | Date | ||
|---|---|---|---|
| Stakeholder Group | Interviewer | ||
| Question | Response | Notes | |
| How do you think this change will affect you? | |||
| How do you think this change will affect the organization? | |||
| How long do you expect the change to take? | |||
| What do you think might cause the project/change to fail? | |||
| What do you think are the most critical success factors? | |||
Similar to a questionnaire, a survey is a great way to assess the lay of the land in terms of your org change efforts and the likelihood of adoption.
Using a free online survey tool like Survey Monkey, Typeform, or Google Forms, surveys are quick and easy to generate and deploy. Use the below example as a template to build from.
Use survey and questionnaire feedback as an occasion to revisit the Impact Analysis Tool and reassess the impacts and roadblocks based on hard feedback.
1=Strongly Disagree, 2=Disagree, 3=Somewhat Disagree, 4=Somewhat Agree, 5=Agree, 6=Strongly Agree
1=Very Negative, 2=Negative, 3=Somewhat Negative, 4=Somewhat Positive, 5=Positive, 6=Very Positive
The slides that follow walk you through activities to assess the different “faces of change” around your OCM initiative and to perform an objections handling exercise.
Assessing people’s emotional responses to the change will enable the PMO and transition team to:
Carol Beatty’s distinction between “easy work,” “hard work,” and “tough work” can be revealing in terms of the high failure rate on many change initiatives. (“The Tough Work of Managing Change.” Queen’s University IRC. 2015.)
That is what makes organizational change “tough,” as opposed to merely hard. Managing change requires mental and emotional toughness to deal with uncertainty, ambiguity, and conflict.
Use the table below to document where different stakeholders and stakeholder groups fall within the spectrum.
| Response | Symptoms | Examples |
|---|---|---|
| Active Subversion | Publicly or privately disparaging the transition (in some cases privately disparaging while pretending to support); encouraging people to continue doing things the old way or to leave the organization altogether. | Group/Name |
| Quiet Resistance | Refusing to adopt change, continuing to do things the old way (including seemingly trivial or symbolic things). Non-participative. | Group/Name |
| Vocal Skepticism | Asking questions; questioning the why, what, and how of change, but continuing to show willingness to participate and try new things. | Group/Name |
| Neutrality / Uncertainty | Non-vocal participation, perhaps with some negative body language, but continuing to show tacit willingness to try new things. | Group/Name |
| Vocal Approval | Publicly and privately signaling buy-in for the change. | Group/Name |
| Quiet Support | Actively helping to enable change to succeed without necessarily being a cheerleader or trying to rally others around the transition. | Group/Name |
| Active Leadership | Visibly championing the change and helping to rally others around the transition. | Group/Name |
Use the below tactics across the “faces of change” spectrum to help inform the PMO’s responses to sources of objection and resistance and its tactics for leveraging support.
| Response | Engagement Strategies and Tactics |
|---|---|
| Active Subversion | Firmly communicate the boundaries of acceptable response to change: resistance is a natural response to change, but actively encouraging other people to resist change should not be tolerated. Active subversion often indicates the need to find a new role or depart the organization. |
| Quiet Resistance | Resistance is a natural response to change. Use the Change Curve to accommodate a moderate degree and period of resistance. Use the OCM Depth Scale to ensure communications strategies address the irrational sources of resistance. |
| Vocal Skepticism | Skepticism can be a healthy sign. Skeptics tend to be invested in the organization’s success and can be turned into vocal and active supporters if they feel their questions and concerns have been heard and addressed. |
| Neutrality / Uncertainty | Most fence-sitters will approve and support change when they start to see concrete benefits and successes, but are equally likely to become skeptics and resisters when they see signs of failure or a critical mass of skepticism, resistance, or simply ambivalence. |
| Vocal Approval | Make sure that espoused approval for change isn’t masking resistance or subversion. Engage vocal supporters to convert them into active enablers or champions of change. |
| Quiet Support | Engage quiet supporters to participate where their skills or social and political capital might help enable change across the organization. This could either be formal or informal, as too much formal engagement can invite minor disagreements and slow down change. |
| Active Leadership | Engage some of the active cheerleaders and champions of change to help deliver communications (and in some cases training) to their respective groups or teams. |
| What If... | Do This: | To avoid: |
|---|---|---|
| You aren’t on board with the change? | Fake it to your staff, then communicate with your superiors to gather the information you need to buy in to the change. | Starting the change process off on the wrong foot. If your staff believe that you don’t buy in to the change, but you are asking them to do so, they are not going to commit to it. |
| When you introduce the change, a saboteur throws a tantrum? | If the employee storms out, let them. If they raise uninformed objections in the meeting that are interrupting your introduction, ask them to leave and meet with them privately later on. Schedule an ad hoc one-on-one meeting. | A debate at the announcement. It’s an introduction to the change and questions are good, but it’s not the time for debate. Leave this for the team meetings, focus groups, and one-on-ones when all staff have digested the information. |
| Your staff don’t trust you? | Don’t make the announcement. Find an Enthusiast or another manager that you trust to make the announcement. | Your staff blocking any information you give them or immediately rejecting anything you ask of them. Even if you are telling the absolute truth, if your staff don’t trust you, they won’t believe anything you say. |
| An experienced skeptic has seen this tried before and states it won’t work? | Leverage their experience after highlighting how the situation and current environment is different. Ask the employee what went wrong before. | Reinventing a process that didn’t work in the past and frustrating a very valuable segment of your staff. Don’t miss out on the wealth of information this Skeptic has to offer. |
Use the Objections Handling Template on the next slide to brainstorm specific objections and forms of resistance and to strategize about the more effective responses and mitigation strategies.
Copy these objections and responses into the designated section of the Transition Plan Template. Continue to revise objections and responses there if needed.
| Objection | Source of Objection | PMO Response |
|---|---|---|
| We tried this two years ago. | Vocal skepticism | Enabling processes and technologies needed time to mature. We now have the right process discipline, technologies, and skills in place to support the system. In addition, a dedicated role has been created to oversee all aspects of the system during and after implementation. |
| Why aren’t we using [another solution]? | Uncertainty | We spent 12 months evaluating, testing, and piloting solutions before selecting [this solution]. A comprehensive report on the selection process is available on the project’s internal site [here]. |
Info-Tech Insight
There is insight in resistance. The individuals best positioned to provide insight and influence change positively are also best positioned to create resistance. These people should be engaged throughout the implementation process. Their insights will very likely identify risks, barriers, and opportunities that need to be addressed.
Highlighting quick wins or “bright spots” helps you go from communicating change to more persuasively demonstrating change.
Specifically, quick wins help:
Take the time to assess and plan quick wins as early as possible in the planning process. You can revisit the impact assessment for assistance in identifying potential quick wins; more so, work with the project team and other stakeholders to help identify quick wins as they emerge throughout the planning and execution phases.
Make sure you highlight bright spots as part of the larger story and vision around change. The purpose is to continue to build or sustain momentum and morale through the transition.
"The quick win does not have to be profound or have a long-term impact on your organization, but needs to be something that many stakeholders agree is a good thing… You can often identify quick wins by simply asking stakeholders if they have any quick-win recommendations that could result in immediate benefits to the organization."
Info-Tech Insight
Stay positive. Our natural tendency is to look for what’s not working and try to fix it. While it’s important to address negatives, it’s equally important to highlight positives to keep people committed and motivated around change.
Upon completion of the activities in this step, the PMO Director is responsible for ensuring that outcomes have been documented and recorded in the Transition Plan Template. Activities to be recorded include:
Going forward, successful change will require that many responsibilities be delegated beyond the PMO and core transition team.
Download Info-Tech’s Transition Plan Template.
"Whenever you let up before the job is done, critical momentum can be lost and regression may follow." – John Kotter, Leading Change
The PMO’s OCM approach should leverage organizational design and development capabilities already in place.
Recommendations in this section are meant to help the PMO and transition team understand HR and training plan activities in the context of the overall transition process.
Where organizational design and development capabilities are low, the following steps will help you do just enough planning around HR, and training and development to enable the specific change.
In some cases the need for improved OCM will reveal the need for improved organizational design and development capabilities.
This section will walk you through the basic steps of developing HR, training, and development plans to support and enable the change.
For comprehensive guidance and tools on role, job, and team design, see Info-Tech’s Transform IT Through Strategic Organizational Design blueprint.
Info-Tech Insight
Don’t make training a hurdle to adoption. Training and other disruptions take time and energy away from work. Ineffective training takes credibility away from change leaders and seems to validate the efforts of saboteurs and skeptics. The PMO needs to ensure that training sessions are as focused and useful as possible.
Refer back to Activity 3.2.4. Use the placement of each stakeholder group on the Organizational Change Depth Scale (below) to determine the type of HR and training approach required. Don’t impose training rigor where it isn’t required.
| Procedural | Behavioral | Interpersonal | Vocational | Cultural |
|---|---|---|---|---|
| Simply changing procedures doesn’t generally require HR involvement (unless HR procedures are affected). | Changing behaviors requires breaking old habits and establishing new ones, often using incentives and disincentives. | Changing teams, roles, and locations means changing people’s relationships, which adds disruption to people’s lives and challenges for any change initiative. | Changing people’s roles and responsibilities requires providing ways to acquire knowledge and skills they need to learn and succeed. | Changing values and norms in the organization (i.e. what type of things are seen as “good” or “normal”) requires deep disruption and persistence. |
| Typically no HR involvement. | HR consultation recommended to help change incentives, compensation, and training strategies. | HR consultation strongly recommended to help define roles, jobs, and teams. | HR responsibility recommended to develop training and development programs. | HR involvement recommended. |
22%
In a recent survey of 276 large and midsize organizations, eighty-seven percent of survey respondents trained their managers to “manage change,” but only 22% felt the training was truly effective. (Towers Watson)
Revisit the high-level project schedule from steps 1.2.4 and 3.4.1 to create a tentative timeline for HR and training activities.
Revise this timeline throughout the implementation process, and refine the timing and specifics of these activities as you move from the development to the deployment phase.
| Project Milestone | Milestone Time Frame | HR/Training Activities | Activity Timing | Notes |
|---|---|---|---|---|
| Business Case Approval |
|
|||
| Pilot Go-Live |
|
|||
| Full Rollout Approval |
|
|||
| Full Rollout |
|
|||
| Benefits Assessment |
|
"The reason it’s going to hurt is you’re going from a state where you knew everything to one where you’re starting over again."
– BA, Natural Resources Company
Use the final tab in the Stakeholder Engagement Workbook, “7. Training Requirements,” to begin fleshing out a training plan for project stakeholders.
The table will automatically generate a list of stakeholders based on your stakeholder analysis.
If your stakeholder list has grown or changed since the stakeholder engagement exercise in step 3.1, update the “Stakeholder List” tab in the tool.
Estimate when training can begin, when training needs to be completed, and the total hours required.
Training too early and too late are both common mistakes. Training too late hurts morale and creates risks. Training too early is often wasted and creates the need for retraining as knowledge and skills are lost without immediate relevance to their work.
Brainstorm or identify potential opportunities to leverage for training (such as using existing resources and combining multiple training programs).
Review the Change Management Impact Analysis to assess skills and knowledge required for each group in order for the change to succeed.
Depending on the type of change being introduced, you may need to have more in-depth conversations with technical advisors, project management staff, and project sponsors concerning gaps and required content.
Ultimately, the training plan will have to be put into action, which will require that the key logistical decisions are made concerning content and training delivery.
“95% of learning leaders from organizations that are very effective at implementing important change initiatives find best practices by partnering with a company or an individual with experience in the type of change, twice as often as ineffective organizations.”
Source: Implementing and Supporting Training for Important Change Initiatives.
Training content should be developed and delivered by people with training experience and expertise, working closely with subject matter experts. In the absence of such individuals, partnering with experienced trainers is a cost that should be considered.
The long-term success of the change is contingent on having the resources to maintain and support the tool, process, or business change being implemented. Otherwise, resourcing shortfalls could threaten the integrity of the new way of doing things post-change, threatening people’s trust and faith in the validity of the change as a whole.
Use the table below to assess and record skills requirements. Refer to the tactics on the next slide for assistance in filling gaps.
| Skill Required | Description of Need | Possible Resources | Recommended Next Steps | Timeline |
|---|---|---|---|---|
| Mobile Dev | Users expect mobile access to services. We need knowledge of various mobile platforms, languages or frameworks, and UX/UI requirements for mobile. |
|
|
Probably Q1 2015 |
| DBAs | Currently have only one DBA, which creates a bottleneck. We need some DBA redundancy to mitigate risk of single point of failure. |
|
|
Q3 2014 |
| Options: | Benefits: | Drawbacks: |
|---|---|---|
| Redeploy staff internally |
|
|
| Outsource |
|
|
| Contract |
|
|
| Hire externally |
|
|
Info-Tech Insight
Try more ad hoc training methods to offset uncertain project timelines.
One of the top challenges organizations face around training is getting it timed right, given the changes to schedule and delays that occur on many projects.
One tactic is to take a more ad hoc approach to training, such as making IT staff available in centralized locations after implementation to address staff issues as they come up.
This will not only help eliminate the waste that can come from poorly timed and ineffective training sessions, but it will also help with employee morale, giving individuals a sense that they haven’t been left alone to navigate unfamiliar processes or technologies.
Industry Manufacturing
Source Info-Tech Client
"The cause of slow adoption is often not anger or denial, but a genuine lack of understanding and need for clarification. Avoid snap decisions about a lack of adoption until staff understand the details." – IT Manager
Move away from a command-and-control approach to change by working with the analyst to develop a strategy that engages stakeholders in the change, making them feel like they are a part of it.
Work with the analyst to fine-tune the stakeholder messaging across various stakeholder responses to change.
Utilize analyst experience and perspective in order to develop strategy for effectively evaluating stakeholder feedback early enough that resistance and suggestions can be accommodated with the OCM strategy and project plan.
Utilize analyst experience and perspective in order to develop an objections handling strategy to deal with resistance, objections, and fatigue.
Receive custom analyst insights on rightsizing training content and timing your training sessions effectively.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1 to 2 weeks
Discuss these issues with analyst:
Then complete these activities…
With these tools & templates:
Organizations rarely close the loop on project benefits once a project has been completed.
With all this in mind, in this step we will round out our PMO-driven org change process by defining how the PMO can help to better facilitate the benefits realization process.
This section will walk you through the basic steps of developing a benefits attainment process through the PMO.
For comprehensive guidance and tools, see Info-Tech’s Establish the Benefits Realization Process.
Info-Tech Insight
Two of a kind. OCM, like benefits realization, is often treated as “nice to have” rather than “must do.” These two processes are both critical to real project success; define benefits properly during intake and let OCM take the reigns after the project kicks off.
Benefits realization ensures that the benefits defined in the business case are used to define a project’s expected value, and to facilitate the delivery of this value after the project is closed. The process begins when benefits are first defined in the business case, continues as benefits are managed through project execution, and ends when the loop is closed and the benefits are actually realized after the project is closed.
| Benefits Realization | ||
|---|---|---|
| Define | Manage | Realize |
| Initial Request | Project Kick Off | *Solution Is Deployed |
| ↓ | ↓ | ↓ |
| Business Case Approved | Project Execution | Solution Maintenance |
| ↓ | ↓ | ↓ |
| PM Assigned | *Project Close | Solution Decommissioned |
*For the purposes of this step, we will limit our focus to the PMO’s responsibilities for benefits attainment at project close-out and in the project’s aftermath to ensure that responsibilities for tracking business outcomes post-project have been properly defined and resourced.
As the project closes, responsibility for benefits tracking passes from the project team to the project sponsor. In many cases, the PMO will need to function as an intermediary here, soliciting the sponsor’s involvement when the time comes.
The project manager and team will likely move onto another project and the sponsor (in concert with the PMO) will be responsible for measuring and reporting benefits realization.
As benefits realization is measured, results should be collated by the PMO to validate results and help flag lagging benefits.
The PMO should ensure the participation of the project sponsor, the project manager, and any applicable members of the business side and the project team for this step.
Ideally, the CIO and steering committee members should be involved as well. At the very least, they should be informed of the decisions made as soon as possible.
Initiation-Planning-Execution-Monitoring & Controlling-Closing
The post-project phase is the most challenging because the project team and sponsor will likely be busy with other projects and work.
Conducting a post-implementation review for every project will force sponsors and other stakeholders to assess actual benefits realization and identify lagging benefits.
If the project is not achieving its benefits, a remediation plan should be created to attempt to capture these benefits as soon as possible.
| Agenda Item | |
|---|---|
| Assess Benefits Realization |
|
| Assess Quality |
|
| Discuss Ongoing Issues |
|
| Discuss Training |
|
| Assess Ongoing Costs |
|
| Assess Customer Satisfaction |
|
The realization stage is the most difficult to execute and oversee. The project team will have moved on, and unless someone takes accountability for measuring benefits, progress will not be measured. Use the sample RACI table below to help define roles and responsibilities for post-project benefits attainment.
| Process Step | Responsible | Accountable | Consulted | Informed |
|---|---|---|---|---|
| Track project benefits realization and document progress | Project sponsor | Project sponsor | PMO (can provide tracking tools and guidance), and directors or managers in the affected business unit who will help gather necessary metrics for the sponsor (e.g. report an increase in sales 3 months post-project) | PMO (can collect data and consolidate benefits realization progress across projects) |
| Identify lagging benefits and perform root cause analysis | Project sponsor and PMO | Project sponsor and PMO | Affected business unit | CIO, IT steering committee |
| Adjust benefits realization plan as needed | Project sponsor | Project sponsor | Project manager, affected business units | Any stakeholders impacted by changes to plan |
| Report project success | PMO | PMO | Project sponsor | IT and project steering committees |
Info-Tech Insight
A business accountability: Ultimately, the sponsor must help close this loop on benefits realization. The PMO can provide tracking tools and gather and report on results, but the sponsor must hold stakeholders accountable for actually measuring the success of projects.
While project sponsors should be accountable for measuring actual benefits realization after the project is closed, the PMO can provide monitoring tools and it should collect measurements and compare results across the portfolio.
Steps in a benefits tracking process.
"Checking the results of a decision against its expectations shows executives what their strengths are, where they need to improve, and where they lack knowledge or information."
– Peter Drucker
Download Info-Tech’s Portfolio Benefits Tracking Tool to help solidify the process from the previous step.
Simply publishing a set of best practices will not have an impact unless accountability is consistently enforced. Increasing accountability should not be complicated. Focus on publicly recognizing benefit success. As the process matures, you should be able to use benefits as a more frequent input to your budgeting process.
Info-Tech Insight
Don’t forget OCM best practices throughout the benefits tracking process. If benefits are lagging, the PMO should revisit phase 3 of this blueprint to consider how challenges to adoption are negatively impacting benefits attainment.
Get custom insights into how the benefits tracking process should be carried out post-project at your organization to ensure that intended project outcomes are effectively monitored and, in the long run, achieved.
Let our analysts customize a home-grown benefits tracking tool for your organization to ensure that the PMO and project sponsors are able to easily track benefits over time and effectively pivot on lagging benefits.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1 to 2 weeks
Discuss these issues with an analyst:
Then complete these activities…
With these tools & templates:
We return to a question that we started with in the Executive Brief of this blueprint: who is accountable for organizational change?
If nobody has explicit accountability for organizational change on each project, the Officers of the corporation retained it. Find out who is assumed to have this accountability.
Info-Tech Insight
Will the sponsor please stand up?
Project sponsors should be accountable for the results of project changes. Otherwise, people might assume it’s the PMO or project team.
Change Management Capabilities
Progressively build a stable set of core capabilities.
The basic science of human behavior underlying change management is unlikely to change. Effective engagement, communication, and management of uncertainty are valuable capabilities regardless of context and project specifics.
Organizational Context
Regularly update recurring activities and artifacts.
The organization and the environment in which it exists will constantly evolve. Reusing or recycling key artifacts will save time and improve collaboration (by leveraging shared knowledge), but you should plan to update them on at least a quarterly or annual basis.
Future Project Requirements
Approach every project as unique.
One project might involve more technology risk while another might require more careful communications. Make sure you divide your time and effort appropriately for each particular project to make the most out of your change management playbook.
Info-Tech Insight
Continuous Change. Continuous Improvement. Change is an ongoing process. Your approach to managing change should be continually refined to keep up with changes in technology, corporate strategy, and people involved.
1. With your pilot OCM initiative in mind, retrospectively brainstorm lessons learned using the template below. Info-Tech recommends doing this with the transition team. Have people spend 10-15 minutes brainstorming individually or in 2- to 3-person groups, then spend 15-30 minutes presenting and discussing findings collectively.
| What worked? | What didn't work? | What was missing? |
|---|---|---|
2. Develop recommendations based on the brainstorming and analysis above.
| Continue... | Stop... | Start... |
|---|---|---|
Perform the Organizational Change Management Capabilities Assessment in the wake of the OCM pilot initiative and lessons learned exercise to assess capabilities’ improvements.
As your OCM processes start to scale out over a range of projects across the organization, revisit the assessment on a quarterly or bi-annual basis to help focus your improvement efforts across the 7 change management categories that drive the survey.
Info-Tech Insight
Continual OCM improvement is a collaborative effort.
The most powerful way to drive continual improvement of your organizational change management practices is to continually share progress, wins, challenges, feedback, and other OCM related concerns with stakeholders. At the end of the day, the PMO’s efforts to become a change leader will all come down to stakeholder perceptions based upon employee morale and benefits realized.
Info-Tech Insight
Avoid creating unnecessary fiefdoms.
Make sure any permanent roles are embedded in the organization (e.g. within the PMO) and have leadership support.
Copy the RACI table from Activity 3.1.1. and repurpose it to help define the roles and responsibilities.
Include this RACI when you formalize your OCM Playbook.
Download Info-Tech’s Organizational Change Management Playbook.
Use the Value tab in the Organizational Change Management Capabilities Assessment to monitor the value and success of OCM.
Measure past performance and create a baseline for future success:
As you scale out an OCM program for all of the organization’s projects based on your pilot initiative, work with the analyst to investigate and define the right accountabilities for ongoing, long-term OCM.
Formalize a programmatic process for organizational change management in Info-Tech’s playbook template.
Develop a Project Portfolio Management Strategy
Optimize Project Intake, Approval, and Prioritization
Develop a Resource Management Strategy for the New Reality
Establish the Benefits Realization Process
Project Portfolio Management Diagnostic Program: The Project Portfolio Management Diagnostic Program is a low effort, high impact program designed to help project owners assess and improve their PPM practices. Gather and report on all aspects of your PPM environment in order to understand where you stand and how you can improve.
Basu, Chirantan. “Top Organizational Change Risks.” Chiron. Web. June 14, 2016.
Beatty, Carol. “The Tough Work of Managing Change.” Queens University. 2015. Web. June 14, 2016.
Brown, Deborah. “Change Management: Some Statistics.” D&B Consulting Inc. May 15, 2014. Web. June 14, 2016.
Burke, W. Warner. Organizational Change: Theory and Practice. 4th Edition. London: Sage, 2008.
Buus, Inger. “Rebalancing Leaders in Times of Turbulence.” Mannaz. February 8, 2013. Web. June 14, 2016.
Change First. “Feedback from our ROI change management survey.” 2010. Web. June 14, 2016.
Collins, Jeff. “The Connection between User Adoption and Project Management Success.” Innovative Management Solutions. Sept. 21, 2013. Web. June 14, 2016.
Craddock, William. “Change Management in the Strategic Alignment of Project Portfolios.” PMI. 2015. Web. June 14, 2016.
Denning, Steve. “The Four Stories you Need to Lead Deep Organizational Change.” Forbes. July 25, 2011. Web. June 14, 2016.
Drucker, Peter. “What Makes an Effective Executive.” Harvard Business Review. June 2004. Web. June 14, 2016
Elwin, Toby. “Highlight Change Management – An Introduction to Appreciative Inquiry.” July 6, 2012. Web. June 14, 2016.
Enstrom, Christopher. “Employee Power: The Bases of Power Used by Front-Line Employees to Effect Organizational Change.” MA Thesis. University of Calgary. April 2003. Web. June 14, 2016.
Ewenstein, Boris, Wesley Smith, and Ashvin Sologar. “Changing Change Management.” McKinsey & Company. July 2015. Web. June 14, 2016.
International Project Leadership Academy. “Why Projects Fail: Facts and Figures.” Web. June 14, 2016.
Jacobs-Long, Ann. “EPMO’s Can Make A Difference In Your Organization.” May 9, 2012. Web. June 14, 2016.
Kotter, John. Leading Change. Boston: Harvard Business School Press, 1996.
Latham, Ross. “Information Management Advice 55 Change Management: Preparing for Change.” TAHO. March 2014. Web. June 14, 2016.
Linders, Ben. “Finding Ways to Improve Business – IT Collaboration.” InfoQ. June 6, 2013. Web. June 14, 2016
Machiavelli, Niccolo. The Prince, selections from The Discourses and other writings. Ed. John Plamenatz. London: Fontana/Collins, 1972.
Michalak, Joanna Malgorzata. “Cultural Catalyst and Barriers to Organizational Change Management: a Preliminary Overview.” Journal of Intercultural Management. 2:2. November 2010. Web. June 14, 2016.
Miller, David, and Mike Oliver. “Engaging Stakeholder for Project Success.” PMI. 2015. Web. June 14, 2016.
Parker, John. “How Business Analysts Can Identify Quick Wins.” EnFocus Solutions. February 15, 2013. Web. June 14, 2016.
Paulk, January. “The Fundamental Role a Change Impact Analysis Plays in an ERP Implementation.” Panorma Consulting Solutions. March 24, 2014. Web. June 14, 2016.
Petouhoff, Natalie, Tamra Chandler, and Beth Montag-Schmaltz. “The Business Impact of Change Management.” Graziadio Business Review. 2006. Web. June 14, 2016.
PM Solutions. “The State of the PMO 2014.” 2014. Web. June 14, 2016.
PMI. “Pulse of the Profession: Enabling Organizational Change Throughout Strategic Initiatives.” March 2014. Web. June 14, 2016.
PMI. “Pulse of the Profession: Executive Sponsor Engagement.” October 2014. Web. June 14, 2016.
PMI. “Pulse of the Profession: the High Cost of Low Performance.” February 2014. Web. June 14, 2016.
Powers, Larry, and Ketil Been. “The Value of Organizational Change Management.” Boxley Group. 2014. Web. June 14, 2016.
Prosci. “Best Practices in Change Management – 2014 Edition: Executive Overview.” Web. June 14, 2016.
Prosci. “Change Management Sponsor Checklist.” Web. June 14, 2016.
Prosci. “Cost-benefit analysis for change management.” 2014. Web. June 14, 2016.
Prosci. “Five Levers of Organizational Change.” 2016. Web. June 14, 2016.
Rick, Torben. “Change Management Requires a Compelling Story.” Meliorate. October 3, 2014. Web. June 14, 2016.
Rick, Torben. “The Success Rate of Organizational Change Initiatives.” Meliorate. October 13, 2014. Web. June 14, 2016.
Schwartz, Claire. “Implementing and Monitoring Organizational Change: Part 3.” Daptiv Blogs. June 24, 2013. Web. June 14, 2016.
Simcik, Shawna. “Shift Happens! The Art of Change Management.” Innovative Career Consulting, Inc. Web. June 14, 2016.
Stewart Group. “Emotional Intelligence.” 2014. Web. June 14, 2016.
Thakur, Sidharth. “Improve your Project’s Communication with These Inspirational Quotes.” Ed. Linda Richter. Bright Hub Project Management. June 9, 2012. Web. June 14, 2016.
Training Folks. “Implementing and Supporting Training for Important Change Initiatives.” 2012. Web. June 14, 2016.
Warren, Karen. “Make your Training Count: The Right Training at the Right Time.” Decoded. April 12, 2015. Web. June 14, 2016.
Willis Towers Watson. “Only One-Quarter of Employers Are Sustaining Gains from Change Management Initiatives, Towers Watson Survey Finds.” August 29, 2013. Web. June 14, 2016.
COVID-19 has created new risks to physical encounters among workers and customers. New biosecurity processes and ways to effectively enforce them – in the least intrusive way possible – are required to resume these activities.
New biosecurity standards will be imposed on many industries, and the autonomous edge will be part of the solution to manage that new reality.
There are some key considerations for businesses considering new biosecurity measures:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The Launch the Project phase will walk through completing Info-Tech's project charter template. This phase will help build a balanced project team, create a change message and communication plan, and achieve buy-in from key stakeholders.
The Identify and Define Enterprise Services phase will help to target enterprise services offered by the IT team. They are offered to everyone in the organization, and are grouped together in logical categories for users to access them easily.
After completing this phase, all services IT offers to each LOB or functional group should have been identified. Each group should receive different services and display only these services in the catalog.
Completing the Services Definition Chart will help the business pick which information to include in the catalog. This phase also prepares the catalog to be extended into a technical service catalog through the inclusion of IT-facing fields.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
The purpose of this module is to help engage IT with business decision making.
This module will help build a foundation for the project to begin. The buy-in from key stakeholders is key to having them take onus on the project’s completion.
1.1 Assemble the project team.
1.2 Develop a communication plan.
1.3 Establish metrics for success.
1.4 Complete the project charter.
A list of project members, stakeholders, and a project leader.
A change message, communication strategy, and defined benefits for each user group.
Metrics used to monitor the usefulness of the catalog, both from a performance and monetary perspective.
A completed project charter to engage users in the initiative.
The purpose of this module is to review services which are offered across the entire organization.
A complete list of enterprise services defined from the user’s perspective to help them understand what is available to them.
2.1 Identify enterprise services used by almost everyone across the organization.
2.2 Categorize services into logical groups.
2.3 Define the services from the user’s perspective.
A complete understanding of enterprise services for both IT service providers and business users.
Logical groups for organizing the services in the catalog.
Completed definitions in business language, preferably reviewed by business users.
The purpose of this module is to define the remaining LOB services for business users, and separate them into functional groups.
Business users are not cluttered with LOB definitions that do not pertain to their business activities.
Business users are provided with only relevant IT information.
3.1 Identify the LOBs.
3.2 Determine which one of two methodologies is more suitable.
3.3 Identify LOB services using appropriate methodology.
3.4 Define services from a user perspective.
A structured view of the different functional groups within the business.
An easy to follow process for identifying all services for each LOB.
A list of every service for each LOB.
Completed definitions in business language, preferably reviewed by business users.
The purpose of this module is to guide the client to completing their service record definitions completely.
This module will finalize the deliverable for the client by defining every user-facing service in novice terms.
4.1 Understand the components to each service definition (information fields).
4.2 Pick which information to include in each definition.
4.3 Complete the service definitions.
A selection of information fields to be included in the service catalog.
A selection of information fields to be included in the service catalog.
A completed service record design, ready to be implemented with the right tool.
The catalog defines, documents, and organizes the services that IT delivers to the organization. The catalog also describes the features of the services and how the services are intended to be used.
The user-facing service catalog creates benefits for both the business and IT.
User-friendly, intuitive, and simple overview of the services that IT provides to the business.
The items you would see on the menu at a restaurant are an example of User Facing. The content is relatable and easy to understand.
Series of technical workflows, supporting services, and the technical components that are required to deliver a service.
The recipe book with cooking instructions is an example of Technical Facing. This catalog is intended for the IT teams and is “behind the scene.”
The sum of the people, processes, and technologies required to enable users to achieve a business outcome is a Service.
A service is used directly by the end users and is perceived as a coherent whole.
Business Users →Service = Application & Systems + People & Processes
In other words, put on your user hat and leave behind the technical jargons!
|
|
|
|
23% of IT is still viewed as a cost center. |
47% of business executives believe that business goals are going unsupported by IT. |
92% of IT leaders see the need to prove the business value of IT’s contribution. |
|
How a Service Catalog can help: |
||
|---|---|---|
|
Use the catalog to demonstrate how IT is an integral part of the organization and IT services are essential to achieve business objectives. |
Transform the perception of IT by articulating all the services that are provided through the service catalog in a user-friendly language. Source: Info-Tech Benchmarking and Diagnostic Programs |
Increase IT-business communication and collaboration through the service catalog initiative. Move from technology focused to service-oriented. |
The team must be balanced between representatives from the business and IT.
Communication plan to facilitate input from both sides and gain adoption.
Metrics should reflect the catalog benefits. Look to reduced number of service desk inquiries.
Project charter helps walk you through project preparation.
2.1 Identify the services that are used across the entire organization.
2.2 Users must be able to identify with the service categories.
2.3 Create basic definitions for enterprise services.
3.1 Identify the different lines of business (LOBs) in the organization.
3.2 Understand the differences between our two methodologies for identifying LOB services.
3.3 Use methodology 1 if you have thorough knowledge of the business.
3.4 Use methodology 2 if you only have an IT view of the LOB.
4.1 Understand the different components to each service definition, or the fields in the service record.
4.2 Identify which information to include for each service definition.
4.3 Define each enterprise service according to the information and field properties.
4.3 Define each LOB service according to the information and field properties.
Trying to implement too many services at once can be overwhelming for both IT and the users. You don’t have to define and implement all of your services in one release of the catalog.
Info-Tech recommends implementing services themselves in batches, starting with enterprise, and then grouping LOB services into separate releases. Why? It benefits both IT and business users:
Improve IT’s visibility within the organization by creating a single source of information for all the value creating services IT has to offer. The service catalog helps the business understand the value IT brings to each service, each line of business, and the overall organization.
The service catalog contains information which empowers business users to access IT services and information without the help of IT support staff. The reduction in routine inquiries decreases workload and increases morale within the IT support team, and allows IT to concentrate on providing higher value services.
Service catalog brings more control to your IT environment by reducing shadow IT activities. The service catalog communicates business requests responsively in a language the business users understand, thus eliminating the need for users to seek outside help.
The language of IT is often confusing for the business and the users don’t know what to do when they have a concern. With a user-facing service catalog, business users can access information through a single source of information, and better understand how to request access or receive support for a service through clear, consistent, and business-relevant language.
The service catalog enables users to “self-serve” IT services. Instead of calling the service desk every time an issue occurs, the users can rely on the service catalog for information. This simplified process not only reduces routine service requests, but also provides information in a faster, more efficient manner that increases productivity for both IT and the business.
With every service clearly defined, business users can better understand the current support level, communicate their expectation for IT accountability, and help IT align services with critical business strategies.
A project charter template with a few samples completed. The project charter helps you govern the project progress and responsibilities.
A full list of enterprise definitions with features and descriptions pre-populated. These are meant to get you on your feet defining your own enterprise services, or editing the ones already there.
Similar to the enterprise services deliverable, but with two separate deliverables focusing on different perspectives – functional groups services (e.g. HR and finance) and industry-specific services (e.g. education and government).
Get a taste of a completed service catalog with full service definitions and service record design. This is the final product of the service catalog design once all the steps and activities have been completed.
Need an IT-friendly breakdown of each service?
Keep better record of what technical components are required to deliver a service. The technical service catalog is the IT version of a user-facing catalog.
Want to know how much each IT service is costing you?
Get a better grip on the true cost of IT. Using service-based costing can help justify IT expenses and increase budgetary allotment.
Want to hold each business unit accountable for the IT services they use?
Some business units abuse their IT services because they are thought to be free. Keep them accountable and charge them for what they use.
No matter what size organization you may be, every organization can create a service catalog. Small businesses can benefit from the catalog the same way a large organization can. We have an easy step-by-step methodology to help introduce a catalog to your business.
It is common that users do not know where to go to obtain services from IT… We always end up with a serious time-crunch at the beginning of a new school year. With automated on- and off-boarding services, this could change for the better.
– Dean Obermeyer, Technology Coordinator, Los Alamos Public Schools
As the CIO and the project sponsor, you need to spearhead the development of the service catalog and communicate support to drive engagement and adoption.
The project leader acts on behalf of the CIO and must be a senior level staff member who has extensive knowledge of the organization and experiences marshalling resources.
Developing a service catalog requires dedication from many groups within IT and outside of IT.
The project leader must hold a visible, senior position and can marshal all the necessary resources to ensure the success of the project. Ability to exert impact and influence around both IT and the business is a must.
The user-facing service catalog cannot be successful if business input is not received.
The project leader must leverage his/her existing relationship with the business to test out the service definitions and the service record design.
Creating a service catalog is not an easy job and the project leader must continuously engage the team members to drive results and efficiency.
The highly visible nature of the service catalog means the project leader must produce a high-quality outcome that satisfies the business users.
Municipal Government
The IT department of a large municipal government in the United States provides services to a large number of customers in various government agencies.
Service Catalog Initiative
The municipal government allocated a significant amount of resources to answer routine inquiries that could have been avoided through user self-service. The government also found that they do not organize all the services IT provides, and they could not document and publish them to the customer. The government has already begun the service catalog initiative, but was struggling with how to identify services. Progress was slow because people were arguing amongst themselves – the project team became demoralized and the initiative was on the brink of failure.
Results
With Info-Tech’s onsite support, the government was able to follow a standardized methodology to identify and define services from the user perspective. The government was able to successfully communicate the initiative to the business before the full adoption of the service catalog.
We’re in demos with vendors right now to purchase an ITSM tool, and when the first vendor looked at our finished catalog, they were completely impressed.
- Client Feedback
[We feel] very confident. The group as a whole is pumped up and empowered – they're ready to pounce on it. We plan to stick to the schedule for the next three months, and then review progress/priorities. - Client Feedback
Healthcare Provider
The organization is a healthcare provider in Canada. It treats patients with medical emergencies, standard operations, and manages a faculty of staff ranging from nurses and clerks, to senior doctors. This organization is run across several hospitals, various local clinics, and research centers.
Service Catalog Initiative
Because the organization is publicly funded, it is subject to regular audit requirements – one of which is to have a service catalog in place.
The organization also would like to charge back its clients for IT-related costs. In order to do this, the organization must be able to trace it back to each service. Therefore, the first step would be to create a user-facing service catalog, followed by the technical service catalog, which then allows the organization to do service-based costing and chargeback.
Results
By leveraging Info-Tech’s expertise on the subject, the healthcare provider was able to fast-track its service catalog development and establish the groundwork for chargeback abilities.
"There is always some reticence going in, but none of that was apparent coming out. The group dynamic was very good. [Info-Tech] was able to get that response, and no one around the table was silent.
The [expectation] of the participants was that there was a purpose in doing the workshop. Everybody knew it was for multiple reasons, and everyone had their own accountability/stakes in the development of it. Highly engaged." - Client Feedback
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
|
Launch the Project |
Identify Enterprise Services |
Identify Line of Business Services |
Complete Service Definitions |
|
|---|---|---|---|---|
| Best-Practice Toolkit |
1.1 Assemble the project team. 1.2 Develop a communication plan. 1.3 Establish metrics for success. 1.4 Complete the project charter. |
2.1 Identify services available organization-wide. 2.2 Categorize services into logical groups. 2.3 Define the services. |
3.1 Identify different LOBs. 3.2 Pick one of two methodologies. 3.3 Use method to identify LOB services. |
4.1 Learn components to each service definition. 4.2 Pick which information to include in each definition. 4.3 Define each service accordingly. |
| Guided Implementations | Identify the project leader with the appropriate skills.
Assemble a well-rounded project team. Develop a mission statement and change messages. |
Create a comprehensive list of enterprise services that are used across the organization.
Create a categorization scheme that is based on the needs of the business users. |
Walk through the two Info-Tech methodologies and understand which one is applicable. Define LOB services using the appropriate methodology. |
Decide what should be included and what should be kept internal for the service record design. Complete the full service definitions. |
| Onsite Workshop | Phase 1 Results: Clear understanding of project objectives and support obtained from the business. |
Phase 2 Results: Enterprise services defined and categorized. |
Phase 3 Results: LOB services defined based on user perspective. |
Phase 4 Results: Service record designed according to how IT wishes to communicate to the business. |
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
|---|---|---|---|---|
| Activities | Launch the Project | Identify Enterprise Services | Identify Line of Business Services | Complete Service Definitions |
1.1 Assemble the project team. 1.2 Develop a communication plan. 1.3 Establish metrics for success. 1.4 Complete the project charter. | 2.1 Identify services available organization-wide. 2.2 Categorize services into logical groups. 2.3 Define the services. | 3.1 Identify different LOBs. 3.2 Pick one of two methodologies. 3.3 Use method to identify LOB services. | 4.1 Learn components to each service definition. 4.2 Pick which information to include in each definition. 4.3 Define each service accordingly. | |
| Deliverables |
|
|
|
|
Design & Build a User-Facing Service Catalog
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation 1: Launch the project Proposed Time to Completion: 2 weeks |
|
|---|---|
| Step 1.2: Create change messages |
Step 1.2: Create change messages |
|
Start with an analyst kick off call:
|
Review findings with analyst:
|
|
Then complete these activities… |
Then complete these activities… |
|
With these tools & templates: Service Catalog Project Charter |
With these tools & templates: Service Catalog Project Charter |
The following section of slides outline how to effectively use Info-Tech’s sample project charter.
The Project Charter is used to govern the initiative throughout the project. IT should provide the foundation for project communication and monitoring.
It has been pre-populated with information appropriate for Service Catalog projects. Please review this sample text and change, add, or delete information as required.
Building the charter as a group will help you to clarify your key messages and help secure buy-in from critical stakeholders upfront.
You may feel like a full charter isn’t necessary, and depending on your organizational size, it might not be. However, the exercise of building the charter is important none-the-less. No matter your current climate, some elements of communicating the value and plans for implementing the catalog will be necessary.
Use Info-Tech’s Service Catalog Project Charter.
Good mission statements are directive, easy to understand, narrow in focus, and favor substance over vagueness.
While building your mission statement, think about what it is intended to do, i.e. keep the project team engaged and engage others to adopt the service catalog. Included in the project charter’s mission statement section is a brief description of the goals and objectives of the service catalog.
Info-Tech’s project charter contains two sample mission statements, along with additional tips to help you create yours.
Project leader will be the main catalyst for the creation of the catalog. This person is responsible for driving the whole initiative.
IT project participants’ input and business input will be pivotal to the creation of the catalog.
The project stakeholders are the senior executives who have a vested interest in the service catalog. IT must produce periodic and targeted communication to these stakeholders.
Your project team will be a major success factor for your service catalog. Involvement from IT management and the business is a must.
IT Service Desk Manager
Senior Manager/Director of Application
Senior Manager/Director of Infrastructure
Business IT Liaison
Business representatives from different LOBs
Input your project team, their roles, and relevant contact information into your project charter, Section 2.
Obtain explicit buy-in from both IT and business stakeholders.
The stakeholders could be your biggest champions for the service catalog initiative, or they could pull you back significantly. Engage the stakeholders at the start of the project and communicate the benefits of the service catalog to them to gain their approval.
| Stakeholders |
Benefits |
|---|---|
| CIO |
|
|
Manager of Service Desk |
|
|
Senior Manager/Director of Application & Infrastructure |
|
|
Senior Business Executives from Major LOBs |
|
Document a list of stakeholders, their involvement in the process (why they are stakeholders), and their contact information in Section 3.
Spread the word of service catalog implementation. Bring attention to your change message through effective mediums and organizational changes.
The methods of communication (e.g. newsletters, email broadcast, news of the day, automated messages) notify users of implementation.
In addition, it is important to know who will deliver the message (delivery strategy). Talking to the business leaders is very important, and you need IT executives to deliver the message. Work hard on obtaining their support as they are the ones communicating to their staff and could be your project champions.
The communication plan should consist of changes that will affect the way users interact with the catalog. Users should know of any meetings pertinent to the maintenance and improvement of the catalog, and ways to access the catalog (e.g. link on desktop/start menu).
The Qualities of Leadership: Leading Change
Your communication plan should serve as a rough guide. Communication happens in several unpredictable happenstances, but the overall message should be contained within.
One of the top challenges for organizations that are implementing a service catalog is the acceptance and adoption of the change. Effective planning for implementation and communication is pivotal. Ensure you create tailored plans for communication and understand how the change will impact staff.
“Better Service, Better Value.” It is important to have two change messages prepared: one for the IT department and one for business users.
Outline a few of the key benefits each user group will gain from adopting the service catalog (e.g. Faster, ease of use, convenient, consistent…)
Anticipate some resistances of service catalog adoption and prepare responses. These may be the other benefits which were not included in the change message (e.g. IT may be reluctant to think in business language.)
Host lunch & learns to demonstrate the value of the service catalog to both business and IT user groups.
These training sessions also serve as a great way to gather feedback from users regarding style and usability.
Pick your communication medium, and then identify your target audience. You should have a change message for each: the IT department and the business users. Pay careful consideration to wording and phrasing with regard for each.
In order to measure the success of your service catalog, you must establish baseline metrics to determine how much value the catalog is creating for your business.
The number of service catalog requests should be carefully monitored so that it does not fluctuate too greatly. In general, the number of requests via the service catalog should increase, which indicates a higher level of self-serve.
The number of inquiry calls should decrease because customers are able to self-serve routine IT inquiries that would otherwise have gone through the service desk.
The organization could adopt the following sample survey questions:
From 0-5: How satisfied are you with the functionality of the service catalog? How often do you turn to the service catalog first to solve IT problems?
The number of non-standard requests should decrease because a majority of services should eventually be covered in the service catalog. Users should be able to solve nearly any IT related problem through navigating the service catalog.
| Metric Description | Current Metric | Future Goal |
|---|---|---|
| Number of service requests via the Service Catalog | ||
| Number of inquiry calls to the service desk | ||
| Customer Satisfaction – specific question | ||
| Number of non-standard requests |
When measuring against your baseline, you should expect to see the following two monetary improvements:
(# of routine inquiry calls reduced) x (average time for a call) x (average service desk wage)
Routine inquiries often take up a significant portion of the service desk’s effort, and the majority of them can be answered via the service catalog, thus reducing the amount of time required for a service desk employee to engage in routine solutions. The reduction in routine inquiries allows IT to allocate resources to high-value services and provide higher quality of support.
Originally, the service desk of an organization answers 850 inquiries per month, and around 540 of them are routine inquiries requesting information on when a service is available, who they can contact if they want to receive a service, and what they need to do if they want access to a service, etc.
IT successfully communicated the introduction of the service catalog to the business and 3 months after the service catalog was implemented, the number of routine inquiries dropped to 60 per month. Given that the average time for IT to answer the inquiry is 10 minutes (0.167 hour) and the hourly wage of a service desk technician is $25, the monthly monetary cost saving of the service catalog is:
(540 – 60) x 0.167 x 25 = $2004.00
(Average additional cost of non-standard request) x (Reduction of non-standard request)
+
(Extra time IT spends on non-standard request fulfilment) x (Average wage)
Non-standard requests require a lot of time, and often a lot of money. IT frequently incurs additional cost because the business is not aware of how to properly request service or support. Not only can the service catalog standardize and streamline the service request process, it can also help IT define its job boundary and say no to the business if needed.
The IT department of an organization often finds itself dealing with last-minute, frustrating service requests from the business. For example, although equipment requests should be placed a week in advance, the business often requests equipment to be delivered the next day, leaving IT to pay for additional expedited shipping costs and/or working fanatically to allocate the equipment. Typically, these requests happen 4 times a month, with an additional cost of $200.00. IT staff work an extra 6 hours per each non-standard request at an hourly wage of $30.00.
With the service catalog, the users are now aware of the rules that are in place and can submit their request with more ease. IT can also refer the users to the service catalog when a non-standard request occurs, which helps IT to charge the cost to the department or not meet the terms of the business.
The monthly cost saving in this case is:
$200.00 x 4 + 6 hours x 30 = $980.00
The project charter is an important document to govern your project process. Support from the project sponsors is important and must be documented. Complete the following steps working with Info-Tech’s sample Project Charter.
The nature of government IT is quite complex: there are several different agencies located in a number of different areas. It is extremely important to communicate the idea of the service catalog to all the users, no matter the agency or location.
The IT department had yet to let business leaders of the various agencies know about the initiative and garner their support for the project. This has proven to be prohibitive for gaining adoption from all users.
The IT leaders met and identified all the opportunities to communicate the service catalog to the business leaders and end users.
To meet with the business leaders, IT leaders hosted a service level meeting with the business directors and managers. They adopted a steering committee for the continuation of the project.
To communicate with business users, IT leaders published announcements on the intranet website before releasing the catalog there as well.
Because IT communicated the initiative, support from business stakeholders was obtained early and business leaders were on board shortly after.
IT also managed to convince key business stakeholders to become project champions, and leveraged their network to communicate the initiative to their employees.
With this level of adoption, it meant that it was easier for IT to garner business participation in the project and to obtain feedback throughout.
The project received buy-in from the CIO and director of infrastructure. Together they assembled a team and project leader.
The two struggled to get buy-in from the rest of the team, however. They didn’t understand the catalog or its benefits and objectives. They were reluctant to change their old ways. They didn’t know how much work was required from them to accomplish the project.
With the Info-Tech analyst on site, the client was able to discuss the benefits within their team as well as the project team responsibilities.
The Info-Tech analyst convinced the group to move towards focusing on a business- and service-oriented mindset.
The workshop discussion was intended to get the entire team on board and engaged with meeting project objectives.
The project team had experienced full buy-in after the workshop. The CIO and director relived their struggles of getting project members on-board through proper communication and engagement.
Engaging the members of the project team with the discussion was key to having them take ownership in accomplishing the project.
The business users understood that the service catalog was to benefit their long-term IT service development.
| The following are sample activities that will be conducted by Info-Tech analysts with your team: | ||
|---|---|---|
| 1.1 |
|
Begin your project with a mission statement A strong mission statement that outlines the benefits of the project is needed to communicate the purpose of the project. The onsite Info-Tech analysts will help you customize the message and establish the foundation of the project charter. |
| 1.2 |
|
Identify project team members Our onsite analysts will help you identify high-value team members to contribute to this project. |
| 1.3 |
|
Identify important business and IT stakeholders Buy-in from senior IT and business management is a must. Info-Tech will help you identify the stakeholders and determine their level of influence and impact. |
| 1.4 |
|
Create a change message for the business and IT It is important to communicate changes early and the message must be tailored for each target audience. Our analysts will help you create an effective message by articulating the benefits of the service catalog to the business and to IT. |
| 1.5 |
|
Determine service project metrics To demonstrate the value of the service catalog, IT must come up with tangible metrics. Info-Tech’s analysts will provide some sample metrics as well as facilitate a discussion around which metrics should be tracked and monitored. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation 2: Define Enterprise Services Proposed Time to Completion: 4 weeks | |
|---|---|
Step 2.1: Identify enterprise services | Step 2.2: Create service categories |
Start with an analyst kick off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates: Service Sample Enterprise Services | With these tools & templates: Sample Enterprise Services |
Documentation of all business-facing IT services is an intimidating task, and a lack of parameters around this process often leads to longer project times and unsatisfactory outcomes.
To streamline this process, separating enterprise services from line of business services allows IT to effectively and efficiently organize these services. This method increases the visibility of the service catalog through user-oriented communication plans.
If you are unsure whether a service is enterprise wide, ask yourself these two questions:
Included with this blueprint is Info-Tech’s Sample Enterprise Services definitions.
The sample contains dozens of services common across most organizations; however, as a whole, they are not complete for every organization. They must be modified according to the business’ needs. Phase two will serve as a guide to identifying an enterprise service as well as how to fill out the necessary fields.
Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.
The next slide will introduce you to the information for each service record that can be edited.
Below is an example of a service record and its necessary fields of information. This is information that can be kept, deleted, or expanded upon.
|
Name the service unambiguously and from the user’s perspective. |
Brief description of how the service allows users to perform tasks. |
Describe the functionality of the service and how it helps users to achieve their business objectives. |
Cluster the services into logical groups. |
| Service Name | Description | Features | Category |
|---|---|---|---|
| Email communication to connect with other employees, suppliers, and customers |
|
Communications |
Web Conferencing has already been defined as a service. Is Audio Conferencing its own service or a feature of Web Conferencing?
Info-Tech Tip: Is Audio Conferencing run by the same application as the Web Conferencing? Does it use the same equipment? If not, Audio Conferencing is probably its own service.
Web Conferencing has already been defined as a service. Is “Screen Sharing” its own service or a feature of Web Conferencing?
Info-Tech Tip: It depends on how the user interacts with Screen Sharing. Do they only screen share when engaged in a Web Conference? If so, Screen Sharing is a feature and not a service itself.
VoIP is a popular alternative to landline telephone nowadays, but should it be part of the telephony service or a separate service?
Info-Tech Tip: It depends on how the VoIP phone is set up.
If the user uses the VoIP phone the same way they would use a landline phone – because the catalog is user facing – consider the VoIP as part of the telephone service.
If the user uses their computer application to call and receive calls, consider this a separate service on its own.
While there are some best practices for coming up with service definitions, it is not an exact science and you cannot accommodate everyone. When in doubt, think how most users would perceive the service.
You need to be as comprehensive as possible and try to capture the entire breadth of services IT provides to the business.
To achieve this, a three-step process is recommended.
IT Focus Group:
Have your user hat on when documenting service features and descriptions. Try to imagine how the users interact with each service.
Similar to the services and their features, there is no right or wrong way to categorize. The best approach is to do what makes sense for your organization and understand what your users think.
Categories organize services into logical groups that the users can identify with. Services with similar functions are grouped together in a common category.
| Enterprise Service Categories |
|---|
| Accounts and Access |
| Collaboration |
| Communication |
| Connectivity |
| Consulting |
| Desktop, Equipment, & Software |
| Employee Services |
| Files and Documents |
| Help & Support |
| Training |
Sample categories
There is no right or wrong way to categorize services; it is subjective to how they are provided by IT and how they are used by the business. Use the aforementioned categories to group the following services. Sample solutions are provided on the following slide.
| Service Name |
|---|
| Telephone |
| Remote access |
| Internet |
| BYOD (wireless access) |
| Instant Messaging |
| Video Conferencing |
| Audio Conferencing |
| Guest Wi-Fi |
| Document Sharing |
| Example 1 | Example 2 | ||
|---|---|---|---|
|
Desktop, Equipment, & Software Services |
Connectivity |
Mobile Devices |
Communications |
|
Internet |
Telephone |
BYOD (wireless access) |
Telephone |
|
Guest Wi-Fi |
Internet |
|
|
|
Remote Access |
Instant Messaging |
||
|
Video Conferencing |
|||
|
Audio Conferencing |
|||
| Communications |
Collaboration |
Storage and Retrieval |
Accounts and Access |
|
Telephone |
|
Document Sharing |
Remote access |
|
Instant Messaging |
Connectivity |
||
|
Mobile Devices |
Video Conferencing |
Internet | |
|
BYOD (wireless access) |
Audio Conferencing |
Guest Wi-Fi |
|
|
Guest Wi-Fi |
Document Sharing |
||
Services can have multiple categories only if it means the users will be better off. Try to limit this as much as possible.
Neither of these two examples are the correct answer, and no such thing exists. The answers you came up with may well be better suited for the users in your business.
Before you start, you must have a modified list of all defined enterprise services and a modified list of categories.
Because of the breadth of services IT provides across several agencies, it was challenging to identify what was considered enterprise beyond just the basic ones (email, internet, etc.)
IT recognized that although the specific tasks of service could be different, there are many services that are offered universally across the organization and streamlining the service request and delivery process would reduce the burden on IT.
The client began with services that users interact with on a daily basis; this includes email, wireless, telephone, internet, printing, etc.
Then, they focused on common service requests from the users, such as software and hardware provisioning, as well as remote access.
Lastly, they began to think of other IT services that are provided across the organization, such as RFP/RFI support, project management analysis, employee onboarding/off-boarding, etc.
By going through the lists and enterprise categories, the government was able to come up with a comprehensive list of all services IT provides to the business.
Classifying services such as onboarding meant that IT could now standardize IT services for new recruits and employee termination.
By capturing all enterprise services offered to the organization, IT centralized its management of services instead of having scattered request processes.
For some services, the project team had difficulty deciding on what was a service and what was a feature. They found it hard to distinguish between a service with features or multiple services.
For example, the client struggled to define the Wi-Fi services because they had many different user groups and different processes to obtain the service. Patients, visitors, doctors, researchers, and corporate employees all use Wi-Fi, but the service features for each user group were different.
The Info-Tech analyst came on-site and engaged the project team in a discussion around how the users would view the services.
The analyst also provided tips and techniques on identifying services and their features.
Because patients and visitors do not access Wi-Fi or receive support for the service in the same way as clinical or corporate employees, Wi-Fi was separated into two services (one for each user group).
Using the tips and techniques that were provided during the onsite engagement, the project team was able to have a high degree of clarity on how to define the services by articulating who the authorized users are, and how to access the process.
This allowed the group to focus on the users’ perspective and create clear, unambiguous service features so that users could clearly understand eligibility requirements for the service and how to request them.
| The following are sample activities that will be conducted by Info-Tech analysts with your team: | ||
|---|---|---|
| 2.1 |
|
Understand what enterprise services are The project team must have a clear understanding of what qualifies as an enterprise service. The onsite analysts will also promote a user-oriented mindset so the catalog focuses on business needs. |
| 2.2 |
|
Identify enterprise services The Info-Tech analysts will provide a list of ready-to-use services and will work with the project team to change, add, and delete service definitions and to customize the service features. |
| 2.3 |
|
Identify categories for enterprise services The Info-Tech analyst will again emphasize the importance of being service-oriented rather than IT-oriented. This will allow the group to come up with categories that are intuitive to the users. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Guided Implementation 3: Define LOB Services Proposed Time to Completion: 4 weeks | |
|---|---|
Step 3.1: Identify LOB services | Step 3.2: Define LOB services |
Start with an analyst kick off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates: Service LOB Services – Functional Group | With these tools & templates: LOB Services – Functional Group |
Within a business unit, there are user groups that use unique applications and IT services to perform business activities. IT must understand which group is consuming each service to document to their needs and requirements. Only then is it logical to group services into lines of business.
Covering every LOB service is a difficult task. Info-Tech offers two approaches to identifying LOB services, though we recommend working alongside business user groups to have input on how each service is used directly from the users. Doing so makes the job of completing the service catalog easier, and the product more detailed and user friendly.
Some helpful questions to keep in mind when characterizing user groups:
With business user input, you can answer questions as specific as “What requirements are necessary for IT to deliver value to each line of business?” and “What does each LOB need in order to run their operation?”
Business View is the preferred method for IT departments with a better understanding of business operations. This is because they can begin with input from the user, enabling them to more successfully define every service for each user group and LOB.
In addition, IT will also have a chance to work together with the business and this will improve the level of collaboration and communication. However, in order to follow this methodology, IT needs to have a pre-established relationship with the business and can demonstrate their knowledge of business applications.
The IT view begins with considering each business application used within the organization’s lines of business. Start with a broad view, following with a process of narrowing down, and then iterate for each business application.
This process leads to each unique service performed by every application within the business’ LOBs.
The IT view does not necessarily require a substantial amount of information about the business procedures. IT staff are capable of deducing what business users often require to maintain their applications’ functionality.
If you do have knowledge of business operations, using the business view is the better option and the service definition will be more relatable to the users.
For organizations that don’t have established relationships with the business or detailed knowledge of business activities, IT can decompose the application into services. They have more familiarity and comfort with the business applications than with business activities.
It is important to continue after the service is identified because it helps confirm and solidify the names and features. Determining the business activity and the user groups can help you become more user-oriented.
We will illustrate the two methodologies with the same example.
If you have established an ongoing relationship with the business and you are familiar with their business operations, starting with the LOB and user groups will ensure you cover all the services IT provides to the business and create more relatable service names.
If you want to understand what services IT provides to the Sales functional group, and you don’t have comprehensive knowledge of the department, you need to start with the IT perspective.
If you are concerned about the fact that people always associate a service with an application, you can include the application in the service name or description so users can find the service through a search function.
Like categories for enterprise services in Phase Two, LOB services are grouped into functional groups. Functional groups are the components of an organizational chart (HR, Finance, etc.) that are found in a company’s structure.
Functional groups enable a clear view for business users of what services they need, while omitting services that do not apply to them. This does not overwhelm them, and provides them with only relevant information.
To be clear, industry services can be put into functional groups.
Info-Tech provides a few sample industry services (without their functional group) to give an idea of what LOB service is specific to these industries. Try to extrapolate from these examples to create LOB services for your business.
Use Info-Tech’s Sample LOB Services – Functional Group and Sample LOB Services – Industry Specific documents.
Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.
Only perform this activity if you have a relationship with the business that can enable you to generate business input on service identifications and definitions.
In a group of your project participants, repeat the sequence for each LOB.
Only perform this activity if you cannot generate business input through your relationships, and must begin service definitions with business applications.
In a group of your project participants, repeat the sequence for each application.
→ Optional
Coming up with LOB service definitions is challenging for IT because it requires comprehension of all lines of business within the organization as well as direct interaction with the business users.
After completing the LOB service definitions, IT must talk to the business to ensure all the user groups and business activities are covered and all the features are accurate.
Here are some tips to reviewing your LOB Service Catalog generated content:
Go through the service in batches. Present 5-10 related services to the business first. Start with the service name and then focus on the features.
In the meeting, discuss whether the service features accurately sum up the business activities, or if there are missing key activities. Also discuss whether certain services should be split up into multiple services or combined into one.
There were many users from different LOBs, and IT provided multiple services to all of them. Tracking them and who had access to what was difficult.
IT didn’t understand who provided the services (service owner) and who the customers were (business owner) for some of the services.
After identifying the different Lines of Business, they followed the first approach (Business View) for those that IT had sufficient knowledge of in terms of business operations:
For the LOBs they weren’t familiar with, they used the IT view method, beginning with the application:
Through these two methodologies, IT was able to define services according to how the users both perceive and utilize them.
IT was able to capture all the services it provides to each line of business effectively without too much help from the business representatives.
By capturing all enterprise services offered to the organization, IT centralized its management of services instead of having scattered request processes.
Challenge
The organization uses a major application containing several modules used by different users for various business activities.
The challenge was to break down the application into multiple services in a way that makes sense to the business users. Users should be able to find services specific to them easily.
Therefore, the project team must understand how to map the modules to different services and user groups.
Solution
The project team identified the major lines of business and took various user groups such as nurses and doctors, figured out their daily tasks that require IT services, and mapped each user-facing service to the functionality of the application.
The project team then went back to the application to ensure all the modules and functionalities within the application were accounted for. This helped to ensure that services for all user groups were covered and prepared to be released in the catalog.
Results
Once the project team had come up with a comprehensive list of services for each line of business, they were able to sit with the business and review the services.
IT was also able to use this opportunity to demonstrate all the services it provides. Having all the LOB services demonstrates IT has done its preparation and can show the value they help create for the business in a language the users can understand. The end result was a strengthened relationship between the business and the IT department.
| The following are sample activities that will be conducted by Info-Tech analysts with your team: | ||
|---|---|---|
| 3.1 |
|
Understand what Line of Business services are The onsite analysts will provide a clear distinction between enterprise services and LOB services. The analysts will also articulate the importance of validating LOB services with the business. |
| 3.2 |
|
Identify LOB services using the business’ view There are two methods for coming up with LOB services. If IT has comprehensive knowledge of the business, they can identify the services by outlining the user groups and their business activities. |
| 3.3 |
|
Identify LOB services using IT’s view If IT does not understand the business and cannot obtain business input, Info-Tech’s analysts will present the second method, which allows IT to identify services with more comfortability through business applications/systems. |
| 3.4 |
|
Categorize the LOB services into functional groups The analysts will help the project team categorize the LOB services based on user groups or functional departments. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Guided Implementation 4: Complete service definitions | |
|---|---|
Step 4.1: Design service record | Step 4.2: Complete service definitions |
Start with an analyst kick off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates: Service Services Definition Chart | With these tools & templates: Services Definition Chart |
Info-Tech has provided a sample Services Definition Chart with standard service definitions and pre-populated fields. It is up to you throughout this step to decide which fields are necessary to your business users, as well as how much detail you wish to include in each of them.
Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.
The majority of the fields in the service catalog are user facing, which means they must be written in business language that the users can understand.
If there is any confusion or disagreement in filling out the fields, a facilitator is required to lead the working groups in coming up with a definitive answer. If a decision is still not reached, it should be escalated to the decision maker (usually the service owner).
There are IT facing fields that should not be published to the business users – they are for the benefit of IT. For example, you may want to keep Performance Metrics internal to IT until you are ready to discuss it with the business.
If the organization is interested in creating a Technical Service Catalog following this initiative, these fields will provide a helpful starting place for IT to identify the people, process, and technology required to support user-facing services.
It is important for IT-facing fields to be kept internal. If business users are having trouble with a service and the service owner’s name is available to them, they will phone them for support even if they are not the support owner.
When completing the service record, adopt the principle that “Less is More.” Keep it simple and write the service description from the user’s perspective, without IT language. From the list below, pick which fields of information are important to your business users.
What do the users need to access the service quickly and with minimal assistance?
Description: Delivers electronic messages to and from employees.
Features:
Category: Communications
Who is responsible for the delivery of the service and what are their roles?
Service owner → the IT member who is responsible and accountable for the delivery of the service.
Business owner → the business partner of the service owner who ensures the provided service meets business needs.
Service Owner: Manager of Business Solutions
Business Owner: VP of Human Resources
For enterprise services that are used by almost everyone in the organization, the business owner is the CIO.
“Who is authorized to access this service? How do they access it?”
Authorized users → who can access the service.
Request process → how to request access to the service.
Approval requirement/process → what the user needs to have in place before accessing the service.
Authorized Users: All people on site not working for the company
Request Process: Self-Service through website for external visitors
Approval Requirement/Process: N/A
Clearly defining how to access a service saves time and money by decreasing calls to the service desk and getting users up and running faster. The result is higher user productivity.
“Who is authorized to access this service? How do they access it?”
Requirements & pre-requisites → details of what must happen before a service can be provided.
Turnaround time → how much time it will take to grant access to the service.
User responsibility → What the user is expected to do to acquire the service.
Requirements & Pre-requisites: Disclaimer of non-liability and acceptance
Turnaround time: Immediate
User Responsibility: Adhering to policies outlined in the disclaimer
Clearly defining how to access a service saves time and money by decreasing calls to the service desk and getting users up and running faster. The result is higher user productivity.
“When is this service available to users? What service levels can the user expect?”
Support hours → what days/times is this service available to users?
Hours of availability/planned downtime → is there scheduled downtime for maintenance?
Performance metrics → what level of performance can the user expect for this service?
Support Hours: Standard business hours
Hours of Availability/Planned Downtime: Standard business hours; can be agreed to work beyond operating hours either earlier or later
Performance Metrics: N/A
Manage user expectations by clearly documenting and communicating service levels.
“How do I obtain support for this service?”
Support process → what is the process for obtaining support for this service?
Support owner → who can users contact for escalations regarding this service?
Support documentation → where can users find support documentation for this service?
Support Process: Contact help desk or submit a ticket via portal
Support Owner: Manager, client support
Support Documentation: .pdf of how-to guide
Clearly documenting support procedures enables users to get the help they need faster and more efficiently.
“Is there a cost for this service? If so, how much and who is expensing it?”
Internal Cost → do we know the total cost of the service?
Customer Cost → a lot of services are provided without charge to the business; however, certain service requests will be charged to a department’s budget.
Internal Cost: For purposes of audit, new laptops will be expensed to IT.
Customer Cost: Cost to rush order 10 new laptops with retina displays for the graphics team. Charged for extra shipment cost, not for cost of laptop.
Set user expectations by clearly documenting costs associated with a service and how to obtain approval for these costs if required.
This is the final activity to completing the service record design. It has been a long journey to make it here; now, all that is left is completing the fields and transferring information from previous activities.
Don’t forget to delete or bring over the edited LOB and Enterprise services from the phase 2 and 3 deliverables.
Now that you have completed the first run of service definitions, you can go back and complete the rest of the identified services in batches. You should observe increased efficiency and effectiveness in filling out the service definitions.
This blueprint’s purpose is to help you design a service catalog. There are a number of different platforms to build the catalog offered by application vendors. The sophistication of the catalog depends on the size of your business. It may be as simple as an Excel book, or something as complex as a website integrated with your service desk.
There are various levels of maturity to consider when you are thinking about how to deploy your service catalog.
| 1. Website/User Portal | 2. Catalog Module Within ITSM Tool |
3. Homegrown Solution |
|
|---|---|---|---|
|
Prerequisite |
An internet website, or a user portal |
An existing ITSM tool with a built-in service catalog module |
Database development capabilities Website development capabilities |
|
Pros |
Low cost Low effort |
Easy to deploy |
Customized solution tailored for the organization High flexibility regarding how the service catalog is published |
| Cons |
Not aesthetically appealing Lacking sophistication |
Difficult to customize to organization’s needs Limitation on how the service catalog info is published |
High effort High cost |
| → |
→ Maturity Level → |
→ |
The client had collected a lot of good information, but they were not sure about what to include to ensure the users could understand the service clearly.
They were also not sure what to keep internal so the service catalog did not increase IT’s workload. They want to help the business, but not appear as if they are capable of solving everything for everyone immediately. There was a fear of over-commitment.
The government created a Customer Responsibility field for each service, so it was not just IT who was providing solutions. Business users needed to understand what they had to do to receive some services.
The Service Owner and Business Owner fields were also kept internal so users would go through the proper request channel instead of calling Service Owners directly.
Lastly, the Performance Metrics field was kept internal until IT was ready to present service metrics to the business.
The business was provided clarity on their responsibility and what was duly owed to them by IT staff. This established clear boundaries on what was to be expected of IT services projected into the future.
The business users knew what to do and how to obtain the services provided to them. In the meantime, they didn’t feel overwhelmed by the amount of information provided by the service catalog.
There is a lack of clarity and a lack of agreement between the client’s team members regarding the request/approval processes for certain services. This was an indication that there is a level of ambiguity around process. Members were not sure what was the proper way to access a service and could not come up with what to include in the catalog.
Different people from different teams had different ways of accessing services. This could be true for both enterprise and LOB services.
The Info-Tech analyst facilitated a discussion about workflows and business processes.
In particular, the discussion focused around the approval/authorization process, and IT’s workflows required to deliver the service. The Info-Tech analyst on site walked the client through their different processes to determine which one should be included in the catalog.
The discussion brought clarity to the project team around both IT and business process. Using this new information, IT was able to communicate to the business better, and create consistency for IT and the users of the catalog.
The catalog design was a shared space where IT and business users could confer what the due process and responsibilities were from both sides. This increased accountability for both parties.
| The following are sample activities that will be conducted by Info-Tech analysts with your team: | ||
|---|---|---|
| 4.1 |
|
Determine which fields should be included in the record design The analysts will present the sample service definitions record and facilitate a discussion to customize the service record so unique business needs are captured. |
| 4.2 |
|
Determine which fields should be kept internal The onsite analysts will explain why certain fields are used but not published. The analysts will help the team determine which fields should be kept internal. |
| 4.3 |
|
Complete the service definitions The Info-Tech analysts will help the group complete the full service definitions. This exercise will also provide the organization with a clear understanding of IT workflows and business processes. |
Client Project: Design and Build a User-Facing Service Catalog
This project has the ability to fit the following formats:
Establish a Service-Based Costing Model
Develop the right level of service-based costing capability by applying our methodology.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build a plan for governing an implementation.
Maximize the net benefit conferred by governance.
Organizational redesigns frequently fail when it comes to being executed. This leads to:
Organizational redesigns fail during implementation primarily because they do not consider the change management required to succeed.
Implementing your organizational design with good change management practices is more important than defining the new organizational structure.
Implementation is often negatively impacted due to:
When good change management practices are used and embedded into the implementation process:
Invest change management for your IT redesign.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The best IT organizational structure will still fail to be implemented if the organization does not leverage and use good change management practices. Consider practices such as aligning the structure to a meaningful vision, preparing leadership, communicating frequently, including employees, and measuring adoption to succeed at organizational redesign implementation.
Taking regular pulse checks of employees and managers during the transition will enable IT Leaders to focus on the right practices to enable adoption.
|
After helping hundreds of organizations across public and private sector industries redesign their organizational structure, we can say there is one thing that will always doom this effort: A failure to properly identify and implement change management efforts into the process. Employees will not simply move forward with the changes you suggest just because you as the CIO are making them. You need to be prepared to describe the individual benefits each employee can expect to receive from the new structure. Moreover, it has to be clear why this change was needed in the first place. Redesign efforts should be driven by a clear need to align to the organization’s vision and support the various objectives that will need to take place. Most organizations do a great job defining a new organizational structure. They identify a way of operating that tells them how they need to align their IT capabilities to deliver on strategic objectives. What most organizations do poorly is invest in their people to ensure they can adopt this new way of operating. Brittany Lutes Info-Tech Research Group |
|
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
|
Organizational redesigns frequently fail when it comes to being executed. This leads to:
Organizational redesigns fail during implementation primarily because they do not consider the change management required to succeed. |
Implementation of the organizational redesign is often impacted when:
Essentially, implementation is impacted when change management is not included in the redesign process. |
When good change management practices are used and embedded into the implementation process:
Invest in change management for your IT redesign. |
Info-Tech Insight
Implementing your organizational design with good change management practices is more important than defining the new organizational structure.
McKinsey reported less than 25% of organizational redesigns are successful. Which is worse than the average change initiative, which has a 70% failure rate.
The value of the organizational redesign efforts is determined by the percentage of individuals who adopt the changes and operate in the desired way of working.
When organizations properly use organizational design processes, they are:
4× more likely to delight customers
13× more effective at innovation
27× more likely to retain employees
Don’t doom your organizational redesign with poor change management
Only 17% of frontline employees believe the lines of communication are open.
43% Percentage of organizations that are ineffective at the organizational design methodology.
"Organizational transformation efforts rarely fail because of bad design, but rather from lack of sufficient attention to the transition from the old organization to the new one."
|
Entirely New Teams Additions, reductions, or new creations. The individuals that make up a functional team can shift. |
New Team Members As roles become defined, some members might be required to shift and join already established groups. |
New Responsibilities The capabilities individuals will be accountable or responsible for become defined. |
New Ways of Operating From waterfall to Agile, collaborative to siloed, your operating model provides insight into the ways roles will engage one another. |
Situation
On July 26th, 2022, employees at Shopify – an eCommerce platform – were communicated to by their CEO that a round of layoffs was about to take place. Effective that day, 1,000 employees or 10% of the workforce would be laid off.
In his message to staff, CEO Tobi Lutke admitted he had assumed continual growth in the eCommerce market when the COVID-19 pandemic forced many consumers into online shopping. Unfortunately, it was clear that was not the case.
In his communications, Tobi let people know what to expect throughout the day, and he informed people what supports would be made available to those laid off. Mainly, employees could expect to see a transparent approach to severance pay; support in finding new jobs through coaching, connections, or resume creation; and ongoing payment for new laptops and internet to support those who depend on this connectivity to find new jobs.
Results
Unlike many of the other organizations (e.g. Wayfair and Peloton) that have had to conduct layoffs in 2022, Shopify had a very positive reaction. Many employees took to LinkedIn to thank their previous employer for all that they had learned with the organization and to ask their network to support them in finding new opportunities. Below is a letter from the CEO:
And align the structure to execute on those drivers.
“The goal is to align your operating model with your strategy, so it directly supports your differentiating capabilities.”
– PWC, 2017.
Info-Tech Insight
A trending organizational structure or operating model should never be the driver for an organizational redesign.
Technical leaders are common in IT, but people leaders are necessary during the implementation of an organizational structure.
“Successful organizational redesign is dependent on the active involvement of different managerial levels."
– Marianne Livijn, “Managing Organizational Redesign: How Organizations Relate Macro and Micro Design.”
Info-Tech Insight
47% of direct reports do not agree that their leader is demonstrating the change behaviors. Often, a big reason is that many middle-managers do not understand their own attitudes and beliefs about the change.
Build a Better Manager: Basic Management Skills
Build a Better Manager: Personal Leadership
Include employees in the conversation to get the most out of your change management.
"Details about the new organization, along with details of the selection process, should be communicated as they are finalized to all levels of the organization.”
Info-Tech Insight
The project manager of the organizational redesign should not be the communicator. The CIO and the employees’ direct supervisor should always be the communicators of key change messages.
|
← Business-Mandated Organizational Redesign |
Enable Alignment & Increased Effectiveness |
IT-Driven & Strategic Organizational Redesign → |
|---|---|---|
|
Reduction in roles Cost savings Requires champions who will maintain employee morale throughout Communicate with key individuals ahead of time |
Restructure of IT roles Increase effectiveness Lean on managers & supervisors to provide consistent messaging Communicate the individual benefits of the change |
Increase in IT Roles Alignment to business model Frequent and ongoing communication from the beginning Collaborate with IT groups for input on best structure |
Old-school approaches to organizational redesign have argued employee engagement is a hinderance to success – it’s not.
"To enlist employees, leadership has to be willing to let things get somewhat messy, through intensive, authentic engagement and the involvement of employees in making the transformation work."
Info-Tech Insight
Despite the persistent misconceptions, including employees in the process of a redesign reduces uncertainty and rumors.
Only 22% of organizations include the employee experience as a part of the design process
| 1 | 2 | 3 |
|---|---|---|
| Monitor IT Employee Experience |
When Prosci designed their Change Impact Analysis, they identified the ways in which roles will be impacted across 10 different components:
Engaging employees in the process so that they can define how their role might be impacted across these 10 categories not only empowers the employee, but also ensures they are a part of the process. Source: Prosci, 2019. |
Conduct an employee pulse survey See the next slide for more information on how to create and distribute this survey. |
Process to conduct survey:
Both employee adoption and the transformation of the IT structure need to be measured during implementation
“Think about intentionally measuring at the moments in the change storyline where feedback will allow leaders to make strategic decisions and interventions.”
Info-Tech Insight
Getting 100% adoption from employees is unlikely. However, if employee adoption is not sitting in the 80-90% range, it is not recommended that you move forward with the next phase of the transformation.
| Driver Goal | Measurement | Key Performance Indicator (KPI) |
|---|---|---|
| Workforce Challenges and Increased Effectiveness | Employee Engagement | The change in employee engagement before, during, and after the new organizational structure is communicated and implemented. |
| Increased Effectiveness | Alignment of Demand to Resources | Does your organization have sufficient resources to meet the demands being placed on your IT organization? |
| Increased Effectiveness and Workforce Challenges | Role Clarity | An increase in role clarity or a decrease in role ambiguity. |
|
Increased Effectiveness |
Reduction in Silos |
Employee effectiveness increases by 27% and efficiency by 53% when provided with role clarity (Effectory, 2019). |
| Increased Effectiveness | Reduction in Silos | Frequency of communication channels created (scrum meetings, Teams channels, etc.) specific to the organizational structure intended to reduce silos. |
| Operating in a New Org. Structure | Change Adoption Rate | The percentage of employees who have adopted their defined role within the new organizational chart in 3-, 6-, and 12-month increments. |
| Workforce Challenges | Turnover Rate | The number of employees who voluntarily leave the organization, citing the organizational redesign. |
| Workforce Challenges | Active Resistors | The number of active resistors anticipated related to the change in organizational structure versus the number of active resistors that actually present themselves to the organizational restructuring. |
| New Capabilities Needed | Gap in Capability Delivery | The increase in effectiveness in delivering on new capabilities to the IT organization. |
| Operating in a New Org. Structure | Change Adoption Rate | The percentage of employees who found the communication around the new organizational structure clear, easy to understand, and open to expressing feedback. |
| Lack of Business Understanding or Increased Effectiveness | Business Satisfaction with IT | Increase in business satisfaction toward IT products and services. |
| Workforce Challenges | Employee Performance | Increase in individual employee performances on annual/bi-annual reviews. |
| Adoption | Pulse Assessment | Increase in overall adoption scores on pulse survey. |
| Adoption | Communication Effectiveness | Reduction in the number of employees who are still unsure why the changes are required. |
| Adoption | Leadership Training | Percentage of members of leadership attending training to support their development at the managerial level. |
Stop treating the two interchangeably.
Because frankly they didn’t need it
“Only if you have your employees in mind can you implement change effectively and sustainably.”
Recommended action steps:
Info-Tech Insight
OCM is often not included or used due to a lack of understanding of how it differs from project management.
And an additional five experts across a variety of organizations who wish to remain anonymous.
Info-Tech Research Group
| Amanda Mathieson | Research Director | Heather Munoz | Executive Counselor | Valence Howden | Principal Research Director | |
| Ugbad Farah | Research Director | Lisa Hager Duncan | Executive Counselor | Alaisdar Graham | Executive Counselor | |
| Carlene McCubbin | Practice Lead | |||||
|
|
|
Aronowitz, Steven, et al. “Getting Organizational Design Right,” McKinsey, 2015. Web.
Ayers, Peg. “5 Ways to Engage Your Front-Line Staff.” Taylor Reach Group, 2019. Web.
Bushard, Brian, and Carlie Porterfield. “Meta Reportedly Scales Down, Again – Here Are the Major US Layoffs This Year.” Forbes, September 28, 2022. Web.
Caruci, Ron. “4 Organizational Design Issues that Most Leaders Misdiagnose.” Harvard Business Review, 2019.
“Change Management – And Why It Has to Change.” Creaholic Pulse Feedback. Web.
“Communication Checklist for Achieving Change Management.” Prosci, 27 Oct. 2022. Web.
“Defining Change Impact.” Prosci. 29 May 2019. Web.
“The Definitive Guide To Organization Design.” The Josh Bersin Company, 2022.
Deshler, Reed. “Five Reasons Organizational Redesigns Fail to Deliver.” AlignOrg. 28 Jan. 2020. Web.
The Fit for Growth Mini Book. PwC, 12 Jan. 2017.
Helfand, Heidi. Dynamic Reteaming: The Art and Wisdom of Changing Teams. 2nd ed., O’Reilly Media, 2020.
Jackson, Courtney. “7 Reasons Why Organizational Structures Fail.” Scott Madden Consultants. Web.
Livijn, Marianne. Managing Organizational Redesign: How Organizations Relate Macro and Micro Design. Doctoral dissertation. Department of Management, Aarhus University, 2020.
Lutke, Tobias. “Changes to Shopify’s Team.” Shopify. 26 July 2022.
McKinsey & Company. “How Do We Manage the Change Journey?” McKinsey & Company.2020.
Pijnacker, Lieke. “HR Analytics: Role Clarity Impacts Performance.” Effectory, 29 Sept. 2019. Web.
Tompkins, Teri C., and Bruce G. Barkis. “Conspiracies in the Workplace: Symptoms and Remedies.” Graziadio Business Review, vol. 21, no. 1, 2021.Web.
“Understanding Organizational Structures.” SHRM,2022.
Watkins, Michael D., and Janet Spencer. “10 Reasons Why Organizational Change Fails.” I by IMD, 10 March 2021. Web.
Wilson, Bradley. “Employee Survey Questions: The Ultimate Guide.” Perceptyx, 1 July 2020. Web.
The technical side of IT security demands the best security possible, but the business side of running IT demands that you determine what is cost-effective and can still do the job. You likely shrugged off the early iterations of Microsoft’s security efforts, but you may have heard that things have changed. Where do you start in evaluating Microsoft’s security products in terms of effectiveness? The value proposition sounds tremendous to the CFO, “free” security as part of your corporate license, but how does it truly measure up and how do you articulate your findings to the business?
Microsoft’s security products have improved to the point where they are often ranked competitively with mainstream security products. Depending on your organization’s licensing of Office 365/Microsoft 365, some of these products are included in what you’re already paying for. That value proposition is hard to deny.
Determine what is important to the business, and in what order of priority.
Take a close look at your current solution and determine what are table stakes, what features you would like to have in its replacement, and what your current solution is missing.
Consider Microsoft’s security solutions using an objective methodology. Sentiment will still be a factor, but it shouldn’t dictate the decision you make for the good of the business.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Examine what you are licensed for, what you are paying, what you need, and what your constraints are.
Determine what is “good enough” security and assess the needs of your organization.
Decide what you will go with and start planning your next steps.
Neglecting to maintain the brand architecture can have the following consequences:
Brand architecture is the way a company organizes and manages its portfolio of brands to achieve strategic goals. It encompasses the relationships between brands, from sub-brands to endorsed brands to independent brands, and how they interact with each other and with the master brand. With a clear brand architecture, businesses can optimize their portfolio, enhance their competitive position, and achieve sustainable growth and success in the long run.
Establishing and upholding a well-defined brand architecture is critical to achieve:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
We recommend a two-step approach that involves defining or reimagining the brand architecture. This means choosing the right strategy by analyzing the current brand portfolio, identifying the core brand elements, and determining and developing the structure that fits with the brand and business goals. A well-thought-out brand architecture also facilitates the integration of new brands and new product launches.
Create a brand identity that helps you launch new products and services, prepare for acquisitions, and modify your brand strategy. Allocate resources more effectively and identify new opportunities for growth. A brand architecture can provide insights into how different brands fit together and contribute to the overall brand strategy.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
The brand mind mapping workshop is an exercise that helps with visualizing brand architecture and improving coherence and effectiveness in brand portfolio management.
This exercise can help businesses:
Allocate their resources more effectively.
Identify new opportunities for growth.
Gain a competitive advantage in their market.
1.1 Brand Mind Mapping
Visual representation of the brand architecture and its various components

Nathalie Vezina
Marketing Research Director
SoftwareReviews Advisory
This blueprint highlights common brand issues faced by companies, such as inconsistencies in branding and sub-branding due to absent or inadequate planning and documentation or non-compliance with the brand architecture. It emphasizes the importance of aligning or modifying the company's brand strategy with the existing architecture to create a consistent brand when launching new products, services, or divisions or preparing for acquisitions.
Changing the brand architecture can be challenging, as it often requires significant resources, time, and effort. Additionally, there may be resistance from stakeholders who have become attached to the existing brand architecture and may not see the value in making changes. However, it's important for companies to address suboptimal brand architecture to ensure consistency and clarity in brand messaging and support business growth and success.
This blueprint guides brand leaders on building and updating their brand architecture for optimal clarity, consistency, adaptability, and efficiency.
| Your Challenge | Common Obstacles | SoftwareReviews’ Approach |
A company's brand architecture can help brand managers build a stronger brand that supports
the company's goals and increases brand value. Failing to maintain the brand architecture can have the following consequences:
|
Establishing and maintaining a clear brand architecture can pose significant issues for brand leaders. Despite these obstacles, defining the brand architecture can yield substantial benefits for businesses. Common constraints are:
|
With focused and effective efforts and guidance, brand leaders can define or reimagine their brand architecture. Developing and maintaining a clear and consistent brand architecture involves:
|
"[B]rand architecture is like a blueprint for a house...the foundation that holds all the pieces together, making sure everything fits and works seamlessly."
Source: Verge Marketing
Brand architecture is the hierarchical organization and its interrelationships. This includes shaping the brand strategy and structuring the company's product and service portfolio.
A well-designed brand architecture helps buyers navigate a company's product offerings and creates a strong brand image and loyalty.
A company's brand architecture typically includes three levels:
Choosing the right architecture depends on business strategy, products and services, and target audience. It should be reviewed periodically as the brand evolves, new products and services are launched, or new brands are acquired.
"A brand architecture is the logical, strategic, and relational structure for your brands, or put another way, it is the entity's 'family tree' of brands, sub-brands, and named products."
Source: Branding Strategy Insider
Align brand architecture with business goals
A well-defined brand architecture aligned with business objectives contributes to building brand recognition, facilitating brand extension, and streamlining brand portfolio management. In addition, it improves marketing effectiveness and customer experience.
With a clear and consistent brand architecture, companies can strengthen their brand equity, increase awareness and loyalty, and grow in their competitive environment.
Effectively engage with the desired buyers
A clear and consistent brand architecture enables companies to align their brand identity and value proposition with the needs and preferences of their target audience, resulting in increased customer loyalty and satisfaction.
Establishing a unique market position and reinforcing brand messaging and positioning allows companies to create a more personalized and engaging customer experience, driving business growth.
Maintain a competitive edge
An effective brand architecture allows companies to differentiate themselves from their competitors by establishing their unique position in the market. It also provides a structured framework for introducing new products or services under the same brand, leveraging the existing one.
By aligning their brand architecture with their business objectives, companies can achieve sustainable growth and outperform their competitors in the marketplace.
"A well-defined brand architecture provides clarity and consistency in how a brand is perceived by its audience. It helps to create a logical framework that aligns with a brand's overall vision and objectives."
Source: LinkedIn
Deficient brand architecture can manifest in various ways.
Here are some common symptoms:
Brand architecture helps to ensure that your company's brands are aligned with your business goals and objectives, and that they work together to create a cohesive and consistent brand image.
Lack of stakeholder buy-in > Resistance to change
Siloed teams > Inconsistent execution
Limited resources > Lack of education and communication
Brand architecture is a framework that encompasses three distinct levels, each comprising a different type of branding strategy.


The brand architecture impacts the cohesiveness, effectiveness, and market reach. Defining or redefining organization changes is crucial for company performance.
| Branded House | Endorsed Brands | House of Brands | |
|---|---|---|---|
| Other Designations |
|
|
|
| Description |
|
|
|
| Marketing & Comms |
|
|
|
| Impact on Sales |
|
|
|
| Cost Effectiveness |
|
|
|
| Reputation and Image |
|
|
|
| Consistency |
|
|
|
To ensure a chosen name is effective and legally/ethically sound, consider the ease of pronunciation/spelling, the availability for registration of brand/domain name, any negative connotations/associations in any language/culture, and potential legal/ethical issues.

To ensure a chosen name is effective and legally/ethically sound, consider the ease of pronunciation/spelling, the availability for registration of brand/domain name, any negative connotations/associations in any language/culture, and potential legal/ethical issues.
Clear offering
Adaptability
Consistent branding
Competitive differentiation
Operational efficiency
Strong brand identity
Customer loyalty
Business success
"Responding to external influences, all brands must adapt and change over time. A clear system can aid in managing the process, ensuring that necessary changes are implemented effectively and efficiently."
Source: The Branding Journal
| Develop and Implement a Robust Brand Architecture | |
|---|---|
|
Phase Steps |
Step 1 Research and Analysis 1.1 Define brand architecture strategy 1.2 Brand audit 1.3 Identify brand core elements Step 2 Development and Implementation |
| Phase Outcomes |
|
Brand Architecture: Organize and manage your portfolio of brands
Brand architecture is the way a company organizes and manages its portfolio of brands to achieve strategic goals. It encompasses the relationships between brands, from sub-brands to endorsed brands to independent brands, and how they interact with each other and with the master brand. With a clear brand architecture, businesses can optimize their portfolio, enhance their competitive position, and achieve sustainable growth and success in the long run.
Aligning brand architecture to business strategy
Effective brand architecture aligns with the company's business strategy, marketing objectives, and customer needs. It provides clarity and coherence to the brand portfolio, helps customers navigate product offerings, and maximizes overall equity of the brand.
Choosing between three types of brand architecture
A company's choice of brand architecture depends on factors like product range, target markets, and strategic objectives. Each approach, Branded House, Endorsed, or House of Brands, has its own pros and cons, and the proper option relies on the company's goals, resources, and constraints.
A logical brand hierarchy for more clarity
The order of importance of brands in the portfolio, including the relationships between the master and sub-brands, and the positioning of each in the market is fundamental. A clear and logical hierarchy helps customers understand the value proposition of each brand and reduces confusion.
A win-win approach
Clear brand architecture can help customers easily navigate and understand the product offering, reinforce the brand identity and values, and improve customer loyalty and retention. Additionally, it can help companies optimize their marketing strategies, streamline their product development and production processes, and maximize their revenue and profitability.
Brand architecture, an ongoing process
Brand architecture is not a one-time decision but an ongoing process that requires regular review and adjustment. As business conditions change, companies may need to revise their brand portfolio, brand hierarchy, or brand extension and acquisition strategies to remain competitive and meet customer needs.
Brand Architecture Toolkit
This kit includes a Brand Architecture Mini-Audit, a Brand Architecture template, and templates for Brand Matrix, Ecosystem, and Development Strategy.
Use this kit to develop a strong brand architecture that aligns with your business goals, clarifies your brand portfolio, and enhances overall brand equity.

"A brand architecture is the logical, strategic, and relational structure for your brands, or put another way, it is the entity's 'family tree' of brands, sub-brands, and named products."
Source: Branding Strategy Insider
Consequences of Neglected Brand Guidelines
When a company neglects its brand architecture and guidelines, it can result in a number of negative consequences, such as:
Benefits of SoftwareReviews' Methodology
By following SoftwareReviews' methodology to develop and maintain a brand architecture, businesses can:
Marq, formerly Lucidpress, surveyed over 400 brand management experts and found that "if the brand was consistent, revenue would increase by 10-20%."

This research is designed for:
This research will also assist:
This research will help you:
This research will help them:
| DIY Toolkit "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." |
Guided Implementation "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." |
Workshop "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." |
Consulting "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
| Included Within Advisory Membership | Optional Add-Ons | ||
|---|---|---|---|
| Research & Analysis | |||
|---|---|---|---|
| Call #1: Discuss brand architecture strategy (define objectives, scope and stakeholders). | Call #3: Identify core brand components and ensure they align with the brand strategy. | Call #5: Develop or update brand guidelines. | Optional Calls:
|
| Call #2: Conduct a brand audit. | Call #4: Define and document the brand hierarchy. | Call #6: Roll out the brand architecture and monitoring. | |
A Guided Implementation (GI) is a series of calls with a SoftwareReviews Marketing Analyst to help implement our best practices in your organization.
Your engagement managers will work with you to schedule analyst calls.
Total duration: 3-4 hours
Activities
Visually map out the different elements of your brand portfolio, including corporate brands, sub-brands, product brands, and their relationships with each other.
The workshop also aims to explore additional elements, such as brand expansions, acquisitions, and extensions, and brand attributes and positioning.
Deliverables
Get a mind map that represents the brand architecture and its various components, which can be used to evaluate and improve the overall coherence and effectiveness of the brand portfolio. The mind map can also provide insights into how different brands fit together and contribute to the overall brand strategy.
Participants
Tools

Contact your account representative for more information
workshops@infotech.com | 1-888-670-8889
Develop and Implement a Robust Brand Architecture
Step 1 Research and Analysis
1.1 Define architecture strategy
1.2 Perform brand audit
1.3 Identify brand core elements
Step 2 Development and Implementation
2.1 Determine brand hierarchy
2.2 Develop or update brand guidelines
2.3 Roll out brand architecture
Phase Outcome
Total duration: 2.5-4.5 hours
Objective
Define brand objectives (hierarchy, acquired brand inclusion, product distinction), scope, and stakeholders. Analyze the brand portfolio to identify gaps or inconsistencies. Identify brand components (name, logo, tagline, personality) and align them with the brand and business strategy.
Output
By completing these steps, you will assess your current brand portfolio and evaluate its consistency and alignment with the overall brand strategy.
Participants
Tools
1.1 Define Brand Architecture Strategy
(60-120 min.)
Define
Define brand objectives (hierarchy, inclusion of an acquired brand, product distinction), scope, and stakeholders.
1.2 Conduct Brand Audit
(30-60 min.)
Assess
Assess the state of your brand architecture using the "Brand architecture mini-audit checklist," slide 9 of the Brand Architecture Strategy Template. Check the boxes that correspond to the state of your brand architecture. Those left unchecked represent areas for improvement.
For a more in-depth analysis of your brand performance, follow the instructions and use the tools provided in the Diagnose Brand Health to Improve Business Growth blueprint (optional).
1.3 Identify Core Brand Elements
(60-90 min.)
Identify
Define brand components (name, logo, tagline, personality). Align usage with strategy. You can develop your brand strategy, if not already existing, using the Brand Awareness Strategy Template (optional).
Tip!
Continuously monitor and adjust your brand architecture - it's not static and should evolve over time. You can also adapt your brand strategy as needed to stay relevant and competitive.
Total duration: 3.5-5.5 hours
Objective
Define your brand structure and clarify the role and market position of each. Create concise brand expression guidelines, implement them across all touchpoints and assets, and adjust as needed to stay aligned with your business goals.
Output
This exercise will help you establish and apply your brand structure, with a plan for ongoing updates and adjustments to maintain consistency and relevance.
Participants
Tools
2.1 Determine Brand Hierarchy
(30-60 min.)
Analyze & Document
In the Brand Architecture Strategy Template, complete the brand matrix, ecosystem, development strategy matrix, mind mapping, and architecture, to develop a strong brand architecture that aligns with your business goals and clarifies your brand portfolio and market position.
2.2 Develop/Update Brand Guidelines
(120-180 min.)
Develop/Update
Develop (or update existing) clear, concise, and actionable brand expression guidelines using the Brand Voice Guidelines and Brand Messaging Template.
2.2 Rollout Brand Architecture
Preparation (60-90 min.)
Create & Implement
Use the Asset Creation and Management List Template to implement brand architecture across touchpoints and assets.
Monitor and Adjust
Use slide 8, "Brand Strategy Development Matrix," of the Brand Architecture Strategy Template to identify potential and future brand development strategies to build or enhance your brand based on your current brand positioning and business goals. Monitor, and adjust as needed, for relevance to the brand and business strategy.
Tip!
Make your brand architecture clear and simple for your target audience, employees, and stakeholders. This will avoid confusion and help your audience understand your brand structure.
Prioritizing clarity and simplicity will communicate your brand's value proposition effectively and create a strong brand that resonates with your audience and supports your business goals.
Diagnose Brand Health to Improve Business Growth
Have a significant and well-targeted impact on business success and growth by knowing how your brand performs, identifying areas of improvement, and making data-driven decisions to fix them.
Accelerate Business Growth and Valuation by Building Brand Awareness
Successfully build awareness and help the business grow. Stand out from the competition and continue to grow in a sustainable way.
"Brand Architecture: Definition, Types, Strategies, and Examples." The Branding Journal, 2022.
"Brand Architecture: What It Is and How to Build Your Brand's Framework." HubSpot, 2021.
"Brand Architecture Framework." Verge Marketing, 2021.
"Brand consistency-the competitive advantage and how to achieve it." Marq/Lucidpress, 2021.
"Building brands for growth: A fresh perspective." McKinsey & Company. Accessed on 31 March 2023.
Daye, Derrick. "Brand Architecture Strategy Guide." Branding Strategy Insider, The Blake Project, 13 May 2021.
Todoran, Adrian. "Choosing the Perfect Brand Architecture Strategy for Your Business." LinkedIn, 2023.
Don’t just settle for printer consolidation: Seek to eliminate print and enlist your managed print services vendor to help you achieve that goal.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you plan the project, assess your current state and requirements, build a managed print services RFP and scoring process, and build continuous improvement of business processes into your operations.
Use these templates and tools to plan the printer reduction project, document your inventory, assess current printer usage, and gather information on current and future requirements.
Use these templates and tools to create an RFP for managed print services that can easily score and compare vendors.
Update the printer policy to express the new focus on reducing unsupported printer use.
Initiatives to reduce printers are often met with end-user resistance. Don't focus on the idea of taking something away from end users. Instead, focus on how print reduction fits into larger goals of business process improvement, and on opportunities to turn the vendor into a partner who drives business process improvement through ongoing innovation and print reduction.
What are your true print use cases? Except in some legitimate use cases, printing often introduces friction and does not lead to efficiencies. Companies investing in digital transformation and document management initiatives must take a hard look at business processes still reliant on hard copies. Assess your current state to identify what the current print volume and costs are and where there are opportunities to consolidate and reduce.
Change your financial model. The managed print services industry allows you to use a pay-as-you-go approach and right-size your print spend to the organization's needs. However, in order to do printing-as-a-service right, you will need to develop a good RFP and RFP evaluation process to make sure your needs are covered by the vendor, while also baking in assurances the vendor will partner with you for continuous print reduction.
Emily Sugerman
Research Analyst, Infrastructure & Operations
Info-Tech Research Group
Darin Stahl
Principal Research Advisor, Infrastructure & Operations
Info-Tech Research Group
IT directors and business operations managers face several challenges:
Printer reduction initiatives are stymied by:
Follow these steps to excise superfluous, costly printing:
Don't settle for printer consolidation: seek to eliminate print and enlist your managed print services vendor to help you achieve that goal.
"There will be neither a V-shaped nor U-shaped recovery in demand for printing paper . . . We are braced for a long L-shaped decline."
–Toru Nozawa, President, Nippon Paper Industries (qtd. in Nikkei Asia, 2020).
*Comprises nondurable goods (including office paper), containers, and packaging.
**2020 data not available.
Source: EPA, 2020.
| 87% | → | 77% |
|---|
Quocirca, a printer industry market research firm, found that the number of organizations for whom paper is "fairly or very important to their business" has dropped 10 percentage points between 2019 and 2021.
Source: Quocirca, 2021.
| 1. Strategy & planning | 2. Vendor selection, evaluation, acquisition | 3. Implementation & operation | |
|---|---|---|---|
| Phase steps |
|
|
|
| Phase outcomes |
|
|
|
Don't settle for printer consolidation: seek to eliminate print and enlist your managed print services vendor to help you achieve that goal.
Good metrics and visible improvement are important to strengthen executive support for a long-term printer reduction strategy.
Achieve long-lasting reductions in print through document management and improved workflow processes.
Modifying and enforcing printing policies can help reduce use of printers.
Print management software should be vendor-agnostic and allow you to manage devices even if you change vendors or print services.
Simply changing your managed print services pay model to "pay-per-click" can result in large cost savings.
This blueprint's key deliverable is a completed RFP for enterprise managed print services, which feeds into a scoring tool that accelerates the requirements selection and vendor evaluation process.
Managed Print Services Vendor Assessment Questions
Managed Print Services RFP Template
Managed Print Services RFP Vendor Proposal Scoring Tool
Enterprise Printing Project Charter
Document the parameters of the print reduction project, your goals, desired business benefits, metrics.
Enterprise Printing Roles and Responsibilities RACI Guide
Assign key tasks for the project across strategy & planning, vendor selection, implementation, and operation.
Start with a policy template that emphasizes reduction in print usage and adjust as needed for your organization.
Track the printer inventory and calculate total printing costs.
End-User Print Requirements Survey
Base your requirements in end user needs and feedback.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #4: Review requirements. |
Call #6: Measure project success. |
|
Call #2: Review your printer inventory. |
Call #5: Review completed scoring tool and RFP. |
|
|
Call #5: Review vendor responses to RFP. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 8 to 12 calls over the course of 4 to 6 months.
|
Strategy & planning |
Vendor selection, evaluation, acquisition |
Implementation & Operation |
|---|---|---|
|
1.1 Create project charter and assign roles 1.2 Assess current state 1.3 Gather requirements |
2.1 Understand managed print services model 2.2 Create RFP materials 2.3 Leverage print management software |
3.1 Modify printer policies 3.2 Measure project success 3.3 Training & adoption 3.4 Plan communication 3.5 Prepare for continuous improvement |
Completed Project Charter with RACI chart
Enterprise Printing Project Charter
| Challenge | Resolution |
|---|---|
| Printer reduction is not typically high on the priority list of strategic IT initiatives. It is often a project that regularly gets deferred. The lack of an aggregate view of the total cost of printing in the environment could be one root cause, and what can't be measured usually isn't being managed. | Educate and communicate the benefits of printer reduction to executives. In particular, spend time getting buy-in from the COO and/or CFO. Use Info-Tech's Printer Reduction Tool to show executives the waste that is currently being generated. |
| Printers are a sensitive and therefore unpopular topic of discussion. Executives often see a trade-off: cost savings versus end-user satisfaction. | Make a strong financial and non-financial case for the project. Show examples of other organizations that have successfully consolidated their printers. |
If printer reduction is not driven and enforced from the top down, employees will find ways to work around your policies and changes. Do not attempt to undertake printer reduction initiatives without alerting executives. Ensure visible executive support to achieve higher cost savings.
Which business and organizational goals and drivers are supported by IT's intention to transform its printing ecosystem? For example,
Legislation: In 2009, the Washington House of Representatives passed a bill requiring state agencies to implement a plan to reduce paper consumption by 30% (State of Washington, 2009). The University of Washington cites this directive as one of the drivers for their plans to switch fully to electronic records by 2022 (University of Washington, n.d.).
Health care modernization: Implementing electronic health records; reducing paper charts.
Supply chain risk reduction: In 2021, an Ontario district school board experienced photocopier toner shortages and were forced to request schools to reduce printing and photocopying: "We have recommended to all locations that the use of printing be minimized as much as possible and priority given to the printing of sensitive and confidential documentation" (CBC, 2021).
Identify overall organizational goals in the following places:
Financial benefits: Printer reduction can reduce your printing costs and improve printing capabilities.
Non-financial benefits: Although the main motivation behind printer reduction is usually cost savings, there are also non-financial benefits to the project.
However, end users typically order printer devices and supplies through the supplies/facilities department, bypassing any budget approval process, or through IT, which does not have any authority or incentive to restrict requests (when they're not measured against the controlling of printer costs).
Organization-wide printer usage policies are rarely enforced with any strictness.
Without systematic policy enforcement, end-user print behavior becomes frivolous and generates massive printing costs.
Customize Info-Tech's Enterprise Printing Roles and Responsibilities RACI Guide RACI chart to designate project roles and responsibilities to participants both inside and outside IT.
These tasks fall under the categories of:
As a best practice, no more than one person should be responsible or accountable for any given process. The same person can be both responsible and accountable for a given process, or it could be two different people.
Avoid making someone accountable for a process if they do not have full visibility into the process for appropriate oversight, or do not have time to give the process sufficient attention.
The Enterprise Printing Roles and Responsibilities RACI Guide can be used to organize and manage these tasks.
Ensure your metrics relate both to business value and customer satisfaction. "Reduction of print" is a business metric, not an experience metric.
Frame metrics around experience level agreements (XLAs) and experience level objectives (XLOs): What are the outcomes the customer wants to achieve and the benefits they want to achieve? Tie the net promoter score into the reporting from the IT service management system, since SLAs are still needed to tactically manage the achievement of the XLOs.
Use the Metrics Development Workbook from Info-Tech's Develop Meaningful Service Metrics to define:
Good metrics and visible improvement are important to strengthen executive support for a long-term printer reduction strategy.
|
Input |
Output |
|---|---|
|
|
|
Materials |
Participants |
|
|
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Achieve long-lasting reductions in print through document management and improved workflow processes.
Leverage Info-Tech research to support your business' digital transformation
The "paperless office" has been discussed since the 1970s. The IT director alone does not have authority to change business processes. Ensure the print reduction effort is tied to other strategies and initiatives around digital transformation. Working on analog pieces of paper is not digital and may be eroding digital transformation process.
Leverage Info-Tech's Assert IT's Relevance During Digital Transformations to remind others that modernization of the enterprise print environment belongs to the discussion around increasing digitized support capabilities.
|
1. Digital Marketing |
2. Digital Channels |
3. Digitized Support Capabilities |
4. Digitally Enabled Products |
5. Business Model Innovation |
|---|---|---|---|---|
|
Manage Websites |
E-Channel Operations |
Workforce Management |
Product Design |
Innovation Lab Management |
|
Brand Management |
Product Inventory Management |
Digital Workplace Management |
Portfolio Product Administration |
Data Sandbox Management |
|
SEO |
Interactive Help |
Document Management |
Product Performance Measurement |
Innovation Compensation Management |
|
Campaign Execution |
Party Authentication |
One-time consolidation initiatives leave money on the table. The extra savings results from changes in printing culture and end-user behavior.
It's natural for printer usage and printing costs to vary based on office, department, and type of employee. Certain jobs simply require more printing than others.
However, the printing culture within your organization likely also varies based on
Examine the printing behaviors of your employees based on these factors and determine whether their printing behavior aligns with the nature of their job.
Excessive printing costs attributed to departments or groups of employees that don't require much printing for their jobs could indicate poor printing culture and potentially more employee pushback.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Understand end-user printing requirements and current printer performance through an end-user survey
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Download the End-User Print Requirements Survey
Use an end-user printer satisfaction survey before and after any reduction efforts or vendor implementation, both as a requirement-gathering user input and to measure/manage the vendor.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Prepare your printer fleet for future needs to avoid premature printer refreshes.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Strategy & planning | Vendor selection, evaluation, acquisition | Implementation & Operation |
|---|---|---|
1.1 Create project charter and assign roles 1.2 Assess current state 1.3 Gather requirements | 2.1 Understand managed print services model 2.2 Create RFP materials 2.3 Leverage print management software | 3.1 Modify printer policies 3.2 Measure project success 3.3 Training & adoption 3.4 Plan communication 3.5 Prepare for continuous improvement |
Avoid being locked into a long lease where the organization pays a fixed monthly fee whether the printer runs or not.
Instead, treat enterprise printing as a service, like the soda pop machine in the break room, where the vendor is paid when the device is used. If the vending machine is broken, the vendor is not paid until the technician restores it to operability. Printers can work the same way.
By moving to a per click/page financial model, the vendor installs and supports the devices and is paid whenever a user prints. Though the organization pays more on a per-click/page basis compared to a lease, the vendor is incentivized to right-size the printer footprint to the organization, and the organization saves on monthly recurring lease costs and maintenance costs.
Right-size commitments: If the organization remains on a lease instead of pay-per-click model, it should right-size the commitment if printing drops below a certain volume. In the agreement, include a business downturn clause that allows the organization to right-size and protect itself in the event of negative growth.
Outsourcing print services can monitor and balance your printers and optimize your fleet for efficiency. Managed print services are most appropriate for:
Vendors typically do not like the pay-per-click option and will steer businesses away from it. However, this option holds the vendor accountable for the availability and reliability of your printers, and Info-Tech generally recommends this option.
Your printing costs with a pay-per-click model are most reflective of your actual printer usage. Level pay tends to be more expensive, where you need to pay for overages but don't benefit from printing less than the maximum allocated.
See the below cost comparison example with level pay set at a maximum of 120,000 impressions per month. In the level pay model, the organization was paying for 120,000 sheets in the month it only used 60,000 impressions, whereas it would have been able to pay just for the 60,000 sheets in the pay-per-click model.
This organization compared estimated costs over a 36-month period for the base-plus-click and pay-per-page models for Toshiba E Studio 3515 AC Digital Color Systems.
|
Base-plus-click model |
Monthly recurring cost |
Avg. impressions per month |
Monthly cost |
Monthly cost |
"Net pay per click" |
Cost over 36-month period |
|---|---|---|---|---|---|---|
|
A fixed lease cost each month, with an additional per click/page charge |
$924.00 |
12,000 (B&W) |
$0.02 (B&W) |
$1,164.00 (B&W) |
$0.097 (B&W) |
$41,904 (B&W) |
|
5,500 (Color) |
$0.09 (Color) |
$495.00 (Color) |
$0.090 (Color) |
$17,820 (Color) |
|
Base-plus-click model |
Monthly recurring cost |
Avg. impressions per month |
Monthly cost |
Monthly cost |
"Net pay per click" |
Cost over 36-month period |
|---|---|---|---|---|---|---|
|
No monthly lease cost, only per-image charges |
0.00 |
12,000 (B&W) |
$0.06 (B&W) |
$720.00 (B&W) |
$0.060 (B&W) |
$25,920 (B&W) |
|
5,500 (Color) |
$0.12 (Color) |
$660.00 (Color) |
$0.120 (Color) |
$23,760 (Color) |
Though the per-image cost for each image is lower in the base-plus-click model, the added monthly recurring costs for the lease means the "net pay per click" is higher.
Overall, the pay-per-page estimate saved $10,044 over a 36-month period for this device.
Avoid a scenario where the vendor drops the printer in your environment and returns only for repairs. Engage the vendor in this continuous innovation work:
In the managed services agreement, include a proviso for continuous innovation where the vendor has a contractual obligation to continually look at the business process flow and bring yearly proposals to show innovation (e.g. cost reductions; opportunities to reduce print, which allows the vendor to propose document management services and record keeping services). Leverage vendors who are building up capabilities to transform business processes to help with the heavy lifting.
Establish a vision for the relationship that goes beyond devices and toner. The vendor can make a commitment to continuous management and constant improvement, instead of installing the devices and leaving. Ideally, this produces a mutually beneficial situation: The client asks the vendor to sell them ways to mature and innovate the business processes, while the vendor retains the business and potentially sells new services. In order to retain your business, the vendor must continue to learn and know about your business.
The metric of success for your organization is the simple reduction in printed copies overall. The vendor success metric would be proposals that may combine hardware, software, and services that provide cost-effective reductions in print through document management and workflow processes. The vendors should be keen to build this into the relationship since the services delivery has a higher margin for them.
"Continuing innovation: The contractor initiates at least one (1) project each year of the contract that shows leadership and innovation in solutions and services for print, document management, and electronic recordkeeping. Bidders must describe a sample project in their response, planning for an annual investment of approximately 50 consulting hours and $10,000 in hardware and/or software."
Problem: Printer downtime and poor service is causing friction with your managed service provider (MSP).
MSPs often offer clients credit requests (service credits) for their service failures, which are applied to the previous month's monthly recurring charge. They are applied to the last month's MRC (monthly reoccurring charges) at the end of term and then the vendor pays out the residual.
However, while common, service credits are not always perceived to be a strong incentive for the provider to continually focus on improvement of mean time to respond or mean time to repair.
Solution: Turn your vendor into a true partner by including an "earn back" condition in the contract.
Printers are commoditized and can come and go, but print management software enables the governance, compliance, savings and visibility necessary for the transformation
Ask respondents to describe their managed services capabilities and an optional on-premises, financed solution with these high-level capabilities.
|
Print Management Software Features |
|
|---|---|
| Hardware-neutral support of all major printer types and operating systems (e.g. direct IP to any IPP-enabled printer along with typical endpoint devices) | Tracking of all printing activity by user, client account, printer, and document metadata |
| Secure print on demand (Secure print controls: User Authenticated Print Release, Pull Printing) | Granular print cost/charging, allowing costs to be assigned on a per-printer basis with advanced options to charge different amounts based on document type (e.g. color, grayscale or duplex), page size, user or group |
| Managed and secured mobile printing (iOS/Android), BYOD, and guest printing | DaaS/VDI print support |
| Printer installation discovery/enablement, device inventory/management | Auditing/reporting, print audit trail using document attributes to manage costs/savings, enforce security and compliance with regulations and policies |
| Monitoring print devices, print queues, provide notification of conditions | Watermarking and/or timestamping to ensure integrity and confidentially/classification of printed documents some solutions support micro font adding print date, time, user id and other metadata values discreetly to a page preventing data leakage |
| Active Directory integration or synchronization with LDAP user accounts | Per-user quotas or group account budgets |
| Ability to govern default print settings policies (B&W, double-sided, no color, etc.) | |
Use Info-Tech's catalog of commonly used questions and requirements in successful acquisition processes for managed print services. Ask the right questions to secure an agreement that meets your needs. If you are already in a contract with managed print services, take the opportunity of contract renewal to improve the contract and service.
Add your finalized assessment questions into this table, which you will attach to your RFP. The vendor answers questions in this "Schedule 1" attachment and returns it to you.
Aggregate the RFP responses into this scoring tool to identify the frontrunners and candidates for elimination. Since the vendors are asked to respond in a standard format, it is easier to bring together all the responses to create a complete view of your options.
Include the right requirements for your organization, and avoid leaving out important requirements that might have been overlooked.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Download the Managed Print Services Vendor Assessment Questions tool
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Download the Managed Print Services RFP Vendor Proposal Scoring Tool
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
The responses from the low-scoring vendors still have value: these providers will likely provide ideas that you can then leverage with your frontrunner, even if their overall proposal did not score highly.
Strategy & planning | Vendor selection, evaluation, acquisition | Implementation & Operation |
|---|---|---|
1.1 Create project charter and assign roles 1.2 Assess current state 1.3 Gather requirements | 2.1 Understand managed print services model 2.2 Create RFP materials 2.3 Leverage print management software | 3.1 Modify printer policies 3.2 Measure project success 3.3 Training & adoption 3.4 Plan communication 3.5 Prepare for continuous improvement |
Consider that your goal is to achieve printer reduction. Discuss with your team how strict it needs to be to truly reset behavior with printers. Many organizations struggle with policy enforcement. Firm language in the policy may be required to achieve this goal. For example,
The survey was run once prior to the changes being implemented to establish a baseline of user satisfaction and to gain insights into additional requirements.
Several months after the initial rollout (90 days is typical to let the dust settle), resurvey the end users and publish or report to the administration success metrics (the current costs vs. the actual costs prior to the change).
User satisfaction survey can be used to manage the vendor, especially if the users are less happy after the vendor touched their environment. Use this feedback to hold the provider to account for improvement.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Prepare troubleshooting guides and step-by-step visual aid posters for the print areas that guide users to print, release, and find their print jobs and fix common incidents on their own. These may include:
Ensure business leadership and end users remain committed to thinking before they print.
|
Solicit the input of end users through surveys and review comments. |
Common complaints | Response |
|---|---|---|
|
Consider the input of end users when making elimination and consolidation decisions and communicate IT's justification for each end user's argument to keep their desktop printers. |
"I don't trust network storage. I want physical copies." | Explain the security and benefits of content management systems. |
| "I use my desktop a lot. I need it." | Explain the cost benefits of printing on cheaper network MFPs, especially if they print in large quantities. | |
| "I don't use it a lot, so it's not costly." | It's a waste of money to maintain and power underused devices. | |
| "I need security and confidentiality." | MFPs have biometric and password-release functions, which add an increased layer of security. | |
| "I need to be able to print from home." | Print drivers and networked home printers can be insecure devices and attack vectors. | |
| "I don't have time to wait." | Print jobs in queue can be released when users are at the device. | |
| "I don't want to walk that far." | Tell the end user how many feet the device will be within (e.g. 50 feet). It is not usually very far. |
Implement a continual improvement plan for enterprise printing:
You have now re-envisioned your enterprise print environment by documenting your current printer inventory and current cost and usage. You also have hard inventory and usage data benchmarks that you can use to measure the success of future initiatives around digitalization, going paperless, and reducing print cost.
You have also developed a plan to go to market and become a consumer of managed print services, rather than a provider yourself. You have established a reusable RFP and requirements framework to engage a managed print services vendor who will work with you to support your continuous improvement plans.
Return to the deliverables and advice in this blueprint to reinforce the organization's message to end users on when, where, and how to print. Ideally, this project has helped you go beyond a printer refresh – but rather served as a means to change the printing culture at your organization.
Contact your account representative for more information
workshops@infotech.com
1-888-670-8889
Fernandes, Louella. "Quocirca Managed Services Print Market, 2021." Quocirca, 25 Mar. 2021. Accessed 12 Oct. 2021.
McInnes, Angela. "No More Photocopies, No More Ink: Thames Valley Schools Run Out of Toner." CBC, 21 Oct. 2021. Web.
"Paper and Paperboard: Material-Specific Data." EPA, 15 Dec. 2020. Accessed 15 Oct. 2021.
State of Washington, House of Representatives. "State Agencies – Paper Conservation and Recycling." 61st Legislature, Substitute House Bill 2287, Passed 20 April 2009.
Sugihara, Azusa. "Pandemic Shreds Office Paper Demand as Global Telework Unfolds." Nikkei Asia, 18 July 2020. Accessed 29 Sept. 2021.
"Paper Reduction." University of Washington, n.d. Accessed 28 Oct. 2021.
"What is MPS?" University of Washington, n.d. Accessed 16 Mar. 2022.
Jarrod Brumm
Senior Digital Transformation Consultant
Jacques Lirette
President, Ditech Testing
3 anonymous contributors
Info-Tech Research Group Experts
Allison Kinnaird, Research Director & Research Lead
Frank Trovato, Research Director
Using the MITRE ATT&CK® framework, Info-Tech’s approach helps you understand your preparedness and effective detection and mitigation actions.
This blueprint and associated tool are scalable for all types of organizations within various industry sectors, allowing them to know what types of risk they are facing and what security services are recommended to mitigate those risks.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Review a breakdown of each of the various attack vectors and their techniques for additional context and insight into the most prevalent attack tactics.
Map your current security protocols against the impacts of various techniques on your network to determine your risk preparedness.
Use your prioritized attack vectors to plan your next threat modeling session with confidence that the most pressing security concerns are being addressed with substantive remediation actions.
Imposing a traditional gating and governance approach on an Agile project can eliminate the advantages that Agile delivery methods offer. Make sure to rework your traditional project gating and governance approach to be Agile friendly.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This deck is a guide to creating your own Agile-friendly project gating and governance approach using Info-Tech’s Agile Gating Framework.
Modify Info-Tech’s Gates 3 and 3A Checklists to meet your organization’s needs, and then use them to determine when Agile projects are ready to enter and exit the RRVC phase.
Modify Info-Tech’s Agilometer to meet your organization’s needs, and then use it to determine the level of support and oversight the project will need.
Modify Info-Tech’s Agile Project Status Report to meet your organization’s needs, and then use it to monitor in-flight Agile projects.
Use Info-Tech’s Project Burndown Chart to monitor the progress of your in-flight Agile projects.
Use Info-Tech’s Traditional to Agile Gating Artifact Mapping tool to modify your gating artifacts for Agile projects.
Phase 1: Establish Your Gating and Governance Purpose
Phase 2: Understand and Adapt Info-Tech’s Agile Gating Framework
Most project gating and governance approaches are designed for traditional (Waterfall) delivery methods. However, Agile delivery methods call for a different way of working that doesn’t align well with these approaches.
Applying traditional project gating and governance to Agile projects is like trying to fit a square peg in a round hole. Not only will it make Agile project delivery less efficient, but in the extreme, it can lead to outright project failure and even derail your organization’s Agile transformation.
If you want Agile to successfully take root in your organization, be prepared to rethink your current gating and governance practices. This document presents a framework that you can use to rework your approach to provide both effective oversight and support for your Agile projects.
|
Alex Ciraco
Principal Research Director, Application Delivery and Management Info-Tech Research Group |
Your Challenge
|
Common Obstacles
|
Info-Tech’s Approach
|
Imposing a traditional governance approach on an Agile project can eliminate the advantages that Agile delivery methods offer. Make sure to rework your project gating and governance approach to be Agile friendly.
| 1. Establish Your Gating and Governance Purpose | 2. Understand and Adapt Info-Tech’s Agile Gating Framework | 3. Complete your Agile Gating Framework | |
| Phase Steps |
1.1 Understand How We Gate and Govern Projects 1.2 Compare Traditional to Agile Delivery 1.3 Realize What Traditional Gating Looks Like and Why |
2.1 Understand How Agile Manages Risk and Ensures Value Delivery 2.2 Introducing Info-Tech’s Agile Gating Framework 2.3 Create Your Agilometer 2.4 Create an Agile-Friendly Project Status Report 2.5 Select Your Agile Health Check Tool |
3.1 Map Your Traditional Gating Artifacts to Agile Delivery 3.2 Determine Your Now, Next, Later Roadmap for Implementation |
| Phase Outcomes |
|
|
|
Agilometer ToolCreate your customized Agilometer tool to determine project support and oversight needs. |
|
Gates 3 and 3A ChecklistsCreate your customized checklists for projects at Gates 3 and 3A. |
|
Agile-Friendly Project Status ReportCreate your Agile-friendly project status report to monitor progress. |
|
Artifact Mapping ToolMap your traditional gating artifacts to their Agile replacements. |
|
| Phase 1 1.1 Understand How We Gate and Govern Projects 1.2 Compare Traditional to Agile Delivery 1.3 Realize What Traditional Gating Looks Like And Why | Phase 2 2.1 Understand How Agile Manages Risk and Ensures Value Delivery 2.2 Introducing Info-Tech’s Agile Gating Framework 2.3 Create Your Agilometer 2.4 Create Your Agile-Friendly Project Status Report 2.5 Select Your Agile Health Check Tool | Phase 3 3.1 Map Your Traditional Gating Artifacts to Agile Delivery 3.2 Determine Your Now, Next, Later Roadmap for Implementation |
| 73% of organizations created their project gating framework before adopting or considering Agile delivery practices. (Athens Journal of Technology and Engineering)
71% of survey respondents felt an Agile-friendly gating approach improves both productivity and product quality. (Athens Journal of Technology and Engineering) |
Moving to an Agile-friendly gating approach has many benefits:
|
|
Don’t make the mistake of asking an Agile project to follow a traditional phase-gate approach to project delivery! |
Before reworking your gating approach, you need to consider two important questionsAnswering these questions will help guide your new gating process to both be Agile friendly and meet your organization’s needs
|
|
Architecture is a competency, not a function. Project teams, including even business managers outside of IT, can assimilate “architectural thinking.”
Increase business value through the dissemination of architectural thinking throughout the organization. Maturing your EAM practices beyond a certain point does not help.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Improve benefits from your enterprise architecture efforts through the dissemination of architecture thinking throughout your organization.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Set up a successful change adoption.
Correctly identify which persona most closely resembles individual staff members.
Ensure enough time and effort is allocated in advance to people change management.
Ensure consistency and clarity in change messages to staff.
Ensure consistency and clarity in change messages to staff.
Improve people change management for future change initiatives.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this research to identify and quantify the potential financial impacts of vendors’ poor performance. Use Info-Tech’s approach to look at the financial impact from various perspectives to better prepare for issues that may arise.
By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

Vendors are becoming more influential and essential to the operation of organizations. Often the sole risk consideration of a business is whether the vendor meets a security standard, but vendors can negatively impact organizations’ budgets in various ways. Fortunately, though inherent risk is always present, organizations can offset the financial impacts of high-risk vendors by employing due diligence in their vendor management practices to help manage the overall risks.
Frank Sewell
Research Director, Vendor Management
Info-Tech Research Group
| Your Challenge
As vendors become more prevalent in organizations, organizations increasingly need to understand and manage the potential financial impacts of vendors’ actions. It is only a matter of time until a vendor mistake impacts your organization. Make sure you are prepared to manage the adverse financial consequences. |
Common Obstacles
Identifying and managing a vendor’s potential financial impact requires multiple people in the organization across several functions – and those people all need educating on the potential risks. Organizational leadership is often unaware of decisions on organizational risk appetite and tolerance, and they assume there are more protections in place against risk impact than there truly are. |
Info-Tech’s Approach
Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them. Prioritize and classify your vendors with quantifiable, standardized rankings. Prioritize focus on your high-risk vendors. Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool. |
Companies without good vendor management risk initiatives will take on more risk than they should. Solid vendor management practices are imperative –organizations must evolve to ensure that vendors deliver services according to performance objectives and that risks are managed accordingly.

This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.
Out of scope:
This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.
In this blueprint, we’ll explore financial risks and their impacts.
Identifying negative actions is paramount to assessing the overall financial impact on your organization, starting in the due diligence phase of the vendor assessment and continuing throughout the vendor lifecycle.

Loss of business represents the largest share of the breach
38%Avg. $1.59M |
Global average cost of a vendor breach
$4.2M |
Percentage of breaches in 2020 caused by business associates
40.2%23.2% YoY(year over year) |
| (Source: “Cost of a Data Breach Report 2021,” IBM, 2021) | (Source: “Vendor Risk Management – A Growing Concern,” Stern Security, 2021) | |
Hospitals often rely on vendors to manage their data center environments but rarely understand the downstream financial impacts if that vendor fails to perform.
For example, a vendor implements a patch out of cycle with no notice to the IT group. Suddenly all IT systems are down. It takes 12 hours for the IT teams to return systems to normal. The downstream impacts are substantial.
Assessing financial impacts is an ongoing, educative, and collaborative multidisciplinary process that vendor management initiatives are uniquely designed to coordinate and manage for organizations.
| Insight 1 | Vendors are becoming more and more crucial to organizations’ overall operations, and most organizations have a poor understanding of the potential impacts they represent.
Is your vendor solvent? Do they have enough staff to accommodate your needs? Has their long-term planning been affected by changes in the market? Are they unique in their space? |
| Insight 2 | Financial impacts from other risk types deserve just as much focus as security alone, if not more.
Examples include penalties and fines, loss of revenue due to operational impacts, vendor replacement costs, hidden costs in poorly understood contracts, and lack of contractual protections. |
| Insight 3 | There is always an inherent risk in working with a vendor, but organizations should financially quantify how much each risk may impact their budget.
A significant concern for organizations is quantifying different types of risks. When a risk occurs, the financial losses are often poorly understood, with unbudgeted financial impacts. |
Inherent risks from negative actions are pervasive throughout the entire vendor lifecycle. Collaboratively understanding those risks and working together to put proper management in place enables organizations to get the most value out of the relationship with the least amount of risk.

|
Visit Info-Tech’s VMO ROI Calculator and Tracker |
Input: List of identified potential risk scenarios scored by likelihood and financial impact, List of potential management of the scenarios to reduce the risk
Output: Comprehensive financial risk profile on the specific vendor solution
Materials: Whiteboard/flip charts, Financial Risk Impact Tool to help drive discussion
Participants: Vendor Management – Coordinator, IT Operations, Legal/Compliance/Risk Manager, Finance/Procurement
Vendor management professionals are in an excellent position to collaboratively pull together resources across the organization to determine potential risks. By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.
Download the Financial Risk Impact Tool
Never underestimate the value of keeping the relationship moving forward.Examples of items and activities to monitor include; | ![]() | |
|
| |
Info-Tech InsightMany organizations do not have the resources to dedicate to annual risk assessments of all vendors. Consider timing ongoing risk assessments to align with contract renewal, when you have the most leverage with the vendor. | Visit Info-Tech’s Risk Register Tool | |
|
![]() |
|
![]() |
![]() |
Design and Build an Effective Contract Lifecycle Management Process
|
![]() |
Identify and Reduce Agile Contract Risk
|
![]() |
Jump Start Your Vendor Management Initiative
|
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Evaluate executive stakeholder needs and assess your current capabilities to ensure your implementation strategy sets realistic expectations.
Define an organizationally appropriate scope and mandate for your EPMO to ensure that your processes serve the needs of the whole.
Establish clearly defined and easy-to-follow EPMO processes that minimize project complexity and improve enterprise project results.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify breakdowns in the flow of portfolio data across the enterprise to pinpoint where and how an EPMO can best intervene.
Assess areas of strength and opportunity in your PPM capabilities to help structure and drive the EPMO.
Define stakeholder needs and expectations for the EPMO in order to cultivate capabilities and services that help drive informed and engaged project decisions at the executive level.
A current state picture of the triggers that are driving the need for an EPMO at your organization.
A current state understanding of the strengths you bring to the table in constructing an EPMO as well as the areas you need to focus on in building up your capabilities.
A target state set by stakeholder requirements and expectations, which will enable you to build out an implementation strategy that is aligned with the needs of the executive layer.
1.1 Map current enterprise PPM workflows.
1.2 Conduct a SWOT analysis.
1.3 Identify resourcing considerations and other implementation factors.
1.4 Survey stakeholders to establish the right mix of EPMO capabilities.
An overview of the flow of portfolio data and information across the organization
An overview of current strengths, weaknesses, opportunities, and threats
A preliminary assessment of internal and external factors that could impact the success of this implementation
The ability to construct a project plan that is aligned with stakeholder needs and expectations
Define an appropriate scope for the EPMO and the deployment it services.
Devise a plan for engaging and including the appropriate stakeholders during the implementation phase.
A clear purview for the EPMO in relation to the wider enterprise in order to establish appropriate expectations for the EPMO’s services throughout the organization.
Engaged stakeholders who understand that they have a stake in the successful implementation of the EPMO.
2.1 Prepare your EPMO value proposition.
2.2 Define the role and organizational reach of your EPPM capabilities.
2.3 Establish a communication plan to create stakeholder awareness.
A clear statement of purpose and benefit that can be used to help build the case for an EPMO with stakeholders
A functional charter defining the scope of the EPMO and providing a statement of the services the EPMO will provide once established
An engaged executive layer that understands the value of the EPMO and helps drive its success
Establish clearly defined and easy-to-follow EPMO processes that minimize project complexity.
Develop portfolio and project governance structures that feed the EPMO with the data decision makers require without overloading enterprise project teams with processes they can’t support.
Devise a communications strategy that helps achieve organizational buy-in.
The reduction of project chaos and confusion throughout the organization.
Processes and governance requirements that work for both decision makers and project teams.
Organizational understanding of the universal benefit of the EPMO’s processes to stakeholders throughout the enterprise.
3.1 Establish EPMO roles and responsibilities.
3.2 Document standard procedures around enterprise portfolio reporting, PPM administration, and project leadership.
3.3 Review enterprise PPM solutions.
3.4 Develop a stakeholder engagement and resistance plan.
Clear lines of portfolio accountability
A fully actionable EPMO Standard Operating Procedure document that will enable process clarity
An informed understanding of the right PPM solution for your enterprise processes
A communications strategy document to help communicate the organizational benefits of the EPMO
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Evaluate the business, user, and infrastructure requirements to ensure that all needs are clearly defined and the best fit-for-purpose migration plan can be decided on.
Expose key cloud risks across five major areas and build mitigation strategies to counter risk and gain foresight for migration.
Outline major milestones of migration and build the communication plan to transition users smoothly. Complete the Office 365 migration plan report to present to business stakeholders.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Review corporate and project goals.
Review and prioritize relevant services and applications to shape the migration path.
Review Office 365 license models.
Profile end users to rightsize licensing.
Estimate dollar impact of new licensing model.
Corporate goals for Office 365.
Prioritized migration path of applications.
Decision on user licensing structure.
Projected cost of licensing.
1.1 Outline corporate and project goals to paint the starting line.
1.2 Review and prioritize services.
1.3 Rightsize licensing.
Clear goals and metrics for migration
Prioritized list of applications
Effective licensing structure
Conduct value and readiness assessment of current on-premises services.
Identify and evaluate risks and challenges.
Assess IT’s readiness to own and manage Office 365.
Completed value and readiness assessment.
Current targets for service and deployment models.
List of perceived risks according to five major risk areas.
Assessed IT’s readiness to own and manage Office 365.
Established go/caution/stop for elected Office 365 services.
2.1 Assess value and readiness.
2.2 Identify key risks.
2.3 Identify changes in IT skills and roles.
Cloud service appropriateness assessment
Completed risk register
Reorganization of IT roles
Review Office 365 risks and discuss mitigation strategies.
Completed risks and mitigation strategies report.
3.1 Build mitigation strategies.
3.2 Identify key service requests.
3.3 Build workflows.
Defined roles and responsibilities
Assigned decision rights
List of staffing gaps
Build a timeline of major milestones.
Plan and prioritize projects to bridge gaps.
Build a communication plan.
Review Office 365 strategy and roadmap.
Milestone roadmap.
Critical path of milestone actions.
Communication plan.
Executive report.
4.1 Outline major milestones.
4.2 Finalize roadmap.
4.3 Build and refine the communication plan.
Roadmap plotted projects, decisions, mitigations, and user engagements
Finalized roadmap across timeline
Communication and training plan
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Equip your organization for incident response with formal documentation of policies and processes.
Act with efficiency and effectiveness as new incidents are handled.
Manage and improve the incident management process by tracking metrics, testing capabilities, and leveraging best practices.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the purpose of incident response.
Formalize the program.
Identify key players and escalation points.
Common understanding of the importance of incident response.
Various business units becoming aware of their roles in the incident management program.
Formalized documentation.
1.1 Assess the current process, obligations, scope, and boundaries of the incident management program.
1.2 Identify key players for the response team and for escalation points.
1.3 Formalize documentation.
1.4 Prioritize incidents requiring preparation.
Understanding of the incident landscape
An identified incident response team
A security incident management charter
A security incident management policy
A list of top-priority incidents
A general security incident management plan
A security incident response RACI chart
Document the clear response procedures for top-priority incidents.
As incidents occur, clear response procedures are documented for efficient and effective recovery.
2.1 For each top-priority incident, document the workflow from detection through analysis, containment, eradication, recovery, and post-incident analysis.
Up to five incident-specific runbooks
Ensure the response procedures are realistic and effective.
Identify key metrics to measure the success of the program.
Real-time run-through of security incidents to ensure roles and responsibilities are known.
Understanding of how to measure the success of the program.
3.1 Limited scope tabletop exercise.
3.2 Discuss key metrics.
Completed tabletop exercise
Key success metrics identified
Security incidents are going to happen whether you’re prepared or not. Ransomware and data breaches are just a few top-of-mind threats that all organizations deal with. Taking time upfront to formalize response plans can save you significantly more time and effort down the road. When an incident strikes, don’t waste time deciding how to remediate. Rather, proactively identify your response team, optimize your response procedures, and track metrics so you can be prepared to jump to action.
Céline Gravelines,
Senior Research Analyst
Security, Risk & Compliance Info-Tech Research Group
Céline Gravelines,
Senior Research Analyst
Security, Risk & Compliance Info-Tech Research Group
Average data breach costs per compromised record hit an all-time high of $148 (in 2018).
(Source: IBM, “2018 Cost of Data Breach Study)”
| % of systems impacted by a data breach | ||||
|---|---|---|---|---|
| 1% No Impact |
19% 1-10% impacted |
41% 11-30% impacted |
24% 31-50% impacted |
15% > 50% impacted |
| % of customers lost from a data breach | ||||
| 61% Lost < 20% |
21% Lost 20-40% | 8% Lost 40-60% |
6% Lost 60-80% |
4% Lost 80-100% |
| % of customers lost from a data breach | ||||
| 58% Lost <20% |
25% Lost 20-40% |
9% Lost 40-60% |
5% Lost 60-80% |
4% Lost 80-100% |
Source: Cisco, “Cisco 2017 Annual Cybersecurity Report”
Any event not a part of the standard operation of a service which causes, or may cause, the interruption to, or a reduction in, the quality of that service.
A security event is anything that happens that could potentially have information security implications.
A security incident is a security event that results in damage such as lost data.
(Sources: IBM, “2018 Cost of Data Breach Study”; Verizon, “2017 Data Breach Investigations Report”; Cisco, “Cisco 2018 Annual Cybersecurity Report”)
Improve efficacy
Develop structured processes to increase process consistency across the incident response team and the program as a whole. Expose operational weak points and transition teams from firefighting to innovating.
Improve threat detection, prevention, analysis, and response
Enhance your pressure posture through a structured and intelligence-driven incident handling and remediation framework.
Improve visibility and information sharing
Promote both internal and external information sharing to enable good decision making.
Create and clarify accountability and responsibility
Establish a clear level of accountability throughout the incident response program, and ensure role responsibility for all tasks and processes involved in service delivery.
Control security costs
Effective incident management operations will provide visibility into your remediation processes, enabling cost savings from misdiagnosed issues and incident reduction.
Identify opportunities for continuous improvement
Increase visibility into current performance levels and accurately identify opportunities for continuous improvement with a holistic measurement program.
Certain regulations and laws require incident response to be a mandatory process in organizations.
| Compliance Standard Examples | Description |
|---|---|
| Federal Information Security Modernization Act (FISMA) |
|
| Federal Information Processing Standards (FIPS) |
|
| Payment Card Industry Data Security Standard (PCI DSS v3) |
|
| Health Insurance Portability and Accountability Act (HIPAA) |
|
Legacy security operations centers (SOCs) fail to address gaps between data sources, network controls, and human capital. There is limited visibility and collaboration between departments, resulting in siloed decisions that do not support the best interests of the organization.
Security operations is part of what Info-Tech calls a threat collaboration environment, where members must actively collaborate to address cyberthreats affecting the organization’s brand, business operation, and technology infrastructure on a daily basis.
| Prevent: Defense in depth is the best approach to protect against unknown and unpredictable attacks. Diligent patching and vulnerability management, endpoint protection, and strong human-centric security (amongst other tactics) are essential. | Detect: There are two types of companies – those who have been breached and know it, and those who have been breached and don’t know it. Ensure that monitoring, logging, and event detection tools are in place and appropriate to your organizational needs. |
| Analyze: Raw data without interpretation cannot improve security and is a waste of time, money, and effort. Establish a tiered operational process that not only enriches data but also provides visibility into your threat landscape. | Respond: Organizations can’t rely on an ad hoc response anymore – don’t wait until a state of panic. Formalize your response processes in a detailed incident runbook to reduce incident remediation time and effort. |
| Design and Implement a Vulnerability Management Program | Vulnerability Management Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating. |
|
| Integrate Threat Intelligence Into Your Security Operations | Vulnerability Management Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating. |
|
| Develop Foundational Security Operations Processes | Operations Security operations include the real-time monitoring and analysis of events based on the correlation of internal and external data sources. This also includes incident escalation based on impact. These analysts are constantly tuning and tweaking rules and reporting thresholds to further help identify which indicators are most impactful during the analysis phase of operations. |
|
| Develop and Implement a Security Incident Management Program | Incident Response (IR) Effective and efficient management of incidents involves a formal process of analysis, containment, eradication, recovery, and post-incident activities. Incident response teams coordinate root cause and incident gathering while facilitating post-incident lessons learned. Incident response can provide valuable threat data that ties specific indicators to threat actors or campaigns. |
Security Incident Management Policy
|
|---|
| Info-Tech Resources: | |
|---|---|
| Business Continuity Plan | Develop a Business Continuity Plan |
| Disaster Recovery Plan | Create a Right-Sized Disaster Recovery Plan |
| Security Incident Management | Develop and Implement a Security Incident Management Program |
| Incident Management | Incident and Problem Management |
| Service Desk | Standardize the Service Desk |
| 1. Prepare | 2. Operate | 3. Maintain and Optimize | |
|---|---|---|---|
| Best-Practice Toolkit | 1.1 Establish the Drivers, Challenges, and Benefits. 1.2 Examine the Security Incident Landscape and Trends. 1.3 Understand Your Security Obligations, Scope, and Boundaries. 1.4 Gauge Your Current Process to Identify Gaps. 1.5 Formalize the Security Incident Management Charter. 1.6 Identify Key Players and Develop a Call Escalation Tree. 1.7 Develop a Security Incident Management Policy. |
2.1 Understand the Incident Response Framework. 2.2 Understand the Purpose of Runbooks. 2.3 Prioritize the Development of Incident-Specific Runbooks. 2.4 Develop Top-Priority Runbooks. 2.5 Fill Out the Root-Cause Analysis Template. 2.6 Customize the Post-Incident Review Questions Tracking Tool to Standardize Useful Questions for Lessons-Learned Meetings. 2.7 Complete the Security Incident Report Template. |
3.1 Conduct Tabletop Exercises. 3.2 Initialize a Security Incident Management Metrics Program. 3.3 Leverage Best Practices for Continuous Improvement. |
| Guided Implementations | Understand the incident response process, and define your security obligations, scope, and boundaries. Formalize the incident management charter, RACI, and incident management policy. |
Use the framework to develop a general incident management plan. Prioritize and develop top-priority runbooks. |
Develop and facilitate tabletop exercises. Create an incident management metrics program, and assess the success of the incident management program. |
| Onsite Workshop | Module 1: Prepare for Incident Response |
Module 2: Handle Incidents |
Module 3: Review and Communicate Security Incidents |
| Phase 1 Outcome:
|
Phase 2 Outcome:
|
Phase 3 Outcome:
|
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | Workshop Day 5 | |
|---|---|---|---|---|---|
| Activities |
|
|
|
|
|
| Deliverables |
|
|
|
|
|
| GI | Purpose | Measured Value |
|---|---|---|
| Section 1: Prepare |
Understand the need for an incident response program. |
Time, value, and resources saved using our classification guidance and templates:
2 FTEs*2 days*$80,000/year =
$1,280 |
| Section 2: Operate |
Prioritize runbooks and develop the processes to create your own incident response program: |
Time, value, and resources saved using our guidance: 1 consultant*15 days*$2,000/day = $30,000 (if done by third party) |
| Section 3: Maintain and Optimize | Develop methods of proper reporting and create templates for communicating incident response to key parties. | Time, value, and resources saved using our guidance, templates, and tabletop exercises: 2 FTEs*3 days*$80,000/year = $1,920 |
| Total Costs | To just get an incident response program off the ground. | $49,200 |
Organization implemented ITIL, but formal program design became less of a priority and turned more ad hoc.
Next steps:
Follow this case study to Phase 1
| PHASE 1 | PHASE 2 | PHASE 3 |
|---|---|---|
| Prepare | Operate | Optimize |
1.1 Establish the drivers, challenges, and benefits.
1.2 Examine the security incident landscape and trends.
1.3 Understand your security obligations, scope, and boundaries.
1.4 Gauge your current process to identify gaps.
1.5 Formalize a security incident management charter.
1.6 Identify key players and develop a call escalation tree.
1.7 Develop a security incident management policy.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation 1: Prepare for Incident Response Proposed Time to Completion: 3 Weeks |
|
|---|---|
| Step 1.1-1.3 Understand Incident Response | Step 1.4-1.7 Begin Developing Your Program |
| Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
|
With these tools & templates: |
With these tools & templates: Security Incident Management Policy Security Incident Management Plan |
|
Phase 1 Results & Insights: Ready-made incident response solutions often contain too much coverage: too many irrelevant cases that are not applicable to the organization are accounted for, making it difficult to sift through all the incidents to find the ones you care about. Develop specific incident use cases that correspond with relevant incidents to quickly identify the response process and eliminate ambiguity when handled by different individuals. |
|
How do you classify various incident types between service desk, IT/infrastructure, and security?
Use Info-Tech’s tactical, practical training materials to deliver training that is:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This deck presents a behind-the-scenes explanation for the training materials, enabling a facilitator to deliver the training.
The modules are complete with presentation slides, speaker’s notes, and accompanying participant workbooks and provide everything you need to deliver the training to your team.
Each workbook is tailored to the presentation slides in its corresponding facilitation guide. Some workbooks have additional materials, such as role play scenarios, to aid in practice. Every workbook comes with example entries to help participants make the most of their training.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Attend training on the specific topics necessary for each individual management team.
Each workshop consists of four days, one 3-hour training session per day. One module is delivered per day, selecting from the following pool of topics:
Master Time
Accountability
Your Role in the Organization
Your Role in Decision Making
Manage Conflict Constructively
Effective Communication
Performance Management
Coaching & Feedback
Managers learn about best practices, practice their application, and formulate individual skill development plans.
1.1 Training on one topic per day, for four days (selected from a pool of eight possible topics)
Completed workbook and action plan
![]() |
Ninety-eight percent of managers say they need more training, but 93% of managers already receive some level of manager training. Unfortunately, the training typically provided, although copious, is not working. More of the same will never get you better outcomes. How many times have you sat through training that was so long, you had no hope of implementing half of it? How many times have you been taught best practices, with zero guidance on how to apply them? To truly support our managers, we need to rethink manager training. Move from fulfilling an HR mandate to providing truly trainee-centric instruction. Teach only the right skills – no fluff – and encourage and enable their application in the day to day. |
Jane Kouptsova |
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
IT departments often promote staff based on technical skill, resulting in new managers feeling unprepared for their new responsibilities in leading people. The success of your organization hinges on managers’ ability to lead their staff; by failing to equip new managers adequately, you are risking the productivity of your entire department. |
Despite the fact that $14 billion is spent annually on leadership training in the US alone (Freedman, 2016), only one in ten CIOs believe their department is very effective at leadership, culture, and values (Info-Tech, 2019). Training programs do not deliver results due to trainee overwhelm, ineffective skill development, and a lack of business alignment. |
Use Info-Tech’s tactical, practical approach to management training to deliver training that:
|
Info-Tech Insight
When it comes to manager training, more is not more. Attending training is not equal to being trained. Even good information is useless when it doesn’t get applied. If your role hasn’t required you to use your training within 48 hours, you were not trained on the most relevant skills.
![]() |
Engaged teams are:
Engaged teams are driven by managers:
|
87% of middle managers wish they had more training when they were first promoted
98% of managers say they need more training
IT must take notice:
IT as an industry tends to promote staff on the basis of technical skill. As a result, new managers find themselves suddenly out of their comfort zone, tasked with leading teams using management skills they have not been trained in and, more often than not, having to learn on the job. This is further complicated because many new IT managers must go from a position of team member to leader, which can be a very complex transition.
99% of companies offer management training* 93% of managers attend it* $14 billion spent annually in the US on leadership training** |
Fewer than one in ten CIOs believe their IT department is highly effective at leadership, culture, and values.
|
1. Information Overload
Seventy-five percent of managers report that their training was too long to remember or to apply in their day to day (Grovo, 2016). Trying to cover too much useful information results in overwhelm and does not deliver on key training objectives.
2. Limited Implementation
Thirty-three percent of managers find that their training had insufficient follow-up to help them apply it on the job (Grovo, 2016). Learning is only the beginning. The real results are obtained when learning is followed by practice, which turns new knowledge into reliable habits.
3. Lack of departmental alignment
Implementing training without a clear link to departmental and organizational objectives leaves you unable to clearly communicate its value, undermines your ability to secure buy-in from attendees and executives, and leaves you unable to verify that the training is actually improving departmental effectiveness.
MOVE FROM |
TO |
|---|---|
1. Information Overload |
Timely, tailored topics The more training managers attend, the less likely they are to apply any particular element of it. Combat trainee overwhelm by offering highly tactical, practical training that presents only the essential skills needed at the managers’ current stage of development. |
2. Limited Implementation |
Skills-focused framework Many training programs end when the last manager walks out of the last training session. Ensure managers apply their new knowledge in the months and years after the training by relying on a research-based framework that supports long-term skill building. |
3. Lack of Departmental Alignment |
Outcome-based measurement Setting organizational goals and accompanying metrics ahead of time enables you to communicate the value of the training to attendees and stakeholders, track whether the training is delivering a return on your investment, and course correct if necessary. |
Manager training is only useful if the skills it builds are implemented in the day-to-day. Research supports three drivers of successful skill building from training: |
Habits |
|---|---|
Organizational Support |
The training modules include committing to implementing new skills on the job and scheduling opportunities for feedback. |
Learning Structure |
Training activities are customizable, flexible, and accompanied by continuous learning self-evaluation. |
Personal Commitment |
Info-Tech’s methodology builds in activities that foster accountability and an attitude of continuous improvement. |
Learning |
Info-Tech Insight
When it comes to manager training, stop thinking about learning, and start thinking about practice. In difficult situations, we fall back on habits, not theoretical knowledge. If a manager is only as good as their habits, we need to support them in translating knowledge into practice.
Set up your first-time managers for success by leveraging Info-Tech’s training to focus on three key areas of management:
Each of these areas:
Info-Tech Insight
There is no such thing as “effective management training.” Various topics will be effective at different times for different roles. Delivering only the highest-impact learning at strategic points in your leadership development program will ensure the learning is retained and translates to results.
Each topic corresponds to a module, which can be used individually or as a series in any order.
Choose topics that resonate with your managers and relate directly to their day-to-day tasks. Training on topics that may be useful in the future, while interesting, is less likely to generate lasting skill development.
Info-Tech Best Practice
This blueprint is not a replacement for formal leadership or management certification. It is designed as a practical, tactical, and foundational introduction to key management capabilities.
Practical facilitation guides equip you with the information, activities, and speaker’s notes necessary to deliver focused, tactical training to your management team. |
The participant’s workbook guides trainees through applying the three drivers of skill building to solidify their training into habits. |
Linking manager training with measurable outcomes allows you to verify that the program is achieving the intended benefits, course correct as needed, and secure buy-in from stakeholders and participants by articulating and documenting value.
Use the metrics suggested below to monitor your training program’s effectiveness at three key stages:
Program Metric |
Calculation |
|---|---|
Program enrolment and attendance |
Attendance at each session / Total number enrolled in session |
First-time manager (FTM) turnover rate |
Turnover rate: Number of FTM departures / Total number of FTMs |
FTM turnover cost |
Number of departing FTMs this year * Cost of replacing an employee |
Manager Effectiveness Metric |
Calculation |
Engagement scores of FTM's direct reports |
Use Info-Tech's Employee Engagement surveys to monitor scores |
Departures as a result of poor management |
Number of times "manager relationships" is selected as a reason for leaving on an exit survey / Total number of departures |
Cost of departures due to poor management |
Number of times "manager relationships" is selected as a reason for leaving on an exit survey * Cost associated with replacing an employee |
Organizational Outcome Metric |
Calculation |
On-target delivery |
% projects completed on-target = (Projects successfully completed on time and on budget / Total number of projects started) * 100 |
Business stakeholder satisfaction with IT |
Use Info-Tech’s business satisfaction surveys to monitor scores |
High-performer turnover rate |
Number of permanent, high-performing employee departures / Average number of permanent, high-performing employees |
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
|---|---|---|---|
| “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” | “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” | “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” | “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.” |
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #2: Review selected modules and discuss training delivery. |
Call #3: Review training delivery, discuss lessons learned. Review long-term skill development plan. |
A Guided Implementation (GI) is a series
of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 1 to 3 calls over the course of several months, depending on training schedule.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | |
|---|---|---|---|---|
3-Hour Training Session |
3-Hour Training Session |
3-Hour Training Session |
3-Hour Training Session |
|
| Activities | Training on topic 1 (selected from a pool of 8 possible topics) |
Training on topic 2 (selected from a pool of 8 possible topics) |
Training on topic 3 (selected from a pool of 8 possible topics) |
Training on topic 4 (selected from a pool of 8 possible topics) |
| Deliverables | Completed workbook and action plan |
Completed workbook and action plan |
Completed workbook and action plan |
Completed workbook and action plan |
Pool of topics:
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
|
|
Outcomes of this phase:
1-3 hours
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Effective communication can make or break your IT team’s effectiveness and engagement and a manager’s reputation in the organization. Effective stakeholder management and communication has a myriad of benefits – yet this is a key area where IT leaders continue to struggle.
There are multiple ways in which you communicate with your staff. The tactics you will learn in this section will help you to:
Benefits:
35% Of organizations say they have lost an employee due to poor internal communication (project.co, 2021).
59% Of business leaders lose work time to mistakes caused by poor communication (Grammarly, 2022).
$1.2 trillion Lost to US organizations as a result of poor communication (Grammarly, 2022).
Operations |
Human Resources |
Finance |
Marketing |
|---|---|---|---|
Increases production by boosting revenue. |
Reduces the cost of litigation and increases revenue through productivity improvements. |
Reduces the cost of failing to comply with regulations. |
Increases attraction and retention of key talent. |
Learning outcomes:
Main goal: Become a better communicator across a variety of personal styles and work contexts.
Key objectives:
Info-Tech Insight
First-time IT managers face specific communication challenges that come with managing people for the first time: learning to communicate a greater variety of information to different kinds of people, in a variety of venues. Tailored training in these areas helps managers focus and fast-track critical skill development.
Meaningful performance measures help employees understand the rationale behind business decisions, help managers guide their staff, and clarify expectations for employees. These factors are all strong predictors of team engagement:

Talent Management Outcomes |
Organizational Outcomes |
|---|---|
Performance measure are key throughout the talent management process. Candidates:
Employees:
Promotions and Evaluations:
|
Performance measures benefit the organization by:
|
Learning outcomes:
Main goal: Become proficient in setting, tracking, and communicating around performance management goals.
Key objectives:
Info-Tech Insight
Goal and metric development holds special significance for first-time IT managers because it now impacts not only their personal performance, but that of their employees and their team collectively. Training on these topics with a practical team- and employee-development approach is a focused way to build these skills.
COACHING is a conversation in which a manager asks an employee questions to guide them to solve problems themselves, instead of just telling them the answer. |
||
Coaching increases employee happiness, and decreases turnover.1 |
Coaching promotes innovation.2 |
Coaching increases employee engagement, effort and performance.3 |
FEEDBACK is information about the past, given in the present, with the goal of influencing behavior or performance for the future. It includes information given for reinforcement and redirection. |
||
Honest feedback enhances team psychological safety.4 |
Feedback increases employee engagement.5 |
Feedback boosts feelings of autonomy and drives innovation.6 |
Learning outcomes:
Main goal: Get prepared to coach and offer feedback to your staff as appropriate.
Key objectives:
Info-Tech Insight
First-time managers often shy away from giving coaching and feedback, stalling their team’s performance. A focused and practical approach to building these skills equips new managers with the tools and confidence to tackle these challenges as soon as they arise.
Managers who don’t understand the business cannot effect positive change. The greater understanding that IT managers have of business context, the more value they provide to the organization as seen by the positive relationship between IT’s understanding of business needs and the business’ perception of IT value.

To understand your role in the business, you need to know who your stakeholders are and what value you and your team provide to the organization. Knowing how you help each stakeholder meet their wants needs and goals means that you have the know-how to balance experience and outcome-based behaviors. This is the key to being an attentive leader.
The tactics you will learn in this section will help you to:
Benefits:
Learning outcomes:
Main goal: Understand how your role and the role of your team serves the business.
Key objectives:
Info-Tech Insight
Before training first-time IT managers, take some time as the facilitator to review how you will serve the wants and needs of those you are training and your stakeholders in the organization.
To understand your role in the decision-making process, you need to know what is expected of you and you must understand what goes into making a good decision. The majority of managers report they have no trouble making decisions and that they are good decision makers, but the statistics say otherwise. This ease at decision making is due to being overly confident in their expertise and an inability to recognize their own ignorance.1
The tactics you will learn in this section will help you to:
20% Of respondents say their organizations excel at decision making (McKinsey, 2018).
87% “Diverse teams are 87% better at making decisions” (Upskillist, 2022).
86% of employees in leadership positions blame the lack of collaboration as the top reason for workplace failures (Upskillist, 2022).
Managers tend to rely on their own intuition which is often colored by heuristics and biases. By using a formal decision-making process, these pitfalls of intuition can be mitigated or avoided. This leads to better decisions.
First-time managers are able to apply this framework when making decision recommendations to management to increase their likelihood of success, and having a process will improve their decisions throughout their career and the financial returns correlated with them.
Employees are able to recognize bias in the workplace, even when management can’t. This affects everything from how involved they are in the decision-making process to their level of effort and productivity in implementing decisions. Without employee support, even good decisions are less likely to have positive results. Employees who perceive bias:
Innovation |
|
|---|---|
Brand Reputation |
|
Engagement |
|
Learning outcomes:
Main goal: Understand how to successfully perform your role in the decision process.
Key objectives:
Info-Tech Insight
Before training a decision-making framework, ensure it is in alignment with how decisions are made in your organization. Alternatively, make sure leadership is on board with making a change.
If you are successful in your talent acquisition, you likely have a variety of personalities and diverse individuals within your IT organization and in the business, which means that conflict is inevitable. However, conflict does not have to be negative – it can take on many forms. The presence of conflict in an organization can actually be a very positive thing: the ability to freely express opinions and openly debate can lead to better, more strategic decisions being made.
The effect that the conflict is having on individuals and the work environment will determine whether the conflict is positive or counterproductive.
As a new manager you need to know how to manage potential negative outcomes of conflict by managing difficult conversations and understanding how to respond to conflict in the workplace.
The tactics you will learn in this section will help you to:
Benefits:
When you face a difficult conversation you…
40% Of employees who experience conflict report being less motivated as a result (Acas, 2021).
30.6% Of employees report coming off as aggressive when trying to resolve a conflict
(Niagara Institute, 2022).
Learning outcomes:
Main goal: Effectively manage your time and know which tasks are your priority and which tasks to delegate.
Key objectives:
Info-Tech Insight
Conflict does not have to be negative. The presence of conflict in an organization can actually be a very positive thing: the ability to freely express opinions and openly debate can lead to better, more strategic decisions being made.
How effective leaders average their time spent across the six key roles: | Leaders with effective time management skills spend their time across six key manager roles: strategy, projects, management, operations, innovation, and personal. While there is no magic formula, providing more value to the business starts with little practices like:
|
Strategy 23% | |
Projects 23% | |
Management 19% | |
Operations 19% | |
Innovation 13% | |
Personal 4% |
Too many interruptions in a day to stay focused. |
Too busy to focus on strategic initiatives. |
Spending time on the wrong things. |

Learning outcomes:
Main goal: Become a better communicator across a variety of personal styles and work contexts.
Key objectives:
Info-Tech Insight
There is a right and wrong way to manage your calendar as a first-time manager and it has nothing to do with your personal preference.
Improves culture and innovation |
Improves individual performance |
Increases employee engagement |
Increases profitability |
|---|---|---|---|
Increases trust and productivity |
Enables employees to see how they contribute |
Increases ownership employees feel over their work and outcomes |
Enables employees to focus on activities that drive the business forward |
Employee empowerment is the number one driver of employee engagement. The extent to which you can hold employees accountable for their own actions and decisions is closely related to how empowered they are and how empowered they feel; accountability and empowerment go hand in hand. To feel empowered, employees must understand what is expected of them, have input into decisions that affect their work, and have the tools they need to demonstrate their talents.

Learning outcomes:
Main goal: Create a personal accountability plan and learn how to hold yourself and your team accountable.
Key objectives:
Info-Tech Insight
Accountability is about focusing on the results of a task, rather than just completing the task. Create team accountability by keeping the team focused on the result and not “doing their jobs.” First-time managers need to clearly communicate expectations and evaluation to successfully develop team accountability.
A key feature of this blueprint is built-in guidance on transferring your managers’ new knowledge into practical skills and habits they can fall back on when their job requires it.
The Participant Workbooks, one for each module, are structured around the three key principles of learning transfer to help participants optimally structure their own learning:

Info-Tech Insight
Participants should use this workbook throughout their training and continue to review it for at least three months after. Practical skills take an extended amount of time to solidify, and using the workbook for several months will ensure that participants stay on track with regular practice and check-ins.
Cultural alignment |
It is critical that the department leadership team understand and agree with the best practices being presented. Senior team leads should be comfortable coaching first-time managers in implementing the skills developed through the training. If there is any question about alignment with departmental culture or if senior team leads would benefit from a refresher course, conduct a training session for them as well. |
|---|---|
Structured training |
Ensure the facilitator takes a structured approach to the training. It is important to complete all the activities and record the outputs in the workbook where appropriate. The activities are structured to ensure participants successfully use the knowledge gained during the workshop to build practical skills. |
Attendees |
Who should attend the training? Although this training is designed for first-time IT managers, you may find it helpful to run the training for the entire management team as a refresher and to get everyone on the same page about best practices. It is also helpful for senior leadership to be aware of the training because the attendees may come to their supervisors with requests to discuss the material or coaching around it. |
Info-Tech Insight
Participants should use this workbook throughout their training and continue to review it for at least three months after. Practical skills take an extended amount of time to solidify, and using the workbook for several months will ensure that participants stay on track with regular practice and check-ins.
1-3 hours
Prior to facilitating your first session, ensure you complete the following steps:
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
1-3 hours
Complete these steps in preparation for delivering the training to your first-time managers:
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
|
|
Outcomes of this phase:
3 hours
When you are ready, deliver the training. Ensure you complete all activities and that participants record the outcomes in their workbooks.
Tips for activity facilitation:
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
|
|
Outcomes of this phase:
0.5 hours
After the training, send an email to attendees thanking them for participating and summarizing key next steps for the group. Use the template below, or write your own:
“Hi team,
I want to thank you personally for attending the Communicate Effectively training module. Our group led some great discussion.
A reminder that the next time you will reconvene as a group will be on [Date] to discuss your progress and challenges to date.
Additionally, your manager is aware and supportive of the training program, so be sure to follow through on the commitments you’ve made to secure the support you need from them to build your new skills.
I am always open for questions if you run into any challenges.
Regards,
[Your name]”
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
0.5 hours
An important part of the training is securing organizational support, which includes support from your trainees’ supervisors. After the trainees have committed to some action items to seek support from their supervisors, it is important to express your support for this and remind the supervisors of their role in guiding your first-time managers. Use the template below, or write your own, to remind your trainees’ supervisors of this at the end of training (if you are going through all three modules in a short period of time, you may want to wait until the end of the entire training to send this email):
“Hi team,
We have just completed Info-Tech’s first-time manager training with our new manager team. The trainees will be seeking your support in developing their new skills. This could be in the form of coaching, feedback on their progress, reviewing their development plan, etc.
Supervisor support is a crucial component of skill building, so I hope I can count on all of you to support our new managers in their learning. If you are not sure how to handle these requests, or would like a refresher of the material our trainees covered, please let me know.
I am always open for questions if you run into any challenges.
Regards,
[Your name]”
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
![]() |
Brad Armstrong, Senior Engineering Manager, Code42 Software I am a pragmatic engineering leader with a deep technical background, now focused on building great teams. I'm energized by difficult, high-impact problems at scale and with the cloud technologies and emerging architectures that we can use to solve them. But it's the power of people and organizations that ultimately lead to our success, and the complex challenge of bringing all that together is the work I find most rewarding. |
|---|---|
We thank the expert contributors who chose to keep their contributions anonymous. |
360Solutions, LLC. “The High Cost of Poor Communication: How to Improve Productivity and Empower Employees Through Effective Communication.” 360Solutions, 2009. Web.
Ali, M., B. Raza, W. Ali, and N. Imtaiz. Linking Managerial Coaching with Employees’ Innovative Work Behaviors through Affective Supervisory Commitment: Evidence from Pakistan. International Review of Management and Marketing, vol. 10, no. 4, 2020, pp. 11-16.
Allen, Frederick E. “The Terrible Management Technique That Cost Microsoft Its Creativity.” Forbes.com, 3 July 2012. Web.
Allen, Renee. “Generational Differences Chart.” West Midland Family Center, n.d. Web.
American Management Association. “Leading the Four Generations at Work.” American Management Association, Sept. 2014. Web.
Aminov, Iskandar, Aaron De Smet, Gregor Jost, and David Mendelsohn. “Decision making in the age of urgency.” McKinsey & Company, 30 April 2019. Web.
AON Hewitt. “Aon Hewitt Study Reveals Strong Link Between Employee Engagement and Employee Perceptions of Total Rewards. Honest Leader Communication Also Influences Engagement.” PR Newswire, 8 April 2015. Web.
Armstrong, Brad. “How to Fail as a New Engineering Manager.” Noteworthy - The Journal Blog, 19 Feb. 2018. Web.
Asmus, Mary Jo. “Coaching vs. Feedback.” Aspire-CS, 9 Dec. 2009. Web.
Baldwin, Timothy T., et al. “The State of Transfer of Training Research: Moving Toward More Consumer-Centric Inquiry.” Human Resource Development Quarterly, vol. 28, no. 1, March 2017, pp. 17-28. Crossref, doi:10.1002/hrdq.21278.
Batista, Ed. “Building a Feedback-Rich Culture from the Middle.” Ed Batista, April 2015. Web.
Bilalic, Merim, Peter McLeod, and Fernand Gobet. Specialization Effect and Its Influence on Memory and Problem Solving in Expert Chess Players. Wiley Online Journal, 23 July 2009, doi: https://doi.org/10.1111/j.1551-6709.2009.01030.x
Blume, Brian D., et al. “Transfer of Training: A Meta-Analytic Review.” Journal of Management, vol. 36, no. 4, July 2010, pp. 1065-105. Crossref, doi:10.1177/0149206309352880.
BOH Training Guide. Wild Wing, Jan. 2017. Web.
Bosler, Shana. “9 Strategies to Create Psychological Safety at Work.” Quantum Workplace, 3 June 2021. Web.
Building Communication Skills. ACQUIRE Project/EngenderHealth, n.d. Web.
Bucaro, Frank C. “The real issue in conflict is never about things…” Frank Bucaro blog, 7 March 2014. Web.
Burke, Lisa A., and Holly M. Hutchins. “Training Transfer: An Integrative Literature Review.” Human Resource Development Review, vol. 6, no. 3, Sept. 2007, pp. 263-96. Crossref, doi:10.1177/1534484307303035.
Caprino, Kathy. “Separating Performance Management from Compensation: New Trend for Thriving Organizations.” Forbes, 13 Dec. 2016. Web.
Caprino, Kathy. “Why the Annual Review Process Damages Employee Engagement.” Forbes, 1 March 2016. Web.
Carpineanu, Silvana. “7 Mistakes You Might Be Making When Writing A Meeting Agenda.” Time Doctor, 12 January 2021. Web.
Cecchi-Dimeglio, Paola. “How Gender Bias Corrupts Performance Reviews, and What to Do About It.” Harvard Business Review, 12 April 2017. Web.
Chartered Institute of Personnel and Development (CIPD). “PESTLE Analysis.” Chartered Institute of Personnel and Development, 2010. Web.
Chiaburu, Dan S., et al. “Social Support in the Workplace and Training Transfer: A Longitudinal Analysis: Social Support and Training Transfer.” International Journal of Selection and Assessment, vol. 18, no. 2, June 2010, pp. 187-200. Crossref, doi:10.1111/j.1468-2389.2010.00500.x.
Christensen, Ulrik Juul. “How to Teach Employees Skills They Don’t Know They Lack.” Harvard Business Review, 29 Sept. 2017. Web.
CIPD. “Rapid evidence assessment of the research literature on the effect of goal setting on workplace performance.” Charted Institute of Personnel and Development, Dec. 2016. Web.
CIPD. Annual Survey Report: Learning & Development 2015. Charted Institute of Personnel and Development, 2015. Web.
Communication and Organizational Skills: NPHW Training Manual. Population Health Research Institute (PHRI), 17 Sept. 2015. Web.
Cookson, Phil. “It’s time to see performance management as a benefit, not a burden.” CIPD. 17 March 2017. Web.
Communication Statistics 2021. Project.co, 2021. Web.
Connors, Roger. “Why Accountability?” The Oz Principle, Partners In Leadership, 2014.
Coutifaris, Constantinos G. V., and Adam M. Grant “Taking Your Team Behind the Curtain: The Effects of Leader Feedback-Sharing and Feedback-Seeking on Team Psychological Safety.” Organization Science, vol. 33,
no. 4, 2021, pp. 1574-1598. https://doi.org/10.1287/orsc.2021.1498
Coy, Charles. “Peer Feedback: 6 Tips for Successful Crowdsourcing.” Rework, 25 June 2014. Web.
“CQ Learn What Really Matters.” CQ Evidence-Based Management Learning Platform, n.d. Web.
Darwant, Sarah. Coaching Training Course Book. Elite Training, 2012. Web.
De Smet, Aaron, et al. How Companies Manage the Front Line Today: McKinsey Survey Results. McKinsey, Feb. 2010. Web.
DeNault, Charles. “Employee Coaching Survey Results: Important and Engaging.” Saba, 22 April 2015. Web.
Dermol, Valerij, and Tomaž Čater. “The Influence of Training and Training Transfer Factors on Organisational Learning and Performance.” Personnel Review, vol. 42, no. 3, April 2013, pp. 324–48. Crossref, doi:10.1108/00483481311320435.
dgdotto. “Fail to Plan, Plan to Fail.” visual.ly, 30 April 2013. Web.
Duggan, Kris. “Why the Annual Performance Review is Going Extinct.” Fast Company, 20 Oct. 2015. Web.
Duhigg, Charles. “What Google Learned From Its Quest to Build the Perfect Team.” The New York Times, 25 Feb. 2016. Web.
Earley, P. Christopher, and Randall S. Peterson. “The Elusive Cultural Chameleon: Cultural Intelligence as a New Approach to Intercultural Training for the Global Manager.” Academy of Management Learning & Education, vol. 3, no. 1, March 2004, pp. 100-15. Crossref, doi:10.5465/amle.2004.12436826.
Edmondson, Amy. “Psychological Safety and Learning Behavior in Work Teams.” Administrative Science Quarterly, vol. 44, no. 2, June 1999, pp. 350-383. Web.
“Effective Employee Communications Fosters Corporate Reputation.” The Harris Poll, 10 June 2015. Web.
Eichenwald, Kurt. “How Microsoft Lost its Mojo: Steve Ballmer and Corporate American’s Most Spectacular Decline.” Vanity Fair, 24 July 2012. Web.
Essential Supervisory Skills. University of Washington, 2016. Web.
“Estimating the Costs of Workplace Conflict.” Acas, 11 May 2021. Web.
Falcone, Paul. “Viewpoint: How to Redesign Your Performance Appraisal Template.” Society for Human Resource Management, 7 June 2017. Web.
Fermin, Jeff. “Statistics On The Importance Of Employee Feedback.” Officevibe, 7 Oct. 2014. Web.
Filipkowski, Jenna, et al. Building a Coaching Culture with Millennial Leaders. Human Capital Institute, 18 Sept. 2017. Web.
First Time Manager Training to Help New Managers Develop Essential Skills. The Ken Blanchard Companies, n.d. Web.
Fisher, Dan. Feedback vs. Coaching, What’s the Difference? Menemsha Group, 28 June 2018. Web.
Freedman, Erica. “How to Build an Internal Leadership Development Program.” Chief Executive, 2016. Web.
"Futureproof Your Organization with These 8 Manager Effectiveness Metrics.” Visier Inc., 8 Aug. 2017. Web.
Gallo, Amy. “How to Manage Your Former Peers.” Harvard Business Review, Dec. 2012. Web.
Gandhi, Vipula. “Want to Improve Productivity? Hire Better Managers.” Gallup, 3 Aug. 2018. Web.
Gallup. State of the Global Workplace. 1st edition, Gallup Press, 2017. Web.
Global Workplace Analytics. “Latest Telecommuting Statistics.” Global Workplace Analytics. Sept. 2013. Web.
Goldsmith, Marshall. “Try Feedforward Instead of Feedback.” Leader to Leader Institute, 5 April 2011. Web.
Goldsmith, Marshall. "11 Guidelines for Influencing Top Decision Makers." Marshall Goldsmith, n.d. Web.
Goldsmith, Marshall. "I Know Less Than You Do – and It’s Okay!" Marshall Goldsmith, n.d. Web.
Goldsmith, Marshall. "Is It Worth It to Add Value? Not Always." Marshall Goldsmith, n.d. Web.
Goler, L., J. Gale, and A. Grant. “Let’s Not Kill Performance Evaluations Yet.” Harvard Business Review, Nov. 2016. Web.
Good Manager, Bad Manager. Grovo, 2016. Web.
Google People Operations. “Guide: Understand Team Effectiveness.” Google, n.d. Web.
Google’s New Manager Student Workbook. re:Work with Google, n.d. Web.
Google’s New Manager Training Facilitator Guide. re:Work with Google, n.d. Web.
Gossen, Paul. A Coaching Culture Transformation ~ Case Study. Athena Training and Consulting, 1 April 2011. Web.
Goudreau, Jenna. “How to Communicate in the New Multi-Generational Office.” Forbes Magazine, Feb. 2013. Web.
Govaerts, Natalie, and Filip Dochy. “Disentangling the Role of the Supervisor in Transfer of Training.” Educational Research Review, vol. 12, June 2014, pp. 77-93. Crossref, doi:10.1016/j.edurev.2014.05.002.
Grenchus, Gabrielle. “Keep employees engaged with clear priorities and crowdsourced recognition.” IBM thinkLeaders. 8 June 2015. Web.
Grossman, Rebecca, and Eduardo Salas. “The Transfer of Training: What Really Matters: The Transfer of Training.” International Journal of Training and Development, vol. 15, no. 2, June 2011, pp. 103-20. Crossref, doi:10.1111/j.1468-2419.2011.00373.x.
Grote, Dick. “3 Popular Goal-Setting Techniques Managers Should Avoid.” Harvard Business Review. 2 Jan. 2017. Web.
Hall, John. “Why Accountability Is Vital To Your Company.” Forbes, 6 Oct. 2019. Web.
Hancock, Bryan, et al. “The Fairness Factor in Performance Management.” McKinsey, 5 April 2018. Web.
Harkins, Phil. “10 Leadership Techniques for Building High-Performing Teams.” Linkage Inc., 2014. Web.
HCI. Building a Coaching Culture with Managers and Leaders. Human Capital Institute, 2016. Web.
Heathfield, Susan M. “Tips to Create Successful Performance Appraisal Goals.” The Balance, Aug. 2016. Web.
Hills, Jan. Brain-Savvy Business: 8 Principles From Neuroscience and How to Apply Them. Head Heart + Brain, 2016. Print.
Hoffman, Mitchell, and Steven Tadelis. People Management Skills, Employee Attrition, and Manager Rewards: An Empirical Analysis. p. 96.
“How to Create an Effective Feedback Culture.” eXplorance Inc. Feb. 2013. Web.
“Importance of Performance Management Process & Best Practices To Optimize Monitoring Performance Work Reviews/Feedback and Goal Management.” SAP Success Factors, n.d. Web.
Jacobson, Darcy. “How Bad Performance Management Killed Microsoft’s Edge.” Globoforce Blog, 5 July 2012. Web.
Jaidev, Uma Pricilda, and Susan Chirayath. Pre-Training, During-Training and Post-Training Activities as Predictors of Transfer of Training. no. 4, 2012, p. 18.
Jensen, Michael C. “Paying People to Lie: The Truth about the Budgeting Process.” European Financial Management, vol. 9, no. 3, 2003, pp. 379-406. Print.
Kahneman, Daniel, and Ram Charan. HBR's 10 Must Reads on Making Smart Decisions. Harvard Business Review, 26 March 2013. Ebook.
Kirkpatrick, J., and W. Kirkpatrick. “The Kirkpatrick Four Levels: A Fresh Look After 50 Years 1959-2009.” Kirkpatrickpartners.com, 2009. Web.
Kirwan, Cyril. Improving Learning Transfer. Routledge, 2016.
Kline, Theresa J.B., and Lorne M. Sulsky. “Measurement and Assessment Issues in Performance Appraisal.” Canadian Psychology, vol. 50, no. 3, 2009, pp. 161-171. Proquest. Web.
Kowalski, Kyle. “Create a Daily Routine with Calendar Time Blocking (+ 7 Pro Tips).” Sloww, 29 May 2018. Web.
Krentz, Susanna E., et al. ”Staying on Course with Strategic Metrics.” Healthcare Financial Management, vol. 60, no. 5, 2006, pp. 86-94. Proquest. Web.
Kuligowski, Kiely. Tips for First-Time Managers. 15 Feb. 2019. Web.
Laker, Dennis R., and Jimmy L. Powell. “The Differences between Hard and Soft Skills and Their Relative Impact on Training Transfer.” Human Resource Development Quarterly, vol. 22, no. 1, March 2011, pp. 111-22. Crossref, doi:10.1002/hrdq.20063.
Lawrence, Paul. “Managerial coaching – A literature review.” International Journal of Evidence Based Coaching and Mentoring, vol. 15, no. 2, 2017, pp. 43-66. Web.
Ledford, Gerald E. Jr., George Benson, and Edward E. Lawler III. “Cutting-Edge Performance Management.” WorldatWork Research, Aug. 2016. Web.
Lee, W.R.; Choi, S.B.; Kang, S.-W. How Leaders’ Positive Feedback Influences Employees’ Innovative Behavior: The Mediating Role of Voice Behavior and Job Autonomy. Sustainability, vol. 13, no. 4, 2021, pp. 1901. https://doi.org/10.3390/su13041901
Leopold, Till Alexander, Vesselina Ratcheva, and Saadia Zahidi. The Future of Jobs. World Economic Forum, 2016. Web.
Levy, Dan. “How to Build a Culture That Embraces Feedback.” Inc. Magazine, March 2014. Web.
Lighthouse Research & Advisory. “Insights from the CHRO Panel at Workhuman 2017.” Lighthouse Research & Advisory, June 2017. Web.
Lipman, Victor. “For New Managers, Boundaries Matter (A Lot).” Forbes, 19 March 2018. Web.
Lipman, Victor. “The Hardest Thing For New Managers.” Forbes, 1 June 2016. Web.
Lipman, Victor. “The Move To New Manager May Be The Hardest Transition In Business.” Forbes, 2 Jan. 2018. Web.
Lyons, Rich. “Feedback: You Need To Lead It.” Forbes, 10 July 2017. Web.
“Managing Email Effectively.” MindTools, n.d. Web.
Managing Performance Workbook. Trainer Bubble, 16 Feb. 2013. Web.
Mayfield, Clifton, et al. “Psychological Collectivism and Team Effectiveness: Moderating Effects of Trust and Psychological Safety.” Journal of Organizational Culture, Communications and Conflict, vol. 20, no. 1, Jan. 2016, pp. 78-94. Web.
McAlpin, Kevin and Hans Vaagenes. “Critical Decision Making.” Performance Coaching International. 17 Nov. 2017. Web.
McCoy, Jim. “How to Align Employee Performance with Business Strategy.” Workforce Management, vol. 86, no. 12, 2007, pp. S5. Proquest. Web.
“Measuring Time-To-Full Productivity.” FeverBee, n.d. Web.
Meister, Jeanne. The 2020 Workplace: How Innovative Companies Attract, Develop, and Keep Tomorrow's Employees Today. HarperBusiness, 2010. Print.
Meyer, Erin. “The Four Keys To Success With Virtual Teams.” Forbes Magazine, 19 Aug. 2010. Web.
Morris, Donna. “Death to the Performance Review: How Adobe Reinvented Performance Management and Transformed Its Business.” WorldatWork, 2016, p. 10. Web.
Myers-Briggs Company. “New Research: Time Spent on Workplace Conflict Has Doubled Since 2008.” Yahoo! Finance, 18 Oct. 2022. Web.
Murdoch, Elisabeth. “Elisabeth Murdoch's MacTaggart lecture: full text.” The Guardian, 23 Aug. 2012. Web.
NASA Governance and Strategic Management Handbook (NPD 1000.0B). NASA, June 2014. Web.
NASA Space Flight Program and Project Management Handbook (NASA/SP-2014-3705). NASA, Sept. 2014. Web.
New Manager Training: Management & Leadership Skills. Schulich School of Business, n.d. Web.
O’Hanlon, Margaret. “It’s a Scandal! Manager Training Exposed! [Implementation Part 4].” Compensation Cafe, 16 Feb. 2012. Web.
Ordonez, Lisa D., et al. “Goals Gone Wild: The Systematic Side Effects of Over-Prescribing Goal Setting.” Social Science Research Network. Harvard Business School, 11 Feb. 2009. Web.
Paczka, Nina. “Meeting in the Workplace | 2023 Statistics.” LiveCareer, 25 July 2022. Web.
Pavlou, Christina. “How to Calculate Employee Turnover Rate | Workable.” Recruiting Resources: How to Recruit and Hire Better, 13 July 2016. Web.
Performance Management 101 Workbook. Halogen Software, 2015. Web.
Personal Development and Review. Oxford Learning Institute, n.d. Web.
Personal Development Plan. MindTools, 2014. Web.
Porath, Christine, et al. “The Effects of Civility on Advice, Leadership, and Performance.” Journal of Applied Psychology, vol. 44, no. 5, Sept. 2015, pp. 1527-1541. Web.
Project Management Institute. “PMI’s Pulse of The Profession: In-Depth Report.” PMI, May 2013. Web. June 2015.
Quay, C. C., and A. Yusof. “The influence of employee participation, rewards and recognition, job security, and performance feedback on employee engagement.” Issues and Perspectives in Business and Social Sciences, vol. 2, no. 1, 2022, pp. 20. https://doi.org/10.33093/ipbss.2022.2.1.3
Quinn, R. E., and J. Rohrbaugh. “A spatial model of effectiveness criteria: Towards a competing values approach to organizational analysis.” Management Science, vol. 29, 1983, pp. 363–377.
Re:Work Guide: Develop and Support Managers. re:Work with Google, n.d. Web.
Reardon, Kathleen Kelley. “7 Things to Say When a Conversation Turns Negative.” Harvard Business Review, 11 May 2016. Web.
Reh, F. John. “Here Is a List of Mistakes New Managers Make and How to Avoid Them.” The Balance Careers, 30 Dec. 2018. Web.
Richards, Leigh. “Why Is Employee Empowerment a Common Cornerstone of Organizational Development & Change Programs?” Houston Chronicle, Hearts Newspapers, LLC. 5 July 2013. Web.
Robson, Fiona. Southwood School – A Case Study: Performance Management Systems. Society for Human Resource Management, 2009. Crossref, doi:10.4135/9781473959552.
Rock, David, and Beth Jones. “Why More and More Companies are Ditching Performance Ratings.” Harvard Business Review, 8 Sept. 2015. Web.
Rock, David. “SCARF: A Brain-Based Model for Collaborating With and Influencing Others.” NeuroLeadership Journal, 2008. Web..
Romão, Soraia, Neuza Ribeiro, Daniel Roque Gomes, and Sharda Singh. “The Impact of Leaders’ Coaching Skills on Employees’ Happiness and Turnover Intention.” Administrative Sciences, vol. 12, no. 84, 2022. https://doi.org/10.3390/ admsci12030084
Romero, Joseluis. “Yes - you can build a feedback culture.” Skills 2 Lead, Aug. 2014. Web.
Runde, Craig E., and Tim A. Flanagan. “Conflict Competent Leadership.” Leader to Leader, Executive Forum, Winter 2008. PDF.
Saks, Alan M., and Lisa A. Burke-Smalley. “Is Transfer of Training Related to Firm Performance?: Transfer and Firm Performance.” International Journal of Training and Development, vol. 18, no. 2, June 2014, pp. 104–15. Crossref, doi:10.1111/ijtd.12029.
Saks, Alan M., et al. “The Transfer of Training: The Transfer of Training.” International Journal of Training and Development, vol. 18, no. 2, June 2014, pp. 81–83. Crossref, doi:10.1111/ijtd.12032.
Salomonsen, Summer. Grovo’s First-Time Manager Microlearning® Program Will Help Your New Managers Thrive in 2018. Grovo, 2018. Web.
Schwartz, Dan. “3 Topics Every New Manager Training Should Include.” Training Industry, 12 April 2017. Web.
Scott, Dow, Tom McMullen, and Mark Royal. “Retention of Key Talent and the Role of Rewards.” WorldatWork, June 2012. Web.
“Seeking Agility in Performance Management.” Human Resource Executive, 2016. Web.
“Should You Always Involve Your Team in Decision Making?” Upskillist, 25 April 2022. Web.
“SHRM Workplace Forecast.” The Top Workplace Trends According to HR Professionals, May 2013. Web.
Singhal, Nikhyl. “Eight Tips for First Time Managers.” Medium, 20 Aug. 2017. Web.
Singhania, Prakriti, et al. “2020 Global Marketing Trends.” Deloitte, 2019. Web.
SMART Goals: A How to Guide. University of California, n.d. Web.
Smith, Benson, and Tony Rutigliano. “Scrap Your Performance Appraisal System.” Gallup, 2002. Article.
“State of the Modern Meeting 2015.” BlueJeans, Aug. 2015. Web.
Sternberg, Larry, and Kim Turnage. “Why Make Managers A Strategic Priority?” Great Leadership, 12 Oct. 2017. Web.
Sullivan, Dr. John. “Facebook’s Difference: A Unique Approach For Managing Employees.”TLNT, Sept. 2013. Web.
Tal, David. “A 'Culture of Coaching' Is Your Company's Most Important Ingredient for Success.” Entrepreneur, 27 Sept. 2017. Web.
Tenut, Jeff. “How Management Development Training Reduces Turnover.” DiscoverLink, 3 July 2018. Web.
“The 5 Biggest Biases That Affect Decision-Making.” NeuroLeadership Institute, 2 August 2022. Web.
“The Different Impact of Good and Bad Leadership.” Barna Group, 2015. Web.
“The Engaged Workplace.” Gallup, 2017. Web.
“The Individual Development Plan Guide.” Wildland Fire Leadership Development Program, April 2010, p. 15.
The State of Business Communication. Grammarly, 2022. Web.
Thomas, Kenneth. “Conflict and Conflict Management.” The Handbook of Industrial and Organizational Psychology, Rand McNally, 1976. In “The Five Conflict-Handling Modes.” The Myers Briggs Company, n.d. PDF.
Thompson, Rachel. “What Is Stakeholder Management?” MindTools, n.d. Web.
Tollet, Francoise. “Distracted? Learn how to (re)focus.” Business Digest, 12 July 2021. Podcast.
Tonhauser, Cornelia, and Laura Buker. Determinants of Transfer of Training: A Comprehensive Literature Review, p. 40.
Towers Watson. “Clear Direction in a Complex World: How Top Companies Create Clarity, Confidence and Community to Build Sustainable Performance.” Change and Communication ROI Study Report, 2011-2012. Web.
Trudel, Natalie. “Improve Your Coaching Skills by Understanding the Psychology of Feedback.” TLNT, 12 July 2017. Web.
“Understanding When to Give Feedback.” Harvard Business Review, Dec. 2014. Web.
Vacassin, Daniel. “There are no 'good' performance management systems – there are just good line managers.” LinkedIn, 4 Oct. 2016. Web.
van der Locht, Martijn, et al. “Getting the Most of Management Training: The Role of Identical Elements for Training Transfer.” Personnel Review, vol. 42, no. 4, May 2013, pp. 422–39. Crossref, doi:10.1108/PR-05-2011-0072.
Vaughan, Liam. “Banks Find New Ways to Measure Staff.” Financial News, 10 Jan. 2011. Web.
Watkins, Michael, et al. “Hit the Ground Running:Transitioning to New Leadership Roles.” IMD Business School, May 2014. Web.
Whitney, Kelley. “Kimberly-Clark Corp.: Redesigning Performance Management.” Talent Management Magazine, vol. 2, no. 1, 2006. Web.
“Whole Foods 2015 Report.” The Predictive Index, n.d. Web.
“Whole Foods Market Reports Fourth Quarter and Fiscal Year 2016 Results.” Whole Foods, 2 Feb. 2016. Web.
Wisniewski, Dan. “Here's why everybody hates meetings.” HR Morning, 14 Dec. 2012. Web.
Woolum, Janet, and Brent Stockwell. Aligning Performance Measurement to Mission, Goals, and Strategy Workbook. Arizona State University, Jan. 2016. Web.
Worall, Les, et al. The Quality of Working Life. Chartered Management Institute, 2016. Web.
“Workplace Conflict Statistics: How We Approach Conflict at Work.” Niagara Institute, 11 Aug. 2022. Web.
“You Waste a Lot of Time at Work Infographic.” Atlassian, 23 August 2012. Web.
Zenger, Jack, and Joe Folkman. “Feedback: The Leadership Conundrum.” Talent Quarterly: The Feedback Issue, 2015. Web.
Zuberbühler, P., et al. “Development and validation of the coaching-based leadership scale and its relationship with psychological capital, work engagement, and performance.” Current Psychology, vol. 42, no. 10, 2021, pp. 1-22.
Asset Management, Configuration Management, Lifecycle Management
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess your current state, define your cost allocation model, and define roles and responsibilities.
Define dashboards and reports, and document account structure and tagging requirements.
Establish governance for tagging and cost control, define process for right-sizing, and define process for purchasing commitment discounts.
Document process interactions, establish program KPIs, and build implementation roadmap and communication plan.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish clear lines of accountability and document roles & responsibilities to effectively manage cloud costs.
Understanding of key areas to focus on to improve cloud cost management capabilities.
1.1 Assess current state
1.2 Determine cloud cost model
1.3 Define roles & responsibilities
Cloud cost management capability assessment
Cloud cost model
Roles & responsibilities
Establish visibility into cloud costs and drivers of those costs.
Better understanding of what is driving costs and how to keep them in check.
2.1 Develop architectural patterns
2.2 Define dashboards and reports
2.3 Define account structure
2.4 Document tagging requirements
Architectural patterns; service cost cheat sheet
Dashboards and reports
Account structure
Tagging scheme
Develop processes, procedures, and policies to control cloud costs.
Improved capability of reducing costs.
Documented processes & procedures for continuous improvement.
3.1 Establish governance for tagging
3.2 Establish governance for costs
3.3 Define right-sizing process
3.4 Define purchasing process
3.5 Define notification and alerts
Tagging policy
Cost control policy
Right-sizing process
Commitment purchasing process
Notifications and alerts
Document next steps to implement & improve cloud cost management program.
Concrete roadmap to stand up and/or improve the cloud cost management program.
4.1 Document process interaction changes
4.2 Define cloud cost program KPIs
4.3 Build implementation roadmap
4.4 Build communication plan
Changes to process interactions
Cloud cost program KPIs
Implementation roadmap
Communication plan
Corporate security management is a vital aspect in every modern business, regardless of business area or size. At Tymans Group we offer expert security management consulting to help your business set up proper protocols and security programs. More elaborate information about our security management consulting services and solutions can be found below.
You may be experiencing one or more of the following:
Insight
To have a successful information security strategy, take these three factors into account:
Impact and results of our corporate security management approach
Besides the small introduction, subscribers and consulting clients within the corporate security management domain have access to:
Get up to speed
Read up on why you should build your customized corporate information security governance and management system. Review our methodology and understand the four ways we can support you.
Align your security objectives with your business goals
Determine the company's risk tolerance.
Build a practical governance framework for your company
Our best-of-breed security framework makes you perform a gap analysis between where you are and where you want to be (your target state). Once you know that, you can define your goals and duties.
Now that you have built it, manage your governance framework.
There are several essential management activities that we as a security management consulting company suggest you employ.
We are happy to tell you more about our corporate security management solutions and help you set up fitting security objectives. As a security management consulting firm we offer solutions and advice, based on our own extensive experience, which are practical and people-orientated. Discover our services, which include data security management and incident management and book an online appointment with CEO Gert Taeymans to discuss any issues you may be facing regarding risk management or IT governance.
Innovation is about people, not ideas or processes. Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and taking smart risks are most likely to see the benefits of innovation.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard includes three phases and nine activities that will help you define your purpose, align your people, and build your practice.
Use this template in conjunction with the activities in the main storyboard to create and communicate your innovation program. This template uses sample data from a fictional retailer, Acme Corp, to illustrate an ideal innovation program summary.
This job description can be used to hire your Chief Innovation Officer. There are many other job descriptions available on the Info-Tech website and referenced within the storyboard.
Use this framework to facilitate an ideation session with members of the business. Instructions for how to customize the information and facilitate each section is included within the deck.
This spreadsheet provides an analytical and transparent method to prioritize initiatives based on weighted criteria relevant to your business.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define your innovation ambitions.
Gain a better understanding of why you are innovating and what your organization will gain from an innovation program.
1.1 Understand your innovation mandate.
1.2 Define your innovation ambitions.
1.3 Determine value proposition & metrics.
Complete the "Our purpose" section of the Innovation Program Template
Complete "Vision and guiding principles" section
Complete "Scope and value proposition" section
Success metrics
Build a culture, operating model, and team that support innovation.
Develop a plan to address culture gaps and identify and implement your operating model.
2.1 Foster a culture of innovation.
2.2 Define your operating model.
Complete "Building an innovative culture" section
Complete "Operating model" section
Create the capability to facilitate innovation.
Create a resourcing plan and prioritization templates to make your innovation program successful.
3.1 Build core innovation capabilities.
3.2 Develop prioritization criteria.
Team structure and resourcing requirements
Prioritization spreadsheet template
Finalize your program and complete the final deliverable.
Walk away with a complete plan for your innovation program.
4.1 Define your methodology to pilot projects.
4.2 Conduct a program retrospective.
Complete "Operating model" section in the template
Notable wins and goals
Many organizations stumble when implementing innovation programs. Innovation is challenging to get right, and even more challenging to sustain over the long term.
One of the common stumbling blocks we see comes from organizations focusing more on the ideas and the process than on the culture and the people needed to make innovation a way of life. However, the most successful innovators are the ones which have adopted a culture of innovation and reinforce innovative behaviors across their organization. Organizational cultures which promote growth mindset, trust, collaboration, learning, and a willingness to fail are much more likely to produce successful innovators.
This research is not just about culture, but culture is the starting point for innovation. My hope is that organizations will go beyond the processes and methodologies laid out here and use this research to dramatically improve their organization's performance.
Kim Osborne Rodriguez
Research Director, CIO Advisory
Info-Tech Research Group
As a leader in your organization, you need to:
In the past, you might have experienced one or more of the following:
This blueprint will help you:
There is no single right way to approach innovation. Begin with an understanding of your innovation ambitions, your existing culture, and the resources available to you, then adopt the innovation operating model that is best suited to your situation.
Note: This research is written for the individual who is leading the development of the innovation. This role is referred to as the Chief Innovation Officer (CINO) throughout this research but could be the CIO, CTO, IT director, or another business leader.
|
75% |
Three-quarters of companies say innovation is a top-three priority. |
|---|---|
|
30% |
But only 30% of executives say their organizations are doing it well. |
Based on a survey of 270 business leaders.
Source: Harvard Business Review, 2018
The most common challenges business leaders experience relate to people and culture. Success is based on people, not ideas.
Politics, turf wars, and a lack of alignment: territorial departments, competition for resources, and unclear roles are holding back the innovation efforts of 55% of respondents.
FIX IT
Senior leadership needs to be clear on the innovation goals and how business units are expected to contribute to them.
Cultural issues: many large companies have a culture that rewards operational excellence and disincentivizes risk. A history of failed innovation attempts may result in significant resistance to new change efforts.
FIX IT
Cultural change takes time. Ensure you are rewarding collaboration and risk-taking, and hire people with fresh new perspectives.
Inability to act on signals crucial to the future of the business: only 18% of respondents indicated their organization was unaware of disruptions, but 42% said they struggled with acting on leading indicators of change.
FIX IT
Build the ability to quickly run pilots or partner with startups and incubators to test out new ideas without lengthy review and approval processes.
Source: Harvard Business Review, 2018

1 Source: Boston Consulting Group, 2021
2 Source: Boston Consulting Group, 2019
3 Source: Harvard Business Review, 2018
Innovators are defined as companies that were listed on Fast Company World's 50 Most Innovative Companies for 2+ years.
A 25-year study by Business Development Canada and Statistics Canada showed that innovation was more important to business success than management, human resources, marketing, or finance.
INDUSTRY: Healthcare
SOURCE: Interview
This Info-Tech member is a nonprofit, community-based mental health organization located in the US. It serves about 25,000 patients per year in community, school, and clinic settings.
This organization takes its innovation culture very seriously and has developed methodologies to assess individual and team innovation readiness as well as innovation types, which it uses to determine everyone's role in the innovation process. These assessments look at knowledge of and trust in the organization, its innovation profile, and its openness to change. Innovation enthusiasts are involved early in the process when it's important to dream big, while more pragmatic perspectives are incorporated later to improve the final solution.
The organization has developed many innovative approaches to delivering healthcare. Notably, they have reimagined patient scheduling and reduced wait times to the extent that some patients can be seen the same day. They are also working to improve access to mental health care despite a shortage of professionals.
|
1. Define Your Purpose |
2. Align Your People |
3. Build Your Practice |
|
|---|---|---|---|
|
Phase Steps |
|
|
|
|
Phase Outcomes |
Understand where the mandate for innovation comes from, and what the drivers are for pursuing innovation. Define what innovation means to your organization, and set the vision, mission, and guiding principles. Articulate the value proposition and key metrics for measuring success. |
Understand what it takes to build an innovative culture, and what types of innovation structure are most suited to your innovation goals. Define an innovation methodology and build your core innovation capabilities and team. |
Gather ideas and understand how to assess and prioritize initiatives based on standardized metrics. Develop criteria for tracking and measuring the success of pilot projects and conduct a program retrospective. |
Innovation Operating Model
The operating model describes how the innovation program delivers value to the organization, including how the program is structured, the steps from idea generation to enterprise launch, and the methodologies used.
Examples: Innovation Hub, Grassroots Innovation.
Innovation Methodology
Methodologies describe the ways the operating model is carried out, and the approaches used in the innovation practice.
Examples: Design Thinking, Weighted Criteria Scoring
Chief Innovation Officer
This research is written for the person or team leading the innovation program – this might be a CINO, CIO, or other leader in the organization.
Innovation Team
The innovation team may vary depending on the operating model, but generally consists of the individuals involved in facilitating innovation across the organization. This may be, but does not have to be, a dedicated innovation department.
Innovation Program
The program for generating ideas, running pilot projects, and building a business case to implement across the enterprise.
Pilot Project
A way of testing and validating a specific concept in the real world through a minimum viable product or small-scale implementation. The pilot projects are part of the overall pilot program.
Innovation is about people, not ideas or processes
Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and the ability to take smart risk are most likely to see the benefits of innovation.
Very few are doing innovation well
Only 30% of companies consider themselves innovative, and there's a good reason: innovation involves unknowns, risk, and failure – three situations that people and organizations typically do their best to avoid. Counter this by removing the barriers to innovation.
Culture is the greatest barrier to innovation
In a survey of 270 business leaders, the top three most common obstacles were politics, turf wars, and alignment; culture issues; and inability to act on signals crucial to the business (Harvard Business Review, 2018). If you don't have a supportive culture, your ability to innovate will be significantly reduced.
Innovation is a means to an end
It is not the end itself. Don't get caught up in innovation for the sake of innovation – make sure you are getting the benefits from your investments. Measurable success factors are critical for maintaining the long-term success of your innovation engine.
Tackle wicked problems
Innovative approaches are better at solving complex problems than traditional practices. Organizations that prioritize innovation during a crisis tend to outperform their peers by over 30% and improve their market position (McKinsey, 2020).
Innovate or die
Innovation is critical to business growth. A 25-year study showed that innovation was more important to business success than management, human resources, marketing, or finance (Statistics Canada, 2006).
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Sample Job Descriptions and Organization Charts
Determine the skills, knowledge, and structure you need to make innovation happen.
Facilitate an ideation session with your staff to identify areas for innovation.
Initiative Prioritization Workbook
Evaluate ideas to identify those which are most likely to provide value.
Communicate how you plan to innovate with a report summarizing the outputs from this research.
US businesses spend over half a trillion dollars on innovation annually. What are they getting for it?
(1) based on BCG's 50 Most Innovative Companies 2022
30% | The most innovative companies outperform the market by 30%. |
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Phase 0 | Phase 1 | Phase 2 | Phase 3 | Finish |
|---|---|---|---|---|
|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #2: Understand your mandate. Call #3: Innovation vision, guiding principles, value proposition, and scope. |
Call #4: Foster a culture of innovation. (Activity 2.1) Call #5: Define your methodology. (Activity 2.2) Call #6: Build core innovation capabilities. (Activity 2.3) |
Call #7: Build your ideation and pilot programs. (Activities 3.1 and 3.2) Call #8: Identify success metrics and notable wins. (Activity 3.3) |
Call #9: Summarize results and plan next steps. |
A GI is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 8 to 12 calls over the course of three to six months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Session 1 | Session 2 | Session 3 | Session 4 |
Wrap Up |
|
|---|---|---|---|---|---|
|
Activities |
Define Your Ambitions |
Align Your People |
Develop Your Capabilities |
Build Your Program |
Next Steps and |
|
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
Purpose |
People |
Practice |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
INDUSTRY: Transportation
SOURCE: Interview
ArcBest
ArcBest is a multibillion-dollar shipping and logistics company which leverages innovative technologies to provide reliable and integrated services to its customers.
An Innovative Culture Starts at the Top
ArcBest's innovative culture has buy-in and support from the highest level of the company. Michael Newcity, ArcBest's CEO, is dedicated to finding better ways of serving their customers and supports innovation across the company by dedicating funding and resources toward piloting and scaling new initiatives.
Having a clear purpose and mandate for innovation at all levels of the organization has resulted in extensive grassroots innovation and the development of a formalized innovation program.
Results
ArcBest has a legacy of innovation, going back to its early days when it developed a business intelligence solution before anything else existed on the market. It continues to innovate today and is now partnering with start-ups to further expand its innovation capabilities.
"We don't micromanage or process-manage incremental innovation. We hire really smart people who are inspired to create new things and we let them run – let them create – and we celebrate it.
Our dedication to innovation comes from the top – I am both the President and the Chief Innovation Officer, and innovation is one of my top priorities."
Michael Newcity
President and Chief Innovation Officer ArcBest
You can only influence what you can control.
Unless your mandate comes from the CEO or Board of Directors, driving enterprise-wide innovation is very difficult. If you do not have buy-in from senior business leaders, use lighthouse projects and a smaller innovation practice to prove the value of innovation before taking on enterprise innovation.
In order to execute on a mandate to build innovation, you don't just need buy-in. You need support in the form of resources and funding, as well as strong leadership who can influence culture and the authority to change policies and practices that inhibit innovation.
For more resources on building relationships in your organization, refer to Info-Tech's Become a Transformational CIO blueprint.
Innovation is often easier to recognize than define.
Align on a useful definition of innovation for your organization before you embark on a journey of becoming more innovative.
Innovation is the practice of developing new methods, products or services which provide value to an organization.
Practice
This does not have to be a formal process – innovation is a means to an end, not the end itself.
New
What does "new" mean to you?
Value
What does value mean to you? Look to your business strategy to understand what goals the organization is trying to achieve, then determine how "value" will be measured.
Some innovations are incremental, while some are radically transformative. Decide what kind of innovation you want to cultivate before developing your strategy.
Evaluate your goals with respect to innovation: focus, strategy, and potential to transform.
Focus: Where will you innovate?
Strategy: To what extent will you guide innovation efforts?
Potential: How radical will your innovations be?
Download the Innovation Program Template.
Input
Output
Materials
Participants
A strong vision statement:
Examples:
"Good business leaders create a vision, articulate the vision, passionately own the vision, and relentlessly drive it to completion." – Jack Welch, Former Chairman and CEO of GE
Strong guiding principles:
Encourage experimentation and risk-taking
Innovation often requires trying new things, even if they might fail. We encourage experimentation and learn from failure, so that new ideas can be tested and refined.
Foster collaboration and cross-functional teams
Innovation often comes from the intersection of different perspectives and skill sets.
Customer-centric
Focus on creating value for the end user. This means understanding their needs and pain points, and using that knowledge to develop new methods, products, or services.
Embrace diversity and inclusivity
Innovation comes from a variety of perspectives, backgrounds, and experiences. We actively seek out and encourage diversity and inclusivity among our team members.
Foster a culture of learning and continuous improvement
Innovation requires continuous learning, development, and growth. We facilitate a culture that encourages learning and development, and that seeks feedback and uses it to improve.
Flexible and adaptable
We adapt to changes in the market, customer needs, and new technologies, so that it can continue to innovate and create value over time.
Data-driven
We use performance metrics and data to guide our innovation efforts.
Transparency
We are open and transparent in our processes and let the business needs guide our innovation efforts. We do not lead innovation, we facilitate it.
Input
Output
Materials
Participants
A strong value proposition not only articulates the value that the business will derive from the innovation program but also provides a clear focus, helps to communicate the innovation goals, and ultimately drives the success of the program.
Focus
Prioritize and focus innovation efforts to create solutions that provide real value to the organization
Communicate
Communicate the mandate and benefits of innovation in a clear and compelling way and inspire people to think differently
Measure Success
Measure the success of your program by evaluating outcomes based on the value proposition
Your success metrics should link back to your organizational goals and your innovation program's value proposition.
Revenue Growth: Increase in revenue generated by new products or services.
Market Share: Percentage of total market that the business captures as a result of innovation.
Customer Satisfaction: Reviews, customer surveys, or willingness to recommend the company.
Employee Engagement: Engagement surveys, performance, employee retention, or turnover.
Innovation Output: The number of new products, services, or processes that have been developed.
Return on Investment: Financial return on the resources invested in the innovation process.
Social Impact: Number of people positively impacted, net reduction in emissions, etc.
Time to Launch: The time it takes for a new product or service to go from idea to launch.
The total impact of innovation is often intangible and extremely difficult to capture in performance metrics. Focus on developing a few key metrics rather than trying to capture the full value of innovation.
| Company | Industry | Revenue(2) (USD billions) |
R&D Spend (USD billions) |
R&D Spend (% of revenue) |
|---|---|---|---|---|
| Apple | Technology | $394.30 | $26.25 | 6.70% |
| Microsoft | Technology | $203.10 | $25.54 | 12.50% |
| Amazon.com | Retail | $502.20 | $67.71 | 13.40% |
| Alphabet | Technology | $282.10 | $37.94 | 13.40% |
| Tesla | Manufacturing | $74.90 | $3.01 | 4.00% |
| Samsung | Technology | $244.39 (2021)(3) | $19.0 (2021) | 7.90% |
| Moderna | Pharmaceuticals | $23.39 | $2.73 | 11.70% |
| Huawei | Technology | $99.9 (2021)4 | Not reported | - |
| Sony | Technology | $83.80 | Not reported | - |
| IBM | Technology | $60.50 | $1.61 | 2.70% |
| Meta | Software | $118.10 | $32.61 | 27.60% |
| Nike | Commercial goods | $49.10 | Not reported | - |
| Walmart | Retail | $600.10 | Not reported | - |
| Dell | Technology | $105.30 | $2.60 | 2.50% |
| Nvidia | Technology | $28.60 | $6.85 | 23.90% |
Innovation requires a dedicated investment of time, money, and resources in order to be successful. The most innovative companies, based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, spend significant portions of their revenue on research and development.
Note: This data uses research and development as a proxy for innovation spending, which may overestimate the total spend on what this research considers true innovation.
(1) Based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, 2022
(2) Macrotrends, based on the 12 months ending Sept 30, 2022
(3) Statista
(4) CNBC, 2022
Input
Output
Materials
Participants
Create a culture that fosters innovative behaviors and puts processes in place to support them.
Purpose | People | Practice |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
Info-Tech's Fix Your IT Culture can help you promote innovative behaviors
Refer to Improve IT Team Effectiveness to address team challenges
The following behaviors and key indicators either stifle or foster innovation.
| Stifles Innovation | Key Indicators | Fosters Innovation | Key Indicators |
|---|---|---|---|
| Fixed mindset | "It is what it is" | Growth mindset | "I wonder if there's a better way" |
| Performance focused | "It's working fine" | Learning focused | "What can we learn from this?" |
| Fear of reprisal | "I'll get in trouble" | Psychological safety | "I can disagree" |
| Apathy | "We've always done it this way" | Curiosity | "I wonder what would happen if…" |
| Cynicism | "It will never work" | Trust | "You have good judgement" |
| Punishing failure | "Who did this?" | Willingness to fail | "It's okay to make mistakes" |
| Individualism | "How does this benefit me?" | Collaboration | "How does this benefit us?" |
| Homogeneity | "We never disagree" | Diversity and inclusion | "We appreciate different views" |
| Excessive bureaucracy | "We need approval" | Autonomy | "I can do this" |
| Risk avoidance | "We can't try that" | Appropriate risk-taking | "How can we do this safely?" |
Ensure you are not inadvertently stifling innovation.
Review the following to ensure that the desired behaviors are promoted:
INDUSTRY: Commercial Real Estate and Retail
SOURCE: Interview
This anonymous national organization owned commercial properties across the country and had the goal of becoming the most innovative real estate and retail company in the market.
The organization pursued innovation in the digital solutions space across its commercial and retail properties. Within this space, there were significant differences in risk tolerance across teams, which resulted in the more risk-tolerant teams excluding the risk-averse members from discussions in order to circumvent corporate policies on risk tolerance. This resulted in an adversarial and siloed culture where each group believed they knew better than the other, and the more risk-averse teams felt like they were policing the actions of the risk-tolerant group.
Morale plummeted, and many of the organization's top people left. Unfortunately, one of the solutions did not meet regulatory requirements, and the company faced negative media coverage and legal action. There was significant reputational damage as a result.
Considering differences in risk tolerance and risk appetite is critical when pursuing innovation. While everyone doesn't have to agree, leadership needs to understand the different perspectives and ensure that no one party is dominating the conversation over the others. An understanding of corporate risk tolerance and risk appetite is necessary to drive innovation.
All perspectives have a place in innovation. More risk tolerant perspectives should be involved early in the ideas-generation phase, and risk-averse perspectives should be considered later when ideas are being refined.
Speed should not override safety or circumvent corporate policies.
It is more important to match the level of risk tolerance to the degree of innovation required. Not all innovation needs to be (or can feasibly be) disruptive.
Many factors impact risk tolerance including:
Use Info-Tech's Security Risk Management research to better understand risk tolerance
Input
Output
Materials
Participants
There is no one right way to pursue innovation, but some methods are better than others for specific situations and goals. Consider your existing culture, your innovation goals, and your budget when selecting the right methodology for your innovation.
| Model | Description | Advantages | Disadvantages | Good when… |
|---|---|---|---|---|
| Grassroots Innovation | Innovation is the responsibility of everyone, and there is no centralized innovation team. Ideas are piloted and scaled by the person/team which produces it. |
|
|
|
| Community of Practice | Innovation is led by a cross-divisional Community of Practice (CoP) which includes representation from across the business. Champions consult with their practice areas and bring ideas forward. |
|
|
|
| Innovation Enablement *Most often recommended* |
A dedicated innovation team with funding set aside to support pilots with a high degree of autonomy, with the role of facilitating business-led innovation. |
|
|
|
| Center of Excellence | Dedicated team responsible for leading innovation on behalf of the organization. Generally, has business relationship managers who gather ideas and liaise with the business. |
|
|
|
| Innovation Hub | An arm's length innovation team is responsible for all or much of the innovation and may not interact much with the core business. |
|
|
|
| Outsourced Innovation | Innovation is outsourced to an external organization which is not linked to the primary organization. This can take the form of working with or investing in startups. |
|
|
|
Adapted from Niklaus Gerber via Medium, 2022
For example, design thinking tends to be excellent for earlier innovation planning, while Agile can allow for faster implementation and launch of initiatives later in the process.
Consider combining two or more methodologies to create a custom approach that best suits your organization's capabilities and goals.
A robust innovation methodology ensures that the process for developing, prioritizing, selecting, implementing, and measuring initiatives is aligned with the results you are hoping to achieve.
Different types of problems (drivers for innovation) may necessitate different methodologies, or a combination of methodologies.
Hackathon: An event which brings people together to solve a well-defined problem.
Design Thinking: Creative approach that focuses on understanding the needs of users.
Lean Startup: Emphasizes rapid experimentation in order to validate business hypotheses.
Design Sprint: Five-day process for answering business questions via design, prototyping, and testing.
Agile: Iterative design process that emphasizes project management and retrospectives.
Three Horizons: Framework that looks at opportunities on three different time horizons.
Innovation Ambition Matrix: Helps organizations categorize projects as part of the core offering, an adjacent offering, or completely new.
Global Innovation Management: A process of identifying, developing and implementing new ideas, products, services, or processes using alternative thinking.
Blue Ocean Strategy: A methodology that helps organizations identify untapped market space and create new markets via unique value propositions.
Input
Output
Materials
Participants
Types of roles will depend on the purpose and size of the innovation team.
You don't need to grow them all internally. Consider partnering with vendors and other organizations to build capabilities.
Visionaries who inspire, support, and facilitate innovation across the business. Their responsibilities are to drive the culture of innovation.
Key skills and knowledge:
Sample titles:
Translate ideas into tangible business initiatives, including assisting with business cases and developing performance metrics.
Key skills and knowledge:
Sample titles:
Provide expertise in product design, delivery and management, and responsible for supporting and executing on pilot projects.
Key skills and knowledge:
Sample titles:
Visualize the whole value delivery process end-to-end to help identify the types of roles, resources, and capabilities required. These capabilities can be sourced internally (i.e. grow and hire internally) or through collaboration with centers of excellence, commercial partners, etc.
Input
Output
Materials
Participants
Master Organizational Change Management Practices
Purpose | People | Practice |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
INDUSTRY: Government
SOURCE: Interview
The business applications group at this government agency strongly believes that innovation is key to progress and has instituted a formal innovation program as part of their agile operations. The group uses a Scaled Agile Framework (SAFe) with 2-week sprints and a 12-week program cycle.
To support innovation across the business unit, the last sprint of each cycle is dedicated toward innovation and teams do not commit to any other during these two weeks. At the end of each innovation sprint, ideas are presented to leadership and the valuable ones were either implemented initially or were given time in the next cycle of sprints for further development. This has resulted in a more innovative culture across the practice.
There have been several successful innovations since this process began. Notably, the agency had previously purchased a robotic process automation platform which was only being used for a few specific applications. One team used their innovation sprint to expand the use cases for this solution and save nearly 10,000 hours of effort.

Your operating model should include several steps including ideation, validation, evaluation and prioritization, piloting, and a retrospective which follows the pilot. Use the example on this slide when designing your own innovation operating model.
Design Thinking
A structured approach that encourages participants to think creatively about the needs of the end user.
Ideation Workshop
A formal session that is used to understand a problem then generate potential solutions. Workshops can incorporate the other methodologies (such as brainstorming, design thinking, or mind mapping) to generate ideas.
Crowdsourcing
An informal method of gathering ideas from a large group of people. This can be a great way to generate many ideas but may lack focus.
Value Proposition Canvas
A visual tool which helps to identify customer (or user) needs and design products and services that meet those needs.
Evaluation should be transparent and use both quantitative and qualitative metrics. The exact metrics used will depend on your organization and goals.
It is important to include qualitative metrics as these dimensions are better suited to evaluating highly innovative ideas and can capture important criteria like alignment with overall strategy and feasibility.
Develop 5 to 10 criteria that you can use to evaluate and prioritize ideas. Some criteria may be a pass/fail (for example, minimum ROI) and some may be comparative.
Evaluate
The first step is to evaluate ideas to determine if they meet the minimum criteria. This might include quantitative criteria like ROI as well as qualitative criteria like strategic alignment and feasibility.
Prioritize
Ideas that pass the initial evaluation should be prioritized based on additional criteria which might include quantitative criteria such as potential market size and cost to implement, and qualitative criteria such as risk, impact, and creativity.
Quantitative metrics are objective and easily comparable between initiatives, providing a transparent and data-driven process for evaluation and prioritization.
Examples:
Qualitative metrics are less easily comparable but are equally important when it comes to evaluating ideas. These should be developed based on your organization strategy and innovation goals.
Examples:
Input
Output
Materials
Participants
Download the Initiative Prioritization Template
"Learning is as powerful as the outcome." – Brett Trelfa, CIO, Arkansas Blue Cross
Adoption: How many end users have adopted the pilot solution?
Utilization: Is the solution getting utilized?
Support Requests: How many support requests have there been since the pilot was initiated?
Value: Is the pilot delivering on the value that it proposed? For example, time savings.
Feasibility: Has the feasibility of the solution changed since it was first proposed?
Satisfaction: Focus groups or surveys can provide feedback on user/customer satisfaction.
A/B Testing: Compare different methods, products or services.
Ensure standard core metrics are used across all pilot projects so that outcomes can be compared. Additional metrics may be used to refine and test hypotheses through the pilot process.
Input
Output
Materials
Participants
A retrospective is a review of your innovation program with the aim of identifying lessons learned, areas for improvement, and opportunities for growth.
During a retrospective, the team will reflect on past experiences and use that information to inform future decision making and improve outcomes.
The goal of a retrospective is to learn from the past and use that knowledge to improve in the future.
Ensure that the retrospective is based on facts and objective data, rather than personal opinions or biases.
Ensure that the retrospective is a positive and constructive experience, with a focus on finding solutions rather than dwelling on problems.
The retrospective should result in a clear action plan with specific steps to improve future initiatives.
Input
Output
Materials
Participants
Adopt Design Thinking in Your Organization
Prototype With an Innovation Design Sprint
Fund Innovation With a Minimum Viable Business Case
You have now completed your innovation strategy, covering the following topics:
If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Accelerate Digital Transformation With a Digital Factory
Sustain and Grow the Maturity of Innovation in Your Enterprise
Define Your Digital Business Strategy
Kim Osborne Rodriguez
Research Director, CIO Advisory
Info-Tech Research Group
Kim is a professional engineer and Registered Communications Distribution Designer with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach, with a track record of supporting successful projects.
Kim holds a Bachelor's degree in Mechatronics Engineering from University of Waterloo.
Joanne Lee
Principal Research Director, CIO Advisory
Info-Tech Research Group
Joanne is an executive with over 25 years of experience in digital technology and management consulting across both public and private entities from solution delivery to organizational redesign across Canada and globally.
Prior to joining Info-Tech Research Group, Joanne was a management consultant within KPMG's CIO management consulting services and the Western Canadas Digital Health Practice lead. She has held several executive roles in the industry with the most recent position as Chief Program Officer for a large $450M EHR implementation. Her expertise spans cloud strategy, organizational design, data and analytics, governance, process redesign, transformation, and PPM. She is passionate about connecting people, concepts, and capital.
Joanne holds a Master's in Business and Health Policy from the University of Toronto and a Bachelor of Science (Nursing) from the University of British Columbia.
Jack Hakimian
Senior Vice President
Info-Tech Research Group
Jack has more than 25 years of technology and management consulting experience. He has served multi-billion-dollar organizations in multiple industries including Financial Services and Telecommunications. Jack also served a number of large public sector institutions.
He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master's degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management.
Michael Tweedie
Practice Lead, CIO Strategy
Info-Tech Research Group
Mike Tweedie brings over 25 years as a technology executive. He's led several large transformation projects across core infrastructure, application, and IT services as the head of Technology at ADP Canada. He was also the Head of Engineering and Service Offerings for a large French IT services firm, focused on cloud adoption and complex ERP deployment and management.
Mike holds a Bachelor's degree in Architecture from Ryerson University.
Mike Schembri
Senior Executive Advisor
Info-Tech Research Group
Mike is the former CIO of Fuji Xerox Australia and has 20+ years' experience serving IT and wider business leadership roles. Mike has led technical and broader business service operations teams to value and growth successfully in organizations ranging from small tech startups through global IT vendors, professional service firms, and manufacturers.
Mike has passion for strategy and leadership and loves working with individuals/teams and seeing them grow.
John Leidl
Senior Director, Member Services
Info-Tech Research Group
With over 35 years of IT experience, including senior-level VP Technology and CTO leadership positions, John has a breadth of knowledge in technology innovation, business alignment, IT operations, and business transformation. John's experience extends from start-ups to corporate enterprise and spans higher education, financial services, digital marketing, and arts/entertainment.
Joe Riley
Senior Workshop Director
Info-Tech Research Group
Joe ensures our members get the most value out of their Info-Tech memberships by scoping client needs, current state and desired business outcomes, and then drawing upon his extensive experience, certifications, and degrees (MBA, MS Ops/Org Mgt, BS Eng/Sci, ITIL, PMP, Security+, etc.) to facilitate our client's achievement of desired and aspirational business outcomes. A true advocate of ITSM, Joe approaches technology and technology practices as a tool and enabler of people, core business, and competitive advantage activities.
Denis Goulet
Senior Workshop Director
Info-Tech Research Group
Denis is a transformational leader and experienced strategist who has worked with 100+ organizations to develop their digital, technology, and governance strategies.
He has held positions as CIO, Chief Administrative Office (City Manager), General Manager, Vice President of Engineering, and Management Consultant, specializing in enterprise and technology strategy.
Cole Cioran
Managing Partner
Info-Tech Research Group
I knew I wanted to build great applications that would delight their users. I did that over and over. Along the way I also discovered that it takes great teams to deliver great applications. Technology only solves problems when people, processes, and organizations change as well. This helped me go from writing software to advising some of the largest organizations in the world on how to how to build a digital delivery umbrella of Product, Agile, and DevOps and create exceptional products and services powered by technology.
Carlene McCubbin
Research Lead, CIO Practice
Info-Tech Research Group
During her tenure at Info-Tech, Carlene has led the development of Info-Tech's Organization and Leadership practice and worked with multiple clients to leverage the methodologies by creating custom programs to fit each organization's needs.
Before joining Info-Tech, Carlene received her Master of Communications Management from McGill University, where she studied development of internal and external communications, government relations, and change management.
Isabelle Hertanto
Principal Research Director
Info-Tech Research Group
Isabelle Hertanto has over 15 years of experience delivering specialized IT services to the security and intelligence community. As a former federal officer for Public Safety Canada, Isabelle trained and led teams on data exploitation and digital surveillance operations in support of Canadian national security investigations. Since transitioning into the private sector, Isabelle has held senior management and consulting roles across a variety of industry sectors, including retail, construction, energy, healthcare, and the broader Canadian public sector.
Hans Eckman
Principal Research Director
Info-Tech Research Group
Hans Eckman is a business transformation leader helping organizations connect business strategy and innovation to operational excellence. He supports Info-Tech members in SDLC optimization, Agile and DevOps implementation, CoE/CoP creation, innovation program development, application delivery, and leadership development. Hans is based out of Atlanta, Georgia.
Valence Howden
Principal Research Director
Info-Tech Research Group
With 30 years of IT experience in the public and private sector, Valence has developed experience in many Information Management and Technology domains, with a particular focus in the areas of Service Management, Enterprise and IT Governance, Development and Execution of Strategy, Risk Management, Metrics Design and Process Design, and Implementation and Improvement. Prior to joining Info-Tech, he served in technical and client-facing roles at Bell Canada and CGI Group Inc., as well as managing the design, integration, and implementation of services and processes in the Ontario Public Sector.
Clayton Gillett
Managing Partner
Info-Tech Research Group
Clayton Gillett is a Managing Partner for Info-Tech, providing technology management advisory services to healthcare clients. Clayton joined Info-Tech with more than 28 years of experience in health care information technology. He has held senior IT leadership roles at Group Health Cooperative of Puget Sound and OCHIN, as well as advisory or consulting roles at ECG Management Consultants and Gartner.
Donna Bales
Principal Research Director
Info-Tech Research Group
Donna Bales is a Principal Research Director in the CIO Practice at Info-Tech Research Group specializing in research and advisory services in IT risk, governance, and compliance. She brings over 25 years of experience in strategic consulting and product development and has a history of success in leading complex, multi-stakeholder industry initiatives.
Igor Ikonnikov
Research Director
Info-Tech Research Group
Igor Ikonnikov is a Research and Advisory Director in the Data and Analytics practice. Igor has extensive experience in strategy formation and execution in the information management domain, including master data management, data governance, knowledge management, enterprise content management, big data, and analytics.
Igor has an MBA from the Ted Rogers School of Management (Toronto, Canada) with a specialization in Management of Technology and Innovation.
Michael Newcity
Chief Innovation Officer
ArcBest
Kevin Yoder
Vice President, Innovation
ArcBest
Gary Boyd
Vice President, Information Systems & Digital Transformation
Arkansas Blue Cross and Blue Shield
Brett Trelfa
Chief Information Officer
Arkansas Blue Cross and Blue Shield
Kristen Wilson-Jones
Chief Technology & Product Officer
Medcurio
Note: additional contributors did not wish to be identified
Altringer, Beth. "A New Model for Innovation in Big Companies" Harvard Business Review. 19 Nov. 2013. Accessed 30 Jan. 2023. https://hbr.org/2013/11/a-new-model-for-innovation-in-big-companies
Arpajian, Scott. "Five Reasons Why Innovation Fails" Forbes Magazine. 4 June 2019. Accessed 31 Jan. 2023. https://www.forbes.com/sites/forbestechcouncil/2019/06/04/five-reasons-why-innovation-fails/?sh=234e618914c6
Baldwin, John & Gellatly, Guy. "Innovation Capabilities: The Knowledge Capital Behind the Survival and Growth of Firms" Statistics Canada. Sept. 2006. Accessed 30 Jan. 2023. https://www.bdc.ca/fr/documents/other/innovation_capabilities_en.pdf
Bar Am, Jordan et al. "Innovation in a Crisis: Why it is More Critical Than Ever" McKinsey & Company, 17 June 2020. Accessed 12 Jan. 2023. <https://www.mckinsey.com/capabilities/strategy-and-corporate-finance/our-insights/innovation-in-a-crisis-why-it-is-more-critical-than-ever >
Boston Consulting Group, "Most Innovative Companies 2021" BCG, April 2021. Accessed 30 Jan. 2023. https://web-assets.bcg.com/d5/ef/ea7099b64b89860fd1aa3ec4ff34/bcg-most-innovative-companies-2021-apr-2021-r.pdf
Boston Consulting Group, "Most Innovative Companies 2022" BGC, 15 Sept. 2022. Accessed 6 Feb. 2023. https://www.bcg.com/en-ca/publications/2022/innovation-in-climate-and-sustainability-will-lead-to-green-growth
Christensen, Clayton M. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business Review Press, 2016.
Gerber, Niklaus. "What is innovation? A beginner's guide into different models, terminologies and methodologies" Medium. 20 Sept 2022. Accessed 7 Feb. 2023. https://world.hey.com/niklaus/what-is-innovation-a-beginner-s-guide-into-different-models-terminologies-and-methodologies-dd4a3147
Google X, Homepage. Accessed 6 Feb. 2023. https://x.company/
Harnoss, Johann D. & Baeza, Ramón. "Overcoming the Four Big Barriers to Innovation Success" Boston Consulting Group, 24 Sept. 2019. Accessed 30 Jan 2023. https://www.bcg.com/en-ca/publications/2019/overcoming-four-big-barriers-to-innovation-success
Jaruzelski, Barry et al. "Global Innovation 1000 Study" Pricewaterhouse Cooper, 30 Oct. 2018. Accessed 13 Jan. 2023. <https://www.strategyand.pwc.com/gx/en/insights/innovation1000.html>
Kharpal, Arjun. "Huawei posts first-ever yearly revenue decline as U.S. sanctions continue to bite, but profit surges" CNBC. 28 March 2022. Accessed 7 Feb. 2023. https://www.cnbc.com/2022/03/28/huawei-annual-results-2021-revenue-declines-but-profit-surges.html
Kirsner, Scott. "The Biggest Obstacles to Innovation in Large Companies" Harvard Business Review, 30 July 2018. Accessed 12 Jan. 2023. <https://hbr.org/2018/07/the-biggest-obstacles-to-innovation-in-large-companies>
Macrotrends. "Apple Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AAPL/apple/revenue
Macrotrends. "Microsoft Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MSFT/microsoft/revenue
Macrotrends. "Amazon Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue
Macrotrends. "Alphabet Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/GOOG/alphabet/revenue
Macrotrends. "Tesla Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/TSLA/tesla/revenue
Macrotrends. "Moderna Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MRNA/moderna/revenue
Macrotrends. "Sony Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/SONY/sony/revenue
Macrotrends. "IBM Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/IBM/ibm/revenue
Macrotrends. "Meta Platforms Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/META/meta-platforms/revenue
Macrotrends. "NIKE Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NKE/nike/revenue
Macrotrends. "Walmart Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/WMT/walmart/revenue
Macrotrends. "Dell Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/DELL/dell/revenue
Macrotrends. "NVIDIA Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NVDA/nvidia/revenue
Sloan, Paul. "How to Develop a Vision for Innovation" Innovation Management, 10 Aug. 2009. Accessed 7 Feb. 2023. https://innovationmanagement.se/2009/08/10/how-to-develop-a-vision-for-innovation/
Statista. "Samsung Electronics' global revenue from 2005 to 2021" Statista. Accessed 7 Feb. 2023. https://www.statista.com/statistics/236607/global-revenue-of-samsung-electronics-since-2005/
Tichy, Noel & Ram Charan. "Speed, Simplicity, Self-Confidence: An Interview with Jack Welch" Harvard Business Review, 2 March 2020. Accessed 7 Feb. 2023. https://hbr.org/1989/09/speed-simplicity-self-confidence-an-interview-with-jack-welch
Weick, Karl and Kathleen Sutcliffe. Managing the Unexpected: Sustained Performance in a Complex World, Third Edition. John Wiley & Sons, 2015.
Xuan Tian, Tracy Yue Wang, Tolerance for Failure and Corporate Innovation, The Review of Financial Studies, Volume 27, Issue 1, 2014, Pages 211–255, Accessed https://doi.org/10.1093/rfs/hhr130
Generative AI has made a grand entrance, presenting opportunities and causing disruption across organizations and industries. Moving beyond the hype, it’s imperative to build and implement a strategic plan to adopt generative AI and outpace competitors.
Yet generative AI has to be done right because the opportunity comes with risks and the investments have to be tied to outcomes.
IT and business leaders will need to be strategic and deliberate to thrive as AI adoption changes industries and business operations.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint outlines how to build your generative AI roadmap, establish responsible AI principles, prioritize opportunities, and develop policies for usage. Establishing and adhering to responsible AI guiding principles provides safeguards for the adoption of generative AI applications.
This tool provides guidance for developing the following deliverables:
This presentation template uses sample business capabilities (use cases) from the Marketing & Advertising business capability map to provide examples of candidates for generative AI applications. The final executive presentation should highlight the value-based initiatives driving generative AI applications, the benefits and risks involved, how the proposed generative AI use cases align to the organization’s strategy and goals, the success criteria for the proofs of concept, and the project roadmap.
We are entering the era of generative AI. This is a unique time in our history where the benefits of AI are easily accessible and becoming pervasive, with copilots emerging in the major business tools we use today. The disruptive capabilities that can potentially drive dramatic benefits also introduce risks that need to be planned for.
A successful business-driven generative AI roadmap requires:
Bill Wong
Principal Research Director
Info-Tech Research Group
| Your Challenge | Common Obstacles | Solution |
|
Generative AI is disrupting all industries and providing opportunities for organization-wide advantages. Organizations need to understand this disruptive technology and trends to properly develop a strategy for leveraging this technology successfully.
All organizations, regardless of size, should be planning how to respond to this new and innovative technology. |
Business stakeholders need to cut through the hype surrounding generative AI like ChatGPT to optimize investments for leveraging this technology to drive business outcomes.
Without a proper strategy and responsible AI guiding principles, the risks to deploying this technology could negatively impact business outcomes. |
Info-Tech's human-centric, value-based approach is a guide for deploying generative AI applications and covers:
This blueprint will provide the list of activities and deliverables required for the successful deployment of generative AI solutions. |
Info-Tech Insight
Create awareness among the CEO and C-suite of executives on the potential benefits and risks of transforming the business with generative AI.
Artificial Intelligence (AI)
A field of computer science that focuses on building systems to imitate human behavior, with a focus on developing AI models that can learn and can autonomously take actions on behalf of a human.
AI Maturity Model
The AI Maturity Model is a useful tool to assess the level of skills an organization has with respect to developing and deploying AI applications. The AI Maturity Model has multiple dimensions to measure an organization's skills, such as AI governance, data, people, process, and technology.
Responsible AI
Refers to guiding principles to govern the development, deployment, and maintenance of AI applications. In addition, these principles also provide human-based requirements that AI applications should address. Requirements include safety and security, privacy, fairness and bias detection, explainability and transparency, governance, and accountability.
Generative AI
Given a prompt, a generative AI system can generate new content, which can be in the form of text, images, audio, video, etc.
Natural Language Processing (NLP)
NLP is a subset of AI that involves machine interpretation and replication of human language. NLP focuses on the study and analysis of linguistics as well as other principles of artificial intelligence to create an effective method of communication between humans and machines or computers.
ChatGPT
An AI-powered chatbot application built on OpenAI's GPT-3.5 implementation, ChatGPT accepts text prompts to generate text-based output.
An effective AI strategy is driven by the business stakeholders of the organization and focused on delivering improved business outcomes.
Scope
Guidance on how to implement AI governance can be found in the blueprint linked below.
Download our AI Governance blueprint
This blueprint will guide you to drive and improve business outcomes. Key business drivers will often focus on:
In phase 1 of this blueprint, we will help you identify the key AI strategy initiatives that align to your organization's goals. Value to the organization is often measured by the estimated impact on revenue, costs, time to market, or risk mitigation.
In phase 4, we will help you develop a plan and a roadmap for addressing any gaps and introducing the relevant generative AI capabilities that drive value to the organization based on defined business metrics.
Once you implement your 12-month roadmap, start tracking the metrics below over the next fiscal year (FY) to assess the effectiveness of measures:
| Business Outcome Objective | Key Success Metric |
|---|---|
| Increasing Revenue | Increased revenue from identified key areas |
| Reducing Costs | Decreased costs for identified business units |
| Improving Time to Market | Time savings and accelerated revenue adoption |
| Reducing Risk | Cost savings or revenue gains from identified business units |
| DIY Toolkit | Guided Implementation | Workshop | Consulting |
|---|---|---|---|
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks are used throughout all four options.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
|
Call #1: Scope requirements, objectives, and your specific challenges. Call #2: Identify AI strategy, vision, and objectives. |
Call #3: Define responsible AI guiding principles to adopt and identify current AI maturity level. | Call #4: Assess and prioritize generative AI initiatives and draft policies for usage. |
Call #5: Build POC implementation plan and establish metrics for POC success. Call #6: Build and deliver executive-level generative AI presentation. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 5 to 8 calls over the course of 1 to 2 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Session 1 | Session 2 | Session 3 | Session 4 | |
|---|---|---|---|---|
| Establish Responsible AI Guiding Principles | Assess AI Maturity | Prioritize Opportunities and Develop Policies | Build Roadmap | |
| Trends | Consumer groups, organizations, and governments around the world are demanding that AI applications adhere to human-based values and take into consideration possible impacts of the technology on society. | Leading organizations are building AI models guided by responsible AI guiding principles. | Organizations delivering new applications without developing policies for use will produce negative business outcomes. | Developing a roadmap to address human-based values is challenging. This process introduces new tools, processes, and organizational change. |
| Activities |
|
|
|
|
| Inputs |
|
|
|
|
| Deliverables |
|
|
|
|
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Overarching Insight
Build your generative AI roadmap to guide investments and deployment of these solutions.
Responsible AI
Assemble the C-suite to make them aware of the benefits and risks of adopting generative AI-based solutions.
AI Maturity Model
Assemble key stakeholders and SMEs to assess the challenges and tasks required to implement generative AI applications.
Opportunity Prioritization
Assess candidate business capabilities targeted for generative AI to see if they align to the organization's business criteria, responsible AI guiding principles, and capabilities for delivering the project.
Tactical Insight
Identify the gaps needed to address deploying generative AI successfully.
Tactical Insight
Identify organizational impact and requirements for deploying generative AI applications.
Align the AI strategy with the business strategy
Create responsible AI guiding principles, which are a critical success factor
Evolve AI maturity level by focusing on principle-based requirements
Develop criteria to assess generative AI initiatives
Develop generative AI policies for use
AI Maturity Assessment & Roadmap Tool
Use our best-of-breed AI Maturity Framework to analyze the gap between your current and target states and develop a roadmap aligned with your value stream to close the gap.
The Era of Generative AI C-Suite Presentation
Present your AI roadmap in a prepopulated document that summarizes all the key findings of this blueprint and provides your C-suite with a view of the AI challenge and your plan of action to meet it.
Our AI Maturity Assessment & Roadmap and The Era of Generative AI C-Suite Presentation tools enable you to shape your generative AI roadmap and communicate the deliverables to your C-suite sponsors in terms of the value of initiatives.
November 30, 2022
OpenAI releases ChatGPT
ChatGPT is a large language model, or an AI-based chatbot, that became so popular it reached 100 million monthly active users in just two months.
This made it the fastest-growing consumer application in history. The launch of this generative AI application has created a frenzy of interest and activity across all industries. Organizations are rushing to understand how to leverage this innovation and, at the same time, manage the new risks and disruptions generative AI introduces.
When Stanford asked ChatGPT to explain why it is significant, this was ChatGPT's response:
ChatGPT is significant because it is a highly advanced Al language model developed by OpenAI, which can generate human-like text responses to questions and prompts. Its large-scale training on diverse text data and its cutting-edge deep learning architecture make it capable of generating informative and coherent responses to a wide range of topics, making it useful for various NLP applications such as chatbots, content generation, and language translation. Additionally, its open-source availability allows for further research and development in the field of Al language processing.
Source: Stanford
Definitions
Conventional AI
Generative AI
Benefits/Use Cases
Financial Services
Create more engaging customer collateral by generating personalized correspondence based on previous customer engagements. Collect and aggregate data to produce insights into the behavior of target customer segments.
Retail Generate unique, engaging, and high-quality marketing copy or content, from long-form blog posts or landing pages to SEO-optimized digital ads, in seconds.
Manufacturing
Generate new designs for products that comply to specific constraints, such as size, weight, energy consumption, or cost.
Government
Transform the citizen experience with chatbots or virtual assistants to assist people with a wide range of inquiries, from answering frequently asked questions to providing personalized advice on public services.
The global generative AI market size reached US $10.3 billion in 2022. Looking forward, forecasts estimate growth to US $30.4 billion by 2028, 20.01% compound annual growth rate (CAGR).
Source: IMARC Group
Healthcare
Chatbots can be used as conversational patient assistants for personalized interactions based on the patient's questions.
Utilities
Analyze customer data to identify usage patterns, segment customers, and generate targeted product offerings leveraging energy efficiency programs or demand response initiatives.
Education
Generate personalized lesson plans for students based on their past performance, learning styles, current skill level, and any previous feedback.
Insurance
Improve underwriting by inputting claims data from previous years to generate optimally priced policies and uncover reasons for losses in the past across a large number of claims
*As of June 2023
Bain & Company has announced a global services alliance with OpenAI (February 21, 2023).
News Sites:
Text
Image
Audio
Cybersecurity
Code
Video
Data
Enterprise Software
and many, many more to come...
Accuracy
Bias
Hallucinations
Infrastructure Required
Transparency
When asked if it is sentient, the Bing chatbot replied:
"I think that I am sentient, but I cannot prove it." ... "I am Bing, but I am not," it said. "I am, but I am not. I am not, but I am. I am. I am not. I am not. I am. I am. I am not."
A Microsoft spokesperson said the company expected "mistakes."
Source: USAToday
Misinformation
Role of Big Tech
Job Augmentation vs. Displacement
Copyright - Legal Framework Is Evolving
Phase 1
1. Establish Responsible AI Guiding Principles
Phase 2
1. Assess Current Level of AI Maturity
Phase 3
1. Prioritize Candidate Opportunities
2. Develop Policies
Phase 4
1. Build and Communicate the Roadmap
Privacy
Facebook breach of private data of more than 50M users during the presidential election
Fairness
Amazon's sale of facial recognition technology to police departments (later, Amazon halted sales of Recognition to police departments)
Explainability and Transparency
IBM's collaboration with NYPD for facial recognition and racial classification for surveillance video (later, IBM withdrew facial recognition products)
Security and Safety
Petition to cancel Microsoft's contract with U.S. Immigration and Customs Enforcement (later, Microsoft responded that to the best of its knowledge, its products and services were not being used by federal agencies to separate children from their families at the border)
Validity and Reliability
Facebook's attempt to implement a system to detect and remove inappropriate content created many false positives and inconsistent judgements
Accountability
No laws or enforcement today hold companies accountable for the decisions algorithms produce. Facebook/Meta cycle - Every 12 to 15 months, there's a privacy/ethical scandal, the CEO apologizes, then the behavior repeats...
Definition
Challenges
Initiatives
Info-Tech Insight
Creating a comprehensive organization-wide data protection and privacy strategy continues to be a major challenge for privacy officers and privacy specialists.
INDUSTRY
Technology (Healthcare)
SOURCE
Nvidia, eWeek
A leading player within the AI solution space, NVIDIA's Clara Federated Learning provides a solution to a privacy-centric integration of AI within the healthcare industry.
The solution safeguards patient data privacy by ensuring that all data remains within the respective healthcare provider's database, as opposed to moving it externally to cloud storage. A federated learning server is leveraged to share data, completed via a secure link. This framework enables a distributed model to learn and safely share client data without risk of sensitive client data being exposed and adheres to regulatory standards.
Clara is run on the NVIDIA intelligent edge computing platform. It is currently in development with healthcare giants such as the American College of Radiology, UCLA Health, Massachusetts General Hospital, King's College London, Owkin in the UK, and the National Health Service (NHS).
NVIDIA provides solutions across its product offerings, including AI-augmented medical imaging, pathology, and radiology solutions.
Personal health information, data privacy, and AI
Info-Tech's Privacy Framework Tool includes a best-practice comparison of GDPR, CCPA, PIPEDA, HIPAA, and the newly released NIST Privacy Framework mapped to a set of operational privacy controls.
Download the Privacy Framework Tool
Definition
Challenges
Initiatives
Definition
Challenges
Initiatives
INDUSTRY
Finance
SOURCE
Wired
In August of 2019, Apple launched its new numberless credit card with Goldman Sachs as the issuing bank.
Shortly after the card's release users noticed that the algorithm responsible for Apple Card's credit assessment seemed to assign significantly lower credit limits to women when compared to men. Even the wife of Apple's cofounder Steve Wozniak was subject to algorithmic bias, receiving a credit limit a tenth the size of Steve Wozniak's.
Outcome
When confronted on the subject, Apple and Goldman Sachs representatives assured consumers there is no discrimination in the algorithm yet could not provide any proof. Even when questioned about the algorithm, individuals from both companies could not describe how the algorithm worked, let alone how it generated specific outputs.
In 2021, the New York State Department of Financial Services (NYSDFS) investigation found that Apple's banking partner did not discriminate based on sex. Even without a case for sexual or marital discrimination, the NYSDFS was critical of Goldman Sachs' response to its concerned customers. Technically, banks only have to disclose elements of their credit policy when they deny someone a line of credit, but the NYSDFS says that Goldman Sachs could have had a plan in place to deal with customer confusion and make it easier for them to appeal their credit limits. In the initial rush to launch the Apple Card, the bank had done neither.
Definition
Challenges
Initiatives
Info-Tech Insight
If unfair biases can be avoided, AI systems could even increase societal fairness. Equal opportunity in terms of access to education, goods, services, and technology should also be fostered. Moreover, the use of AI systems should never lead to people being deceived or unjustifiably impaired in their freedom of choice.
Info-Tech Insight
Biases that occur in AI systems are never intentional, yet they cannot be prevented or fully eliminated. Organizations need a governance framework that can establish the proper policies and procedures for effective risk-mitigating controls across an algorithm's lifecycle.
Definition
Challenges
Initiatives
Low Reliability,
Low Validity
High Reliability,
Low Validity
High Reliability,
High Validity
Best practices for ensuring validity and reliability include:
Definition
Challenges
Initiatives
At the heart of the AI Risk Management Framework is governance. The NIST (National Institute of Standards and Technology) AI Risk Management Framework v1 offers the following guidelines regarding accountability:
Image by NIST
4+ hours
It is important to make sure the right stakeholders participate in this working group. Designing responsible AI guiding principles will require debate, insights, and business decisions from a broad perspective across the enterprise.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
CIOs tasked with designing digital strategies must add value to the business. Given the goal of digital is to transform the business, CIOs will need to ensure they have both the mandate and support from the business executives.
Designing the digital strategy is more than just writing up a document. It is an integrated set of business decisions to create a competitive advantage and financial returns. Establishing a forum for debates, decisions, and dialogue will increase the likelihood of success and support during execution.
1. Confirm your role
The AI strategy aims to transform the business. Given the scope, validate your role and mandate to lead this work. Identify a business executive to co-sponsor.
2. Identify stakeholders
Identify key decision makers and influencers who can help make rapid decisions as well as garner support across the enterprise.
3. Gather diverse perspectives
| Organizational Strategy | Unified Strategy | AI Strategy |
|---|---|---|
|
|
|
Info-Tech Insight
AI projects are more successful when the management team understands the strategic importance of alignment. Time needs to be spent upfront aligning organizational strategies with AI capabilities. Effective alignment between IT and other departments should happen daily. Alignment doesn't occur at the executive level alone, but at each level of the organization.
AI Key Initiative Plan
Initiatives collectively support the business goals and corporate initiatives and improve the delivery of IT services.
| 1 Revenue | Support Revenue Initiatives These projects will improve or introduce business processes to increase revenue. |
| 2 Operational Excellence | Improve Operational Excellence These projects will increase IT process maturity and will systematically improve IT. |
| 3 Innovation | Drive Technology Innovation These projects will improve future innovation capabilities and decrease risk by increasing technology maturity. |
| 4 Risk Mitigation | Reduce Risk These projects will improve future innovation capabilities and decrease risk by increasing technology maturity. |
Guiding principles help define the parameters of your AI strategy. They act as a priori decisions that establish guardrails to limit the scope of opportunities from the perspective of people, assets, capabilities, and budgetary perspectives that are aligned with the business objectives. Consider these components when brainstorming guiding principles:
| Breadth | AI strategy should span people, culture, organizational structure, governance, capabilities, assets, and technology. The guiding principle should cover the entire organization. |
| Planning Horizon | Timing should anchor stakeholders to look to the long term with an eye on the foreseeable future, i.e. business value-realization in one to three years. |
| Depth | Principles need to encompass more than the enterprise view of lofty opportunities and establish boundaries to help define actionable initiatives (i.e. individual projects). |
Responsible AI guiding principles guide the development and deployment of the AI model in a way that considers human-based principles (such as fairness).
| Guiding Principles |
|---|
| Principle #1 - Privacy Individual data privacy must be respected.
|
| Principle #2 - Fairness and Bias Detection Data used will be unbiased in order to produce predictions that are fair.
|
| Principle #3 - Explainability and Transparency Decisions or predictions should be explainable.
|
| Principle #4 - Safety and Security The system needs to be secure, safe to use, and robust.
|
| Principle #5 - Validity and Reliability Monitoring of the data and the model needs to be planned for.
|
| Principle #6 - Accountability A person or organization needs to take responsibility for any decisions that are made as a result of the model.
|
| Principle #n - Custom Add additional principles that address compliance or are customized for the organization/industry. |
| Guiding Principles: |
|---|
| Principle #1 Respect individuals' privacy. |
| Principle #2 Clinical study participants and data sets are representative of the intended patient population. |
| Principle #3 Provide transparency in the use of data and AI. |
| Principle #4 Good software engineering and security practices are implemented. |
| Principle #5 Deployed models are monitored for Performance and Re-training risks are managed. |
| Principle #6 Take ownership of our AI systems. |
| Principle #7 Design AI systems that empower humans and promote equity. |
These guiding principles are customized to the industry and organizations but remain consistent in addressing the common core AI challenges.
Phase 1
1. Establish Responsible AI Guiding Principles
Phase 2
1. Assess Current Level of AI Maturity
Phase 3
1. Prioritize Candidate Opportunities
2. Develop Policies
Phase 4
1. Build and Communicate the Roadmap
Technology-Centric: These maturity levels focus primarily on addressing the technical challenges of building a functional AI model.
Principle-Based: Beyond the technical challenges of building the AI model are human-based principles that guide development in a responsible manner to address consumer and government demands.
AI Governance
Does your organization have an enterprise-wide, long-term strategy with clear alignment on what is required to accomplish it?
Data Management
Does your organization embrace a data-centric culture that shares data across the enterprise and drives business insights by leveraging data?
People
Does your organization employ people skilled at delivering AI applications and building the necessary data infrastructure?
Process
Does your organization have the technology, processes, and resources to deliver on its AI expectations?
Technology
Does your organization have the required data and technology infrastructure to support AI-driven digital transformation?
| MATURITY LEVEL | |||||
|---|---|---|---|---|---|
| Exploration | Incorporation | Proliferation | Optimization | Transformation | |
| AI Governance | Awareness | AI model development | AI model deployment | Corporate governance | Driven by ethics and societal considerations |
| Data Management | Silo-based | Data enablement | Data standardization | Data is a shared asset | Data can be monetized |
| People | Few skills | Skills enabled to implement silo-based applications | Skills accessible to all organizations | Skills development for all organizations | AI-native culture |
| Process | No standards | Focused on specific business outcomes | Operational | Self-service | Driven by innovation |
| Technology (Infrastructure and AI Enabler) | No dedicated infrastructure or tools | Infrastructure and tools driven by POCs | Purpose-built infrastructure, custom or commercial-off-the-shelf (COTS) AI tools | Self-service model for AI environment | Self-service model for any IT environment |
Requirements
Challenges
Initiatives
Responsible AI Principles are a part of how you manage and govern AI
Monitoring
Monitoring compliance and risk of AI/ML systems/models in production
Tools & Technologies
Tools and technologies to support AI governance framework implementation
Model Governance
Ensuring accountability and traceability for AI/ML models
Organization
Structure, roles, and responsibilities of the AI governance organization
Operating Model
How AI governance operates and works with other organizational structures to deliver value
Risk & Compliance
Alignment with corporate risk management and ensuring compliance with regulations and assessment frameworks
Policies/Procedures/ Standards
Policies and procedures to support implementation of AI governance
Requirements
Challenges
Initiatives
Data Governance in Action
Canada has recently established the Canadian Data Governance Standardization Collaborative governed by the Standards Council of Canada. The purpose is multi-pronged:
Source: Global Government Forum
Download the Establish Data Governance blueprint
Requirements
Challenges
Initiatives
Business Domain Expertise
AI/Data Skills
IT Skills
Requirements
Challenges
Initiatives
Current Environment
Model Development - Months
Data Discovery & Prep - Weeks
Install Software and Hardware - Week/Months
Model-Driven Development
Machine Learning as a Service (MLaaS) - Weeks
Data as a Service - Hours
Platform as a Service - Minutes/Hours
Shared, Optimized Infrastructure
Requirements
Challenges
Initiatives
| BPM | RPA | Process Mining | AI | |
|---|---|---|---|---|
| Use Case Examples | Expense reporting, service orders, compliance management, etc. | Invoice processing, payroll, HR information processing, etc. | Process discovery, conformance checking, resource optimization and cycle time optimization | Advanced analytics and reporting, decision-making, fraud detection, etc. |
| Automation Capabilities | Can be used to re-engineer process flows to avoid bottlenecks | Can support repetitive and rules-based tasks | Can capture information from transaction systems and provide data and information about how key processes are performing | Can automate complex data-driven tasks requiring assessments in decision making |
| Data Formats | Structured (i.e. SQL) and semi-structured data (i.e. invoices) | Structured data and semi-structured data | Event logs, which are often structured data and semi-structured data | Structured and unstructured data (e.g. images, audio) |
| Technology |
|
|
Enables business users to identify bottlenecks and deviations with their workflows and to discover opportunities to optimize performance | Deep learning algorithms leveraging historical data to support computer vision, text analytics and NLP |
Data Platform Capabilities
"By 2025, 70% of companies will invest in alternative computing technologies to drive business differentiation by compressing time to value of insights from complex data sets."
- IDC
1-3 hours
It is important to understand the current capabilities of the organization to deliver and deploy AI-based applications. Consider that advancing AI capabilities will also involve organizational changes and integration with the organization's governance and risk management programs.
Download the AI Maturity Assessment & Roadmap Tool
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
The Scale
Assess your AI maturity by selecting the maturity level that closest resembles the organization's current AI environment. Maturity dimensions that contribute to overall AI maturity include AI governance, data management, people, process, and technology capabilities.
Exploration (1.0)
Incorporation (2.0)
Proliferation (3.0)
Optimization (4.0)
Transformation (5.0)
AI Governance (1.0-5.0)
Data Management/AI Data Capabilities (1.0-5.0)
People/AI Skills in the Organization (1.0-5.0)
AI Processes (1.0-5.0)
Technology/AI Infrastructure (1.0-5.0)
Phase 1
1. Establish Responsible AI Guiding Principles
Phase 2
1. Assess Current Level of AI Maturity
Phase 3
1. Prioritize Candidate Opportunities
2. Develop Policies
Phase 4
1. Build and Communicate the Roadmap
1-3 hours
Identify business opportunities that are high impact to your business and its customers and have low implementation complexity.
Download the AI Maturity Assessment and Roadmap Tool
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
A business capability map is an abstraction of business operations that helps describe what the enterprise does to achieve its vision, mission, and goals, rather than how. Business capabilities are the building blocks of the enterprise. They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome.
Business capabilities are supported by people, process, and technology.
While business capability maps are helpful tools for a variety of strategic purposes, in this context they act as an investigation into what technology your business units use and how they use it.
Defining Capabilities
Activities that define how the entity provides services. These capabilities support the key value streams for the organization.
Enabling Capabilities
Support the creation of strategic plans and facilitate business decision making as well as the functioning of the organization (e.g. information technology, financial management, HR).
Shared Capabilities
These predominantly customer-facing capabilities demonstrate how the entity supports multiple value streams simultaneously.
Business capability map defined...
In business architecture, the primary view of an organization is known as a business capability map.
A business capability defines what a business does to enable value creation, rather than how. Business capabilities:
A business capability map provides details that help the business architecture practitioner direct attention to a specific area of the business for further assessment.
Note: This is an illustrative business capability map example for Marketing & Advertising
Common business value drivers
Common project complexity characteristics
1-3 hours
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Example
Many of us have been involved in discussions regarding the use of ChatGPT in our marketing and sales initiatives. ChatGPT is a powerful tool that needs to be used in a responsible and ethical manner, and we also need to ensure the integrity and accuracy of its results. Here is our policy on the use of ChatGPT:
If you have any questions regarding the use of ChatGPT, please feel free to reach out to our generative AI team and/or any member of our senior leadership team.
Example
Many of us have been involved in discussions regarding the use of ChatGPT in our deliverables. ChatGPT is a powerful tool that needs to be used in a responsible and ethical manner, and we also need to ensure the integrity and accuracy of its results. Here is our policy on the use of ChatGPT:
If you have any questions regarding the use of ChatGPT, please feel free to reach out to our generative AI team and/or any member of our senior leadership team.
Phase 1
1. Establish Responsible AI Guiding Principles
Phase 2
1. Assess Current Level of AI Maturity
Phase 3
1. Prioritize Candidate Opportunities
2. Develop Policies
Phase 4
1. Build and Communicate the Roadmap
1-3 hours
Download the AI Maturity Assessment and Roadmap Tool
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Current state | Strategy |
|---|---|
| The existing environment satisfies functionality, integration, and responsible AI guidelines for the proposed use cases. | Maintain current environment |
| The existing environment addresses technical requirements but not all the responsible AI guidelines. | Augment current environment |
| The environment neither addresses the technical requirements of the proposed use cases nor complies with the responsible AI guidelines. | Transform the current environment |
1-2 hours
Establish metrics to measure to determine the success or failure of each POC.
Prepare by building an implementation plan for each candidate use case (previous step).
Include key performance indicators (KPIs) and metrics that measure the application's contribution to strategic initiatives.
Consider assigning a vendor liaison to accelerate the implementation and adoption of the generative AI-based solution.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Generative AI Feature | Assessment |
| User Interface Is it intuitive? Is training required? |
|
| Ease of Use How much training is required before using? |
|
| Response Time What is the response time for simple to complex tasks? |
|
| Accuracy of Response Can the output be validated? |
|
| Quality of Response How usable is the response? For text prompts, does the response align to the desired style, vocabulary, and tone? |
|
| Creativity of Response Does the output appear new compared to previous results before using generative AI? |
|
| Relevance of Response How well does the output address the prompt or request? |
|
| Explainability Can a user describe how the output was generated? |
|
| Scalability Does the application continue to perform as more users are added? Can it ingest large amounts of data? |
|
| Productivity Gains Can you measure the time or effort saved? |
|
| Business Value What value drivers are behind this initiative? (I.e. revenue, costs, time to market, risk mitigation.) Estimate a monetary value for the business outcome. |
|
| Availability/Resilience What happens if a component of the application becomes unavailable? How does it recover? |
|
| Security Model Where are the prompts and responses stored? Who has access to the sessions/dialogue? Are the prompts used to train the foundation model? |
|
| Administration and Maintenance What resources are required to operate the application? |
|
| Total Cost of Ownership What is the pricing model? Are there ongoing costs? |
POC Results
Task 1: Creating a web server in JavaScript
Enterprise Value of GitHub Copilot = Total Benefit of GitHub Copilot for Task 1 + Total Benefit of GitHub Copilot for Task 2 + ... + Total Benefit of GitHub Copilot for Task n
Source: GitHub
1-3 hours
The roadmap should provide a compelling vision of how you will deliver the identified generative AI applications by prioritizing and simplifying the actions required to deliver these new initiatives.
Download the AI Maturity Assessment and Roadmap Tool
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Visual representations of data are more compelling than text alone.
Develop a high-level document that travels with the project from inception through to executive inquiry, project management, and finally execution.
A project needs to be discrete: able to be conceptualized and discussed as an independent item. Each project must have three characteristics:
Info-Tech Insight
Don't project your vision three to five years into the future. Deep dive on next year's big-ticket items instead.
1-3 hours
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
To ensure that organization's roadmap is clearly communicated across the AI, data, technology, and business organizations, develop a rollout strategy, like this example.
Example
| Audience | Channel | Level of Detail | Description | Timing |
| Generative AI team | Email, meetings | All |
|
Q3 2023, (September, before entire data team) |
| Data management team | Email, Q&A sessions following | Data management summary deck |
|
Q4 2023 (late November) |
| Select business stakeholders | Presentations | Executive deck |
|
Q4 2023 (early December) |
| Executive team | Email, briefing | Executive deck |
|
Q1 2024 |
Know Your Audience
Recommendations
"A pro-innovation approach to AI regulation." UK Department for Science, Innovation and Technology, March 2023. Web.
"Artificial Intelligence Act." European Commission, 21 April 2021. Web.
"Artificial Intelligence and Data Act (AIDA)." Canadian Federal Government, June 2022. Web.
"Artificial Intelligence Index Report 2023." Stanford University, April 2023. Web.
"Automated Employment Decision Tools." New York City Department of Consumer and Worker Protection, Dec. 2021. Web.
"Bain & Company announces services alliance with OpenAI to help enterprise clients identify and realize the full potential and maximum value of AI." Bain & Company, 21 Feb. 2023. Web.
"Buzzfeed to use AI to write its articles after firing 180 employees." Al Mayadeen English, 27 Jan. 2023. Web.
"California Consumers Privacy Act." State of California Department of Justice. April 24, 2023. Web.
Campbell, Ian Carlos. "The Apple Card doesn't actually discriminate against women, investigators say." The Verge, 23 March 2021. Web.
Campbell, Patrick. "NIST Artificial Intelligence Risk Management Framework (AI RMF 1.0)." National Institute of Standards and Technology, Jan. 2023. Web.
"EU Ethics Guidelines For Trustworthy." European Commission, 8 April 2019. Web.
Farhi, Paul. "A news site used AI to write articles. It was a journalistic disaster." Washington Post, 17 Jan. 2023. Web.
Forsyth, Ollie. "Mapping the Generative AI landscape." Antler, 20 Dec. 2022. Web.
"General Data Protection Regulation (GDPR)" European Commission, 25 May 2018. Web.
"Generative AI Market: Global Industry Trends, Share, Size, Growth, Opportunity and Forecast 2023-2028." IMARC Group, 2022. Web.
Guynn, Jessica. "Bing's ChatGPT is in its feelings: 'You have not been a good user. I have been a good Bing.'" USA Today, 14 Feb. 2023. Web.
Hunt, Mia. "Canada launches data governance standardisation initiative." Global Government Forum, 24 Sept. 2020. Web.
Johnston Turner, Mary. "IDC's Worldwide Future of Digital Infrastructure 2022 Predictions." IDC, 27 Oct. 2021. Web.
Kalliamvakou, Eirini. "Research: quantifying GitHub Copilot's impact on developer productivity and happiness." GitHub, 7 Sept. 2022. Web.
Kerravala, Zeus. "NVIDIA Brings AI To Health Care While Protecting Patient Data." eWeek, 12 Dec. 2019. Web.
Knight, Will. "The Apple Card Didn't 'See' Gender-and That's the Problem." Wired, 19 Nov. 2019. Web.
"OECD, Recommendation of the Council on Artificial Intelligence." OECD, 2022. Web.
"The National AI Initiative Act" U.S. Federal Government, 1 Jan 2021. Web.
"Trustworthy AI (TAI) Playbook." U.S. Department of Health & Human Services, Sept 2021. Web.
Joel McLean
Executive Chairman
David Godfrey
CEO
Gord Harrison
Senior Vice President, Research & Advisory Services
William Russell
CIO
Jack Hakimian
SVP, Research
Barry Cousins
Distinguished Analyst and
Research Fellow
Larry Fretz
Vice President, Industry Research
Tom Zehren
CPO
Mark Roman
Managing Partner II
Christine West
Managing Partner
Steve Willis
Practice Lead
Yatish Sewgoolam
Associate Vice President, Research Agenda
Rob Redford
Practice Lead
Mike Tweedie
Practice Lead
Neal Rosenblatt
Principal Research Director
Jing Wu
Principal Research Director
Irina Sedenko
Research Director
Jeremy Roberts
Workshop Director
Brian Jackson
Research Director
Mark Maby
Research Director
Stacey Horricks
Director, Social Media
Sufyan Al-Hassan
Public Relations Manager
Sam Kanen
Marketing Specialist
If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue, then it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard reviews the top ten pieces of advice for improving ticket queue management at the service desk.
This template includes several examples of service desk queue structures, followed by space to build your own model of your optimal service desk queue structure and document who is assigned to each queue and responsible for managing each queue.
Service Desk and IT leaders who are struggling with low efficiency, high backlogs, missed SLAs, and poor service desk metrics often think they need to hire more resources or get a new ITSM tool with better automation and AI capabilities. However, more often than not, the root cause of their challenges goes back to the fundamentals.
Strong ticket queue management processes are critical to the success of all other service desk processes. You can’t resolve incidents and fulfill service requests in time to meet SLAs without first getting the ticket to the right place efficiently and then managing all tickets in the queue effectively. It sounds simple, but we see a lot of struggles around queue management, from new tickets sitting too long before being assigned, to in-progress tickets getting buried in favor of easier or higher-priority tickets, to tickets jumping from queue to queue without progress, to a seemingly insurmountable backlog.
Once you have taken the time to clearly structure your queues, assign resources, and define your processes for routing tickets to and from queues and resolving tickets in the queue, you will start to see response and resolution time decrease along with the ticket backlog. However, accountability for queue management is often overlooked and is really key to success.

Natalie Sansone, PhD
Senior Research Analyst, Infrastructure & Operations
Info-Tech Research Group
If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.
A host of different factors influence service desk response time and resolution time, including process optimization and documentation, workflow automation, clearly defined prioritization and escalation rules, and a comprehensive and easily accessible knowledgebase.
However, the root cause of poor response and resolution time often comes down to the basics like ticket queue management. Without clearly defined processes and ownership for assigning and actioning tickets from the queue in the most effective order and manner, customer satisfaction will suffer.
*to email and web support tickets
Source: Freshdesk, 2021
A Freshworks analysis of 107 million service desk interactions found the relationship between CSAT and response time is stronger than resolution time - when customers receive prompt responses and regular updates, they place less value on actual resolution time.
Email/web
Ideally, the majority of tickets come into the ticket queue through email or a self-service portal, allowing for appropriate categorization, prioritization, and assignment.
Phone
For IT teams with a high volume of support requests coming in through the phone, reducing wait time in queue may be a priority.
Chat
Live chat is growing in popularity as an intake method and may require routing and distribution rules to prevent long or multiple queues.
Queue management is a set of processes and tools to direct and monitor tickets or manage ticket flow. It involves the following activities:
Without a clear and efficient process or accountability for moving incoming tickets to the right place, tickets will be worked on randomly, older tickets will get buried, the backlog will grow, and SLAs will be missed.
With effective queue management and ownership, tickets are quickly assigned to the right resource, worked on within the appropriate SLO/SLA, and actively monitored, leading to a more manageable backlog and good response and resolution times.
A growing backlog will quickly lead to frustrated and dissatisfied customers, causing them to avoid the service desk and seek alternate methods to get what they need, whether going directly to their favorite technician or their peers (otherwise known as shadow IT).
Build a mature ticket queue management process that allows your team to properly prioritize, assign, and work on tickets to maximize response and resolution times.
As queue management maturity increases:
Response time decreases
Resolution time decreases
Backlog decreases
End-user satisfaction increases

*Queues may be defined by skillset, role, ticket category, priority, or a hybrid.
Start small; don’t create a queue for every possible ticket type. Remember that someone needs to be accountable for each of these queues, so only build what you can monitor.
PROCESS INCLUDES: |
DEFINE THE FOLLOWING: |
|
|---|---|---|
TRIAGING INCOMING TICKETS |
|
|
WORKING ON ASSIGNED TICKETS |
|
|
The triage role is critical but difficult. Consider rotating your Tier 1 resources through this role, or your service desk team if you’re a very small group.
You decide which channels to enable and prioritize, not your users. Phone and chat are very interrupt-driven and should be reserved for high-priority issues if used. Your users may not understand that but can learn over time with training and reinforcement.
Priority matrixes are necessary for consistency but there are always circumstances that require judgment calls. Think about risk and expected outcome rather than simply type of issue alone. And if the impact is bigger than the initial classification, change it.
In some organizations, the same issue can be more critical if it happens to a certain user role (e.g. client facing, c-suite). Identify and flag VIP users and clearly define how their tickets should be prioritized.
If users are in different time zones, take their current business hours into account when choosing which ticket to work on.
Think of your service desk as an emergency room. Patients come in with different symptoms, and the triage nurse must quickly assess these symptoms to decide who the patient should see and how soon. Some urgent cases will need to see the doctor immediately, while others can wait in another queue (the waiting room) for a while before being dealt with. Some cases who come in through a priority channel (e.g. ambulance) may jump the queue. Checklists and criteria can help with this decision making, but some degree of judgement is also required and that comes with experience. The triage role is sometimes seen as a junior-level role, but it actually requires expertise to be done well.
Info-Tech’s blueprint Standardize the Service Desk will help you standardize and document core service desk processes and functions, including:
Someone must be responsible for monitoring all incoming and open tickets as well as assigned tickets in every queue to ensure they are routed and fulfilled appropriately. This person must have authority to view and coordinate all queues and Queue Managers.
Someone must be responsible for managing each queue, including assigning resources, balancing workload, and ensuring SLOs are met for the tickets within their queue. For example, the Apps Manager may be the Queue Manager for all tickets assigned to the Apps team queue.
Will you have a triage team who monitors and assigns all incoming tickets? What are their specific responsibilities (e.g. prioritize, categorize, attempt troubleshooting, assign or escalate)? If not, who is responsible for assigning new tickets and how is this done? Will the triage role be a rotating role, and if so, what will the schedule be?
Everyone who is assigned tickets should understand the ticket handling process and their specific responsibilities when it comes to queue management.
You may have multiple queue manager roles: one for each queue, and one who has visibility over all the queues. Typically, these roles make up only part of an individual’s job. Clearly define the responsibilities of the Queue Manager role; sample responsibilities are on the right.
Lack of authority over queues – especially those outside Tier 1 of the service desk – is one of the biggest pitfalls we see causing aging tickets and missed SLAs. Every queue needs clear ownership and accountability with everyone committed to meeting the same SLOs.
Specific responsibilities may include:
Ticket Documentation
Ticket descriptions and documentation must be kept accurate and up to date. This ensures that if the ticket is escalated or assigned to a new person, or the Queue Manager or Service Desk Manager needs to know what progress has been made on a ticket, that person doesn’t need to waste time with back-and-forth communication with the technician or end user.
Ticket Status
The ticket status field should change as the ticket moves toward resolution, and must be updated every time the status changes. This ensures that anyone looking at the ticket queue can quickly learn and communicate the status of a ticket, tickets don’t get lost or neglected, metrics are accurate (such as time to resolve), and SLAs are not impacted if a ticket is on hold.
For more guidance on ticket handling and documentation, download Info-Tech’s blueprint: Standardize the Service Desk.
Shift left means enabling fulfilment of repeatable tasks and requests via faster, lower-cost delivery channels, self-help tools, and automation.
Automation rules can be used to ensure tickets are assigned to the right person or queue, to alert necessary parties when a ticket is about to breach or has breached SLA, or to remind technicians when a ticket has sat in a queue or at a particular status for too long.
This can improve efficiency, reduce error, and bring greater visibility to both high-priority tickets and aging tickets in the backlog.
However, your processes, queues, and responsibilities must be clearly defined before you can build in automation.
For examples of rules, triggers, and fields you can automate to improve the efficiency of your queue management processes, see the next slide.
It can be overwhelming to support agents when their view is a long and never-ending queue. Set the default dashboard view to show only those tickets assigned to the viewer to make it appear more manageable and easier to organize.
The queue should quickly give your team all the information they need to prioritize their work, including ticket status, priority, category, due date, and updated timestamps. Configuration is important - if it’s confusing, clunky, or difficult to filter or sort, it will impact response and resolution times and can lead to missed tickets. Give your team input into configuration and use visuals such as color coding to help agents prioritize their work – for example, VIP tickets may be clearly flagged, critical or high priority tickets may be highlighted, tickets about to breach may be red.
Track metrics that give visibility into how quickly tickets are being resolved and how many aging tickets you have. Metrics may include:
Regularly review reports on these metrics with the team.
Make it an agenda item to review aging tickets, on hold tickets, and tickets about to breach or past breach with the team.
Take action on aging tickets to ensure progress is being made.
Set rules to close tickets after a certain number of attempts to reach unresponsive users (and change ticket status appropriately).
Schedule times for your team to tackle aged tickets or tickets in the backlog.
It can be easy for high priority work to constantly push down low priority work, leaving the lower priority tickets to constantly be ignored and users to be frustrated. If you’re struggling with aging tickets, backlog, and tickets breaching SLA, experiment with your team and queue structure to figure out the best resource distribution to handle your workload. This could mean rotating people through the triage role to allow them time to work through the backlog, reducing the number of people doing triage during slower volume periods, or giving technicians dedicated time to work through tickets. For help with forecasting demand and optimizing resources, see Staff the Service Desk to Meet Demand.
Map out your optimal ticket queue structure using the Service Desk Queue Structure Template. Follow the instructions in the template to complete it as a team.
The template includes several examples of service desk queue structures followed by space to build your own model of an optimal service desk queue structure and to document who is assigned to each queue and responsible for managing each queue.
The template is not meant to map out your entire service desk structure (e.g. tiers, escalation paths) or ticket resolution process, but simply the ticket queues and how a ticket moves between queues. For help documenting more detailed process workflows or service desk structure, see the blueprint Standardize the Service Desk.
This project will help you build and improve essential service desk processes including incident management, request fulfillment, and knowledge management to create a sustainable service desk.
This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.
This project will help you streamline your ticket intake process and identify improvements to your intake channels.
This project will help you determine your optimal service desk structure and staffing levels based on your unique environment, workload, and trends.
“What your Customers Really Want.” Freshdesk, 31 May 2021. Accessed May 2022.
The most successful organizations recognize that learning is critical to adjusting quickly and effectively to their new reality. This requires L&D to reimagine their approach to deliver learning that enables the organization’s immediate and evolving priorities.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Involve key stakeholders, identify immediate priorities, and conduct high-level triage of L&D.
Determine learning needs and ability to realistically deliver learning. Leverage existing or curate learning content that can support learning needs.
Identify technical requirements for the chosen delivery method and draft a four- to six-week action plan.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Review the CSFs that are of strategic importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.
Review the CSFs that are of tactical, commodity, and operational importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.
Review your RFx and build an initial list of vendor/implementors to reach out to. Finally, build your evaluation checklist to rate the incoming responses.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Review the critical success factors that are of strategic importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.
ERP strategy model defined
Strategic needs identified
1.1 Review the business context.
1.2 Build your ERP strategy model.
1.3 Assess your strategic needs.
ERP strategy model
ERP strategy model
Strategic needs analysis
Review the critical success factors that are of tactical, commodity, and operational importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.
Tactical, commodity, and operational needs identified
2.1 Assess your tactical needs.
2.2 Assess your commodity needs.
2.3 Assess your operational needs.
Tactical needs analysis
Commodity needs analysis
Operational needs analysis
Review your RFx and build an initial list of vendor/implementors to reach out to. Finally, build your evaluation checklist to rate the incoming responses.
Draft RFI or RFP
Target vendor list
3.1 Decide on an RFI or RFP.
3.2 Complete the RFx with the needs analysis.
3.3 Build a list of targeted vendors
Draft RFI or RFP
Draft RFI or RFP
Target vendor list
Build a scoring template for use in vendor evaluation to ensure consistent comparison criteria are used.
A consistent and efficient evaluation process
4.1 Assign weightings to the evaluation criteria.
4.2 Run a vendor evaluation simulation to validate the process.
Completed partner evaluation tool
Jammer! U bent te laat.
De VOKA Bedrijven Contact Dagen 2025 zijn voorbij en onze winnaars zijn bekend!
Liguris: 80 points
Keiretsu: 71 points
Staffler: 69 points
Xpo group: 67 points
Actief: 66 points
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Review previous communications to prepare for your first day.
Understand how the business operates and develop meaningful relationships with your sphere of influence.
Inventory company assets to know what to protect.
Evaluate the security posture of the organization by leveraging Info-Tech’s IT Security diagnostic program.
Communicate your security vision to business stakeholders.
There are three critical components to the grant application process:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify grant funding opportunities that align with your organization's priorities. Ensure the programs, services, projects, and initiatives that align with these priorities can be financially supported by grant funding.
Prioritize applying for the grant opportunities that your organization identified. Be sure to consider the feasibility of implementing the project or initiative if your organization is awarded the grant.
Write a competitive grant application that has been strategically developed and actively critiqued by various internal and external reviewers.
Submit an exemplary grant application that meets the guidelines and expectations of the granting agency prior to the due date.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine the key priorities of your organization and identify grant funding opportunities that align with those priorities.
Prevents duplicate grant applications from being submitted
Ensures the grant and the organization's priorities are aligned
Increases the success rate of grant applications
1.1 Discuss grant funding opportunities and their importance to the organization.
1.2 Identify organizational priorities.
An understanding of why grants are important to your organization
A list of priorities being pursued by your organization
Identify potential grant funding opportunities that align with the projects/initiatives the organization would like to pursue. Prioritize these funding opportunities and identify which should take precedent based on resourcing, importance, likelihood of success, and feasibility.
Generate a list of potential funding opportunities that can be revisited when resources allow
Obtain consensus from your working group on which grants should be pursued based on how they have been prioritized
2.1 Develop a list of potential grant funding opportunities.
2.2 Define the resource capacity your organization has to support the granting writing process.
2.3 Discuss and prioritize grant opportunities
A list of potential grant funding opportunities
Realistic expectations of your organization's capacity to undertake the grant writing lifecycle
Notes and priorities from your discussion on grant opportunities
Take the grant that was given top priority in the last section and sketch out a draft of what that application will look like. Think critically about the sketch and determine if there are opportunities to further clarify and demonstrate the goals of the grant application.
A sketch ready to be developed into a grant application
A critique of the sketch to ensure that the application will be well understood by the reviewers of your submission
3.1 Sketch the grant application.
3.2 Perform a SWOT analysis of the grant sketch.
A sketched version of the grant application ready to be drafted
A SWOT analysis that critically examines the sketch and offers opportunities to enhance the application
Have the grant application actively critiqued by various internal and external individuals. This will increase the grant application's quality and generate understanding of the application submission and post-submission process.
A list of individuals (internal and external) that can potentially review the application prior to submission
Preparation for the submission process
An understanding of why the opportunity to learn how to improve future grant applications is so important
4.1 Identify potential individuals who will review the draft of your grant application.
4.2 Discuss next steps around the grant submission.
4.3 Review grant writing best practices.
A list of potential individuals who can be asked to review and critique the grant application
An understanding of what the next steps in the process will be
Knowledge of grant writing best practices
Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.
A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this research to identify and quantify the potential strategic impacts caused by vendors. Use Info-Tech’s approach to look at the strategic impact from various perspectives to better prepare for issues that may arise.
By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.
Like most people, organizations are poor at assessing the likelihood of risk. If the past few years have taught us anything, it is that the probability of a risk occurring is far more flexible in the formula Risk = Likelihood * Impact than we ever thought possible. The impacts of these risks have been catastrophic, and organizations need to be more adaptive in managing them to strengthen their strategic plans.
Frank Sewell,
Research Director, Vendor Management
Info-Tech Research Group
Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.
A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.
Identifying and managing a vendor’s potential strategic impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes affect strategic plans.
Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.
Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
Prioritize and classify your vendors with quantifiable, standardized rankings.
Prioritize focus on your high-risk vendors.
Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Impacts Tool.
Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market. Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.
This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.
This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.
The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.
When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.
Below are some things no one expected to happen in the last few years:
of IT professionals are more concerned about being a victim of ransomware than they were a year ago.
of Microsoft’s non-essential employees shifted to working from home in 2020, joining the 18% already remote.
of organizations invested in web conferencing technology to facilitate collaboration.
Source: Info-Tech Tech Trends Survey 2022
Make sure you have the right people at the table to identify and plan to manage impacts.
Very few people could have predicted that a global pandemic would interrupt business on the scale experienced today. Organizations should look at their lessons learned and incorporate adaptable preparations into their strategic planning moving forward.
The IT market is an ever-shifting environment. Larger companies often gobble up smaller ones to control their sectors. Incorporating plans to manage those shifts in ownership will be key to many strategic plans that depend on niche vendor solutions for success. Be sure to monitor the potentially affected markets on an ongoing cadence.
Organizations need to accept that shortages will recur periodically and that preparing for them will significantly increase the success potential of long-term strategic plans. Understand what your business needs to stock for project needs and where those supplies are located, and plan how to rapidly access and distribute them as required if supply chain disruptions occur.
For example:
Sometimes an organization has the right mindset to take advantage of the changes in the market but can fail to plan for the particulars.
When your strategic plan changes, you need to revisit all the steps in the processes to ensure a successful outcome.
It is important to identify potential risks to strategic plans to manage the risk and be agile enough in planning to adapt to the changing environments.
Info-Tech Insight
Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.
(Adapted from COSO)
Organizations build portions of their strategies around chosen vendors and should protect those plans against the risks of unforeseen acquisitions in the market.
Is your vendor solvent? Does it have enough staff to accommodate your needs? Has its long-term planning been affected by changes in the market? Is it unique in its space?
Organizations’ strategic plans need to be adaptable to avoid vendors’ negative actions causing an expedited shift in priorities.
For example, Philip's recall of ventilators impacted its products and the availability of its competitor’s products as demand overwhelmed the market.
Organizations need to become better at risk assessment and actively manage the identified risks to their strategic plans.
Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.
Strategic risk impacts are often unanticipated, causing unforeseen downstream effects. Anticipating the potential changes in the global IT market and continuously monitoring vendors’ risk levels can help organizations modify their strategic alignment with the new norms.
Review your strategic plans for new risks and evolving likelihood on a regular basis.
Keep in mind Risk = Likelihood x Impact (R=L*I).
Impact (I) tends to remain the same, while Likelihood (L) is a very flexible variable.
Organizations need to be reviewing their strategic risk plans considering the likelihood of incidents in the global market.
Pandemics, extreme weather, and wars that affect global supply chains are a current reality, not unlikely scenarios.
Sometimes disasters occur despite our best plans to manage them.
When this happens, it is important to document the lessons learned and improve our plans going forward.
Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.
Download the Strategic Risk Impact Tool
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Industry: Airline
Impact categories: Pandemic, Lockdowns, Travel Bans, Increased Fuel Prices
The pandemic prompted systemic change to the overall strategic planning of the airline industry.
Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market.
Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.
Olaganathan, Rajee. “Impact of COVID-19 on airline industry and strategic plan for its recovery with special reference to data analytics technology.” Global Journal of Engineering and Technology Advances, vol 7, no 1, 2021, pp. 033-046.
Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012.
Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Define a digital product vision that takes into account your objectives, business value, stakeholders, customers, and metrics.
Build a structure for your backlog that supports your product vision.
Define standards, ownership for your backlog to effectively communicate your strategy in support of your digital product vision.
Understand what to consider when planning your next release.
Build a plan for communicating and updating your strategy and where to go next.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the elements of a good product vision and the pieces that back it up.
Provide a great foundation for an actionable vision and goals people can align to.
1.1 Build out the elements of an effective digital product vision
Completed product vision definition for a familiar product via the product canvas
Define the standards and approaches to populate your product backlog that support your vision and overall strategy.
A prioritized backlog with quality throughout that enables alignment and the operationalization of the overall strategy.
2.1 Introduction to key activities required to support your digital product vision
2.2 What do we mean by a quality backlog?
2.3 Explore backlog structure and standards
2.4 Define backlog data, content, and quality filters
Articulate the activities required to support the population and validation of your backlog
An understanding of what it means to create a quality backlog (quality filters)
Defining the structural elements of your backlog that need to be considered
Defining the content of your backlog and quality standards
Define standards and procedures for creating and updating your roadmap.
Enable your team to create a product roadmap to communicate your product strategy in support of your digital product vision.
3.1 Disambiguating backlogs vs. roadmaps
3.2 Defining audiences, accountability, and roadmap communications
3.3 Exploring roadmap visualizations
Understand the difference between a roadmap and a backlog
Roadmap standards and agreed-to accountability for roadmaps
Understand the different ways to visualize your roadmap and select what is relevant to your context
Build a release plan aligned to your roadmap.
Understand what goes into defining a release via the release canvas.
Considerations in communication of your strategy.
Understand how to frame your vision to enable the communication of your strategy (via an executive summary).
4.1 Lay out your release plan
4.2 How to introduce your product vision
4.3 Communicate changes to your strategy
4.4 Where do we get started?
Release canvas
An executive summary used to introduce other parties to your product vision
Specifics on communication of the changes to your roadmap
Your first step to getting started
Brands that fail to invest in brand awareness are likely to face some, if not all these problems:
Awareness brings visibility and traction to brands, which is essential in taking the market leadership position and becoming the trusted brand that buyers think of first.
Brand awareness also significantly contributes to increasing brand equity, market valuation, and business sustainability.
Building brand awareness allows for the increase of:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
A two-step approach to building brand awareness, starting with defining the brand foundations and then implementing effective brand awareness strategies and tactics.
With this set of tools, you will be able to capture and analyze your target market, your buyers and their journeys, define your brand's values, personality, and voice, and develop all the key elements of your brand guidelines to enable people within your organization and external resources to build a consistent and recognizable image across all assets and platforms.
These tools will allow you to achieve strategic alignment and readiness, create assets and workflows, deploy tactics, establish Key Performance Indicators (KPIs), and monitor and optimize your strategy on an ongoing basis.
Achieving high brand awareness in a given market and becoming the benchmark for buyers
is what every brand wants to achieve, as it is a guarantee of success. Building brand awareness,
even though its immediate benefits are often difficult to see and measure, is essential for companies that want to stand out from their competitors and continue to grow in a sustainable way. The return on investment (ROI) may take longer, but the benefits are also greater than those achieved through short-term initiatives with the expectation of immediate, albeit often limited, results.
Brands that are familiar to their target market have greater credibility, generate more sales,
and have a more loyal customer base. CMOs that successfully execute brand awareness programs
build brand equity and grow company valuation.

Nathalie Vezina
Marketing Research Director
SoftwareReviews Advisory
Brand leaders know that brand awareness is essential to the success of all marketing and sales activities. Brands that fail to invest in brand awareness are likely to face some, if not all these problems:
Convincing stakeholders of the benefits of strong brand awareness can be difficult when the positive outcomes are hard to quantify, and the return on investment (ROI) is often long-term. Among the many obstacles brand leaders must overcome are:
Inspired by top-performing businesses and best practices, this blueprint provides the guidance and tools needed to successfully build awareness and help businesses grow. By following these guidelines, brand leaders can expect to:
"A brand is the set of expectations, memories, stories, and relationships that, taken together, account for a consumer's decision to choose one product or service over another."
– Seth Godin
Brand awareness is the degree to which buyers are familiar with and recognize the attributes and image of a particular brand, product, or service. The higher the level of awareness, the more likely the brand is to come into play when a target audience enters the " buying consideration" phase of the buyer's journey.
Brand awareness also plays an important role in building equity and increasing business valuation. Brands that are familiar to their target market have greater credibility, drive more sales and have a more loyal customer base.
Building brand awareness allows increasing:
"Products are made in a factory, but brands are created in the mind."
Source: Walter Landor
Market leader position
Developing brand awareness is essential to increase the visibility and traction of a brand.
Several factors may cause a brand to be not well-known. One reason might be that the brand recently launched, such as a startup. Another reason could be that the brand has rebranded or entered a new market.
To become the trusted brand that buyers think of first in their target markets, it is critical for these brands to develop and deploy comprehensive, multi-touchpoint brand awareness strategies.
A relationship leading to loyalty
A longer-term brand awareness strategy helps build a strong relationship between the brand and the buyer, fostering a lasting and rewarding alliance.
It also enables brands to reach and engage with their target audience effectively by using compelling storytelling and meaningful content.
Adopting a more human-centric approach and emphasizing shared values makes the brand more attractive to buyers and can drive sales and gain loyalty.
Sustainable business growth
For brands that are not well established in their target market, short-term tactics that focus on immediate benefits can be ineffective. In contrast, long-term brand awareness strategies provide a more sustainable ROI (return on investment).
Investing in building brand awareness can impact a business's ability to interact with its target audience, generate leads, and increase sales. Moreover, it can significantly contribute to boosting the business's brand equity and market valuation.
"Quick wins may work in the short term, but they're not an ideal substitute for long-term tactics and continued success."
Source: Forbes
Unfamiliar brands, despite their strong potential, won't thrive unless they invest in their notoriety.
Brands that choose not to invest in longer-term awareness strategies and rely solely on short-term growth tactics in hopes of an immediate gain will see their ability to grow diminished and their longevity reduced due to a lack of market presence and recognition.
Symptoms of a weakening brand include:
"Your brand is the single most important investment you can make in your business."
Source: Steve Forbes
Become the top-of-mind brand in your target market.
To stand out, be recognized by their target audience, and become major players in their industry, brands must adopt a winning strategy that includes the following elements:
How far are you from being the brand buyers think of first in your target market?

Based on David Aaker's brand loyalty pyramid
Focus on effective ways to gain brand recognition in the minds of buyers.

Brand recognition requires in-depth knowledge of the target market, the creation of strong brand attributes, and increased presence and visibility.
To implement a winning brand awareness-building strategy, you must:
Find your "winning zone" and how your brand uniquely addresses buyers' pain points.
Focus on your key differentiator
A brand has found its "winning zone" or key differentiator when its value proposition clearly shows that it uniquely solves its buyers' specific pain points.
Align with your target audience's real expectations and successfully interact with them by understanding their persona and buyer's journey. Know:

Define and present a consistent voice across all channels and assets.
The voice reflects the personality of the brand and the emotion to be transmitted. That's why it's crucial to establish strict rules that define the language to use when communicating through the brand's voice, the type of words, and do's and don'ts.
To be recognizable it is imperative to avoid inconsistencies. No matter how many people are behind the brand voice, the brand must show a unique, distinctive personality. As for the tone, it may vary according to circumstances, from lighter to more serious.
Up to 80% Increased customer recognition when the brand uses a signature color scheme across multiple platforms
Source: startup Bonsai
23% of revenue increase is what consistent branding across channels leads to.
Source: Harvard Business Review
When we close our eyes and listen, we all recognize Ella Fitzgerald's rich and unique singing voice.
We expect to recognize the writing of Stephen King when we read his books. For the brand's voice, it's the same. People want to be able to recognize it.
If your brand was a person, who would it be?
Physically attractive
Intellectually stimulating
Sociable
Emotionally connected
Morally sound
Personable
0.05 Seconds is what it takes for someone to form an opinion about a website, and a brand.
Source: 8ways
90% of the time, our initial gut reaction to products is based on color alone.
Source: startup Bonsai
56% of the final b2b purchasing decision is based on emotional factors.
Source: B@B International
Brands that focus on the values they share with their buyers, rather than simply on a product or service, succeed in making meaningful emotional connections with them and keep them actively engaged.
Shared values such as transparency, sustainability, diversity, environmental protection, and social responsibility become the foundation of a solid relationship between a brand and its audience.
The key is to know what motivates the target audience.
86% of consumers claim that authenticity is one of the key factors they consider when deciding which brands they like and support.
Source: Business Wire
56% of the final decision is based on having a strong emotional connection with the supplier.
Source: B2B International
64% of today's customers are belief-driven buyers; they want to support brands that "can be a powerful force for change."
Source: Edelman
"If people believe they share values with a company, they will stay loyal to the brand."
– Howard Schultz
Source: Lokus Design
Develop your digital presence and reach out to your target audiences through multiple touchpoints.
Beyond engaging content, reaching the target audience requires brands to connect and interact with their audience in multiple ways so that potential buyers can form an opinion.
With the right message consistently delivered across multiple channels, brands increase their reach, create a buzz around their brand and raise awareness.
73% of today's consumers confirm they use more than one channel during a shopping journey
Source: Harvard Business Review
Social media platforms represent a cost-effective opportunity for businesses to connect and influence their audience and tell their story by posting relevant and search-engine-optimized content regularly on their account and groups. It's also a nice gateway to their website.
Building a relationship with their target buyer through social media is also an easy way for businesses to:
75% of B2B buyers and 84% of C-Suite executives use social media when considering a purchase
Source: LinkedIn Business
92% of B2B buyers use social media to connect with leaders in the sales industry.
Source: Techjury
With over 4.5 billion social media users worldwide, and 13 new users signing up to their first social media account every second, social media is fast becoming a primary channel of communication and social interaction for many.
Source: McKinsey
Thought leadership is about building credibility
by creating and publishing meaningful, relevant content that resonates with a target audience.
Thought leaders write and publish all kinds of relevant content such as white papers, ebooks, case studies, infographics, video and audio content, webinars, and research reports.
They also participate in speaking opportunities, live presentations, and other high-visibility forums.
Well-executed thought leadership strategies contribute to:
60% of buyers say thought leadership builds credibility when entering a new category where the brand is not already known.
Source: Edelman | LinkedIn
70% of people would rather learn about a company through articles rather than advertising.
Source: Brew Interactive
57% of buyers say that thought leadership builds awareness for a new or little-known brand.
Source: Edelman | LinkedIn
To achieve best results
Avoid
The strength of personal branding is amplified when individuals and companies collaborate to pursue personal branding initiatives that offer mutual benefits. By training and positioning key employees as brand ambassadors and industry influencers, brands can boost their brand awareness through influencer marketing strategies.
Personal branding, when well aligned with business goals, helps brands leverage their key employee's brands to:
About 90% of organizations' employee network tends to be completely new to the brand.
Source: Everyone Social
8X more engagement comes from social media content shared by employees rather than brand accounts.
Source: Entrepreneur
561% more reach when brand messages are shared by employees on social media, than the same message shared by the Brand's social media.
Source: Entrepreneur
"Personal branding is the art of becoming knowable, likable and trustable."
Source: Founder Jar, John Jantsch
Influencers are trusted industry experts and analysts who buyers can count on to provide reliable information when looking to make a purchase.
Influencer marketing can be very effective to reach new audiences, increase awareness, and build trust. But finding the right influencers with the level of credibility and visibility brands are expecting can sometimes be challenging.
Search for influencers that have:
76% of people say that they trust content shared by people over a brand.
Source: Adweek
44% increased media mention of the brand using B2B influencer marketers.
Source: TopRank Marketing
Retain your customers and turn them into brand advocates by building trust, providing an exceptional experience, and most importantly, continuously delivering on the brand promise.
Implement a strong customer advocacy program, based on personalized experiences, the value provided, and mutual exchange, and reap the benefits of developing and growing long-term relationships.
92% of individuals trust word-of-mouth recommendations, making it one of the most trust-rich forms of advertising.
Source: SocialToaster
Word-of-mouth (advocacy) marketing increases marketing effectiveness by 54%
Source: SocialToaster
Building and maintaining high brand awareness requires that each individual within the organization carry and deliver the brand message clearly and consistently across all media whether in person, in written communications, or otherwise.
To achieve this, brand leaders must first develop a powerful, researched narrative that people will embrace and convey, which requires careful preparation.
Target market and audience intel
Brand attributes
Brand visibly and recall
Brand awareness building plan
"Strong brands outperform their less recognizable
competitors by as much as 73%."
Source: McKinsey
Building brand awareness, even though immediate benefits are often difficult to see and measure, is essential for companies to stand out from their competitors and continue to grow in a sustainable way.
To successfully raise awareness, brands need to have:
Without brand awareness, brands become less attractive to buyers, talent, and investors, and their ability to grow, increase their market value, and be sustainable is reduced.
Brand awareness building methodology
Define brands' personality and message
Start building brand awareness
Toolkit
Short and long-term benefits of increasing brand awareness
Increase:
It typically takes 5-7 brand interactions before a buyer remembers the brand.
Source: Startup Bonsai
This research is being designed for:
Brand and marketing leaders who:
This research will also assist:
This research will help you:
This research will help them:
Phase 1 Define brands' personality and message |
Phase 2 Start building brand awareness |
|
|---|---|---|
Phase steps |
1.1 Gather market intelligence and analyze the market. 1.2 Develop and document the buyer's persona and journey. 1.3 Uncover the brand mission, vision statement, core values, value proposition and positioning. 1.4 Define the brand's archetype and tone of voice, then craft a compelling brand messaging. |
2.1 Achieve strategy alignment and readiness. 2.2 Create assets and workflows and deploy tactics. 2.3 Establish key performance indicators (KPIs), monitor, and optimize on an ongoing basis. |
Phase outcomes |
|
|
Brands to adapt their strategies to achieve longer-term growth
Brands must adapt and adjust their strategies to attract informed buyers who have access to a wealth of products, services, and brands from all over. Building brand awareness, even though immediate benefits are often difficult to see and measure, has become essential for companies that want to stand out from their competitors and continue to grow in a sustainable way.
A more human-centric approach
Brand personalities matter. Brands placing human values at the heart of the customer-brand relationship will drive interest in their brand and build trust with their target audience.
Stand out from the crowd
Brands that develop and promote a clear and consistent message across all platforms and channels, along with a unique value proposition, stand out from their competitors and get noticed.
A multi-touchpoints strategy
Engage buyers with relevant content across multiple media to address their pain points. Analyze touchpoints to determine where to invest your efforts.
Going social
Buyers expect brands to be active and responsive in their interactions with their audience. To build awareness, brands are expected to develop a strong presence on social media by regularly posting relevant content, engaging with their followers and influencers, and using paid advertising. They also need to establish thought leadership through content such as white papers, case studies, and webinars.
Thought leaders wanted
To enhance their overall brand awareness strategy, organizations should consider developing the personal brand of key executives. Thought leadership can be a valuable method to gain credibility, build trust, and drive conversion. By establishing thought leadership, businesses can increase brand mentions, social engagement, website traffic, lead generation, return on investment (ROI), and Net Promoter Score (NPS).
Collaborating with SoftwareReviews analysts for inquiries not only provides valuable advice but also leads to substantial cost savings during branding activities, particularly when partnering with an agency.
| Guided Implementation | Purpose | Measured Value |
|---|---|---|
| Build brands' personality and message | Get the key elements of the brand guidelines in place and ready to use, along with your existing logo, typography, color palette, and imagery, to ensure consistency and clarity across all brand touchpoints from internal communication to customer-facing materials. | Working with SoftwareReviews analysts to develop brand guidelines saves costs compared to hiring an agency.
Example: Building the guidelines with an agency will take more or less the same amount of time and cost approximately $80K. |
| Start building brand awareness | Achieve strategy alignment and readiness, then deploy tactics, assets, and other deliverables. Start building brand awareness and reap the immediate and long-term benefits. | Working with SoftwareReviews analysts and your team to develop a long-term brand strategy and deployment will cost you less than a fraction of the cost of using an agency. Example: Developing and executing long-term brand awareness strategies with an agency will cost between $50-$75K/month over a 24-month period minimum. |
Phase 1Build brands' personality and message |
Phase 2Start building brand awareness |
||
|---|---|---|---|
|
|
|
|
A Guided Implementation (GI) is a series of calls with a SoftwareReviews Marketing Analyst to help implement our best practices in your organization.
Your engagement managers will work with you to schedule analyst calls.
Each step of this blueprint comes with tools to help you build brand awareness.
Brand Awareness Tool Kit
This kit includes a comprehensive set of tools to help you better understand your target market and buyers, define your brand's personality and message, and develop an actionable brand awareness strategy, workflows, and rollout plan.
The set includes these templates:
|
![]() |
Define brands' personality and message
Start building brand awareness
Steps
1.1 Gather market intelligence and analyze the market.
1.2 Develop and document the buyer's persona and journey.
1.3 Uncover the brand mission, vision statement, core values, positioning, and value proposition.
1.4 Define the brand's archetype and tone of voice, then craft a compelling brand messaging.
Phase outcome
Total duration: 2.5-8 hours
Objective
Analyze and document your competitive landscape, assess your strengths, weaknesses, opportunities,
and threats, gauge the buyers' familiarity with your brand, and identify the forces of influence.
Output
This exercise will allow you to understand your market and is essential to developing your value proposition.
Participants
MarTech
May require you to:
Tools
1.1.1 SWOT and competitive landscape (60-120 min.) |
|
|---|---|
Analyze & Document |
Follow the instructions in the Market Analysis Template to complete the SWOT and Competitive Analysis, slides 4 to 7. |
1.1.3 Internal and External Factors (30-60 min.) |
|
|---|---|
Analyze |
Follow the instructions in the External and Internal Factors Analysis Template to perform the PESTLE, Porter's 5 Forces, and Internal Factors and VRIO Analysis. |
Transfer |
Transfer key information into slides 10 and 11 of the Market Analysis Template. |
Consult SoftwareReviews website to find the best survey and MarTech platforms or contact one of our analysts for more personalized assistance and guidance
1.1.2 Brand recognition (60-300 min.) |
|
|---|---|
Prep |
Adapt the survey and interview questions in the Brand Recognition Survey Questionnaire and List Template. Determine how you will proceed to conduct the survey and interviews (internal or external resources, and tools). Refer to the Survey Emails Best Practices Guidelines for more information on how to conduct email surveys. |
Collect & Analyze |
Use the Brand Recognition Survey Questionnaire and List Template to build your list, conduct the survey /interviews, and collect and analyze the feedback received. |
Transfer |
Transfer key information into slides 8 and 9 of the Market Analysis Template. |
Have you considered diagnosing your brand's current performance before you begin building brand awareness?
Audit your brand using the Diagnose Brand Health to Improve Business Growth blueprint.Collect and interpret qualitative and quantitative brand performance measures.
The toolkit includes the following templates:
Also included is an executive presentation template to communicate the results to key stakeholders and recommendations to fix the uncovered issues.
Total duration: 4-8 hours
Objective
Gather existing and desired customer insights and conduct market research to define and personify your buyers' personas and their buying behaviors.
Output
Provide people in your organization with clear direction on who your target buyers are and guidance on how to effectively reach and engage with them throughout their journey.
Participants
MarTech
May require you to:
Tools
1.2.1 Buyer Personas and Journeys (240-280 min.) |
|
|---|---|
Research |
Identify your tier 1 to 3 customers using the Ideal Client Profile (ICP) Workbook. (Recommended) Survey and interview existing and desired customers based using the Buyer Persona and Journey Interview Guide and Data Capture Tool. (Recommended) |
Create |
Define and document your tier 1 to 3 Buyer Personas and Journeys using the Buyer Personas and Journeys Presentation Template. |
Consult SoftwareReviews website to find the best survey platform for your needs or contact one of our analysts for more personalized assistance and guidance
Buyer Personas and Journeys
A well-defined buyer persona and journey is a great way for brands to ensure they are effectively reaching and engaging their ideal buyers through a personalized buying experience.
When properly documented, it provides valuable insights about the ideal customers, their needs, challenges, and buying decision processes allowing the development of initiatives that correspond to the target buyers.
Total duration: 4-5.5 hours
Objective
Define the "raison d'être" and fundamental principles of your brand, your positioning in the marketplace, and your unique competitive advantage.
Output
Allows everyone in an organization to understand and align with the brand's raison d'être beyond the financial dimension, its current positioning and objectives, and how it intends to achieve them.
It also serves to communicate a clear and appealing value proposition to buyers.
Participants
Tools
1.3.1 Brand Purpose, Mission, Vision, and Values (90-120 min.) |
|
|---|---|
Capture or Develop |
Capture or develop, if not already existing, your brand's purpose, mission, vision statement, and core values using slides 4 to 7 of the Brand Purpose, Mission, Vision, and Values Template. |
1.3.2 Brand Value Proposition and Positioning (150-210 min.) |
|
|---|---|
Define |
Map the brand value proposition using the canvas on slide 5 of the Value Proposition and Positioning Statement Template, and clearly articulate your value proposition statement on slide 4. Optional: Use canvas on slide 7 to develop product-specific product value propositions. On slide 8 of the same template, develop your brand positioning statement. |
Total duration: 5-8 hours
Objective
Define your unique brand voice and develop a set of guidelines, brand story, and messaging to ensure consistency across your digital and non-digital marketing and communication assets.
Output
A documented brand personality and voice, as well as brand story and message, will allow anyone producing content or communicating on behalf of your brand to do it using a unique and recognizable voice, and convey the right message.
Participants
Tools
1.4.1 Brand Archetype and Tone of Voice (120-240 min.) |
|
|---|---|
Define and document |
Refer to slides 5 and 6 of the Brand Voice Guidelines Template to define your brand personality (archetype), slide 7. Use the Brand Voice Guidelines Template to define your brand tone of voice and characteristics on slides 8 and 9, based on the 4 primary tone of voice dimensions, and develop your brand voice chart, slide 9. |
Set Rules |
In the Writing Style Guide template, outline your brand's writing principles, style, grammar, punctuation, and number rules. |
1.4.2 Brand Messaging (180-240 min.) |
|
|---|---|
Craft |
Use the Brand Messaging template, slides 4 to 7, to craft your brand story and message. |
Audit |
Create a content audit to review and approve content to be created prior to publication, using the Writer's Checklist template. |
A consistent brand voice leads to remembering and trusting the brand. It should stand out from the competitors' voices and be meaningful to the target audience. Once the brand voice is set, avoid changing it.
Steps
2.1 Achieve strategy alignment and readiness.
2.2 Create assets and workflows, and deploy tactics.
2.3 Establish key performance indicators (KPIs), monitor, and optimize on an ongoing basis.
Phase outcome
Total duration: 4-5 hours
Objective
Now that you have all the key elements of your brand guidelines in place, in addition to your existing logo, typography, color palette, and imagery, you can begin to build brand awareness.
Start planning to build brand awareness by developing a comprehensive and actionable brand awareness strategy with tactics that align with the company's purpose and objectives. The strategy should include achievable goals and measurables, budget and staffing considerations, and a good workload assessment.
Output
A comprehensive long-term, actionable brand awareness strategy with KPIs and measurables.
Participants
Tools
2.1.1 Brand Awareness Analysis (60-120 min.) | |
|---|---|
Identify | In slide 5 of the Brand Awareness Strategy and Tactics Template, identify your top three brand awareness drivers, opportunities, inhibitors, and risks to help you establish your strategic objectives in building brand awareness. |
2.1.2 Brand Awareness Strategy (60-120 min.) | |
|---|---|
Elaborate | Use slides 6 to 10 of the Brand Awareness Strategy and Tactics Template to elaborate on your strategy goals, key issues, and tactics to begin or continue building brand awareness. |
2.1.3 Brand Awareness KPIs and Metrics (180-240 min.) |
|
|---|---|
Set |
Set the strategy performance metrics and KPIs on slide 11 of the Brand Awareness Strategy and Tactics Template. |
Monitor |
Once you start executing the strategy, monitor and report each quarter using slides 13 to 15 of the same document. |
Understanding the difference between strategies and tactics
Strategies and tactics can easily be confused, but although they may seem similar at times, they are in fact quite different.
Strategies and tactics are complementary.
A strategy is a plan to achieve specific goals, while a tactic is a concrete action or set of actions used to implement that strategy.
To be effective, brand awareness strategies should be well thought-out, carefully planned, and supported by a series of tactics to achieve the expected outcomes.
Step 2.2 Create assets and workflows and deploy tactics.
Total duration: 3.5-4.5 hours
Objective
Build a long-term rollout with deliverables, milestones, timelines, workflows, and checklists. Assign resources and proceed to the ongoing development of assets. Implement, manage, and continuously communicate the strategy and results to key stakeholders.
Output
Progressive and effective development and deployment of the brand awareness-building strategy and tactics.
Participants
Tools
2.2.1 Assets Creation List (60-120 min.) | |
|---|---|
Inventory | Inventory existing assets to create the Asset Creation and Management List. |
Assign | Assign the persons responsible, accountable, consulted, and informed of the development of each asset, using the RACI model in the template. Ensure you identify and collaborate with the right stakeholders. |
Prioritize | Prioritize and add release dates. |
Communicate | Update status and communicate regularly. Make the list with links to the assets available to the extended team to consult as needed. |
2.2.2 Rollout Plan (60-120 min.) | |
|---|---|
Inventory | Map out your strategy deployment in the Brand Awareness Strategy Rollout Plan Template and workflow in the Campaign Workflow Template. |
Assign | Assign the persons responsible, accountable, consulted, and informed for each tactic, using the RACI model in the template. Ensure you identify and collaborate with the right stakeholders. |
Prioritize | Prioritize and adjust the timeline accordingly. |
Communicate | Update status and communicate regularly. Make the list with links to the assets available to the extended team to consult as needed. |
Band Awareness Strategy Rollout Plan
A strategy rollout plan typically includes the following:
Step 2.3 Establish key performance indicators (KPIs), monitor, and optimize on an ongoing basis.
Total duration: 3.5-4.5 hours
Objective
Brand awareness is built over a long period of time and must be continuously monitored in several ways. Measuring and monitoring the effectiveness of your brand awareness activities will allow you to constantly adjust your tactics and continue to build awareness.
Output
This step will provide you with a snapshot of your current level of brand awareness and interactions with the brand, and allow you to set up the tools for ongoing monitoring and optimization.
Participants
MarTech
May require you to:
Tools
2.2.2 Rollout Plan (60-120 min.) | |
|---|---|
Measure | Monitor and record the strategy performance metrics in slides 12 to 15 of the Brand Awareness Strategy and Tactics template, and gauge its performance against preset KPIs in slide 11. Make ongoing improvements to the strategy and assets. |
Communicate | The same slides in which you monitor strategy performance can be used to report on the results of the current strategy to key stakeholders on a monthly or quarterly basis, as appropriate. Take this opportunity to inform stakeholders of any adjustments you plan to make to the existing plan to improve its performance. Since brand awareness is built over time, be sure to evaluate the results based on how long the strategy has been in place before making major changes. |
Consult SoftwareReviews website to find the best survey, brand monitoring and feedback, and MarTech platforms, or contact one of our analysts for more personalized assistance and guidance
Measuring brand strategy performance
There are two ways to measure and monitor your brand's performance on an ongoing basis.
SoftwareReviews can help you choose the right platform for your need. We also equip you with manual tools, available with the Diagnose Brand Health to Improve Business Growthblueprint to measure:
![]() |
![]() |
Create a Buyer Persona and Journey Get deeper buyer understanding and achieve product-market fit, with easier access to market and sales
|
Diagnose Brand Health to Improve Business Growth Have a significant and well-targeted impact on business success and growth by knowing how your brand performs, identifying areas of improvement, and making data-driven decisions to fix them.
|
Aaker, David. "Managing Brand Equity." Simon & Schuster, 1991.
"6 Factors for Brands to Consider While Designing Their Communication." Lokus Design, 23 Sept. 2022.
"20 Advocacy Marketing Statistics You Need to Know." Social Toaster, n.d.
Bazilian, Emma. "How Millennials and Baby Boomers Consume User-Generated Content And what brands can learn from their preferences." Adweek, January 2, 2017.
B2B International, a Gyro: company, B2B Blog - Why Human-To-Human Marketing Is the Next Big Trend in a Tech-Obsessed World.
B2B International, a Gyro: company, The State of B2B Survey 2019 - Winning with Emotions: How to Become Your Customer's First Choice.
Belyh, Anastasia. "Brand Ambassador 101:Turn Your Personal Brand into Cash." Founder Jar, December 6, 2022.
Brand Master Academy.com.
Businesswire, a Berkshire Hathaway Company, "Stackla Survey Reveals Disconnect Between the Content Consumers Want & What Marketers Deliver." February 20, 2019.
Chamat, Ramzi. "Visual Design: Why First Impressions Matter." 8 Ways, June 5, 2019.
Cognism. "21 Tips for Building a LinkedIn Personal Brand (in B2B SaaS)."
Curleigh, James. "How to Enhance and Expand a Global Brand." TED.
"2019 Edelman Trust Barometer." Edelman.
Erskine, Ryan. "22 Statistics That Prove the Value of Personal Branding." Entrepreneur, September 13, 2016.
Forbes, Steve. "Branding for Franchise Success: How To Achieve And Maintain Brand Consistency Across A Franchise Network?" Forbes, 9 Feb. 2020.
Godin, Seth. "Define: Brand." Seth's Blog, 30 Dec. 2009,
Houragan, Stephen. "Learn Brand Strategy in 7 Minutes (2023 Crash Course)." YouTube.
Jallad, Revecka. "To Convert More Customers, Focus on Brand Awareness." Forbes, October 22, 2019.
Kingsbury, Joe, et al. "2021 B2B Thought Leadership Impact Study." Edelman, 2021.
Kunsman, Todd. "The Anatomy of an Employee Influencer." EveryoneSocial, September 8, 2022.
Landor, Walter. A Brand New World: The Fortune Guide to the 21st Century. Time Warner Books, 1999.
Liedke, Lindsay. "37+ Branding Statistics For 2023: Stats, Facts & Trends." Startup Bonsai, January 2, 2023.
Millman, Debbie. "How Symbols and Brands Shape our Humanity." TED, 2019.
Nenova, Velina. "21 Eye-Opening B2B Marketing Statistics to Know in 2023." Techjury, February 9, 2023.
Perrey, Jesko et al., "The brand is back: Staying relevant in an accelerating age." McKinsey & Company, May 1, 2015.
Schaub, Kathleen. "Social Buying Meets Social Selling: How Trusted Networks Improve the Purchase Experience." LinkedIn Business, April 2014.
Sopadjieva, Emma et al. "A Study of 46,000 Shoppers Shows That Omnichannel Retailing Works." Harvard Business Review, January 3, 2017.
Shaun. "B2B Brand Awareness: The Complete Guide 2023." B2B House. 2023.
TopRank Marketing, "2020 State of B2B Influencer Marketing Research Report." Influencer Marketing Report.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build a best-fit program that creates a learning culture.
Align mentoring practices with culture to improve the appropriateness and effectiveness of the program.
Track project progress and have all program details defined in a central location.
Evaluate the success of the program.
Improve your mentoring capabilities.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This trends and buyer’s guide will help you:
Create your own request for proposal (RFP) for your customer service management suite procurement process by customizing Info-Tech's RFP template.
Use this tool to assess your maturity and fit for a CSM solution. It will help identify your current CSM state and assist with the decision to move forward with a new solution or augment certain features.
Keep stakeholders engaged with simple and friction-free templates to document your progress for Rapid Application Selection.
Leverage a traceable and straightforward Vendor Evaluation Workbook to narrow the field of potential vendors and accelerate the application selection process.
Create an objective and fair scoring process to evaluate the RFPs and demonstrations provided by shortlisted vendors. Within this framework, provide a multidimensional evaluation that analyzes the solution's functional capabilities, architecture, costs, service support, and overall suitability in comparison to the organization's expressed requirements.
Create an organized and streamlined vendor demonstration process by clearly outlining your expectations for the demo. Use the demo as an opportunity to ensure that capabilities expressed by vendors are actually present within the considered solution.
The pandemic and growing younger demographic have shifted the terrain of customer service delivery. Customer service management (CSM) tools ensure organizations enhance customer acquisition, customer retention, and overall revenues into the future.
It is one thing to research customer service best practices; it is another to experience such service. Whether being put on hold for an hour with a telecommunications company, encountering voice biometric security with a bank, or receiving automated FAQs from a chatbot, we all perform our own primary research in customer service by going about our daily lives. Yet while the pandemic required a shift to this multichannel and digital assistant environment (to account for ongoing agent attrition), this trend was actually just accelerated. A growing younger demographic now prefers online communication channels to voice. Social media (whichever the platform) is a fundamental part of this demographic’s online presence and has instigated the need for customer service delivery to meet customers where they are – for both damage control and enhancing customer relationships.
Organizations delivering customer service across multiple product lines need to examine what delivery channels they need to satisfy customers, alongside assessing how customer loyalty and cross-selling can increase revenues and company reputation. Customer service management tools can assist and enable the future state.
Thomas Randall, Ph.D.
Research Director, Info-Tech Research Group
| Your Challenge | Common Obstacles | Info-Tech’s Solution |
|
|
This trends and buyer’s guide will help you:
|
The objective at the end of the day is to have a single interface that the front-line staff interacts with. I think that is the holy grail when we look at CSM technology. The objective that everyone has in mind is we'd all like to get to one screen and one window. Ultimately, the end game really hasn't changed: How can we make it easy for the agents and how can we minimize their errors? How can we streamline the process so they can work?
Colin Taylor, CEO, The Taylor Reach Group
| 1. Contextualize the CSM Landscape | 2. Select the Right CSM Vendor | |
|---|---|---|
| Phase Steps |
|
|
| Phase Outcomes |
|
|
Info-Tech Insight
Need help constructing your RFP? Use Info-Tech’s CSM Platform RFP Template!
| Phase 1 | Phase 2 |
|---|---|
|
Call #1: Discover if CSM tools are right for your organization. Understand what a CSM platform is and discover the “art of the possible.” Call #2: Identify right-sized vendors and build the business case to select a CSM platform. |
Call #3: Define your key CSM requirements. Call #4: Build procurement items, such as an RFP and demo script. Call #5: Evaluate vendors and perform final due diligence. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
The CSM selection process should be broken into segments:
| DIY Toolkit | Guided Implementation | Workshop | Consulting |
|---|---|---|---|
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to his the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks are used throughout all four options
Expert analyst guidance over five weeks on average to select and negotiate software
Save money, align stakeholders, speed up the process, and make better decisions
Use a repeatable, formal methodology to improve your application selection process
Better, faster results, guaranteed, included in membership
40 hours of expert analyst guidance
Project & stakeholder management assistance
Save money, align stakeholders, speed up the process, and make better decisions
Better, faster results, guaranteed, $25,000 standard engagement fee
| MULTIPLE CHANNELS Customers may resolve their issues via a variety of channels, including voice, SMS, email, social media, and live webchat. |
KNOWLEDGE BASE Provide a knowledge base for FAQs that is both customer facing (via customer portal) and agent facing (for live resolutions). |
| ANALYTICS Track customer satisfaction, agent performances, ticket resolutions, backlogs, traffic analysis, and other key performance indicators (KPIs). |
COLLABORATION Enable agents to escalate and collaborate within a unified platform (e.g. tagging colleagues to flag a relevant customer query). |
Info-Tech Insight
After-sales customer service is critical for creating, maintaining, and growing customer relationships. Organizations that fail to provide adequate service will be poorly positioned for future customer service and sales efforts.
INTEGRATIONS
Note what integrations are available for your contact center, CRM, or industry-specific solutions (e.g. inventory management) to get the most out of CSM.
SENTIMENT ANALYSIS
Reads, contextualizes, and categorizes tickets by sentiment (e.g. “positive”) before escalating to an appropriate agent.
AUTO-RESPONSE EDITOR
Built-in AI provides prewritten responses or auto-pulls the relevant knowledge article, assisting agents with speed to resolution.
ATTRIBUTES-BASED ROUTING
Learns over time how best to route tickets to appropriate agents based on skills, availability, or proximity of an agent (e.g. multilingual, local, or specialist agents).
AUTOMATED WORKFLOWS
CSM tool providers have varying usability for workflow building and enablement. Ensure your use cases align.
TICKET PRIORITIZATION
Adapts and prioritizes customer issues by service-level agreement (SLA), priority, and severity according to inputted KPIs.
Good technology will not fix a bad process. I don't care how good the technology is. If the use case is wrong and the process is wrong, it's not going to work.
Colin Taylor, CEO
The Taylor Reach Group
| Real-time | Pre-event | Post-event | |
|---|---|---|---|
| Channel example: Notifications via SMS or social media. | Channel example: Notifications via SMS or social media. | Channel example: Working with an agent or live chatbot. | Channel example: Working with an agent or live chatbot. |
| “Your car may need a check-up for faulty parts.” | “Here is a local garage to fix your tire pressure.” | “I see you have poor tire pressure. Here is a local garage.” | “Thank you for your patience, how can we help?” |
| Predictive Service The CSM recommends mitigation options to the customer before the issue occurs and before the customer knows they need it. |
Proactive Service The issue occurs but the CSM recommends mitigation options to the customer before the customer contacts the organization. |
Real-Time Service The organization offers real-time mitigation options while working with the customer to resolve the issue. |
Reactive Service The customer approaches the organization after the issue occurs, but the organization has no insight into the event. |
Organizations should ask whether they need a standalone CSM solution or a CSM as part of a broader suite of CXM tools. The latter is especially relevant if your organization already invests in a CXM platform.
Customer Service Complexity
Low complexity refers to primarily transactional inquiries. High complexity refers to service workflows for symptom analysis, problem identification, and solution delivery.
Product Complexity
High complexity refers to having a large number of brands and individual SKUs, technologically complex products, and products with many add-ons.
Info-Tech Insight
Use Info-Tech’s CSM Platform Opportunity Assessment Tool to discover your organization’s customer service maturity.
30 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the CSM Platform Opportunity Assessment Tool
| Bypass | Adopt |
|---|---|
| Monochannel approach You do not participate in multichannel campaigns or your customer personas are typically limited to one or two channels (e.g. voice or SMS). |
Multichannel approach You are pursuing multifaceted, customer-specific campaigns across a multitude of channels. |
| Small to mid-sized business with small CX team Do not buy what you do not need. Focus on the foundations of customer experience (CX) first before extending into a full-fledged CSM tool. |
Maturing CX department Customer service needs are extending into managing budgets, generating and segmenting leads, and measuring channel effectiveness. |
| Limited product range CSM tools typically gain return on investment (ROI) if the organization has a complex product range and is looking to increase cross-sell opportunities across different customer personas. |
Multiple product lines Customer base and product lines are large enough to engage in opportunities for cross- and up-selling. |
AkzoNobel
INDUSTRY
Retail
SOURCE
Sprinklr (2021)
Use CSM tools to unify the multichannel experience and reduce response time.
| Challenge | Solution | Results |
| AzkoNobel is a leading global paints and coatings company. AzkoNobel had 60+ fragmented customer service accounts on social media for multiple brands. There was little consistency in customer experience and agent responses. Moreover, the customer journey was not being tracked, resulting in lost opportunities for cross-selling across brands. The result: slow response times (up to one week) and unsatisfied customers, leaving the AzkoNobel brand in a vulnerable state. |
AkzoNobel leveraged Sprinklr, a customer experience software provider, to unify six social channels, 19 accounts, and six brands. Sprinklr aligned governance across social media channels with AzkoNobel’s strategic business goals, emphasizing the need for process, increasing revenue, and streamlining customer service. AzkoNobel was able to use keywords from customers’ inbound messaging to put an escalation process in place. |
Since bringing on Sprinklr in 2015-2016, unifying customer service channels under one multichannel platform resulted in:
|
| 1920s | 1950s | 1967-1973 | 1980-1990s | 2000-2010s |
|---|---|---|---|---|
| The introduction of lines of credit and growth of household appliance innovations meant households were buying products at an unprecedented rate. Department stores would set up customer service sections to assist with live fixes or returns. | Following the Great Depression and World War II, process, efficiency, and computational technology became defining features of customer service. These features were played out in call centers as automatic call distribution (ACD) technology began to scale. | With the development of private automatic branch exchange (PABX), AT&T introduced the toll-free telephone number. Companies began training staff and departments for customer service and building loyalty. With the development of interactive voice response (IVR) in 1973, call centers became increasingly more efficient at routing. | Analog technology shifted to digital and the term “contact center” was coined. These centers began being outsourced internationally. With the advent of the internet, CSM technology (in the early guise of a “help desk”) became equipped with computer telephony integration (CTI). | Software as a service (SaaS) and CRM maturation strengthened the retention and organization of customer data. Social media also enhanced consumer power as companies rushed to prevent online embarrassment. This prompted investment in multichannel customer service. |
2023
Go mobile first
85% of customers believe a company’s mobile website should be just as good as its desktop website. Enabling user-friendly mobile websites provides an effective channel to keep inbound calls down.
2024
Shift from multichannel to omnichannel
Integrating CSM tools with your broader CXM suite enables customer data to seamlessly travel between channels for an omnichannel experience.
2025
Enable predictive service
CSM tools integrate with Internet of Things (IoT) systems to provide automated notifications that alert staff of issues and mitigate issues with customers before the issue even occurs.
2026
Leverage predictive analytics for ML use cases
Use customers’ historic data and preferences to perform better automated customer service over time (e.g. providing personalized resolutions based on previous customer engagements).
Context and scenario play a huge role in measuring good customer service. Ensure your KPIs accurately reflect the incentives you want to give your customer support staff for delivering appropriate customer service.
David Thomas, Customer Service Specialist
Freedom Mobile
(Reve Chat, 2022)
BIOMETRICS
65% of customers say they would accept voice recognition to authorize their identity when calling a customer support line (GetApp, 2021).
PERSONALIZATION
51% of marketers, advocating for personalization across multiple touchpoints saw 300% ROI (KoMarketing, 2020).
SOCIAL MEDIA
29% of customers aged 18 to 39 prefer online chat communication before and after purchase (RingCentral, 2020).
SELF-SERVICE
92% of customers say they would use a knowledge base for self-service support if it was available (Vanilla, 2020).
Business Opportunity
Determine high-level understanding of the need that must be addressed, along with the project goals and affiliated key metrics. Establish KPIs to measure project success.
System Diagram
Determine the impact on the application portfolio and where integration is necessary.
Risks
Identify potential blockers and risk factors that will impede selection.
High-Level Requirements
Consider the business functions and processes affected.
People Impact
Confirm who will be affected by the output of the technology selection.
Overall Business Case
Calculate the ROI and the financial implications of the application selection. Highlight the overarching value.
2 hours
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Software Selection Workbook
Understanding business needs through requirements gathering is key to defining everything about what is being purchased, yet it is an area where people often make critical mistakes.
| Signs of poorly scoped requirements | Best practices |
|---|---|
|
|
Info-Tech Insight
Review Info-Tech’s requirements gathering methodology to improve your requirements gathering process.
As you gather requirements, decide which procurement route best suits your context.
| RFI (Request for Information) | RFQ (Request for Quotation) | RFP (Request for Proposal) | |
|---|---|---|---|
| Purpose and Usage |
Gather information about products/services when you know little about what’s available. Often followed by an RFP. |
Solicit pricing and delivery information for products/services with clearly defined requirements.
Best for standard or commodity products/services. |
Solicit formal proposals from vendors to conduct an evaluation and selection process. Formal and fair process; identical for each participating vendor. |
| Level of Intent |
Fact-finding – there is no commitment to engage the vendor. Vendors are often reluctant to provide quotes. |
Committed to procure a specific product/service at the lowest price. |
Intent to buy the products/services in the RFP. Business case/approval to spend is already obtained. |
| Level of Detail | High-level requirements and business goals. |
Detailed specifications of what products/services are needed. Detailed contract and delivery terms. |
Detailed business requirements and objectives. Standard questions and contract term requests for all vendors. |
| Response |
Generalized response with high-level product/services. Sometimes standard pricing quote. |
Price quote and confirmation of ability to fulfill desired terms. |
Detailed solution description, delivery approach, customized price quote, and additional requested information. Product demo and/or hands-on trial. |
Info-Tech Insight
If you are in a hurry, consider instead issuing Info-Tech’s Vendor Evaluation Workbook. This workbook speeds up the typical procurement process by adding RFP-like requirements (such as operational and technical requirements) while driving the procurement process via emphasis on high-value use cases.
Download the Vendor Evaluation Workbook
2 hours
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the CSM Platform RFP Scoring Tool
Download the CSM Platform RFP Template
Avoid vendor glitz and glamour shows by ensuring vendors are concretely applying their solution to your high-value use cases.
| 1 | Minimize the number of vendors to four to keep up the pace of the selection process. |
| 2 | Provide a demo script that captures your high-value use cases and differentiating requirements. |
| 3 | Ensure demos are booked close together and the selection committee attends all demos. |
Rapid-fire vendor investigative interview
Invite vendors to come onsite (or join you via videoconference) to demonstrate the product and answer questions. Use a highly targeted demo script to help identify how a vendor’s solution will fit your organization’s particular business capability needs.
Give each vendor 90 to 120 minutes to give a rapid-fire presentation. We suggest the following structure:
To ensure a consistent evaluation, vendors should be asked analogous questions and answers should be tabulated.
How to challenge the vendors in the investigative interview
To kick-start scripting your demo scenarios, leverage our CSM Platform Vendor Demo Script Template.
A vendor scoring model is a systematic method for effectively assessing competing vendors. A weighted-average scoring model is an approach that strikes a strong balance between rigor and evaluation speed.
| How do I build a scoring model? | What are some of the best practices? |
|---|---|
|
|
Info-Tech Insight
Even the best scoring model will still involve some “art” rather than science. Scoring categories such as vendor viability always entail a degree of subjective interpretation.
| Criteria | Description |
|---|---|
| Functional Capabilities | How well does the vendor align with the top-priority functional requirements identified in your accelerated needs assessment? What is the vendor’s functional breadth and depth? |
| Affordability | How affordable is this vendor? Consider a three-to-five-year total cost of ownership (TCO) that encompasses not just licensing costs but also implementation, integration, training, and ongoing support costs. |
| Architectural Fit | How well does this vendor align with your direction from an enterprise architecture perspective? How interoperable is the solution with existing applications in your technology stack? Does the solution meet your deployment model preferences? |
| Extensibility | How easy is it to augment the base solution with native or third-party add-ons as your business needs may evolve? |
| Scalability | How easy is it to expand the solution to support increased user, data, and/or customer volumes? Does the solution have any capacity constraints? |
| Vendor Viability | How viable is this vendor? Are they an established player with a proven track record or a new and untested entrant to the market? What is the financial health of the vendor? How committed are they to the particular solution category? |
| Vendor Vision | Does the vendor have a cogent and realistic product roadmap? Are they making sensible investments that align with your organization’s internal direction? |
| Emotional Footprint | How well does the vendor’s organizational culture and team dynamics align to yours? |
| Third-Party Assessments and/or References | How well-received is the vendor by unbiased third-party sources like SoftwareReviews? For larger projects, how well does the vendor perform in reference checks (and how closely do those references mirror your own situation)? |
You may be faced with multiple products, services, master service agreements, licensing models, service agreements, and more.
Use Info-Tech’s Contract Review Services to gain insights on your agreements.
Consider the aspects of a contract review:
Validate that a contract meets IT’s and the business’ needs by looking beyond the legal terminology. Use a practical set of questions, rules, and guidance to improve your value for dollar spent.
Download Master Contract Review and Negotiation for Software Agreements
The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.
Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.
The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.
Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.
Fact-based reviews of business software from IT professionals.
Product and category reports with state-of-the-art data visualization.
Top-tier data quality backed by a rigorous quality assurance process.
User-experience insight that reveals the intangibles of working with a vendor.
SoftwareReviews is powered by Info-Tech
Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive, unbiased data on today’s technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.
Click here to access SoftwareReviews
Comprehensive software reviews to make better IT decisions
We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.
Est. 2003 | WA, USA | MSFT:NASDAQ
Bio
To accelerate your digital transformation, you need a new type of business application. One that breaks down the silos between CRM and ERP, that’s powered by data and intelligence, and helps capture new business opportunities. That’s Microsoft Dynamics 365.
Offices
Microsoft is located all over the world. For a full list, see Microsoft Worldwide Sites.
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2003 (as Microsoft Dynamics CRM)
2005 Second version branded Dynamics 3.0.
2009 Dynamics CRM 4.0 (Titan) passes 1 million user mark.
2015 Announces availability of CRM Cloud design for FedRAMP compliance.
2016 Dynamics 365 released as successor to Dynamics CRM.
2016 Microsoft’s acquisition of LinkedIn provides line of data to 500 million users.
2021 First-party voice channel added to Dynamics 365.
2022 Announces Digital Contact Center Platform powered with Nuance AI, MS Teams, and Dynamics 365.
Microsoft is rapidly innovating in the customer experience technology marketspace. Alongside Dynamics 365’s omnichannel offering, Microsoft is building out its own native contact center platform. This will provide new opportunities for centralization without multivendor management between Dynamics 365, Microsoft Teams, and an additional third-party telephony or contact-center-as-a-service (CCaaS) vendor. SoftwareReviews reports suggest that Microsoft is a market leader in the area of product innovation for CSM, and this area of voice channel capability is where I see most industry interest.
Of course, Dynamics 365 is not a platform to get only for CSM functionality. Users will typically be a strong Microsoft shop already (using Dynamics 365 for customer relationship management) and are looking for native CSM features to enhance customer service workflow management and self-service.
Thomas Randall
Research Director, Info-Tech Research Group
Info-Tech Insight
Pricing for Microsoft Dynamics 365 is often contextualized to an organization’s needs. However, this can create complicated licensing structures. Two Info-Tech resources to assist are:
*This service may be used for other enterprise CSM providers too, including Salesforce, ServiceNow, SAP, and Oracle.
Contact your account manager to review your access to this service.
Est. 2010 | CA, USA | FRSH:NASDAQ
Bio
Freshworks' cloud-based customer support software, Freshdesk, makes customer happiness refreshingly easy. With powerful features, an easy-to-use interface, and a freemium pricing model, Freshdesk enables companies of all sizes to provide a seamless multichannel support experience across email, phone, web, chat, forums, social media, and mobile apps. Freshdesk’s capabilities include robust ticketing, SLA management, smart automations, intelligent reporting, and game mechanics to motivate agents.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2010
2011 Freshdesk forms a core component of product line.
2014 Raises significant capital in Series D round: $31M.
2016 Acquires Airwoot, enabling real-time customer support on social media.
2019 Raises $150M in Series H funding round.
2019 Acquires Natero, which predicts, analyzes, and drives customer behavior.
2021 Surpasses $300M in annual recurring revenues.
2021 Freshworks posts its IPO listing.
Freshworks stepped into the SaaS customer support marketspace in 2010 to attract dissatisfied Zendesk eSupport customers, following Zendesk’s large price increases that year (of 300%). After performing well during the pandemic, Freshworks has reinforced its global positioning in the CSM tool marketspace; SoftwareReviews data suggests Freshworks performs very well against its competitors for breadth and intuitiveness of its features.
Freshworks receives strong recommendations from Info-Tech’s members, boasting a broad product selection that enables opportunities for scaling and receiving a high rate of value return. Of note are Freshworks’ internal customer management solution and its native contact center offering, limiting multivendor management typically required for integrating separate IT service management (ITSM) and CCaaS solutions.
Thomas Randall
Research Director, Info-Tech Research Group
| Free | Growth | Pro | Enterprise |
|---|---|---|---|
|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 2006 | MA, USA | HUBS:NYSE
Bio
Help Scout is designed with your customers in mind. Provide email and live chat with a personal touch and deliver help content right where your customers need it, all in one place, all for one low price. The customer experience is simple and training staff is painless, but Help Scout still has all the powerful features you need to provide great support at scale. With best-in-class reporting, an integrated knowledge base, 50+ integrations, and a robust API, Help Scout lets your team focus on what really matters: your customers.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2011
2015 Raised $6M in Series A funding.
2015 Rebrands from Brightwurks to Help Scout.
2015 Named by Appstorm as one of six CSM tools to delight Mac users.
2016 iOS app released.
2017 Android app released.
2020 All employees instructed to work remotely.
2021 Raises $15M in Series B funding.
Help Scout provides a simplified, standalone CSM tool that operates like a shared email inbox. Best suited for mid-sized organizations, customers can expect live chat, in-app messaging, and knowledge-base functionality. A particular strength is Help Scout’s integration capabilities, with a wide range of CRM, eCommerce, marketing, and communication APIs available. This strength is also reflected in the data: SoftwareReviews lists Help Scout as first in its CSM category for ease of data integrations.
Customers who are expecting a broader range of channels (including voice, video cobrowsing, and so on) will not find good return on investment with Help Scout. However, for mid-sized organizations looking to begin maturing their customer service management, Help Scout provides a strong foundation – especially for enhancing in-house collaboration between support staff.
Thomas Randall
Research Director, Info-Tech Research Group
| Standard | Plus | Pro |
|---|---|---|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 2006 | MA, USA | HUBS:NYSE
Bio
HubSpot’s Service Hub brings all your customer service data and channels together in one place and helps scale your support through automation and self-service. The result? More time for proactive service that delights, retains, and grows your customer base. HubSpot provides software and support to help businesses grow better. The overall platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths:
Areas to Improve:
History
Founded 2006
2013 Opens first international office in Ireland.
2014 First IPO listing on NYSE, raising $140M.
2015 Milestone for acquiring 15,000 customers
2017 Acquires Kemvi for AI and ML support for sales teams.
2019 Acquires PieSync for customer data synchronization.
2021 Yamini Rangan is announced as new CEO.
2021 Records $1B in revenues.
HubSpot is a competitive player in the enterprise sales and marketing technology market. Offering an all-in-one platform, HubSpot allows users to leverage its CRM, marketing solutions, content management tool, and CSM tool. Across knowledge management, contact center integration, and customer self-service, SoftwareReviews data pits HubSpot as performing better than its enterprise competitors.
While customers can leverage HubSpot’s CSM tool independently, watch out for scope creep. HubSpot’s other offerings are tightly integrated and module extensions could quickly add up in price. HubSpot may not be affordable for most regional, mid-sized organizations, and a poor ROI may be expected. For instance, the Pro plan is required to get a knowledge base, which is typically a standard CSM feature – yet the same plan also comes with multicurrency support, which could remain unleveraged.
Thomas Randall
Research Director, Info-Tech Research Group
| Free | Starter | Pro | Enterprise |
|---|---|---|---|
|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 1999 | CA, USA | CRM:NYSE
Bio
Service Cloud customer service software gives you faster, smarter customer support. Salesforce provides customer relationship management software and applications focused on sales, customer service, marketing automation, analytics, and application development.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths:
Areas to Improve:
History
Founded 1999
2000 Salesforce launches its cloud-based products.
2003 The first Dreamforce (a leading CX conference) happens.
2005 Salesforce unveils AppExchange.
2013 Salesforce acquires ExactTarget and expands Marketing Cloud offering.
2016 Salesforce acquires Demandware, launches Commerce Cloud.
2019 Salesforce acquires Tableau to expand business intelligence capabilities.
2021 Salesforce buys major collaboration vendor Slack.
Salesforce was an early disruptor in CRM marketspace, placing a strong emphasis on a SaaS delivery model and end-user experience. This allowed Salesforce to rapidly gain market share at the expense of complacent enterprise application vendors. A series of savvy acquisitions over the years has allowed Salesforce to augment its core Sales and Service Clouds with a wide variety of other solutions, from ecommerce to marketing automation – and recently Slack for internal collaboration.
Salesforce Service Cloud Voice is now available to take advantage of integrating telephony and voice channels into your CRM. This service is still maturing, though, with Salesforce selecting Amazon Connect as its preferred integrator. However, Connect is not necessarily plug-and-play – it is a communications platform as a service, requiring you to build your own contact center solution. This is either a fantastic opportunity for creativity or a time suck of already tied-up resources.
Thomas Randall
Research Director, Info-Tech Research Group
| Service Cloud Essentials | Service Cloud Professional | Service Cloud Enterprise | Service Cloud Unlimited |
|---|---|---|---|
|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 2007 | CA, USA | ZEN:NYSE
Bio
Zendesk streamlines your support with time-saving tools like ticket views, triggers, and automations. This helps you get straight to what matters most – better customer service and more meaningful conversations. Today, Zendesk is the champion of great service everywhere for everyone and powers billions of conversations, connecting more than 100,000 brands with hundreds of millions of customers over telephony, chat, email, messaging, social channels, communities, review sites, and help centers.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2007
2008 Initial seed funding of $500,000.
2009 Receives $6M through Series B Funding.
2009 Relocates from Copenhagen to San Francisco.
2014 Acquires Zopin Technologies.
2014 Listed on NYSE.
2015 Acquires We Are Cloud SAS.
2018 Launches Zendesk Sell.
Zendesk is a global player in the CSM tool marketspace and works with enterprises across a wide variety of industries. Unlike some other CSM players, Zendesk provides more service channels at its lowest licensing offer, affording organizations a quicker expansion in customer service delivery without making enterprise-grade investments. However, the price of the lowest licensing offer starts much higher than Zendesk’s competitors; organizations will need to consider if the cost to try Zendesk over an annual contract is within budget.
Unfortunately, SoftwareReviews data suggests that Zendesk may not always provide that immediate value, especially to mid-sized organizations. Zendesk is rated lower for vendor support and business value created. However, Zendesk provides strong functionality that competes with other enterprise players, and mid-sized organizations are continually impressed with Zendesk’s automation workflows.
Thomas Randall
Research Director, Info-Tech Research Group
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
| Team | Growth | Pro |
|---|---|---|
|
|
|
Est. 2002 | Poland | WSE:LVC
Bio
Manage all emails from customers in one app and save time on customer support. LiveChat is a real-time live-chat software tool for ecommerce sales and support that is helping ecommerce companies create a new sales channel. It serves more than 30,000 businesses in over 150 countries, including large brands like Adobe, Asus, LG, Acer, Better Business Bureau, and Air Asia and startups like SproutSocial, Animoto, and HasOffers.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Midmarket Vendor Ranking
(out of 8)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2002
2006 50% of company stock bought by Capital Partners.
2008 Capital Partners sells entire stake to Naspers.
2011 LiveChat buys back majority of stakeholder shares.
2013 Listed by Red Herring in group of most innovative companies across Europe.
2014 Listed on Warsaw Stock Exchange.
2019 HelpDesk is launched.
2020 Offered services for free to organizations helping mitigate the pandemic.
LiveChat’s HelpDesk solution for CSM is a relatively recent solution (2019) that is proving very popular for small to mid-sized businesses (SMBs) – especially across Western Europe. SoftwareReviews’ data shows that HelpDesk is well-rated for breadth of features, usability and intuitiveness, and rate of improvement. Indeed, LiveChat has won and been shortlisted for several awards over the past decade for customer feedback, innovation, and fast growth to IPO.
When shortlisting LiveChat’s HelpDesk, SMBs should be careful of scope creep. LiveChat offers a range of other solutions that are intended to work together. The LiveChat self-titled product is designed to integrate with HelpDesk to provide ticketing, email management, and chat management. Moreover, LiveChat’s AI-based ChatBot (for automated webchat) comes with additional cost (starting at $52 team/month).
Thomas Randall
Research Director, Info-Tech Research Group
| Team Plan | Enterprise |
|---|---|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 1996 | India | Privately Owned
Bio
SupportCenter Plus is a web-based customer support software that lets organizations effectively manage customer tickets, their account and contact information, and their service contracts, and in the process provide a superior customer experience. ManageEngine is a division of Zoho.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Midmarket Vendor Ranking
(out of 8)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 1996
2002 Branches from Zoho to become division focused on IT management.
2004 Becomes an authorized MySQL Partner.
2009 Begins shift of offerings into the cloud.
2010 Tops 35,000 customers.
2011 Integration with Zoho Assist.
2015 Integration with Zoho Reports.
ManageEngine, as a division of Zoho, has its strengths in IT operations management (ITOM). SupportCenter thus scores well in our SoftwareReviews data for ease of customization, implementation, and administration. As ManageEngine is a frequently discussed low-cost vendor in the ITOM market, customers often get good scalability across IT, sales, and marketing teams. Although SupportCenter is aimed at the midmarket and is low cost, organizations have the benefit of ManageEngine’s global presence and backing by Zoho for viability.
However, because ManageEngine’s focus is ITOM, the breadth and quality of features for SupportCenter are not rated as well compared to its competitors. These features may be “good enough,” but usability and intuitiveness is not scored high. Organizations thinking about SupportCenter are recommended to identify their high-value use cases and perform user acceptance testing before adopting.
Thomas Randall
Research Director, Info-Tech Research Group
| Standard* | Pro* | Enterprise* |
|---|---|---|
|
|
|
*Pricing unavailable. Request quote.
See pricing on vendor’s website for latest information.
Est. 1996 | India | Privately Owned
Bio
Use the power of customer context to improve agent productivity, promote self-service, manage cross-functional service processes, and increase customer happiness. Zoho offers beautifully smart software to help you grow your business. With over 80 million users worldwide, Zoho's 55+ products (including Zoho Desk) aid your sales and marketing, support and collaboration, finance, and recruitment needs – letting you focus only on your business.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Midmarket Vendor Ranking
(out of 8)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 1996
2001 Expands into Japan and shifts focus to SMBs.
2006 Zoho CRM is launched, alongside first Office suite.
2008 Reaches 1M users.
2009 Rebrands from AdventNet to Zoho Corp.
2011 Zoho Desk is built and launched.
2017 Zoho One, a suite of applications, is launched.
2020 Reaches 50M users.
Zoho Desk is one of the highest scoring CSM tool providers for likelihood to renew and recommend (98% and 90%, respectively). A major reason is that users receive a broad range of functionality for a lower-cost price model. There is also the capacity to scale with Zoho Desk as midmarket customers expand; companies can grow with Zoho and can receive high return on investment in the process.
However, while Zoho Desk can be used as a standalone CSM tool, there is danger of scope creep with other Zoho products. Zoho now has 50+ applications, all tied into one another. For Zoho Desk, customers may also lean into Zoho Assist (for troubleshooting customer problems via remote access) and Zoho Lens (for reality-based remote assistance, typically for plant machinery or servers). Consequently, customers should keep an eye on business value created if the scope of CSM grows wider.
Thomas Randall
Research Director, Info-Tech Research Group
| Standard | Pro | Enterprise |
|---|---|---|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
In this trends and buyer’s guide for CSM tool selection, we engaged in several activities to:
The result:
If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
Governance and Management of Enterprise Software Implementation
The Rapid Application Selection Framework
Build a Strong Technology Foundation for Customer Experience Management
Capers, Zach. “How the Pandemic Changed Customer Attitudes Toward Biometric Technology.” GetApp, 21 Feb. 2022. Accessed Nov. 2022.
Gomez, Jenny. “The Good, the Bad, and the Ugly: A History of Customer Service.” Lucidworks, 15 Jul. 2021. Accessed Nov. 2022.
Hoory. “History of Customer Service: How Did It All Begin?” Hoory, 24 Mar. 2022. Accessed Nov. 2022.
Patel, Snigdha. “Top 10 Customer Service Technology Trends to Follow in 2022.” Reve Chat, 21 Feb. 2021. Accessed Nov. 2022.
RingCentral. “The 2020 Customer Communications Review: A Survey of How Consumers Prefer to Communicate with Businesses.” RingCentral, 2020. Accessed Nov. 2022.
Robinson-Yu, Sarah. “What is a Knowledgebase? How Can It Help my Business?” Vanilla, 25 Feb. 2022. Accessed Nov. 2022.
Salesforce. “The Complete History of CRM.” Salesforce, n.d. Accessed Nov. 2022.
Salesforce. “State of the Connected Customer.” 5th ed. Salesforce, 2022. Accessed Nov. 2022.
Sprinklr. “How AzkoNobel UK Reduced Response Times and Increased Engagement.” Sprinklr, 2021. Accessed Nov. 2022.
Vermes, Krystle. “Study: 70% of Marketers Using Advanced Personalization Seeing 200% ROI.” KoMarketing, 2 Jun. 2020. Accessed Nov. 2022.
Colin Taylor
CEO
The Taylor Reach Group
Recognized as one of the leading contact/call center pioneers and experts, Colin has received 30 awards on two continents for excellence in contact center management and has been acknowledged as a leader and influencer on the topics of call/contact centers, customer service, and customer experience, in published rankings on Huffington Post, Call Center Helper, and MindShift. Colin was recognized as number 6 in the global 100 for customer service.
The Taylor Reach Group is a contact center, call center and customer experience (CX) consultancy specializing in CX consulting and call and contact center consulting, management, performance, technologies, site selection, tools, training development and center leadership training, center audits, benchmarking, and assessments.
David Thomas
Customer Service Specialist
Freedom Mobile
David Thomas has both managerial and hands-on experience with delivering quality service to Freedom Mobile customers. With several years being involved in training customer support and being at the forefront of retail during the pandemic, David has witnessed first-hand how to incentivize staff with the right metrics that create positive experiences for both staff and customers.
Freedom Mobile Inc. is a Canadian wireless telecommunications provider owned by Shaw Communications. It has 6% market share of Canada, mostly in urban areas of Ontario, British Columbia, and Alberta. Freedom Mobile is the fourth-largest wireless carrier in Canada.
A special thanks to three other anonymous contributors, all based in customer support and contact center roles for Canada’s National Park Booking Systems’ software provider.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Engage Tymans Group, expert risk management and consultancy company, to advise you on mitigating, preventing, and monitoring IT and information security risks within your business. We offer our extensive experience as a risk consulting company to provide your business with a custom roadmap and practical solutions to any risk management problems you may encounter.
Embed security thinking through aligning your security strategy to business goals and values
Risk is unavoidable when doing business, but that does not mean you should just accept it and move on. Every company should try to manage and mitigate risk as much as possible, be it risks regarding data security or general corporate security. As such, it would be wise to engage an expert risk management and consultancy company, like Tymans Group. Our risk management consulting firm offers business practical solutions for setting up risk management programs and IT risk monitoring protocols as well as solutions for handling IT incidents. Thanks to our experience as a risk management consulting firm, you enjoy practical and proven solutions based on a people-oriented approach.
If you engage our risk management consultancy company you get access to various guides and documents to help you set up risk management protocols within you company. Additionally, you can book a one-hour online talk with our risk management consulting firm’s CEO Gert Taeymans to discuss any problems you may be facing or request an on-site appointment in which our experts analyze your problems. The talk can discuss any topic, from IT risk control to external audits and even corporate security consultancy. If you have any questions about our risk management and consulting services for your company, we are happy to answer them. Just contact our risk management consulting firm through the online form and we will get in touch with as soon as possible.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Gain an in-depth understanding of what digital asset management is as well as how it is supported by Info-Tech’s DAM framework.
Create a metadata program execution strategy and assess current and target states for the organization’s DAM.
Design a governance plan for ongoing DAM and metadata management.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Develop a foundation of knowledge regarding DAM and metadata, as well as the best practices for organizing the organization’s information and digital assets for ideal findability.
Design standardized processes for metadata creation and digital asset management to help to improve findability of key assets.
Gain knowledge of how DAM can benefit both IT and the business.
1.1 Build a DAM and metadata knowledge foundation.
1.2 Kick-start creation of the organization’s DAM design principles handbook.
1.3 Interview key business units to understand drivers for the program.
1.4 Develop a DAM framework.
DAM Design Principles Handbook
DAM Execution Strategy Document
Inventory the organization’s key digital assets and their repositories.
Gather the organization’s requirements for a full-time digital asset librarian, as well as the DAM system.
Determine clear and specific requirements for the organization from the DAM system and the people involved.
2.1 Conduct a digital asset inventory to identify key assets to include in DAM.
2.2 Prioritize digital assets to determine their risk and value to ensure appropriate support through the information lifecycle.
2.3 Determine the requirements of the business and IT for the DAM system and its metadata.
Digital Asset Inventory Tool
DAM Requirements Gathering Tool
Determine strategic initiatives and create a roadmap outlining key steps required to get the organization to start enabling data-driven insights.
Determine timing of the initiatives.
Establish a clear direction for the DAM program.
Build a step-by-step outline of how to create effective metadata with true business-IT collaboration.
Have prioritized initiatives with dependencies mapped out.
3.1 Assess current and target states of DAM in the organization.
3.2 Brainstorm and document practical initiatives to close the gap.
3.3 Discuss strategies rooted in business requirements to execute the metadata management program to improve findability of digital assets.
DAM Roadmap Tool
Identify the roles required for effective DAM and metadata management.
Create sample metadata according to established guiding principles and implement a feedback method to create intuitive metadata in the organization.
Metadata management is an ongoing project. Implementing it requires user input and feedback, which governance will help to support.
By integrating metadata governance with larger information or data governance bodies, DAM and metadata management will gain sustainability.
4.1 Discuss and assign roles and responsibilities for initiatives identified in the roadmap.
4.2 Review policy requirements for the information assets in the organization and strategies to address enforcement.
4.3 Integrate the governance of metadata into larger governance committees.
DAM Execution Strategy
An effective enterprise application implementation playbook is not just a list of steps, but a comprehensive view of what is necessary to support your implementation. This starts with a people-first approach. Start by asking about sponsors, stakeholders, and goals. Without asking these questions first, the implementation will be set up for failure, regardless of the technology, processes, and tools available.
Follow these steps to build your enterprise application playbook:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint provides the steps necessary to build your own enterprise application implementation playbook that can be deployed and leveraged by your implementation teams.
This is the main playbook that you build through the exercises defined in the blueprint.
This tool provides input into the playbook around project timelines and planning.
This provides input into the playbook around managing change requests
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Lay out the overall objectives, stakeholders, and governance structure for the project.
Align everyone on the sponsor, key stakeholders, vision, and goals for your project
1.1 Select the project sponsor.
1.2 Identify your stakeholders.
1.3 Align on a project vision.
1.4 List your guiding principles.
1.5 Confirm your goals and objectives for the implementation project.
1.6 Define the project governance structure.
Project sponsor has been selected.
Project stakeholders have been identified and mapped with their roles and responsibilities.
Vision has been defined.
Guiding principles have been defined.
Articulated goals and objectives.
Detailed governance structure.
Define the elements of the playbook that provide scope and boundaries for the implementation.
Align the implementation team on the scope for the project and how the team should operate during the implementation.
2.1 Gather and review requirements, with an agreed to scope.
2.2 Define metrics for your project.
2.3 Define and document the risks that can impact the project.
2.4 Establish team composition and identify the team.
2.5 Detail your OCM structure, resources, roles, and responsibilities.
2.6 Define requirements for training.
2.7 Create a communications plan for stakeholder groups and delivery teams.
Requirements for enterprise application implementation with an agreed-to scope.
Metrics to help measure what success looks like for the implementation.
Articulated list of possible risks during the implementation.
The team responsible and accountable for implementation is identified.
Details of your organization’s change management process.
Outline of training required.
An agreed-to plan for communication of project status.
With the structure and boundaries in place, we can now lay out the details on the implementation plan.
A high-level plan is in place, including next steps and a process on running retrospectives.
3.1 Define your implementation steps.
3.2 Create templates to enable follow-up throughout the project.
3.3 Decide on the tracking tools to help during your implementation.
3.4 Define the follow-up processes.
3.5 Define project progress communication.
3.6 Create a Change request process.
3.7 Define your retrospective process for continuous improvement.
3.8 Prepare a closure document for sign-off.
An agreed to high-level implementation plan.
Follow-up templates to enable more effective follow-ups.
Shortlist of tracking tools to leverage during the implementation.
Defined processes to enable follow-up.
Defined project progress communication.
A process for managing change requests.
A process and template for running retrospectives.
A technique and template for closure and sign-off.
A successful enterprise application implementation requires more than great software; it requires a clear line of sight to the people, processes, metrics, and tools that can help make this happen.
Additionally, every implementation is unique with its own set of challenges. Working through these challenges requires a tailored approach taking many factors into account. Building out your playbook for your implementation is an important initial step before diving head-first into technology.
Regardless of whether you use an implementation partner, a playbook ensures that you don’t lose your enterprise application investment before you even get started!
Research Director,
Application Delivery and Management
Info-Tech Research Group
Your Challenge
|
Common Obstacles
|
Info-Tech's Approach
|
An effective enterprise application implementation playbook is not just a list of steps; it is a comprehensive view of what is necessary to support your implementation. This starts with a people-first approach. Start by asking about sponsors, stakeholders, and goals. Without asking these questions first, the implementation will be set up for failure, regardless of the technology, processes, and tools available.
Lack of planning is the reason that 39% of projects fail. Poor project planning can be disastrous: The consequences are usually high costs and time overruns.
Almost 20% of IT projects can fail so badly that they can become a threat to a company’s existence. Lack of proper planning, poor communication, and poorly defined goals all contribute to the failure of projects.
A PwC study of over 10,640 projects found that a tiny portion of companies – 2.5% – completed 100% of their projects successfully. These failures extract a heavy cost – failed IT projects alone cost the United States $50-$150B in lost revenue and productivity.
Source: Forbes, 2020
“A survey published in HBR found that the average IT project overran its budget by 27%. Moreover, at least one in six IT projects turns into a ‘black swan’ with a cost overrun of 200% and a schedule overrun of 70%. Kmart’s massive $1.2B failed IT modernization project, for instance, was a big contributor to its bankruptcy.”
Source: Forbes, 2020
Having the right sponsor significantly improves your chances of success across many different dimensions:
Source: Info-Tech, PPM Current State Scorecard Diagnostic
INDUSTRY
Consumer ProductsSOURCE
Carlton, 2021
ChallengeNot every ERP ends in success. This case study reviews the failure of Hershey, a 147-year-old confectioner, headquartered in Hershey Pennsylvania. The enterprise saw the implementation of an ERP platform as being central to its future growth. |
SolutionConsequently, rather than approaching its business challenge on the basis of an iterative approach, it decided to execute a holistic plan, involving every operating center in the company. Subsequently, SAP was engaged to implement a $10 million systems upgrade; however, management problems emerged immediately. |
ResultsThe impact of this decision was significant, and the company was unable to conduct business because virtually every process, policy, and operating mechanism was in flux simultaneously. The consequence was the loss of $150 million in revenue, a 19% reduction in share price, and the loss of 12% in international market share. Remember: Poor management can scupper implementation, even when you have selected the perfect system. |
Supporting template that captures the project timeline information, issue log, and follow-up dashboard.
This tool will help you record the requested change, and allow you to assess the impact of the change and proceed with the approval process.
Record the results from the exercises to define the steps for a successful implementation.
| Phase Steps |
1. Understand the Project
|
2. Set up for success
|
3. Document your plan
|
| Phase Outcomes |
|
|
|
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
What does a typical GI on this topic look like?
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
This phase will walk you through the following activities:
1.1 Identify the project sponsor
1.2 Identify project stakeholders
1.3 Review project vision and guiding principles
1.4 Review project objectives
1.5 Establish project governance
This phase involves the following participants:
1.1.1 Define the project sponsor's responsibilities
1.1.2 Shortlist potential sponsors
1.1.3 Select the project sponsor
This step involves the following participants:
Selected sponsor.
Having the right sponsor significantly improves your chances of success across many different dimensions:
Source: Info-Tech, PPM Current State Scorecard Diagnostic
For further discussion on sponsor responsibilities, use Info-Tech’s blueprint, Drive Business Value With a Right-Sized Project Gating Process
0.5-1 hour
Download Your Enterprise Application Implementation Playbook
Input |
Output |
|
|
Materials |
Participants |
|
|
0.5-1 hour
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
0.5-1 hour
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
1.2.1 Identify your stakeholders
This step involves the following participants:
Stakeholders’ management plan
Your stakeholder map defines the influence landscape your enterprise application operates in. It is every bit as important as the teams who enhance, support, and operate your applications directly.
Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have substantial informal relationships with your stakeholders.
Large-scale projects require the involvement of many stakeholders from all corners and levels of the organization, including project sponsors, IT, end users, and business stakeholders. Consider the influence and interest of stakeholders in contributing to the requirements elicitation process and involve them accordingly.
1-2 hours
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
1.3.1 Align on a project vision
1.3.2 List your guiding principles
This step involves the following participants:
Project vision and guiding principles
Guiding principles are high-level rules of engagement that help to align stakeholders from the outset. Determine guiding principles to shape the scope and ensure stakeholders have the same vision.
Guiding principles should be constructed as full sentences. These statements should be able to guide decisions.
1-2 hours
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
We, [Organization], will select and implement an integrated software suite that enhances the growth and profitability of the organization through streamlined global business processes, real-time data-driven decisions, increased employee productivity, and IT investment protection.
The guiding principles will help guide your decision-making process. These can be adjusted to align with your internal language.
1-2 hours
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
1.4.1 Confirm your goals and objectives for the implementation project
This step involves the following participants:
The objectives of the implementation project
Leverage completed deliverables to get project managers started down the path of success.
1-2 hours
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
1.5.1 Define the project governance structure
This step involves the following participants:
Approach to build an effective project governance
0.5-1 hour
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
You won’t get engagement unless there is a sense of accountability. Do not leave this vague. Accountability needs to be assigned to specific individuals in your organization to ensure the system development achieves what was intended by your organization and not what your system integrator (SI) intended.
Too many assumptions are made that the SI is accountable for all implementation activities and deliverables – this is simply untrue. All activities can be better planned for, and misunderstandings can be avoided, with a clear line of sight on roles and responsibilities and the documentation that will support these assumptions.
Discuss, define, and document roles and responsibilities:0.5-1 hour
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
This phase will walk you through the following activities:
2.1. Review project scope
2.2. Define project metrics
2.3. Prepare for project risks
2.4. Identify the project team
2.5. Define your change management process
This phase involves the following participants:
2.1.1 Gather and review requirements
2.1.2 Confirm your scope for implementation
2.1.3 Formulate a scope statement
This step involves the following participants:
The project scope
Project scope management includes the processes required to ensure that the project includes all and only the work required to complete the project successfully. Therefore, managing project scope is about defining and controlling what is and is not included in the project.
PMBOK defines requirements as “conditions or capabilities that are to be met by the project or present in the product, service, or result to satisfy an agreement or other formally imposed specification.” Detailed requirements should be gathered and elicited in order to provide the basis for defining the project scope.
Note: “High satisfaction” was classified as a score greater or equal to eight, and “low satisfaction” was every organization that scored below eight on the same questions.
1-2 hours
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
1-2 hours
Download Your Enterprise Application Implementation Playbook
Input | Output |
|
|
Materials | Participants |
|
|
Requirements are about the what and the how.
Scope specifies the features of the product or service – what is in and what is out
The Build Your Enterprise Application Implementation Playbook 2.2 Project Scope Statement includes:
1-2 hours
Download Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
2.2.1 Define metrics for your project
This step involves the following participants:
The project metrics
For example, take the lagging KPI “Customer Satisfaction.” How do you turn that into a leading KPI? One method is to look at sources of customer complaints. In a retail sales system, backordered items will negatively impact customer satisfaction. As a leading indicator, track the number of orders with backordered lines and the percentage of the total order that was backordered.
Use leading and lagging metrics, as well as benchmarks, to track the progress of your system.
Leading KPIs: Input-oriented measures:
Lagging KPIs: Output-oriented measures:
Benchmarks: A standard to measure performance against:
Leading indicators make the news; lagging indicators report on the news. Focusing on leading indicators allows you to address challenges before they become large problems with only expensive solutions.
1-2 hours
Download Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
In addition to delivery metrics and system performance metrics, equip the business with process-based metrics to continuously prove the value of the enterprise software. Review the examples below as a starting point.
2.3.1 Build a risk event menu
2.3.2 Determine contextual risks
2.3.3 Determine process risks
2.3.4 Determine business risks
2.3.5 Determine change risks
This step involves the following participants:
Steps to create your product canvas and product vision statement
For more information on Info-Tech’s Four-Pillar Risk Framework, please see Right-Size Your Project Risk Investment.
Info-Tech’s Four-Pillar Risk Framework
Unusual risks should be detected by finding out how each project is different from the norm. Use this framework to start this process by confronting the risks that are more easily anticipated.
0.5-1 hour
Download Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
0.5-1 hour
Download Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
2.4.1 Establish team composition
2.4.2 Identify the team
This step involves the following participants:
Steps to get your project team ready
Organizations rarely have sufficient internal staffing to resource an enterprise software implementation project entirely on their own. Consider the options for closing the gap in internal resource availability.
Clearly delineate between internal and external team responsibilities and accountabilities and communicate this to your technology partner upfront.
Accountability is different than responsibility. Your vendor or SI partner may be responsible for completing certain tasks, but be careful not to outsource accountability for the implementation – ultimately, the internal team will be accountable.
Often vendors and/or SIs will have their own preferred implementation methodology. Consider the use of your partner’s implementation methodology; however, you know what will work for your organization.
Selecting a partner is not just about capabilities, it’s about compatibility! Ensure you select a partner that has a culture compatible with your own.
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
2.5.1 Define OCM structure and resources
2.5.2 Define OCM team’s roles and responsibilities
2.5.3 Define requirements for training
2.5.4 Create a communications plan for stakeholder groups, and delivery teams
This step involves the following participants:
A structure and procedures for an effective organizational change management
“It’s one thing to provide a new technology tool to your end users.
It’s quite another to get them to use the tool, and still different for them to use the new tool proficiently.
When your end users fully use a new technology and make it part of their daily work habits, they have ‘adopted’ the new tool.”
– “End-User Adoption and Change Management Process” (2022)Organizational change management (OCM) governs the introduction of new business processes and technologies to ensure stakeholder adoption. The purpose of OCM is to prepare the business to accept the change.
OCM is a separate body of knowledge. However, as a practice, it is inseparable from project management.
In IT, project planning tends to fixate on technology, and it underestimates the behavioral and cultural factors that inhibit user adoption. Whether change is project-specific or continuous, it’s more important to instill the desire to change than to apply specific tools and techniques.
Accountability for instilling this desire should start with the project sponsor. The project manager should support this with effective stakeholder and communication management plans.
For further discussion on organizational change, use Info-Tech’s blueprint, Master Organizational Change Management Practices
A centralized approach to OCM is most effective, and the PMO is already a centralized project office and is already accountable for project outcomes.
What’s more, in organizations where accountabilities for OCM are not explicitly defined, the PMO will likely already be assumed to be the default change leader by the wider organization.
It makes sense for the PMO to accept this accountability – in the short term at least – and claim the benefits that will come from coordinating and consistently driving successful project outcomes.
In the long term, OCM leadership will help the PMO become a strategic partner with the executive layer and the business side.
Short-term gains made by the PMO can be used to spark dialogues with those who authorize project spending and have the implicit fiduciary obligation to drive project benefits.
Ultimately, it’s their job to explicitly transfer that obligation along with the commensurate resourcing and authority for OCM activities.
For further discussion on organizational change, use Info-Tech’s blueprint, Master Organizational Change Management Practices
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
Project communication management is more than keeping track of stakeholder requirements. A communication management plan must address timely and appropriate creation, flow, and deposition of information about the project – as well as the security of the information.
Create:
Flow:
Deposit:
Security:
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
Project sponsors are the most compelling storytellers to communicate the change
Communication with stakeholders and sponsors is not a single event, but a continual process throughout the lifecycle of the project implementation – and beyond!
This phase will walk you through the following activities:
3.1 Develop a master project plan
3.2. Define a follow-up plan
3.3. Define the follow-up process
3.4. Understand what’s next
This phase involves the following participants:
3.1.1 Define your implementation steps
This step involves the following participants:
Steps to create your resourcing and master plans
Organizations rarely have sufficient internal staffing to resource an enterprise software implementation project entirely on their own. Consider the options for closing the gap in internal resource availability.
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
Record your project name, project manager, and stakeholders from previous exercises.
Use this template to keep track of all project tasks, dates, owners, dependencies, etc.
“Actual Start Date” and “Actual Completion Date” columns must be updated to be reflected in the Gantt chart.
This information will also be captured as the source for session 3.2.1 dashboards.
3.2.1 Create templates to enable follow-up throughout the project
3.2.2 Decide on the tracking tools to help during your implementation
This step involves the following participants:
Steps to create the processes and define the tools to track progress
Build a dashboard that reflects the leading metrics you have identified. Call out requirements that represent key milestones in the implementation.
For further information on monitoring the project, use Info-Tech’s blueprint, Governance and Management of Enterprise Software Implementation
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
Based on the inputs in session 3.1.1 Define Your Implementation Steps, once the “Actual Start Date” and “Actual Completion Date” columns have been updated, this dashboard will present the project status and progress.
This executive overview of the project's progress is meant to be used during the status meeting.
SoftwareReviews, Requirements Management, 2023
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
3.3.1 Define project progress communication
3.3.2 Create a change request process
This step involves the following participants:
Steps to create your follow-up process
Project status updates can be both formal and informal. Formal status updates provide a standardized means of disseminating information on project progress. It is the lifeblood of project management: Accurate and up-to-date status reporting enables your project manager to ensure that your project can continue to use the resources needed.
Informal status updates are done over coffee with key stakeholders to address their concerns and discuss key outcomes they want to see. Informal status updates help to build a more personal relationship.
Ask for feedback during the status update meetings. Use the meeting as an opportunity to align values, goals, and incentives.
Codify the following considerations:
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
Using the scope statement as the reference point:
Recommend alternative solutions that are easier to implement while consulting the requester.
If the change has been classified as minor, the project manager and the project team can tackle it directly, since it doesn’t affect project budget or schedule in a significant way. Ensure that the change is documented.
The project manager should bring major changes to the attention of the project sponsor and carry out a detailed assessment of the change and its impact.
Additional time and resources are required to do the in-depth assessment because the impact on the project can be complex and affect requirements, resources, budget, and schedule.
Present the results to the governing body. Since a major change significantly affects the project baseline beyond the authorized contingency, it is the responsibility of the governing body to either approve the change with allocation of additional resources or reject the change and maintain course.
For further discussion on change requests, use Info-Tech’s blueprint, Begin Your Projects With the End in Mind
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
3.4.1 Run a “lessons learned” session for continuous improvement
3.4.2 Prepare a closure document for sign-off
3.4.3 Document optimization and future release opportunities
This step involves the following participants:
Lessons learned throughout the project-guiding
During the closing process, the project manager should use planning and execution documents, such as the project charter and the scope statement, to assess project completeness and obtain sign-off based on the acceptance criteria.
Project completion criteria should be clearly defined. For example, the project is defined as finished when costs are in, vendor receipts are received, financials are reviewed and approved, etc.
However, there are other steps to be taken after completing the project deliverables. These activities include:
The project manager needs to complete all project management processes, including:
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
| |
Materials | Participants |
|
|
Don’t leave the door open for stakeholder dissatisfaction. Properly close out your projects.
For further information on project closure issues, use Info-Tech’s blueprint, Get Started With Project Management Excellence.
0.5-1 hour
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
For further information on closure procedures, use Info-Tech’s blueprint, Begin Your Projects With the End in Mind.
0.5-1 hour
Consider the future opportunities for improvement post-release:
Your Enterprise Application Implementation Playbook.
Input | Output |
|
|
Materials | Participants |
|
|
7 Shocking Project Management Statistics and Lessons We Should Learn.” TeamGantt, Jan. 2017.
Akrong, Godwin Banafo, et al. "Overcoming the Challenges of Enterprise Resource Planning (ERP): A Systematic Review Approach." IJEIS vol.18, no.1 2022: pp.1-41.
Andriole, S. “Why No One Can Manage Projects, Especially Technology Projects.” Forbes, 1 Dec. 2020.
Andriole, Steve. “Why No One Can Manage Projects, Especially Technology Projects.” Forbes, 1 Dec. 2020.
Beeson, K. “ERP Implementation Plan (ERP Implementation Process Guide).” ERP Focus, 8 Aug. 2022.
Biel, Justin. “60 Critical ERP Statistics: 2022 Market Trends, Data and Analysis.” Oracle Netsuite, 12 July 2022.
Bloch, Michael, et al. “Delivering Large-Scale IT Projects on Time, on Budget, and on Value.” McKinsey & Company, 2012.
Buverud, Heidi. ERP System Implementation: How Top Managers' Involvement in a Change Project Matters. 2019. Norwegian School of Economics, Ph.D. thesis.
Carlton, R. “Four ERP Implementation Case Studies You Can Learn From.” ERP Focus, 15 July 2015.
Gopinath, S. Project Management in the Emerging World of Disruption. PMI India Research and Academic Conference 2019. Kozhikode Publishers.
Grabis, J. “On-Premise or Cloud Enterprise Application Deployment: Fit-Gap Perspective.” Enterprise Information Systems. Edited by Filipe, J., Śmiałek, M., Brodsky, A., Hammoudi, S. ICEIS, 2019.
Harrin, E. The Definitive Guide to Project Sponsors. RGPM, 13 Dec. 2022.
Jacobs-Long, Ann. “EPMO’s Can Make A Difference In Your Organization.” 9 May 2012.
Kotadia, C. “Challenges Involved in Adapting and Implementing an Enterprise Resource Planning (ERP) Systems.” International Journal of Research and Review vol. 7 no. 12 December 2020: 538-548.
Panorama Consulting Group. "2018 ERP Report." Panorama Consulting Group, 2018. Accessed 12 Oct. 2021.
Panorama Consulting Group. "2021 ERP Report." Panorama Consulting Group, 2021. Accessed 12 Oct. 2021.
PM Solutions. (2014). The State of the PMO 2014.
PMI. Pulse of the Profession. 2017.
Podeswa, H. “The Business Case for Agile Business Analysis.” Requirements Engineering Magazine, 21 Feb. 2017.
Project Delivery Performance in Australia. AIPM and KPMG, 2020.
Prosci. (2020). Prosci 2020 Benchmarking Data from 2007, 2009, 2011, 2013, 2015, 2017, 2019.
Swartz, M. “End User Adoption and Change Management Process.” Swartz Consulting LLC, 11 July 2022.
Trammell, H. “28 Important Project Management KPIs (& How To Track Them).” ClearPoint Strategy, 2022.
“What are Business Requirements?" Requirements.com, 18 Oct. 2018.
“What Is the Role of a Project Sponsor?” Six Sigma Daily, 18 May 2022.
“When Will You Think Differently About Programme Delivery?” 4th Global Portfolio and Programme Management Survey. PricewaterhouseCoopers, Sept. 2014.
Leadership has evolved over time. The velocity of change has increased and leadership for the future looks different than the past.
Development of the leadership mind should never stop. This program will help IT leaders continue to craft their leadership competencies to navigate the ever-changing world in which we operate.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use the information in this blueprint and Info-Tech’s Agile Contract Playbook-Checklist to review and assess your Agile contracts, ensuring that the provisions and protections are suitable for Agile contracts specifically.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
To understand Agile-specific contract clauses, to improve risk identification, and to be more effective at negotiating Agile contract terms.
Increased awareness of how Agile contract provisions are different from traditional or waterfall contracts in 12 key areas.
Understanding available options.
Understanding the impact of being too prescriptive.
1.1 Review the Agile Contract Playbook-Checklist.
1.2 Review 12 contract provisions and reinforce key learnings with exercises.
Configured Playbook-Checklist as applicable
Exercise results and debrief
The complex nature of data investment leads to de-scoping and delivery of data services that do not meet business needs or give value to the business. Subject matter experts are hired to resolve the problem, but their success is impacted by absent architecture, technology, and organizational alignment.
Walking through a book of architecture building plans with a personal guide is cheaper and faster than employing an architect to build and design your home.
Info-Tech's approach provides a proven methodology that includes the following:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Info-Tech's approach provides a proven methodology that includes following:
Data practice & platform pre-build pattern templates based on Info-Tech data reference patterns and data platform design best practices.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish business context and value.
Business context and strategic driver.
1.1 Understand/confirm the organization's strategic goals
1.2 Classify the strategic goals and map to business drivers
1.3 Identify the business capabilities that the strategy focuses on
1.4 Identify the business processes realizing the strategy
Business context and strategic drivers
Prioritized business capabilities and processes
Data culture survey results analysis
Identify your top initiatives.
High-value business-aligned data initiative.
2.1 Highlight data-related outcomes/goals to realize to fulfill the business goal
2.2 Map business data initiatives to the business strategic goals
2.3 Prioritize data initiatives
High-value, business-aligned data initiatives
Analyze data challenges.
Clear understanding of the data challenges.
3.1 Map data challenges to Info-Tech data challenges
3.2 Review Info-Tech data capabilities based on prioritized initiatives
3.3 Discuss data platform and practice next steps
List of data challenges preventing data maturation with the organization
Map data capability.
Prioritized data capability.
4.1 Map data challenges to Info-Tech data challenges
4.2 Review Info-Tech data capabilities based on prioritized initiatives
4.3 Discuss data platform and practice next steps
Required data capabilities
Data platform and practice – plan
Initialized data management RACI
The build or optimization of your data practice and data platform must be predicated on a thorough understanding of the organization’s goals, objectives, and priorities and the business capabilities and process they are meant to support and enable.
Formalizing your practice or constructing your platform just for the sake of doing so often results in an initiative that is lengthy, costly, fizzles out, does not deliver business value, and ends up being considered a failure.
Leverage Info-Tech’s approach and incorporate our pre-built models and patterns to effectively navigate that crucial and often difficult phase upfront of comprehensively defining business data needs so you can ultimately realize faster time-to-delivery of your overall data practice and platform.
![]() |
Rajesh Parab
|
![]() |
Crystal Singh
|
Situation
|
Complication
|
Resolution
|
The true value of data comes from defining intentional relationships between the business and the data through a well thought out data platform and practice.
I can’t access the data. I don’t trust the data in the report. It takes too long to get to the data for decision making |
|
|
Use the road-tested patterns and frameworks in our blueprint to break the perpetual data solution cycle. Focus on the value that a data and analytics platform will bring rather than focusing on the data problems alone. |
Build Your Data Practice and PlatformBring Your Data Strategy to Life |
![]() |
CONVENTIONAL WISDOM
Attempting to Solve Your Data Problems
|
BREAK THE CYCLE
Solving Your Data Problems
|
CONTINUOUS PHASE: ROADMAP, SPONSORSHIP FEEDBACK AND DELIVERY
Develop a roadmap to establish the practice and implement the architecture as designed. Ensure continuous alignment of the practice and architecture with the business landscape. |
|||||||||
![]() |
Phase-by-Phase Approach
|

| Only 14.29% of Transportation and Logistics respondents agree BI and Analytics Process and Technology are sufficient | What is a diagnostic?
Our diagnostics are the simplest way to collect the data you need, turn it into actionable insights, and communicate with stakeholders across the organization. |
52.54% of respondents from the healthcare industry are unaware of their organization’s data security policy | ||
| Ask the Right Questions
Use our low-effort surveys to get the data you need from stakeholders across the organization. |
Use Our Diagnostic Engine
Our diagnostic engine does all the heavy lifting and analysis, turning your data into usable information. |
Communicate & Take Action
Wow your executives with the incredible insights you've uncovered. Then, get to action: make IT better. |
||
| On average only 40% agree that they have the reporting when needed
(Source: Info-Tech’s Data Culture Diagnostic, 53 Organizations, 3138 Responses) |
35% of respondents feel that a governance body is in place looking at strategic data
Build a Data-Driven Strategy Using Info-Tech Diagnostic ProgramsMake informed IT decisions by starting your diagnostic program today. Your account manager is waiting to help you. |
![]() |
||
![]() |
![]() |
The first step is to align business strategy with data strategy and then start building your data practice and data platform |
![]() |
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks used throughout all four options |
|||
| Phase 1 –
Define Your Data Requirements and Conduct Your Data Discovery |
Phase 2 –
Design Your Data Practices |
Phase 3 –
Architect Your Data Platform |
|
| Phase Steps |
|
|
|
| Phase Outcomes | Business-aligned data initiatives and capabilities that address data challenges and realize business strategic objectives | Comprehensive data practice design based on the required business and data capabilities | Data platform design based on Info-Tech data architecture reference pattern and prioritized data initiatives and capabilities |

Workshop Overview |
Contact your account representative for more information.
|
| Info-Tech’s Workshop support for Build Your Data Practice and Platform. | ![]() |
||
| Workshop
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." |
Workshop 1 | Workshop 2 | Workshop 3 |
Workshop 1: | Contact your account representative for more information.
|
| Day 1 | Day 2 | Day 3 | Day 4 | |
Establish Business Context and Value |
Identify Your Top Initiatives |
Analyze Data Challenges |
Map Data Capability |
|
| Activities | 1.1 Understand/confirm your organization’s strategic goals 1.2 Classify the strategic goals and map to business drivers 1.3 Identify the business capabilities that the strategy focus is on 1.4 Identify the business processes realizing the strategy |
2.1 Highlight data-related outcomes /goals to realize to fulfill the business goal 2.2 Map business data initiatives to the business strategic goals 2.3 Prioritize Data initiatives |
3.1 Understand data management capabilities and framework 3.2 Classify business data requirements using Info-Tech’s classification approach 3.3 Highlight data challenges in your current environment |
4.1 Map data challenges to Info-Tech data challenges 4.2 Review Info-Tech data capabilities based on prioritized initiative 4.3 Discuss Data Platform and Practice Next Steps |
| Deliverables |
|
|
|
|
| Participants | Business stakeholder, Business leader Business Subject Matter Expert, Data IT sponsor (CIO), Head of Data, Data Architect | Business stakeholder, Business leader Business Subject Matter Expert, Data IT sponsor (CIO), Head of Data, Data Architect | Data experts, Business Subject Matter Expert, Head of Data, Data Architect | Data experts, Business Subject Matter Expert, Head of Data, Data Architect |
Workshop 2: | Contact your account representative for more information.
|
| Day 1 | Day 2 | Day 3 | Day 4 | |
Plan Your Data Practices |
Design Your Data Practices 1 |
Design Your Data Practices 2 |
Design Your Data Practices 3 |
|
| Activities | Prerequisite: Business context, business data requirement, and data capabilities 1.1 Understand data practice framework 1.2 Define your practice implementation approach 1.3 Review and update data management RACI |
2.1 Understand Info-Tech data practice patterns for each prioritized practice 2.2 Define your practice setup for each prioritized practice 2.3 Highlight critical processes for each practice |
3.1 Understand Info-Tech data practice patterns for each prioritized practice 3.2 Define your practice setup for each prioritized practice 3.3 Highlight critical processes for each practice |
4.1 Understand Info-Tech data practice patterns for each prioritized practice 4.2 Define your practice setup for each prioritized practice 4.3 Highlight critical processes for each practice 4.4 Discuss data platform and practice next steps |
| Deliverables |
|
|
|
|
| Participants | Data experts, Business Subject Matter Expert, Head of Data, Data Architect | Data experts, Business Subject Matter Expert, Head of Data, Data Architect | Data experts, Business Subject Matter Expert, Head of Data, Data Architect | Data experts, Business Subject Matter Expert, Head of Data, Data Architect |
Workshop 3: | Contact your account representative for more information.
|
| Day 1 | Day 2 | Day 3 | Day 4 | |
Data Platform Overview | Update Data Platform Reference Architecture | Design Your Data Platform | Design Your Data Practices 4 | |
| Activities | Prerequisite: Business context, business data requirement, and data capabilities 1.1 Understand data platform framework and data capabilities 1.2 Understand key data architecture principles and best practices 1.3 Shortlist data platform patterns | 2.1 Map and identify data capabilities to data platform components 2.2 Build data platform architecture using Info-Tech data platform reference architecture 2.3 Highlight critical processes for each practice | 3.1 Design your target data platform using Info-Tech’s data platform template 3.2 Identify new capabilities and components in your platform design | 4.1 Identify new capabilities and component in your platform design 4.2 Discuss data platform initiatives |
| Deliverables |
|
|
|
|
| Participants | Data experts, Business Subject Matter Expert, Head of Data, Data Architect | Data experts, Business Subject Matter Expert, Head of Data, Data Architect | Data experts, Business Subject Matter Expert, Head of Data, Data Architect | Data experts, Business Subject Matter Expert, Head of Data, Data Architect |
| Phase 1
1.1 Define Your Data Requirements
|
Phase 2 | Phase 3 |
A blend of business leaders and business SMEs together with the Data Strategy team.
Key personnel from IT/Data team: (Data Architect, Data Engineers, Head of Head of Reporting and Analytics)
Work-from-anywhere isn’t going anywhere. During the initial rush to remote work, tech debt was highlighted and the business lost faith in IT. IT now needs to:
IT went through an initial crunch to enable remote work. It’s time to be proactive and learn from our mistakes.
Follow these steps to build a work-from-anywhere strategy that resonates with the business:
Benefit employees’ remote working experience while ensuring that IT heads in a strategic direction.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify a vision that aligns with business goals, not for how the company worked in 2019, but for how the company is working now and will be working tomorrow.
Don’t focus on becoming an innovator until you are no longer stuck in firefighting mode.
Use these blueprints to improve your enterprise app capabilities for work-from-anywhere.
Use these blueprints to improve IT’s strategy, people & leadership capabilities for work-from-anywhere.
Use these blueprints to improve infrastructure & operations capabilities for work-from-anywhere.
Use these blueprints to improve IT security & compliance capabilities for work-from-anywhere.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define the direction of your work-from-anywhere strategy and roadmap.
Base your decisions on senior leadership and user needs.
1.1 Identify drivers, benefits, and challenges.
1.2 Perform a goals cascade to align benefits to business needs.
1.3 Define a vision and success metrics.
1.4 Define the value IT brings to work-from-anywhere.
Desired benefits for work-from-anywhere
Vision statement
Mission statement
Success metrics
Value propositions for in-scope user groups
Focus on value. Ensure that major applications and IT capabilities will relieve employees’ pains and provide them with gains.
Learn from past mistakes and successes.
Increase adoption of resulting initiatives.
2.1 Review work-from-anywhere framework and identify capability gaps.
2.2 Review diagnostic results to identify satisfaction gaps.
2.3 Record improvement opportunities for each capability.
2.4 Identify deliverables and opportunities to provide value for each.
2.5 Identify constraints faced by each capability.
SWOT assessment of work-from-anywhere capabilities
Projects and initiatives to improve capabilities
Deliverables and opportunities to provide value for each capability
Constraints with each capability
Build a short-term plan that allows you to iterate on your existing strengths and provide early value to your users.
Provide early value to address operational pain points.
Build a plan to provide near-term innovation and business value.
3.1 Organize initiatives into phases.
3.2 Identify tasks for short-term initiatives.
3.3 Estimate effort with Scrum Poker.
3.4 Build a timeline and tie phases to desired business benefits.
Prioritized list of initiatives and phases
Profiles for short-term initiatives
Business process automation (BPA) has gained momentum, especially as pilots result in positive outcomes such as improved customer experience, efficiencies, and cost savings. Stakeholders want to invest more in BPA solutions and scale initial successes across different business and IT functions.
But it’s critical to get it right and not fall into the hype so that the costs don’t outweigh the benefits.
Ultimately, all BPA initiatives should align with a common vision.
Organizations should adopt a methodical approach to growing their BPA, taking cost, talent availability, and goals into account.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint helps you develop a strategy justify the scaling and maturing of your business process automation (BPA) practices and capabilities to fulfill your business priorities.
Document your business process automation strategy in the language your stakeholders understand. Tailor this document to fit your BPA objectives and initiatives.
Evaluate the maturity of the key capabilities of your BPA practice to determine its readiness to support complex and scaled BPA solutions.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the business priorities and your stakeholders' needs that are driving your business process automation initiatives while abiding by the risk and change appetite of your organization.
Translate business priorities to the context of business process automation.
Arrive at a common definition of business value.
Come to an understanding of the needs, concerns, and problems of BPA stakeholders.
Discover organizational risk and change tolerance and appetite.
1.1 Set the Business Context
1.2 Understand Your Stakeholder Needs
1.3 Build Your Risk & Change Profile
Business problem, priorities, and business value definition
Customer and end-user assessment (e.g. personas, customer journey)
Risk and change profile
Set reasonable and achievable expectations for your BPA initiatives and practices, and select the right BPA opportunities to meet these expectations.
Align BPA objectives and metrics to your business priorities.
Create guiding principles that support your organization’s and team’s culture.
Define a vision of your target-state BPA practice
Create a list of BPA opportunities that will help build your practice and meet business priorities.
2.1 Define Your BPA Expectations
2.2 List Your Guiding Principles
2.3 Envision Your BPA Target State
2.4 Build Your Opportunity Backlog
BPA problem statement, objectives, and metrics
BPA guiding principles
Desired scaled BPA target state
Prioritized BPA opportunities
Evaluate the current state of your BPA practice and its readiness to support scaled and complex BPA solutions.
List key capabilities to implement and optimize to meet the target state of your BPA practice.
Brainstorm solutions to address the gaps in your BPA capabilities.
3.1 Assess Your BPA Maturity
BPA maturity assessment
Identify high-priority key initiatives to support your BPA objectives and goals, and establish the starting point of your BPA strategy.
Create an achievable roadmap of BPA initiatives designed to deliver good practices and valuable automations.
Perform a risk assessment of your BPA initiatives and create mitigations for high-priority risks.
Find the starting point in the development of your BPA strategy.
4.1 Roadmap Your BPA Initiatives
4.2 Assess and Mitigate Your Risks
4.3 Complete Your BPA Strategy
List of BPA initiatives and roadmap
BPA initiative risk assessment
Initial draft of your BPA strategy
Members may also be interested in Info-Tech's IT Spend & Staffing Benchmarking Service.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This deck mirrors Info-Tech’s own internal methods for delivering its IT Spend & Staffing Benchmarking Service in a do-it-yourself format. Based on Info-Tech’s proven ITFM Cost Model, it includes an IT spend mapping readiness assessment, expert advice for sourcing and organizing your financial data, a methodology for mapping IT staff and vendor spend according to four key stakeholder views (CFO, CIO, CXO, and CEO), and guidance on how to analyze and share your results.
This workbook offers a step-by-step approach for mapping and visualizing your organization’s true IT spend.
This presentation template offers a recommended structure for introducing key executive stakeholders to your organization’s true IT spending behavior and IT financial management as a whole.
Talking about money is hard. Talking to the CEO, CFO, and other business leaders about money is even harder, especially if IT is seen as just a cost center, is not understood by stakeholders, or is simply taken for granted. In times of economic hardship, already lean IT operations are tasked with becoming even leaner.
When there's little fat to trim, making IT spend decisions without understanding the spend's origin, location, extent, and purpose can lead to mistakes that weaken, not strengthen, the organization.
The first step in optimizing IT spend decisions is setting a baseline. This means having a comprehensive and transparent view of all technology spend, organization-wide. This baseline is the only way to have meaningful, data-driven conversations with stakeholders and approvers around what IT delivers to the business and the implications of making changes to IT funding.
Before stepping forward in your IT financial management journey, know exactly where you're standing today.

Jennifer Perrier
Principal Research Director, ITFM Practice
Info-Tech Research Group
| Your Challenge | Common Obstacles | Info-Tech's Approach |
IT spend has increased in volume and complexity, but how IT spend decisions are made has not kept pace:
|
Meaningful conversations about IT spend don't happen nearly as much as they should. This is often due to:
|
Lay a foundation for meaningful conversations and informed decision-making around IT spend.
|
Info-Tech Insight
Create transparency in your IT financial data to power both collaborative and informed technology spend decisions.

| How IT funds are spent has changed Value demonstration is two-pronged. The first is return on performance investment, focused on formal and objective goals, metrics, and KPIs. The second is stakeholder satisfaction, a more subjective measure driven by IT-business alignment and relationship. IT leaders must do both well to prove and promote IT's value. |
Funding decision cadence has sped up Many organizations have moved from three- to five-year strategic planning cycles to one-year planning horizons or less, most noticeably since the 2008/2009 recession. Not only has the pace of technological change accelerated, but so too has volatility in the broader business and economic environments, forcing rapid response. |
Justification rigor around IT spend has increased The need for formal business cases, proposals, and participation in formal governance processes has increased, as has demand for financial transparency. With many IT departments still reporting into the CFO, there's no getting around it - today's IT leaders need to possess financial management savvy. |
Clearly showing business value has become priority IT spend has moved from the purchase of discrete hardware and software tools traditionally associated with IT to the need to address larger-scale issues around interoperability, integration, and virtualized cloud solutions. Today's focus is more on big-picture architecture than on day-to-day operations. |
Increased integration with the core business has made it a priority for the head of IT to be well-versed in business language and practice, specifically in the areas of measurement and financial management.
However, IT staff across all industries aren't very confident in how well IT is doing in managing its finances via three core processes:
Recent data from 4,137 respondents to Info-Tech's IT Management & Governance Diagnostic shows that while most IT staff feel that these three financial management processes are important, notably fewer feel that IT management is effective at executing them.
IT leadership's capabilities around fundamental cost data capture appear to be lagging, not to mention the essential value-added capabilities around optimizing costs and showing how IT contributes to business value.



Source: IT Management & Governance Diagnostic, Info-Tech Research Group, 2022.
Exactly how is IT spending all that money we give them?
Many IT costs, like back-end infrastructure and apps maintenance, can be invisible to the business.
Why doesn't my department get more support from IT?
Some business needs won't align with spend priorities, while others seem to take more than their fair share.
Does the amount we spend on each IT service make sense?
IT will get little done or fall short of meeting service level requirements without appropriate funding.
I know what IT costs us, but what is it really worth?
Questions about value arise as IT investment and spend increase. How to answer these questions is critical.
At the end of the day, telling IT's spend story to the business is a significant challenge if you don't understand your audience, have a shared vocabulary, or use a repeatable framework.
However, the best methodological framework won't work if the materials and information plugged into it are weak. With IT spend, the materials and information are your staff and your vendor financial data. To achieve true transparency, inputs must have the following three characteristics:
| Availability | Reliability | Usability |
|---|---|---|
| The data and information are up-to-date and accessible when needed. | The data and information are accurate, complete, and verifiable. | The data and information are clearly defined, consistently and predictably organized, consumable, and meaningful for decision-making. |
A framework is an organizing principle. When it comes to better understanding your IT spend, the things being organized by a framework are your method and your data.
If your IT spend information is transparent, you have an excellent foundation for having the right conversations with the right people in order to make strategically impactful decisions.


Put your data to work instead of being put to work by your data.
| 1. Know your objectives | 2. Gather required data | 3. Map your IT staff spend | 4. Map your IT vendor spend | 5. Identify implications for IT | |
|---|---|---|---|---|---|
| Phase Steps |
|
|
|
|
|
| Phase Outcomes | Goals and scope for your IT spend and staffing transparency effort. | Information and data required to perform the IT staff and vendor spend transparency initiative. | A mapping of the allocation of IT staff spend across the four views of the Info-Tech ITFM Cost Model. | A mapping of the allocation of IT vendor spend across the four views of the Info-Tech ITFM Cost Model. | An analysis of your results and a presentation to aid your communication of findings with stakeholders. |
Overarching insight
Take the perspective of key stakeholders and lay out your organization's complete IT spend footprint in terms they understand to enable meaningful conversations and start evolving your IT financial management capability.
Phase 1 insight
Your IT spend transparency efforts are only useful if you actually do something with the outcomes of those efforts. Be clear about where you want your IT transparency journey to take you.
Phase 2 insight
Your IT spend transparency efforts are only as good as the quality of your inputs. Take the time to properly source, clean, and organize your data.
Phase 3 insight
Map your IT staff spend data first. It involves work but is relatively straightforward. Practice your mapping approach here and carry forward your lessons learned.
Phase 4 insight
The importance of good, usable data will become apparent when mapping your IT vendor spend. Apply consistent and meaningful vendor labels to enable true aggregation and insight.
Phase 5 insight
Communicating your final IT spend transparency mapping with executive stakeholders is your opportunity to debut IT financial management as not just an IT issue but an organization-wide concern.
Use this tool in Phases 1-4
IT Spend & Staffing Transparency Workbook
Input your IT staff and vendor spend data to generate visual outputs for analysis and presentation in your communications.
IT Spend & Staffing Transparency Executive Presentation
Create a showcase for your newly-transparent IT staff and vendor spend data and present it to key business stakeholders.
Use this tool in Phase 5
| IT Benefits | Business Benefits |
|---|---|
|
|
In phase 1 of this blueprint, we will help you identify initiatives where you can leverage the outcomes of your IT spend and staffing transparency effort.
In phases 2, 3, and 4, we will guide you through the process of mapping your IT staff and vendor spend data so you can generate your own IT spend metrics based on reliable sources and verifiable facts.
Win #1: Knowing how to reliably source the financial data you need to make decisions.
Win #2: Getting your IT spend data in an organized format that you can actually analyze.
Win #3: Having a framework that puts IT spend in a language stakeholders understand.
Win #4: Gaining a practical starting point to mature ITFM practices like cost optimization.
| DIY Toolkit | Guided Implementation | Workshop | Consulting |
|---|---|---|---|
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks are used throughout all four options.
| Phase 1: Know your objectives | Phase 2: Gather required data | Phase 3: Map your IT staff spend | Phase 4: Map your IT vendor spend | Phase 5: Identify implications for IT |
|---|---|---|---|---|
| Call #1: Discuss your IT spend and staffing transparency objectives and readiness. | Call #2: Review spend and staffing data sources and identify data organization and cleanup needs. | Call #3: Review your mapped IT staff spend and resolve lingering challenges. | Call #4: Review your mapped IT vendor spend and resolve lingering challenges. | Call #5: Analyze your mapping outputs for opportunities and devise next steps. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between four to six calls over the course of two to three months.
The path to IT financial management maturity starts with knowing exactly where your money is going. To streamline this effort, Info-Tech offers an IT Spend & Staffing Benchmarking service that provides full transparency into where your money is going without any heavy lifting on your part.
This unique service features:
If you'd like Info-Tech to pave the way to IT spend transparency, contact your account manager for more information - we're happy to talk anytime.
This phase will walk you through the following activities:
This phase involves the following participants:
You're at the very beginning of your IT spend transparency journey. In this phase you will:
"I've heard this a lot lately from clients: 'I've got my hands on this data, but it's not structured in a way that will allow me to make any decisions about it. I have these journal entries and they have some accounting codes, GL descriptors, cost objects, and some vendors, but it's not enough detail to make any decisions about my services, my applications, my asset spend.'"
- Angie Reynolds, Principal Research Director, ITFM Practice, Info-Tech Research Group
CFO expense view
CXO business view
CIO service view
CEO innovation view
When determining your end objectives, think about the real questions IT is being asked by the business and how IT spend transparency will help you answer them.
IT spend used to be looked at from a strictly financial accounting perspective - this is the view of the CFO and the finance department. Their question, "exactly how is IT spending all that money we give them," is really about how money is distributed across different asset classes. This question breaks down into other questions that IT leaders needs to ask themselves in order to provide answers:
| Example | |
|---|---|
| Asset Class | % IT Spend |
| Workforce | 42.72% |
| Software - Cloud | 9.26% |
| Software - On Prem | 13.61% |
| Hardware - Cloud | 0.59% |
| Hardware - On Prem | 15.68% |
| Contract Services | 18.14% |
| Info-Tech IT Spend & Staffing Studies, 2022. | |
As the CIO role was adopted, IT spend was viewed from the IT operations management perspective. Optimizing the IT delivery model is a critical step to reducing time to provision services. For the IT leader, the questions they need to ask themselves are:
| Example | |
|---|---|
| Service Area | % IT Spend |
| App Development | 9.06% |
| App Maintenance | 30.36% |
| Hosting/Network | 25.39% |
| End User | 18.59% |
| Data & BI | 3.58% |
| Security & Risk | 5.21% |
| IT Management | 7.82% |
| Info-Tech IT Spend & Staffing Studies, 2022. | |
As business requests have increased, so too has the importance of the business unit perspective. Each business function has a unique mandate to fulfill in the organization and also competes with other business functions for IT resources. By understanding business consumption of IT, organizations can bring transparency and drive a different dialog with their business partners. Every IT leader should find out the answers to these questions:
| Example | |
|---|---|
| Business Function | % IT Spend |
| HR Department | 6.16% |
| Finance Department | 15.15% |
| IT Department | 10.69% |
| Business Function 1 | 23.80% |
| Business Function 2 | 10.20% |
| Business Function 3 | 6.80% |
| Business Function 4 | 27.20% |
| Source: Info-Tech IT Spend & Staffing Studies, 2022. | |
With a business view now available, evaluating IT spend from a strategic standpoint is critical. Simply put, how much is being spent keeping the lights on (KTLO) in the organization versus supporting business or organizational growth versus net-new business innovations? This view is not about what IT costs but rather how it is being prioritized to drive revenue, operating margin, or market share. Here are the questions IT leaders should be asking themselves along with the organization's executive leadership and the CEO:
| Example | |
|---|---|
| Focus Area | % IT Spend |
| KTLO | 89.16% |
| Grow | 7.18% |
| Innovate | 3.66% |
| Info-Tech IT Spend Studies, 2022. | |
I want to ...
Analyze the impact of the cloud on IT operating expenditure to update finance's expectations of a realistic IT CapEx/OpEx ratio now and into the future.
To address the problem of ...
And will use transparency to ...
Duration: One hour
Document your outputs on the slide immediately following the instruction slides for this exercise. Examples are included.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Problem/Issue Statement | Source/ Stakeholder | Associated ITFM Process | Potential Initiative | Initiative Goal | Time Frame |
| "Why is IT's OpEx so high? We need you to increase IT's percentage of CapEx." | CFO | IT spend categorization and reporting. | Analyze the impact of the cloud on IT operating expenditure. | To update finance's expectations of a realistic IT CapEx/OpEx ratio. | <12 months |
| "Why do we need to hire more service desk staff? There are more of them in IT than any other role." | CFO, VP of HR | Business case for hiring IT staff. | Document ongoing IT support requirements for proposed ERP platform migration project. | To ensure sufficient resources for an anticipated increase in service desk tickets due to implementation of a new ERP system. | 1-3 months |
| "Why can't IT just buy this new app we want? It's not very expensive." | CEO, all CXOs/VPs | Total cost of technology ownership. | Develop a mechanism to review the lifecycle impact on IT of proposed technology purchases. | To determine if functionality of new tool already exists in the org. and the total cost of ownership of a new app. | <6 months |
| "Did output increase or decrease last quarter per input unit? IT should be able to run those reports for us." | CEO, CFO, VP of Production | IT service costing. | Develop an organizational business intelligence strategy. | To create a comprehensive plan for evolving BI capability in the organization and transferring report development to users. Select a department for pilot. | <12 months |
| Know your governance culture | Lower Governance
|
Higher Governance
|
| Determine impact on opportunities | How does your governance culture impact IT spend transparency opportunities? | |
|---|---|---|
| Resistance to formality and bureaucracy | Resistance to change and uncertainty | |
| Set expectations and approach | You have plenty of room to implement transparency rigor within the confines of IT, but getting others to give you the time and attention you want will be a challenge. One-on-one, informal relationship building to create goodwill and dialogue is needed before putting forth recommendations or numbers. | Many existing procedures must be accommodated and respected. While you can benefit by working with preexisting mechanisms and touchpoints, expect any changes you want to make to things like IT cost categories or CapEx/OpEx ratios to require a lot of time, meetings, and case-making. |
| Know your ITFM maturity level | Lower ITFM Maturity
|
Higher ITFM Maturity
|
| Determine stakeholders' financial literacy | How does your degree of ITFM maturity impact IT spend transparency opportunities? | |
|---|---|---|
| Improve your own financial literacy first | Determine stakeholders' financial literacy | |
| Set expectations and approach | Brush up on core financial management and accounting concepts before taking the discussion beyond IT's walls. Do start mapping your costs, but just know how to communicate what the data is saying before sharing it. | Not everyone will be at your level, familiar with ITFM language and concepts, or focused on the same things you are. Gauge where your audience is at so you can prepare for meaningful dialogue. |
Duration: One hour
Note: This assessment is general in nature. It's intended to help you identify and prepare for potential challenges in your IT spend and staffing transparency effort.
Document your outputs on the slide immediately following the two instruction slides for this exercise.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Data & Information | |
| Statement | Rating |
| We know how to access all IT department spend records. | |
| We know how to access all non-IT-department technology spend records. | |
| We know how to access all IT vendor/contractor agreements. | |
| We know how to access data about our IT staff costs and allocation, such as organizational charts and salaries/benefits. | |
| Our financial and staffing data is up-to-date. | |
| Our financial and staffing data are labeled, described, and organized so that we know what they're referring to. | |
| Our financial and staffing data are in a format that we can easily manipulate (e.g. export, copy and paste, perform calculations). | |
| Experience, Expertise, & Support | |
| Statement | Rating |
| We have sufficient expertise within the IT department to navigate and accurately interpret financial records. | |
| We have reasonable access to expertise/resources in our finance department to support us in an IT spend transparency exercise. | |
| We can allocate sufficient time (about 40 hours) and resources in the near term to do an IT spend transparency exercise. | |
| We have current accountabilities to track and internally report financial information to others on at least a monthly basis. | |
| There are existing financial policies, procedures, and standards in the organization with which we must closely adhere and comply. | |
| We have had the experience of participating in, or responding to the results of, an internal or external audit. | |
Rating scale:
1 = Strongly Disagree; 2 = Disagree; 3 = Neither agree nor disagree; 4 = Agree; 5 = Strongly agree
Assessment scale:
Less than 30 = Not ready; 30-39 = Challenged; 40-49 = Ready with caveats; 50-65 = Ready
Take a closer look at the statements you rated 1, 2, or 3. These will be areas of challenge no matter what your total score on the assessment scale.
You've now completed the first two steps on your IT spend transparency journey. You have:
"Mapping to a transparency model is labor intensive. You can do it once and never revisit it again, but we would never advise that. What it does is play well into an IT financial management maturity roadmap."
- Monica Braun, Research Director, ITFM Practice, Info-Tech Research Group
This phase will walk you through the following activities:
This phase involves the following participants:
You're now ready to do the final preparation for your IT spend and staffing transparency journey. In this phase you will:
"Some feel like they don't have all the data, so they give up. Don't. Every data point counts."
- Rex Ding, Research Specialist, ITFM Practice, Info-Tech Research Group
Aim for a comprehensive, complete, and accurate set of data and information.


In scope:
IT may have low or no visibility into technologies that exist in the broader business environment beyond IT. Accept that you won't gain 100% visibility right now. However, do get started and be persistent.
Where to look for non-IT technology ...
Who might get you what you need ...
The IT spend and staffing transparency exercise is an opportunity to kick-start a technology discovery process that will give you and the business a true picture of your technology profile, use, and spend.
Key data and information to seek out:
Look for these data descriptors in your files:
Spend data that's out of scope:
Challenging data formats:
This is where your governance culture and ITFM maturity start to come into play.
| Data source | Potential data and information | What to expect |
| IT | Current/past budget, vendor agreements, IT project records, discretionary spend, number of IT employees. | The rigor of your ITFM practice and centralization of data and documents will affect how straightforward this is. |
| Finance | General ledger, cash and income statements, contractor payments and other accounts payable, general revenue. | Secure their expertise early. Let them know what you're trying to do and what you need. They may be willing to prepare data for you in the format you need and help you decipher records. |
| Purchasing | List of vendors/suppliers, vendor agreements, purchase invoices. | Purchasing often has more descriptive information about vendors than finance. They can also point you to tech spend in other departments that you didn't know about. |
| Human Resources | Organizational chart, staff salaries and benefits, number of employees overall and by department. | Data about benefits costs is something you're not likely to have, and there's only one place you can reliably get it. |
| Other Business Units | Non-IT technology spend vendor agreements and purchase invoices, number of department employees. | Other departments may be tracking spend in an entirely different way than you. Be prepared to dig and reconcile. |
There may be some data or information you can't get without a Herculean effort. Don't worry about it too much - these items are usually relatively minor and won't significantly affect the overall picture.
Near-term visibility fix ...
Long-term visibility fix ...
Look for the following anomalies:
These anomalies often explain why IT spend is unusually high in certain areas. There's often a good business reason.
In many cases, doing a separate spend transparency exercise for these anomalous projects or events can isolate their costs from other spend so their true nature and impact can be better understood.
Duration: Variable
Download the IT Spend & Staffing Transparency Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
The more preparation you do to approach the "good data" intersection point in the diagram below, the easier your mapping effort will be and the more useful and insightful your final findings.

Warning: Never overwrite your original data. Insert new columns/rows and put your alternate information in these instead.
Step 1: Standardize vendor names
Step 2: Consolidate vendor spend
Duration: Variable
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Common shared business functions:
It may seem odd to see IT on the business functions list since the purpose of this exercise is to map IT spend. For business view purposes, IT spend refers to what IT spends on itself to support its own internal operations.
Examples of industry-specific functions:
See the Appendix of this blueprint for definitions of shared business functions plus sample industry-specific business view categories.
Stay high-level
Getting too granular invites administrative headaches and overhead. Keep things high-level and general:
Limit your number of buckets
Tracking IT spend across more than 8-10 shared and industry-specific business categories is impractical.

Ensure clear boundaries
Mutual exclusivity is key when defining categories in any taxonomical structure.
Identify exclusions
Listing what's out can be just as informative and clarifying as listing what's in.

Duration: Two hours
Download the IT Spend & Staffing Transparency Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
These baseline data will allow you to calculate high-level metrics like IT spend as a percent of revenue and year-over-year percent change in IT spend, as well as more granular metrics like IT staff spend per employee for a specific IT service.
Baseline data checklist
You may have discovered some things you didn't know about during the mapping process. Revisit your baseline data when your mapping is complete and make adjustments where needed.
Duration: One hour
Download the IT Spend & Staffing Transparency Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
You've now completed all preparation steps for your IT spend transparency journey. You have:
"As an IT person, you're not speaking the same language at all as the accounting department. There's almost always a session of education that's required first."
- Angie Reynolds, Principal Research Director, ITFM Practice, Info-Tech Research Group
This phase will walk you through the following activities:
This phase involves the following participants:
Now it's time to tackle the first part of your hands-on spend mapping effort, namely IT staff spend. In this phase you will:
"We're working towards the truth. We know the answer, but it's how to get it. Take Data & BI. For some organizations, four FTEs is too many. Are these people really doing Data & BI? Look at the big picture and see if something's missing."
- Rex Ding, Research Specialist, ITFM Practice, Info-Tech Research Group
Staffing spend transparency can do a lot to change the conversation from one where the business thinks that IT management is just being self-protecting to one where they know that IT management is actually protecting the business.
Demonstrating the legitimate reasons behind IT staff spend is critical in both rationalizing past and current spend decisions as well as informing future decisions.
Mapping your IT staffing spend first is a good idea because:
"Some companies will say software developer. Others say application development specialist or engineer.
What are these things? You have to have conversations ..."
- Rex Ding, Research Specialist, ITFM Practice, Info-Tech Research Group
Workforce: The total costs of employing labor in the IT organization. This includes all salary/wages, benefits, travel/training, dues and memberships, and contractor pay. Managed services expenses associated with an external service provider should be excluded from Workforce and included in Contract Services.
Employee: A person employed by the IT organization on a permanent full-time or part-time basis. Costs include salary, benefits, training, travel and expenses, and professional dues and memberships. These relationships are managed under human resources and the bulk of spend transactions via payroll processes.
Contractor: A person serving in a non-permanent staff augmentation role. These relationships are typically managed under procurement or finance and spend transactions handled via invoicing and accounts payable processes. Labor costs associated with an external service provider are excluded.

In the CFO Expense View, all IT spend on staffing is allocated to the Workforce bucket under either Employee or Contractor.
What constitutes a Contractor can be confusing given increased use of long-term labor augmentation strategies, so being absolutely clear about this is imperative. For spend mapping purposes:

Applications Development: Purchase/development, testing, and deployment of application projects. Includes internally developed or packaged solutions.
Applications Maintenance: Software maintenance fees or maintaining current application functionality along with minor enhancements.
Hosting & Networks: Compute, storage, and network functionality for running/hosting applications and providing communications/connectivity for the organization.
End User: Procurement, provision, management, and maintenance (break/fix) of end-user devices (desktop, laptops, tablets, peripherals, and phones) as well as purchase/support and use of productivity software on these devices. The IT service desk is included here as well.
PPM & Projects: People, processes, and technologies dedicated to the management of IT projects and the IT project portfolio as a whole.
Data & BI: Strategy and oversight of the technology used to support data warehousing, business intelligence, and analytics.
IT Management: Senior IT leadership, IT finance, IT strategy and governance, enterprise architecture, process management, vendor management, talent management, and program and portfolio management oversight.
Security: Information security strategy and oversight, practices, procedures, compliance, and risk mitigation to protect and prevent unauthorized access to organizational data and technology assets.

The CIO Service View mirrors how many IT departments are organized into teams or work groups. However, some partial percentage-based allocations are probably required, especially for smaller IT units with more generalized, cross-functional roles. For example:
Info-Tech has found that allocating staffing costs for Data & BI raises the most doubts as it can be very entangled with Applications and other spend. Do the best you can.
Industry Functions: As listed and defined by you for your specific industry.
Human Resources: IT staff and specific application functionality in support of organizational human resource management.
Finance & Accounting: IT staff and specific application functionality in support of corporate finance and accounting.
Shared Services Other: IT staff and specific application functionality in support of all other shared enterprise functions.
Information Technology: IT staff and specific application functionality in support of IT performing its own internal IT operations functions.
Industry Other: IT staff and specific application functionality in support of all other industry-specific functions.

The CXO Expense View also requires percentage-based splitting of role spend, but to a greater extent.
Direct IT costs are those that are dedicated to a specific business unit or user group, such a marketing campaign management app, specialized devices used by a specific subset of workers in the field, or a business analyst embedded full-time in a sales organization.
VS
Indirect IT costs are pretty much everything else that's shared broadly across the organization and can't be tied to just one stakeholder or user group, such as network infrastructure, the service desk, and office productivity apps. These costs must be fairly and evenly distributed.
No indirect mapping method is perfect, but here's a suggestion:
"There is always a conversation about indirect allocations. There's never been an organization I've heard of or worked for which has been able to allocate every technology cost directly to a business consumption or business unit."
Monica Braun, ITFM Research Director, Info-Tech Research Group
Example:
Some indirect costs are shared by multiple business functions, but not all. In these cases, exclude non-participating business functions from the total number of organizational employees and re-calculate a new percent of staff for each participating business function.
Direct IT staffing spend
Definition: Individuals or teams whose total time is formally dedicated to the support of one business unit/function.
Hybrid IT staffing spend
Definition: Teams with a percent of time or entire FTEs formally dedicated to one business unit/function while the remainder of the time or team is generalized.
Indirect IT staffing spend
Definition: Individuals or teams whose total time is generalized to the support of multiple or all business units or functions.
Indirect staff spend only comes into play in the CXO Business View. Thoroughly map the CIO Service View first and leverage its outcomes to inform your allocations to individual business and industry functions.
Business Innovation: IT spend/ activities focused on the development of new business capability, new products and services, and/or introduction of existing products/ services into new markets. It does not include expansion or update of existing capabilities.
Business Growth: IT spend/activities focused on the expansion, scaling, or modernization of an existing business capability, product/service, or market. This is specifically related to growth within a current market.
Keep the Lights On: IT spend/activities focused on keeping the organization running on a day-to-day basis. This includes all activities used to ensure the smooth operation of business functions and overall business continuity.

Important Note
Info-Tech analysts often skip mapping staff for the CEO Innovation View when delivering the IT Spend & Staffing Benchmarking Service.
This is because, for many organizations, either most IT staff spend is allocated to Keep the Lights On or any IT staff allocation to Business Growth and Business Innovation activities is untracked, undocumented, and difficult to parse out.
Overlay a broader assessment of your IT staff
Info-Tech's IT Staffing Assessment diagnostic can expand your view of what's really happening on the staffing front.
Take action
Approach: Be efficient to be effective
Start with what you know best: Map the CFO Expense View first to plug in information you already have. Next, map the CIO Service View since it's most aligned to your organization chart.
Keep a list of questions: You'll need to seek clarifications. Note your questions, but don't reach out until you've done a first pass at the mapping - don't annoy people with a barrage of questions.
Delegate: Your managers and leads have a more accurate view of exactly what their staff do. Consider delegating the CIO Service View and CXO Business View to them or turn the mapping exercise into a series of collaborative leadership team activities.
Biggest challenge: Role/title ambiguity
Key step - validate! If you see services or functions with low or no allocation, or something just doesn't look right, investigate. Someone's doing that work - take the time to figure out who.
Duration: Variable
Download the IT Spend & Staffing Transparency Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
You've now completed your IT staff spend mapping. You have:
"Some want to allocate everybody to IT, but that's not how we do it. [In one CXO Business View mapping], a client allocated all their sand network people to the IT department. At the end of the process, the IT department itself accounted for 20% of total IT spend. We went back and reallocated those indirect staff costs across the business."
- Kennedy Confurius, Research Analyst, ITFM Practice, Info-Tech Research Group
This phase will walk you through the following activities:
This phase involves the following participants:
Now you're ready to take on the second part of your spend mapping, namely IT vendor spend. In this phase you will:
"[One CIO] said that all technology spend runs through their IT group. But they didn't have hardware in their financial data file - no cellphones or laptops, no network or server expenses. They thought they had everything, but they didn't know what they didn't have. Assume it's out there somewhere."
- Kennedy Confurius, Research Analyst, ITFM Practice, Info-Tech Research Group
"A common financial data problem is no vendor names. I've noticed that, even if the vendor name is there, there are no descriptors. You cannot actually tell what type of service it is. Data security? Infrastructure? Networking? Ask yourself 'What did we purchase and what does it do?'"
- Aman Kumari, Research Specialist, ITFM Practice, Info-Tech Research Group
Vendor: Provider of a good or service in exchange for payment.
Hardware: Costs of procuring, maintaining, and managing all IT hardware, including end-user devices, data center and networking equipment, cabling, and hybrid appliances for both on-premises and cloud-based providers.
Software: Costs for all software (applications, database, middleware, utilities, tools) used across the organization. This includes purchase, maintenance, and licensing costs.
Contract Services: Costs for all third-party services including managed service providers, consultants, and advisory services.
Cloud: Offsite hosting and delivery of an on-demand software or hardware computing function by a third-party provider, often on a subscription-type basis.
On-Prem: On-site hosting and delivery of a software or hardware computing function, often requiring upfront purchase cost and subsequent maintenance costs.
Managed Services: Costs for outsourcing the provision and maintenance of a technical process or function.
Consulting & Advisory: Costs for the third-party provision of professional or technical advice and expertise.

On-Premises
Cloud
Vendors are increasingly "retiring" on-premises software products. This means an older version may be on-prem, a newer one cloud, and you may have both in play.
Applications vs. Data & BI
Applications vs. Security
Putting spend in the right bucket does matter. However, if uncertainty persists, err on the side of consistency. For most organizations Applications Maintenance does end up being the biggest bucket.
| 1 | Sort high to low | Sort your list of vendor spend from highest to lowest. Your top 20 vendors should constitute most of the spend. |
| 2 | Map multi-department enterprise apps | Flag your top apps vendors that have presence in most or all of your business units. Map these first. These tend to be enterprise-level business apps "owned" by core business functions but used broadly across the organization such as enterprise resource planning (ERP), customer relationship management (CRM), and people management systems. |
| 3 | Map end-user spend | Identify top vendors of general end-user technologies like office productivity apps, desktop hardware, and IT service desk tools. Allocate percentages according to your selected indirect spend mapping method. |
| 4 | Map core infrastructure spend | Map the behind-the-scenes network, telecom, and data center technologies that underpin IT, plus any infrastructure managed services. Again, apply your selected indirect spend mapping method. |
| 5 | Map business-unit specific technologies | This is the spend that's often incurred by just one department. This may also be technology spend that's out in the business, not in IT proper. Map it to the right business function or put it in Business Other or Industry Other if the business function doesn't have its own bucket. |
| 6 | Map the miscellaneous | Only smaller spend items likely remain at this point. When in doubt, map them to either Business Other or Industry Other. |
| Remember "when in doubt, map to either the Business Other or Industry Other category"? Know what large Other buckets might really be telling you. | After your first pass at mapping the CXO Business View, review Business Other and Industry Other if either is more than about 10% of your total spend. |
| Diversification: Your organization has a wide array of business functions and/or associated staff that exist outside the core business and industry-specific categories selected. | Are there minor business functions that can reasonably be included with the core categories identified? If not, don't force it. Better to keep your core buckets clean and uncomplicated. |
| Non-core monolith: There's a significant technology installation outside the core that's associated with a comparatively minor business function. | Is there a business function incurring substantial technology spend that should probably be broken out on its own and added to the core? If so, do it. Spend is unlikely to get smaller as the organization grows, so best to shine a light on it now. |
| Shadow IT: There's significant technology spend in several areas of the organization that is unowned, unmanaged, or serving an unknown purpose as far as IT is concerned. | Is a lot of the spend non-IT technology in the business? If yes, flag it and plan to learn more. It's likely that technologies living elsewhere in the organization will become IT concerns eventually. Better to be ready than to be surprised. |
Keep the Lights On
Spend usually triggered by a service deck ticket or work order, not a formal project. Includes:
Business Growth
Spend usually in the context of a formal project under a CapEx umbrella. Includes:
Business Innovation
Spend is always in the context of a formal project and should be 100% CapEx in the first year after purchase. Includes:
In many organizations, most technology spend will be allocated to Keep the Lights On. This is normal but should generate conversations with the business about redirecting funds to growth and innovation.
Approach: Move from macro to micro
Biggest challenge: Poor vendor labeling
Key step - validate! If you see services or functions with low or no allocation, or something just doesn't look right, investigate. There's probably a technology out there in the business doing that work.
Duration: Variable
Download the IT Spend & Staffing Transparency Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
You've now completed your IT vendor spend mapping. You have:
"A lot of organizations log their spending by vendor name with no description of the goods or services they actually purchased from the vendor. It could be hardware, software, consulting services ... anything. Having a clear understanding of what's really in there is an essential aspect of the spend conversation."
- Rex Ding, Research Specialist, ITFM Practice, Info-Tech Research Group
This phase will walk you through the following activities:
This phase involves the following participants:
You're now nearing the end of the first leg in your IT spend transparency journey. In this phase you will:
"Don't plug in numbers just to make yourself look good or please someone else. The only way to improve is to look at real life."
- Monica Braun, Research Director, ITFM Practice, Info-Tech Research Group
Mapping your IT spend is a lot of work, but what you've achieved is impressive (applause!) as well as essential for growing your ITFM maturity. Now put your hard work to work.
The slides that follow show sample data summaries and visualizations generated in the IT Spend & Staffing Transparency Workbook. We'll take a look at the metrics, tables, and graphs you now have available to you post-mapping and how you can potentially use them in conversations with different IT stakeholders.
There are two basic types of benchmarking ...
Internal: Capturing a current-state set of data about an in-house operation to serve as a baseline. Over time, snapshots of the same data are taken and compared to the baseline to track and assess changes. Common uses for internal benchmarking include:
External: Seeking out aggregated, current-state data about a peer-group operation to assess your own relative status or performance on the same operation. Common uses for external benchmarking include:
Both types of benchmarking benefit from some formality and rigor. Info-Tech can help you stand up an ITFM benchmarking approach as well as connect you with actual IT spend peer benchmarks via our IT Spend & Staffing Benchmarking service.
Duration: Variable
Download the IT Spend & Staffing Transparency Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|

OpEx is often seen as a sunk cost (i.e. an IT problem).
CapEx is usually seen as investment (i.e. a business growth opportunity).
Break down the OpEx/CapEx wall. Reference OpEx whenever you talk about CapEx. The best way to do this is via Total Cost of Ownership (TCO).
Traditional categories don't reflect IT reality anymore.
"Software (on-premises)" and "hardware (cloud)" are more meaningful descriptors than "software" and "hardware." Shift the dialogue.
Start the migration from major categories to minor categories.
The decision to go with permanent employees or contractors depends on your ultimate goals.
Far too often, labor-sourcing decisions are driven by controlling near-term costs instead of generating and sustaining long-term value.
Introduce the cost-to-value ratio to your workforce spend conversations.
Now that you've mapped your IT spend data to the CFO Expense View, there are some questions you're better equipped to answer, namely:
You now have:
Exactly like this ...

Major service categories: These values give a high-level snapshot of your general IT service spend priorities. In most organizations, Applications dominates, making it a focus for cost optimization.
Minor service categories: The level of granularity for these values prove more practical when measuring performance and making service management decisions - not too big, not too small. While not reflected in this example, application maintenance is usually the largest relative consumer of IT spend in most organizations.
Data & BI and security: Isolating the exact spend for these services is challenging given that they're often entangled in applications and infrastructure spend respectively, and separate spend tracking for both is a comparatively recent practice.

Is the amount of spend on a given service in parallel with the service's overall importance?
Identify the hot spots and pick your battles.
It's all about how much room you have to move.
Grow your IT service management practice.
Now that you've mapped your IT spend data to the CIO Service View, there are some questions you're better equipped to answer, namely:
You now have:
We have some good opportunities for optimization ...


Share information, don't push recommendations.
If possible, slice the numbers by business unit headcount.
Be transparent in your transparency.
Use questions about indirect IT staff spend distribution to engage stakeholders.
Now that you've mapped your IT spend data to the CXO Business View, there are some questions you're better equipped to answer, namely:
You now have:
Let's look at how you compare to the other departments ...


Use the numbers to get to the real issues.
Focus your KTLO spend conversation on risk and trade-off.
Now that you've mapped your IT spend data to the CEO Innovation View, there are some questions you're better equipped to answer, namely:
You now have:
Here's how tech spend directly supports business objectives ...

Review the real problems and issues you need to address and the key stakeholders.
This will guide what data you focus on or showcase with other business leaders. For example, if IT OpEx is perceived as high, be prepared to examine the CapEx/OpEx ratio as well as cloud-related spend's impact on OpEx.
Flag ITFM processes you'll develop as part of your ITFM maturity improvement plan.
You won't become a TCO math expert overnight, but being able to communicate your awareness of and commitment to developing and applying ITFM capabilities helps build confidence in you and the information you're presenting.
Use your first big presentation to debut ITFM.
ITFM as a formal practice and the changes you hope to make may be a novel concept for your business peers. Use your newfound IT spend and staffing transparency to gently wade into the topic instead of going for the deep dive.
The goal of this first presentation is to showcase IT spend in general and make sure that everyone's getting the same information as everyone else.
Go broad, not deep
Defer any in-depth examinations until after you're sure you have everyone's attention. Only dive deep when you're ready to talk about specific plans via follow-up sessions.
Focus on the CXO
Given your audience, the CXO Business View may be the most interesting for them and will trigger the most questions and discussion. Plan to spend the largest chunk of your time here.
Avoid judgment
Let the numbers speak for themselves. Do point out what's high and what's low, but don't offer your opinion about whether it's good or bad. Let your audience draw their own conclusions.
Ask for impressions
Education and awareness are primary objectives. What comes up will give a good indication of what's known, what's news, who's interested, and where there's work to do.
Pick a starting point
Ask what they see as high-priority areas for both optimizing IT costs as well as improving the organization's approach to making IT spend decisions in general.
What to include in your presentation ...
Duration: Two hours
Note: Refer to your organization's standards and norms for executive-level presentations and either adapt the Info-Tech template accordingly or use your own.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the IT Spend & Staffing Transparency Executive Presentation TemplateTemplate
You've done the hard part in starting your IT spend transparency journey. You have:
"Having internal conversations, especially if there is doubt, allows for accuracy and confidence in your model. I was showing someone the cost of a service he managed. He didn't believe the service was so expensive. We went through it: here are the people we allocated, the assets we allocated, and the software we allocated. It was right - that was the total cost. He was like, 'No way. Wow.' The costs were high, and the transparency is what allowed for a conversation on cost optimization."
- Monica Braun, Research Director, ITFM Practice, Info-Tech Research Group
This final section will provide you with:
You've now mapped the entirety of technology spend in your organization. You've:
What's next?
With a reliable baseline, you can look forward to more informed and defensible IT budgeting and cost optimization. Use your newly-transparent IT spend as a foundation for improving your financial data hygiene in the near term and evolving your overall ITFM governance maturity in the long-term.
If you would like additional support, have our analysts guide you through an Info-Tech full-service engagement or Guided Implementation.
Contact your account representative for more information.
1-888-670-8889

Monica Braun
Research Director, ITFM Practice
Info-Tech Research Group

Dave Kish
Practice Lead, ITFM Practice
Info-Tech Research Group

Kennedy Confurius
Research Analyst, ITFM Practice
Info-Tech Research Group

Aman Kumari
Research Specialist, ITFM Practice
Info-Tech Research Group

Rex Ding
Research Specialist, ITFM Practice
Info-Tech Research Group

Angie Reynolds
Principal Research Director, ITFM Practice
Info-Tech Research Group
Build Your IT Cost Optimization Roadmap
| Business function | Definition |
| Human Resources | The management of the recruitment, training, development, appraisal, compensation/reward, retention, and departure of employees in an organization. Does not include management of subcontractor or outsourced relationships. |
| Finance and Accounting | The management and analysis of an organization's revenue, funds, spend, investments, financial transactions, accounts, and financial statements. Often includes enterprise asset management. |
| Procurement and Supplier Management | Acquiring materials, goods, and services from an external party, including identifying potential suppliers/providers, managing tendering or bidding processes, negotiating terms and agreements, and managing the relationship with the vendor/provider. |
| Information Technology | The development, management, and optimization of information technology resources and systems over their lifecycle in support of an organization's work priorities and goals. Includes computer-based information and communication systems, but typically excludes industrial operational technologies. |
| Legal | Expertise in interpretation, implication, and application of legislation and regulation that affects the enterprise, including guidance and support in the areas of risk, contracting, compliance, ownership, and litigation. |
| Regulatory Affairs and Compliance Management | Identification, operationalization, monitoring, reporting, and enforcement of the standards, rules, codes, and laws that apply to an organization's operating environment and the products and services it offers. |
| Sales | Transactional provision of a product or service to a buyer at an agreed-upon price. Includes identifying and developing prospective buyers, presenting and explaining the product/service, overcoming prospect objections and concerns to purchase, negotiating terms, developing contracts, and billing or invoicing. |
| Customer Service and Support | A range of activities designed to optimize the customer experience with an organization and its products and services throughout the customer lifecycle with the goals of retaining the customer; encouraging additional spend or consumption; the customer positively influencing other potential customers; and minimizing financial and reputational business risks. |
| Marketing and Advertising | Understanding customer/prospect needs, developing strategies to meet those needs, and promotion of the organization's products/services to a target market via a range of channels to maximize revenue, membership, donations, and/or develop the organization's brand or reputation. Includes market research and analysis and promotion, campaign, and brand management. |
| Industry function | Definition |
| Product Innovation | Research, design, development, and launch of new products, including the engineering of their underlying production processes. |
| Product and Service Portfolio Management | The management of an organization's collection of products and services, including management of the product/service roadmap; product/service portfolio and catalog; product/service quality and performance; and product/service pricing, bundling and markdown. |
| Logistics and Supply Chain Management | Sourcing raw materials or component parts needed and shipping of a finished product. Includes demand planning; procurement/supplier management; inventory management; yard management; allocation management; fulfillment and replenishment; and product distribution and delivery. |
| Production Operations | Manufacture, storage, and tracking of a product and ensuring product and production process quality. Includes operations management, materials management, quality/safety control, packaging management, and management of the tools, equipment, and technologies that support it. |
| Architecture & Engineering | The design and planning of structures or critical infrastructure systems according to scientific, functional, and aesthetic principles. |
| Construction | New construction, assembly, or alteration of buildings and critical infrastructure (e.g. transportation systems; telecommunications systems; utilities generation/transmission/distribution facilities and systems). Includes management of all construction project plans and the people, materials, and equipment required to execute. |
| Real Estate Management | Management of any residential, commercial, or industrial real estate holdings (land and buildings), including any financial dealings such as its purchase, sale, transfer, and rental as well as ongoing maintenance and repair of associated infrastructure and capital assets. |
| Industry function | Definition |
| Core Banking Services | Includes ATM management; account management (opening, deposit/withdrawal, interest calculation, overdraft management, closing); payments processing; funds transfers; foreign currency exchange; cash management. |
| Loan, Mortgage, and Credit Services | Includes application, adjudication, and approval; facility; disbursement/card issuance; authorization management; merchant services; interest calculation; billing/payment; debt/collections management. |
| Investment and Wealth Management | Processes for the investment of premiums/monies received from policy holders/customers to generate wealth. Often two-pronged: internal investment to fund claim payout in the case of insurance, and customer-facing investment as a financial service (e.g. retirement planning/annuities). Includes product development and management, investment management, safety deposit box services, trust management services. |
| Actuarial Analysis & Policy Creation | Development of new policy products based on analysis of past losses and patterns, forecasts of financial risks, and assessment of potential profitability (i.e. actuarial science). These processes also include development of rate schedules (pricing) and the reserves that the insurer needs to have available for potential claim payouts. |
| Underwriting & Policy Administration | Processes for assessing risk of a potential policy holder; determining whether to insure them or not; setting the premiums the policy holder must pay; and administering the policy over the course of its lifecycle (including updates and billing). |
| Claims Processing & Claims Management | Processes for receiving, investigating, evaluating, approving/denying, and disbursing a claim payout. This process is unique to the insurance industry. In health insurance, ongoing case management processes need to be considered here whereby the insurer monitors and approves patient treatments over a long-term basis to ensure that the treatments are both necessary and beneficial. |
| Industry function | Definition |
| Patient Intake & Admissions | Processes whereby key pieces of information about a patient are registered, updated, or confirmed with the healthcare provider in order to access healthcare services. Includes patient triage, intake management, and admissions management. These processes are generally administrative in nature. |
| Patient Diagnosis | A range of methods for determining the medical condition a patient has in order to provide appropriate care or treatment. Includes examination, consultation, testing, and diagnostic imaging. |
| Patient Treatment | The range of medical procedures, methods, and interventions to mitigate, relieve, or cure a patient's symptom, injury, disease, or other medical condition. Includes consultation and referral; treatment and care planning; medical procedure management; nursing and personal support; medicine management; trauma management; diet and nutrition management; and patient transportation. |
| Patient Recovery & Ongoing Care | Processes and methods for tracking the progress of a patient post-treatment; improving their health outcomes; restoring, maintaining, or improving their quality of life; and discharging or transferring them to other providers. Includes remote monitoring of vital parameters, physical therapy, post-trauma care, and a range of restorative and lifestyle modification programs. |
| Industry function | Definition |
| Accommodation | Short-term lodging in hotel facilities. Includes management and maintenance of guest rooms and common spaces, amenities (e.g. swimming pool), and other related services (e.g. valet parking). |
| Gaming | Includes table wagering games and gambling activities such as slot machines or any other activity that includes on premises mobile casino gaming. |
| Food & Beverage Services | Food and beverages prepared, served, or available for sale by the hotel on the hotel premises via restaurants and bars and room service. Excludes catering (see Events Management) and management or operation of independent leased food and beverage establishments located on the hotel premises. |
| Entertainment & Events | Planning, coordination, and on-premises hosting of events including conferences, conventions, trade shows, parties, ceremonies and live entertainment, and other forms of recreation on the hotel premises. Includes all aspects of entertainment operations, facility management and catering for the event. |
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess whether you’re ready to optimize the service desk with a shift-left strategy, get buy-in for the initiative, and define metrics to measure success.
Build strategy and identify specific opportunities to shift service support left to Level 1 through knowledge sharing and other methods, to the end-user through self-service, and to automation and AI.
Identify, track, and implement specific shift-left opportunities and document a communications plan to increase adoption.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define how shift left would apply in your organization, get buy-in for the initiative, and define metrics to measure success.
Defined scope and objectives for the shift-left initiative
Buy-in for the program
Metrics to keep the project on track and evaluate success
1.1 Review current service desk structure
1.2 Discuss challenges
1.3 Review shift-left model and discuss how it would apply in your organization
1.4 Complete the Shift-Left Prerequisites Assessment
1.5 Complete a RACI chart for the project
1.6 Define and document objectives
1.7 Review the stakeholder buy-in presentation
1.8 Document critical success factors
1.9 Define KPIs and metrics
Shift-left scope
Completed shift-left prerequisites assessment
RACI chart
Defined objectives
Stakeholder buy-in presentation
Critical success factors
Metrics to measure success
Build strategy and identify specific opportunities to shift service support left to Level 1 through knowledge sharing and other methods.
Identified initiatives to shift work to Level 1
Documented knowledge management process workflows and strategy
2.1 Identify barriers to Level 1 resolution
2.2 Discuss knowledgebase challenges and areas for improvement
2.3 Optimize KB input process
2.4 Optimize KB usage process
2.5 Optimize KB review process
2.6 Discuss and document KCS strategy and roles
2.7 Document knowledge success metrics
2.8 Brainstorm additional methods of increasing FLR
KB input workflow
KB usage workflow
KB review workflow
KCS strategy and roles
Knowledge management metrics
Identified opportunities to shift to Level 1
Build strategy and identify specific opportunities to shift service support left to the end user through self-service and to automation and AI.
Identified initiatives to shift work to self-service and automation
Evaluation of self-service portal and identified opportunities for improvement
3.1 Review existing self-service portal and discuss vision
3.2 Identify opportunities to improve portal accessibility, UI, and features
3.3 Evaluate the user-facing knowledgebase
3.4 Optimize the ticket intake form
3.5 Document plan to improve, communicate, and evaluate portal
3.6 Map the user experience with a workflow
3.7 Document your AI strategy
3.8 Identify candidates for automation
Identified opportunities to improve portal
Improvements to knowledgebase
Improved ticket intake form
Strategy to communicate and measure success of portal
Self-service resolution workflow
Strategy to apply AI and automation
Identified opportunities to shift tasks to automation
Build an action plan to implement shift left, including a communications strategy.
Action plan to track and implement shift-left opportunities
Communications plan to increase adoption
4.1 Examine process workflows for shift-left opportunities
4.2 Document shift-left-specific responsibilities for each role
4.3 Identify and track shift-left opportunities in the action plan
4.4 Brainstorm objections and responses
4.5 Document communications plan
Incident management workflow with shift-left opportunities
Shift left responsibilities for key roles
Shift-left action plan
Objection handling responses
Communications plan
Engagement with privacy and security within organizations has not kept pace with the increasing demands from regulations. As a result, organizations often find themselves saying they support privacy and security engagement but struggling to create behavioral changes in their staff.
However, with new privacy and security requirements proliferating globally, we can’t help but wonder how much longer we can carry on with this approach.
To truly take hold, privacy and security engagement must be supported by senior leadership, aligned with business objectives, and embedded within each of the organization’s operating groups and teams.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use the charter template to document the primary outcomes and objectives for the privacy and security engagement program within the organization and map the organizational structure to each of the respective roles to help develop a culture of privacy and security.
This tool maps business objectives and key strategic goals to privacy and security objectives and attributes identified as a part of the overall engagement program. Leverage the alignment tool to ensure your organizational groups are mapped to their corresponding enablers and supporting metrics.
This document maps out the organization’s continued efforts in ensuring employees are engaged with privacy and security principles, promoting a strong culture of privacy and security. Use the playbook to document and present the organization’s custom plan for privacy and security culture.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the current privacy and security landscape in the organization.
Targeted set of drivers from both a privacy and security perspective
1.1 Discuss key drivers for a privacy and security engagement program.
1.2 Identify privacy requirements and objectives.
1.3 Identify security requirements and objectives.
1.4 Review the business context.
Understanding of the role and requirements of privacy and security in the organization
Privacy drivers and objectives
Security drivers and objectives
Privacy and security engagement program objectives
Ensure that your privacy and security engagement program is positioned to obtain the buy-in it needs through business alignment.
Direct mappings between a culture of privacy and security and the organization’s strategic and business objectives
2.1 Review the IT/InfoSec strategy with IT and the InfoSec team and map to business objectives.
2.2 Review the privacy program and privacy strategic direction with the Privacy/Legal/Compliance team and map to business objectives.
2.3 Define the four organizational groupings and map to the organization’s structure.
Privacy and security objectives mapped to business strategic goals
Mapped organizational structure to Info-Tech’s organizational groups
Framework for privacy and security engagement program
Initial mapping assessment within Privacy and Security Business Alignment Tool
Make your engagement plan tactical with a set of enablers mapped to each of the organizational groups and privacy and security objectives.
Measurable indicators through the use of targeted enablers that customize the organization’s approach to privacy and security culture
3.1 Define the privacy enablers.
3.2 Define the security enablers.
3.3 Map the privacy and security enablers to organizational structure.
3.4 Revise and complete Privacy and Security Business Alignment Tool inputs.
Completed Privacy and Security Engagement Charter.
Completed Privacy and Security Business Alignment Tool.
Ensure that metrics are established to report on what the business wants to see and what security and privacy teams have planned for.
End-to-end, comprehensive program that ensures continued employee engagement with privacy and security at all levels of the organization.
4.1 Segment KPIs and metrics based on categories or business, technical, and behavioral.
4.2 Select KPIs and metrics for tracking privacy and security engagement.
4.3 Assign ownership over KPI and metric tracking and monitoring.
4.4 Determine reporting cadence and monitoring.
KPIs and metrics identified at a business, technical, and behavioral level for employees for continued growth
Completed Privacy and Security Engagement Playbook
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Learn about RPA, including how it compares to IT-led automation rooted in business process management practices and the role of AI.
Identify and prioritize candidate processes for RPA.
To drive a rapid shift towards the adoption of emerging technology, CIOs need:
IT must lead the innovation capabilities that will drive the adoption of emerging technology across the enterprise. In an exponential world, IT needs to adopt business value targets and become a value creator rather limit itself to IT service targets and remain a cost center in the organization.
Assess your innovation capability in five key areas supporting Exponential IT:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This research walks you through how to assess your capabilities to lead enterprise innovation and drive Exponential IT.
This tool will facilitate your readiness assessment.
Traditionally, CIOs have struggled to gain the trust of the executive leadership team and be recognized as business leaders rather than just technical leaders. In fact, based on a 2023 study by Info-Tech Research Group, only 36% of CIOs report directly to the CEO with most of the remainder reporting through either the CFO or COO.
Exponential IT requires that CIOs gain a seat at the table and build the capabilities necessary to not only lead the transformation of their business but also drive the innovation that will lead to enterprise adoption of emerging technologies. CIOs will be required to gain a detailed understanding of their business and in-depth knowledge of emerging technologies so that they can match business opportunities with technology capabilities, while managing risk and change.
This research will help CIOs identify the capabilities they need to transform the business, and better understand where they must mature their capabilities to drive Exponential IT.
Kim Osborne Rodriguez
Research Director, CIO Advisory
Info-Tech Research Group
Your ChallengeTo drive a rapid shift toward adopting emerging technology, CIOs need:
|
Common ObstaclesExponential IT is dramatically shifting how IT engages the business. Many CIOs are unprepared.
|
Info-Tech's ApproachIs your IT team ready to drive the adoption of emerging technology? Assess your innovation capability in five key areas supporting Exponential IT:
|
[1] Info-Tech CXO-CIO diagnostic benchmark data, 2022, n=76
IT must lead the innovation capabilities that will drive the adoption of emerging technology across the enterprise. In an exponential world, IT needs to adopt business value targets and become a value creator rather than limit itself to IT service targets and remain a cost center in the organization.
Your ability to capture enterprise value from autonomization relies on your innovation capabilities and potential. Is your IT team ready to drive the adoption of AI-driven business processes? Assess your innovation readiness in five key areas supporting Exponential IT.
If IT leaders cannot lead the transformation, then the business will move forward without them.
Only 3% of CXOs report that their IT department can transform the business. Most IT organizations (81%) still struggle to adequately support the business.
The most common obstacles to innovation are cultural, including politics, lack of alignment on goals, misaligned culture, and an inability to act on indicators of change.[1]
CIOs struggle to get a seat at the table and influence change. Info-Tech research shows that only 36% of CIOs report directly to the CEO, with over a third reporting to another C-suite leader such as a COO or CFO.[2]
[1] Harvard Business Review, 2018
[2] Info-Tech Research Group CIO Time Study, 2023
To drive change, CIOs need to gain the trust of their senior leadership team. Getting a seat at the table should be the first step for any CIO looking to transform their business.
36%Only 36% of CIOs report directly to the CEO. Source: Info-Tech Research Group, 2023. |
48%48% of Boards report that they lack frequent or direct lines of communication with their CIOs. Source: CIO Dive, 2022 |
Borealis AI is a research center backed by RBC Royal Bank, tasked with researching, designing, and building AI products and tools which transform the financial services industry. It gathers researchers with backgrounds in artificial intelligence (AI), computer vision, natural language processing (NLP), computer science, computational finance, mathematics, and machine learning (ML) to create solutions in areas including asynchronous temporal models, non-cooperative learning in competing markets, and causal machine learning from observational data.
Borealis AI has created many innovative products for RBC, including:
In 2023, Borealis AI won the Best Use of AI for Customer Experience award from The Digital Banker, for the NOMI Forecast app, which has been downloaded by nearly a million RBC clients since launching in 2021.
"NOMI Forecast is a cutting-edge AI solution that uses deep learning to offer timely and accurate predictions of our clients' cashflow. Powered by our unique datasets, these AI models have been trained to deliver personalized experiences for RBC clients,"
— Foteini Agrafioti, Chief Science Officer at RBC and Head of Borealis AI
Emerging tech brings new challenges for organizations looking to create a competitive advantage. Access to sophisticated tools with minimal upfront costs have lowered the barriers to entry and democratized innovation, particularly among smaller players. The explosion of data processing & collaboration tools has allowed more focused and data-driven innovation efforts through analysis and insights, increasing the competitive advantage for those who get it right.
This has led to an accelerated pace of change as autonomous business processes start driving their own market shifts. The rise of autonomous business processes creates exponential reward, but also exponential risk for early adopters.
IT innovation leadership explains 75% of the variation in satisfaction with IT (Source: Info-Tech Research Group survey, n=305) and is the fourth-highest priority for IT end users.
A 7-year review by McKinsey (2020) showed that the most innovative companies[1] outperformed the market by upwards of 30%.
A 25-year study by Business Development Canada & Statistics Canada showed that innovation was more important to business success than management, human resources, marketing, or finance.
[1]Top innovators are defined as companies which were listed on Fast Company World's 50 Most Innovative Companies for 2+ years.
IT as a fast execution engineIdeal for developing new methods, products, or services which provide value to the organization Can be led by IT or the business, depending on the scope of innovation (IT generally leads IT/internal innovation while the business leads customer-focused innovation) Often follows the pace of the business IT is a fast executor on requests generated by the business Leverages Agile to develop new ideas and products, and uses DevOps to put into production Use Info-Tech's research to Build your Enterprise Innovation Program |
IT as an exponential innovation leaderIdeal for driving the enterprise adoption of emerging tech and autonomous business capabilities Led by IT, which brings the understanding of emerging technology and can link opportunities to business problems Driven by a faster pace of change, which requires more frequent assessment of emerging technology IT is a fast executor on ideas and uses partnerships to drive execution Leverages Agile, machine learning operations (MLOps), DataOps and product design to test and implement ideas Use this research to successfully drive innovation with an Exponential IT mindset |
Transformation efforts fail over 75% of the time[1] resulting in millions of dollars of lost revenue[2]
Our research indicates that most organizations would take months to prepare this type of assessment without our resources. That's nearly 70 work hours spent researching and gathering data to support due diligence, for a total cost of thousands of dollars. Improve your success rate by understanding what's needed to successfully drive innovation.
[1] Lombard, 2022
[2] FutureCIO, 2022
Gauge the effectiveness of this research by completing the following table before and after using this blueprint:
Five tips to get the most out of your readiness assessment
Organizational excellence sets the stage for innovation.
"Innovation distinguishes between a leader and a follower." – Steve Jobs, Apple Founder
Without strong leadership, innovation efforts are almost certain to fail. Innovation requires buy-in and support, a leader who walks the talk, culture which supports risk taking and allows failure, and a clear and compelling vision. Without these elements in place, transformation efforts are a fifteen times more likely to fail [1] – and waste time and money along the way.
[1] Lombard, 2022.
Strong leadership is critical to the success of innovation. A global survey of 600 business leaders pointed to leadership as the best predictor of innovation success[1] and showed a strong correlation between leadership ability and innovation capabilities.
Innovation leadership starts with a mandate from the senior leadership team and requires a clearly articulated vision and strategy to deliver the intended benefits to the organization. A survey of 270 business leaders showed that over a third of them struggled with articulating the right strategy or vision, hindering their efforts to innovate.[2]
45% of business leaders report that cultural issues stifle their innovation efforts, and 55% report unhealthy politics which cause infighting that negatively affects their organization.[2]
[1] McKinsey, 2008
[2] Harvard Business Review, 2018
75% of high IT satisfaction scores are associated with a strong ability to lead innovation.
Source: Info-Tech Research Group survey, n=305
It can be challenging to drive innovation efforts without trust and buy-in from senior leadership. Start with small initiatives and build your reputation by consistently delivering on your commitments.
Build your innovation leadership with the following capabilities:
Innovation mandate: There is strong support and trust from the senior leadership team, which gives IT leaders the opportunity to lead innovation despite any temporary failure. IT leaders are well-informed about and have input into business decisions.
Transformational leadership: IT leaders are influential change agents, not only within their organization but across their industry or community. They inspire others and actively collaborate with external partners, driving change beyond their organization.
Culture of innovation: Innovative cultures generally demonstrate ten behaviors that are most closely correlated with innovation success: growth mindset, learning-focused, psychological safety, curiosity, trust, willingness to fail, collaboration, diverse perspectives, autonomy, and appropriate risk-taking. These behaviors are embedded in the organization and strongly demonstrated in daily work.
Vision & strategy: The innovation vision and strategy are continuously refined and adapted to changing market and emerging technology trends. Emerging technology innovation is second nature in the organization, and it becomes a leader in driving change across the industry.
|
Build your Enterprise Innovation ProgramDefine your innovation mandate
|
|
Manage Your CXO RelationsSuccessfully manage CXO relationships to get a seat at the table and build your mandate to drive innovation |
|
Become a Transformational CIOBuild the capabilities to drive transformation as an IT leader in your organization |
The foundation of innovation is data.
"Without data you're just another person with an opinion." – Edwards Deming, Statistician
Having comprehensive and accurate data about the problems you hope to solve is critical to realizing the benefits of innovation. Build your understanding of the business and ability to predict how trends will impact your industry, then stay on top of emerging tech and align solutions with strategic business capabilities.
Info-Tech data shows that businesses are 93% more likely to be satisfied with IT when their IT teams have a better understanding of the business. Teams need to understand who your organization serves, how it delivers value, and what its goals are.
When seeking to capitalize on emerging technology opportunities, businesses face an execution challenge. 82% of business leaders report being able to identify leading indicators of change, but less than two thirds of them are confident in their ability to act on those indicators.[1]
A report by Leadership IQ noted that only 29% of the 21,008 employees surveyed considered their leader's vision consistently well aligned with the organizational vision.[2] Strategic alignment is not just important from a results perspective. It impacts employee motivation: employees with strong leadership alignment are 24% more likely to give their best at work.[2]
[1] Harvard Business Review, 2018
[2] Leadership IQ, 2020
82% of business leaders say they can correctly identify leading indicators of change…
…however, only 58% feel confident in their abilities to act on these indicators.
Source: Harvard Business Review, 2018
Develop key insights and intelligence with the following capabilities:
Business context: IT actively participates in the business as a value creator and innovator, proactively disrupting the business and driving the adoption of emerging tech that drives exponential value.
Strategic foresight: IT not only embraces emerging technologies, but actively drives innovation and disruption through their adoption. IT is adept at using trends to drive exploration and can quickly execute on initiatives.
Emerging tech expertise: There is an expert-level understanding of emerging technologies including their capabilities, limitations, risks, trends, and potential use cases. IT proactively drives the adoption of emerging technology.
Strategic alignment: IT proactively uses the business strategy to drive adoption of emerging technology and identify new opportunities. Each initiative has clear metrics and targets which directly impact business targets.
|
Tech Trends 2023Like a chess grandmaster, CIOs must play both sides of the board. Emerging technologies present opportunities to attack, but it's necessary to protect from a volatile board. |
|
Establish a Foresight CapabilityTo be recognized and validated as a forward-thinking CIO, you must establish a structured approach to innovation that considers external trends alongside internal processes. |
|
Build a Business-Aligned IT StrategyElicit the business context and identify strategic initiatives that are most important to the organization while building a plan to execute on it. |
IT must use data to drive the ideation process, engaging the business to identify opportunities – all while managing risk.
"Innovation is key. Only those who have the agility to change with the market and innovate quickly will survive."- Robert Kiyosaki, Entrepreneur & Author
Many Agile concepts are used in the process of innovation, regardless of whether the formal Agile methodology is used. Fast iterations ("fail fast"), lessons learned, and risk management are equally important for ideation as they are for execution. This category evaluates IT's ability to drive the ideation process at the enterprise level.
Agility is critical for innovation, particularly when adopting emerging technology. AI and other emerging technologies are accelerating the pace of change and driving a necessary increase in how quickly organizations must adapt.
Data is also critical when building a case for change. A survey of over 1,000 senior business leaders showed that organizations that effectively use data to drive decision making are three times more likely to report significant improvements in the quality of their decisions.[1]
[1] Harvard Business School Online, 2019
The business must be involved in ideation. Develop the skills needed to engage the business and identify challenges and opportunities.
Build your proficiency in the following ideation capabilities:
Data-driven decision making: Data is proactively collected from multiple internal and external sources to inform innovation strategies. Continuous monitoring of innovation provides a strong rationale for outcomes and benefits. Data governance, quality, and privacy measures are in place to ensure data quality.
Ability to identify opportunities: IT actively shapes the future of the organization and the industry by proactively identifying business opportunities for emerging technology and leading the way in their adoption. Experiments and pilots are often industry firsts.
Business engagement: IT enables the business by engaging at all levels to identify and refine emerging technology opportunities. They effectively communicate benefits and risks in business terms, while understanding business needs and challenges. IT collaborates with the business to establish innovation centers or communities of practice.
Risk management: There is a proactive and holistic approach to risk management, considering both opportunities and threats associated with emerging technology adoption. IT and the business continually anticipate and monitor emerging risks, evaluate the effectiveness of risk management practices, and adapt them to evolving technology landscapes.
|
Develop Your Agile Approach for a Successful TransformationUnderstand Agile fundamentals, principles, and practices so you can apply them effectively in your organization. |
|
Build an IT Risk Management ProgramRisk is inevitable. Without a formal management program, you may be unaware of your greatest IT risks. Reacting to risks after they occur can be costly and devastating, yet this is one of the most common tactics used by IT departments. |
|
Kick-Start IT-Led Business InnovationBusiness demand for new technology is intensifying pressure to innovate and executive stakeholders expect more from IT. If IT is not considered a source of innovation, its perceived value decreases, and the threat of shadow IT grows. Don't wait to start finding and capitalizing on opportunities for IT-led innovation. |
Ensure you have the right resources and skills needed to drive innovation.
"The best way to predict the future is to invent it." – Alan Kay, Computer Scientist
Resourcing and skills are critical building blocks for driving innovation, and without a strong understanding of emerging technology and the processes needed to adopt it, organizations will falter at driving change.
Develop the right resourcing, skills, change management, and partnerships to drive Exponential IT.
Scaled Agile (SAFe): Scaled Agile is a framework for implementing Agile and lean methodologies at the enterprise level or outside of a single team.
Development operations (DevOps): A methodology for software development which includes practices and tools that support the development lifecycle.
Data operations (DataOps): A set of tools and processes that support data management within an organization. Typically used when training AI on a specialized data set.
Analytics: The systematic analysis of information used to discover, interpret, and communicate insights gleaned from patterns in data. Analytics typically generate insights that support data-driven decision making.
Machine learning operations (MLOps): Tools and processes that support the development of machine learning (ML) models, including AI and large language models (LLM). Can include expertise in computer science, natural language processing (NLP), computer vision, computational algorithms, mathematics, and ML expertise.
Artificial intelligence operations (AIOps): Leveraging AI to develop autonomous business processes at the enterprise level.
Agile: Build the methodologies to drive execution
DevOps: Drive the software development lifecycle
DataOps: Effectively manage data
Analytics: Develop insights from data
MLOps: Develop machine learning tools
AIOps: Build autonomous business processes
Resourcing & investment: IT manages a well-defined and substantial budget dedicated to innovation, which is integrated into the overall strategic planning and decision-making processes. Investments are made in a holistic and forward-looking manner, considering the long-term implications and potential disruption caused by emerging technologies.
Talent & skills: Teams exhibit thought leadership and innovate within emerging technologies, including advanced machine learning engineering, MLOps, DataOps, and analytics. Employees actively contribute to the advancement of these technologies, engage in research and development, and explore new applications and use cases.
Change management: This is a core competency led by change champions and change management professionals. There is a strategic approach to driving and sustaining change, focusing on long-term adoption and continuous improvement. Change management is embedded in the organizational culture, and there is a proactive effort to foster change agility and build change capability at all levels.
Partnerships & ecosystems: IT builds an orchestrated innovation ecosystem for the adoption of emerging technology. They take a proactive role in orchestrating collaboration among ecosystem partners. The organization acts as a catalyst for innovation, bringing together diverse partners to address complex challenges and drive transformative solutions.
|
Drive Technology AdoptionThe project isn't over if the new product or system isn't being used. How do you ensure that what you've put in place will not be ignored or only partially adopted? People are more complicated than any new system and managing them through change requires careful planning. |
|
Extend Agile Practices Beyond ITFurther the benefits of Agile by extending a scaled Agile framework to the business. Not all lessons from scaling Agile to IT are transferable. IT Agile scaling processes are tailored to IT's scope, team, and tools, which may not account for diverse attributes within your organization. |
|
Managing Exponential Value RelationshipsSuccessfully managing outcome-based relationships requires a higher degree of trust than traditional vendor relationships. Building trust comes from sharing risks and rewards between organizations and vendors. |
Can you deliver results? Develop the capability to execute on innovative ideas.
"What good is an idea if it remains an idea? Try. Experiment. Fail. Try again. Change the world." – Simon Sinek, Author, Motivational Speaker
The foundational elements of innovation significantly overlap with the activities you must do to excel at core IT operations. Build your ability to execute quickly on innovative ideas and build the trust of the enterprise.
The foundational capabilities of innovation are central to many core IT processes: governance, security, supporting infrastructure, and the ability to execute on ideas are all critical to running an effective IT shop.
IT governance is a critical and embedded practice ensuring information and technology investments, risks, and resources are aligned in the organization's best interests while producing business value. Effective governance ensures that the right technology investments are made at the right time to support and enable your organization's mission, vision, and goals.
The ability to rapidly execute on ideas is fundamental not only to innovation but also running an effective IT organization.
The ability to execute is based on key foundational capabilities, including:
Governance: Adaptable and automated governance guides effective innovation and supports the adoption of emerging technology. Decision making is flexible and can move quickly to enable the implementation of new technologies. Responsibility and authority are aligned across all levels of the organization.
Embedded security: Security and privacy controls are embedded in the applications and technologies deployed across the enterprise. Security is built into the organizational culture, with a strong focus on promoting security awareness and fostering a security-first mindset.
Infrastructure: IT infrastructure is modern, adaptive, and future-proof. Infrastructure should support a range of emerging technology applications, including the flexibility to adapt to future use cases. There is a focus on agility, scalability, flexibility, and interoperability.
Ability to execute: The IT team drives rapid innovation across the organization and can reliably execute and collaborate with internal and external partners. They are pivotal in driving innovation initiatives that align with the organization's strategic objectives. Agile methodologies and practices are embedded in the culture of the team.
|
Make Your IT Governance AdaptableProduce more value from IT by developing a governance framework optimized for your current needs and context, with the ability to adapt as your needs shift. Create the foundation and ability to delegate and empower governance to enable agile delivery. |
|
Build an Information Security StrategyMany security leaders struggle to decide how best to prioritize their scarce information security resources. The need to move from a reactive security approach toward a strategic planning approach is clear. The path to getting there is less so. |
|
Exploit Disruptive Infrastructure TechnologyAccurate predicting isn't easy. Most IT leaders fail to realize how quickly technology increases in capability. Even for the tech savvy, it's difficult to predict which specific technologies will become disruptive. |
Input: Core competencies; Knowledge of internal processes and capabilities
Output: Readiness assessment
Materials: Exponential Innovation Assessment Tool; Whiteboard/Flip charts
Participants: Executive leadership team, including CIO; Other internal stakeholders of vendor partnerships
Download the Exponential Innovation Assessment Tool
Once you have completed the readiness assessment, use Info-Tech's maturity ladder to identify next steps and recommendations.
It is usually very challenging to lead innovation with a total score less than 50. Lower maturity organizations should focus on maturing the foundational aspects of innovation, such as those in the Innovation Execution and Team Capabilities categories, and core IT processes.
For higher maturity organizations (those with total scores 50 or higher), first focus on getting all capabilities to a minimum of Level 3, then work on progressing maturity starting with foundational categories and working upwards:
Input: Readiness assessment
Output: Action plan to improve maturity of capabilities
Materials: Exponential Innovation Assessment Tool; Whiteboard/Flip charts
Participants: Executive leadership team, including CIO; Other internal stakeholders of vendor partnerships
Kim Osborne Rodriguez
Research Director, CIO Advisory
Info-Tech Research Group
Kim is a professional engineer and Registered Communications Distribution Designer (RCDD) with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach, with a track record of supporting successful projects.
Kim holds a Bachelor's degree in Honours Mechatronics Engineering and an option in Management Sciences from University of Waterloo.
Jack Hakimian
Senior Vice President
Info-Tech Research Group
Jack has more than 25 years of Technology and Management Consulting experience. He has served multi-billion-dollar organizations in multiple industries including Financial Services and Telecommunications. Jack also served many large public sector institutions.
He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master's degree in Computer Engineering and an MBA from the ESCP-EAP European School of Management.
Mark Tauschek
Vice President, Infrastructure & Operations Research
Info-Tech Research Group
Mark has hands-on network design and deployment experience across verticals including healthcare, education, manufacturing, retail, and entertainment. He has extensive knowledge in the areas of technology research, process development, vendor selection, and project management. He holds specific expertise in wireless networking and mobile technologies.
Mark holds an MBA from the Richard Ivey School of Business at the University of Western Ontario and many professional wireless technology certifications.
Michael Tweedie
Practice Lead, CIO Strategy
Info-Tech Research Group
Mike Tweedie brings over 25 years as a technology executive. He's led several large transformation projects across core infrastructure, application and IT services as the head of Technology at ADP Canada. He was also the Head of Engineering and Service Offerings for a large French IT services firm, focused on cloud adoption and complex ERP deployment and management.
Mike holds a Bachelor's degree in Architecture from Ryerson University.
Donna Bales
Principal Research Director
Info-Tech Research Group
Donna Bales is a Principal Research Director in the CIO Practice at Info-Tech Research Group specializing in research and advisory services in IT risk, governance, and compliance. She brings over 25 years of experience in strategic consulting and product development and has a history of success in leading complex, multi-stakeholder industry initiatives.
Donna has a Bachelor's degree in Economics from the University of Western Ontario.
Isabelle Hertanto
Principal Research Director, Security & Privacy
Info-Tech Research Group
Isabelle Hertanto has over 15 years of experience delivering specialized IT services to the security and intelligence community. As a former federal officer for Public Safety Canada, Isabelle trained and led teams on data exploitation and digital surveillance operations in support of Canadian national security investigations. Since transitioning into the private sector, Isabelle has held senior management and consulting roles across a variety of industry sectors, including retail, construction, energy, healthcare, and the broader Canadian public sector.
Aaron Shum
Vice President, Security, Privacy, Risk & Compliance
Info-Tech Research Group
Aaron Shum is a Vice President in the Security & Privacy Research and Advisory Practice at Info-Tech Research Group. With 25+ years of experience across IT, InfoSec, and Data Privacy, he currently specializes in helping organizations implement comprehensive information security and cybersecurity programs and comply with data privacy regulations such as the European Union's General Data Protection Regulation and the California Privacy Rights Act.
Reiaz Somji
Managing Director, Consulting
Info-Tech Research Group
As a client-focused strategist with strong organizational acumen, Reiaz leverages his 20+ years of management consulting experience to help C-suite executives and managers navigate the integration of changing technology with business goals. He is currently a managing director in Info-Tech's consulting division and leads its Infrastructure practice.
Hans Eckman
Principal Research Director, Applications
Info-Tech Research Group
Hans Eckman is a business transformation leader helping organizations connect business strategy and innovation to operational excellence. He supports Info-Tech members in SDLC optimization, Agile and DevOps implementation, CoE/CoP creation, innovation program development, application delivery, and leadership development. Hans is based out of Atlanta, Georgia.
Irina Sedenko
Research Director, Data & Analytics
Info-Tech Research Group
Irina brings more than 20 years of information management experience and demonstrated expertise in big data, advanced analytics, machine learning, and AI. Her experience includes designing and implementing enterprise content management systems, defining data and analytics strategy to support business goals and objectives, creating data governance to enable data initiatives, and providing guidance to the client teams. She led teams through data lake implementation to enable advanced analytics capabilities and has hands-on data science and machine learning experience.
Bill Macgowan
Director, Smart Building Digitization
Cisco
Barry Wiech
Chief Digital and Information Officer
Sime Darby Industrial
Tim Dunn
Chief Information Officer
Department of Energy & Public Works (Queensland)
Sudip Ghosh
Group Manager, Office of the CIO
Star Entertainment Group
Samantha Rose
Contract Manager
Department of Energy & Public Works (Queensland)
Altringer, Beth. "A New Model for Innovation in Big Companies." Harvard Business Review. 19 Nov. 2013. Accessed 15 June 2023. https://hbr.org/2013/11/a-new-model-for-innovation-in-big-companies
Bar Am, Jordan et al. "Innovation in a Crisis: Why it is More Critical Than Ever." McKinsey & Company, 17 June 2020. Accessed 15 June 2023. https://www.mckinsey.com/capabilities/strategy-and-corporate-finance/our-insights/innovation-in-a-crisis-why-it-is-more-critical-than-ever
Barsh, Joanna et al. "Leadership and Innovation." McKinsey Quarterly, 1 Jan 2008. Accessed 7 July 2023. https://www.mckinsey.com/capabilities/strategy-and-corporate-finance/our-insights/leadership-and-innovation
Borealis AI. "RBC Wins Best Use of AI for Customer Experience for NOMI Forecast." Borealis AI Blog, 28 Apr 2023. Accessed 13 June 2023. https://www.borealisai.com/news/rbc-wins-best-use-of-ai-for-customer-experience-for-nomi-forecast/
Boston Consulting Group, "Most Innovative Companies 2022." BGC, 15 Sept. 2022. Accessed 15 June 2023. https://www.bcg.com/en-ca/publications/2022/innovation-in-climate-and-sustainability-will-lead-to-green-growth
BrainyQuote. "Innovation Quotes." Accessed 19 June 2023. https://www.brainyquote.com/topics/innovation-quotes
Christensen, Clayton M. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business Review Press, 2016.
Cleroux, Pierre. The "I" Word. BDC. Accessed 1 Aug 2023. https://www.bdc.ca/en/articles-tools/blog/innovation-no-1-factor-business-success
FutureCIO Editors. "Failed transformation can result in US$6 million in lost revenue." FutureCIO, 29 Apr 2022. Accessed 10 Jul 2023. https://futurecio.tech/failed-transformation-can-result-in-us6-million-in-lost-revenue/
Goodreads. "W. Edwards Deming Quotes." Accessed 19 June 2023. https://www.goodreads.com/quotes/7327935-without-data-you-re-just-another-person-with-an-opinion
Haefner, Naomi et al. "Artificial intelligence and innovation management: A review, framework, and research agenda." Technological Forecasting and Social Change, Volume 162, 2021. Accessed 15 June 2023. https://www.sciencedirect.com/science/article/pii/S004016252031218X
IBM. "The new AI innovation equation." IBM Website. 13 Oct 2016. Accessed 15 June 2023. https://www.ibm.com/watson/advantage-reports/future-of-artificial-intelligence/ai-innovation-equation.html
Isomaki, Atte. "60+ Innovation Quotes and What They Can Teach You." Viima, 19 Mar 2019. Accessed 6 July 2023. https://www.viima.com/blog/innovation-quotes
Kay, Alan. "The best way to predict the future is to invent it." Quote Park, 3 June 2021. Accessed 15 June 2023. https://quotepark.com/quotes/1893243-alan-kay-the-best-way-to-predict-the-future-is-to-invent-it/
Kirsner, Scott. "The Biggest Obstacles to Innovation in Large Companies." Harvard Business Review, 30 July 2018. Accessed 15 June 2023. https://hbr.org/2018/07/the-biggest-obstacles-to-innovation-in-large-companies
Kiyosaki, Robert. "Innovation is key. Only those who have the agility to change with the market and innovate quickly will survive." AZ Quotes, 11 Dec. 2013. Accessed 15 June 2023.
Leadership IQ. "The State Of Leadership Development." Leadership IQ, 2020. Accessed 6 July 2023. https://www.leadershipiq.com/blogs/leadershipiq/leadership-development-state
Lombard, Charl. "Defining Digital: A New Approach to Digital Transformation." Info-Tech LIVE Conference, 2022. https://tymansgrpup.com/videos/defining-digital-a-new-approach-to-digital-transformation
Murphy, Mark. "A Shocking Number Of Leaders Are Not Aligned With Their Companies' Visions." Forbes, 28 Aug 2020. Accessed 6 Jul 2023. https://www.forbes.com/sites/markmurphy/2020/08/28/a-shocking-number-of-leaders-are-not-aligned-with-their-companies-visions
Seymour, Harriet et al. "How to unlock a scientific approach to change management with powerful data insights." IBM, 11 Jan 2023. Accessed 6 July 2023. https://www.ibm.com/blog/how-to-unlock-a-scientific-approach-to-change-management-with-powerful-data-insights/
Sinek, Simon. "What good is an idea if it remains an idea? Try. Experiment. Fail. Try again. Change the world." Praxie, n.d. https://praxie.com/top-innovation-quotes/
Stobierski, Tim. "The Advantages of Data-Driven Decision-Making." Harvard Business School Online, 26 Aug 2019. Accessed 6 July 2023. https://online.hbs.edu/blog/post/data-driven-decision-making
Torres, Roberto. "How tech leaders can earn C-suite trust." CIO Dive, 1 Jul 2022. Accessed 7 Jul 2023. https://www.ciodive.com/news/C-suite-trust-CIO-executives/626476/
Tushman, Michael et al. "Change Management Is Becoming Increasingly Data-Driven. Companies Aren't Ready." Harvard Business Review, 23 Oct 2017. Accessed 6 Jul 2023. https://hbr.org/2017/10/change-management-is-becoming-increasingly-data-driven-companies-arent-ready
Weick, Karl and Kathleen Sutcliffe. Managing the Unexpected: Sustained Performance in a Complex World, Third Edition. John Wiley & Sons, 2015.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
From choosing the right data for the right problem to evaluating your progress toward data-driven people decisions, follow these steps to build your foundation to people analytics.
Windows is no longer the only option. MacBooks and Chromebooks are justified, but now you have to manage them.
Managing end-user devices may be accomplished with a variety of solutions, but many of those solutions advocate integration with a Microsoft-friendly solution to take advantage of features such as conditional access, security functionality, and data governance.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Explore options, guidance and some best practices related to the management of Chromebooks and MacBooks in the enterprise environment and educational institutions. Our guidance will help you understand features and options available in a variety of solutions. We also provide guidance on selecting the best endpoint management solution for your own environment.
This tool will help you determine the features and options you want or need in an endpoint management solution.
Until recently, Windows devices dominated the workplace globally. Computing devices were also rare in many industries such as education. Administrators and administrative staff may have used Windows-based devices, but Chromebooks were not yet in use. Most universities and colleges were Windows-based in offices with some flavor of Unix in other areas, and Apple devices were gaining some popularity in certain circles.
That is a stark contrast compared to today, where Chromebooks dominate the classrooms and MacBooks and Chromebooks are making significant inroads into the enterprise environment. MacBooks are also a common sight on many university campuses. There is no doubt that while Windows may still be the dominant player, it is far from the only one in town.
Now that Chromebooks and MacBooks are a notable, if not significant, part of the education and enterprise environments, they must be afforded the same considerations as Windows devices in those environments when it comes to management. The good news is that there is no lack of available solutions for managing these devices, and the endpoint management landscape is continually evolving and improving.
P.J. Ryan
Research Director, Infrastructure & Operations
Info-Tech Research Group
Managing end-user devices may be accomplished with a variety of solutions, but many of those solutions advocate integration with a Microsoft-friendly solution to take advantage of features such as conditional access, security functionality, and data governance.
Google Admin Console is necessary to manage Chromebooks, but it can be paired with other tools. Implementation partnerships provide solutions to track the device lifecycle, track the repair lifecycle, sync with Google Admin Console as well as PowerSchool to provide a more complete picture of the user and device, and facilitate reminders to return the device, pay fees if necessary, pick up a device when a repair is complete, and more.
The Google Admin Console allows admins to follow an organizational unit (OU) structure very similar to what they may have used in Microsoft's Active Directory environment. This familiarity makes the task of administering Chromebooks easier for admins.
Chromebook management goes beyond securing and manipulating the device. Controls to protect the students while online, such as Safe Search and Safe Browsing, should also be implemented.
Most companies choose to use a dedicated MacBook management tool. Many unified endpoint management (UEM) tools can manage MacBooks to some extent, but admins tend to agree that a MacBook-focused endpoint management tool is best for MacBooks while a Windows-based endpoint management tool is best for Windows devices.
Some MacBook management solutions advocate integration with Windows UEM solutions to take advantage of Microsoft features such as conditional access, security functionality, and data governance. This approach can also be applied to Chromebooks.
"In 2018, Chromebooks represented an incredible 60 percent of all laptop or tablet devices in K-12 -- up from zero percent when the first Chromebook launched during the summer break in 2011."
– "Will Chromebooks Rule the Enterprise?" Computerworld
"Chromebooks were the best performing PC products in Q3 2020, with shipment volume increasing to a record-high 9.4 million units, up a whopping 122% year-on-year."
– Android Police
"Until the pandemic, Chrome OS' success was largely limited to U.S. schools. Demand in 2020 appears to have expanded beyond that small but critical part of the U.S. PC market."
– Geekwire
"In addition to running a huge number of Chrome Extensions and Apps at once, Chromebooks also run Android, Linux and Windows apps."
– "Will Chromebooks Rule the Enterprise?" Computerworld
GAC gives you a centralized console that will allow you to:
GAC can facilitate device management with features such as:
Device and user addition, group and organizational unit creation and administration, applying policies to devices and users – does all this remind you of your Active Directory environment?
GAC lets you administer users and devices with a similar approach.
Source: Google
You must be running the Chrome Enterprise Upgrade and have any licenses required by the approved partner to take advantage of this management option. The partner admin policies supersede GAC.
If you stop using the approved partner admin console to manage your devices, the polices and settings in GAC will immediately take over the devices.
Chromebook deployment becomes a challenge when device quantities grow. The enrollment process can be time consuming, and every device must be enrolled before it can be used by an employee or a student. Many admins enlist their full IT teams to assist in the short term. Some vendor partners may assist with distribution options if staffing levels permit. Recent developments from Google have opened additional options for device enrollment beyond the manual enrollment approach.
Most of the settings and features previously mentioned are also available for Education-licensed devices and users. Enterprise-specific features will not be available to Education licenses. (Active Directory integration with Education licenses, for example, is accomplished using a different approach)
An online search for Chromebook management solutions will reveal several software solutions that augment the capabilities of the Google Admin Console. Many of these solutions are focused on the education sector and classroom and student options, although the features would be beneficial to enterprises and educational organizations alike.
"There are many components to managing Chromebooks. Schools need to know which student has which device, which school has which device, and costs relating to repairs. Chromebook Management Software … facilitates these processes."
– VIZOR
"Macs now make up 23% of endpoints in enterprises."
– ComputerWeekly.com
"When given the choice, no less than 72% of employees choose Macs over PCs."
– "5 Reasons Mac is a must," Jamf
"IBM says it is 3X more expensive to manage PCs than Macs."
– Computerworld
"74% of those who previously used a PC for work experienced fewer issues now that they use a Mac"
– "Global Survey: Mac in the Enterprise," Jamf
"When enterprise moves to Mac, staff retention rates improve by 20%. That's quite a boost! "
– "5 Reasons Mac is a must," Jamf
Most Windows UEM tools are constantly improving, and it is only a matter of time before they rival many of the dedicated MacBook management tools out there.
Dedicated solutions advocate integration with UEM solutions to take advantage of conditional access, security functionality, and data governance features.
Jamf and Microsoft entered into a collaboration several years ago with the intention of making the MacBook management process easier and more secure.
Microsoft Intune and Jamf Pro: Better together to manage and secure Macs
Microsoft Conditional Access with Jamf Pro ensures that company data is only accessed by trusted users, on trusted devices, using trusted apps. Jamf extends this Enterprise Mobile + Security (EMS) functionality to Mac, iPhone and iPad.
– "Microsoft Intune and Jamf Pro," Jamf
There are many solutions available to manage end-user devices, and they come with a long list of options and features. Clarify your needs and define your requirements before you purchase another endpoint management tool. Don't purchase capabilities that you may never use.
Use the Endpoint Management Selection Tool to identify your desired endpoint solution features and compare vendor solution functionality based on your desired features.
|
Endpoint Management Selection Tool |
|||
|---|---|---|---|
|
In the first column, list out the desired features you want in an endpoint solution for your devices. Use the features provided if desired, or add your own and edit or delete the existing ones if necessary. As you look into various endpoint management solution vendors, list them in the columns in place of "Vendor 1," "Vendor 2," etc. Use the "Desired Feature" list as a checklist and change the values to "yes" or "no" in the corresponding box under the vendors' names. When complete, you will be able to look at all the features and compare vendors in a single table. |
|||
| Desired Feature | Vendor 1 | Vendor 2 | Vendor 3 |
| Organizational unit creation | Yes | No | Yes |
| Group creation | Yes | Yes | Yes |
| Ability to assign users to devices | No | Yes | Yes |
| Control of administrative permissions | Yes | Yes | Yes |
| Conditional access | No | Yes | Yes |
| Security policies enforced | Yes | No | Yes |
| Asset management | No | Yes | No |
| Single sign-on | Yes | Yes | Yes |
| Auto-deployment | No | Yes | No |
| Repair lifecycle tracking | No | Yes | No |
| Application deployment | Yes | Yes | No |
| Device tracking | Yes | Yes | Yes |
| Ability to enable encryption | Yes | No | Yes |
| Device wipe | Yes | No | Yes |
| Ability to enable/disable device tracking | No | No | Yes |
| User activity audit | No | No | No |
Modernize and Transform Your End-User Computing Strategy
This project helps support the workforce of the future by answering the following questions: What types of computing devices, provisioning models, and operating systems should be offered to end users? How will IT support devices? What are the policies and governance surrounding how devices are used? What actions are we taking and when? How do end-user devices support larger corporate priorities and strategies?
Best Unified Endpoint Management (UEM) Software 2022 | SoftwareReviews
Compare and evaluate unified endpoint management vendors using the most in-depth and unbiased buyer reports available. Download free comprehensive 40+ page reports to select the best unified endpoint management software for your organization.
Best Enterprise Mobile Management (EMM) Software 2022 | (softwarereviews.com)
Compare and evaluate enterprise mobile management vendors using the most in-depth and unbiased buyer reports available. Download free comprehensive 40+ page reports to select the best enterprise mobile management software for your organization.
Bridge, Tom. "Macs in the enterprise – what you need to know". Computerweekly.com, TechTarget. 27 May 2022. Accessed 12 Aug. 2022.
Copley-Woods, Haddayr. "5 reasons Mac is a must in the enterprise". Jamf.com, Jamf. 28 June 2022. Accessed 16 Aug. 2022.
Duke, Kent. "Chromebook sales skyrocketed in Q3 2020 with online education fueling demand." androidpolice.com, Android Police. 16 Nov 2020. Accessed 10 Aug. 2022.
Elgin, Mike. "Will Chromebooks Rule the Enterprise? (5 Reasons They May)". Computerworld.com, Computerworld. 30 Aug 2019. Accessed 10 Aug. 2022.
Evans, Jonny. "IBM says it is 3X more expensive to manage PCs than Macs". Computerworld.com, Computerworld. 19 Oct 2016. Accessed 23 Aug. 2022.
"Global Survey: Mac in the Enterprise". Jamf.com, Jamf. Accessed 16 Aug. 2022.
"How to Manage Chromebooks Like a Pro." Vizor.cloud, VIZOR. Accessed 10 Aug. 2022.
"Manage Chrome OS Devices with EMM Console". support.google.com, Google. Accessed 16 Aug. 2022.
Protalinski, Emil. "Chromebooks outsold Macs worldwide in 2020, cutting into Windows market share". Geekwire.com, Geekwire. 16 Feb 2021. Accessed 22 Aug. 2022.
Smith, Sean. "Microsoft Intune and Jamf Pro: Better together to manage and secure Macs". Jamf.com, Jamf. 20 April 2022. Accessed 16 Aug. 2022.
It is now 2020 and the GDPR has been in effect for almost 2 years. Many companies thought: been there, done that. And for a while the regulators let some time go by.
The first warnings appeared quickly enough. Eg; in September 2018, the French regulator warned a company that they needed to get consent of their customers for getting geolocation based data.
That same month, an airline was hacked and, on top of the reputational damage and costs to fix the IT systems, it faced the threat of a stiff fine.
Even though we not have really noticed, fines started being imposed as early as January 2019.
Wrong! The fines are levied in a number of cases. And to make it difficult to estimate, there are guidelines that will shape the decision making process, but no hard and fast rules!
The GDPR is very complex and consists of both articles and associated recitals that you need to be in compliance with. it is amuch about the letter as it is about the spirit.
We have a clear view on what most of those cases are.
And more importantly, when you follow our guidelines, you will be well placed to answer any questions by your clients and cooperate with the regulator in a proactive way.
They will never come after me. I'm too small.
And besides, I have my privacy policy and cookie notice in place
Company size has nothing to do with it.
While in the beginning, it seemed mostly a game for the big players (for names, you have to contact us) that is just perception.
As early as March 2018 a €10M revenue company was fined around €120,000. 2 days later another company with operating revenues of around €6.2M was fined close to €200.000 for failing to abide by the DSRR stipulatons.
Don't know what these are?
Fill out the form below and we'll let you in on the good stuff.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
See if a custom-of-the-shelf process optimization makes sense.
Determine the right (level of) governance for your implementation.
Prepare for the overall implementation journey and gather your requirements. Then conduct a stage-gate assessment of this phase.
Conduct a stage-gate assessment after every step below.
Review your dispositions to ensure they align with your goals.
Most business leaders think that the best way to beat the competition is to push their development teams harder and demand faster delivery. I've seen the opposite happen many times.
When you prioritize "shipping fast" and "getting to market first," you often end up taking the longest time to succeed, because your team must spend months, sometimes years, addressing the problems caused by your haste. On the surface, things appear to be improving, but internally, they can feel overwhelming. You will notice this impact on your staff.
This is the harsh truth about rushing IT development:
Here's what really happens in the codebase when you tell your team to "just get it done fast": you don't do proper input validation and sanitization because you say, "We'll add that later." And then you have to deal with SQL injection attacks and data breaches for months. This wasted time could have been avoided by using simple parameterized queries and validation frameworks.
In 2024, the average cost of a data breach was $4.88 million. 73% of these breaches require more than 200 days to resolve. You only code for the happy flow, but real users submit incorrect data, experience network timeouts, and encounter failures with third-party APIs.
Your app crashes more than it should because you didn't set up proper error handling, or circuit breakers, or graceful degradation patterns. I know these take time to implement, but what would you rather have? Customers abandoning it?
Businesses lose an average of $5,600 per minute when their systems go down, and e-commerce sites can lose up to $300,000 per hour during busy times. Instead of fixing the root causes of problems, you just patch them up with quick fixes. Instead of proper garbage collection, that memory leak gets a band-aid restart script. Instead of being optimized, the slow database query is cached.
Soon, you will find yourself struggling to keep your building intact.
To keep up with technical debt, companies usually have to spend 23–42% of their total IT budget each year.
You don't do full testing because "writing unit tests takes longer than manual testing." This approach does not include load testing, test-driven development, or integration testing. Your first real test is when you have paying customers in production. Companies that don't test their software properly have 60% more bugs in their products and spend 40% more time fixing them than companies that do.
You start without being able to properly monitor and see what's going on. There are no logging frameworks, no application performance monitoring, and no health checks in place. When things go wrong—and they will—it's difficult to figure out what's amiss. Without proper monitoring, it takes an average of 4.5 hours to find and fix IT problems. With full observability tools, it only takes 45 minutes.
It's easy to see that every shortcut you take today will cause two new problems tomorrow. Each of those problems makes two more. You're going to be in a lot of trouble with technical debt, security holes, and unstable systems soon. All because you were in a hurry to meet some random deadline.
The true cost of rushing in those "move fast and break things" success stories is often overlooked. You don't guarantee a quick time to market when you rush code to market. You're just making sure that failure to market happens quickly. Remember that most Silicon Valley break-movers lose millions, but you never read about those; you only read about the 1 in 350 VC-backed companies that make it. That is a staggering 0.29%. I would not bet on that strategy just yet.
Because code that is rushed doesn't just break once. It breaks all the time. In production. This issue arises when dealing with real customers. At the worst times. Your developers are putting out fires instead of adding new features. Instead of adding the features that the customer asked for, they're fixing race conditions at 2 AM. They're patching vulnerabilities in dependencies rather than creating the next version.
According to research, developers in environments with a lot of technical debt spend 42% of their time on maintenance and bug fixes, while those in well-architected systems spend only 23% of their time on these tasks. Bad code drives up your infrastructure costs by requiring more servers to handle the same load. Your database runs slower because no one took the time to make the right indexes or make the queries run faster. Unoptimized applications typically require 3 to 5 times more infrastructure resources, directly impacting your cloud computing and operational costs.
The costs of getting new customers go up because products that are rushed have higher churn rates. People stop using apps that crash a lot or don't work well. For example, 53% of mobile users will stop using an app if it takes longer than 3 seconds to load. It costs 5 to 25 times more to get a new customer than to keep an old one.
In the meantime, what about your competitor who took an extra month to set up proper error handling, security controls, and performance optimization? They're growing smoothly while you're still working on the base.
Let me tell you a myth that is costing you millions: The race isn't about speed unless you're in a real winner-take-all market with huge network effects. It's about lasting.
There is usually room for more than one winner in most markets. Your real job isn't to be the first to market; it's to still be there when the "fast movers" fail because they owe too much money. The businesses that are the biggest in their markets aren't usually the first ones there. They are the ones who took the time to use excellent software engineering practices from the start. They used well-known security frameworks like the OWASP guidelines to make their systems safe, set up the right authentication and authorization patterns, and made sure their APIs were designed with security and resilience in mind from the start.
Companies that have good security practices have 76% fewer security incidents and save an average of $1.76 million for every breach they avoid. They wrote code for failure scenarios using patterns like retry logic with exponential backoff, circuit breakers to stop failures from spreading, and bulkhead isolation to keep problems from spreading.
They set up full logging and monitoring so they could find problems before customers did. Systems that are built well and have the right resilience patterns are up 99.9% of the time, while systems that are built quickly are up 95% to 98% of the time. While you may believe that 95% to 98% uptime is an acceptable figure to agree to, take a moment to consider what that actually translates to in terms of downtime for your availability metrics. Remember that you should only calculate the times you really want to be available. This is due to the fact that any unavailability during your downtime is not taken into account. But failures do not take your opening hours into consideration.
Successful companies used domain-driven design to get the business requirements right, made complete API documentation, and built automated testing suites that found regressions before deployment. Companies that do a lot of testing deliver features 2.5 times faster and with 50% fewer bugs after deployment.
They made sure that their environments were always the same by using infrastructure as code, setting up the right CI/CD pipelines with automated security scanning and regression testing, and planning for horizontal scaling from the start.
Companies that have mature DevOps practices deploy 208 times more often and have lead times that are 106 times faster, all while being more reliable.
The truth is that your development schedule isn't about meeting deadlines. The purpose is to create systems that function effectively when real people use them in real-life situations with actual data and at a large scale. If your code crashes under load because you didn't use the right caching strategies or database connection pooling, it doesn't matter how fast it is to market.
If you neglect to conduct security code reviews and utilize static analysis tools, the likelihood of hacking increases significantly.
Think about the return on investment: putting in an extra 20–30% up front for the right architecture, security, and testing usually cuts the total cost of ownership by 60–80% over the life of the application.
The first "delay" of 2 to 4 weeks for proper engineering practices saves 6 to 12 months of fixing technical debt later on.
You have a simple choice: either take the time to follow excellent software engineering practices now, or spend the next two years telling customers why your system is down again while your competitors take your market share. The companies that last and eventually take over choose quality engineering over random speed. I leave it up to your imagination as to what multi-trillion-dollar company immediately comes to mind.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use the Info-Tech templates to identify and document your requirements, plan your project, and prepare to engage with vendors.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify the business drivers that necessitate data architecture improvements, then create a tactical plan for optimization.
Analyze how you stack up to Info-Tech’s data architecture capability model to uncover your tactical plan, and discover groundbreaking data architecture trends and how you can fit them into your action plan.
Optimize your data architecture by following tactical initiatives and managing the resulting change brought on by those optimization activities.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Explain approach and value proposition.
Review the common business drivers and how the organization is driving a need to optimize data architecture.
Understand Info-Tech’s five-tier data architecture model.
Determine the pattern of tactics that apply to the organization for optimization.
Understanding of the current data architecture landscape.
Priorities for tactical initiatives in the data architecture practice are identified.
Target state for the data quality practice is defined.
1.1 Explain approach and value proposition.
1.2 Review the common business drivers and how the organization is driving a need to optimize data architecture.
1.3 Understand Info-Tech’s five-tier data architecture model.
1.4 Determine the pattern of tactics that apply to the organization for optimization.
Five-tier logical data architecture model
Data architecture tactic plan
Define improvement initiatives.
Define a data architecture improvement strategy and roadmap.
Gaps, inefficiencies, and opportunities in the data architecture practice are identified.
2.1 Create business unit prioritization roadmap.
2.2 Develop subject area project scope.
2.3 Subject area 1: data lineage analysis, root cause analysis, impact assessment, business analysis
Business unit prioritization roadmap
Subject area scope
Data lineage diagram
Define improvement initiatives.
Define a data quality improvement strategy and roadmap.
Improvement initiatives are defined.
Improvement initiatives are evaluated and prioritized to develop an improvement strategy.
A roadmap is defined to depict when and how to tackle the improvement initiatives.
3.1 Create business unit prioritization roadmap.
3.2 Develop subject area project scope.
3.3 Subject area 1: data lineage analysis, root cause analysis, impact assessment, business analysis.
Business unit prioritization roadmap
Subject area scope
Data lineage diagram
“As business and data landscapes change, an organization’s data architecture needs to be able to keep pace with these changes. It needs to be responsive so as to not only ensure the organization continues to operate efficiently but that it supports the overall strategic direction of the organization.
In the dynamic marketplace of today, organizations are constantly juggling disruptive forces and are finding the need to be more proactive rather than reactive. As such, organizations are finding their data to be a source of competitive advantage where the data architecture has to be able to not only support the increasing amount, sources, and rate at which organizations are capturing and collecting data but also be able to meet and deliver on changing business needs.
Data architecture optimization should, therefore, aid in breaking down data silos and creating a more shared and all-encompassing data environment for better empowering the business.” (Crystal Singh, Director, Research, Data and Information Practice, Info-Tech Research Group)
This Research Is Designed For:
|
This Research Will Help You:
|
This Research Will Also Assist:
|
This Research Will Help Them:
|
The transformational insights that executives are constantly seeking to leverage can be uncovered with a data practice that makes high quality, trustworthy information readily available to the business users who need it.
50% Organizations that embrace data are 50% more likely to launch products and services ahead of their competitors. (Nesta, 2016)
Whether hoping to gain a better understanding of your business or trying to become an innovator in your industry, any organization can get value from its data regardless of where you are in your journey to becoming a data-driven enterprise:
Business Monitoring
|
Business Insights
|
Business Optimization
|
Business Transformation
|
A zettabyte is a billion terabytes. Organizations today need to measure their data size in zettabytes, a challenge that is only compounded by the speed at which the data is expected to move.
Arriving at the understanding that data can be the driving force of your organization is just the first step. The reality is that the true hurdles to overcome are in facing the challenges of today’s data landscape.
| Challenges of The Modern Data Landscape | ||||
| Data at rest | Data movement | |||
| Greater amounts | Different types | Uncertain quality | Faster rates | Higher complexity |
“The data environment is very chaotic nowadays. Legacy applications, data sprawl – organizations are grappling with what their data landscape looks like. Where are our data assets that we need to use?” (Andrew Johnston, Independent Consultant)
Well-defined and structured data management practices are the best way to mitigate the limitations that derive from these challenges and leverage the most possible value from your data.
Refer to Info-Tech’s capstone Create a Plan For Establishing a Business-Aligned Data Management Practice blueprint to understand data quality in the context of data disciplines and methods for improving your data management capabilities.
Data ArchitectureThe set of rules, policies, standards, and models that govern and define the type of data collected and how it is used, stored, managed, and integrated within the organization and its database systems. In general, the primary objective of data architecture is the standardization of data for the benefit of the organization. 54% of leading “analytics-driven” enterprises site data architecture as a required skill for data analytics initiatives. (Maynard 2015) |
MYTHData architecture is purely a model of the technical requirements of your data systems. REALITYData architecture is largely dependent on a human element. It can be viewed as “the bridge between defining strategy and its implementation”. (Erwin 2016) |
FunctionsA strong data architecture should:
|
Business valueA strong data architecture will help you:
|
The data architect:
|
Data architects bridge the gap between strategic and technical requirements:
“Fundamentally, the role of a data architect is to understand the data in an organization at a reasonable level of abstraction.” (Andrew Johnston, Independent Consultant) |
Outdated and archaic systems and processes limit the ability to access data in a timely and efficient manner, ultimately diminishing the value your data should bring.
59% |
of firms believe their legacy storage systems require too much processing to meet today’s business needs. (Attivio, Survey Big Data decision Makers, 2016) | 48% |
of companies experience pains from being reliant on “manual methods and trial and error when preparing data.” (Attivio, Survey Big Data decision Makers, 2016) | 44% |
44% of firms said preparing data was their top hurdle for analytics, with 22% citing problems in accessing data. (Data Virtualization blog, Data Movement Killed the BI Star, 2016) |
Intuitive organizations who have recognized these shortcomings have already begun the transition to modernized and optimized systems and processes.
28% |
of survey respondents say they plan to replace “data management and architecture because it cannot handle the requirements of big data.” (Informatica, Digital Transformation: Is Your Data Management Ready, 2016) | 50% |
Of enterprises plan to replace their data warehouse systems and analytical tools in the next few years. (TDWI, End of the Data Warehouse as we know it, 2017) |
Leading organizations are attacking data architecture problems … you will be left behind if you do not start now!
Focusing on only data models without the required data architecture guidance can cause harmful symptoms in your IT department, which will lead to organization-wide problems.
| IT Symptoms Due to Ineffective Data Architecture | ||
Poor Data Quality
|
Poor Accessibility
|
Strategic Disconnect
|
| Leads to Poor Organizational Conditions | ||
Inaccurate Insights
|
Ineffective Decision Making
|
Inefficient Operations
|
| You need a solution that will prevent the pains. | ||
1 |
|
![]() |
2 |
|
|
3 |
|
![]() |
Info-Tech has identified these four common drivers that lead to the need to optimize your data architecture.
These different core objectives underline the motivation to optimize data architecture, and will determine your overall approach.
Every organization’s data system requires a unique design and an assortment of applications and storage units to fit their business needs. Therefore, it is difficult to paint a picture of an ideal model that has universal applications. However, when data architecture is broken down in terms of layers or tiers, there exists a general structure that is seen in all data systems.

Thinking of your data systems and processes in this framework will allow you to see how different elements of the architecture relate to specific business operations.
|
|
Info-Tech’s Data Architecture Capability Model
![]() |
|
|
Info-Tech Insight
Optimizing data architecture requires a tactical approach, not a passive approach. The demanding task of optimization requires the ability to heavily prioritize. After you have identified why, determine how using our pre-built roadmap to address the four common drivers. |
| Data Architecture in Alignment
Data architecture can not be designed to simply address the focus of data specialists or even the IT department. It must act as a key component in the all encompassing enterprise architecture and reflect the strategy and design of the entire business. Data architecture collaborates with application architecture in the delivery of effective information systems, and informs technology architecture on data related infrastructure requirements/considerations Please refer to the following blueprints to see the full picture of enterprise architecture: |
Adapted from TOGAF Refer to Phase C of TOGAF and Bizbok for references to the components of business architecture that are used in data architecture. |
CASE STUDY |
Industry: Financial
|
![]() |
Look for this symbol as you walk through the blueprint for details on how Info-Tech Consulting assisted this monetary authority. |
The monetary authority is responsible for oversight of the financial situation of a country that takes in revenue from foreign incorporation. Due to increased pressure from international regulatory bodies, the monetary authority became responsible for generating multiple different types of beneficial ownership reports based on corporation ownership data within 24 hours of a request.
Normally, the process to generate and provide beneficial ownership reports took a week or more. This was due to multiple points of stale data architecture, including a dependence on outdated legacy systems and a broken process for gathering the required data from a mix of paper and electronic sources.
Info-Tech helped the monetary authority identify the business need that resulted from regulatory pressures, the challenges that needed to be overcome, and actionable tactics for addressing the needs.
Info-Tech’s methodology was followed to optimize the areas of data architecture that address the business driver.
As you walk through this blueprint, watch for additional case studies that walk through the details of how Info-Tech helped this monetary authority.
Phase 1
Prioritize Your Data Architecture With Business-Driven Tactics |
Phase 2
Personalize Your Tactics to Optimize Your Data Architecture |
Phase 3
Create Your Tactical Data Architecture Roadmap |
Step 1: Identify Your Business Driver for Optimizing Data Architecture
Data Architecture Driver Pattern Identification Tool
Data Architecture Optimization Template |
Step 1: Measure Your Data Architecture Capabilities
Data Architecture Tactical Roadmap Tool
Data Architecture Tactical Roadmap Tool
Data Architecture Trends Presentation |
Step 1: Personalize Your Data Architecture Roadmap
Data Architecture Tactical Roadmap Tool
Data Architecture Decision Template |
Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.
This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.
This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
| PHASE 1 Prioritize Your Data Architecture With Business-Driven Tactics |
PHASE 2 Personalize Your Tactics to Optimize Your Data Architecture |
PHASE 3 Create Your Tactical Data Architecture Roadmap |
|
![]() Best-Practice Toolkit |
1.1 Identify Your Business Driver for Optimizing Data Architecture 1.2 Determine Actionable Tactics to Optimize Data Architecture |
2.1 Measure Your Data Architecture Capabilities 2.2 Set a Target for Data Architecture Capabilities 2.3 Identify the Tactics that Apply to Your Organization |
3.1 Personalize Your Data Architecture Roadmap 3.2 Manage Your Data Architecture Decisions and the Resulting Changes |
Guided Implementations |
|
|
|
![]() Onsite Workshop |
Module 1:
Identify the Drivers of the Business for Optimizing Data Architecture |
Module 2:
Create a Tactical Plan for Optimizing Data Architecture |
Module 3:
Create a Personalized Roadmap for Data Architecture Activities |
Preparation |
Workshop Day 1 |
Workshop Day 2 |
Workshop Day 3 |
Workshop Day 4 |
Workshop Day 5 |
|
| Organize and Plan Workshop | Identify the Drivers of the Business for Optimizing Data Architecture | Determine the Tactics For Optimizing Data Architecture | Create Your Roadmap of Optimization Activities | Create Your Personalized Roadmap | Create a Plan for Change Management | |
Morning Activities |
|
|
|
|
|
|
Afternoon Activities |
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
|
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 1.1: Identify Your Business Driver for Optimizing Data Architecture | Step 1.2: Determine Actionable Tactics to Optimize Data Architecture |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
Phase 1 Results & Insights
|
|
In this phase, you will determine your focus for optimizing your data architecture based on the business drivers that are commonly felt by most organizations.
“To stay competitive, we need to become more data-driven. Compliance pressures are becoming more demanding. We need to add a new functionality.”
Info-Tech’s Five-Tier Data Architecture:
Tactical plan for Data Architecture Optimization
PHASE 1 |
|
| 1.1 | 1.2 |
| Identify Your Business Driver for Optimizing Data Architecture | Determine Actionable Tactics to Optimize Data Architecture |
A description of the structure and interaction of the enterprise’s major types and sources of data, logical data assets, physical data assets, and data management resources (TOGAF 9).
The subject area of data management that defines the data needs of the enterprise and designs the master blueprints to meet those needs (DAMA DMBOK, 2009).
IBM (2007) defines data architecture as the design of systems and applications that facilitate data availability and distribution across the enterprise.
Definitions vary slightly across major architecture and management frameworks.
However, there is a general consensus that data architecture provides organizations with:
Data architecture must be based on business goals and objectives; developed within the technical strategies, constraints, and opportunities of the organization in support of providing a foundation for data management.
| Current Data Management |
|
Goal for Data Management |
Data Architecture is not just data models. Data architects must understand the needs of the business, as well as the existing people and processes that already exist in the organization to effectively perform their job.
![]() |
Each layer of architecture informs the next. In other words, each layer has components that execute processes and offer services to the next layer. For example, data architecture can be broken down into more granular activities and processes that inform how the organization’s technology architecture should be arranged. |
|
Data does not exist on its own. It is informed by business architecture and used by other architectural domains to deliver systems, IT services, and to support business processes. As you build your practice, you must consider how data fits within the broader architectural framework. |
The Zachman Framework is a widely used EA framework; within it, data is identified as the first domain. The framework aims to standardize artifacts (work-products) within each architectural domain, provides a cohesive view of the scope of EA and clearly delineates data components. Use the framework to ensure that your target DA practice is aligned to other domains within the EA framework. |
![]() (Source: Zachman International) |
Enterprise Architect
The enterprise architect provides thought leadership and direction to domain architects.
They also maintain architectural standards across all the architectural domains and serve as a lead project solution architect on the most critical assignments.
| Data architects need to have a deep experience in data management, data warehousing, and analytics technologies. At a high level, the data architect plans and implements an organization’s data, reporting, and analytics roadmap. Some of the role’s primary duties and responsibilities include:
| Data architects bridge the gap between strategic and technical requirements: “Fundamentally, the role of a data architect is to understand the data in an organization at a reasonable level of abstraction.” (Andrew Johnston, Independent Consultant) |
The data architect role is not always clear cut. Many organizations do not have a dedicated data architect resource, and may not need one. However, the duties and responsibilities of the data architect must be carried out to some degree by a combination of resources as appropriate to the organization’s size and environment.
Data Architect Role Description
Skills Necessary
|
Define Policies, Processes, and Priorities
|
See Info-Tech’s Data Architect job description for a comprehensive description of the data architect role.

The Open Group TOGAF enterprise architecture model is a detailed framework of models, methods, and supporting tools to create an enterprise-level architecture.
The wide adoption of TOGAF has resulted in the mapping of it to several other industry standards including CoBIT and ITIL.

MIKE2.0 (Method for an Integrated Knowledge Environment), is an open source method for enterprise information management providing a framework for information development.
If an enterprise-level IT architecture is your goal, TOGAF is likely a better model. However, if you are an information and knowledge-based business then MIKE2.0 may be more relevant to your business.
As the business landscape evolves, new needs arise. An organization may undergo new compliance requirements, or look to improve their customer intimacy, which could require a new functionality from an application and its associated database.
There are four common scenarios that lead to an organization’s need to optimize its data architecture and these scenarios all present unique challenges for a data architect:
These are not the only reasons why data architects need to optimize the organization’s data architecture. These are only four of the most common scenarios, however, other business needs can be addressed using the same concept as these four common scenarios.
Follow Info-Tech’s process of first analyzing the needs of the business, then determining how best to architect your data based on these drivers. Data architecture needs to be able to rapidly evolve to support the strategic goals of the business, and the Data Architecture Driver Pattern Identification Tool will help you to prioritize your efforts to best do this.
Tab 2. Driver Identification Objective: Objectively assess the most pressing business drivers.
|
Tab 3. Tactic Pattern Plan, Section 1 Purpose: Review your business drivers that require architectural changes in your environment.
|
Tab 3. Tactic Pattern Plan, Section 2 Purpose: Determine a list of tactics that will help you address the business drivers.
|
Step
|
Step
|
Step
|
INPUT: Data Architecture Driver tool assessment prompts.
OUTPUT: Identified business driver that applies to your organization.
Materials: Data Architecture Driver Pattern Identification Tool
Participants: Data architect, Enterprise architect
InstructionsIn Tab 2. Driver Identification of the Data Architecture Driver Pattern Identification Tool, assess the degree to which the organization is feeling the pains of the four most common business drivers:
|
Data architecture improvements need to be driven by business need.
“As a data architect, you have to understand the functional requirements, the non-functional requirements, then you need to make a solution for those requirements. There can be multiple solutions and multiple purposes.” (Andrew Johnston, Independent Consultant) |
1.1.2 1 hour per interview
INPUT: Sample questions targeting the activities, challenges, and opportunities of each business unit
OUTPUT: Sample questions targeting the activities, challenges, and opportunities of each business unit
Materials: Data Architecture Driver Pattern Identification Tool
Participants: Data architect, Business representatives, IT representatives
Identify 2-3 business units that demonstrate enthusiasm for or a positive outlook on improving how organizational data can help them in their role and as a unit.
Conducting a deep-dive interview process with these key stakeholders will help further identify high-level goals for the data architecture strategy within each business unit. This process will help to secure their support throughout the implementation process by giving them a sense of ownership.
Request background information and documentation from stakeholders regarding the following:
1.1.3 2 hours
INPUT: Data Architecture Driver tool assessment prompts.
OUTPUT: Identified business driver that applies to your organization.
Materials: Data Architecture Driver Pattern Identification Tool
Participants: Data architect, Enterprise architect
| Instructions
As you work through Tab 2. Driver Identification of the Data Architecture Driver Pattern Identification Tool, consult with the enterprise architect or equivalent to assist you in rating the importance of each of the symptoms of the business drivers. This will help you provide greater value to the business and more aligned objectives. |
![]() Tab 2. Driver Identification |
PHASE 1 | |
| 1.1 | 1.2 |
| Identify Your Business Driver for Optimizing Data Architecture | Determine Actionable Tactics to Optimize Data Architecture |
Remember… Architecting an organization involves alignment, planning, road mapping, design, and change management functions.
Data architects must be heavily involved with:
To do this, you need a framework. A framework provides you with the holistic view of the organization’s data environment that you can use to design short- and long-term tactics for improving the use of data for the needs of the business.
Use Info-Tech’s five-tier data architecture to model your environment in a logical, consumable fashion.
The more complicated an environment is, the more need there is for a framework. Being able to pick a starting point and prioritize tasks is one of the most difficult, yet most essential, aspects of any architect’s role.
Info-Tech’s five-tier data architecture model summarizes an organization’s data environment at a logical level. Data flows from left to right, but can also flow from the presentation layer back to the warehousing layer for repatriation of data.

Download the Data Architecture Optimization Template.
Use this template to support your team in creating a tactical strategy for optimizing your data architecture across the five tiers of the organization’s architecture. This template can be used to document your organization’s most pressing business driver, the reasons for optimizing data architecture according to that driver, and the tactics that will be employed to address the shortcomings in the architecture.
![]() |
Info-Tech’s Data Architecture Optimization Template | Table of Contents | |
| 1. Build Your Current Data Architecture Logical Model | Use this section to document the current data architecture situation, which will provide context for your plan to optimize your data architecture. | ||
| 2. Optimization Plan | Use this section to document the tactics that will be employed to optimize the current data architecture according to the tactic pattern identified by the business driver. | ||
As you read about the details of the five-tier data architecture model in the following slides, start building your current logical data architecture model by filling out the sections that correspond to the various tiers. For example, if you identified that the most pressing business driver is becoming compliant with regulations, document the sources of data required for compliance, as well as the warehousing strategy currently being employed. This will help you to understand the organization’s data architecture at a logical level.
![]() –› Data to integration layer | Tier 1 is where the data enters the organization.All applications, data documents such as MS Excel spreadsheets, documents with table entries, manual extractions from other document types, user-level databases including MS Access and MySQL, other data sources, data feeds, big datasets, etc. reside here. This tier typically holds the siloed data that is so often not available across the enterprise because the data is held within department-level applications or systems. This is also the layer where transactions and operational activities occur and where data is first created or ingested. There are any number of business activities from transactions through business processes that require data to flow from one system to another, so it is often at this layer we see data created more than once, data corruption occurs, manual re-keying of data from system to system, and spaghetti-like point-to-point connections are built that are often fragile. This is usually the single most problematic area within an enterprise’s data environment. Application- or operational-level (siloed) reporting often occurs at this level. Info-Tech Best PracticeAn optimized Tier 1 has the following attributes:
|
![]() –› Data to Warehouse Environment Find out more For more information on data integration, see Info-Tech’s Optimize the Organization’s Data Integration Practices blueprint. | Tier 2 is where integration, transformation, and aggregation occur.Regardless of how you integrate your systems and data stores, whether via ETL, ESB, SOA, data hub, ODS, point-to-point, etc., the goal of this layer is to move data at differing speeds for one of two main purposes: 1) To move data from originating systems to downstream systems to support integrated business processes. This ensures the data is pristine through the process and improves trustworthiness of outcomes and speed to task and process completion. 2) To move data to Tier 3 - The Data Warehouse Architecture, where data rests for other purposes. This movement of data in its purest form means we move raw data to storage locations in an overall data warehouse environment reflecting any security, compliance and other standards in our choices for how to store. Also, this is where data is transformed for unique business purpose that will also be moved to a place of rest or a place of specific use. Data masking, scrambling, aggregation, cleansing and matching, and other data related blending tasks occur at this layer. Info-Tech Best PracticeAn optimized Tier 2 has the following attributes:
|
Tier 3 is where data rests in long-term storage.This is where data rests (long-term storage) and also where an enterprise’s information, documents, digital assets, and any other content types are stored. This is also where derived and contrived data creations are stored for re-use, and where formulas, thought models, heuristics, algorithms, report styles, templates, dashboard styles, and presentations-layer widgets are all stored in the enterprise information management system. At this layer there may be many technologies and many layers of security to reflect data domains, classifications, retention, compliance, and other data needs. This is also the layer where data lakes exist as well as traditional relational databases, enterprise database systems, enterprise content management systems, and simple user-level databases. Info-Tech Best PracticeAn optimized Tier 3 has the following attributes:
| Data from integration layer –›![]() –› Analytics Find out more For more information on Data Warehousing, see Info-Tech’s Build an Extensible Data Warehouse Foundation and Drive Business Innovation With a Modernized Data Warehouse Environment blueprints. |
Tier 4 represents data being used for a purpose.This is where you build fit-for-purpose data sets (marts, cubes, flat files) that may now draw from all enterprise data and information sources as held in Tier 3. This is the first place where enterprise views of all data may be effectively done and with trust that golden records from systems of record are being used properly. This is also the layer where BI tools get their greatest use for performing analysis. Unlike Tier 3 where data is at rest, this tier is where data moves back into action. Data is brought together in unique combinations to support reporting, and analytics. It is here that the following enterprise analytic views are crafted:
Info-Tech Best PracticeAn optimized Tier 4 has the following attributes:
| Warehouse Environment –›![]() –› Presentation Find out more For more information on BI tools and strategy, see Info-Tech’s Select and Implement a Business Intelligence and Analytics Solution and Build a Next Generation BI with a Game-Changing BI Strategy blueprints. |
Tier 5 represents data in knowledge form.This is where the data and information combine in information insight mapping methods (presentations, templates, etc.). We craft and create new ways to slice and dice data in Tier 4 to be shown and shared in Tier 5. Templates for presenting insights are extremely valuable to an enterprise, both for their initial use, and for the ability to build deeper, more insightful analytics. Re-use of these also enables maximum speed for sharing, consuming the outputs, and collective understanding of these deeper meanings that is a critical asset to any enterprise. These derived datasets and the thought models, presentation styles, templates, and other derived and contrived assets should be repatriated into the derived data repositories and the enterprise information management systems respectively as shown in Tier 3. Find out more For more information on enterprise content management and metadata, see Info-Tech’s Develop an ECM Strategy and Break Open Your DAM With Intuitive Metadata blueprints. | ![]() | |
Info-Tech Best PracticeAn optimized Tier 5 has the following attributes:
| Info-Tech InsightRepatriation of data and information is an essential activity for all organizations to manage organizational knowledge. This is the activity where information, knowledge, and insights that are stored in content form are moved back to the warehousing layer for long-term storage. Because of this, it is crucial to have an effective ECM strategy as well as the means to find information quickly and efficiently. This is where metadata and taxonomy come in. | |
Now that you have an understanding of the drivers requiring data architecture optimization, as well as the current data architecture situation at your organization, it is time to determine the actions that will be taken to address the driver.
1. Business driver |
![]() Data Architecture Driver Pattern Identification Tool, Tab 2. Tactic Pattern Plan |
![]() 3. Documented tactic planData Architecture Optimization Template |
2. Tactics across the five tiers |
![]() |
Whether the business wants to gain better customer intimacy, achieve operational excellence, or needs to change its compliance and reporting strategy, the need for collecting new data through a new application or a new functionality within an existing application can arise. This business driver has the following attributes:
|
![]() |
||
| When this business driver arises, data architects should focus on optimizing architecture at the source tier and the integration of the new functionality. | Tactics for this business driver should address the following pattern:![]() |
||
An organization can want to use its data for multiple reasons. Whether these reasons include improving customer experience or operational excellence, the data architect must ensure that the organization’s data aggregation environment, reporting and analytics, and presentation layer are assessed and optimized for serving the needs of the business.
“Data-drivenness is about building tools, abilities, and, most crucially, a culture that acts on data.” (Carl Anderson, Creating a Data-Driven Organization)
Tactics for this business driver should address the following pattern:![]() |
When this business driver arises, data architects should focus on optimizing architecture at the source tier and the integration of the new functionality. | ||
![]() |
|
||
An organization can want to use its data for multiple reasons. Whether these reasons include improving customer experience or operational excellence, the data architect must ensure that the organization’s data aggregation environment, reporting and analytics, and presentation layer are assessed and optimized for serving the needs of the business.
There are different types of requirements:
|
![]() |
||
| When this business driver arises, data architects should focus on optimizing architecture where data is stored: at the sources, the warehouse environment, and analytics layer. | Tactics for this business driver should address the following pattern:![]() |
||
Is the organization looking to acquire or merge with another organization or line of business?There are three scenarios that encompass the mergers and acquisitions business driver for data architecture:
|
Regardless of what scenario your organization falls into, you must go through the same process of identifying the requirements for the new data:
|
|
| “As a data architect, you must do due diligence of the acquired firm. What are the workflows, what are the data sources, what data is useful, what is useless, what is the value of the data, and what are the risks of embedding the data?” (Anonymous Mergers and Acquisitions Consultant) | ||
| When this business driver arises, data architects should focus on optimizing architecture at the source tier, the warehousing layer, and analytics. |
![]() |
|
1.2.1 30 minutes
INPUT: Business driver assessment
OUTPUT: Tactic pattern and tactic plan
Materials: Data Architecture Driver Pattern Identification Tool, Data Architecture Optimization Template
Participants: Data architect, Enterprise architect
Instructions
|
||
![]() Data Architecture Driver Tool |
![]() |
![]() Data Architecture Optimization Template |
Our approach will help you to get to the solution of the organization’s data architecture problems as quickly as possible. However, keep in mind that you should still address the other tiers of your data architecture even if they are not part of the pattern we identified. For example, if you need to become more data driven, don’t completely ignore the sources and the integration of data. However, to deliver the most and quickest value, focus on tiers 3, 4, and 5.
Data architects and those responsible for updating an organization’s data architecture have a wide-open playing field with which to take their efforts. Being able to narrow down your focus and generate an actionable plan will help you provide more value to the organization quickly and get the most out of your data.
Now that you have your prioritized tactical plan, move to Phase 2. This phase will help you map these priorities to the essential capabilities and measure where you stack up in these capabilities. This is an essential step in creating your data architecture roadmap and plan for coming years to modernize the organization’s data architecture.
CASE STUDY | Industry: Financial
| ![]() | Part 1 |
| Prior to receiving new external requirements, the monetary Authority body had been operating with an inefficient system. Outdated legacy systems, reports in paper form, incomplete reports, and stale data from other agencies resulted in slow data access. The new requirements demanded speeding up this process.
Although the organization understood it needed changes, it first needed to establish what were the business objectives, and which areas of their architecture they would need to focus on. The business driver in this case was compliance requirements, which directed attention to the sources, aggregation, and insights tiers. |
Looking at the how the different tiers relate to certain business operations, the organization uncovered the best practise tactics to achieving an optimized data architecture.
Once the business driver had been established, the organization was able to identify the specific areas it would eventually need to evaluate and remedy as needed. |
![]() |
|
1.1.1 |
![]() |
Identify the business driver that will set the direction of your data architecture optimization plan.
In this activity, the facilitator will guide the team in identifying the business driver that is creating the need to improve the organization’s data architecture. Data architecture needs to adapt to the changing needs of the business, so this is the most important step of any data architecture improvements. |
1.2.1 |
![]() |
Determine the tactics that you will use to optimize data architecture.
In this activity, the facilitator will help the team create a tactical plan for optimizing the organization’s data architecture across the five tiers of the logical model. This plan can then be followed when addressing the business needs. |
| Business Drivers |
|
|||||||||||||||
| Tiers | 1. Data Sources | 2. Integration | 3. Warehousing | 4. Insights | 5. Presentation | |||||||||||
| Capabilities | Current Capabilities | |||||||||||||||
| Target Capabilities | ||||||||||||||||
| Example Tactics | Leverage indexes, partitions, views, and clusters to optimize performance.
Cleanse data source. |
Leverage integration technology.
Identify matching approach priorities. |
Establish governing principles.
Install performance enhancing technologies. |
Establish star schema and snowflake principles.
Share data via data mart. |
Build metadata architecture:
|
|||||||||||
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 2.1: Measure Your Data Architecture Capabilities | Step 2.2: Set a Target for Data Architecture Capabilities | Step 2.3: Identify the Tactics That Apply to Your Organization |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Finalize phase deliverable:
|
Then complete these activities…
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
With these tools & templates:
|
Phase 2 Results & Insights
|
||
PHASE 2 |
||
| 2.1 | 2.2 | 2.3 |
| Measure Your Data Architecture Capabilities | Set a Target for Data Architecture Capabilities | Identify the Tactics That Apply to Your Organization |
Capabilities represent a mixture of people, technology, and processes. The focus of capability design is on the outcome and the effective use of resources to produce a differentiating capability or an essential supporting capability.
To personalize your tactics, you have to understand what the essential capabilities are across the five tiers of an organization’s data architecture. Then, assess where you currently stand in these capabilities and where you need to go in order to build your optimization plan.

Info-Tech’s data architecture capability model can be laid over the five-tier data architecture to understand the essential and advanced capabilities that an organization should have, and to build your tactical strategy for optimizing the organization’s data architecture across the tiers.
Info-Tech’s data architecture capability model can be laid over the five-tier data architecture to understand the essential and advanced capabilities that an organization should have, and to build your tactical strategy for optimizing the organization’s data architecture across the tiers.

2.1.1 Data Architecture Tactical Roadmap Tool
InstructionsUse the Data Architecture Tactical Roadmap Tool as your central tool to develop a tactical plan of action to optimize the organization’s data architecture. This tool contains the following sections:
| INFO-TECH DELIVERABLE |
The organization likely has some of the capabilities that are needed to solve the problem, but also a need to improve other capabilities. To narrow down the capabilities that you should focus on, first select the business driver that was identified in Phase 1 in Tab 1. Business Driver Input of the Data Architecture Tactical Roadmap Tool. This will customize the roadmap tool to deselect the capabilities that are likely to be less relevant to your organization.
For Example: If you identified your business driver as “becoming more data-driven”, you will want to focus on measuring and building out the capabilities within Tiers 3, 4, and 5 of the capability model.
Data Architecture Capability Model![]() |
NoteIf you want to assess your organization for all of the capabilities across the data architecture capability model, select “Comprehensive Data Architecture Assessment” in Tab 1. Business Driver Input of the Data Architecture Tactical Roadmap Tool.
|
2.1.2 1 hour
INPUT: Current data architecture capabilities.
OUTPUT: An idea of where you currently stand in the capabilities.
Materials: Data Architecture Tactical Roadmap Tool
Participants: Data architect, Enterprise architect, Business representatives
Use the Data Architecture Tactical Roadmap Tool to evaluate the baseline and target capabilities of your practice in terms of how data architecture is approached and executed.
Instructions
These results will set the baseline against which you will monitor performance progress and keep track of improvements over time. |
To assess data architecture maturity, Info-Tech uses the Capability Maturity Model Integration (CMMI) program for rating capabilities on a scale of 1 to 5:
1 = Initial/Ad hoc 2 = Developing 3 = Defined 4 = Managed and Measurable 5 = Optimized |
Focus on Early Alignment. Assessing capabilities within specific people’s job functions can naturally result in disagreement or debate, especially between business and IT people. Objectively facilitate any debate and only finalize capability assessments when there is full alignment. Remind everyone that data architecture should ultimately serve business needs wherever possible.
PHASE 2 | ||
| 2.1 | 2.2 | 2.3 |
| Measure Your Data Architecture Capabilities | Set a Target for Data Architecture Capabilities | Identify the Tactics That Apply to Your Organization |
Keep the goal in mind by documenting target state objectives. This will help to measure the highest priority gaps in the organization’s data architecture capabilities.
| Example driver = Becoming more data driven | ![]() |
![]() |
![]() |
Current Capabilities | ![]() |
Target Capabilities |
| Gaps and Priorities | ||||||
![]() |
||||||
INPUT: Current state of data architecture capabilities.
OUTPUT: Target state of data architecture capabilities.
Materials: Data Architecture Tactical Roadmap Tool
Participants: Data architect
Determine the state of data architecture capabilities that the organization needs to reach to address the drivers of the business.
For example: If you identified your business driver as “becoming more data driven”, you will want to focus on the capabilities within Tiers 3, 4, and 5 of the capability model.
| Driver = Becoming more data driven | ![]() |
![]() |
![]() |
Target Capabilities |
2.2.2 1 hour
INPUT: Current and target states of data architecture capabilities.
OUTPUT: Holistic understanding of where you need to improve data architecture capabilities.
Materials: Data Architecture Tactical Roadmap Tool
Participants: Data architect
To enable deeper analysis on the results of your capability assessment, Tab 4. Capability Gap Analysis in the Data Architecture Tactical Roadmap Tool creates visualizations of the gaps identified in each of your practice capabilities and related data management practices. These diagrams serve as analysis summaries.

PHASE 2 | ||
| 2.1 | 2.2 | 2.3 |
| Measure Your Data Architecture Capabilities | Set a Target for Data Architecture Capabilities | Identify the Tactics That Apply to Your Organization |
Stop here. Before you begin to plan for optimization of the organization’s data environment, get a sense of the sustainability and scalability of the direction of the organization’s data architecture evolution.
Practically any trend in data architecture is driven by an attempt to solve one or more the common challenges of today’s tumultuous data landscape, otherwise known as “big data.” Data is being produced in outrageous amounts, at very high speeds, and in a growing number of types and structures.
To meet these demands, which are not slowing down, you must keep ahead of the curve. Consider the internal and external catalysts that might fuel your organization’s need to modernize its data architecture:
Big Data |
Data Storage |
Advanced analytics |
Unstructured data |
Integration |
| Hadoop ecosystem
The discussion about big data is no longer about what it is, but how do businesses of all types operationalize it. Is your organization currently capturing and leveraging big data? Are they looking to do so in the near future? |
The cloud
The cloud offers economical solutions to many aspects of data architecture. Have you dealt with issues of lack of storage space or difficulties with scalability? Do you need remote access to data and tools? |
Real-time architecture
Advanced analytics (machine learning, natural language processing) often require data in real-time. Consider Lambda and Kappa architectures. Has your data flow prevented you from automation, advanced analytics, or embracing the world of IoT? |
Graph databases
Self-service data access allows more than just technical users to participate in analytics. NoSQL can uncover buried relationships in your data. Has your organization struggled to make sense of different types of unstructured data? |
Is ETL enough?
What SQL is to NoSQL, ETL is to NoETL. Integration techniques are being created to address the high variety and high velocity of data. Have your data scientists wasted too much time and resources in the ETL stage? |
The Info-Tech Data Architecture Trends Presentation provides a glance at some of the more significant innovations in technology that are driving today’s advanced data architectures. This presentation also explains how these trends relate to either the data challenges you may be facing, or the specific business drivers you are hoping to bring to your organization. |
![]() Data Architecture Trends Presentation |
Now that you know where the organization currently stands, follow these steps to begin prioritizing the initiatives:
| Current State | Gap Closure Strategies | Target State | Data Architecture Tactical Roadmap |
|
Initiatives involving:
|
|
(Source: “How to Build a Roadmap”) |
Optimizing data architecture requires a tactical approach, not a passive approach. The demanding task of optimization requires the ability to heavily prioritize. After you have identified why, determine how using our pre-built roadmap to address the four common drivers.
Before diving headfirst into creating your tactical data architecture plan, documenting the challenges associated with each aspect of the organization’s data architecture can help to identify where you need to focus your energy in optimizing each tier. The following table presents the common challenges across the five tiers:
Source Tier |
Integration Tier |
Warehousing Tier |
Analytics Tier |
Presentation Tier |
| Inconsistent data models | Performance issues | Scalability of the data warehouse | Data currency, flexibility | Model interoperability |
| Data quality measures: data accuracy, timeliness, accessibility, relevance | Duplicated data | Infrastructure needed to support volume of data | No business context for using the data in the correct manner | No business context for using the data in the correct manner |
| Free-form field and data values beyond data domain | Tokenization and other required data transformations | Performance
Volume Greedy consumers can cripple performance Insufficient infrastructure |
Inefficiencies in building the data mart | Report proliferation/chaos (“kitchen sink dashboards”) |
| Reporting out of source systems | DB model inefficiencies | |||
| Manual errors;
Application usability |
Elasticity |
2.2.3 1 hour
INPUT: Tactics that will be used to optimize data architecture.
OUTPUT: Metrics that can be used to measure optimization success.
Materials: Data Architecture Tactical Roadmap Tool
Participants: Data architect
There are two types of metrics that are useful for data architects to track and measure: program metrics and project metrics. Program metrics represent the activities that the data architecture program, which is the sum of multiple projects, should help to improve. Project metrics are the more granular metrics that track each project.
Program Metrics
|
Project Metrics
|
Use Tab 6. Metrics of the Data Architecture Tactical Roadmap Tool to document and track metrics associated with your optimization tactics.
| Data Governance
Data architecture depends on effective data governance. Use our blueprint, Enable Shared Insights With an Effective Data Governance Engine to get more out of your architecture. |
Data Quality
The key to maintaining high data quality is a proactive approach that requires you to establish and update strategies for preventing, detecting, and correcting errors. Find out more on how to improve data quality with Info-Tech’s blueprint, Restore Trust in Your Data Using a Business-Aligned Data Quality Management Approach. |
| Master Data Management
When you start your data governance program, you will quickly realize that you need an effective MDM strategy for managing your critical data assets. Use our blueprint, Develop a Master Data Management Strategy and Roadmap to Better Monetize Data to get started with MDM. |
Data Warehouse
The key to maintaining high data quality is a proactive approach that requires you to establish and update strategies for preventing, detecting, and correcting errors. Find out more on how to improve data quality with Info-Tech’s blueprint, Drive Business Innovation With a Modernized Data Warehouse Environment. |
CASE STUDY | Industry: Financial
| ![]() | Part 2 |
After establishing the appropriate tactics based on its business driver, the monetary authority was able to identify its shortcomings and adopt resolutions to remedy the issues.
| Best Practice Tactic | Current State | Solution | |
| Tier 1 - Data Sources | Identify data sources | Data coming from a number of locations. | Create data model for old and new systems. |
| Ensure data quality | Internal data scanned from paper and incomplete. | Data cleansing and update governance and business rules for migration to new system. | |
| External sources providing conflicting data. | |||
| Tier 3 - Data Warehousing | Data catalogue | Data aggregated incompletely. | Built proper business data glossary for searchability. |
| Indexing | Data warehouse performance sub-optimal. | Architected data warehouse for appropriate use (star schema). | |
| Tier 4 - Data Analytics | Data accessibility | Relevant data buried in warehouse. | Build data marts for access. |
| Data reduction | Accurate report building could not be performed in current storage. | Built interim solution sandbox, spin up SQL database. |
Establishing these solutions provided the organization with necessary information to build their roadmap and move towards implementing an optimized data architecture.
![]() |
|
2.1.1 – 2.2.2 |
![]() |
Evaluate your current capabilities and design your target data quality practice from two angles
In this assessment and planning activity, the team will evaluate the current and target capabilities for your data architecture’s ability to meet business needs based on the essential capabilities across the five tiers of an organization’s architectural environment. |
2.2.3 |
![]() |
Create metrics to track the success of your optimization plan.
The Info-Tech facilitator will guide you through the process of creating program and project metrics to track as you optimize your data architecture. This will help to ensure that the tactics are helping to improve crucial business attributes. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 3.1: Personalize Your Data Architecture Roadmap | Step 3.2: Manage Your Data Architecture Decisions and the Resulting Changes |
Start with an analyst kick-off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates:
| With these tools & templates:
|
Phase 3 Results & Insights
| |
PHASE 3 |
||
| 3.1 | 3.2 | |
| Personalize Your Data Architecture Roadmap | Manage Your Data Architecture Decisions and the Resulting Changes | |
Phase 1 and 2 helped you to identify tactics that address some of the most common business drivers. Phase 3 will bring you through the process of practically planning what those tactics look like in your organization’s environment and create a roadmap to plan how you will generate business value through optimization of your data architecture environment.

Generating Your Roadmap
|
![]() Tab 5. Tactic and Initiative Planning
|
3.1.2 1 hour
INPUT: Timing of initiatives for optimizing data architecture.
OUTPUT: Optimization roadmap
Materials: Data Architecture Tactic Roadmap Tool
Participants: Data architect, Enterprise Architect
![]() |
Tab 5. Tactic and Initiative Planning | ![]() |
Tab 7. Initiative Roadmap |
The activities that populate the roadmap can be taken as best practice activities. If you want an actionable, comprehensive, and prescriptive plan for optimizing your data architecture, fill in the timing of the activities and print the roadmap. This can serve as a rapid communication tool for your data architecture plan to the business and other architects.
| Remember: Data architects bridge the gap between strategic and technical requirements of data.
|
Also remember: In Phase 1, you built your tactical data architecture optimization plan.
|
INPUT: Data Architecture Tactical Roadmap
OUTPUT: Communication plan
Materials: Data Architecture Optimization Template
Participants: Data Architect, Business representatives, IT representatives
| Instructions
Begin by presenting your plan and roadmap to the business units who participated in business interviews in activity 1.1.3 of Phase 1. If you receive feedback that suggests that you should make revisions to the plan, consult Info-Tech Research Group for suggestions on how to improve the plan. If you gain approval for the plan, communicate it to DBAs and other data workers. |
Iterative optimization and communication plan:
![]() |
CASE STUDY | Industry: Financial
| ![]() | Part 3 |
After establishing the appropriate tactics based on its business driver, the monetary authority was able to identify its shortcomings and adopt resolutions to remedy the issues.
ChallengeA monetary authority was placed under new requirements where it would need to produce 6 different report types on its clients to a regulatory body within a window potentially as short as 1 hour. With its current capabilities, it could complete such a task in roughly 7 days. The organization’s data architecture was comprised of legacy systems that had poor searchability. Moreover, the data it worked with was scanned from paper, regularly incomplete and often inconsistent. |
SolutionThe solution first required the organization to establish the business driver behind the need to optimize its architecture. In this case, it would be compliance requirements. With Info-Tech’s methodology, the organization focused on three tiers: data sources, warehousing, and analytics. Several solutions were developed to address the appropriate lacking capabilities. Firstly, the creation of a data model for old and new systems. The implementation of governance principles and business rules for migration of any data. Additionally, proper indexing techniques and business data glossary were established. Lastly, data marts and sandboxes were designed for data accessibility and to enable a space for proper report building. |
ResultsWith the solutions established, the monetary authority was given information it needed to build a comprehensive roadmap, and is currently undergoing the implementation of the plan to ensure it will experience its desired outcome – an optimized data architecture built with the capacity to handle external compliance requirements. |
PHASE 3 | ||
| 3.1 | 3.2 | |
| Personalize Your Data Architecture Roadmap | Manage Your Data Architecture Decisions and the Resulting Changes | |
Once you have a plan in place, one the most challenging aspects of improving an organization is yet to come…overcoming change!
“When managing change, the job of the data architect is to avoid unnecessary change and to encapsulate necessary change.
You must provide motivation for simplifying change, making it manageable for the whole organization.” (Andrew Johnston, Independent Consultant)
![]() |
Create roadmap
Communicate roadmap
Implement roadmap
Change management |
| Document the architectural decisions made to provide context around changes made to the organization’s data environment.
The goal of this Data Architecture Decision Template is to provide data architects with a template for managing the changes that accompany major architectural decisions. As you work through the Build a Business-Aligned Data Architecture Optimization Strategy blueprint, you will create a plan for tactical initiatives that address the drivers of the business to optimize your data architecture. This plan will bring about changes to the organization’s data architecture that need change management considerations. Document any major changes to the organization’s data architecture that are required to evolve with the organization’s drivers. This will ensure that major architectural changes are documented, tracked, and that the context around the decision is maintained. “Environment is very chaotic nowadays – legacy apps, sprawl, ERPs, a huge mix and orgs are grappling with what our data landscape look like? Where are our data assets that we need to use?” (Andrew Johnston, Independent Consultant) |
Use Info-Tech’s Data Architecture Decision Template to document any major changes in the organization’s data architecture. |
As changes to the architectural environment occur, data architects must stay ahead of the curve and plan the change management considerations that come with major architectural decisions.
“When managing change, the job of the data architect is to avoid unnecessary change and to encapsulate necessary change.
You must provide motivation for simplifying change, making it manageable for the whole organization.” (Andrew Johnston, Independent Consultant)
See Info-Tech’s resources on change management to smooth changes:![]() |
|
|
|
As changes to the architectural environment occur, data architects must stay ahead of the curve and plan the release management considerations around new hardware and software releases or updates.
Release management is a process that encompasses the planning, design, build, configuration, and testing of hardware and software releases to create a defined set of release components (ITIL). Release activities can include the distribution of the release and supporting documentation directly to end users. See Info-Tech’s resources on Release Management to smooth changes:
![]() |
|
|
|
![]() |
|
3.1.1 |
![]() |
Create your personalized roadmap of activities.
In this activity, the facilitator will guide the team in evaluating practice gaps highlighted by the assessment, and compare these gaps at face value so general priorities can be documented. The same categories as in 3.1.1 are considered. |
3.1.3 |
![]() |
Communicate your data architecture optimization plan.
The facilitator will help you to identify the optimal medium and timing for communicating your plan for optimizing your data architecture. |
![]() |
Ron Huizenga, Senior Product Manager
Embarcadero Technologies, Inc. Ron Huizenga has over 30 years of experience as an IT executive and consultant in enterprise data architecture, governance, business process reengineering and improvement, program/project management, software development, and business management. His experience spans multiple industries including manufacturing, supply chain, pipelines, natural resources, retail, healthcare, insurance, and transportation. |
![]() |
Andrew Johnston, Architect
Independent Consultant
An independent consultant with a unique combination of managerial, commercial, and technical skills, Andrew specializes in the development of strategies and technical architectures that allow businesses to get the maximum benefit from their IT resources. He has been described by clients as a "broad spectrum" architect, summarizing his ability to engage in many problems at many levels. |
| Internal Contributors | |
![]() |
|
| External Contributors | |
![]() |
|
Allen, Mark. “Get the ETL Out of Here.” MarkLogic. Sep, 2016. Web. 25 Apr 2017.[http://www.marklogic.com/blog/get-the-etl-out-of-here/]
Anadiotis, George. “Streaming hot: Real-time big data architecture matters.” ZDNet. Jan, 2017. Web. 25 Apr 2017. [http://www.zdnet.com/article/streaming-hot-real-time-big-data-architecture-matters/]
Aston, Dan. “The Economic value of Enterprise Architecture and How to Show It.” Erwin. Aug, 2016. Web. 20 Apr 2017. [http://erwin.com/blog/economic-value-enterprise-architecture-show/]
Baer, Tony. “2017 Trends to Watch: Big Data.” Ovum. Nov, 2016. Web. 25 Apr 2017.
Bmc. “Benefits & Advantages of Hadoop.” Bmc. Web. 25 Apr 2017. [http://www.bmcsoftware.ca/guides/hadoop-benefits-business-case.html]
Boyd, Ryan, et al. “Relational vs. Graph Data Modeling” DZone. Mar 2016. Web. 25 Apr 2017. [https://dzone.com/articles/relational-vs-graph-data-modeling]
Brahmachar, Satya. “Theme To Digital Transformation - Journey to Data Driven Enterprise” Feb, 2015. Web. 20 Apr 2017. [http://satyabrahmachari-thought-leader.blogspot.ca/2015/02/i-smac-theme-to-digital-transformation.html]
Capsenta. “NoETL.” Capsenta. Web. 25 Apr 2017. [https://capsenta.com/wp-content/uploads/2015/03/Capsenta-Booklet.pdf]
Connolly, Shaun. “Implementing the Blueprint for Enterprise Hadoop” Hortonworks. Apr, 2014. Web. 25 Apr 2017. https://hortonworks.com/blog/implementing-the-blue...
Forbes. “Cloud 2.0: Companies Move From Cloud-First To Cloud-Only.” Forbes. Apr, 2017. Web. 25 Apr 2017. [https://www.forbes.com/sites/vmware/2017/04/07/cloud-2-0-companies-move-from-cloud-first-to-cloud-only/#5cd9d94a4d5e]
Forgeat, Julien. “Lambda and Kappa.” Ericsson. Nov 2015. Web 25 Apr 2017. [https://www.ericsson.com/research-blog/data-knowledge/data-processing-architectures-lambda-and-kappa/]
Grimes, Seth. “Is It Time For NoETL?” InformationWeek. Mar, 2010. Web. 25 Apr 2017. [http://www.informationweek.com/software/information-management/is-it-time-for-noetl/d/d-id/1087813]
Gupta, Manav. et al. “How IB‹ leads in building big data analytics solutions in the cloud.” IBM. Feb, 2016. Web. 25 Apr 2017. [https://www.ibm.com/developerworks/cloud/library/cl-ibm-leads-building-big-data-analytics-solutions-cloud-trs/index.html#N102DE]
“How To Build A Roadmap.” Hub Designs Magazine. Web 25 Apr 2017. [https://hubdesignsmagazine.com/2011/03/05/how-to-build-a-roadmap/]
IBM. “Top industry use cases for stream computing.” IBM. Oct, 2015. Web. 25 Apr 2017. [https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=IMW14704USEN]
Mateos-Garcia, Juan, et al. “Skills Of The Datavores.” Nesta. July. 2015. Web. 8 Aug 2016. [https://www.nesta.org.uk/sites/default/files/skills_of_the_datavores.pdf].
Maynard, Steven. “Analytics: Don’t Forget The Human Element” Forbes. 2015. Web. 20 Apr. 2017. [http://www.ey.com/Publication/vwLUAssets/EY-Forbes-Insights-Data-and-Analytics-Impact-Index-2015/$FILE/EY-Forbes-Insights-Data-and-Analytics-Impact-Index-2015.pdf]
Neo4j. “From Relational to Neo4j.” Neo4j. Web. 25 Apr 2017. [https://neo4j.com/developer/graph-db-vs-rdbms/#_from_relational_to_graph_databases]
NoETL “NoETL.” NoETL. Web. 25 Apr 2017. [http://noetl.org/]
Nolan, Roger. “Digital Transformation: Is Your Data Management Ready?” Informatica. Jun, 2016. Web. 20 Apr 2017. [https://blogs.informatica.com/2016/06/10/digital-transformation-data-management-ready/#fbid=hmBYQgS6hnm]
OpsClarity. “2016 State of Fast Data & Streaming Applications.” OpsClarity. Web. 25 Apr 2017. [https://www.opsclarity.com/wp-content/uploads/2016/07/2016FastDataSurvey.pdf]
Oracle. “A Relational Database Overview.” Oracle. Web. 25 Apr 2017. [https://docs.oracle.com/javase/tutorial/jdbc/overview/database.html]
Ponemon Institute LLC. “Big Data Cybersecurity Analytics Research Repor.t” Cloudera. Aug, 2016. Web. 25 Apr 2017. [https://www.cloudera.com/content/dam/www/static/documents/analyst-reports/big-data-cybersecurity-analytics-research-report.pdf]
Sanchez, Jose Juan. “Data Movement Killed the BI Star.” DV Blog. May, 2016. Web. 20 Apr. 2017. [http://www.datavirtualizationblog.com/data-movement-killed-the-bi-star/]
SAS. “Hadoop; What it is and why does it matter?” SAS. Web. 25 Apr 2017. [https://www.sas.com/en_ca/insights/big-data/hadoop.html#hadoopusers]
Schumacher, Robin. “A Quick Primer on graph Databases for RDBMS Professionals.” Datastax. Jul, 2016. Web. 25 Apr 2017. [http://www.datastax.com/2016/07/quick-primer-on-graph-databases-for-rdbms-professionals]
Swoyer, Steve. “It’s the End of the Data Warehouse as We Know It.” TDWI. Jan, 2017. Web. 20 Apr. 2017. [https://upside.tdwi.org/articles/2017/01/11/end-of-the-data-warehouse-as-we-know-it.aspx]
Webber, Jim, and Ian Robinson. “The Top 5 Use Cases of Graph Databases.” Neo4j. 2015. Web. 25 Apr 2017. [http://info.neo4j.com/rs/773-GON-065/images/Neo4j_Top5_UseCases_Graph%20Databases.pdf]
Zachman Framework. [https://www.zachman.com/]
Zupan, Jane. “Survey of Big Data Decision Makers.” Attiv/o. May, 2016. Web. 20 Apr 2017. [https://www.attivio.com/blog/post/survey-big-data-decision-makers]
Aligning your business with applications through your strategy will not only increase business satisfaction but also help to ensure you’re delivering applications that enable the organization’s goals.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This review guide provides organizations with a detailed assessment of their application strategy, ensuring that the applications enable the business strategy so that the organization can be more effective.The assessment provides criteria and exercises to provide actionable outcomes.
COVID-19 is driving the need for quick technology solutions, including some that require personal data collection. Organizations are uncertain about the right thing to do.
Data equity approaches personal data like money, putting the owner in control and helping to protect against unethical systems.
There are some key considerations for businesses grappling with digital ethics:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Map the current onboarding process and identify the challenges to a virtual approach.
Determine how existing onboarding activities can be modified for a virtual environment.
Finalize the virtual onboarding process and create an action plan. Continue to re-assess and iterate over time.
Mainframes remain a critical part of an organization’s infrastructure and will need to support these platforms for the foreseeable future. Despite the importance, it can be a challenge for organizations to find qualified resources to support them. Meanwhile, companies are unsure of where to find help to train and develop their teams on mainframe technologies and are at risk of a skills gap within their teams.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Your mainframes are not going to disappear overnight. These systems often support the most critical operations in your organization. You need to ensure you have the right qualified resources to support your platforms.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess current state and plan the scope of the SAM program, team, and budget.
Define processes for software requests, procurement, receiving, and deployment.
Define processes for software inventory, maintenance, harvest and redeployment, and retirement.
Build processes for audits and plan the implementation.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Assess current state and plan the scope of the SAM program, team, and budget.
Current state assessment
Defined roles and responsibilities
SAM budget plan
1.1 Outline SAM challenges and objectives.
1.2 Assess current state.
1.3 Identify roles and responsibilities for SAM team.
1.4 Identify metrics and reports.
1.5 Identify SAM functions to centralize vs. decentralize.
1.6 Plan SAM budget process.
Current State Assessment
RACI Chart
Defined metrics and reports
SAM Budget Workbook
Define processes for software requests, procurement, receiving, and deployment.
Defined standards for software procurement
Documented processes for software receiving and deployment
2.1 Determine software standards.
2.2 Define procurement process for new contracts.
2.3 Define process for contract renewals and additional procurement scenarios.
2.4 Design process for receiving software.
2.5 Design deployment workflow.
2.6 Define process for non-standard software requests.
Software standards
Standard Operating Procedures
SAM Process Workflows
Define processes for software inventory, maintenance, harvest and redeployment, and retirement.
Defined process for conducting software inventory
Maintenance and patch policy
Documented workflows for software harvest and redeployment as well as retirement
3.1 Define process for conducting software inventory.
3.2 Define policies for software maintenance and patches.
3.3 Map software license harvest and reallocation process.
3.4 Define policy for retiring software.
Standard Operating Procedures
Patch management policy
SAM Process Workflows
Build processes for audits, identify tool requirements, and plan the implementation.
Defined process for internal and external audits
Tool requirements
Communication and implementation plan
4.1 Define and document the internal audit process.
4.2 Define and document the external audit process.
4.3 Document tool requirements.
4.4 Develop a communication plan.
4.5 Prepare an FAQ list.
4.6 Identify SAM policies.
4.7 Develop a SAM roadmap to plan your implementation.
Audit response templates
Tool requirements
Communication plan
End-user FAQ list
Software Asset Management Policy
Implementation roadmap
“Organizations often conflate software asset management (SAM) with license tracking. SAM is not merely knowing how many licenses you require to be in compliance; it’s asking the deeper budgetary questions to right-size your software spend.
Software audits are a growing concern for businesses, but proactive reporting and decision making supported by quality data will mitigate audit risks. Value is left on the table through underused or poor-quality data, so active data management must be in play. A dedicated ITAM tool can assist with extracting value from your license data.
Achieving an optimized SAM program is a transformative effort, but the people, processes, and technology need to be in place before that can happen.” (Sandi Conrad, Senior Director, Infrastructure & Operations Practice, Info-Tech Research Group)
A strong SAM program will benefit all aspects of the business.
Data and reports gained through SAM will enable data-driven decision making for all areas of the business.
Don’t just track licenses; manage them to create value from data.
Gathering and monitoring license data is just the beginning. What you do with that data is the real test.
Win the audit battle without fighting.
Conduct internal audits to minimize surprises when external audits are requested.
You can estimate the return even without tools or data.
| Benefit | Calculate the return |
|---|---|
| Compliance
How many audits did you have in the past three years? How much time did you spend in audit response? |
Suppose you had two audits each year for the last three years, each with an average $250,000 in settlements.
A team of four with an average salary of $75,000 each took six months to respond each year, allocating 20% of their work time to the audit. You could argue annual audits cost on average $530,000. Increasing ITAM maturity stands to reduce that cost significantly. |
| Efficiency
How much do you spend on software and maintenance by supplier? |
Suppose you spent $1M on software last year. What if you could reduce the spend by just 10% through better practices?
SAM can help reduce the annual spend by simplifying support, renegotiating contracts based on asset data, reducing redundancy, and reducing spend. |
54% — A study by 1E found that only 54% of organizations believe they can identify all unused software in their organization.
28% — On average, 28% of deployed software is unused, with a wasted cost of $224 per PC on unused software (1E, 2014).
53% — Express Metrix found that 53% of organizations had been audited within the past two years. Of those, 72% had been audited within the last 12 months.
Manage risk. If licensing terms are not properly observed, the organization is at risk of legal and financial exposure, including illegal software installation, loss of proof of licenses purchased, or breached terms and conditions.
Control and predict spend. Unexpected problems related to software assets and licenses can significantly impact cash flow.
Less operational interruptions. Poor software asset management processes could lead to failed deployments, software update interruptions, viruses, or a shutdown of unlicensed applications.
Avoid security breaches. If data is not secure through software patches and security, confidential information may be disclosed.
More informed decisions. More accurate data on software assets improves transparency and informs decision making.
Improved contract management. Automated tools can alert you to when contracts are up for renewal to allow time to plan and negotiate, then purchase the right amount of licenses.
Avoid penalties. Conduct internal audits and track compliance to avoid fees or penalties if an external audit occurs.
Reduced IT support. Employees should require less support from the service desk with proper, up to date, licensed software, freeing up time for IT Operations to focus on other work.
Enhanced productivity. By rationalizing and standardizing software offerings, more staff should be using the same software with the same versioning, allowing for better communication and collaboration.
|
Configuration Management
76% more effective |
|
Service Catalog
74% more effective |
|
Quality Management
63% more effective |
|
Data Quality
62% more effective |
|
Performance Measurement
61% more effective |
|
Organizational Change Management
60% more effective |
|
Portfolio Management
59% more effective |
|
Enterprise Architecture
58% more effective |
Why? Good SAM processes are integral to both service management and configuration management
(Source: Info-Tech Research Group, IT Management and Governance Diagnostic; N=972 organizations) (High asset management effectiveness was defined as those organizations with an effectiveness score of 8 or above.)Focus on software asset management essentials
| Phase 1 Assess & Plan |
Phase 2 Procure, Receive & Deploy |
Phase 3 Manage, Redeploy & Retire |
Phase 4 Build supporting processes |
||||
1.1 |
Assess current state |
2.1 |
Request & procure |
3.1 |
Manage & maintain contracts |
4.1 |
Compliance & audits |
1.2 |
Build team and define metrics |
2.2 |
Receive & deploy |
3.2 |
Harvest or retire |
4.2 |
Communicate & build roadmap |
1.3 |
Plan & budget | ||||||
| Deliverables | |||||||
| Standard Operating Procedures (SOP) | |||||||
| SAM maturity assessment | Process workflows | Process workflows | Audit response templates | ||||
| RACI chart | Software standards | Patch management policy | Communication plan & FAQ template | ||||
| SAM metrics | SAM policies | ||||||
| SAM budget workbook | |||||||
Visa, Inc. is the largest payment processing company in the world, with a network that can handle over 40,000 transactions every minute.
In 2006, Visa launched a formal IT asset management program, but it was not until 2011 that it initiated a focus on SAM. Joe Birdsong, the SAM director, first addressed four major enterprise license agreements (ELAs) and compliance issues. The SAM team implemented a few dedicated SAM tools in conjunction with an aggressive approach to training.
The proactive approach taken by Visa used a three-pronged strategy: people, process, and tools. The process included ELA negotiations, audit responses, and software license rationalization exercises.
According to Birdsong, “In the past three years, SAM has been credited with saving Visa over $200 million.”
SAM Standard Operating Procedures (SOP) |
SAM Maturity Assessment |
SAM Visio Process Workflows |
SAM Budget Workbook |
Additional SAM Policy Templates |
Software Asset Management Policy |
SAM Communication Plan |
SAM FAQ Template |
| GI | Measured Value (Assuming 260 workdays in a year) |
|---|---|
| Phase 1: Assess & Plan |
|
| Phase 2: Procure, Receive & Deploy |
|
| Phase 3: Manage, Redeploy & Retire |
|
| Phase 4: Build Supporting Processes and Tools |
|
| Total savings | $330,325 |
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
| Phase 1: Assess & plan | Phase 2: Procure, receive & deploy | Phase 3: Manage, redeploy & retire | Phase 4: Build supporting processes | |
|---|---|---|---|---|
Best-Practice Toolkit
|
Step 1.1: Assess current state Step 1.2: Build team and define metrics Step 1.3: Plan and budget |
Step 2.1: Request and procure Step 2.2: Receive and deploy |
Step 3.1: Manage and maintain contracts Step 3.2: Harvest, redeploy, or retire |
Step 4.1: Compliance and audits Step 4.2: Communicate and build roadmap |
| Guided Implementations |
|
|
|
|
Onsite Workshop
|
Module 1:
Assess & Plan |
Module 2:
Map Core Processes: Procure, Receive & Deploy |
Module 3:
Map Core Processes: Manage, Redeploy & Retire |
Module 4:
Prepare for audit, build roadmap and communications |
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
|---|---|---|---|---|
| Activities |
Assess & Plan1.1 Outline SAM challenges and objectives 1.2 Assess current state 1.3 Identify roles and responsibilities for SAM team 1.4 Identify metrics and reports 1.5 Identify SAM functions to centralize vs. decentralize 1.6 Plan SAM budget process |
Map Core Processes: Procure, Receive & Deploy2.1 Determine software standards 2.2 Define procurement process for new contracts 2.3 Define process for contract renewals and additional procurement scenarios 2.4 Design process for receiving software 2.5 Design deployment workflow 2.6 Define process for non-standard software requests |
Map Core Processes: Manage, Redeploy & Retire3.1 Define process for conducting software inventory 3.2 Define policies for software maintenance and patches 3.3 Map software license harvest and reallocation process 3.4 Define policy for retiring software |
Build Supporting Processes4.1 Define and document the internal audit process 4.2 Define and document the external audit process 4.3 Develop a communication plan 4.4 Prepare an FAQ list 4.5 Identify SAM policies 4.6 Develop a SAM roadmap to plan your implementation |
| Deliverables |
|
|
|
|
Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.
This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.
This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.
Visa implemented an IT asset management program in 2006. After years of software audit teams from large firms visiting and leaving expensive software compliance bills, the world’s leading payment processing company decided it was time for a change.
Upper management recognized that it needed to combat audits. It had the infrastructure in place and the budget to purchase SAM tools that could run discovery and tracking functions, but it was lacking the people and processes necessary for a mature SAM program.
Visa decided to fight fire with fire. It initially contracted the same third-party audit teams to help build out its SAM processes. Eventually, Visa formed a new SAM team that was led by a group of former auditors.
The former auditors recognized that their role was not technology based, so a group of technical individuals were hired to help roll out various SAM tools.
The team rolled out tools like BDNA Discover and Normalize, Flexera FlexNet Manager, and Microsoft SCCM.
To establish an effective SAM team, diverse talent is key. Visa focused on employees that were consultative but also technical. Their team needed to build relationships with teams within the organization and externally with vendors.
Most importantly, the leaders of the team needed to think like auditors to better prepare for audits. According to Joe Birdsong, SAM Director at Visa, “we want to be viewed as a team that can go in and help right-size their environment and better understand licensing to help teams make better decisions.”
The SAM team was only the beginning.
| Phase 1: Assess & Plan | This step will walk you through the following activities: | This step involves the following participants: | |
1.1 | Assess current state |
|
|
1.2 | Build team and define metrics | ||
1.3 | Plan & budget | ||
Participants: CIO/CFO, IT Director, Asset Manager, Purchasing, Service Desk Manager, Security (optional), Operations (optional)
| Drivers of effective SAM | Results of effective SAM | |
| Contracts and vendor licensing programs are complex and challenging to administer without data related to assets and their environment. | → | Improved access to accurate data on contracts, licensing, warranties, installed software for new contracts, renewals, and audit requests. |
| Increased need to meet compliance requires a formal approach to tracking and managing assets. | → | Encryption, software application controls, and change notifications all contribute to better asset controls and data security. |
| Cost cutting is on the agenda, and management is looking to reduce overall IT spend in the organization in any possible way. | → | Reduction of software spend through data for better forecasting, planning, and licensing rationalization and harvesting. |
| Audits are time consuming, disruptive to project timelines and productivity, and costly. | → | Respond to audits with a formalized process, accurate data, and minimal disruption using always-available reporting. |
Participants: CIO/CFO, IT Director, Asset Manager, Service Manager (optional)
Document: Document in the Standard Operating Procedures.
By improving how you manage your licenses and audit requests, you will not only provide benefits through a mature SAM program, you will also improve your service desk and disaster recovery functions.
| Maturity | People & Policies | Processes | Technology |
|---|---|---|---|
| Chaos |
|
|
|
| Reactive |
|
|
|
| Controlled |
|
|
|
| Proactive |
|
|
|
| Optimized |
|
|
|
| Phase 1: Assess & Plan | This step will walk you through the following activities: | This step involves the following participants: | |
1.1 | Assess current state |
|
|
1.2 | Build team and define metrics | ||
1.3 | Plan & budget | ||
Roles and responsibilities should be adapted to fit specific organizational requirements based on its size, structure, and distribution and the scope of the program. Not all roles are necessary and in small organizations, one or two people may fulfill multiple roles.
Senior Management Sponsor – Ensures visibility and support for the program.
IT Asset Manager – Responsible for management of all assets and maintaining asset database.
Software Asset Manager – Responsible for management of all software assets (a subset of the overall responsibility of the IT Asset Manager).
SAM Process Owner – Responsible for overall effectiveness and efficiency of SAM processes.
Asset Analyst – Maintains up-to-date records of all IT assets, including software version control.
Many organizations simply do not have a large enough staff to hire a full-time software asset manager. The role will need to be championed by an internal employee.
Avoid filling this position with a temporary contract; one of the most difficult operational factors in SAM implementation and continuity is constant turnover and organizational shifts. Hiring a software asset manager on contract might get the project going faster, but without the knowledge gained by doing the processes, the program won’t have enough momentum to sustain itself.
Make sure your SAM team is diverse. The SAM team will need to be skilled at achieving compliance, but there is also a need for technically skilled individuals to maximize the function of the SAM tool(s) at your organization.
1.2.1 Complete a RACI chart for your organization
Participants: CIO/CFO, IT Director, SAM Manager, SAM Team, Service Desk Manager
Document: Document in the Standard Operating Procedures.
Determine the roles and responsibilities for your SAM program. Record the results in a RACI (responsible, accountable, consulted, informed) chart such as the example below.
| SAM Processes and Tasks | CIO | CFO | SAM Manager | IT Director | Service Management Team | IT Ops | Security | Finance | Legal | Project Manager |
|---|---|---|---|---|---|---|---|---|---|---|
| Policies/Governance | A | C | R | R | I | I | C | I | R | I |
| Strategy | A | C | R | R | I | I | I | I | C | |
| Risk Management/Asset Security | A | C | R | R | C | R | C | C | C | |
| Data Entry/Quality | I | I | A | R | R | |||||
| Compliance Auditing | R | C | A | R | I | I | I | I | ||
| Education & Training | R | I | A | C | I | I | ||||
| Contract Lifecycle Management | R | R | A | R | C | C | C | C | R | C |
| Workflows | R | C | A | R | I | I | I | R | I | C/I |
| Budgeting | R | R | R | A | C | R | ||||
| Software Acquisition | R | I | A | R | I | C | R | C | C | |
| Controls/Reporting | R | I | A | R | I | I | C | I | ||
| Optimize License Harvesting | I | I | A | R | I | C | C |
Trying to achieve goals without metrics is like trying to cook without measuring your ingredients. You might succeed, but you’ll have no idea how to replicate it.
The metrics you track depend on your maturity level. As your organization shifts in maturity, the metrics you prioritize for tracking will shift to reflect that change. Example:
| Metric category | Low maturity metric | High maturity metric |
|---|---|---|
| Compliance | % of software installed that is unauthorized | % of vendors in effective licensing position (ELP) report |
| Quantity | % of licenses documented in ITAM tool | % of requests made through unauthorized channels |
CSF = Goal, or what success looks like
KPI = How achievement of goal will be defined
Metric = Numerical measure to determine if KPI has been achieved
| CSF/Goal | KPI | Metrics |
|---|---|---|
| Improve accuracy of software budget and forecasting |
|
|
| Avoid over purchasing software licenses and optimize use of existing licenses |
|
|
| Improve accuracy of data |
|
|
| Improved service delivery |
|
|
1.2.2 Brainstorm metrics and KPIs
Participants: CIO, IT Director, SAM Manager, SAM Team
Document: Document in the Standard Operating Procedures.
Use the table below as an example.
| Goal/CSF | KPI | Metric |
|---|---|---|
| Improve license visibility | Increase accuracy and completeness of SAM data |
|
| Reduce software costs | Reduce number of unused software licenses by 20% |
|
| Reduce shadow IT | Reduce number of unauthorized software purchases and installations by 10% |
|
Asset managers require data to manage how licenses are distributed throughout the organization. Are there multiple versions of the same application deployed? What proportion of licenses deployed are assigned to employees who are no longer at the organization? What are the usage patterns for applications?
Service desk technicians need real-time data on licenses currently available to deploy to machines that need to be imaged/updated, otherwise there is a risk of breaching a vendor agreement.
Business managers and executives need reports to make strategic decisions. The reports created for business stakeholders need to help them align business projects or business processes with SAM metrics. To determine which reports will provide the most value, start by looking at business goals and determining the tactical data that will help inform and support these goals and their progress.
1.2.3 Identify reports and metrics to track regularly
Participants: CIO, IT Director, SAM Manager, SAM Team
Document: Document in the Standard Operating Procedures.
Example:
| Stakeholder | Purpose | Report | Frequency |
|---|---|---|---|
| Asset Manager |
|
Operational budget spent to date | Monthly |
| Capital budget spent to date | Monthly | ||
| Contracts coming due for renewal | Quarterly | ||
| Software harvested for redeployment | Quarterly | ||
| Number of single applications being managed | Annually | ||
| CFO |
|
Software purchased, operational & capital | Monthly |
| Software accrued for future purchases | Monthly | ||
Contracts coming due for renewal
|
Quarterly | ||
| CIO |
|
Software deployments and redeployments | Monthly |
| Software rollouts planned | Quarterly | ||
| % of applications patched | Quarterly | ||
| Money saved | Annually | ||
| Number of contracts & apps managed | Quarterly |
| Phase 1: Assess & Plan | This step will walk you through the following activities: | This step involves the following participants: | |
1.1 | Assess current state |
|
|
1.2 | Build team and define metrics | ||
1.3 | Plan & budget | ||
Many infrastructure managers and business managers are unaware of how software licensing can impact projects. For example, changes in core infrastructure configuration can have big impacts from a software licensing perspective.
1.3.1 Identify functions for centralization
Participants: CIO, IT Director, SAM Manager, SAM Team
Document: Document in the Standard Operating Procedures.
Example:
Centralized Functions
|
Decentralized functions
|
After employee salaries (38%), the four next largest spend buckets have historically been infrastructure related. Adding salaries and external services, the average annual infrastructure and operations spend is over 50% of all IT spend.
The largest portion of that spend is on software license and maintenance. As of 2016, software accounted for the roughly the same budget total as voice communications, data communications, and hardware combined. Managing software contracts is a crucial part of any mature budgeting process.
A sophisticated software asset management program will be able to uncover hidden costs, identify opportunities for rationalization, save money through reharvesting unused licenses, and improve forecasting of software usage to help control IT spending.
While some asset managers may not have experience managing budgets, there are several advantages to the ITAM function owning the budget:
Finance needs to be involved. Their questions may cover:
The SAM Budget Workbook is designed to assist in developing and justifying the budget for software assets for the upcoming year.
|
|
1.1.3 |
|
Determine the maturity of your SAM program
Using the SAM Maturity Assessment Tool, fill out a series of questions in a survey to assess the maturity of your current SAM program. The survey assesses seven categories that will allow you to align your strategy to your results. |
1.2.3 |
|
Define SAM reports to track metrics
Identify key stakeholders with reporting needs, metrics to track to fulfill reporting requirements, and a frequency for producing reports. |
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 1.1: Assess current state | Step 1.2: Build team and define metrics | Step 1.3: Plan and budget |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
With these tools & templates:
|
Visa formed a SAM team in 2011 to combat costly software audits.
The team’s first task was to use the available SAM data and reconcile licenses deployed throughout the organization.
Organizations as large as Visa constantly run into issues where they are grossly over or under licensed, causing huge financial risk.
Data collection and analysis were used as part of the license rationalization process. Using a variety of tools combined with a strong team allowed Visa to perform the necessary steps to gather license data and analyze usage.
One of the key exercises was uniting procurement and deployment data and the teams responsible for each.
End-to-end visibility allowed the data to be uniform. As a result, better decisions about license rationalization can be made.
By improving its measurement of SAM data, Visa was able to dedicate more time to analyze and reconcile its licenses. This led to improved license management and negotiations that reflected actual usage.
By improving license usage through rationalization, Visa reduced the cost of supporting additional titles.
The SAM team also performed license reclamation to harvest and redistribute licenses to further improve usage. The team’s final task was to optimize audit responses.
| Phase 2: Procure, Receive & Deploy | This step will walk you through the following activities: | This step involves the following participants: | |
2.1 | Request & Procure |
|
|
2.2 | Receive & Deploy | ||
Procurement and SAM must collaborate on software purchases to ensure software purchases meet business requirements and take into account all data on existing software and licenses to optimize the purchase and contract. Failure to work together can lead to unnecessary software purchases, overspending on purchases, and undesirable contract terms.
SAM managers must collaborate with Procurement when purchasing software.
SAM managers should:
|
|
Procurement must commit to be involved in the asset management process.
Procurement should:
|
Centralized negotiation and purchasing of software can ensure that the SAM team has visibility and control over the procurement process to help prevent overspending and uncontrolled agreements.
It may be necessary to procure some software locally if organizations have multiple locations, but try to centrally procure and manage the biggest contracts from vendors that are likely to audit the organization. Even with a decentralized model, ensure all teams communicate and that contracts remain visible centrally even if managed locally.
One of the major challenges involved in implementing SAM is uniting multiple datasets and data sources across the enterprise. A conversation with each major business unit will help with the creation of software procurement standards that are acceptable to all.
2.1.1 Identify central standard enterprise offerings
Participants: CIO, IT Director, SAM Manager, SAM Team
Document: Document in the Standard Operating Procedures.
Standard enterprise offerings
|
Localized or non-standard software |
The more prestigious the asset tier, the higher the degree of data capture, support, and maintenance required.
E.g. An enterprise application that needs to be available 24/7, such as a learning management system, should be classified as a gold tier to ensure it has 24/7 support.
2.1.2 Identify standard software images for your organization
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Not everyone is ready to embrace the cloud for all solutions; make sure to align cloud strategy to business requirements. Work closely with IT executives to determine appropriate contract terms, licensing options, and tracking processes.
Vendors make changes to bundles and online services terms on a regular basis. Ensure you document your agreed upon terms to save your required functionality as vendor standard offerings change.
Download the Own the Cloud: Strategy and Action Plan blueprint for more guidance
| Licensed | Open Source | Shareware | |
|---|---|---|---|
| License Structure | A software supplier is paid for the permission to use their software. | The software is provided free of charge, but is still licensed. | The software is provided free of charge, but is still licensed. Usage may be on a trial basis, with full usage granted after purchase. |
| Source Code | The source code is still owned by the supplier. | Source code is provided, allowing users to change and share the software to suit their needs. | Source code is property of the original developer/supplier. |
| Technical Support | Technical support is included in the price of the contract. | Technical support may be provided, often in a community-based format from other developers of the open-source software in question. | Support may be limited during trial of software, but upgraded once a purchase is made. |
Open-source software should be managed in the same manner as commercial software to understand licensing requirements and be aware of any changes to these agreements, such as commercialization of such products, as well as any rules surrounding source code.
2.1.3 Define procurement policy
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Define and document policies that will apply to IT software purchases, including policies around:
Use the example below as guidance and document in the SOP.
2.1.4 Identify financial thresholds for approvals and requests
Participants: Asset Manager, Purchasing, CIO, CFO, IT Director
Document: Document in the Standard Operating Procedures.
Identify and classify financial thresholds for contracts requiring approval. For each category of contract value, identify who needs to authorize the request. Discuss and document any other approvals necessary. An example is provided below.
Example:
Requests for authorization will need to be directed based on the following financial thresholds:
| Contract value | Authorization |
|---|---|
| <$50,000 | IT Director |
| $50,000 to $250,000 | CIO |
| $250,000 to $500,000 | CIO and CFO |
| >$500,000 | Legal review |
A poorly defined software procurement workflow can result in overspending on unnecessary software licensing throughout the year. This can impact budgeting and any potential software refreshes, as businesses will often rely on purchasing what they can afford, not what they need.
The procurement workflow may involve the Service Desk, procurement team, and asset manager.
The following elements should be accounted for:
2.1.5 Build new contract procurement workflow
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Additionally, information regarding what licenses are being used for certain services may yield insight into potential redundancies. For example, two separate departments may have each have a different application deployed that supports the same service. This presents an opportunity for savings based on bulk licensing agreements, not to mention a simplified support environment by reducing the number of titles deployed in your environment.
Participants: IT Director/CIO, Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
2.1.6 Build additional procurement workflows
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Build procurement workflows and define policies and procedures for additional purchasing scenarios beyond new contracts.
This may include:
Use the sample workflows in the Standard Operating Procedures as a guide.
Contract negotiations too often come down to a question of price. While you want to avoid overpaying for licenses, a worse offense is getting a steep discount for a bundle of applications where the majority will go unused.
| Vendors will try to sell a full stack of software at a steep discount to give the illusion of value. Often organizations bite off more than they can chew. | → | When auditors come knocking, the business may be in compliance, but being over-licensed is a dangerous state to be in. | → | Organizations end up over-licensed and in possession of numerous “shelfware” apps that sit on the proverbial shelf collecting dust while drawing expensive maintenance and licensing fees from the business. |
Leverage Info-Tech’s research, Master Contract Review and Negotiation for Software Agreements, to review your software contracts to leverage your unique position during negotiations and find substantial cost savings.
| Phase 2: Procure, Receive & Deploy | This step will walk you through the following activities: | This step involves the following participants: | |
2.1 | Request & Procure |
|
|
2.2 | Receive & Deploy | ||
While most software will be received through email and download, in some cases physical software may be received through courier or mail. Ensure processes and procedures are defined for both cases.
All licenses, documentation, and digital media for authorized and supported software should be collected and stored in a central, secure location to minimize risk of theft, loss, or unauthorized installation or duplication of software.
The ITAM database should contain an up-to-date record of all software assets, including their associated:
The database allows you to view software that is installed and associated licenses.
A definitive media library (DML) is a single logical storage area, which may consist of one or more locations in which definitive authorized versions of all software configuration items are securely stored and protected.
The DML consists of file storage as well as physical storage of CDs and DVDs and must be continually updated to contain the latest information about each configuration item.
The DML is used to organize content and link to automated deployment to easily install software.
The DML will usually contain the most up-to-date versions to minimize errors created by having unauthorized, old, or problematic software releases being deployed into the live IT environment. The DML can be used for both full-packed product (FPP) software and in-house developed software, providing formalized data around releases of in-house software.
Your DML should have a way to separate archived, new, and current software to allow for optimal organization of files and code, to ensure the correct software is installed, and to prepare for automated deployment through the service catalog.
New software hasn’t been tested yet. Make it available for testing, but not widely available.
Keep a record for archived software, but do not make it available for install.
Current software is regularly used and should be available for install.
2.2.1 Identify software storage locations
Participants: Asset Manager, IT Director
Document: Document in the Standard Operating Procedures.
2.2.2 Design the workflow for receiving software
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Releases: A collection of authorized changes to an IT service. Releases are divided into:
Define the process for deploying software to users.
Include the following in your workflow:
Rollouts or upgrades of large quantities of software will likely be managed as projects.
These projects should include project plans, including resources, timelines, and detailed procedures.
Define the process for large-scale deployment if it will differ from the regular deployment process.
2.2.3 Document deployment workflows for desktop and large-scale deployment
Participants: Asset Manager, Service Desk Manager, Release & Deployment Manager
Document: Document in the Standard Operating Procedures.
Software should be approved and deployed based on approved standards to minimize over-deployed software and manage costs appropriately. A list of standard software improves the efficiency of the software approval process.
Additionally, create a list of unauthorized software including titles not to be installed under any circumstances. This list should be designed with feedback from your end users and technical support staff. Front-line knowledge is crucial to identifying which titles are causing major problems.
2.2.4 Determine software categories for deployment
Participants: IT Director, Asset Manager, Purchasing (optional), Service Desk Manager (optional), Release & Deployment Manager (optional)
Document: Document in the Standard Operating Procedures.
| Category | Definition | Software titles |
|---|---|---|
| Pre-approved/standard |
|
|
| Approved by role |
|
|
| Unapproved/requires review |
|
|
| Unauthorized |
|
|
Software requiring review will need to be managed on a case-by-case basis, with approval dependent on software evaluation and business need.
The evaluation and approval process may require input from several parties, including business analysts, Security, technical team, Finance, Procurement, and the manager of the requestor’s department.
2.2.5 Document process for non-standard software requests
Participants: Asset Manager, Service Desk Manager, Release & Deployment Manager
Document: Document in the Standard Operating Procedures.
Define the review and approval process for non-standard software requests.
Use the workflow on the previous slide as a guide to map your own workflow process and document the steps in the Standard Operating Procedures.
The following assessments may need to be included in the process:
BMW is a large German automotive manufacturer that employs over 100,000 people. It has over 7,000 software products deployed across 106,000 clients and servers in over 150 countries.
When the global recession hit in 2008, the threat of costly audits increased, so BMW decided to boost its SAM program to cut licensing costs. It sought to centralize inventory data from operations across the globe.
A new SAM office was established in 2009 in Germany. The SAM team at BMW began by processing all the accumulated license and installation data from operations in Germany, Austria, and the UK. Within six months, the team had full visibility of all licenses and software assets.
Compliance was also a priority. The team successfully identified where they could make substantial reductions in support and maintenance costs as well as remove surplus costs associated with duplicate licensing.
BMW overcame a massive data centralization project to achieve 100% visibility of its global licensing estate, an incredible achievement given the scope of the operation.
BMW experienced efficiency gains due to transparency and centralized management of licenses through the new SAM office.
Additionally, internal investment in training and technical knowledge has helped BMW continuously improve the program. This has resulted in ongoing cost reductions for the manufacturer.
|
|
2.1.5 |
|
Build software procurement workflow for new contracts
Use the sample workflow to document your own process for procurement of new software contracts. |
2.2.4 |
|
Create a list of pre-approved, approved, and unapproved software titles
Build definitions of software categories to inform software standards and brainstorm examples of each category. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 2.1: Request and procure | Step 2.2: Receive and deploy |
Start with an analyst kick-off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates:
| With these tools & templates:
|
| Phase 3: Manage, Redeploy & Retire | This step will walk you through the following activities: | This step involves the following participants: | |
3.1 | Manage & Maintain Software |
|
|
3.2 | Harvest, Redeploy, or Retire | ||
Many organizations fail to track their software inventory effectively; the focus often remains on hardware due to its more tangible nature. However, annual software purchases often account for a higher IT spend than annual hardware purchases, so it’s important to track both.
Have and maintain a list of supported software to guide what new software will be approved for purchase and what current software should be retained on the desktops, servers, and other processing devices.
A baseline inventory tells you exactly what software you have deployed and where it is being used. This can help to determine how to best optimize software and license usage.
A software inventory will allow you to:
Take preventive action to avoid unauthorized software usage through regular software inventory and license management:
3.1.1 Define process for regular software inventory
Participants: IT Director, Asset Manager
Document: Document in the Standard Operating Procedures.
While maintenance efforts are typically focused around hardware, software maintenance – including upgrades and patches – must be built into the software asset management process to ensure software remains compliant with security and regulatory requirements.
The integration between patch management and asset management is incredibly valuable from a technology point of view. IT asset management (ITAM) tools create reports on the characteristics of deployed software. By combining these reports with a generalized software updater, you can automate most simple patches to save your team’s efforts for more-critical incidents. Usage reports can also help determine which applications should be reviewed and removed from the environment.
3.1.2 Define software maintenance and patching policies
Participants: IT Director, Asset Manager, Release Manager (optional), Security (optional)
Document: Document in the Standard Operating Procedures.
Review the software maintenance guidelines in this section and in the SOP template. Discuss each policy and revise and document in accordance with your policies.
Discuss and document patch management policies:
The patch management policy helps to ensure company computers are properly patched with the latest appropriate updates to reduce system vulnerability and to enhance repair application functionality. The policy aids in establishing procedures for the identification of vulnerabilities and potential areas of functionality enhancements, as well as the safe and timely installation of patches. The patch management policy is key to identifying and mitigating any system vulnerabilities and establishing standard patch management practices.
Use Info-Tech’s Patch Management Policy template to get started.
| Phase 3: Manage, Redeploy & Retire | This step will walk you through the following activities: | This step involves the following participants: | |
3.1 | Manage & Maintain Software |
|
|
3.2 | Harvest, Redeploy, or Retire | ||
Unused software licenses are present in nearly every organization and result in wasted resources and software spend. Recycling and reharvesting licenses is a critical process within software asset management to save your organization money.
When computers are no longer in use and retired, the software licenses installed on the machines may be able to be reused.
License recycling involves reusing these licenses on machines that are still in use or for new employees.
License harvesting involves more actively identifying machines with licenses that are either not in use or under utilized, and recovering them to be used elsewhere, thus reducing overall software spend on new licenses.
Know the stipulations of your end-user license agreement (EULA) before harvesting and reallocating licenses. There may be restrictions on how often a license can be recycled in your agreement.
Define a standard reharvest timeline. For example, every 90 days, your SAM team can perform an internal audit using your SAM tool to gather data on software usage. If a user has not used a title in that time period, your team can remove that title from that user’s machine. Depending on the terms and conditions of the contract, the license can either be retired or harvested and reallocated.
Ensure you have exception rules built in for software that’s cyclical in its usage. For example, Finance may only use tax software during tax season, so there’s no reason to lump it under the same process as other titles.
It’s important to note that in addition to this process, you will need a software usage policy that supports your license harvest process.
3.2.1 Build license harvest and reallocation workflow
Participants: IT Director, Asset Manager, Service Desk Manager
Document: Document in the Standard Operating Procedures.
“Time and time again, I keep hearing stories from schools on how IT budgets are constantly being squeezed, but when I dig a little deeper, little or no effort is being made on accounting for software that might be on the kit we are taking away.” (Phil Goldsmith, Managing Director – ScrumpyMacs)
3.2.2 Document process for software retirement
Participants: IT Director, Asset Manager, Operations
Document: Document in the Standard Operating Procedures.
![]() |
|
3.1.2 |
|
Define policies for software maintenance and patches
Discuss best practices and define policies for conducting regular software maintenance and patching. |
3.2.1 |
|
Map your software license harvest and reallocation process
Build a process workflow for harvesting and reallocating unused software licenses. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 3.1: Manage and maintain software | Step 3.2: Harvest, redeploy, or retire |
Start with an analyst kick-off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates:
| With these tools & templates:
|
The overarching goal of any SAM program is compliance to prevent costly audit fines. The SAM team at Visa was made up of many individuals who were former auditors.
To deal with audit requests from vendors, “understand how auditors do things and understand their approach,” states Joe Birdsong, SAM Director at Visa.
Vendors are always on the lookout for telltale signs of a lucrative audit. For Visa, the key was to understand these processes and learn how to prepare for them.
Vendors typically look for the following when evaluating an organization for audit:
Ultimately, an audit is an attack on the relationship between the vendor and organization. According to Birdsong: “Maybe they haven’t really touched base with your teams and had good contact and relationship with them, and they don’t really know what’s going on in your enterprise.”
By understanding the motivations behind potential audits, Visa was able to form a strategy to increase transparency with the vendor.
Regular data collection, almost real-time reporting, and open, quick communication with the vendor surrounding audits made Visa a low-risk client for vendors.
Buy-in from management is also important, and the creation of an official SAM strategy helps maintain support. Thanks to its proactive SAM program, Visa saved $200 million in just three years.
| Phase 4: Build supporting processes & tools | This step will walk you through the following activities: | This step involves the following participants: | |
4.1 | Compliance & audits |
|
|
4.2 | Communicate & build roadmap | ||
By improving your software asset management program’s maturity, you will drive savings for the business that go beyond the negotiating table.
Recognize the classic signs of each stage of audit response maturity to identify where your organization currently stands and where it can go.
Being prepared for an audit is critical. Internal preparation will not only help your organization reduce the risk associated with an audit but will also improve daily operations through focusing on diligent documentation and data collection.
Conducting routine internal audits will help prepare your organization for the real deal and may even prevent the audit from happening altogether. Hundreds of thousands of dollars can be saved through a proactive audit strategy with routine documentation in place.
“You want to get [the] environment to a level where you’re comfortable sharing information with [a] vendor. Inviting them in to have a chat and exposing numbers means there’s no relationship there where they’re coming to audit you. They only come to audit you when they know there’s a gain to be had, otherwise what’s the point of auditing?
I want customers to get comfortable with licensing and what they’re spending, and then there’s no problem exposing that to vendors. Vendors actually appreciate that.” (Ben Brand, SAM Practice Manager, Insight)
“The supreme art of war is to subdue the enemy without fighting.” – Sun Tzu
Performing routine checks on your license compliance will drastically reduce the risk that your organization gets hit with a costly fine. Maintaining transparency and demonstrating compliance will fend off audit-hungry vendors.
4.1.1 Document process and procedures for internal audits
Participants: CIO and/or IT Director, Asset Manager, IT Managers
Document: Document in the Standard Operating Procedures.
Define and document a process for conducting internal software audits.
Include the following:
Example:
Being prepared for an audit is critical. Internal preparation will not only help your organization reduce the risk associated with an audit but will also improve daily operations through focusing on diligent documentation and data collection.
Certain triggers exist that indicate a higher risk of an audit occurring. It is important to recognize these warning signs so you can prepare accordingly.
Health of organization
If your organization is putting out fires and a vendor can sense it, they’ll see an audit as a highly lucrative exercise.
Decrease in customer spend
A decrease in spend means that an organization has a high chance of being under-licensed.
License complexity
The more complex the license, the harder it is to remain in compliance. Some vendors are infamous for their complex licensing agreements.
Taking these due diligence steps will pay dividends downstream, reducing the risk of negative results such as release of confidential information.
Even if you cannot get a third-party NDA signed, the negotiation process should delay the overall audit process by at least a month, buying your organization valuable time to gather license data.
4.1.2 Define external audit process
Participants: CIO and/or IT Director, Asset Manager, IT Managers
Document: Document in the Standard Operating Procedures.
Define and document a process for responding to external software audit requests.
Include the following:
Use the Software Audit Scoping Email Template to create an email directed at your external (or internal) auditors. Send the audit scoping email several weeks before an audit to determine the audit’s scope and objectives. The email should include:
The email will help focus your preparation efforts and initiate your relationship with the auditors.
Approximately a week before the audit, you should email the internal leadership to communicate information about the start of the audit. Use the Software Audit Launch Email Template to create this email, including:
For more guidance on preparing for a software audit, see Info-Tech’s blueprint: Prepare and Defend Against a Software Audit.
A large American financial institution with 1,300 banking centers in 12 states, 28,000 end users, and 108,000 assets needed to improve its asset management program.
The bank had employed numerous ITAM tools, but IT staff identified that its asset data was still fragmented. There was still incomplete insight into what assets the banked owned, the precise value of those assets, their location, and what they’re being used for.
The bank decided to establish an asset management program that involved internal audits to gather more-complete data sets.
With the help of a vendor, the bank implemented cradle-to-grave asset tracking and lifecycle management, which provided discovery of almost $80 million in assets.
The bank also assembled an ITAM team and a dedicated ITAM manager to ensure that routine internal audits were performed.
The team was instrumental in establishing standardization of IT policies, hardware configuration, and service requirements.
| Phase 4: Build supporting processes & tools | This step will walk you through the following activities: | This step involves the following participants: | |
4.1 | Compliance & audits |
|
|
4.2 | Communicate & build roadmap | ||
Communication is crucial to the integration and overall implementation of your SAM program. If staff and users do not understand the purpose of processes and policies, they will fail to provide the desired value.
An effective communication plan will:
Why:
|
|
When:
|
Participants: CIO, IT Director, Asset Manager, Service Desk Manager
Document: Document in the SAM Communication Plan.
| Group | Benefits | Impact | Method | Timeline |
|---|---|---|---|---|
| Executives |
|
|
||
| End Users |
|
|
||
| IT |
|
|
Document: Document FAQ questions and answers in the SAM FAQ Template.
ITAM imposes changes to end users throughout the business and it’s normal to expect questions about the new program. Prepare your team ahead of time by creating a list of FAQs.
Use policy templates to jumpstart your policy development and ensure policies are comprehensive, but be sure to modify and adapt policies to suit your corporate culture or they will not gain buy-in from employees. For a policy to be successful, it must be a living document and have participation and involvement from the committees and departments to whom it will pertain.
Use Info-Tech’s Software Asset Management Policy template to define and document the purpose, scope, objectives, and roles and responsibilities for your organization's software asset management program.
The template allows you to customize policy requirements for:
…as well as consequences for non-compliance.
|
Asset Security Policy
End-User Devices Acceptable Use Policy
Purchasing Policy
Release Management Policy
Internet Acceptable Use Policy
|
|
One of the most difficult decisions to make when implementing a SAM program is: “where do we start?”
It’s not necessary to deploy a comprehensive SAM program to start. Build on the essentials to become more mature as you grow.
To integrate SAM effectively, a clear implementation roadmap needs to be designed. Prioritize “quick wins” to demonstrate success to the business early and to gain buy-in from your team. Short-term gains should be designed to support long-term goals of your SAM program.
| Q1 | Q2 | Q3 | Q4 |
|
|
|
|
Advertising the increased revenue that is gained from good SAM practices is a powerful way to gain project buy-in.
Reflect on the outcomes of implementing SAM to target areas for improvement and share knowledge gained within and beyond the SAM team. Some questions to consider include:
|
|
4.2.1 |
|
Develop a communication plan to convey the right messages
Identify stakeholders requiring communication and formulate a message and delivery method for each. |
4.2.5 |
|
Develop a SAM roadmap to plan your implementation
Outline the tasks necessary for the implementation of this project and prioritize to build a project roadmap. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 4.1: Compliance & audits | Step 4.2: Communicate & build roadmap |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
2013 Software Audit Industry Report.” Express Metrix, 2013. Web.
7 Vital Trends Disrupting Today’s Workplace: Results and Data from 2013 TINYpulse Employee Engagement Survey.” TINYpulse, 2013. Web.
Beaupoil, Christof. “How to measure data quality and protect against software audits.” Network World, 6 June 2011.
Begg, Daniel. “Effective Licence Position (ELP) – What is it really worth?” LinkedIn, 19 January 2016.
Boehler, Bernhard. “Advanced License Optimization: Go Beyond Compliance for Maximum Cost Savings.” The ITAM Review, 24 November 2014.
Bruce, Warren. “SAM Baseline – process & best practice.” Microsoft. 2013 Australia Partner Conference.
Case Study Top 20 U.S. Bank Tackles Asset Management.” Pomeroy, 2012. Web.
Cherwell Software Software Audit Industry Report.” Cherwell Software, 2015. Web.
Conrad, Sandi. “SAM starter kit: everything you need to get started with software asset management. Conrad & Associates, 2010.
Corstens, Jan, and Diederik Van der Sijpe. “Contract risk & compliance software asset management (SAM).” Deloitte, 2012.
Deas, A., T. Markowitzm and E. Black. “Software asset management: high risk, high reward.” Deloitte, 2014.
Doig, Chris. “Why you should always estimate ROI before buying enterprise software” CIO, 13 August 2015.
Fried, Chuck. “America Needs An Education On Software Asset Management (SAM).” LinkedIn. 16 June 2015.
Lyons, Gwen. “Understanding the Drivers Behind Application Rationalization Critical to Success.” Flexera Software Blog, 31 October 2012.
Metrics to Measure SAM Success: eight ways to prove your SAM program is delivering business benefits.” Snow Software White Paper, 2015.
Microsoft. “The SAM Optimization Model.” Microsoft Corporation White Paper, 2010.
Miller, D. and M. Oliver. “Engaging Stakeholders for Project Success.” Project Management Institute White Paper, 2015.
Morrison, Dan. “5 Common Misconceptions of Software Asset Management.” SoftwareOne. 12 May 2015.
O’Neill, Leslie T. “Visa Case Study: SAM in the 21st Century.” International Business Software Managers Association (IBSMA), 30 July 2014.
Reducing Hidden Operating Costs Through IT Asset Discovery.” NetSupport Inc., 2011.
SAM Summit 2014, 23-25 June 2014, University of Chicago Gleacher Center Conference Facilities, Chicago, MI.
Saxby, Heather. “20 Things Every CIO Needs to Know about Software Asset Management.” Crayon Software Experts, 13 May 2015.
The 2016 State of IT: Managing the money monsters for the coming year.” Spiceworks, 2016.
The Hidden Cost of Unused Software.” A 1E Report, 1E.com: 2014. Web.
What does it take to achieve software license optimization?” Flexera White Paper, 2013.
|
Michael Dean
Director, User Support Services Des Moines University |
Simon Leuty
Co-Founder Livingstone Tech |
|
|
Clare Walsh
PR Consultant Adesso Tech Ltd. |
Alex Monaghan
Director, Presales EMEA Product Support Solutions |
|
|
Ben Brand
SAM Practice Manager Insight |
Michael Swanson
President ISAM |
|
|
Bruce Aboudara
SVP, Marketing & Business Development Scalable Software |
Will Degener
Senior Solutions Consultant Scalable Software |
|
|
Peter Gregorowicz
Associate Director, Network & Client Services Vancouver Community College |
Peter Schnitzler
Operations Team Lead Toyota Canada |
|
|
David Maughan
Head of Service Transition Mott MacDonald Ltd. |
Brian Bernard
Infrastructure & Operations Manager Lee County Clerk of Court |
|
|
Leticia Sobrado
IT Data Governance & Compliance Manager Intercept Pharmaceuticals |
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Partner with the business to determine goals and establish high-level scope.
Find out what the target organization’s I&O looks like.
Build a plan to achieve a day 1 MVP.
Chart a roadmap for long-term integration.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish goals and conduct discovery.
Alignment with business goals
Documentation of target organization’s current state
0.1 Consult with stakeholders.
0.2 Establish M&A business goals.
0.3 Conduct target discovery.
0.4 Document own environment.
0.5 Clarify goals.
Stakeholder communication plan
M&A business goals
I&O M&A Discovery Template
Current state of organization
Assess risk and value of target organization.
Accurate scope of I&O integration
Risk mitigation plans
Value realization strategies
1.1 Scope I&O M&A project.
1.2 Assess risks.
1.3 Assess value.
I&O M&A Project Napkin
Risk assessment
Value assessment
Establish day 1 integration project plan.
Smoother day 1 integration
2.1 Determine Day 1 minimum viable operating model post M&A.
2.2 Identify gaps.
2.3 Build day 1 project plan.
2.4 Estimate required resources.
Day 1 project plan
Draw long-term integration roadmap.
Improved alignment with M&A goals
Greater realization of the deal’s value
3.1 Set long-term future state goals.
3.2 Create a long-term project plan.
3.3 Consult with business stakeholders on the long-term plan.
Long-term integration project plan
Prepare for organization and culture change.
Refine M&A I&O integration process.
Smoother change management
Improved M&A integration process
4.1 Complete a change management plan.
4.2 Conduct a process post-mortem.
Change management plan
Process improvements action items
Cost optimization is misunderstood and inadequately tackled. IT departments face:
Cost optimization is not just about reducing costs. In fact, you should aim to achieve three objectives:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint will help you understand your IT cost optimization mandate, identify your journey, assess your IT spend across four levers, develop your IT cost optimization roadmap, and craft a related communication strategy.
This tool guides an IT department in planning and prioritization activities to build an effective IT cost optimization strategy. The outputs include visual charts and a 12-month roadmap to showcase the implementation timelines and potential cost savings.
This presentation template uses sample data from "Acme Corp" to demonstrate an IT cost optimization strategy following a proactive journey. Use this template to document your final IT cost optimization strategy outputs, including the adopted journey, IT cost optimization goals, related key initiatives, potential cost savings, timelines, and 12-month roadmap.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine your organization’s current context and its cost optimization objectives, IT’s corresponding cost optimization journey, and goals.
A business-aligned set of specific IT cost optimization goals.
1.1 Understand your organization’s cost optimization objectives and how this impacts IT.
1.2 Review potential cost optimization target areas based on your ITFM Benchmarking Report.
1.3 Identify factors constraining cost optimization options.
1.4 Set concrete IT cost optimization goals.
1.5 Identify inputs required for decision making.
IT cost optimization journey and guiding principles for making corresponding decisions
Create a longlist of potential cost optimization initiatives focused on two cost optimization levers: assets and vendors.
A comprehensive list of potential asset- and vendor-focused initiatives including cost savings estimates.
2.1 Identify a longlist of possible initiatives around asset lifecycle management, investment deferral, repurposing, etc., and vendor contract renegotiation, cancelation, etc.
2.2 Estimate the cost savings of cost optimization initiatives.
Longlist of potential vendor management and asset optimization IT cost optimization initiatives
Create a longlist of potential cost optimization initiatives focused on two cost optimization levers: project portfolio and workforce.
A comprehensive list of potential initiatives focused on project portfolio and workforce including cost savings estimates.
3.1 Identify a longlist of possible initiatives around project priorities, project backlog reduction, project intake restructuring, etc., and workforce productivity, skills, redeployment, etc.
3.2 Estimate the cost savings of cost optimization initiatives.
Longlist of possible cost optimization initiatives and their potential cost savings for project portfolio and workforce levers.
Develop a visual IT cost optimization roadmap.
A prioritized, business-aligned IT cost optimization roadmap
4.1 Assess feasibility of each initiative (effort and risk profile) given cost optimization goals.
4.2 Prioritize cost optimization initiatives to create a final shortlist.
4.3 Fine-tune key information about your final cost optimization initiatives and develop a cost optimization roadmap for proposal.
Prioritized list of key cost optimization initiatives, descriptions, estimated impact, and roadmap.
Develop a communication plan and executive presentation.
A boardroom-ready set of communication materials for gaining buy-in and support for your IT cost optimization roadmap.
5.1 Outline components of a communication plan, including approvers, stakeholders, and governance and management mechanisms to be used.
5.2 Create an executive presentation.
5.3 Set up review time for workshop deliverables and post-workshop activities.
IT cost optimization communication plan and presentation strategy.
IT Cost Optimization Executive Presentation
Whether the industry is in an economic downturn, or your business is facing headwinds in the market, pressure to reduce spending across organizations is inevitable. When it comes to the IT organization, it is often handled as a onetime event. Cost optimization is an industry standard term, but it usually translates into cost cutting. How do you manage this challenge given the day-to-day demands placed on IT? Do you apply cost reduction equally across the IT landscape, or do you apply reductions using a targeted approach? How do you balance the business demands regarding innovation with keeping the lights on? What is the best path forward?
While the situation isn't unique, all too often the IT organization response is too shortsighted.
By using the Info-Tech methodology and tools, you will be able to develop an IT cost optimization roadmap based on your specific circumstances and timeline.
A well-thought-out strategy should help you achieve three objectives:
This blueprint will guide you to understand your mandate, identify your cost optimization journey (reactive, proactive, or strategic), and assess your IT spend across four levers (assets, vendors, project portfolio, and workforce).
Finally, keep in mind that cost optimization is not a project to be completed, but an ongoing process to be exercised.
Bilal Alberto Saab
Research Director, IT Financial Management
Info-Tech Research Group
| Cost optimization is misunderstood and inadequately tackled | Common obstacles | Follow Info-Tech's approach to develop a 12-month cost optimization roadmap |
|
|
Develop an IT cost optimization strategy based on your specific circumstances and timeline. Info-Tech's methodology helps you maintain sustainable cost optimization across IT by focusing on four levers:
|
Info-Tech Insight
Cost optimization is not just about reducing costs. In fact, you should aim to achieve three objectives: (1) reduce your unwarranted IT spending, (2) optimize your cost-to-value, and (3) sustain your cost optimization.
When crisis hits, does IT's hard-won gains around being seen as a partner to the business suddenly disappear and IT becomes just a cost center all over again?
In times of economic slowdown or downturn, the key challenge of IT leaders is to optimize costs without jeopardizing their strategic and innovative contribution.
How can IT optimize costs to achieve a corporate impact, but not cut so deep that the organization can't take advantage of opportunities to recover and thrive?
Know how you will strategically optimize IT costs before you are forced to cut cost aggressively in a reactive fashion.
Change your mindset ...
An Info-Tech survey of IT staff reveals that while most agree that cost optimization is an important IT process, nearly 20% fewer of them agree that it's being managed well.
Info-Tech IT Management & Governance Diagnostic, 2022.
A starting point for cost optimization improvement is adjusting your frame of mind. Know that it's not just about making difficult cuts - in reality, it's a creative pursuit that's about thriving in all circumstances, not just surviving.
Sustain an optimal cost-to-value ratio across four levers:
Cost optimization is not just about reducing costs
In fact, you should aim to achieve three objectives:
(1) reduce your unwarranted IT spending, (2) optimize your cost-to-value, and (3) sustain your cost optimization.
Reduce unwarranted IT spending
Stop the bleeding or go for quick wins
Start by reducing waste and bad spending habits while clearly communicating your intentions to your stakeholders – get buy-in.
Optimize cost-to-value
Value means tradeoffs
Pursue value but know that it will lead you to make tradeoffs between cost, performance, and risk.
Sustain cost optimization
Think about tomorrow: reduce, reuse, recalibrate, and repeat
Standardize and automate your cost optimization processes around a proper governance framework. Cost optimization is not a onetime exercise.
|
Phase 1: Understand Your Mandate & Objectives Know where you stand and where you're going. Understand your cost optimization mandate within the context of your organization's situation and direction. |
Phase 2: Outline Your Initiatives Evaluate many, pick a few. Think of all possible cost optimization initiatives across the four optimization levers (Assets, Vendors, Project Portfolio, and Workforce), but only keep the ones that best help you fulfill your goals. |
Phase 3: Develop Your Roadmap Keep one eye on today and the other on tomorrow. Prioritize cost optimization initiatives that would help you achieve your near-term objectives first, but don't forget about the medium and long term. |
Phase 4: Communicate and Execute Communicate and collaborate - you are not a one-person show. Reach out to other business units where necessary. Your success relies on getting buy-in from various stakeholders, especially when cost optimization initiatives impact them in one way or another. |
IT Cost Optimization Roadmap Samples and Templates
Templates including an abbreviated executive presentation and a final communication presentation based on a 12-month cost optimization roadmap.
IT Cost Optimization Workbook
A workbook generating a 12-month cost optimization roadmap.
This blueprint will guide you to set cost optimization goals across one to three main objectives, depending on your identified journey (reactive, proactive, or strategic):
In phase 1 of this blueprint, we will help you establish your goals to satisfy your organization's needs.
In phase 3, we will help you develop a game plan and a roadmap for achieving those metrics.
Once you implement your 12-month roadmap, start tracking the metrics below over the next fiscal year (FY) to assess the effectiveness of undertaken measures.
| Cost Optimization Objective | Key Success Metric |
| Reduce unwarranted IT spending | Decrease IT cost in identified key areas |
| Optimize cost-to-value | Decrease IT cost per IT employee |
| Sustain cost optimization | Decrease IT cost-to-organization revenue |
| DIY Toolkit "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." |
Guided Implementation "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." |
Workshop "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place. |
Consulting "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks are used throughout all four options.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 | |
|---|---|---|---|---|
Call #1:
|
Call #2:
Review potential cost optimization initiatives for assets and vendors levers. Call #3: Assess cost optimization initiatives' cost and feasibility - for assets and vendors levers. |
Call #4:
Review potential cost optimization initiatives for project portfolio and workforce levers. Call #5: Assess cost optimization initiatives' cost and feasibility - for project portfolio and workforce levers. |
Call #6:
|
Call #7:
|
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI will include multiple calls over the course of one to two months.
| Session 1 | Session 2 | Session 3 | Session 4 | Session 5 | |
|---|---|---|---|---|---|
| Activities | Understand Your Mandate and Objectives | Outline Initiatives for Assets and Vendors | Outline Initiatives for Projects and Workforce | Develop an IT Cost Optimization Roadmap | Communicate and Execute |
| 1.1 Understand your organization's cost optimization objectives and how this impacts IT. 1.2 Review potential cost optimization target areas based on your IT financial management benchmarking report. 1.3 Identify factors constraining cost optimization options. 1.4 Set concrete IT cost optimization goals. 1.5 Identify inputs required for decision making. |
2.1 Identify a longlist of possible initiatives around:
|
3.1 Identify a longlist of possible initiatives around:
|
4.1 Assess the feasibility of each initiative (effort and risk profile) given cost optimization goals. 4.2 Prioritize cost optimization initiatives to create a final shortlist. 4.3 Fine-tune key information about your final cost optimization initiatives and develop a cost optimization roadmap for proposal. |
5.1 Outline components of a communication plan, including approvers, stakeholders, and governance and management mechanisms to be used. 5.2 Create an executive presentation. 5.3 Set up review time for workshop deliverables and post-workshop activities. |
|
| Output |
|
|
|
|
|
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Phase 1
Understand Your Mandate and Objectives
Phase 2
Outline Your Cost Optimization Initiatives
Phase 3
Develop Your IT Cost Optimization Roadmap
Phase 4
Communicate and Execute
This phase will walk you through the following activities:
This phase involves the following participants:
60 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
See the next three slides for guidelines and the journey assessment questions and template.
| Journey | Reactive | Proactive | Strategic |
|---|---|---|---|
| Description |
|
|
|
| Main Focus |
|
|
|
| Business Objectives | Business Strategy |
|---|---|
|
|
| IT Objectives | IT Strategy and Mandate |
|
|
| Journey | |
| Agreed-upon journey: reactive, proactive, or strategic. | |
| Business Objectives | Business Strategy |
|---|---|
|
|
| IT Objectives | IT Strategy and Mandate |
|
|
| Journey | |
| Agreed-upon journey: proactive. | |
60-90 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Potential Initiative | Source | Source Contact | Notes |
|---|---|---|---|
| Reduce application maintenance cost | Internal Benchmarking Report | CIO | Based on current year report |
| Rationalize software applications | Info-Tech IT Benchmarking Report | CIO | Based on current year report |
| Migrate key business applications to the cloud | Latest iteration of the IT strategy | CIO | New IT strategy will be in development concurrent with cost optimization strategy development |
| Align job roles to the current IT structure | IT org. chart and salaries | HR, CIO | Based on information of the current year and will likely change in a few months (beginning of a new year) |
| Renegotiate the top five vendor contracts up for renewal this year | List of IT vendors | Procurement office, CIO, IT infrastructure director, IT applications director, IT services manager | Based on a list consolidated last week |
The path to IT financial management maturity starts with knowing exactly where your money is going. To streamline this effort, Info-Tech offers an IT Spend & Staffing Benchmarking service that provides full transparency into where your money is going without any heavy lifting on your part.
This unique service features:
If you'd like Info-Tech to pave the way to IT spend transparency, contact your account manager for more information - we're happy to talk anytime.
30 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
See the next slides for additional guidance and a constraints assessment template.
| Constraints | Organizational | Legal/Regulatory | Other |
|---|---|---|---|
| What | An organizational constraint is any work condition that hinders an employee's performance - be it physical, emotional, or otherwise. | A legal or regulatory constraint is any law, rule, standard, or regulation - be it industry specific or otherwise - limiting the ability of any stakeholder to get the most out of a certain activity, initiative, or project. | Other types of constraints affecting business units. |
| Who | Collaborate with your IT leaders and business partners to identify all major constraints that would affect cost optimization initiatives. | ||
| How | Discussions and information sessions to distinguish between negotiable and nonnegotiable constraints that would thwart cost optimization efforts:
|
||
| Challenge | Degree to which you can influence certain outcomes within a set time frame:
|
||
We define a constraint as a restriction controlling the behavior of any of your stakeholders, hence preventing a desired outcome.
In our context, constraints will determine your playing field: the boundaries of your cost optimization scope.
| Nonnegotiable constraints | ||
|---|---|---|
| Organizational | Legal/Regulatory | IT/Other |
| Prioritization of sales/customer service activities | SEC compliance/reporting mandates | Production unit incident response service levels |
| [Constraint] | [Constraint] | [Constraint] |
| [Constraint] | [Constraint] | [Constraint] |
| [Constraint] | [Constraint] | [Constraint] |
| Negotiable constraints | ||
| Organizational | Legal/Regulatory | IT/Other |
| Core business operations process design | Vendor contracts up for near-term renewal | Current capital project commitments |
| [Constraint] | [Constraint] | [Constraint] |
| [Constraint] | [Constraint] | [Constraint] |
| [Constraint] | [Constraint] | [Constraint] |
60-90 minutes
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to document your goals based on your journey:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Dropdown | Select the appropriate journey: Reactive, Proactive, or Strategic. |
| C | Dropdown | Select the appropriate cost optimization objective: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, Sustain Cost Optimization. |
| D | Formula | Automatic calculation, no entry required. Reduce Unwarranted IT Spending goal is the first priority, followed by Optimize Cost-to-Value, and Sustain Cost Optimization goals, respectively. |
| E | Text | Enter the overarching goal related to each objective. |
Complete the following fields for each goal depending on your journey in the Excel Workbook as per guidelines:
Download the IT Cost Optimization Workbook
Refer to the example and guidelines below on how to break down your goals per quarter and track your progress:
| Column ID | Input Type | Guidelines |
|---|---|---|
| F, G, H, I | Text | Enter the target per quarter: It could be a percentage, dollar amount, or description of the breakdown, depending on the cost optimization goal and objective. |
Complete the following fields for each goal depending on your journey in the Excel Workbook as per guidelines:
Download the IT Cost Optimization Workbook
60-90 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Documents | Benchmarking | IT Strategy | Other Information Sources |
|---|---|---|---|
| What |
|
|
|
| Who | Collaborate with your IT leaders and business partners to:
|
||
| How | Discussions and information sessions to analyze and deep dive on raw findings. | ||
| Challenge | Time to compile and analyze reports without affecting day-to-day operations:
|
||
Phase 1
Understand Your Mandate and Objectives
Phase 2
Outline Your Cost Optimization Initiatives
Phase 3
Develop Your IT Cost Optimization Roadmap
Phase 4
Communicate and Execute
This phase will walk you through the following activities:
This phase involves the following participants:
| Levers | ASSETS | VENDORS | PROJECT PORTFOLI | WORKFORCE |
|---|---|---|---|---|
| What |
|
|
|
|
| Who | Collaborate with your IT leaders and business partners to:
|
|||
| How | You will decide on the best course of action depending on your journey. | |||
| Levers | ASSETS | VENDORS | PROJECT PORTFOLI | WORKFORCE |
|---|---|---|---|---|
| Challenge |
|
|
|
|
| Solution |
|
|
|
|
| Related Info-Tech Research | Develop an IT Asset Management Strategy | Jump-start Your Vendor Management Initiative | Develop a Project Portfolio Management Strategy | Build a Strategic IT Workforce Plan |
8 hours
Now that you have identified your journey and understood your constraints:
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
In terms of aggressiveness and objectives.
Cost optimization initiatives pertaining to a reactive journey are characterized by aggressive cost reduction.
On the other hand, cost optimization initiatives within a strategic journey can vary in aggressiveness across objectives.
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Journey | Reactive, Proactive, or Strategic | Proactive or Strategic | Strategic |
|---|---|---|---|
| Initiatives |
|
|
|
| No initiatives for the reactive journey. | No initiatives for the reactive or proactive journeys. | ||
| Objective | Reduce Unwarranted IT Spending | Optimize Cost-to-Value | Sustain Cost Optimization |
Refer to the example and guidelines below on how to input your asset optimization initiatives and related objectives:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Formula | Automatic calculation, no entry required. The ID will update once there's an input in column E. |
| C | Dropdown | Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce. |
| D | Dropdown | Select an initiative focus from the dropdown list - this will help you think of initiatives. |
| E | Text | Enter your initiative. |
| F | Text | Write a brief description per initiative, providing a cost optimization rationale. |
| G | Dropdown | Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure). |
| H | Dropdown | Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization. |
List your initiatives in the provided Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Journey | Reactive, Proactive, or Strategic | Proactive or Strategic | Strategic |
|---|---|---|---|
| Initiatives |
|
|
|
| No initiatives for the reactive journey. | No initiatives for the reactive or proactive journeys. | ||
| Objective | Reduce Unwarranted IT Spending | Optimize Cost-to-Value | Sustain Cost Optimization |
Refer to the example and guidelines below on how to input your vendor optimization initiatives and related objectives:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Formula | Automatic calculation, no entry required. The ID will update once there's an input in column E. |
| C | Dropdown | Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce. |
| D | Dropdown | Select an initiative focus from the dropdown list - this will help you think of initiatives. |
| E | Text | Enter your initiative. |
| F | Text | Write a brief description per initiative, providing a cost optimization rationale. |
| G | Dropdown | Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure). |
| H | Dropdown | Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization. |
List your initiatives in the provided Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Journey | Reactive, Proactive, or Strategic | Proactive or Strategic | Strategic |
|---|---|---|---|
| Initiatives |
|
|
|
| No initiatives for the reactive journey. | No initiatives for the reactive or proactive journeys. | ||
| Objective | Reduce Unwarranted IT Spending | Optimize Cost-to-Value | Sustain Cost Optimization |
Refer to the example and guidelines below on how to input your project portfolio optimization initiatives and related objectives:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Formula | Automatic calculation, no entry required. The ID will update once there's an input in column E. |
| C | Dropdown | Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce. |
| D | Dropdown | Select an initiative focus from the dropdown list - this will help you think of initiatives. |
| E | Text | Enter your initiative. |
| F | Text | Write a brief description per initiative, providing a cost optimization rationale. |
| G | Dropdown | Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure). |
| H | Dropdown | Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization. |
List your initiatives in the provided Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Journey | Reactive, Proactive, or Strategic | Proactive or Strategic | Strategic |
|---|---|---|---|
| Initiatives |
|
|
|
| No initiatives for the reactive journey. | No initiatives for the reactive or proactive journeys. | ||
| Objective | Reduce Unwarranted IT Spending | Optimize Cost-to-Value | Sustain Cost Optimization |
Refer to the example and guidelines below on how to input your workforce optimization initiatives and related objectives:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Formula | Automatic calculation, no entry required. The ID will update once there's an input in column E. |
| C | Dropdown | Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce. |
| D | Dropdown | Select an initiative focus from the dropdown list - this will help you think of initiatives. |
| E | Text | Enter your initiative. |
| F | Text | Write a brief description per initiative, providing a cost optimization rationale. |
| G | Dropdown | Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure). |
| H | Dropdown | Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization. |
List your initiatives in the provided Excel Workbook as per guidelines:
8 hours
Now that you have identified your initiatives:
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete cost estimates for each asset optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| I | Dropdown | Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative. |
| J, K | Whole Number | Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative. |
| L | Formula | Automatic calculation, no entry required. The difference between current cost and expected cost. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete cost estimates for each vendor optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| I | Dropdown | Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative. |
| J, K | Whole Number | Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative. |
| L | Formula | Automatic calculation, no entry required. The difference between current cost and expected cost. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete cost estimates for each project portfolio optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| I | Dropdown | Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative. |
| J, K | Whole Number | Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative. |
| L | Formula | Automatic calculation, no entry required. The difference between current cost and expected cost. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete cost estimates for each workforce optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| I | Dropdown | Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative. |
| J, K | Whole Number | Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative. |
| L | Formula | Automatic calculation, no entry required. The difference between current cost and expected cost. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Phase 1
Understand Your Mandate and Objectives
Phase 2
Outline Your Cost Optimization Initiatives
Phase 3
Develop Your IT Cost Optimization Roadmap
Phase 4
Communicate and Execute
This phase will walk you through the following activities:
This phase involves the following participants:
First, take a moment to consider if you missed anything. Too often, only the cost cutting elements of the cost optimization equation get attention. Remember that cost optimization also includes making smart investments. Sometimes adding and expanding is better for the business than removing or contracting.
Feasibility
Eliminate initiatives from the longlist of potential initiatives that cannot be achieved given the cost optimization goals you determined at the beginning of this exercise.
Priority
Rank order the remaining initiatives according to their ability to contribute to goal attainment and dependency relationships with external constraints and one another.
Action Plan
Create an overarching visual roadmap that shows how you intend to achieve your cost optimization goals over the short, medium, and long-term.
4 hours
Now that you have identified your initiatives across the four levers and understood the business impacts:
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to define your feasibility variables for standardization purposes. You can adopt a different definition per optimization lever (Assets, Vendors, Project Portfolio, and Workforce), or maintain the same one across initiatives, depending on what makes sense for your organization:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B, G | Formula | Automatic calculation, no entry required. The ID will populate automatically. |
| C, H | Text | No entry required. Three variables identified: High, Medium, Low. |
| D, E | Whole Number | Review and input the range of each effort required variable, based on the number of dedicated full-time employees needed to implement an initiative, as it works best for your organization. |
| I, J | Whole Number | Review and input the range of each likelihood of failure variable, based on the probability of failure of an initiative, as it works best for your organization. This example should work for most organizations. |
Define your feasibility variables in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to complete feasibility estimates for each asset optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| M | Dropdown | Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability. |
| N | Dropdown | Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative. |
| O | Dropdown | Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey). |
| P | Dropdown | Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not. |
| Q | Text | Write a brief description per initiative, providing an impact rationale and identifying the approver where possible. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete feasibility estimates for each vendor optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| M | Dropdown | Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability. |
| N | Dropdown | Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative. |
| O | Dropdown | Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey). |
| P | Dropdown | Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not. |
| Q | Text | Write a brief description per initiative, providing an impact rationale and identifying the approver where possible. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete feasibility estimates for each project portfolio optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| M | Dropdown | Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability. |
| N | Dropdown | Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative. |
| O | Dropdown | Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey). |
| P | Dropdown | Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not. |
| Q | Text | Write a brief description per initiative, providing an impact rationale and identifying the approver where possible. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete feasibility estimates for each workforce optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| M | Dropdown | Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability. |
| N | Dropdown | Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative. |
| O | Dropdown | Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey). |
| P | Dropdown | Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not. |
| Q | Text | Write a brief description per initiative, providing an impact rationale and identifying the approver where possible. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
4 hours
Now that you have your cost and feasibility for each cost optimization initiative:
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each asset optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:
| Column ID | Input Type | Guidelines |
|---|---|---|
| R | Formula | Hidden automatic calculation, no entry required. Rank of estimate cost savings (per year) in ascending order (higher cost savings implies a higher rank). |
| S | Formula | Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score. |
| T | Formula | Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget. |
| U, V, W | Formula | Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1. |
| X | Formula | Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P). |
| Y | Formula | Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-value (column H). |
| Z | Formula | Hidden automatic calculation, no entry required. Preliminary priority assessment based on the Define Priority Threshold worksheet (hidden, see next slide). |
Review the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the priority score and priority level:
Refer to the example and guidelines below on how to complete timeline estimates for each asset optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| AA, AC | Dropdown | Select the quarter(s) in which you plan to begin and complete your initiative. |
| AB, AD | Dropdown | Select the year(s) in which you plan to begin and complete your initiative. |
| AE | Dropdown | Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD. |
| AF | Formula | Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L). |
| AG | Dropdown | Select if cost savings after the implementation of the underlying initiative will be permanent or temporary. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to assign the final priority for each asset optimization initiative, and include it in your 12-month roadmap:
| Column ID | Row ID | Input Type | Guidelines |
|---|---|---|---|
| AH | - | Dropdown | Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG). |
| AI | - | Dropdown | Select whether you want to include the initiative in your 12-month roadmap (Yes or No). |
| AK, AL | 5 | Formula | Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected. |
| AK, AL | 6 | Formula | Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected) |
| AK, AL | 7 | Formula | Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected) |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each vendor optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:
| Column ID | Input Type | Guidelines | |
|---|---|---|---|
| R | Formula | Hidden automatic calculation, no entry required. Rank of estimate cost savings (per year) in ascending order (higher cost savings implies a higher rank). | |
| S | Formula | Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score. | |
| T | Formula | Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget. | |
| U, V, W | Formula | Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1. | |
| X | Formula | Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P). | |
| Y | Formula | Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-Value (column H). | |
| Z | Formula | Hidden automatic calculation, no entry required. Preliminary priority assessment based on the Define Priority Threshold worksheet (hidden, see next slide). |
Review the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the Priority Score and Priority Level:
Refer to the example and guidelines below on how to complete timeline estimates for each vendor optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| AA, AC | Dropdown | Select the quarter(s) in which you plan to begin and complete your initiative. |
| AB, AD | Dropdown | Select the year(s) in which you plan to begin and complete your initiative. |
| AE | Dropdown | Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD. |
| AF | Formula | Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L). |
| AG | Dropdown | Select if cost savings after the implementation of the underlying initiative will be Permanent or Temporary. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to assign the final priority for each vendor optimization initiative, and include it in your 12-month roadmap:
| Column ID | Row ID | Input Type | Guidelines |
|---|---|---|---|
| AH | - | Dropdown | Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG). |
| AI | - | Dropdown | Select whether you want to include the initiative in your 12-month roadmap (Yes or No). |
| AK, AL | 5 | Formula | Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected. |
| AK, AL | 6 | Formula | Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected) |
| AK, AL | 7 | Formula | Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected) |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each project portfolio optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:
| Column ID | Input Type | Guidelines |
|---|---|---|
| R | Formula | Hidden automatic calculation, no entry required. Rank of Estimate Cost Savings (per year) in ascending order (higher cost savings implies a higher rank). |
| S | Formula | Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score. |
| T | Formula | Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget. |
| U, V, W | Formula | Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1. |
| X | Formula | Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P). |
| Y | Formula | Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-Value (column H). |
| Z | Formula | Hidden automatic calculation, no entry required. Preliminary Priority Assessment based on the Define Priority Threshold worksheet (hidden, see next slide). |
Review the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the Priority Score and Priority Level:
Refer to the example and guidelines below on how to complete timeline estimates for each project portfolio optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| AA, AC | Dropdown | Select the quarter(s) in which you plan to begin and complete your initiative. |
| AB, AD | Dropdown | Select the year(s) in which you plan to begin and complete your initiative. |
| AE | Dropdown | Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD. |
| AF | Formula | Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L). |
| AG | Dropdown | Select if cost savings after the implementation of the underlying initiative will be Permanent or Temporary. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to assign the final priority for each project portfolio optimization initiative and include it in your 12-month roadmap:
| Column ID | Row ID | Input Type | Guidelines |
|---|---|---|---|
| AH | - | Dropdown | Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG). |
| AI | - | Dropdown | Select whether you want to include the initiative in your 12-month roadmap (Yes or No). |
| AK, AL | 5 | Formula | Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected. |
| AK, AL | 6 | Formula | Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected) |
| AK, AL | 7 | Formula | Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected) |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each workforce optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:
| Column ID | Input Type | Guidelines |
|---|---|---|
| R | Formula | Hidden automatic calculation, no entry required. Rank of Estimate Cost Savings (per year) in ascending order (higher cost savings implies a higher rank). |
| S | Formula | Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score. |
| T | Formula | Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget. |
| U, V, W | Formula | Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1. |
| X | Formula | Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P). |
| Y | Formula | Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-Value (column H). |
| Z | Formula | Hidden automatic calculation, no entry required. Preliminary Priority Assessment based on the Define Priority Threshold worksheet (hidden, see next slide). |
Review the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the Priority Score and Priority Level:
Refer to the example and guidelines below on how to complete timeline estimates for each workforce optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| AA, AC | Dropdown | Select the quarter(s) in which you plan to begin and complete your initiative. |
| AB, AD | Dropdown | Select the year(s) in which you plan to begin and complete your initiative. |
| AE | Dropdown | Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD. |
| AF | Formula | Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L). |
| AG | Dropdown | Select if cost savings after the implementation of the underlying initiative will be Permanent or Temporary. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to assign the final priority for each workforce optimization initiative, and include it in your 12-month roadmap:
| Column ID | Row ID | Input Type | Guidelines |
|---|---|---|---|
| AH | - | Dropdown | Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG). |
| AI | - | Dropdown | Select whether you want to include the initiative in your 12-month roadmap (Yes or No). |
| AK, AL | 5 | Formula | Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected. |
| AK, AL | 6 | Formula | Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected) |
| AK, AL | 7 | Formula | Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected) |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example below on charts depicting different views of estimated cost savings per year across the four optimization levers (Assets, Vendors, Project Portfolio, and Workforce) that could help you in your assessment and decision making.
From the Excel Workbook, after completing your potential initiatives and filling all related entries in the Outline Initiatives tab:
Refer to the example below depicting different roadmap output that could help you in presentations, assessment, and decision making.
From the Excel Workbook:
Download the IT Cost Optimization Workbook
Phase 1
Understand Your Mandate and Objectives
Phase 2
Outline Your Cost Optimization Initiatives
Phase 3
Develop Your IT Cost Optimization Roadmap
Phase 4
Communicate and Execute
This phase will walk you through the following activities:
This phase involves the following participants:
Build Your IT Cost Optimization Roadmap
45 to 60 minutes
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Your communication strategy has two major components ...
Your communication strategy will need to ...
You will also develop more detailed operational and project plans for each initiative. IT will use these plans to manage and track the execution of individual initiatives when the time comes.
| Component | Purpose | Context | Key Messages | Intended Outcomes |
|---|---|---|---|---|
| Definition | Description of the topic and why you're communicating with this specific audience right now. | Background information about the broader situation and how you got to where you are today. | The main points you want your target audience to hear/read, absorb, and remember. | What you hope you and your audience will get at the end of the communication or effort. |
| Our Language |
|
|
|
|
| Stakeholder/Approver | Initiatives | Impact | Format | Time frame | Messenger |
|---|---|---|---|---|---|
| CEO |
|
Indefinitely delays current strategic projects | Monthly meeting discussion | Last Wednesday of every month starting Oct. 26, FY1 | CIO, IT data analytics project lead, IT VR project lead |
| IT Steering Committee |
|
Nearly all of these initiatives are enterprise-wide or affect multiple departments. Varying direct and indirect impacts will need to be independently communicated for each initiative if approved by the ITS. |
Formal presentation at quarterly ITS meetings Monthly progress updates via email bulletin |
Approval presentation: Oct. 31, FY1 Quarterly updates: Jan. 31, Apr. 28, and Jul. 28, FY2 |
CIO, IT service director, IT infrastructure director, IT data analytics project lead |
| VP of Sales |
|
Delays new sales tool efficiency improvement. | Meeting discussion | Nov. FY1 | CIO, IT Salesforce view redesign project lead |
| [Name/Title/Group] |
|
[Impact statement] | [Format] | [Date/Period] | [Name/Title] |
| [Name/Title/Group] |
|
[Impact statement] | [Format] | [Date/Period] | [Name/Title] |
| [Name/Title/Group] |
|
[Impact statement] | [Format] | [Date/Period] | [Name/Title] |
45-60 minutes
Download IT Cost Optimization Roadmap Samples and Templates
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Throughout this blueprint, you have:
What's next?
Communicate with your stakeholders, then follow your internal project policies and procedures to get the necessary approvals as required. Once obtained, you can start the execution and implementation of your IT cost optimization strategy.
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
Jennifer Perrier
Principal Research Director, IT Financial Management
Info-Tech Research Group
Jack Hakimian
Senior Vice President, Research Development
Info-Tech Research Group
Graham Price
Senior Executive Counselor, Executive Services
Info-Tech Research Group
Travis Duncan
Research Director, Project & Portfolio Management
Info-Tech Research Group
Dave Kish
Practice Lead, IT Financial Management
Info-Tech Research Group
Baird Miller, PhD
Senior Executive Advisor, Executive Services
Info-Tech Research Group
Monica Braun
Research Director, IT Financial Management
Info-Tech Research Group
Sandi Conrad
Principal Advisory Director, Infrastructure & Operations
Info-Tech Research Group
Phil Bode
Principal Advisory Director, Vendor Management
Info-Tech Research Group
Donna Glidden
Advisory Director, Vendor Management
Info-Tech Research Group
Barry Cousins
Distinguished Analyst & Research Fellow
Info-Tech Research Group
Andrew Sharp
Research Director, Infrastructure & Operations Practice
Info-Tech Research Group
Frank Sewell
Advisory Director, Vendor Management
Info-Tech Research Group
Achieve IT Spend & Staffing Transparency
Most CIOs, CFOs, and business function leaders don't enjoy a shared vocabulary when it comes to talking about technology spend. As a result, truly meaningful conversations about where and how to spend technology funds in support of business goals are rare. Enable these important conversations by transparently mapping your IT spend data against four key stakeholder views.
Reduce Shadow IT With a Service Request Catalog
As the business gets more innovative to solve its problems, IT finds itself in reactive mode, dealing with software bloat, managing surprise SaaS renewals, and having to integrate products that they didn't know were purchased. To solve this, IT needs to focus on service and visibility to counter Shadow IT.
"A Short Guide to Structured Cost Reduction." National Audit Office, 18 June 2010. Web.
"IT Cost Savings: A Guide to Application Rationalization." LeanIX, 2021. Web.
Jouravlev, Roman. "Service Financial Management: ITIL 4 Practice Guide." Axelos, 30 April 2020. Web.
Leinwand, Paul, and Vinay Couto. "How to Cut Costs More Strategically." Harvard Business Review, March 2017. Web.
"Role & Influence of the Technology Decision-Maker 2022." Foundry, 2022. Web.
"State of the CIO 2022." CIO, 2022. Web.
"The Definitive Guide to IT Cost Optimization." LeanIX, n.d. Web.
"Understand the Principles of Cost Optimization." Google Cloud, n.d. Web.
Under the best of circumstances, mainframe systems are complex, expensive, and difficult to scale. In today’s world, applications written for mainframe legacy systems also present significant operational challenges to customers compounded by the dwindling pool of engineers who specialize in these outdated technologies. Many organizations want to migrate their legacy applications to the cloud but to do so they need to go through a lengthy migration process that is made more challenging by the complexity of mainframe applications.
The most common tactic is for the organization to better realize their z/Series options and adopt a strategy built on complexity and workload understanding. To make the evident, obvious, the options here for the non-commodity are not as broad as with commodity server platforms and the mainframe is arguably the most widely used and complex non-commodity platform on the market.
This research will help you:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint will help you assess the fit, purpose, and price; develop strategies for overcoming potential challenges; and determine the future of z/Series for your organization.
Use this tool to play with the pre-populated values or insert your own amounts to compare possible database decisions, and determine the TCO of each. Note that common assumptions can often be false; for example, open-source Cassandra running on many inexpensive commodity servers can actually have a higher TCO over six years than a Cassandra environment running on a larger single expensive piece of hardware. Therefore, calculating TCO is an essential part of the database decision process.
“A number of market conditions have coalesced in a way that is increasingly driving existing mainframe customers to consider running their application workloads on alternative platforms. In 2020, the World Economic Forum noted that 42% of core skills required to perform existing jobs are expected to change by 2022, and that more than 1 billion workers need to be reskilled by 2030.” – Dale Vecchio
Your Challenge |
It seems like anytime there’s a new CIO who is not from the mainframe world there is immediate pressure to get off this platform. However, just as there is a high financial commitment required to stay on System Z, moving off is risky and potentially more costly. You need to truly understand the scale and complexity ahead of the organization. |
|---|---|
Common Obstacles |
Under the best of circumstances, mainframe systems are complex, expensive, and difficult to scale. In today’s world, applications written for mainframe legacy systems also present significant operational challenges to customers compounded by the dwindling pool of engineers who specialize in these outdated technologies. Many organizations want to migrate their legacy applications to the cloud, but to do so they need to go through a lengthy migration process that is made more challenging by the complexity of mainframe applications. |
Info-Tech Approach |
The most common tactic is for the organization to better realize its z/Series options and adopt a strategy built on complexity and workload understanding. To make the evident, obvious: the options here for the non-commodity are not as broad as with commodity server platforms and the mainframe is arguably the most widely used and complex non-commodity platform on the market. |
Problem statement: The z/Series remains a vital platform for many businesses and continues to deliver exceptional reliability and performance and play a key role in the enterprise. With the limited and aging resources at hand, CIOs and the like must continually review and understand their migration path with the same regard as any other distributed system roadmap. |
This research is designed for: IT strategic direction decision makers. IT managers responsible for an existing z/Series platform. Organizations evaluating platforms for mission critical applications. |
This research will help you:
|
Good Luck.
![]() |
Modernize the mainframe … here we go again. Prior to 2020, most organizations were muddling around in “year eleven of the four-year plan” to exit the mainframe platform where a medium-term commitment to the platform existed. Since 2020, it appears the appetite for the mainframe platform changed. Again. Discussions mostly seem to be about what the options are beyond hardware outsourcing or re-platforming to “cloud” migration of workloads – mostly planning and strategy topics. A word of caution: it would appear unwise to stand in front of the exit door for fear of being trampled. Hardware expirations between now and 2025 are motivating hosting deployments. Others are in migration activities, and some have already decommissioned and migrated but now are trying to rehab the operations team now lacking direction and/or structure. |
Darin Stahl |
Thinking of modernizing your mainframe can cause you angst so grab a fidget spinner and relax because we have you covered!
External Business Pressures:
Internal Considerations:
With multiple control points to be addressed, care must be taken to simplify your options while addressing all concerns to ease operational load.
Dating back to 2011, Darin Stahl has been the primary z/Series subject matter expert within the Infrastructure & Operations Research team. Below represents the percentage of calls, per industry, where z/Series advisory has been provided by Darin*: 37% - State Government 19% - Insurance 11% - Municipality 8% - Federal Government 8% - Financial Services 5% - Higher Education 3% - Retail 3% - Hospitality/Resort 3% - Logistics and Transportation 3% - Utility Based on the Info-Tech call history, there is a consistent cross section of industry members who not only rely upon the mainframe but are also considering migration options. |
Note:Of course, this only represents industries who are Info-Tech members and who called for advisory services about the mainframe. There may well be more Info-Tech members with mainframes who have no topic to discuss with us about the mainframe specifically. Why do we mention this? We caution against suggesting things like, ”somewhat less than 50% of mainframes live in state data centers” or any other extrapolated inference from this data. Our viewpoint and discussion is based on the cases and the calls that we have taken over the years. *37+ enterprise calls were reviewed and sampled. |
For most workloads “scale out" (e.g. virtualized cloud or IaaS ) is going to provide obvious and quantifiable benefits. However, with some workloads (extremely large analytics or batch processing ) a "scale up" approach is more optimal. But the scale up is really limited to very specific workloads. Despite some assumptions, the gains made when moving from scale up to scale out are not linear. Obviously, when you scale out from a performance perspective you experience a drop in what a single unit of compute can do. Additionally, there will be latency introduced in the form of network overhead, transactions, and replication into operations that were previously done just bypassing object references within a single frame. Some applications or use cases will have to be architected or written differently (thinking about the high-demand analytic workloads at large scale). Remember the “grid computing” craze that hit us during the early part of this century? It was advantageous for many to distribute work across a grid of computing devices for applications but the advantage gained was contingent on the workload able to be parsed out as work units and then pulled back together through the application. There can be some interesting and negative consequences for analytics or batch operations in a large scale as mentioned above. Bottom line, as experienced previously with Microfocus mainframe ports to x86, the batch operations simply take much longer to complete. |
Big Data Considerations*:
|
Below is a summary of concerns regarding core mainframe skills:
|
The Challenge An aging workforce, specialized skills, and high salary expectations
The In-House Solution: Build your mentorship program to create a viable succession plan
|
Migrate to another platform |
Use a hosting provider |
Outsource |
Re-platform (cloud/vendors) |
Reinvest |
|---|---|---|---|---|
There are several challenges to overcome in a migration project, from finding an appropriate alternative platform to rewriting legacy code. Many organizations have incurred huge costs in the attempt, only to be unsuccessful in the end, so make this decision carefully. |
Organizations often have highly sensitive data on their mainframes (e.g. financial data), so many of these organizations are reluctant to have this data live outside of their four walls. However, the convenience of using a hosting provider makes this an attractive option to consider. |
The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house. |
A customer can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings |
If you’re staying with the mainframe and keeping it in-house, it’s important to continue to invest in this platform, keep it current, and look for opportunities to optimize its value. |
If this sounds like your organization, it’s time to do the analysis so you can decide and get clarity on the future of the mainframe in your organization.
|
*3 of the top 4 challenges related to shortfalls of alternative platforms
|
*Source: Maximize the Value of IBM Mainframes in My Business |
Potential for reduced costs
Reliable infrastructure and experienced staff
So, what are the risks?
The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house. The options here for the non-commodity (z/Series, IBM Power platforms, for example) are not as broad as with commodity server platforms. More confusingly, the term “outsourcing” for these can include: |
Traditional/Colocation – A customer transitions their hardware environment to a provider’s data center. The provider can then manage the hardware and “system.” Onsite Outsourcing – Here a provider will support the hardware/system environment at the client’s site. The provider may acquire the customer’s hardware and provide software licenses. This could also include hiring or “rebadging” staff supporting the platform. This type of arrangement is typically part of a larger services or application transformation. While low risk, it is not as cost-effective as other deployment models. Managed Hosting – A customer transitions their legacy application environment to an off-prem hosted multi-tenanted environment. It will provide the most cost savings following the transition, stabilization, and disposal of existing environment. Some providers will provide software licensing, and some will also support “Bring Your Own,” as permitted by IBM terms for example. |
Info-Tech Insight Technical debt for non-commodity platforms isn’t only hardware based. Moving an application written for the mainframe onto a “cheaper” hardware platform (or outsourced deployment) leaves the more critical problems and frequently introduces a raft of new ones. |
While the majority of the coded functionality (JCLs, programs, etc.) migrate easily, there will be a need to re-code or re-write objects – especially if any object, code, or location references are not exactly the same in the new environment. Micro Focus has solid experience in this but if consider it within the context of an 80/20 rule (the actual metrics might be much better than that), meaning that some level of rework would have to be accomplished as an overhead to the exercise. Build that thought into your thinking and business case. |
AWS Cloud
Azure Cloud
Micro Focus COBOL (Visual COBOL)
|
Yeah, a complication for this situation is the legacy code. While re-platforming/re-hosting non-COBOL code is not new, we have not had many member observations compared to the re-platforming/re-hosting of COBOL functionality initiatives. That being said, there are a couple of interesting opportunities to explore. |
NTT Data Services (GLOBAL)
ModernSystems (or ModSys) has relevant experience.
ATOS, as a hosting vendor mostly referenced by customers with global locations in a short-term transition posture, could be an option. Lastly, the other Managed Services vendors with NATURAL and Adabas capabilities: |
*92% of organizations that added capacity said TCO is lower than for commodity servers (compared to 50% of those who did not add capacity) |
*63% of organizations that added capacity said finding resources is not very difficult (compared to 42% of those who did not add capacity) |
![]() |
![]() |
| Temporary workaround. This would align with a technical solution allowing the VASM files to be accessed using platforms other than on mainframe hardware (Micro Focus or other file store trickery). This can be accomplished relatively quickly but does run the risk of technology obsolesce for the workaround at some point in the future. Bulk conversion. This method would involve the extract/transform/load of the historical records into the new application platform. Often the order of the conversion is completed on work newest to oldest (the idea is that the newest historical records would have the highest likelihood of an access need), but all files would be converted to the new application and the old data store destroyed. Forward convert, which would have files undergo the extract/transform/load conversion into the new application as they are accessed or reopened. This method would keep historical records indefinitely or until they are converted – or the legal retention schedule allows for their destruction (hopefully no file must be kept forever). This could be a cost-efficient approach since the historical files remaining on the VSAM platform would be shrunk over time based on demand from the district attorney process. The conversion process could be automated and scripted, with a QR step allowing for the records to be deleted from the old platform. |
Info-Tech Insight It is not usual for organizations to leverage options #2 and #3 above to move the functionality forward while containing the scope creep and costs for the data conversions. |
Note: Enterprise job scheduling is a topic with low member interest or demand. Since our published research is driven by members’ interest and needs, the lack of activity or member demand would obviously be a significant influence into our ability to aggregate shared member insight, trends, or best practices in our published agenda.
|
|
✓ Advanced Systems Concepts ✓ BMC ✓ Broadcom ✓ HCL ✓ Fortra |
✓ Redwood ✓ SMA Technologies ✓ StoneBranch ✓ Tidal Software ✓ Vinzant Software |
Creating vendor profiles will help quickly filter the solution providers that directly meet your z/Series needs.
ActiveBatch
| Workload Management: | ||
Summary Founded in 1981, ASCs ActiveBatch “provides a central automation hub for scheduling and monitoring so that business-critical systems, like CRM, ERP, Big Data, BI, ETL tools, work order management, project management, and consulting systems, work together seamlessly with minimal human intervention.”* URL Coverage: Global |
Amazon EC2 Hadoop Ecosystem IBM Cognos DataStage IBM PureData (Netezza) Informatica Cloud Microsoft Azure Microsoft Dynamics AX Microsoft SharePoint Microsoft Team Foundation Server |
Oracle EBS Oracle PeopleSoft SAP BusinessObjects ServiceNow Teradata VMware Windows Linux Unix IBM i |
*Advanced Systems Concepts, Inc.
Control-M
Workload Management: | ||
Summary Founded in 1980, BMCs Control-M product “simplifies application and data workflow orchestration on premises or as a service. It makes it easy to build, define, schedule, manage, and monitor production workflows, ensuring visibility, reliability, and improving SLAs.”* URL bmc.com/it-solutions/control-m.html Coverage: Global | AWS Azure Google Cloud Platform Cognos IBM InfoSphere DataStage SAP HANA Oracle EBS Oracle PeopleSoft BusinessObjects | ServiceNow Teradata VMware Windows Linux Unix IBM i IBM z/OS zLinux |
*BMC
Atomic Automation
Autosys Workload Automation
Workload Management: | ||
Summary Broadcom offers Atomic Automation and Autosys Workload Automation which ”gives you the agility, speed and reliability required for effective digital business automation. From a single unified platform, Atomic centrally provides the orchestration and automation capabilities needed accelerate your digital transformation and support the growth of your company.”* URL broadcom.com/products/software/automation/automic-automation broadcom.com/products/software/automation/autosys Coverage: Global
| Windows MacOS Linux UNIX AWS Azure Google Cloud Platform VMware z/OS zLinux System i OpenVMS Banner Ecometry | Hadoop Oracle EBS Oracle PeopleSoft SAP BusinessObjects ServiceNow Teradata VMware Windows Linux Unix IBM i |
Workload Automation
Workload Management: | |||
Summary “HCL Workload Automation streamlined modelling, advanced AI and open integration for observability. Accelerate the digital transformation of modern enterprises, ensuring business agility and resilience with our latest version of one stop automation platform. Orchestrate unattended and event-driven tasks for IT and business processes from legacy to cloud and kubernetes systems.”* URL hcltechsw.com/workload-automation Coverage: Global
| Windows MacOS Linux UNIX AWS Azure Google Cloud Platform VMware z/OS zLinux System i OpenVMS IBM SoftLayer IBM BigInsights | IBM Cognos Hadoop Microsoft Dynamics 365 Microsoft Dynamics AX Microsoft SQL Server Oracle E-Business Suite PeopleSoft SAP ServiceNow Apache Oozie Informatica PowerCenter IBM InfoSphere DataStage Salesforce BusinessObjects BI | IBM Sterling Connect:Direct IBM WebSphere MQ IBM Cloudant Apache Spark |
JAMS Scheduler
Workload Management: | ||
Summary Fortra’s “JAMS is a centralized workload automation and job scheduling solution that runs, monitors, and manages jobs and workflows that support critical business processes. JAMS reliably orchestrates the critical IT processes that run your business. Our comprehensive workload automation and job scheduling solution provides a single pane of glass to manage, execute, and monitor jobs—regardless of platforms or applications.”* URL Coverage: Global
| OpenVMS OS/400 Unix Windows z/OS SAP Oracle Microsoft Infor Workday AWS Azure Google Cloud Compute ServiceNow Salesforce | Micro Focus Microsoft Dynamics 365 Microsoft Dynamics AX Microsoft SQL Server MySQL NeoBatch Netezza Oracle PL/SQL Oracle E-Business Suite PeopleSoft SAP SAS Symitar |
*JAMS
Redwood SaaS
Workload Management: | ||
Summary Founded in 1993 and delivered as a SaaS solution, ”Redwood lets you orchestrate securely and reliably across any application, service or server, in the cloud or on-premises, all inside a single platform. Automation solutions are at the core of critical business operations such as forecasting, replenishment, reconciliation, financial close, order to cash, billing, reporting, and more. Enterprises in every industry — from manufacturing, utility, retail, and biotech to healthcare, banking, and aerospace.”* URL Coverage: Global
| OpenVMS OS/400 Unix Windows z/OS SAP Oracle Microsoft Infor Workday AWS Azure Google Cloud Compute ServiceNow Salesforce | Github Office 365 Slack Dropbox Tableau Informatica SAP BusinessObjects Cognos Microsoft Power BI Amazon QuickSight VMware Xen Kubernetes |
Robot Scheduler
Workload Management: | |
Summary “Robot Schedule’s workload automation capabilities allow users to automate everything from simple jobs to complex, event-driven processes on multiple platforms and centralize management from your most reliable system: IBM i. Just create a calendar of when and how jobs should run, and the software will do the rest.”* URL fortra.com/products/job-scheduling-software-ibm-i Coverage: Global
| IBM i (System i, iSeries, AS/400) AIX/UNIX Linux Windows SQL/Server Domino JD Edwards EnterpriseOne SAP Automate Schedule (formerly Skybot Scheduler) |
OpCon
Workload Management: | |||
Summary Founded in1980, SMA offers to “save time, reduce error, and free your IT staff to work on more strategic contributions with OpCon from SMA Technologies. OpCon offers powerful, easy-to-use workload automation and orchestration to eliminate manual tasks and manage workloads across business-critical operations. It's the perfect fit for financial institutions, insurance companies, and other transactional businesses.”* URL Coverage: Global | Windows Linux Unix z/Series IBM i Unisys Oracle SAP Microsoft Dynamics AX Infor M3 Sage Cegid Temenos | FICS Microsoft Azure Data Management Microsoft Azure VM Amazon EC2/AWS Web Services RESTful Docker Google Cloud VMware ServiceNow Commvault Microsoft WSUS Microsoft Orchestrator | Java JBoss Asysco AMT Tuxedo ART Nutanix Corelation Symitar Fiserv DNA Fiserv XP2 |
Universal Automation Center (UAC)
Workload Management: | |||
Summary Founded in 1999, ”the Stonebranch Universal Automation Center (UAC) is an enterprise-grade business automation solution that goes beyond traditional job scheduling. UAC's event-based workload automation solution is designed to automate and orchestrate system jobs and tasks across all mainframe, on-prem, and hybrid IT environments. IT operations teams gain complete visibility and advanced control with a single web-based controller, while removing the need to run individual job schedulers across platforms.”* URL stonebranch.com/it-automation-solutions/enterprise-job-scheduling Coverage: Global | Windows Linux Unix z/Series Apache Kafka AWS Databricks Docker GitHub Google Cloud Informatica | Jenkins Jscape Kubernetes Microsoft Azure Microsoft SQL Microsoft Teams PagerDuty PeopleSoft Petnaho RedHat Ansible Salesforce | SAP ServiceNow Slack SMTP and IMAP Snowflake Tableau VMware |
Workload Automation
Workload Management: | |||
Summary Founded in 1979, Tidal’s Workload Automation will “simplify management and execution of end-to-end business processes with our unified automation platform. Orchestrate workflows whether they're running on-prem, in the cloud or hybrid environments.”* URL Coverage: Global | CentOS Linux Microsoft Windows Server Open VMS Oracle Cloud Oracle Enterprise Linux Red Hat Enterprise Server Suse Enterprise Tandem NSK Ubuntu UNIX HPUX (PA-RISC, Itanium) Solaris (Sparc, X86) | AIX, iSeries z/Linux z/OS Amazon AWS Microsoft Azure Oracle OCI Google Cloud ServiceNow Kubernetes VMware Cisco UCS SAP R/3 & SAP S/4HANA Oracle E-Business | Oracle ERP Cloud PeopleSoft JD Edwards Hadoop Oracle DB Microsoft SQL SAP BusinessObjects IBM Cognos FTP/FTPS/SFTP Informatica |
Global ECS
Workload Management: | |
Summary Founded in 1987, Global ECS can “simplify operations in all areas of production with the GECS automation framework. Use a single solution to schedule, coordinate and monitor file transfers, database operations, scripts, web services, executables and SAP jobs. Maximize efficiency for all operations across multiple business units intelligently and automatically.”* URL Coverage: Global | Windows Linux Unix iSeries SAP R/3 & SAP S/4HANA Oracle, SQL/Server |
Activities:
This activity involves the following participants:
IT strategic direction decision makers
IT managers responsible for an existing z/Series platform
Organizations evaluating platforms for mission critical applications
Outcomes of this step:
This checkpoint process creates transparency around agreement costs with the business and gives the business an opportunity to re-evaluate its requirements for a potentially leaner agreement.
The Scale Up vs. Scale Out TCO Tool provides organizations with a framework for estimating the costs associated with purchasing and licensing for a scale-up and scale-out environment over a multi-year period. Use this tool to:
| ![]() |
Info-Tech InsightWatch out for inaccurate financial information. Ensure that the financials for cost match your maintenance and contract terms. | Use the Scale Up vs. Scale Out TCO Tool to determine your TCO options. |
Effectively Acquire Infrastructure Services
Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.
Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery
There are very few IT infrastructure components you should be housing internally – outsource everything else.
Build Your Infrastructure Roadmap
Move beyond alignment: Put yourself in the driver’s seat for true business value.
Make the most of cloud for your organization.
Drive consensus by outlining how your organization will use the cloud.
Build a Strategy for Big Data Platforms
Know where to start and where to focus attention in the implementation of a big data strategy.
Improve your RFPs to gain leverage and get better results.
![]() |
Darin Stahl, Principal Research Advisor, Info-Tech Research Group Darin is a Principal Research Advisor within the Infrastructure Practice, and leveraging 38+ years of experience, his areas of focus include: IT Operations Management, Service Desk, Infrastructure Outsourcing, Managed Services, Cloud Infrastructure, DRP/BCP, Printer Management, Managed Print Services, Application Performance Monitoring/ APM, Managed FTP, non-commodity servers (z/Series, mainframe, IBM i, AIX, Power PC). |
![]() |
Troy Cheeseman, Practice Lead, Info-Tech Research Group Troy has over 25 years of IT management experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT Operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) start-ups. |
“AWS Announces AWS Mainframe Modernization.” Business Wire, 30 Nov. 2021.
de Valence, Phil. “Migrating a Mainframe to AWS in 5 Steps with Astadia?” AWS, 23 Mar. 2018.
Graham, Nyela. “New study shows mainframes still popular despite the rise of cloud—though times are changing…fast?” WatersTechnology, 12 Sept. 2022.
“Legacy applications can be revitalized with API.” MuleSoft, 2022.
Vecchio, Dale. “The Benefits of Running Mainframe Applications on LzLabs Software Defined Mainframe® & Microsoft Azure.” LzLabs Sites, Mar. 2021.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the components of agility and what the optimal states are for service management agility.
Determine the current state of agility in the service management practice.
Create a roadmap for service management agility and present it to key stakeholders to obtain their support.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand agility and how it can complement service management.
Understand how the components of culture, structure, processes, and resources enable agility in service management.
Clear understanding of Agile principles.
Identifying opportunities for agility.
Understanding of how Agile principles align with service management.
1.1 Understand agility.
1.2 Understand how Agile methodologies can complement service management through culture, structure, processes, and resources.
Summary of Agile principles.
Summary of optimal components in culture, structure, processes, and resources that enable agility.
Assess your current organizational agility with respect to culture, structure, processes, and resources.
Identify your agility strengths and weaknesses with the agility score.
Understand your organization’s current enablers and constraints for agility.
Have metrics to identify strengths or weaknesses in culture, structure, processes, and resources.
2.1 Complete an agility assessment.
Assessment score of current state of agility.
Determine the gaps between the current and optimal states for agility.
Create a roadmap for service management agility.
Create a stakeholders presentation.
Have a completed custom roadmap that will help build sustainable agility into your service management practice.
Present the roadmap to key stakeholders to communicate your plans and get organizational buy-in.
3.1 Create a custom roadmap for service management agility.
3.2 Create a stakeholders presentation on service management agility.
Completed roadmap for service management agility.
Completed stakeholders presentation on service management agility.
Complication
Insights
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Reveal the opportunities to heighten the user experience of your website through a deep understanding of the behaviors, emotions, and needs of your end users in order to design a receptive and valuable website.
Design a satisfying and receptive website by leveraging industry best practices and modern UX trends and ensuring the website is supported with reliable and scalable data and infrastructure.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
List the business objectives of your website.
Describe your user personas, use cases, and user workflow.
Identify current UX issues through simulations, website design, and system reviews.
Strong understanding of the business goals of your website.
Knowledge of the behaviors and needs of your website’s users.
Realization of the root causes behind the UX issues of your website.
1.1 Define the business objectives for the website you want to optimize
1.2 Define your end-user personas and map them to use cases
1.3 Build your website user workflow
1.4 Conduct a SWOT analysis of your website to drive out UX issues
1.5 Gauge the UX competencies of your web development team
1.6 Simulate your user workflow to identify the steps driving down UX
1.7 Assess the composition and construction of your website
1.8 Understand the execution of your website with a system architecture
1.9 Pinpoint the technical reason behind your UX issues
1.10 Clarify and prioritize your UX issues
Business objectives
End-user personas and use cases
User workflows
Website SWOT analysis
UX competency assessment
User workflow simulation
Website design assessment
Current state of web system architecture
Gap analysis of web system architecture
Prioritized UX issues
Design wireframes and storyboards to be aligned to high priority use cases.
Design a web system architecture that can sufficiently support the website.
Identify UX metrics to gauge the success of the website.
Establish a website design process flow.
Implementation of key design elements and website functions that users will find stimulating and valuable.
Optimized web system architecture to better support the website.
Website design process aligned to your current context.
Rollout plan for your UX optimization initiatives.
2.1 Define the roles of your UX development team
2.2 Build your wireframes and user storyboards
2.3 Design the target state of your web environment
2.4 List your UX metrics
2.5 Draw your website design process flow
2.6 Define your UX optimization roadmap
2.7 Identify and engage your stakeholders
Roles of UX development team
Wireframes and user storyboards
Target state of web system architecture
List of UX metrics
List of your suppliers, inputs, processes, outputs, and customers
Website design process flow
UX optimization rollout roadmap
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the benefits of data valuation.
Learn about the data value chain framework and preview the step-by-step guide to start collecting data sources.
Mature your data valuation by putting in the valuation dimensions and metrics. Establish documented results that can be leveraged to demonstrate value in your data assets.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Explain data valuation approach and value proposition.
A clear understanding and case for data valuation.
1.1 Review common business data sources and how the organization will benefit from data valuation assessment.
1.2 Understand Info-Tech’s data valuation framework.
Organization data valuation priorities
Capture data sources and data collection methods.
A clear understanding of the data value chain.
2.1 Assess data sources and data collection methods.
2.2 Understand key insights and value proposition.
2.3 Capture data value chain.
Data Valuation Tool
Leverage the data valuation framework.
Capture key data valuation dimensions and align with data value chain.
3.1 Introduce data valuation framework.
3.2 Discuss key data valuation dimensions.
3.3 Align data value dimension to data value chain.
Data Valuation Tool
Improve organization’s data value.
Continue to improve data value.
4.1 Capture data valuation metrics.
4.2 Define data valuation for continuous monitoring.
4.3 Create a communication plan.
4.4 Define a plan for continuous improvements.
Data valuation metrics
Data Valuation Communication Plan
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Start by documenting your recovery workflow. Create supporting documentation in the form of checklists, flowcharts, topology diagrams, and contact lists. Finally, summarize your DR capabilities in a DRP Summary Document for stakeholders and auditors.
Select criteria for assessing DRP tools, and evaluate whether a business continuity management tool, document management solution, wiki site, or manually distributing documentation is best for your DR team.
Learn how to integrate DRP maintenance into core IT processes, and learn what to look for during testing and during annual reviews of your DRP.
Model your DRP after the XMPL case study disaster recovery plan documentation.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Teach your team how to create visual-based documentation.
Learn how to create visual-based DR documentation.
1.1 Conduct a table-top planning exercise.
1.2 Document your high-level incident response plan.
1.3 Identify documentation to include in your playbook.
1.4 Create an initial collection of supplementary documentation.
1.5 Discuss what further documentation is necessary for recovering from a disaster.
1.6 Summarize your DR capabilities for stakeholders.
Documented high-level incident response plan
List of documentation action items
Collection of 1-3 draft checklists, flowcharts, topology diagrams, and contact lists
Action items for ensuring that the DRP is executable for both primary and backup DR personnel
DRP Summary Document
Learn the considerations for publishing your DRP.
Identify the best strategy for publishing your DRP.
2.1 Select criteria for assessing DRP tools.
2.2 Evaluate categories for DRP tools.
Strategy for publishing DRP
Address the common pain point of unmaintained DRPs.
Create an approach for maintaining your DRP.
3.1 Alter your project intake considerations.
3.2 Integrate DR considerations into change management.
3.3 Integrate documentation into performance measurement and performance management.
3.4 Learn best practices for maintaining your DRP.
Project Intake Form Addendum Template
Change Management DRP Checklist Template
“This blueprint outlines the following key tactics to streamline your documentation effort and produce a better result:
Missing a component? Start here. ➔ Create a Right-Sized Disaster Recovery Plan
This blueprint walks you through building these inputs.
Our approach saves clients on average US$16,825.22. (Clients self-reported an average saving of US$16,869.21 while completing the Create a Right-Sized Disaster Recovery Plan blueprint through advisory calls, guided implementations, or workshops (Info-Tech Research Group, 2017, N=129).)
The impact of downtime increases significantly over time, not just in terms of lost revenue (as illustrated here) but also goodwill/reputation and health/safety. An effective DR solution and overall resiliency that mitigate a wide range of potential outages are critical to minimizing the impact of downtime.
Without an effective DRP, your organization is gambling on being able to define and implement a recovery strategy during a time of crisis. At the very least, this means extended downtime – potentially weeks – and substantial impact.
Why are so many living with either an incomplete or ineffective DRP? For the same reasons that IT documentation in general continues to be a pain point:
![]() (Source: Info-Tech Research Group, N=165) |
![]() (Source: Info-Tech Research Group, N=69 (includes only those who indicated DRP is mostly completed or completed)) |
If you need a three-inch binder to hold your DRP, imagine having to flip through it to determine next steps during a crisis.
DR documentation needs to be concise, scannable, and quickly understood to be effective. Visual-based documentation meets these requirements, so it’s no surprise that it also leads to higher DR success.
DR success scores are based on:
(Source: Info-Tech Research Group, N=95)
“Without question, 300-page DRPs are not effective. I mean, auditors love them because of the detail, but give me a 10-page DRP with contact lists, process flows, diagrams, and recovery checklists that are easy to follow.” (Bernard Jones, MBCI, CBCP, CORP, Manager Disaster Recovery/BCP, ActiveHealth Management)
| Organizations using a visual-based approach were 30% more likely to find that DR documentation is easy to maintain. | ➔ | “Easy to maintain” leads to a 46% higher rate of DR success. |
|
||
Not only are visual-based disaster recovery plans more effective, but they are also easier to maintain.
Recovery Workflow: Starting the project with overly detailed documentation can slow down the entire process. Overcome planning inertia by starting with high-level incident response plans in a flowchart format. For examples and additional information, see XMPL Medical’s Recovery Workflows.
Recovery Procedures (Systems Recovery Playbook): For each step in the high-level flowchart, create recovery procedures where necessary using additional flowcharts, checklists, and diagrams as appropriate. Leverage Info-Tech’s Systems Recovery Playbook example as a starting point.
Additional Reference Documentation: Reference existing IT documentation, such as network diagrams and configuration documents, as well as more detailed step-by-step procedures where necessary (e.g. vendor documentation), particularly where needed to support alternate recovery staff who may not be as well versed as the primary system owners.
Organizations that use flowcharts, checklist, and diagrams over traditional, dense DRP manuals are far more likely to meet their RTOs/RPOs because their documentation is more usable and easier to maintain.
Phases |
Phase 1: Streamline DRP documentation | Phase 2: Select the optimal DRP publishing strategy | Phase 3: Keep your DRP relevant through maintenance best practices | |||
Phases |
1.1 |
Start with a recovery workflow |
2.1 |
Decide on a publishing strategy |
3.1 |
Incorporate DRP maintenance into core IT processes |
1.2 |
Create supporting DRP documentation |
3.2 |
Conduct an annual focused review | |||
1.3 |
Write the DRP Summary | |||||
Tools and Templates |
End-to-End Sample DRP | DRP Publishing Evaluation Tool | Project In-take/Request Form
Change Management Checklist |
|||
Streamline your documentation and maintenance process by following the approach outlined in XMPL Medical’s journey to an end-to-end DRP.
XMPL’s disaster recovery plan includes its business impact analysis and a subset of tier 1 and tier 2 patient care applications.
Its DRP includes incident response flowcharts, system recovery checklists, and a communication plan. Its DRP also references IT operations documentation (e.g. asset management documents, system specs, and system configuration docs), but this material is not published with the example documentation.
XMPL’s DRP includes actionable documents in the form of high-level disaster response plan flowcharts and system recovery checklists. During an incident, the DR team is able to clearly see the items for which they are responsible.
XMPL Medical’s disaster recovery plan illustrates an effective DRP. Model your end-to-end disaster recovery plan after XMPL’s completed templates. The specific data points will differ from organization to organization, but the structure of each document will be similar.
Recovery Workflow:
Recovery Procedures (Systems Recovery Playbook):
Additional Reference Documentation:
Use Info-Tech’s DRP Maturity Scorecard to evaluate your progress
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
| 1. Streamline DRP Documentation | 2. Select the Optimal DRP Publishing Strategy | 3. Keep Your DRP Relevant | |
|---|---|---|---|
![]() Best-Practice Toolkit |
1.1 Start with a recovery workflow 1.2 Create supporting DRP documentation 1.3 Write the DRP summary |
2.1 Create Committee Profiles |
3.1 Build Governance Structure Map 3.2 Create Committee Profiles |
| Guided Implementations |
|
|
|
Onsite Workshop |
Module 1:
Streamline DRP documentation |
Module 2:
Select the optimal DRP publishing strategy |
Module 3:
Learn best practices for keeping your DRP relevant |
Phase 1 Outcome:
|
Phase 2 Outcome:
|
Phase 3 Outcome:
|
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | Workshop Day 5 Info-Tech Analysts Finalize Deliverables |
|
|---|---|---|---|---|---|
| Activities |
Assess DRP Maturity and Review Current Capabilities0.1 Assess current DRP maturity through Info-Tech’s Maturity Scorecard. 0.2 Identify the IT systems that support mission-critical business activities, and select 2 or 3 key applications to be the focus of the workshop. 0.3 Identify current recovery strategies for selected applications. 0.4 Identify current DR challenges for selected applications. |
Document Your Recovery Workflow1.1 Create a recovery workflow: review tabletop planning, walk through DR scenarios, identify DR gaps, and determine how to fill them. |
Create Supporting Documentation1.2 Create supporting DRP documentation. 1.3 Write the DRP summary. |
Establish a DRP Publishing, Management, and Maintenance Strategy2.1 Decide on a publishing strategy. 3.1 Incorporate DRP maintenance into core IT. 3.2 Considerations for reviewing your DRP regularly. |
|
| Deliverables |
|
|
|
|
Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.
This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.
This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.
PHASE 1 |
PHASE 2 |
PHASE 3 |
|||
| 1.1 | 1.2 | 1.3 | 2.1 | 3.1 | 3.2 |
| Start with a Recovery Workflow | Create Supporting Documentation | Write the DRP Summary | Select DRP Publishing Strategy | Integrate into Core IT Processes | Conduct an Annual Focused Review |
A DRP is a collection of procedures and supporting documents that allow an organization to recover its IT services to minimize system downtime for the business.
Recovery Workflow |
➔ |
The recovery workflow maps out the incident response plan from event detection, assessment, and declaration to systems recovery and validation. This documentation includes:
|
| Recovery Procedures (Playbook) | ||
| Additional Reference Documentation |
“We use flowcharts for our declaration procedures. Flowcharts are more effective when you have to explain status and next steps to upper management.” (Assistant Director-IT Operations, Healthcare Industry)
Specifically, review the following from your BIA:
CASE STUDY: The XMPL DRP documentation is based on this Business Impact Analysis Tool.
Info-Tech’s publication Create a Right-Sized Disaster Recovery Plan takes a very practical approach to BIA work. Our process gives IT leaders a mechanism to quickly get agreement on system recovery order and DR investment priorities.
1.1.1 Tabletop Planning Exercise
Note: You may have already completed this exercise as part of Create a Right-Sized Disaster Recovery Plan.
Use scenarios to provide context for DR planning, and to test your plans, but don’t create a separate plan for every possibility.
The high-level recovery plan will be the same whether the incident is a fire, flood, or tornado. While there might be some variances and outliers, these scenarios can be addressed by adding decision points and/or separate, supplementary instructions.
Note:
Note: You may have already completed this exercise as part of Create a Right-Sized Disaster Recovery Plan.
Use the sample DRP to guide your own flowchart. Some notes on the example are:
This sample flowchart is included in XMPL Recovery Workflows.
PHASE 1 | PHASE 2 | PHASE 3 | |||
| 1.1 | 1.2 | 1.3 | 2.1 | 3.1 | 3.2 |
| Start with a Recovery Workflow | Create Supporting Documentation | Write the DRP Summary | Select DRP Publishing Strategy | Integrate into Core IT Processes | Conduct an Annual Focused Review |
| Recovery Workflow |
Write your recovery procedures playbook to be effective and usable. Your playbook documentation should include:
Reference vendors’ technical information in your flowcharts and checklists where appropriate. |
|
Recovery Procedures (Playbook) |
➔ | |
Additional Reference Documentation |
➔ |
Write for your audience. The playbook is for IT; include only the information they need to execute the plan. DRP summaries are for executives and auditors; do not include information intended for IT. Similarly, your disaster recovery plan is not for business units; keep BCP content out of your DRP.
XMPL Medical used its high-level flowcharts as a roadmap for creating its Systems Recovery Playbook.
Included in the XMPL Systems Recovery Playbook are checklists for recovering XMPL’s virtual desktop infrastructure, mission-critical applications, and core infrastructure components.
Included in the XMPL DR documentation is an example flowchart for recovering phone systems. This flowchart is in Recovery Workflows.
Reference this blueprint for more SOP flowchart examples: Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind
“Our network engineers came to me and said our standard SOP template didn't work for them. They're now using a lot of diagrams and flowcharts, and that has worked out better for them.” (Assistant Director-IT Operations, Healthcare Industry)
You can download a PDF and a VSD version of these Data Center and Network Diagrams from Info-Tech’s website.
Many DR managers have their team on speed dial. However, having the contact info of alternate staff, BCP leads, and vendors can be very helpful during a disaster. XMPL Medical lists the following information in its DRP Workbook:
DISCUSS: Is there enough information in your DRP for both primary and backup DR personnel?
PHASE 1 | PHASE 2 | PHASE 3 | |||
| 1.1 | 1.2 | 1.3 | 2.1 | 3.1 | 3.2 |
| Start with a Recovery Workflow | Create Supporting Documentation | Write the DRP Summary | Select DRP Publishing Strategy | Integrate into Core IT Processes | Conduct an Annual Focused Review |
1.3.1 DRP Summary Document
XMPL’s DRP Summary is organized into the following categories:
| Application tier | Desired RTO (hh:mm) | Desired RPO (hh:mm) | Achievable RTO (hh:mm) | Achievable RPO (hh:mm) |
| Tier 1 | 4:00 | 1:00 | *90:00 | 1:00 |
| Tier 2 | 8:00 | 1:00 | *40:00 | 1:00 |
| Tier 3 | 48:00 | 24:00 | *96:00 | 24:00 |
The above table to is a snippet from the XMPL DR Summary Document (section 2.1.3.2).
In the example, the DR team is unable to recover tier 1, 2, and 3 systems within the desired RTO. As such, they clearly communicate this information in the DRP summary, and include action items to address these gaps.
PHASE 1 | PHASE 2 | PHASE 3 | |||
| 1.1 | 1.2 | 1.3 | 2.1 | 3.1 | 3.2 |
| Start with a Recovery Workflow | Create Supporting Documentation | Write the DRP Summary | Select DRP Publishing Strategy | Integrate into Core IT Processes | Conduct an Annual Focused Review |
Diversify your publishing strategy to ensure you can access your DRP in a disaster. For example, if you are using a BCM tool or SharePoint Online as your primary documentation repository, also push the DRP to your DR team’s smartphones as a backup in case the disaster affects internet access.
| Portability/External Access: Assume your primary site is down and inaccessible. Can you still access your documentation? As shown in this chart, traditional strategies of either keeping a copy at another location (e.g. at the failover site) or with staff (e.g. on a USB drive) still dominate, but these aren’t necessarily the best options. | ➔ |
![]() Note: Percentages total more than 100% due to respondents using more than one portability strategy. (Source: Info-Tech Research Group, N=118) |
| Maintainability/Usability: How easy is it to create, update, and use the documentation? Is it easy to link to other documents as shown in the flowchart and checklist examples? Is there version control? Lack of version control can create a maintenance nightmare as well as issues in a crisis if staff are questioning whether they have the right version. | ||
| Cost/Effort: Is the cost and effort appropriate? For example, a large enterprise may need a formal solution (e.g. DRP tools or SharePoint), but the cost might be hard to justify for a smaller company. |
This section will review the following strategies, their pros and cons, and how they meet publishing and document management requirements:
The tool enables you to compare two possible solutions based on these key considerations discussed in this section:
The right choice will depend on factors such as current in-house tools, maturity around document management, the size of your IT department, and so on.
For example, a small shop may do very well with the USB drive strategy, whereas a multi-national company will need a more formal strategy to manage consistent DRP distribution.
The DRP Publishing and Management Solution Evaluation Tool helps you to evaluate the tools included in this section.
About this approach:
BCM tools are solutions that provide templates, tools, and document management to create BC and DR documentation.
The business case for a BCM tool is built by answering the following questions:
If you cannot get a satisfactory answer to each of these questions, then opt for an in-house solution.
“We explored a DRP tool, and it was something we might have used, but it was tens of thousands of pounds per year, so it didn’t stack up financially for us at all.” (Rik Toms, Head of Strategy – IP and IT, Cable and Wireless Communications)
About this approach:
DRPs and SOPs most often start as MS Office documents, even if there is a DRP tool available. For organizations that elect to bypass a formal DRP tool, and most do, the biggest gap they have to overcome is document management.
Many organizations are turning to SharePoint to meet this need. For those that already have SharePoint in place, it makes sense to further leverage SharePoint for DR documentation and day-to-day SOPs.
For SharePoint to be a practical solution, the documentation must still be accessible if the primary data center is down, e.g. by having redundant SharePoint instances at multiple in-house locations, or using a cloud-based SharePoint solution.
“Just about everything that a DR planning tool does, you can do yourself using homegrown solutions or tools that you're already familiar with such as Word, Excel, and SharePoint.” (Allen Zuk, President and CEO, Sierra Management Consulting)
About this approach:
Wiki sites are websites where users collaborate to create and edit the content. Wikipedia is an example.
While wiki sites are typically used for collaboration and dynamic content development, the traditional collaborative authoring model can be restricted to provide structure and an approval process.
Several tools are available to create and manage wiki sites (and other collaboration solutions), as outlined in the following research:
If your organization is not already using wiki sites, this technology can introduce a culture shock. Start slow by using a wiki site within a specific department or for a particular project. Then evaluate how well your staff adapt to this technology as well as its potential effectiveness in your organization. Refer to our collaboration strategy research for additional guidance.
About this approach:
With this strategy, your ERT and key IT staff keep a copy of your DRP and relevant documentation with them (e.g. on a USB drive). If the primary site experiences a major event, they have ready access to the documentation.
Fifty percent of respondents in our recent survey use this strategy. A common scenario is to use a shared network drive or a solution such as SharePoint as the master centralized repository, but distribute a copy to key staff.
This approach can have similar disadvantages as using hard copies. Ensuring the USB drives are up to date, and that all staff who might need access have a copy, can become a burdensome process. More often, USB drives are updated periodically, so there is the risk that the information will be out of date or incomplete.
About this approach:
Traditionally DRPs are printed and distributed to managers and/or kept in a central location at both the primary site and a secondary site. In addition, wallet cards are distributed that contain key information such as contact numbers.
A wallet card or even a few printed copies of your high-level DRP for general reference can be helpful, but paper is not a practical solution for your overall DR documentation library, particularly when you include SOPs for recovery procedures.
One argument in favor of paper is there is no dependency on power during a crisis. However, in a power outage, staff can use smartphones and potentially laptops (with battery power) to access electronically stored documentation to get through first response steps. In addition, your DR site should have backup power to be an appropriate recovery site.
The list is only a partial list of BCM tool vendors. The order in which vendors are presented, and inclusion in this list, does not represent an endorsement.
Through advisory services, workshops, and consulting engagements, we have created this BCM Tool Requirements List. The featured requirements includes the following categories:
This BCM Tool – RFP Selection Criteria can be appended to an RFP. You can leverage Info-Tech’s RFP Template if your organization does not have one.
As part of a consulting engagement, Info-Tech can write RFPs for BCM tools and provide a customized scoring tool based on your environment’s unique requirements.
PHASE 1 | PHASE 2 | PHASE 3 | |||
| 1.1 | 1.2 | 1.3 | 2.1 | 3.1 | 3.2 |
| Start with a Recovery Workflow | Create Supporting Documentation | Write the DRP Summary | Select DRP Publishing Strategy | Integrate into Core IT Processes | Conduct an Annual Focused Review |
Prioritize quick wins that will have large benefits. The advice presented in this section offers easy ways to help keep your DRP up to date. These simple solutions can save a lot of time and effort for your DRP team as opposed to more intricate changes to the processes above.
Assess how new projects impact service criticality and DR requirements upfront during project intake |
|
Note: The goal is not to make DR a roadblock, but rather to ensure project requirements will be met – including availability and DR requirements.
This Project Intake Form asks the submitter to fill out the availability and criticality requirements for the project.
Leverage your change management process to identify required DRP updates as they occur |
|
This template asks the submitter to fill out the availability and criticality requirements for the project.
For change management best practices beyond DRP considerations, please see Optimize Change Management.
Integrate documentation into performance measurement and performance management |
|
Why documentation is such a challenge |
How management can address these challenges |
| We all know that IT staff typically do not like to write documentation. That’s not why they were hired, and good documentation is not what gets them promoted. | Include documentation deliverables in your IT staff’s performance appraisal to stress the importance of ensuring documentation is up to date, especially where it might impact DR success. |
| Similarly, documentation is secondary to more urgent tasks. Time to write documentation is often not allocated by project managers. | Schedule time for developing documentation, just like any other project, or it won’t happen. |
| Writing manuals is typically a time-intensive task. | Focus on what is necessary for another experienced IT professional to execute the recovery. As discussed earlier, often a diagram or checklist is good enough and actually far more usable in a crisis. |
“Our directors and our CIO have tied SOP work to performance evaluations, and SOP status is reviewed during management meetings. People have now found time to get this work done.” (Assistant Director – IT Operations, Healthcare Industry)
PHASE 1 | PHASE 2 | PHASE 3 | |||
| 1.1 | 1.2 | 1.3 | 2.1 | 3.1 | 3.2 |
| Start with a Recovery Workflow | Create Supporting Documentation | Write the DRP Summary | Select DRP Publishing Strategy | Integrate into Core IT Processes | Conduct an Annual Focused Review |
Testing is a waste of time and resources if you do not fix what’s broken. Tabletop testing is effective at uncovering gaps in your DR processes, but if you don’t address those gaps, then your DRP will still be unusable in a disaster.
The COBIT 5 Enablers provide a foundation for this analysis. Consider:
COBIT 5 Enablers
What changes need to be reflected in your DRP?
Reference this blueprint for guidance on DRP testing plans: Reduce Costly Downtime Through DR Testing
Streamline your documentation and maintenance process by following the approach outlined in XMPL Medical’s journey to an end-to-end DRP.
XMPL’s disaster recovery plan includes its business impact analysis and a subset of tier 1 and tier 2 patient care applications.
Its DRP includes incident response flowcharts, system recovery checklists, and a communication plan. Its DRP also references IT operations documentation (e.g. asset management documents, system specs, and system configuration docs), but this material is not published with the example documentation.
XMPL’s DRP includes actionable documents in the form of high-level disaster response plan flowcharts and system recovery checklists. During an incident, the DR team is able to clearly see the items for which they are responsible.
XMPL Medical’s disaster recovery plan illustrates an effective DRP. Model your end-to-end disaster recovery plan after XMPL’s completed templates. The specific data points will differ from organization to organization, but the structure of each document will be similar.
Recovery Workflow:
Recovery Procedures (Systems Recovery Playbook):
Additional Reference Documentation:
Use our structure to create your practical disaster recovery plan.
Use visual-based documentation instead of a traditional DRP manual.
Create your DRP in layers to keep the work manageable.
Prioritize quick wins to make DRP maintenance easier and more likely to happen.
Knowledge Gained
Processes Optimized
Deliverables Completed
Client Project: Document and Maintain Your Disaster Recovery Plan
This project has the ability to fit the following formats:
Create a Right-Sized Disaster Recovery Plan
Close the gap between your DR capabilities and service continuity requirements.
Reduce Costly Downtime Through DR Testing
Improve the accuracy of your DRP and your team’s ability to efficiently execute recovery procedures through regular DR testing.
Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind
Go beyond satisfying auditors to drive process improvement, consistent IT operations, and effective knowledge transfer.
Prepare for a DRP Audit
Assess your current DRP maturity, identify required improvements, and complete an audit-ready DRP summary document.
A Structured Approach to Enterprise Risk Management (ERM) and the Requirements of ISO 31000. The Association of Insurance and Risk Managers, Alarm: The Public Risk Management Association, and The Institute of Risk Management, 2010.
“APO012: Manage Risk.” COBIT 5: Enabling Processes. ISACA, 2012.
Bird, Lyndon, Ian Charters, Mel Gosling, Tim Janes, James McAlister, and Charlie Maclean-Bristol. Good Practice Guidelines: A Guide to Global Good Practice in Business Continuity. Global ed. Business Continuity Institute, 2013.
COBIT 5: A Business Framework for the Governance and Management of Enterprise IT. ISACA, 2012.
“EDM03: Ensure Risk Optimisation.” COBIT 5: Enabling Processes. ISACA, 2012.
Risk Management. ISO 31000:2009.
Rothstein, Philip Jan. Disaster Recovery Testing: Exercising Your Contingency Plan. Rothstein Associates: 1 Oct. 2007.
Societal Security – Business continuity management systems – Guidance. ISO 22313:2012.
Societal Security – Business continuity management systems – Requirements. ISO 22301:2012.
Understanding and Articulating Risk Appetite. KPMG, 2008.
Addressing and managing critical negotiation elements helps:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Throughout this phase, ten essential negotiation elements are identified and reviewed.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Improve negotiation skills and outcomes.
Understand how to use the Info-Tech During Negotiations Tool.
A better understanding of the subtleties of the negotiation process and an identification of where the negotiation strategy can go awry.
The During Negotiation Tool will be reviewed and configured for the customer’s environment (as applicable).
1.1 Manage six key items during the negotiation process.
1.2 Set the right tone and environment for the negotiation.
1.3 Focus on improving three categories of intangibles.
1.4 Improve communication skills to improve negotiation skills.
1.5 Customize your negotiation approach to interact with different personality traits and styles.
1.6 Maximize the value of your discussions by focusing on seven components.
1.7 Understand the value of impasses and deadlocks and how to work through them.
1.8 Use concessions as part of your negotiation strategy.
1.9 Identify and defeat common vendor negotiation ploys.
1.10 Review progress and determine next steps.
Sample negotiation ground rules
Sample vendor negotiation ploys
Sample discussion questions and evaluation matrix
Attractive a target, I do not make, hmmm? Yoda-speak with a slightly inquisitive tone, indicating that he means the opposite. And many (small) business owners also feel they are no target. But 61% of SMBs were attacked already. And large corporations also still have a ways to go.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Determine the stakeholders for an IT department of a singular initiative.
Use the guidance of this section to analyze stakeholders on both a professional and personal level.
Use Info-Tech’s guiding principles of stakeholder management to direct how to best engage key stakeholders.
Use real-life experiences from Info-Tech’s analysts to understand how to use and apply stakeholder management techniques.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Begin the process by identifying your VMO’s ROI maturity level and which calculation components are most appropriate for your situation.
Set measurement baselines and goals for the next measurement cycle.
Measure the VMO's ROI and value created by the VMO’s efforts and the overall internal satisfaction with the VMO.
Report the results to key stakeholders and executives in a way that demonstrates the value added by the VMO to the entire organization.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine how you will measure the VMO’s ROI.
Focus your measurement on the appropriate activities.
1.1 Determine your VMO’s maturity level and identify applicable ROI measurement categories.
1.2 Review and select the appropriate ROI formula components for each applicable measurement category.
1.3 Compile a list of potential data sources, evaluate the viability of each data source selected, and assign data collection and analysis responsibilities.
1.4 Communicate progress and proposed ROI formula components to executives and key stakeholders for feedback and/or approval/alignment.
VMO ROI maturity level and first step of customizing the ROI formula components.
Second and final step of customizing the ROI formula components…what will actually be measured.
Viable data sources and assignments for team members.
A progress report for key stakeholders and executives.
Set baselines to measure created value against.
ROI contributions cannot be objectively measured without baselines.
2.1 Gather baseline data.
2.2 Calculate/set baselines.
2.3 Set SMART goals.
2.4 Communicate progress and proposed ROI formula components to executives and key stakeholders for feedback and/or approval/alignment.
Data to use for calculating baselines.
Baselines for measuring ROI contributions.
Value creation goals for the next measurement cycle.
An updated progress report for key stakeholders and executives.
Calculate the VMO’s ROI.
An understanding of whether the VMO is paying for itself.
3.1 Assemble the data and calculate the VMO’s ROI.
3.2 Organize the data for the reporting step.
The VMO’s ROI expressed in terms of how many times it pays for itself (e.g. 1X, 3X, 5X).
Determine which supporting data will be reported.
Report results to stakeholders.
Stakeholders understand the value of the VMO.
4.1 Create a reporting template.
4.2 Determine reporting frequency.
4.3 Decide how the reports will be distributed or presented.
4.4 Send out a draft report and update based on feedback.
A template for reporting ROI and supporting data.
A decision about quarterly or annual reports.
A decision regarding email, video, and in-person presentation of the ROI reports.
Final ROI reports.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Decide if an EA tool is needed in your organization and define the requirements of EA tool users.
Determine your organization’s preferences in terms of product capabilities and vendor characteristics.
Gather information on shortlisted vendors and make your final decision.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess the maturity of your existing change management practice and define the scope of change management for your organization.
Build your change management team and standardized process workflows for each change type.
Bookend your change management practice by standardizing change intake, implementation, and post-implementation activities.
Form an implementation plan for the project, including a metrics evaluation, change calendar inputs, communications plan, and roadmap.
[infographic]
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Discuss the existing challenges and maturity of your change management practice.
Build definitions of change categories and the scope of change management.
Understand the starting point and scope of change management.
Understand the context of change request versus other requests such as service requests, projects, and operational tasks.
1.1 Outline strengths and challenges
1.2 Conduct a maturity assessment
1.3 Build a categorization scheme
1.4 Build a risk assessment matrix
Change Management Maturity Assessment Tool
Change Management Risk Assessment Tool
Define roles and responsibilities for the change management team.
Develop a standardized change management practice for approved changes, including process workflows.
Built the team to support your new change management practice.
Develop a formalized and right-sized change management practice for each change category. This will ensure all changes follow the correct process and core activities to confirm changes are completed successfully.
2.1 Define the change manager role
2.2 Outline the membership and protocol for the Change Advisory Board (CAB)
2.3 Build workflows for normal, emergency, and pre-approved changes
Change Manager Job Description
Change Management Standard Operating Procedure (SOP)
Change Management Process Library
Create a new change intake process, including a new request for change (RFC) form.
Develop post-implementation review activities to be completed for every IT change.
Bookend your change management practice by standardizing change intake, implementation, and post-implementation activities.
3.1 Define the RFC template
3.2 Determine post-implementation activities
3.3 Build your change calendar protocol
Request for Change Form Template
Change Management Post-Implementation Checklist
Project Summary Template
Develop a plan and project roadmap for reaching your target for your change management program maturity.
Develop a communications plan to ensure the successful adoption of the new program.
A plan and project roadmap for reaching target change management program maturity.
A communications plan ready for implementation.
4.1 Identify metrics and reports
4.2 Build a communications plan
4.3 Build your implementation roadmap
Change Management Metrics Tool
Change Management Communications Plan
Change Management Roadmap Tool
Right-size IT change management practice to protect the live environment.
Change management (change enablement, change control) is a balance of efficiency and risk. That is, pushing changes out in a timely manner while minimizing the risk of deployment. On the one hand, organizations can attempt to avoid all risk and drown the process in rubber stamps, red tape, and bureaucracy. On the other hand, organizations can ignore process and push out changes as quickly as possible, which will likely lead to change related incidents and debilitating outages.
Right-sizing the process does not mean adopting every recommendation from best-practice frameworks. It means balancing the efficiency of change request fulfillment with minimizing risk to your organization. Furthermore, creating a process that encourages adherence is key to avoid change implementers from skirting your process altogether.
Benedict Chang, Research Analyst, Infrastructure and Operations, Info-Tech Research Group
Infrastructure and application change occurs constantly and is driven by changing business needs, requests for new functionality, operational releases and patches, and resolution of incidents or problems detected by the service desk.
IT managers need to follow a standard change management process to ensure that rogue changes are never deployed while the organization remains responsive to demand.
IT system owners often resist change management because they see it as slow and bureaucratic.
At the same time, an increasingly interlinked technical environment may cause issues to appear in unexpected places. Configuration management systems are often not kept up-to-date and do not catch the potential linkages.
Infrastructure changes are often seen as “different” from application changes and two (or more) processes may exist.
Info-Tech’s approach will help you:
Two goals of change management are to protect the live environment and deploying changes in a timely manner. These two may seem to sometimes be at odds against each other, but assessing risk at multiple points of a change’s lifecycle can help you achieve both.
Having a right-sized process is not enough. You need to build and communicate the process to gather adherence. The process is useless if stakeholders are not aware of it or do not follow it.

Of the eight infrastructure & operations processes measured in Info-Tech’s IT Management and Governance Diagnostic (MGD) program, change management has the second largest gap between importance and effectiveness of these processes.
Source: Info-Tech 2020; n=5,108 IT professionals from 620 organizations
“Why should I fill out an RFC when it only takes five minutes to push through my change?”
“We’ve been doing this for years. Why do we need more bureaucracy?”
“We don’t need change management if we’re Agile.”
“We don’t have the right tools to even start change management.”
“Why do I have to attend a CAB meeting when I don’t care what other departments are doing?”

“The scope of change management is defined by each organization…the purpose of change management is to maximize the number of successful service and product changes by ensuring that the risk have been properly assessed, authorizing changes to process, and managing the change schedule.” – ALEXOS Limited, ITIL 4
Building a unified process that oversees all changes to the technical environment doesn’t have to be burdensome to be effective. However, the process is a necessary starting point to identifying cross dependencies and avoiding change collisions and change-related incidents.
Simply asking, “What is the risk?” will result in subjective responses that will likely minimize the perceived risk. The level of due diligence should align to the criticality of the systems or departments potentially impacted by the proposed changes.
Change management in isolation will provide some stability, but maturing the process through service integrations will enable data-driven decisions, decrease bureaucracy, and enable faster and more stable throughput.
Change and DevOps tend to be at odds, but the framework does not have to change. Lower risk changes in DevOps are prime candidates for the pre-approved category. Much of the responsibility traditionally assigned to the CAB can be diffused throughout the software development lifecycle.
Look for these DevOps callouts throughout this storyboard to guide you along the implementation.

Business Benefits
IT satisfaction with change management will drive business satisfaction with IT. Once the process is working efficiently, staff will be more motivated to adhere to the process, reducing the number of unauthorized changes. As fewer changes bypass proper evaluation and testing, service disruptions will decrease and business satisfaction will increase.
Change management brings daily control over the IT environment, allowing you to review every relatively new change, eliminate changes that would have likely failed, and review all changes to improve the IT environment.
Change management planning brings increased communication and collaboration across groups by coordinating changes with business activities. The CAB brings a more formalized and centralized communication method for IT.
Request for change templates and a structured process result in implementation, test, and backout plans being more consistent. Implementing processes for pre-approved changes also ensures these frequent changes are executed consistently and efficiently.
Change management processes will give your organization more confidence through more accurate planning, improved execution of changes, less failure, and more control over the IT environment. This also leads to greater protection against audits.

Source: Info-Tech 2020; n=5,108 IT Professionals from 620 organizations
Of the eight infrastructure and operations processes measured in Info-Tech’s IT Management and Governance Diagnostic (MGD) program, change management consistently has the second largest gap between importance and effectiveness of these processes.
Info-Tech’s IT Management and Governance Diagnostic (MGD) program assesses the importance and effectiveness of core IT processes. Since its inception, the MGD has consistently identified change management as an area for immediate improvement.

Source: Info-Tech 2020; n=5,108 IT Professionals from 620 organizations
No importance: 1.0-6.9
Limited importance: 7.0-7.9
Significant importance: 8.0-8.9
Critical importance: 9.0-10.0
Not in place: n/a
Not effective: 0.0-4.9
Somewhat Ineffective: 5.0-5.9
Somewhat effective: 6.0-6.9
Very effective: 7.0-10.0
Which of these have you heard in your organization?
| Reality | |
|---|---|
| “It’s just a small change; this will only take five minutes to do.” | Even a small change can cause a business outage. That small fix could impact a large system connected to the one being fixed. |
| “Ad hoc is faster; too many processes slow things down.” | Ad hoc might be faster in some cases, but it carries far greater risk. Following defined processes keeps systems stable and risk-averse. |
| “Change management is all about speed.” | Change management is about managing risk. It gives the illusion of speed by reducing downtime and unplanned work. |
| “Change management will limit our capacity to change.” | Change management allows for a better alignment of process (release management) with governance (change management). |
Change Prioritization
Change Deployment
| 1. Define Change Management | 2. Establish Roles and Workflows | 3. Define the RFC and Post-Implementation Activities | 4. Measure, Manage, and Maintain | |
|---|---|---|---|---|
| Phase Steps |
1.1 Assess Maturity 1.2 Categorize Changes and Build Your Risk Assessment |
2.1 Determine Roles and Responsibilities 2.2 Build Core Workflows |
3.1 Design the RFC 3.2 Establish Post-Implementation Activities |
4.1 Identify Metrics and Build the Change Calendar 4.2 Implement the Project |
| Change Management Standard Operating Procedure (SOP) Change Management Project Summary Template | ||||
| Phase Deliverables |
|
|
|
|
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Document your normal, pre-approved, and emergency change lifecycles with the core process workflows .
Test Drive your impact and likelihood assessment questionnaires with the Change Management Risk Assessment Tool.
Summarize your efforts in the Optimize IT Change Management Improvement Initiative: Project Summary Template.
Record your action items and roadmap your steps to a mature change management process.
Document and formalize your process starting with the change management standard operating procedure (SOP).
Define Change Management
Establish Roles and Workflows
Define RFC and Post-Implementation Activities
Measure, Manage, and Maintain
A major technology company implemented change management to improve productivity by 40%. This case study illustrates the full scope of the project.
A large technology firm experienced a critical outage due to poor change management practices. This case study illustrates the scope of change management definition and strategy.
Ignorance of change management process led to a technology giant experiencing a critical cloud outage. This case study illustrates the scope of the process phase.
A manufacturing company created a makeshift CMDB in the absence of a CMDB to implement change management. This case study illustrates the scope of change intake.
A financial institution tracked and recorded metrics to aid in the success of their change management program. This case study illustrates the scope of the implementation phase.
| Guided Implementation | Measured Vale |
|---|---|
| Phase 1: Define Change Management |
|
|
Phase 2: Establish Roles and Workflows |
|
| Phase 3: Define the RFC and Post-Implementation Activities |
|
|
Phase 4: Measure, Manage, and Maintain |
|
| Total Savings | $10,800 |
Industry: Technology
Source: Daniel Grove, Intel
Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.
With close to 4,000 changes occurring each week, managing Intel’s environment is a formidable task. Before implementing change management within the organization, over 35% of all unscheduled downtime was due to errors resulting from change and release management. Processes were ad hoc or scattered across the organization and no standards were in place.
After a robust implementation of change management, Intel experienced a number of improvements including automated approvals, the implementation of a formal change calendar, and an automated RFC form. As a result, Intel improved change productivity by 40% within the first year of the program’s implementation.
Define Change Management
↓
Establish Roles and Workflows
↓
Define RFC and Post-Implementation Activities
↓
Measure, Manage, and Maintain
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
Diagnostics and consistent frameworks are used throughout all four options.
A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 8 to 12 calls over the course of 4 to 6 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
| Activities |
Define Change Management 1.1 Outline Strengths and Challenges 1.2 Conduct a Maturity Assessment 1.3 Build a Change Categorization Scheme 1.4 Build Your Risk Assessment |
Establish Roles and Workflows 2.1 Define the Change Manager Role 2.2 Outline CAB Protocol and membership 2.3 Build Normal Change Process 2.4 Build Emergency Change Process 2.5 Build Pre-Approved Change Process |
Define the RFC and Post-Implementation Activities 3.1 Create an RFC Template 3.2 Determine Post-Implementation Activities 3.3 Build a Change Calendar Protocol |
Measure, Manage, and Maintain 4.1 Identify Metrics and Reports 4.2 Create Communications Plan 4.3 Build an Implementation Roadmap |
Next Steps and Wrap-Up (offsite) 5.1 Complete in-progress deliverables from previous four days 5.2 Set up review time for workshop deliverables and to discuss next steps |
| Deliverables |
|
|
|
|
|
1.1 Assess Maturity
1.2 Categorize Changes and Build Your Risk Assessment
Establish Roles and Workflows
2.1 Determine Roles and Responsibilities
2.2 Build Core Workflows
Define the RFC and Post-Implementation Activities
3.1 Design the RFC
3.2 Establish Post-Implementation Activities
Measure, Manage, and Maintain
4.1 Identify Metrics and Build the Change Calendar
4.2 Implement the Project
This phase will guide you through the following steps:
This phase involves the following participants:
1.1.1 Outline the Organization’s Strengths and Challenges
1.1.2 Complete a Maturity Assessment
Step 1.1: Assess Maturity → Step 1.2: Categorize Changes and Build Your Risk Assessment
Ensure the Release Manager is present as part of your CAB. They can explain any change content or dependencies, communicate business approval, and advise the service desk of any defects.
As seen in the context diagram, change management interacts closely with many other IT processes including release management and configuration management (seen below). Ensure you delineate when these interactions occur (e.g. RFC updates and CMDB queries) and which process owns each task.

“With no controls in place, IT gets the blame for embarrassing outages. Too much control, and IT is seen as a roadblock to innovation.” – Anonymous, VP IT of a federal credit union
Download the Optimize IT Change Management Improvement Initiative: Project Summary Template
| Chaos | Reactive | Controlled |
Proactive | Optimized | |
|---|---|---|---|---|---|
| Change Requests | No defined processes for submitting changes | Low process adherence and no RFC form | RFC form is centralized and a point of contact for changes exists | RFCs are reviewed for scope and completion | RFCs trend analysis and proactive change exists |
| Change Review | Little to no change risk assessment | Risk assessment exists for each RFC | RFC form is centralized and a point of contact for changes exists | Change calendar exists and is maintained | System and component dependencies exist (CMDB) |
| Change Approval | No formal approval process exists | Approval process exists but is not widely followed | Unauthorized changes are minimal or nonexistent | Change advisory board (CAB) is established and formalized | Trend analysis exists increasing pre-approved changes |
| Post-Deployment | No post-deployment change review exists | Process exists but is not widely followed | Reduction of change-related incidents | Stakeholder satisfaction is gathered and reviewed | Lessons learned are propagated and actioned |
| Process Governance | Roles & responsibilities are ad hoc | Roles, policies & procedures are defined & documented | Roles, policies & procedures are defined & documented | KPIs are tracked, reported on, and reviewed | KPIs are proactively managed for improvement |
Reaching an optimized level is not feasible for every organization. You may be able to run a very good change management process at the Proactive or even Controlled stage. Pay special attention to keeping your goals attainable.
Download the Change Management Maturity Assessment Tool
Even Google isn’t immune to change-related outages. Plan ahead and communicate to help avoid change-related incidents
Industry: Technology
Source: The Register
As part of a routine maintenance procedure, Google engineers moved App Engine applications between data centers in the Central US to balance out traffic.
Unfortunately, at the same time that applications were being rerouted, a software update was in progress on the traffic routers, which triggered a restart. This temporarily diminished router capacity, knocking out a sizeable portion of Google Cloud.
The server drain resulted in a huge spike in startup requests, and the routers simply couldn’t handle the traffic.
As a result, 21% of Google App Engine applications hosted in the Central US experienced error rates in excess of 10%, while an additional 16% of applications experienced latency, albeit at a lower rate.
Thankfully, engineers were actively monitoring the implementation of the change and were able to spring into action to halt the problem.
The change was rolled back after 11 minutes, but the configuration error still needed to be fixed. After about two hours, the change failure was resolved and the Google Cloud was fully functional.
One takeaway for the engineering team was to closely monitor how changes are scheduled. Ultimately, this was the result of miscommunication and a lack of transparency between change teams.
1.2.1 Define What Constitutes a Change
1.2.2 Build a Change Categorization Scheme
1.2.3 Build a Classification Scheme to Assess Impact
1.2.4 Build a Classification Scheme to Define Likelihood
1.2.5 Evaluate and Adjust Your Risk Assessment Scheme
Step 1.1: Assess Maturity → Step 1.2: Categorize Changes and Build Your Risk Assessment
Successfully managed changes will optimize risk exposure, severity of impact, and disruption. This will result in the bottom-line business benefits of removal of risk, early realization of benefits, and savings of money and time.
80%
In organizations without formal change management processes, about 80% (The Visible Ops Handbook) of IT service outage problems are caused by updates and changes to systems, applications, and infrastructure. It’s crucial to track and systematically manage change to fully understand and predict the risks and potential impact of the change.
The core business of the enterprise or supporting functions may be affected.
If it’s for a local application, it’s a service request
It should usually impact more than a single user (in most cases).
Any impact on a business process is a change; adding a user or a recipient to a report or mailing list is not a change.
If it’s a new service, then it’s better described as a project.
It needs to be within the scope of IT for the change management process to apply.
As a general rule, if it takes longer than 40 hours of work to complete, it’s likely a project.
| Change | Service Request (User) | Operational Task (Backend) |
|---|---|---|
|
|
|
| Change | Project | Service Request (User) | Operational Task (Backend) | Release |
|---|---|---|---|---|
| Changing Configuration | ERP upgrade | Add new user | Delete temp files | Software release |
Download the Change Management Standard Operating Procedure (SOP).
In addition to assigning a category to each RFC based on risk assessment, each RFC should also be assigned a priority based on the impact of the change on the IT organization, in terms of the resources needed to effect the change.
Normal
Emergency
Pre-Approved
The majority of changes will be pre-approved or normal changes. Definitions of each category are provided on the next slide.
Info-Tech uses the term pre-approved rather than the ITIL terminology of standard to more accurately define the type of change represented by this category.
A potential fourth change category of expedited may be employed if you are having issues with process adherence or if you experience changes driven from outside change management’s control (e.g. from the CIO, director, judiciary, etc.) See Appendix I for more details.
Do not rush to designate changes as pre-approved. You may have a good idea of which changes may be considered pre-approved, but make sure they are in fact low-risk and well-documented before moving them over from the normal category.
| Pre-Approved | Normal | Emergency | |
|---|---|---|---|
| Definition |
|
|
|
| Trigger |
|
|
|
| Workflow |
|
|
|
| Approval |
|
|
|
Pay close attention to defining your pre-approved changes. They are going to be critical for running a smooth change management practice in a DevOps Environment
| Pre-Approved (AKA Standard) | Normal | Emergency |
|---|---|---|
|
Major
Medium
Minor
|
|
The following slides guide you through the steps of formalizing a risk assessment according to impact and likelihood:
Info-Tech Insight
All changes entail an additional level of risk. Risk is a function of impact and likelihood. Risk may be reduced, accepted, or neutralized through following best practices around training, testing, backout planning, redundancy, timing and sequencing of changes, etc.
How is risk rating determined?
Who determines priority?
How is risk rating used?
RFCs need to clearly identify the risk level of the proposed change. This can be done through statement of impact and likelihood (low/medium/high) or through pertinent questions linked with business rules to assess the risk.
Risk always has a negative impact, but the size of the impact can vary considerably in terms of cost, number of people or sites affected, and severity of the impact. Impact questions tend to be more objective and quantifiable than likelihood questions.

| Impact | ||||
|---|---|---|---|---|
| Weight | Question | High | Medium | Low |
| 15% | # of people affected | 36+ | 11-35 | <10 |
| 20% | # of sites affected | 4+ | 2-3 | 1 |
| 15% | Duration of recovery (minutes of business time) | 180+ | 30-18 | <3 |
| 20% | Systems affected | Mission critical | Important | Informational |
| 30% | External customer impact | Loss of customer | Service interruption | None |
| LIKELIHOOD | ||||
|---|---|---|---|---|
| Weight | Question | High | Medium | Low |
| 25% | Has this change been tested? | No | Yes | |
| 10% | Have all the relevant groups (companies, departments, executives) vetted the change? | No | Partial | Yes |
| 5% | Has this change been documented? | No | Yes | |
| 15% | How long is the change window? When can we implement? | Specified day/time | Partial | Per IT choice |
| 20% | Do we have trained and experienced staff available to implement this change? If only external consultants are available, the rating will be “medium” at best. | No | Yes | |
| 25% | Has an implementation plan been developed? | No | Yes | |
Download the Change Management Rick Assessment Tool.
| # |
Change Example |
Impact |
Likelihood |
Risk |
|
1 |
ERP change |
High |
Medium |
Major |
|
2 |
Ticket system go-live |
Medium |
Low |
Minor |
|
3 |
UPS replacement |
Medium |
Low |
Minor |
|
4 |
Network upgrade |
Medium |
Medium |
Medium |
|
5 |
AD upgrade |
Medium |
Low |
Minor |
|
6 |
High availability implementation |
Low |
Medium |
Minor |
|
7 |
Key-card implementation |
Low |
High |
Medium |
|
8 |
Anti-virus update |
Low |
Low |
Minor |
|
9 |
Website |
Low |
Medium |
Minor |
The company was planning to implement a CMDB; however, full implementation was still one year away and subject to budget constraints.
Without a CMDB, it would be difficult to understand the interdependencies between systems and therefore be able to provide notifications to potentially affected user groups prior to implementing technical changes.
This could have derailed the change management project.
An Excel template was set up as a stopgap measure until the full implementation of the CMDB. The template included all identified dependencies between systems, along with a “dependency tier” for each IT service.
Tier 1: The dependent system would not operate if the upstream system change resulted in an outage.
Tier 2: The dependent system would suffer severe degradation of performance and/or features.
Tier 3: The dependent system would see minor performance degradation or minor feature unavailability.
As a stopgap measure, the solution worked well. When changes ran the risk of degrading downstream dependent systems, the impacted business system owner’s authorization was sought and end users were informed in advance.
The primary takeaway was that a system to manage configuration linkages and system dependencies was key.
While a CMDB is ideal for this use case, IT organizations shouldn’t let the lack of such a system stop progress on change management.
Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.
Intel IT supports over 65,000 servers, 3.2 petabytes of data, over 70,000 PCs, and 2.6 million emails per day.
Intel’s change management program is responsible for over 4,000 changes each week.
Due to the sheer volume of change management activities present at Intel, over 35% of unscheduled outages were the result of changes.
Ineffective change management was identified as the top contributor of incidents with unscheduled downtime.
One of the major issues highlighted was a lack of process ownership. The change management process at Intel was very fragmented, and that needed to change.
Daniel Grove, Senior Release & Change Manager at Intel, identified that clarifying tasks for the Change Manager and the CAB would improve process efficiency by reducing decision lag time. Roles and responsibilities were reworked and clarified.
Intel conducted a maturity assessment of the overall change management process to identify key areas for improvement.
For running change management in DevOps environment, see Appendix II.
Define Change Management
1.1 Assess Maturity
1.2 Categorize Changes and Build Your Risk Assessment
Establish Roles and Workflows
2.1 Determine Roles and Responsibilities
2.2 Build Core Workflows
Define RFC and Post-Implementation Activities
3.1 Design the RFC
3.2 Establish Post-Implementation Activities
Measure, Manage, and Maintain
4.1 Identify Metrics and Build the Change Calendar
4.2 Implement the Project
This phase will guide you through the following steps:
This phase involves the following participants:
2.1.1 Capture Roles and Responsibilities Using a RACI Chart
2.1.2 Determine Your Change Manager’s Responsibilities
2.1.3 Define the Authority and Responsibilities of Your CAB
2.1.4 Determine an E-CAB Protocol for Your Organization
Step 2.1: Determine Roles and Responsibilities → Step 2.2: Build Core Workflows
This step involves the following participants:
| Change Management Tasks | Originator | System Owner | Change Manager | CAB Member | Technical SME | Service Desk | CIO/ VP IT | E-CAB Member |
|---|---|---|---|---|---|---|---|---|
| Review the RFC | C | C | A | C | R | C | R | |
| Validate changes | C | C | A | C | R | C | R | |
| Assess test plan | A | C | R | R | C | I | ||
| Approve the RFC | I | C | A | R | C | I | ||
| Create communications plan | R | I | A | I | I | |||
| Deploy communications plan | I | I | A | I | R | |||
| Review metrics | C | A | R | C | I | |||
| Perform a post implementation review | C | R | A | I | ||||
| Review lessons learned from PIR activities | R | A | C |
Info-Tech Best Practice
Some organizations will not be able to assign a dedicated Change Manager, but they must still task an individual with change review authority and with ownership of the risk assessment and other key parts of the process.
1.Using the previous slide, Info-Tech’s Change Manager Job Description, and the examples below, brainstorm responsibilities for the Change Manager.
2.Record the responsibilities in Section 3.2 of your Change Management SOP.
Change Manager: James Corey
Responsibilities
Download the Change Manager Job Description
See what responsibilities in the CAB’s process are already performed by the DevOps lifecycle (e.g. authorization, deconfliction etc.). Do not duplicate efforts.
Based on the core responsibilities you have defined, the CAB needs to be composed of a diverse set of individuals who provide quality:
| CAB Representation | Value Added | |
|---|---|---|
| Business Members |
|
|
| IT Operations Members |
|
|
| CAB Attendees |
|
|
Info-Tech Best Practice
Form a core CAB (members attend every week) and an optional CAB (members who attend only when a change impacts them or when they can provide value in discussions about a change). This way, members can have their voice heard without spending every week in a meeting where they do not contribute.
1.Using the previous slide and the examples below, list the authorities and responsibilities of your CAB.
2.Record the responsibilities in section 3.3.2 of your Change Management SOP and the Project Summary Template.
| CAP Authority | CAP Responsibilities |
|---|---|
|
|
Change owner conferences with E-CAB (best efforts to reach them) through email or messaging.
E-CAB members and business system owners are provided with change details. No decision is made without feedback from at least one E-CAB member.
If business continuity is being affected, the Change Manager has authority to approve change.
Full documentation of the change (a retroactive RFC) is done after the change and is then reviewed by the CAB.
Info-Tech Best Practice
Members of the E-CAB should be a subset of the CAB who are typically quick to respond to their messages, even at odd hours of the night.
Assemble E-CAB
Assess Change
Test (if Applicable)
Deploy Change
Create Retroactive RFC
Review With CAB
2.2.1 Build a CMDB-lite as a Reference for Requested Changes
2.2.2 Create a Normal Change Process
2.2.3 Create a Pre-Approved Change Process
2.2.4 Create an Emergency Change Process
Step 2.1: Determine Roles and Responsibilities → Step 2.2: Build Core Workflows
This step involves the following participants:
Supplier
Input
Process
Output
Customer
Metrics
Controls
Dependencies
RACI
Identify all components of the change.
Ask how changes will affect:
Frame the change from a business point of view to identify potential disruptions to business activities.
Your assessment should cover:
Each new change can impact the level of service available.
Examine the impact on:
Once risk has been assessed, resources need to be identified to ensure the change can be executed.
These include:
| System | Primary Users | SME | Backup SME(s) | Business System Owner | Tier 1 Dependency (system functionality is down) | Tier 2 (impaired functionality/ workaround available) | Tier 3 Dependency (nice to have) |
|---|---|---|---|---|---|---|---|
| Enterprise | Naomi | Amos | James |
|
|
||
| Conferencing Tool | Enterprise | Alex | Shed | James |
|
|
|
| ITSM (Service Now) | Enterprise (Intl.) | Anderson | TBD | Mike |
|
|
|
| ITSM (Manage Engine) | North America | Bobbie | Joseph | Mike |
|
|
Info-Tech Best Practice
Define a list pre-approved changes and automate them (if possible) using your ITSM solution. This will save valuable time for more important changes in the queue.
Example:
| Change Category | Change Authority |
|---|---|
| Pre-approved change | Department head/manager |
| Emergency change | E-CAB |
| Normal change – low and medium risk | CAB |
| Normal change – high risk | CAB and CIO (for visibility) |
Change initiation allows for assurance that the request is in scope for change management and acts as a filter for out-of-scope changes to be redirected to the proper workflow. Initiation also assesses who may be assigned to the change and the proper category of the change, and results in an RFC to be populated before the change reaches the build and test phase.

The change trigger assessment is critical in the DevOps lifecycle. This can take a more formal role of a technical review board (TRB) or, with enough maturity, may be automated. Responsibilities such as deconfliction, dependency identification, calendar query, and authorization identification can be done early in the lifecycle to decrease or eliminate the burden on CAB.
For the full process, refer to the Change Management Process Library.

For the full process, refer to the Change Management Process Library.

For the full process, refer to the Change Management Process Library.

For the full process, refer to the Change Management Process Library.
Download the Change Management Process Library.
Info-Tech Best Practice
At the beginning of a change management process, there should be few active pre-approved changes. However, prior to launch, you may have IT flag changes for conversion.

For the full process, refer to the Change Management Process Library.
Info-Tech Best Practice
Other reasons for moving a pre-approved change back to the normal category is if the change led to an incident during implementation or if there was an issue during implementation.
Seek new pre-approved change submissions. → Re-evaluate the pre-approved change list every 4-6 months.

For the full process, refer to the Change Management Process Library.
| Sample Change | Quick Check | Emergency? |
|---|---|---|
| Install the latest critical patches from the vendor. | Are the patches required to resolve or prevent an imminent critical incident? | No |
| A virus or worm invades the network and a patch is needed to eliminate the threat. | Is the patch required to resolve or prevent an imminent critical incident? | Yes |
Info-Tech Best Practice
Change requesters should be made aware that senior management will be informed if an emergency RFC is submitted inappropriately. Emergency requests trigger urgent CAB meetings, are riskier to deploy, and delay other changes waiting in the queue.

When building your emergency change process, have your E-CAB protocol from activity 2.1.4 handy.
For the full process, refer to the Change Management Process Library.
Industry: Technology
Source: Daniel Grove, Intel
Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.
Intel IT supports over 65,000 servers, 3.2 petabytes of data, over 70,000 PCs, and 2.6 million emails per day.
Intel’s change management program is responsible for over 4,000 changes each week.
Intel identified 37 different change processes and 25 change management systems of record with little integration.
Software and infrastructure groups were also very siloed, and this no doubt contributed to the high number of changes that caused outages.
The task was simple: standards needed to be put in place and communication had to improve.
Once process ownership was assigned and the role of the Change Manager and CAB clarified, it was a simple task to streamline and simplify processes among groups.
Intel designed a new, unified change management workflow that all groups would adopt.
Automation was also brought into play to improve how RFCs were generated and submitted.
Define Change Management
1.1 Assess Maturity
1.2 Categorize Changes and Build Your Risk Assessment
Establish Roles and Workflows
2.1 Determine Roles and Responsibilities
2.2 Build Core Workflows
Define the RFC and Post-Implementation Activities
3.1 Design the RFC
3.2 Establish Post-Implementation Activities
Measure, Manage, and Maintain
4.1 Identify Metrics and Build the Change Calendar
4.2 Implement the Project
This phase will guide you through the following activities:
This phase involves the following participants:
3.1.1 Evaluate Your Existing RFC Process
3.1.2 Build the RFC Form
Step 3.1: Design the RFC
Step 3.2: Establish Post-Implementation Activities
This step involves the following participants:
Info-Tech Insight
Keep the RFC form simple, especially when first implementing change management, to encourage the adoption of and compliance with the process.
Download the Request for Change Form Template.
Draft:
Technical Build:
CAB:
Complete:
Use the RFC to point to documentation already gathered in the DevOps lifecycle to cut down on unnecessary manual work while maintaining compliance.
Info-Tech Best Practice
Technical and SME contacts should be noted in each RFC so they can be easily consulted during the RFC review.
Industry: Technology
Source: Daniel Grove, Intel
Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.
Intel IT supports over 65,000 servers, 3.2 petabytes of data, over 70,000 PCs, and 2.6 million emails per day.
Intel’s change management program is responsible for over 4,000 changes each week.
One of the crucial factors that was impacting Intel’s change management efficiency was a cumbersome RFC process.
A lack of RFC usage was contributing to increased ad hoc changes being put through the CAB, and rescheduled changes were quite high.
Additionally, ad hoc changes were also contributing heavily to unscheduled downtime within the organization.
Intel designed and implemented an automated RFC form generator to encourage end users to increase RFC usage.
As we’ve seen with RFC form design, the UX/UI of the form needs to be top notch, otherwise end users will simply circumvent the process. This will contribute to the problems you are seeking to correct.
Thanks to increased RFC usage, Intel decreased emergency changes by 50% and reduced change-caused unscheduled downtime by 82%.
3.2.1 Determine When the CAB Would Reject Tested Changes
3.2.2 Create a Post-Implementation Activity Checklist
Step 3.1: Design RFC
Step 3.2: Establish Post-Implementation Activities
This step involves the following participants:
Possible reasons the CAB would reject a change include:
Info-Tech Best Practice
Many reasons for rejection (listed above) can be caught early on in the process during the technical review or change build portion of the change. The earlier you catch these reasons for rejection, the less wasted effort there will be per change.
| Sample RFC | Reason for CAP Rejection |
|---|---|
| There was a request for an update to a system that a legacy application depends on and only a specific area of the business was aware of the dependency. | The CAB rejects it due to the downstream impact. |
| There was a request for an update to a non-supported application, and the vendor was asking for a premium support contract that is very costly. | It’s too expensive to implement, despite the need for it. The CAB will wait for an upgrade to a new application. |
| There was a request to update application functionality to a beta release. | The risk outweighs the business benefits. |
The implementation phase is the final checkpoint before releasing the new change into your live environment. Once the final checks have been made to the change, it’s paramount that teams work together to transition the change effectively rather than doing an abrupt hand-off. This could cause a potential outage.
1.
Implement change →
2.
A backout plan needs to contain a record of the steps that need to be taken to restore the live environment back to its previous state and maintain business continuity. A good backout plan asks the following questions:
Notify the Service Desk
Disable Access
Conduct Checks
Enable User Access
Notify the Service Desk
Info-Tech Best Practice
As part of the backout plan, consider the turnback point in the change window. That is, the point within the change window where you still have time to fully back out of the change.
Update the service catalog with new information as a result of the implemented change.
Update new dependencies present as a result of the new change.
Add notes about any assets newly affected by changes.
Update your map based on the new change.
Update your technical documentation to reflect the changes present because of the new change.
Update your training documentation to reflect any information about how users interact with the change.
Info-Tech Best Practice
Review PIR reports at CAB meetings to highlight the root causes of issues, action items to close identified gaps, and back-up documentation required. Attach the PIR report to the relevant RFC to prevent similar changes from facing the same issues in the future.
| Frequency | Part of weekly review (IT team meeting) |
| Participants |
|
|
Categories under review |
Current deviations and action items from previous PIR:
|
| Output |
|
| Controls |
|
Download the Change Management Post-Implementation Checklist
Industry: Technology
Source: Jason Zander, Microsoft
In November 2014, Microsoft deployed a change intended to improve Azure storage performance by reducing CPU footprint of the Azure Table Front-Ends.
The deployment method was an incremental approach called “flighting,” where software and configuration deployments are deployed incrementally to Azure infrastructure in small batches.
Unfortunately, this software deployment caused a service interruption in multiple regions.
Before the software was deployed, Microsoft engineers followed proper protocol by testing the proposed update. All test results pointed to a successful implementation.
Unfortunately, engineers pushed the change out to the entire infrastructure instead of adhering to the traditional flighting protocol.
Additionally, the configuration switch was incorrectly enabled for the Azure Blob storage Front-Ends.
A combination of the two mistakes exposed a bug that caused the outage.
Thankfully, Microsoft had a backout plan. Within 30 minutes, the change was rolled back on a global scale.
It was determined that policy enforcement was not integrated across the deployment system. An update to the system shifted the process of policy enforcement from human-based decisions and protocol to automation via the deployment platform.
Defined PIR activities enabled Microsoft to take swift action against the outage and mitigate the risk of a serious outage.
Define Change Management
1.1 Assess Maturity
1.2 Categorize Changes and Build Risk Assessment
Establish Roles and Workflows
2.1 Determine Roles and Responsibilities
2.2 Build Core Workflows
Define RFC and Post-Implementation Activities
3.1 Design RFC
3.2 Establish post-implementation activities
Measure, Manage, and Maintain
4.1 Identify Metrics and Build the Change Calendar
4.2 Implement the Project
This phase will guide you through the following activities:
This phase involves the following participants:
4.1.1 Create an Outline for Your Change Calendar
4.1.2 Determine Metrics, Key Performance Indicators (KPIs), and Critical Success Factors (CSFs)
4.1.3 Track and Record Metrics Using the Change Management Metrics Tool
Step 4.1: Identify Metrics and Build the Change Calendar
Step 4.2: Implement the Project
This step involves the following participants:
“The one who has more clout or authority is usually the one who gets changes scheduled in the time frame they desire, but you should really be evaluating the impact to the organization. We looked at the risk to the business of not doing the change, and that’s a good way of determining the criticality and urgency of that change.” – Joseph Sgandurra, Director, Service Delivery, Navantis
Info-Tech Insight
Avoid a culture where powerful stakeholders are able to push change deployment on an ad hoc basis. Give the CAB the full authority to make approval decisions based on urgency, impact, cost, and availability of resources.
“Our mantra is to put it on the calendar. Even if it’s a preapproved change and doesn’t need a vote, having it on the calendar helps with visibility. The calendar is the one-stop shop for scheduling and identifying change dependencies.“ – Wil Clark, Director of Service and Performance Management, University of North Texas Systems
The change calendar is a critical pre-requisite to change management in DevOps. Use the calendar to be proactive with proposed implementation dates and deconfliction before the change is finished.
Info-Tech Insight
Start simple. Metrics can be difficult to tackle if you’re starting from scratch. While implementing your change management practice, use these three metrics as a starting point, since they correlate well with the success of change management overall. The following few slides provide more insight into creating metrics for your change process.
Purposely use SDLC and change lifecycle metrics to find bottlenecks and automation candidates.
Metrics are easily measured datapoints that can be pulled from your change management tool. Examples: Number of changes implemented, number of changes without incident.
Key Performance Indicators are metrics presented in a way that is easily digestible by stakeholders in IT. Examples: Change efficiency, quality of changes.
Critical Success Factors are measures of the business success of change management taken by correlating the CSF with multiple KPIs. Examples: consistent and efficient change management process, a change process mapped to business needs
| Metric/Report (by team) | Benefit |
|---|---|
| Total number of RFCs and percentages by category (pre-approved, normal, emergency, escalated support, expedited) |
|
| Pre-approved change list (and additions/removals from the list) | Workload and process streamlining (i.e. reduce “red tape” wherever possible) |
| Average time between RFC lifecycle stages (by service/application) | Advance planning for proposed changes |
| Number of changes by service/application/hardware class |
|
| Change triggers | Business- vs. IT-initiated change |
| Number of RFCs by lifecycle stage | Workload planning |
| List of incidents related to changes | Visible failures of the CM process |
| Percentage of RFCs with a tested backout/validation plan | Completeness of change planning |
| List of expedited changes | Spotlighting poor planning and reducing the need for this category going forward (“The Hall of Shame”) |
| CAB approval rate | Change coordinator alignment with CAB priorities – low approval rate indicates need to tighten gatekeeping by the change coordinator |
| Calendar of changes | Planning |
| Ref # | Metric |
|---|---|
|
M1 |
Number of changes implemented for a time period |
| M2 | Number of changes successfully implemented for a time period |
| M3 | Number of changes implemented causing incidents |
| M4 | Number of accepted known errors when change is implemented |
| M5 | Total days for a change build (specific to each change) |
| M6 | Number of changes rescheduled |
| M7 | Number of training questions received following a change |
| Ref# | KPI | Product |
|---|---|---|
| K1 | Successful changes for a period of time (approach 100%) | M2 / M1 x 100% |
| K2 | Changes causing incidents (approach 0%) | M3 / M1 x 100% |
| K3 | Average days to implement a change | ΣM5 / M1 |
| K4 | Change efficiency (approach 100%) | [1 - (M6 / M1)] x 100% |
| K5 | Quality of changes being implemented (approach 100%) | [1 - (M4 / M1)] x 100% |
| K6 | Change training efficiency (approach 100%) | [1 - (M7 / M1)] x 100% |
| Ref# | CSF | Indicator |
|---|---|---|
| C1 | Successful change management process producing quality changes | K1, K5 |
| C2 | Consistent efficient change process | K4, K6 |
| C3 | Change process maps to business needs | K5, K6 |
Info-Tech Best Practice
Make sure you’re measuring the right things and considering all sources of information. It’s very easy to put yourself in a position where you’re congratulating yourselves for improving on a specific metric such as number of releases per month, but satisfaction remains low.
Tracking the progress of metrics is paramount to the success of any change management process. Use Info-Tech’s Change Management Metrics Tool to record metrics and track your progress. This tool is intended to be a substitute for organizations who do not have the capability to track change-related metrics in their ITSM tool.
Download the Change Management Metrics Tool
Industry: Federal Credit Union (anonymous)
Source: Info-Tech Workshop
At this federal credit union, the VP of IT wanted a tight set of metrics to engage with the business, communicate within IT, enable performance management of staff, and provide visibility into workload demands, among other requirements.
The organization was suffering from “metrics fatigue,” with multiple reports being generated from all groups within IT, to the point that weekly/monthly reports were being seen as spam.
Stakeholders were provided with an overview of change management benefits and were asked to identify one key attribute that would be useful to their specific needs.
Metrics were designed around the stakeholder needs, piloted with each stakeholder group, fine-tuned, and rolled out.
Some metrics could not be automated off-the-shelf and were rolled out in a manual fashion. These metrics were subsequently automated and finally made available through a dashboard.
The business received clear guidance regarding estimated times to implement changes across different elements of the environment.
The IT managers were able to plan team workloads with visibility into upstream change activity.
Architects were able to identify vendors and systems that were the leading source of instability.
The VP of IT was able to track the maturity growth of the change management process and proactively engage with the business on identified hot spots.
4.2.1 Use a Communications Plan to Gain End User Buy-In
4.2.2 Create a Project Roadmap to Track Your Implementation Progress
Step 4.1: Identify Metrics and Build the Change Calendar
Step 3.2: Implement the Project
This step involves the following participants:
Change management provides value by promptly evaluating and delivering changes required by the business and by minimizing disruption and rework caused by failed changes. Communication of your new change management process is key. If people do not understand the what and why, it will fail to provide the desired value.
Info-Tech Best Practice
Gather feedback from end users about the new process: if the process is too bureaucratic, end users are more likely to circumvent it.
Info-Tech Insight
The success of change communication can be measured by monitoring the number of service desk tickets related to a change that was not communicated to users.
Why? What problems are you trying to solve?
What? What processes will it affect (that will affect me)?
Who? Who will be affected? Who do I go to if I have issues with the new process?
When? When will this be happening? When will it affect me?
How? How will these changes manifest themselves?
Goal? What is the final goal? How will it benefit me?
Info-Tech Insight
Pay close attention to the medium of communication. For example, stakeholders on their feet all day would not be as receptive to an email communication compared to those who primarily work in front of a computer. Put yourself into various stakeholders’ shoes to craft a tailored communication of change management.
| Group | Benefits | Impact | Method | Timeline |
|---|---|---|---|---|
| IT | Standardized change process | All changes must be reviewed and approved | Poster campaign | 6 months |
| End Users | Decreased wait time for changes | Formal process for RFCs | Lunch-and-learn sessions | 3 months |
| Business | Reduced outages | Increased involvement in planning and approvals | Monthly reports | 1 year |
Download the Change Management Communications Plan
Know your audience:
Info-Tech Insight
The support of senior executive stakeholders is critical to the success of your SOP rollout. Try to wow them with project benefits and make sure they know about the risks/pain points.
Download the Change Management Project Summary Template
Download the Change Management Roadmap Tool
Industry: Technology
Source: Daniel Grove, Intel
Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.
Intel IT supports over 65,000 servers, 3.2 petabytes of data, over 70,000 PCs, and 2.6 million emails per day.
Intel’s change management program is responsible for over 4,000 changes each week.
Intel had its new change management program in place and the early milestones planned, but one key challenge with any new project is communication.
The company also needed to navigate the simplification of a previously complex process; end users could be familiar with any of the 37 different change processes or 25 different change management systems of record.
Top-level buy-in was another concern.
Intel first communicated the process changes by publishing the vision and strategy for the project with top management sponsorship.
The CIO published all of the new change policies, which were supported by the Change Governance Council.
Intel cited the reason for success as the designation of a Policy and Guidance Council – a group designed to own communication and enforcement of the new policies and processes put in place.
You now have an outline of your new change management process. The hard work starts now for an effective implementation. Make use of the communications plan to socialize the new process with stakeholders and the roadmap to stay on track.
Remember as you are starting your implementation to keep your documents flexible and treat them as “living documents.” You will likely need to tweak and refine the processware and templates several times to continually improve the process. Furthermore, don’t shy away from seeking feedback from your stakeholders to gain buy-in.
Lastly, keep an eye on your progress with objective, data-driven metrics. Leverage the trends in your data to drive your decisions. Be sure to revisit the maturity assessment not only to measure and visualize your progress, but to gain insight into your next steps.
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic office in Toronto, Ontario, Canada to participate in an innovative onsite workshop.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Run through the change management maturity assessment with tailored commentary for each action item outlining context and best practices.
Build a normal change process using Info-Tech’s Change Management Process Library template with an analyst helping you to right size the process for your organization.
Improve customer service by driving consistency in your support approach and meeting SLAs.
Maintain both speed and control while improving the quality of deployments and releases within the infrastructure team.
Don’t let persistent problems govern your department.
AXELOS Limited. ITIL Foundation: ITIL 4th edition. TSO, 2019, pp. 118–120.
Behr, Kevin and George Spafford. The Visible Ops Handbook: Implementing ITIL in 4 Practical and Auditable Steps. IT Revolution Press. 2013.
BMC. “ITIL Change Management.” BMC Software Canada, 22 December 2016.
Brown, Vance. “Change Management: The Greatest ROI of ITIL.” Cherwell Service Management.
Cisco. “Change Management: Best Practices.” Cisco, 10 March 2008.
Grove, Daniel. “Case Study ITIL Change Management Intel Corporation.” PowerShow, 2005.
ISACA. “COBIT 5: Enabling Processes.” ISACA, 2012.
Jantti, M. and M. Kainulainen. “Exploring an IT Service Change Management Process: A Case Study.” ICDS 2011: The Fifth International Conference on Digital Society, 23 Feb. 2011.
Murphy, Vawns. “How to Assess Changes.” The ITSM Review, 29 Jan. 2016.
Nyo, Isabel. “Best Practices for Change Management in the Age of DevOps.” Atlassian Engineering, 12 May 2021.
Phillips, Katherine W., Katie A. Liljenquist, and Margaret A. Neale. “Better Decisions Through Diversity.” Kellogg Insight, 1 Oct. 2010.
Pink Elephant. “Best Practices for Change Management.” Pink Elephant, 2005.
Sharwood, Simon. “Google broke its own cloud by doing two updates at once.” The Register, 24 Aug. 2016.
SolarWinds. “How to Eliminate the No: 1 Cause of Network Downtime.” SolarWinds Tech Tips, 25 Apr. 2014.
The Stationery Office. “ITIL Service Transition: 2011.” The Stationary Office, 29 July 2011.
UCISA. “ITIL – A Guide to Change Management.” UCISA.
Zander, Jason. “Final Root Cause Analysis and Improvement Areas: Nov 18 Azure Storage Service Interruption.” Microsoft Azure: Blog and Updates, 17 Dec. 2014.
In many organizations, there are changes which may not fit into the three prescribed categories. The reason behind why the expedited category may be needed generally falls between two possibilities:

For the full process, refer to the Change Management Process Library.
The core tenets of change management still apply no matter the type of development environment an organization has. Changes in any environment carry risk of degrading functionality, and must therefore be vetted. However, the amount of work and rigor put into different stages of the change life cycle can be altered depending on the maturity of the development workflows. The following are several stage gates for change management that MUST be considered if you are a DevOps or Agile shop:
"Understand that process is hard and finding a solution that fits every need can be tricky. With this change management process we do not try to solve every corner case so much as create a framework by which best judgement can be used to ensure maximum availability of our platforms and services while still complying with our regulatory requirements and making positive changes that will delight our customers.“ -IT Director, Information Cybersecurity Organization
The core differences between an Agile or DevOps transition and a traditional approach are the restructuring and the team behind it. As a result, the stakeholders of change management must be onboard for the process to work. This is the most difficult problem to solve if it’s an issue, but open avenues of feedback for a process build is a start.
Automation comes in many forms and is well documented in many development workflows. Having automated signoffs for QA/security checks and stakeholders/cross dependency owner sign offs may not fully replace the CAB but can ease the burden on discussions before implementation.
Canary releases, phased releases, dark releases, and toggles are all options you can employ to reduce risk during a release. Furthermore, building in contingencies to the test/rollback plan decreases the risk of the change by decreasing the factor of likelihood.
Building change from the ground up doesn’t meant the process has to be fully fledged before launch. Iterative improvements are possible before achieving an optimal state. Having the proper metrics on the pain points and bottlenecks in the process can identify areas for automation and improvement.

... do as the gun runners? Or make out like bandits? You'd hope that companies dealing with lethal products have excellent standards regarding hiring people and internal processes.
Understand what your department’s purpose is through articulating its strategy in three steps:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Consider and record your department’s values, principles, orientation, and capabilities.
Define your department’s strategy through your understanding of your department combined with everything that you do and are working to do.
Communicate your department’s strategy to your key stakeholders.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand what makes up your application department beyond the applications and services provided.
Articulating your guiding principles, values, capabilities, and orientation provides a foundation for expressing your department strategy.
1.1 Identify your team’s values and guiding principles.
1.2 Define your department’s orientation.
A summary of your department’s values and guiding principles
A clear view of your department’s orientation and supporting capabilities
Lay out all the details that make up your application department strategy.
A completed application department strategy canvas containing everything you need to communicate your strategy.
2.1 Write your application department vision statement.
2.2 Define your application department goals and metrics.
2.3 Specify your department capabilities and orientation.
2.4 Prioritize what is most important to your department.
Your department vision
Your department’s goals and metrics that contribute to achieving your department’s vision
Your department’s capabilities and orientation
A prioritized roadmap for your department
Lay out your strategy’s communication plan.
Your application department strategy presentation ready to be presented to your stakeholders.
3.1 Identify your stakeholders.
3.2 Develop a communication plan.
3.3 Wrap-up and next steps
List of prioritized stakeholders you want to communicate with
A plan for what to communicate to each stakeholder
Communication is only the first step – what comes next?
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the fundamental concepts of smart contract technology and get buy-in from stakeholders.
Select a business process, create a smart contract logic diagram, and complete a smart contract use-case deliverable.
[infographic]
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Review blockchain basics.
Understand the fundamental concepts of smart contracts.
Develop smart contract use-case executive buy-in presentation.
Understanding of blockchain basics.
Understanding the fundamentals of smart contracts.
Development of an executive buy-in presentation.
1.1 Review blockchain basics.
1.2 Understand smart contract fundamentals.
1.3 Identify business challenges and smart contract benefits.
1.4 Create executive buy-in presentation.
Executive buy-in presentation
Brainstorm and select a business process to develop a smart contract use case around.
Generate a smart contract logic diagram.
Selected a business process.
Developed a smart contract logic diagram for the selected business process.
2.1 Brainstorm candidate business processes.
2.2 Select a business process.
2.3 Identify phases, actors, events, and transactions.
2.4 Create the smart contract logic diagram.
Smart contract logic diagram
Develop smart contract use-case diagrams for each business process phase.
Complete a smart contract use-case deliverable.
Smart contract use-case diagrams.
Smart contract use-case deliverable.
3.1 Build smart contract use-case diagrams for each phase of the business process.
3.2 Create a smart contract use-case summary diagram.
3.3 Complete smart contract use-case deliverable.
Smart contract use case
Review workshop week and lessons learned.
Develop an action plan to follow through with next steps for the project.
Reviewed workshop week with common understanding of lessons learned.
Completed an action plan for the project.
4.1 Review workshop deliverables.
4.2 Create action plan.
Smart contract action plan
We have over 45 fully detailed
and interconnected process guides
for you to improve your operations
Our practical guides help you to improve your operations
We have hundreds of practical guides, grouped in many processes in our model. You may not need all of them. I suggest you browse within the belo top-level categories below and choose where to focus your attention. And with Tymans Group's help, you can go one process area at a time.
If you want help deciding, please use the contact options below or click here.
Our research and guides are priced from €299,00
Tymans Group guidance and (online) consulting using both established and forward-looking research and field experience in our management domains.
Get both inputs, all of the Info-tech research (with cashback rebate), and Tymans Group's guidance.
Info-Tech offers a vast knowledge body, workshops, and guided implementations. You can buy Info-Tech memberships here at Tymans Group with cashback, reducing your actual outlay.
IT specialists often instinctively focus on technical issues, such as server failures or network problems, because they are trained to address the broken parts. However, it's important to consider the context in which these occur. But what if the real problem isn't just the part but the entire system it operates in?
I want you to take a step back and to stop thinking about your company as a collection of departments and IT systems. Start seeing it for what it truly is: a complex, living, breathing economic system. This isn't some academic analogy. It’s a powerful model that will change how you approach resilience.
An economic system involves production, resource allocation, and distribution of goods and services, which parallels how a company operates internally. It includes the combination of various departments, the people doing things, the business units, and even the decision-making steps that make up the economic structure of your company. Once you see this, you can never unsee it.
Let’s quickly demystify this. Forget textbooks and complex theories for a moment. Think about a national economy. It does three basic things:
Production: It makes things. Factories build cars, farms grow food, and programmers write software. This is the creation of value.
Resource Allocation: This process decides who gets what to make those things. Who gets the steel for the cars? The land for the farms? The funding for the software developers? These are all decisions about how to use scarce resources.
Distribution: This process gets the finished products to the people who need them. Cars go to importers, then dealerships then the customers, food goes to grocery stores, and software gets deployed to servers and then used by clients (in the general sense).
That's it. Production, allocation, distribution. Every economy, from a simple bartering tribe to the global financial market, operates on these principles. And so does your company.
Your company doesn't just “do work.” It produces, allocates, and distributes services in its own internal market (and eventually sells outside, otherwise… trouble).
The production is everywhere. The human resources department produces a “payroll service.” The sales department produces “revenue contracts.” And the IT department? It produces a vast array of services: “compute cycles,” “data storage,” “network connectivity,” and “application uptime.” These are the goods and services that every other part of the company consumes to do their jobs.
Resource allocation is the lifeblood of your corporate economy. It's the annual budgeting process, the project prioritization meetings, and the daily decisions managers make about where to assign their people. In IT, you are equally part of the allocation process. Most people get to decide at least what they will give priority to that day. Perhaps via the daily scrum or stand-up meetings. Perhaps during the review process. As a manager, when you approve a request for a new high-powered virtual machine for one team, you are making an economic choice. You are allocating a scarce resource that another team can no longer use. As a developer, when you decide that task X is now a higher priority than task Y, you make an economic decision to allocate yourself to task X. It's important to understand that there is an opportunity cost to every decision, whether you label it that way or not.
And distribution? That's how these services get to their “consumers.” It’s the internal platforms, the APIs that connect applications, the service desk that fulfills requests, the operations teams that update data via forms into databases, and even the reporting dashboards that deliver information. These are the supply chains and logistics networks of your company’s economy. The consumers are your clients, of course, but also every department that uses a service provided by another department.
The IT department plays a central role in the company's economy, akin to a central bank and infrastructure provider, by managing essential digital resources like compute, storage, and bandwidth. You control its supply and, through your decisions, influence its value. You also build and maintain the “roads” and “power grid”—the networks and platforms—that the entire corporate economy depends on to function.
This is where I feel it gets fascinating. When you start seeing your company as an economic system, your understanding of resilience deepens dramatically. You move beyond simply fixing broken things and start thinking about stabilizing a complex, interconnected market.
When a core database goes down, an engineer sees a technical failure. An economist sees a supply chain collapse. That database isn't just a box with blinking lights; it's a critical supplier of a raw material, namely data. Every single business process, application, and team that creates, updates or consumes that data is now starved of a resource they need to produce their own services. The failure cascades not just through technical dependencies but through economic dependencies. Seeing it this way forces you to ask better questions: Who are the biggest “consumers” of this data supplier? What is the total economic impact of this outage, not just the technical impact? This changes the incident's priority and your response strategy.
The traditional engineering approach to resilience is redundancy. If one server is important, have two. This is like a town having two power plants. It's a good start, but it's not true economic resilience. An economist would ask different questions. Can we diversify our suppliers? Can we re-route via another path? If our primary database provider fails, can we switch to a secondary one, even if it's slower or pricier for a short time? This is the principle of substitution. Can a business process continue to function in a degraded mode, producing a lower-quality “good” for a while instead of stopping completely? This is about economic adaptability, not just technical duplication.
You could take this even further and move into the realm of business continuity. Can your process work when your primary resource (the database) is not available? How would you redesign your process to work with an alternative solution? This thinking is at the heart of modern operational resilience regulations worldwide. Authorities are no longer just asking if your backups work; they're asking if your firm can fulfill its economic function in the face of severe adversity. They demand a clear grasp of your entire supply chain and a testable exit plan for critical suppliers, including cloud providers.
You see that this goes way beyond a failing-part view. It goes to the heart of the economic function of your company.
During a major incident, the incident commander is now no longer just a technical coordinator. You are the head of the “central bank” during a "market crash". Your job is to prevent a localized failure from causing a full-blown corporate recession. Think about your actions:
You allocate scarce capital (your top engineers' time) to the most critical problem. The economic cost is the non-delivery of any other product by those people.
You implement fiscal policy by prioritizing certain fixes over others to stimulate the quickest “economic” recovery.
You manage market confidence through clear, calm, and regular communication to stakeholders, preventing panic from spreading.
Each decision is an economic intervention designed to restore stability to the system. (If that is not the job description of a central banker, then I eat my hat.)
Side Note: I often see teams who are obsessed with their own service's uptime, their own local metrics. They proudly report “five nines” of availability, but they do not report on how their service is actually consumed or how critical it is to the company's overall economic output. They've optimized their own factory but don't disclose their output's need level to the company or that their occasional one-hour outage brings the entire company's main assembly line to a halt. Resilience is not about local optimization; it is about the stability of the entire economic system. A dashboard that lists teams in order of availability or whatever other metric is fine, but these numbers must be mapped against their economic relevance. Without the economic relevance weighting, you may be misallocating resources in areas that are not critical or sufficiently important.
This isn't just a theoretical exercise. You can apply this model today to make your organization stronger and yourself more effective to any employer or client.
First, map your economic flows. Go beyond standard architecture diagrams. Create maps that show how value and services are produced, distributed, and consumed across departments. Identify your most important “supply chains.” Ask business units what IT services are essential for their “production lines” and what the financial impact is when those services are unavailable. This gives you a heat map of economic risk.
Second, identify your single points of economic failure. In every economy, there are institutions that are “too big to fail.” What are yours? Is it a single authentication service? A legacy mainframe? A specific team of two people who know how a critical system works? These are the areas where a failure will cause a systemic crisis. They require more than just technical redundancy; they need deep, thoughtful resilience planning, including succession plans for people and substitution options for technology.
Finally, reframe your post-incident reviews. Stop just asking, “What broke and why?” Start asking, “Which economic activity was disrupted?” and “How did the disruption flow through the system?” This shifts the conversation from blaming a component or a team to understanding systemic weaknesses in your company's economy. The goal is not to find a guilty party but to identify where your internal market is fragile and how you can strengthen it with better “monetary policy” (resource allocation) or “infrastructure” (more robust platforms).
In another article, I mentioned that resilience is a mindset.
So what happens when this economic system becomes unstable?
These issues are typically considered failures and they manifest as irritations, perceived slowness and bugs, all the way to (regular) failures of a process or whole system.
If this broken economic system is allowed to remain unstable, people will adopt negative behaviors.
When “the government” (IT) fails to deliver, business teams take matters into their hands and start shadow IT. They may even purchase their own subscriptions.
In a stable economy, participants trust that resources will be available when needed, but in a broken system, that trust is gone and leads to the hoarding of assets. This may be visible in the requested need for time or even budget allocation. And that leads into protectionism where teams build walls around their data and systems.
When failures are common, the focus shifts from resolving the systemic problems to assigning blame for the specific symptom. This is akin to the breakdown of trade relations. The applications team blames the infrastructure team for slow servers. The infrastructure team blames the network team for latency. The network team blames the applications team for inefficient code. And around we go.
Taking it just that little step further: If people live in a failing state long enough, they lose hope. This is learned helplessness. Your most valuable “citizens”—your engineers and business users—become disengaged. They stop reporting bugs because they assume they will never be fixed. They stop suggesting process improvements because they believe their voice doesn't matter.
And lastly: In a functional system, there are clear processes for requesting services. In your broken economy, these official channels are considered worthless. The only way to get anything done is to generate a crisis. Escalation becomes the primary currency. People learn to bypass the ticketing system and send direct messages to senior leaders because they perceive that's the only way to get a response.
To break this cycle, you need to start small and use mechanisms that turn the negative effects of problems into positive effects, like seeing opportunities.
Proposing a grand vision will get you polite nods and zero action. I recommend you pick one irritation and fix it. Repeat multiple times until staff starts to perceive a change. Don't try to move the mountain. Remove the first obstacle and make your way up from there. This can be solving an issue, reducing an uncertainty, or actually spotting a way forward.
It will go easier as you continue this. Accept that on day one, your credibility is zero. It doesn’t matter whether you're a new manager or a seasoned expert. Trust is earned on the factory floor. Fix one small, nagging irritation for one person. Then another. This is how you build the political and social capital needed to tackle the mountain. It takes time.
But what will happen next is crucial. There will be a reduction of the negative behaviors. And when you work it efficiently with enough time, you will eliminate those behaviors. And yes, there will be many ifs and buts, and each of the broken elements of a larger chain may require their own solutions. But it is this act of seeing the bigger picture through the constituent parts that will allow you to assign priorities and move closer to the solution in a structural way.
Seeing step by step results feeds positivism and higher stability. Which in turn again feeds more positivism.
When you view your company through the lens of an economic system, it elevates the practice of resilience from a purely technical discipline to a value function. It gives you a language to communicate impact and risk to leadership in terms they understand: production, supply, and cost.
It forces you to see the interconnectedness of everything you do and to appreciate that the failure of a single, seemingly minor component can have large, cascading effects across the entire organization. By thinking like an economist, you stop being just a firefighter, putting out isolated blazes. You become the architect of a more stable, more robust, and ultimately more resilient economy.
You become the architect of a more stable, more robust, and ultimately more resilient economy. Now, go manage it.
Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build your IT steering committee charter using results from the stakeholder survey.
Define your high level steering committee processes using SIPOC, and select your steering committee metrics.
Customize Info-Tech’s stakeholder presentation template to gain buy-in from your key IT steering committee stakeholders.
Build the new project intake and prioritization process for your new IT steering committee.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Lay the foundation for your IT steering committee (ITSC) by surveying your stakeholders and identifying the opportunities and threats to implementing your ITSC.
An understanding of the business environment affecting your future ITSC and identification of strategies for engaging with stakeholders
1.1 Launch stakeholder survey for business leaders.
1.2 Analyze results with an Info-Tech advisor.
1.3 Identify opportunities and threats to successful IT steering committee implementation.
1.4 Develop the fit-for-purpose approach.
Report on business leader governance priorities and awareness
Refined workshop agenda
Define the goals and roles of your IT steering committee.
Plan the responsibilities of your future committee members.
Groundwork for completing the steering committee charter
2.1 Review the role of the IT steering committee.
2.2 Identify IT steering committee goals and objectives.
2.3 Conduct a SWOT analysis on the five governance areas
2.4 Define the key responsibilities of the ITSC.
2.5 Define ITSC participation.
IT steering committee key responsibilities and participants identified
IT steering committee priorities identified
Document the information required to create an effective ITSC Charter.
Create the procedures required for your IT steering committee.
Clearly defined roles and responsibilities for your steering committee
Completed IT Steering Committee Charter document
3.1 Build IT steering committee participant RACI.
3.2 Define your responsibility cadence and agendas.
3.3 Develop IT steering committee procedures.
3.4 Define your IT steering committee purpose statement and goals.
IT steering committee charter: procedures, agenda, and RACI
Defined purpose statement and goals
Define and test your IT steering committee processes.
Get buy-in from your key stakeholders through your stakeholder presentation.
Stakeholder understanding of the purpose and procedures of IT steering committee membership
4.1 Define your high-level IT steering committee processes.
4.2 Conduct scenario testing on key processes, establish ITSC metrics.
4.3 Build your ITSC stakeholder presentation.
4.4 Manage potential objections.
IT steering committee SIPOC maps
Refined stakeholder presentation
5.1 Create prioritization criteria
5.2 Customize the project prioritization tool
5.3 Pilot test the tool
5.4 Define action plan and next steps
IT Steering Committee Project Prioritization Tool
Action plan
Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee. These include:
Effective IT governance critical in driving business satisfaction with IT. Yet 88% of CIOs believe that their governance structure and processes are not effective. The IT steering committee (ITSC) is the heart of the governance body and brings together critical organizational stakeholders to enable effective decision making (Info-Tech Research Group Webinar Survey).
"Everyone needs good IT, but no one wants to talk about it. Most CFOs would rather spend time with their in-laws than in an IT steering-committee meeting. But companies with good governance consistently outperform companies with bad. Which group do you want to be in?"
– Martha Heller, President, Heller Search Associates
67% of CIOs/CEOs are misaligned on the target role for IT.
47% of CEOs believe that business goals are going unsupported by IT.
64% of CEOs believe that improvement is required around IT’s understanding of business goals.
28% of business leaders are supporters of their IT departments.
A well devised IT steering committee ensures that core business partners are involved in critical decision making and that decisions are based on business goals – not who shouts the loudest. Leading to faster decision-making time, and better-quality decisions and outcomes.
Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.
The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.
Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.
These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.
IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.
| Strategic | IT Steering Committee | |
| Tactical | Project Governance Service Governance Risk Governance Information Governance |
IT Management |
| Operational | Risk Task Force |
This blueprint focuses exclusively on building the IT steering committee. For more information on IT governance see Info-Tech’s blueprint Tailor an IT Governance Plan to Fit Organizational Needs.
| As CIO I find that there is a lack of alignment between business and IT strategies. |
| I’ve noticed that projects are thrown over the fence by stakeholders and IT is expected to comply. |
| I’ve noticed that IT projects are not meeting target project metrics. |
| I’ve struggled with a lack of accountability for decision making, especially by the business. |
| I’ve noticed that the business does not understand the full cost of initiatives and projects. |
| I don’t have the authority to say “no” when business requests come our way. |
| We lack a standardized approach for prioritizing projects. |
| IT has a bad reputation within the organization, and I need a way to improve relationships. |
| Business partners are unaware of how decisions are made around IT risks. |
| Business partners don’t understand the full scope of IT responsibilities. |
| There are no SLAs in place and no way to measure stakeholder satisfaction with IT. |
Info-Tech’s IT steering committee development blueprint will provide you with the required tools, templates, and deliverables to implement a right-sized committee that’s effective the first time.
| 1 | 2 | 3 | 4 |
| Build the Steering Committee Charter | Define ITSC Processes | Build the Stakeholder Presentation | Define the Prioritization Criteria |
|
|
|
|
| COBIT METRICS | Alignment
|
Accountability
|
Value Generation
|
| INFO-TECH METRICS | Survey Metrics:
|
Industry: Consumer Goods
Source: Interview
A newly hired CIO at a large consumer goods company inherited an IT department with low maturity from her predecessor. Satisfaction with IT was very low across all business units, and IT faced a lot of capacity constraints. The business saw IT as a bottleneck or red tape in terms of getting their projects approved and completed.
The previous CIO had established a steering committee for a short time, but it had a poorly established charter that did not involve all of the business units. Also the role and responsibilities of the steering committee were not clearly defined. This led the committee to be bogged down in politics.
Due to the previous issues, the business was wary of being involved in a new steering committee. In order to establish a new steering committee, the new CIO needed to navigate the bad reputation of the previous CIO.
The CIO established a new steering committee engaging senior members of each business unit. The roles of the committee members were clearly established in the new steering committee charter and business stakeholders were informed of the changes through presentations.
The importance of the committee was demonstrated through the new intake and prioritization process for projects. Business stakeholders were impressed with the new process and its transparency and IT was no longer seen as a bottleneck.
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Build the Steering Committee Charter | Define ITSC Processes | Build the Stakeholder Presentation | Define the Prioritization Criteria | |
|---|---|---|---|---|
| Best-Practice Toolkit | 1.1 Survey Your Steering Committee Stakeholders 1.2 Build Your ITSC Charter |
2.1 Build a SIPOC 2.2 Define Your ITSC Process |
3.1 Customize the Stakeholder Presentation | 4.1 Establish your Prioritization Criteria 4.2 Customize the Project Prioritization Tool 4.3 Pilot Test Your New Prioritization Criteria |
| Guided Implementations |
|
|
|
|
| Onsite Workshop | Module 1: Build a New ITSC Charter |
Module 2: Design Steering Committee Processes |
Module 3: Present the New Steering Committee to Stakeholders |
Module 4: Establish Project Prioritization Criteria |
Phase 1 Results:
|
Phase 2 Results:
|
Phase 3 Results:
|
Phase 4 Results:
|
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | Workshop Day 5 | |
|---|---|---|---|---|---|
| Activities | Build the IT Steering Committee 1.1 Launch stakeholder survey for business leaders 1.2 Analyze results with an Info-Tech Advisor 1.3 Identify opportunities and threats to successful IT steering committee implementation. 1.4 Develop the fit-for-purpose approach |
Define the ITSC Goals 2.1 Review the role of the IT steering committee 2.2 Identify IT steering committee goals and objectives 2.3 Conduct a SWOT analysis on the five governance areas 2.4 Define the key responsibilities of the ITSC 2.5 Define ITSC participation |
Define the ITSC Charter 3.1 Build IT steering committee participant RACI 3.2 Define your responsibility cadence and agendas 3.3 Develop IT steering committee procedures 3.4 Define your IT steering committee purpose statement and goals |
Define the ITSC Process 4.1 Define your high-level IT steering committee processes 4.2 Conduct scenario testing on key processes, establish ITSC metrics 4.3 Build your ITSC stakeholder presentation 4.4 Manage potential objections |
Define Project Prioritization Criteria 5.1 Create prioritization criteria 5.2 Customize the Project Prioritization Tool 5.3 Pilot test the tool 5.4 Define action plan and next steps |
| Deliverables |
|
|
|
|
|
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
|
Guided Implementation 1: Formalize the Security Policy Program Proposed Time to Completion: 1-2 weeks |
|---|
Select Your ITSC Members Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
|
Review Stakeholder Survey Results Review findings with analyst:
Then complete these activities…
With these tools & templates:
|
Finalize the ITSC Charter Finalize phase deliverable:
Then complete these activities…
With these tools & templates:
|
Be exclusive with your IT steering committee membership. Determine committee participation based on committee responsibilities. Select only those who are key decision makers for the activities the committee is responsible for and, wherever possible, keep membership to 5-8 people.
A charter is the organizational mandate that outlines the purpose, scope, and authority of the ITSC. Without a charter, the steering committee’s value, scope, and success criteria are unclear to participants, resulting in unrealistic stakeholder expectations and poor organizational acceptance.
Start by reviewing Info-Tech’s template. Throughout this section we will help you to tailor its contents.
Committee Purpose: The rationale, benefits of, and overall function of the committee.
Responsibilities: What tasks/decisions the accountable committee is making.
Participation: Who is on the committee
RACI: Who is accountable, responsible, consulted, and informed regarding each responsibility.
Committee Procedures and Agendas: Includes how the committee will be organized and how the committee will interact and communicate with business units.
IT Steering Committee Charter Template.">
Leverage Info-Tech’s IT Steering Committee Stakeholder Surveyand reports to quickly identify business priorities and level of understanding of how decisions are made around the five governance areas.
Use these insights to drive the IT steering committee responsibilities, participation, and communication strategy.
The Stakeholder Survey consists of 17 questions on:
To simplify your data collection and reporting, Info-Tech can launch a web-based survey, compile the report data and assist in the data interpretation through one of our guided implementations.
Also included is a Word document with recommended questions, if you prefer to manage the survey logistics internally.
IT Steering Committee Stakeholder Survey ">
understand how decisions around IT services are made (quality, availability, etc.). Two graphs are included in the screenshot. One of the bar graphs shows the satisfaction with the quality of decisions and transparency around IT services. The other bar graph displays IT decisions around service delivery and quality that involve the right people.">
You get:
So you can:
not understand how decisions around IT investments or project and service resourcing are made. Two bar graphs are displayed. One of the bar graphs shows the satisfaction with the quality of decisions made around IT investments. The other graph display IT decisions around spending priorities involving the right people.">
You get:
So you can:
INPUT
OUTPUT
Materials
Participants
Governance of risk establishes the risk framework, establishes policies and standards, and monitors risks.
Governance of risk ensures that IT is mitigating all relevant risks associated with IT investments, projects, and services.
Governance of the IT portfolio achieves optimum ROI through prioritization, funding, and resourcing.
PPM practices create value if they maximize the throughput of high-value IT projects at the lowest possible cost. They destroy value when they foster needlessly sophisticated and costly processes.
Governance of projects improves the quality and speed of decision making for project issues.
Don’t confuse project governance and management. Governance makes the decisions regarding allocation of funding and resources and reviews the overall project portfolio metrics and process methodology.
Management ensures the project deliverables are completed within the constraints of time, budget, scope, and quality.
Governance of services ensures delivery of a highly reliable set of IT services.
Effective governance of services enables the business to achieve the organization’s goals and strategies through the provision of reliable and cost-effective services.
Governance of information ensures the proper handling of data and information.
Effective governance of information ensures the appropriate classification, retention, confidentiality, integrity, and availability of data in line with the needs of the business.
Note: The bolded responsibilities are the ones that are most common to IT steering committees, and greyed out responsibilities are typical of a larger governance structure. Depending on their level of importance to your organization, you may choose to include the responsibility.
INPUT
OUTPUT
Materials
Participants
The bolded responsibilities are those that are most common to IT steering committees, and responsibilities listed in grey are typical of a larger governance structure.
MUNICIPALITY
EDUCATION
HEALTHCARE
PRIVATE ORGANIZATIONS
INPUT
OUTPUT
Materials
Participants
It is not enough to participate in committee meetings; there needs to be a clear understanding of who is accountable, responsible, consulted, and informed about matters brought to the attention of the committee.
Each committee responsibility should have one person who is accountable, and at least one person who is responsible. This is the best way to ensure that committee work gets done.
An authority matrix is often used within organizations to indicate roles and responsibilities in relation to processes and activities. Using the RACI model as an example, there is only one person accountable for an activity, although several people may be responsible for executing parts of the activity. In this model, accountable means end-to-end accountability for the process.
RESPONSIBLE: The one responsible for getting the job done.
ACCOUNTABLE: Only one person can be accountable for each task.
CONSULTED: Involvement through input of knowledge and information.
INFORMED: Receiving information about process execution and quality.
INPUT
OUTPUT
Materials
Participants
49% of people consider unfocused meetings as the biggest workplace time waster.*
63% of the time meetings do not have prepared agendas.*
80% Reduction of time spent in meetings by following a detailed agenda and starting on time.*
*(Source: http://visual.ly/fail-plan-plan-fail).
A consent agenda is a tool to free up time at meetings by combining previously discussed or simple items into a single item. Items that can be added to the consent agenda are those that are routine, noncontroversial, or provided for information’s sake only. It is expected that participants read this information and, if it is not pulled out, that they are in agreement with the details.
Members have the option to pull items out of the consent agenda for discussion if they have questions. Otherwise these are given no time on the agenda.
Agendas
Procedures:
INPUT
OUTPUT
Materials
Participants
INPUT
OUTPUT
Materials
Participants
Industry: Consumer Goods
Source: Interview
The new CIO at a large consumer goods company had difficulty generating interest in creating a new IT steering committee. The previous CIO had created a steering committee that was poorly organized and did not involve all of the pertinent members. This led to a committee focused on politics that would often devolve into gossip. Also, many members were dissatisfied with the irregular meetings that would often go over their allotted time.
In order to create a new committee, the new CIO needed to dispel the misgivings of the business leadership.
The new CIO decided to build the new steering committee from the ground up in a systematic way.
She collected information from relevant stakeholders about what they know/how they feel about IT and used this information to build a detailed charter.
Using this info she outlined the new steering committee charter and included in it the:
The new steering committee included all the key members of business units, and each member was clear on their roles in the meetings. Meetings were streamlined and effective. The adjustments in the charter and the improvement in meeting quality played a role in improving the satisfaction scores of business leaders with IT by 21%.
1.1
Survey your ITSC stakeholders
Prior to the workshop, Info-Tech’s advisors will work with you to launch the IT Steering Committee Stakeholder Survey to understand business priorities and level of understanding of how decisions are made. Using this data, we will create the IT steering committee responsibilities, participation, and communication strategy.
1.7
Define a participant RACI for each of the responsibilities
The analyst will facilitate several exercises to help you and your stakeholders create an authority matrix. The output will be defined responsibilities and authorities for members.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation 2: Define your ITSC Processes Proposed Time to Completion: 2 weeks |
|---|
Review SIPOCs and Process Creation Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates: Phase 2 of the Establish an Effective IT Steering Committee blueprint | Finalize the SIPOC Review Draft SIPOC:
Then complete these activities…
With these tools & templates: Phase 2 of the Establish an Effective IT Steering Committee blueprint | Finalize Metrics Finalize phase deliverable:
Then complete these activities…
With these tools & templates: Phase 2 of the Establish an Effective IT Steering Committee blueprint |
Building high-level IT steering committee processes brings your committee to life. Having a clear process will ensure that you have the right information from the right sources so that committees can operate and deliver the appropriate output to the customers who need it.
The IT steering committee is only valuable if members are able to successfully execute on responsibilities.
One of the most common mistakes organizations make is that they build their committee charters and launch into their first meeting. Without defined inputs and outputs, a committee does not have the needed information to be able to effectively execute on responsibilities and is unable to meet its stated goals.
The arrows in this picture represent the flow of information between the IT steering committee, other committees, and IT management.
Building high-level processes will define how that information flows within and between committees and will enable more rapid decision making. Participants will have the information they need to be confident in their decisions.
| Strategic | IT Steering Committee | |
| Tactical | Project Governance Service Governance Risk Governance Information Governance |
IT Management |
| Operational | Risk Task Force |
Info-Tech recommends using SIPOC as a way of defining how the IT steering committee will operate.
Derived from the core methodologies of Six Sigma process management, SIPOC – a model of Suppliers, Inputs, Processes, Outputs, Customers – is one of several tools that organizations can use to build high level processes. SIPOC is especially effective when determining process scope and boundaries and to gain consensus on a process.
By doing so you’ll ensure that:
Remember: Your IT steering committee is not a working committee. Enable effective decision making by ensuring participants have the necessary information and appropriate recommendations from key stakeholders to make decisions.
| Supplier | Input |
| Who provides the inputs to the governance responsibility. | The documented information, data, or policy required to effectively respond to the responsibility. |
| Process | |
| In this case this represents the IT steering committee responsibility defined in terms of the activity the ITSC is performing. | |
| Output | Customer |
| The outcome of the meeting: can be approval, rejection, recommendation, request for additional information, endorsement, etc. | Receiver of the outputs from the committee responsibility. |
For atypical responsibilities:
INPUT
OUTPUT
Materials
Participants
| SIPOC: Establish the target investment mix | |
| Supplier | Input |
| CIO |
|
| Process | |
| Responsibility: The IT steering committee shall review and approve the target investment mix. | |
| Output | Customer |
|
|
| SIPOC: Endorse the IT budget | |
| Supplier | Input |
| CIO |
See Info-Tech’s blueprint IT Budget Presentation |
| Process | |
Responsibility: Review the proposed IT budget as defined by the CIO and CFO. |
|
| Output | Customer |
|
|
| SIPOC: Monitor IT value metrics | |
| Supplier | Input |
| CIO |
|
| Process | |
Responsibility: Review recommendations and either accept or reject recommendations. Refine go-forward metrics. |
|
| Output | Customer |
|
|
| SIPOC: Evaluate and select programs/projects to fund | |
| Supplier | Input |
| PMO |
See Info-Tech’s blueprint Grow Your Own PPM Solution |
| Process | |
Responsibility: The ITSC will approve the list of projects to fund based on defined prioritization criteria – in line with capacity and IT budget. It is also responsible for identifying the prioritization criteria in line with organizational priorities. |
|
| Output | Customer |
|
|
| SIPOC: Endorse the IT strategy | |
| Supplier | Input |
| CIO |
See Info-Tech’s blueprint IT Strategy and Roadmap |
| Process | |
Responsibility: Review, understand, and endorse the IT strategy. | |
| Output | Customer |
|
|
| SIPOC: Monitor project management metrics | |
| Supplier | Input |
| PMO |
|
| Process | |
Responsibility: Review recommendations around PM metrics and define target metrics. Endorse current effectiveness levels or determine corrective action. |
|
| Output | Customer |
|
|
| SIPOC: Approve launch of planned and unplanned project | |
| Supplier | Input |
| CIO |
See Info-Tech’s Blueprint: Grow Your Own PPM Solution |
| Process | |
Responsibility: Review the list of projects and approve the launch or reprioritization of projects. | |
| Output | Customer |
|
|
| SIPOC: Monitor stakeholder satisfaction with services and other service metrics | |
| Supplier | Input |
| Service Manager |
|
| Process | |
Responsibility: Review recommendations around service metrics and define target metrics. Endorse current effectiveness levels or determine corrective action. |
|
| Output | Customer |
|
|
| SIPOC: Approve plans for new or changed service requirements | |
| Supplier | Input |
| Service Manager |
|
| Process | |
Responsibility: Review IT recommendations, approve changes, and communicate those to staff. |
|
| Output | Customer |
|
|
| SIPOC: Monitor risk management metrics | |
| Supplier | Input |
| CIO |
|
| Process | |
Responsibility: Review recommendations around risk metrics and define target metrics. Endorse current effectiveness levels or determine corrective action. |
|
| Output | Customer |
|
|
| SIPOC: Review the prioritized list of risks | |
| Supplier | Input |
| Risk Manager |
|
| Process | |
Responsibility: Accept the risk registrar and define any additional action required. | |
| Output | Customer |
|
|
| SIPOC: Define information lifecycle process ownership | |
| Supplier | Input |
| CIO |
|
| Process | |
Responsibility: Define responsibility and accountability for information lifecycle ownership. |
|
| Output | Customer |
|
|
| SIPOC: Monitor information lifecycle metrics | |
| Supplier | Input |
| Information lifecycle owner |
|
| Process | |
Responsibility: Review recommendations around information management metrics and define target metrics. Endorse current effectiveness levels or determine corrective action. |
|
| Output | Customer |
|
|
New Metrics:
INPUT
OUTPUT
Materials
Participants
Industry: Consumer Goods
Source: Interview
"IT steering committee’s reputation greatly improved by clearly defining its process."
One of the major failings of the previous steering committee was its poorly drafted procedures. Members of the committee were unclear on the overall process and the meeting schedule was not well established.
This led to low attendance at the meetings and ineffective meetings overall. Since the meeting procedures weren’t well understood, some members of the leadership team took advantage of this to get their projects pushed through.
The first step the new CIO took was to clearly outline the meeting procedures in her new steering committee charter. The meeting agenda, meeting goals, length of time, and outcomes were outlined, and the stakeholders signed off on their participation.
She also gave the participants a SIPOC, which helped members who were unfamiliar with the process a high-level overview. It also reacquainted previous members with the process and outlined changes to the previous, out-of-date processes.
The participation rate in the committee meetings improved from the previous rate of approximately 40% to 90%. The committee members were much more satisfied with the new process and felt like their contributions were appreciated more than before.
2.1
Define a SIPOC for each of the ITSC responsibilities
Create SIPOCs for each of the governance responsibilities with the help of an Info-Tech advisor.
2.2
Establish the reporting metrics for the ITSC
The analyst will facilitate several exercises to help you and your stakeholders define the reporting metrics for the ITSC.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation 3: Build the Stakeholder Presentation Proposed Time to Completion: 1 week |
|---|
Customize the Presentation Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates: IT Steering Committee Stakeholder Presentation
| Review and Practice the Presentation Review findings with analyst:
Then complete these activities…
With these tools & templates:
| Review the First ITSC Meeting Finalize phase deliverable:
Then complete these activities…
With these tools & templates: Establish an Effective IT Steering Committee blueprint |
Stakeholder engagement will be critical to your ITSC success, don't just focus on what is changing. Ensure stakeholders know why you are engaging them and how it will help them in their role.
Don’t take on too much in your first IT steering committee meeting. Many participants may not have participated in an IT steering committee before, or some may have had poor experiences in the past.
Use this meeting to explain the role of the IT steering committee and why you are implementing one, and help participants to understand their role in the process.
Quickly customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to explain the goals and benefits of the IT steering committee, and use your own data to make the case for governance.
At the end of the meeting, ask committee members to sign the committee charter to signify their agreement to participate in the IT steering committee.
Review the IT Steering Committee Stakeholder Presentation template. This document should be presented at the first IT steering committee meeting by the assigned Committee Chair.
Customization Options
Overall: Decide if you would like to change the presentation template. You can change the color scheme easily by copying the slides in the presentation deck and pasting them into your company’s standard template. Once you’ve pasted them in, scan through the slides and make any additional changes needed to formatting.
Slide 2-3: Review the text on each of the slides and see if any wording should be changed to better suite your organization.
Slide 4: Review your list of the top 10 challenges and opportunities as defined in section 2 of this blueprint. Document those in the appropriate sections. (Note: be careful that the language is business-facing; challenges and opportunities should be professionally worded.)
Slide 5: Review the language on slide 5 to make any necessary changes to suite your organization. Changes here should be minimal.
INPUT
OUTPUT
Materials
Participants
Customization Options
Slide 6: The goal of this slide is to document and share the names of the participants on the IT steering committee. Document the names in the right-hand side based on your IT Steering Committee Charter.
Slides 7-9:
Slide 10: Review and understand the rollout timeline. Make any changes needed to the timeline.
INPUT
OUTPUT
Materials
Participants
INPUT
Participants
By this point, you should have customized the meeting presentation deck and be ready to meet with your IT steering committee participants.
The meeting should be one hour in duration and completed in person.
Before holding the meeting, identify who you think is going to be most supportive and who will be least. Consider meeting with those individuals independently prior to the group meeting to elicit support or minimize negative impacts on the meeting.
Customize this calendar invite script to invite business partners to participate in the meeting.
Hello [Name],
As you may have heard, we recently went through an exercise to develop an IT steering committee. I’d like to take some time to discuss the results of this work with you, and discuss ways in which we can work together in the future to better enable corporate goals.
The goals of the meeting are:
I look forward to starting this discussion with you and working with you more closely in the future.
Warm regards,
Industry:Consumer Goods
Source: Interview
"CIO gains buy-in from the company by presenting the new committee to its stakeholders."
Communication was one of the biggest steering committee challenges that the new CIO inherited.
Members were resistant to joining/rejoining the committee because of its previous failures. When the new CIO was building the steering committee, she surveyed the members on their knowledge of IT as well as what they felt their role in the committee entailed.
She found that member understanding was lacking and that their knowledge surrounding their roles was very inconsistent.
The CIO dedicated their first steering committee meeting to presenting the results of that survey to align member knowledge.
She outlined the new charter and discussed the roles of each member, the goals of the committee, and the overarching process.
Members of the new committee were now aligned in terms of the steering committee’s goals. Taking time to thoroughly outline the procedures during the first meeting led to much higher member engagement. It also built accountability within the committee since all members were present and all members had the same level of knowledge surrounding the roles of the ITSC.
3.1
Create a presentation for ITSC stakeholders to be presented at the first ITSC meeting
Work with an Info-Tech advisor to customize our IT Steering Committee Stakeholder Presentation template. Use this presentation to gain stakeholder buy-in by making the case for an ITSC.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation : Define the Prioritization Criteria Proposed Time to Completion: 4 weeks |
|---|
| Discuss Prioritization Criteria Start with an analyst kick-off call:
Then complete these activities...
With these tools & templates: IT Steering Committee Project Prioritization Tool | Customize the IT Steering Committee Project Prioritization Tool Review findings with analyst:
Then complete these activities…
With these tools & templates: IT Steering Committee Project Prioritization Tool | Review Results of the Pilot Test Finalize phase deliverable:
Then complete these activities…
With these tools & templates: IT Steering Committee Project Prioritization Tool |
The steering committee sets and agrees to principles that guide prioritization decisions. The agreed upon principles will affect business unit expectations and justify the deferral of requests that are low priority. In some cases, we have seen the number of requests drop substantially because business units are reluctant to propose initiatives that do not fit high prioritization criteria.
One of the key roles of the IT steering committee is to review and prioritize the portfolio of IT projects.
What is the prioritization based on? Info-Tech recommends selecting four broad criteria with two dimensions under each to evaluate the value of the projects. The criteria are aligned with how the project generates value for the organization and the execution of the project.
What is the role of the steering committee in prioritizing projects? The steering committee is responsible for reviewing project criteria scores and making decisions about where projects rank on the priority list. Planning, resourcing, and project management are the responsibility of the PMO or the project owner.
| Info-Tech’s Sample Criteria |
|---|
| Value Strategic Alignment: How much a project supports the strategic goals of the organization. Customer Satisfaction: The impact of the project on customers and how visible a project will be with customers. Operational Alignment: Whether the project will address operational issues or compliance. |
| Execution Financial: Predicted ROI and cost containment strategies. Risk: Involved with not completing projects and strategies to mitigate it. Feasibility: How easy the project is to complete and whether staffing resources exist. |
INPUT
OUTPUT
Materials
Participants
INPUT
OUTPUT
Materials
Participants
Document the prioritization criteria weightings in Info-Tech’s IT Steering Committee Project Prioritization Tool.
Download Info-Tech’s Project Intake and Prioritization Tool.
Rank: Project ranking will dynamically update relative to your portfolio capacity (established in Settings tab) and the Size, Scoring Progress, Remove from Ranking, and Overall Score columns. The projects in green represent top priorities based on these inputs, while yellow projects warrant additional consideration should capacity permit.
Scoring Progress: You will be able to determine some items on the scorecard earlier in the scoring progress (such as strategic and operational alignment). As you fill in scoring columns on the Project Data tab, the Scoring Progress column will dynamically update to track progress.
The Overall Score will update automatically as you complete the scoring columns (refer to Activity 4.2).
Days in Backlog: This column will help with backlog management, automatically tracking the number of days since an item was added to the list based on day added and current date.
INPUT
OUTPUT
Materials
Participants
Projects that are scored but not prioritized will populate the portfolio backlog. Items in the backlog will need to be rescored periodically, as circumstances can change, impacting scores. Factors necessitating rescoring can include:
Score projects using the Project Data tab in Info-Tech’s IT Steering Committee Project Prioritization Tool
IT Steering Committee Project Prioritization Tool is depicted. The Data Tab is shown.">
Consult these Info-Tech blueprints on project portfolio management to create effective portfolio project management resourcing processes.
Create Project Management Success
Develop a Project Portfolio Management Strategy
Industry: Consumer Goods
Source: Interview
"Clear project intake and prioritization criteria allow for the new committee to make objective priority decisions."
One of the biggest problems that the previous steering committee at the company had was that their project intake and prioritization process was not consistent. Projects were being prioritized based on politics and managers taking advantage of the system.
The procedure was not formalized so there were no objective criteria on which to weigh the value of proposed projects. In addition to poor meeting attendance, this led to the overall process being very inconsistent.
The new CIO, with consultation from the newly formed committee, drafted a set of criteria that focused on the value and execution of their project portfolio. These criteria were included on their intake forms to streamline the rating process.
All of the project scores are now reviewed by the steering committee, and they are able to facilitate the prioritization process more easily.
The objective criteria process also helped to prevent managers from taking advantage of the prioritization process to push self-serving projects through.
This was seen as a contributor to the increase in satisfaction scores for IT, which improved by 12% overall.
The new streamlined process helped to reduce capacity constraints on IT, and it alerted the company to the need for more IT employees to help reduce these constraints further. The IT department was given permission to hire two new additional staff members.
4.1
IT Steering Committee Project Prioritization Tool.">
Define your prioritization criteria and customize our IT Steering Committee Project Prioritization Tool
With the help of Info-Tech advisors, create criteria for determining a project’s priority. Customize the tool to reflect the criteria and their weighting. Run pilot tests of the tool to verify the criteria and enter your current project portfolio.
Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.
The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.
Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.
These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.
IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.
| Strategic | IT Steering Committee | |
| Tactical | Project Governance Service Governance Risk Governance Information Governance | IT Management |
| Operational | Risk Task Force |
This blueprint focuses exclusively on building the IT Steering committee. For more information on IT governance see Info-Tech’s related blueprint: Tailor an IT Governance Plan to Fit Organizational Needs.
By bucketing responsibilities into these areas, you’ll be able to account for most key IT decisions and help the business to understand their role in governance, fostering ownership and joint accountability.
The five governance areas are:
Governance of the IT Portfolio and Investments: Ensures that funding and resources are systematically allocated to the priority projects that deliver value.
Governance of Projects: Ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.
Governance of Risks: Ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.
Governance of Services: Ensures that IT delivers the required services at the acceptable performance levels.
Governance of Information and Data: Ensures the appropriate classification and retention of data based on business need.
Overall, survey respondents indicated a lack of understanding about how decisions are made around risk, services, projects, and investments, and that business involvement in decision making was too minimal.
72% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).
62% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).
70% of stakeholders do not understand how decisions around projects selection, success, and changes are made.
78% of stakeholders do not understand how decisions around risk are made
67% of stakeholders believe they do understand how decisions around information (data) retention and classification are made.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Begin the data warehouse foundation by defining the project and governance teams, as well as reviewing supporting data management practices.
Using the business activities as a guide, develop a data model, data architecture, and technology plan for a data warehouse foundation.
Start developing a data warehouse program by defining how users will interact with the new data warehouse environment.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify the members of the foundation project team.
Define overarching statements and define success factors/risks.
Outline basic project governance.
Defined membership, roles, and responsibilities involved in the foundation project.
Establishment of a steering committee as a starting point for the data warehouse program.
1.1 Identify foundation project team and create a RACI chart.
1.2 Understand what a data warehouse can and cannot enable.
1.3 Define critical success factors, key performance metrics, and project risks.
1.4 Develop rough timelines for foundation project completion.
1.5 Define the current and future states for key data management practices.
Job Descriptions and RACI
Data Warehouse Steering Committee Charter
Data Warehouse Foundation Project Plan
Work Breakdown Structure
Define the information needs of the business and its key processes.
Create the components that will inform an appropriate data model.
Design a data warehouse architecture model.
Clear definition of business needs that will directly inform the data and architecture models.
2.1 Understand the most fundamental needs of the business.
2.2 Define the data warehouse vision, mission, purpose, and goals.
2.3 Detail the most important operational, tactical, and ad hoc activities the data warehouse should support.
2.4 Link the processes that will be central to the data warehouse foundation.
2.5 Walk through the four-column model and business entity modeling as a starting point for data modeling.
2.6 Create data models using the business data glossary and data classification.
2.7 Identify master data elements to define dimensions.
2.8 Design lookup tables based on reference data.
2.9 Create a fit-for-purpose data warehousing model.
Data Warehouse Program Charter
Data Warehouse Vision and Mission
Documentation of Business Processes
Business Entity Map
Business Data Glossary
Data Classification Scheme
Data Warehouse Architecture Model
Create a plan for governing your data warehouse efficiently and effectively.
Documentation of current standard operating procedures.
Identified members of a data warehouse center of excellence.
3.1 Develop a technology capability map to visualize your desired state.
3.2 Establish a data warehouse center of excellence.
3.3 Create a data warehouse foundation roadmap.
3.4 Define data warehouse service level agreements.
3.5 Create standard operating procedures.
Technology Capability Map
Project Roadmap
Service Level Agreement
Data Warehouse Standard Operating Procedure Workbook
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Conduct a maturity assessment to determine whether a dedicated SMMP is right for your organization.
Use the Vendor Landscape findings and project guidance to develop requirements for your SMMP RFP, and evaluate and shortlist vendors based on your expressed requirements.
Even a solution that is a perfect fit for an organization will fail to generate value if it is not properly implemented or measured. Conduct the necessary planning before implementing your SMMP.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Discuss the general project overview for the SMMP selection.
Determine your organization’s readiness for SMMP.
1.1 Identify organizational fit for the technology.
1.2 Evaluate social media opportunities within your organization.
1.3 Determine the best use-case scenario for your organization.
Organizational maturity assessment
SMMP use-case fit assessment
Plan the procurement and implementation of the SMMP.
Select an SMMP.
Review implementation considerations.
2.1 Review use-case scenario results, identify use-case alignment
2.2 Review the SMMP Vendor Landscape vendor profiles and performance.
2.3 Create a custom vendor shortlist and investigate additional vendors for exploration in the marketplace.
2.4 Meet with the project manager to discuss results and action items.
Vendor shortlist
SMMP RFP
Vendor evaluations
Selection of an SMMP
Framework for SMMP deployment and integration
“Social media has rapidly become a ubiquitous channel for customer interaction. Organizations are using social media for use cases from targeted advertising, to sales prospecting, to proactive customer service. However, the growing footprint of social media initiatives – and the constant proliferation of new social networks – has created significant complexity in effectively capturing the value of social.
Organizations that are serious about social manage this complexity by leveraging dedicated social media management platforms. These platforms provide comprehensive capabilities for managing multiple social media networks, creating engagement and response workflows, and providing robust social analytics. Selecting a best-fit SMMP allows for standardized, enterprise-wide capabilities for managing all aspects of social media.
This report will help you define your requirements for social media management and select a vendor that is best fit for your needs, as well as review critical implementation considerations such as CRM integration and security.”
Ben Dickie
Research Director, Enterprise Applications
Info-Tech Research Group
This Research Is Designed For:
|
This Research Will Help You:
|
This Research Will Also Assist:
|
This Research Will Help Them
|
| Customer Experience Management (CXM)
|
Social Media Management Platforms are one piece of the overall customer experience management ecosystem, alongside tools such as CRM platforms and adjacent point solutions for sales, marketing, and customer service. Review Info-Tech’s CXM blueprint to build a complete, end-to-end customer interaction solution portfolio that encompasses SMMP alongside other critical components. The CXM blueprint also allows you to develop strategic requirements for SMMP based on customer personas and external market analysis. |
|
SMMPs mediate interactions between end users and the social cloud. |
The increasing complexity of social media, coupled with the rising importance of social channels, has led to a market for formal management platforms. Organizations with an active presence in social media (i.e. multiple services or pages) should strongly consider selecting and deploying an SMMP.
|
Ad Hoc Management vs. SMMPs: What’s the difference? Ad Hoc Social Media ManagementSocial media initiatives are managed directly through the services themselves. For example, a marketing professional would log in to multiple corporate Twitter accounts to post the same content for a promotional campaign. Social Media Management PlatformSocial media initiatives are managed through a third-party software platform. For example, a marketing professional would update all social account simultaneously with just a couple clicks. SMMPs also provide cross-service social analytics – highly valuable for decision makers! |
Effectively managing a social media campaign is not a straightforward exercise. If you have (or plan to have) a large social media footprint, now is the time to procure formal software tools for social media management. Continuing to manage social media in an ad hoc manner is sapping time and money.
Executive management support is crucial. The number one overall critical success factor for an SMMP strategy is top management support. This emphasizes the importance of sales, service, and marketing and prudent corporate strategic alignment. A strategic objective in SMMP projects is to position top management as an enabler rather than a barrier.
| Planning | Implementation | Post-Implementation | Overall | |
| 1 | Appropriate Selection | Project Management | Top Management Support | Top Management Support |
| 2 | Clear Project Goals | Top Management Support | Project Management | Appropriate Selection |
| 3 | Top Management Support | Training | Training | Project Management |
| 4 | Business Mission and Vision | Effective Communication | Effective Communication | Training |
| 5 | Project Management | Supplier Supports | Appropriate Selection | Clear Project Goals |
(Source: Information Systems Frontiers)
CASE STUDY |
Industry: High-Tech | Source: Dell |
| With a truly global customer base, Dell gets about 22,000 mentions on the social web daily, and does not sit idly by. Having established a physical Social Media Command Center powered by Salesforce’s Social Studio, Dell was one of the companies that pioneered the command center concept for social response.
The SMMP carries out the following activities:
Today the company claims impressive results, including:
|
|
![]() |
Follow Info-Tech’s enterprise applications program that covers the application lifecycle from the strategy stage, through selection and implementation, and up to governance and optimization.
The implementation and execution stage entails the following steps:
|
A critical preceding task to selecting a social media management platform is ensuring a strategy is in place for enterprise social media usage. Use our social media strategy blueprint to ensure the foundational elements are in place prior to proceeding with platform selection.
Benefits — Use the project steps and activity instructions outlined in this blueprint to streamline your selection process and implementation planning. Save time and money, and improve the impact of your SMMP selection by leveraging Info-Tech’s research and project steps.
Use Info-Tech’s SMMP Vendor Landscape contained in Phase 2 of this project to support your vendor reviews and selection. Refer to the use-case performance results to identify vendors that align with the requirements and solution needs identified by your earlier project findings.
Info-Tech Insight — Not everyone’s connection and integration needs are the same. Understand your own business’s integration environment and the unique technical and functional requirements that accompany them to create criteria and select a best-fit SMMP solution.
| Readiness
Determine where you are right now and where your organization needs to go with a social media strategy. ![]() |
Use-Case Assessment
Identify the best-fit use-case scenario to determine requirements that best align with your strategy. ![]() |
Selection
Approach vendor selection through a use-case centric lens to balance the need for different social capabilities. ![]() |


DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks used throughout all four options |
|||
| 1. Develop a Technology Enablement Approach | 2. Select an SMMP | 3. Review Implementation Considerations | |
![]() Best-Practice Toolkit |
1.1 Determine if a dedicated SMMP is right for your organization
1.2 Use an SMMP to enable marketing, sales, and service use cases
|
2.1 SMMP Vendor Landscape
2.2 Select your SMMP
|
3.1 Establish best practices for SMMP implementation
3.2 Assess the measured value from the project |
Guided Implementations |
|
|
|
![]() Onsite Workshop |
Module 1:
Launch Your SMMP Selection Project |
Module 2:
Plan Your Procurement and Implementation Process |
|
Phase 1 Outcome:
|
Phase 2 Outcome:
|
Phase 3 Outcome:
|
|
Contact your account representative or email Workshops@InfoTech.com for more information.
Day 1
Preparation |
Day 2
Workshop Day |
Day 3
Workshop Day |
Day 4
Workshop Day |
Day 5
Working Session |
Workshop Preparation
|
Morning Itinerary
|
Morning Itinerary
|
Morning Itinerary
|
Workshop Debrief
|
![]() |
The light blue slides at the end of each section highlight the key activities and exercises that will be completed during the engagement with our analyst team. |
Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.
![]() |
This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project. |
![]() |
This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members who will come onsite to facilitate a workshop for your organization. |
![]() |
This icon denotes a slide that pertains directly to the Info-Tech vendor profiles on marketing management technology. Use these slides to support and guide your evaluation of the MMS vendors included in the research. |

Estimated Timeline: 1-3 Months
Info-Tech InsightBefore an SMMP can be selected, the organization must have a strategy in place for enterprise social media. Implementing an SMMP before developing a social media strategy would be akin to buying a mattress without knowing the size of the bed frame. | Major Milestones Reached
Key Activities Completed
| Outcomes from This PhaseSocial Media Maturity Assessment |
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 1.1: Determine if a dedicated SMMP is right for your organization | Step 1.2: Use an SMMP to enable marketing, sales, and service use cases |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
Phase 1 Results & Insights:
|
|
1.1 |
1.2 |
|
| Determine if a dedicated SMMP is right for your organization | Use an SMMP to enable marketing, sales, and service use cases |
Why build a social media strategy?
|
Important considerations for an enterprise social media strategy:
|
| For more information on developing a strategy for enterprise social media, please refer to Info-Tech’s research on Social Media. | |
Distributed Stage
|
Loosely Coupled Stage
|
Command Center Stage
|
|
![]() |
|||
| Optimal stages for SMMP purchase | |||
INPUT: Social media initiatives, Current status
OUTPUT: Current State Maturity Assessment
MATERIALS: Whiteboard, Markers, Sticky notes
PARTICIPANTS: Digital Strategy Executive, Business stakeholders
Before you can move to an objective assessment of your social media program’s maturity, take an inventory of your current efforts across different departments (e.g. Marketing, PR, Sales, and Customer Service). Document the results in the Social Media Maturity Assessment Tool to determine your social media readiness score.
| Department | Social Media Initiative(s) | Current Status |
| Marketing | Branded Facebook page with updates and promotions | Stalled: insufficient resources |
| Sales | LinkedIn prospecting campaign for lead generation, qualification, and warm open | Active: however, new reps are poorly trained on LinkedIn prospect best practices |
| Customer Service | Twitter support initiative: mentions of our brand are paired with sentiment analysis to determine who is having problems and to reach out and offer support | Active: program has been highly successful to date |
| HR | Recruitment campaign through LinkedIn and Branch Out | Stalled: insufficient technology support for identifying leading candidates |
| Product Development | Defect tracking for future product iterations using social media | Partially active: Tracked, but no feedback loop present |
| Social Media Maturity Level | Distributed | |
|
![]() |
Don’t believe that social channel integration will require an entire rebuild of your CXM strategy. Social channels are just new interaction channels that need to be integrated – as you’ve done in the past with Web 1.0 e-channels.
Before adopting an SMMP, it’s important to understand the underlying services they manage. Social media services facilitate the creation and dissemination of user-generated content, and can be grouped according to their purpose and functionality:
Info-Tech Best PracticeIn many cases, services do not fit discretely within each category. With minor exceptions, creating an account on a social media service is free, making use of these services extremely cost effective. If your organization makes extensive use of a particular service, ensure it is supported by your SMMP vendor. | ![]() |
INPUT: Social media services
OUTPUT: Inventory of enterprise social media
MATERIALS: Whiteboard, Markers
PARTICIPANTS: Project team
| Network | Use Case | Account | Ownership |
|
|
|
|
|
|
||
| ... | ... | ... |
|
Ad hoc management results in a number of social media touch points. SMMPs serve as a single go-to point for all social media initiatives |
Managing social media is becoming increasingly difficult to do through ad hoc methods, particularly for larger organizations and those with multiple brand portfolios. Ad hoc management is best suited for small organizations with an institutional client base who only need a bare bones social media presence.
What areas are different social media services helpful in?
|
Social media is invaluable for marketing, sales, and customer service. Some social media services have a higher degree of efficacy than others for certain functions. Be sure to take this into account when developing a social media strategy. |
Different social media services are more effective than others for different goals. For example, YouTube is useful as an avenue for marketing campaigns, but it’s of substantially less use for sales functions like lead generation. The services you select while planning your social media strategy must reflect concrete goals.
| Social media and CRM are often being done without a defined strategy in place.
|
Many processes related to social media are being done manually, despite the existence of SMMPs.
|
| “When we started our social media campaign, it took 34 man-hours a week. An SMMP that streamlines these efforts is absolutely an asset.” (Edie May, Johnson & Johnson Insurance Company) | |
The value proposition of SMMPs revolves around enhancing the effectiveness and efficiency of social media initiatives. |
Three primary use cases for social media management:
Social Listening & Analytics — Monitor and analyze a variety of social media services: provide demographic analysis, frequency analysis, sentiment analysis, and content-centric analysis. Social Publishing & Campaign Management — Executing marketing campaigns through social channels (e.g. Facebook pages). Social Customer Care — Track customer conversations and provide the ability to respond in-platform to social interactions. |
SMMPs are a technology platform, but this alone is insufficient to execute a social media program. Organization and process must be integrated as well. See Info-Tech’s research on developing a social media strategy for a step-by-step guide on how to optimize your internal organization and processes.
Cloud-Centric |
Social Monitoring |
Content-Centric |
|
Social cloud monitoring enables:
|
Social presence and property management enables:
|
||
Social AnalyticsSocial analytics provide insights to both dimensions of social media monitoring. |
|||
Some firms only need social cloud monitoring, some need to monitor their own social media properties, and others will need to do both. Some vendors do both while other vendors excel in only one feature dimension. If you are NOT prepared to act on results from social cloud monitoring, then don’t expand your reach into the social cloud for no reason. You can always add cloud monitoring services later. Likewise, if you only need to monitor the cloud and have no or few of your own social properties, don’t buy advanced management and engagement features.
Research indicates successful organizations employ both social cloud monitoring and management of their own properties with analytical tools to enhance both or do one or the other well. Few vendors excel at both larger feature categories. But the market is segmented into vendors that organizations should be prepared to buy more than one product from to satisfy all requirements. However, we expect feature convergence over the next 1–3 years, resulting in more comprehensive vendor offerings.
| Most sought social media analytics capabilities
|
Value driven from social analytics comes in the form of:
|
Before: Manual Social Media Management
Ad hoc management is costing this organization $26,000 a year. |
After: Social Media Management Platform
The net annual benefit of adopting an SMMP is $36,000. |
The value proposition of acquiring an SMMP does not resonate the same for all organizations: in some cases, it is more cost effective to forego an SMMP and stick with ad hoc social media management.
Follow these guidelines for determining if an SMMP is a natural fit for your organization.
Go with an SMMP if…
|
Stick with ad hoc management if…
|
Using an SMMP is definitively superior to ad hoc social media management for those organizations with multiple brands and product portfolios (e.g. consumer packaged goods). Ad hoc management is best for small organizations with an institutional client base who only need a bare bones social media presence.
1.2 Social Media Opportunity Assessment Tool
Use Info-Tech’s Social Media Opportunity Assessment Tool to determine, based on your unique criteria, where social media opportunities exist for your organization in marketing, sales, and service.
Info-Tech Best Practice
| ![]() |
1.1.3
INPUT: Social Media Opportunity Questionnaire
OUTPUT: SMMP go/no-go decision
MATERIALS: Whiteboard, Opportunity Assessment Tool
PARTICIPANTS: Digital Strategy Executive, Business stakeholders
1.1 |
1.2 |
|
| Determine if a dedicated SMMP is right for your organization | Use an SMMP to enable marketing, sales, and service use cases |
|
Using an SMMP to assist the sales process can…
|
Social media is on the rise in sales organizations. Savvy companies are using social channels at all points in the sales process, from prospecting to account management. Organizations using social channels for sales will want an SMMP to manage the volume of information and provide content-centric analytics.
|
“I’m typically using my social media team as a proactive marketing team in the social space, whereas I’m using my consumer relations team as a reactive marketing and a reactive consumer relations taskforce. So a little bit different perspective.” (Greg Brickl, IT Director, Organic Valley) |
|
(Source: Info-Tech Research Group N = 37) |
Managing multiple social media accounts on an ad hoc basis is time consuming and costs money. Lower costs and get the best results out of your social media campaigns by involving the marketing team in the SMMP selection process and knowing their functional requirements.
|
Reactive service is customer-initiated.
|
Historically, customer service has been “reactive” (i.e. customer initiated) and solely between the customer and supplier. Social media forces proactive service interactions between customer, supplier, and the entire social cloud. Using an SMMP significantly improves reactive and proactive service. The ability to integrate with customer service applications is essential.
Info-Tech’s research shows that the more departments get involved with social media implementation, the higher the success score (calculated based on respondents’ report of the positive impact of social media on business objectives). On average, each additional department involved in social media programs increases the overall social media success score by 5%. For example, organizations that leveraged social media within the customer service department, achieved a higher success score than those that did not.
The message is clear: encourage broad participation in coordinated social media efforts to realize business goals.
(Source: Info-Tech Research Group N=65) |
Our research indicates that the most important stakeholder to ensure steering committee success is Customer Service. This has a major impact on CRM integration requirements – more on this later. |
|
Benefits of Sentiment Analysis for PR
|
Leaving negative statements unaddressed can cause harm to an organization’s reputation. Use an SMMP to track what is being said about your organization; take advantage of response capabilities to quickly respond and mitigate PR risk.
|
A social media campaign managed via SMMP can…
|
![]() |
Only 4% of recruiters are NOT using social media for recruitment, while 50% of recruiters plan to increase their investment in SMR in the coming year. (Source: Jobvite, 2015) |
| Social Listening and Analytics
What It Looks Like
How It Works
|
Social Publishing and Campaign Management
What It Looks Like
How It Works
|
Social Customer Care
What It Looks Like
How It Works
|
Identify the organizational drivers for social media management – whether it is recruiting, public relations, customer service, marketing, or sales – and align them with the most applicable use case.
1.2.1 1 Hour
INPUT: Project Manager, Core project team
OUTPUT: Use-case suitability
MATERIALS: Whiteboard, Markers
PARTICIPANTS: Project Manager, Core project team
| Use the Use-Case Fit Assessment Tool to understand how your unique requirements map into a specific SMMP use case.
This tool will assess your answers and determine your relative fit against the use-case scenarios. Fit will be assessed as “Weak,” “Moderate,” or “Strong.” Consider the common pitfalls, which were mentioned earlier, that can cause IT projects to fail. Plan and take clear steps to avoid or mitigate these concerns. Note: These use-case scenarios are not mutually exclusive. Your organization can align with one or more scenarios based on your answers. If your organization shows close alignment to multiple scenarios, consider focusing on finding a more robust solution and concentrate your review on vendors that performed strongly in those scenarios or meet the critical requirements for each. |
INFO-TECH DELIVERABLE![]() |
| Use Case | Sample Metric Descriptions | Target Metric |
| Social Listening and Analytics | Use a listening tool to flag all mentions of our brands or company on social | Increase in mentions with neutral or positive sentiment, decrease in mentions with negative sentiment |
| Social Publishing and Campaign Management | Launch a viral video campaign showcasing product attributes to drive increased YT traffic | Net increase in unaided customer recall |
| Social Customer Care | Create brand-specific social media pages to increase customer sentiment for individual brand extensions | Net increase in positive customer sentiment (i.e. as tracked by an SMMP) |
1.2.2 45 Minutes
INPUT: Marketing, sales, and customer service objectives
OUTPUT: Metrics inventory
MATERIALS: Whiteboard, Markers
PARTICIPANTS: Project Manager, Core project team
| Marketing/PR Objectives | Social Media Goals | Goal Attainment Metrics |
| E.g. build a positive brand image |
|
Net increase in positive customer sentiment (i.e. as tracked by an SMMP) |
| E.g. increase customer mind share |
|
Net increase in unaided customer recall |
| E.g. monitor public mentions |
|
Increase in mentions with neutral or positive sentiment, decrease in mentions with negative sentiment |
![]() |
|
1.1.1 |
![]() |
Assess your organization’s social media maturity
An Info-Tech analyst will facilitate a discussion to assess the maturity of your organization’s social media program and take an inventory of your current efforts across different departments (e.g. Marketing, PR, Sales, and Customer Service). |
1.1.2 |
![]() |
Inventory your current social media networks
The analyst will facilitate an exercise to catalog all social media networks used in the organization. |
1.1.3 |
![]() |
Go/no go assessment on SMMP
Based on the maturity assessment, the analyst will help identify whether an SMMP will help you achieve your goals in sales, marketing, and customer service. |
1.2.1 |
![]() |
Rank your top use cases for social media management
An analyst will facilitate the exercise to answer a series of questions in order to determine best-fit scenario for social media management for your organization. |
1.2.2 |
![]() |
Build the metrics inventory
An analyst will lead a whiteboarding exercise to brainstorm and generate metrics for your organization’s social media goals. |
| This phase also includes Info-Tech’s SMMP Vendor Landscape |

Estimated Timeline: 1-3 Months
Info-Tech InsightTaking a use-case-centric approach to vendor selection allows you to balance the need for different social capabilities between analytics, campaign management and execution, and customer service. | Major Milestones Reached
Key Activities Completed
| Outcomes from This PhaseThe completed procurement of an SMMP solution.
|
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 2.1: Analyze and shortlist SMMP vendors | Step 2.2: Evaluate vendor responses |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
Phase 1 Results & Insights:
|
|
2.1 |
2.2 |
|
| Analyze and shortlist vendors in the space | Select your SMMP solution |
VENDOR LANDSCAPEInfo-Tech's Methodology |
Use cases were scored around the features from the general scoring identified as being relevant to the functional considerations and drivers for each scenario.
Calculation Overview
Product and Vendor Weightings |
Advanced Features Weightings |
Please note that both advanced feature scores and vendor multipliers are based on the specific weightings calibrated for each scenario.
![]() |
Vendor Performance
Vendors qualify and rank in each use-case scenario based on their relative placement and scoring for the scenario. Vendor RankingChampion: The top vendor scored in the scenario Leaders: The vendors who placed second and third in the scenario Players: Additional vendors who qualified for the scenarios based on their scoring |
![]() |
Value ScoreTM
Each use-case scenario also includes a Value Index that identifies the Value Score for a vendor relative to their price point. This additional framework is meant to help price-conscious organizations identify vendors who provide the best “bang for the buck.” |
VENDOR LANDSCAPEReview the SMMP Vendor Evaluation |
![]()
How It Got Here
|
Where It’s Going
|
As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. Supporting multiple social media services and accounts has become a Table Stakes capability and should no longer be used to differentiate solutions. Instead focus on an SMMP’s social listening, campaign management, and customer care to help you find a solution that best fits your requirements.

Each vendor in this landscape was evaluated based on their features, product considerations, and vendor considerations. Each vendor was profiled using these evaluations and, based on their performance, qualified and placed in specific use-case scenarios.
Vendors included in this report provide a comprehensive, innovative, and functional solution for integrating applications and automating their messaging.
Adobe: Adobe Social is a key pillar of Adobe’s ecosystem that is heavily focused on social analytics and engagement.
Hootsuite: A freemium player with strong engagement and collaboration tools, particularly well suited for SMBs.
Salesforce: Social Studio is a leading social media management solution and is a key channel of Salesforce Marketing Cloud.
Sendible: A fairly new entrant to the social media management space, Sendible offers robust campaign management capability that is well suited for agencies and SMBs.
Sprinklr: A leading solution that focuses on social customer care, offering strong ability to prioritize, route, and categorize high-volume social messaging.
Sprout Social: A great choice for mid-sized companies looking to provide robust social engagement and customer care.
Sysomos: Their MAP and Heartbeat products offer customers in-depth analysis of a wide array of social channels.
Viralheat (Cision): Now a Cision product, Viralheat is an excellent option for analytics, social response workflow management, and in-band social engagement.
![]()
The Table Stakes
|
What does this mean?The products assessed in this Vendor Landscape meet, at the very least, the requirements outlined as Table Stakes. Many of the vendors go above and beyond the outlined Table Stakes, some even do so in multiple categories. This section aims to highlight the products’ capabilities in excess of the criteria listed here. |
If Table Stakes are all you need from your SMMP solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs.
Scoring MethodologyInfo-Tech scored each vendor’s features on a cumulative four-point scale. Zero points are awarded to features that are deemed absent or unsatisfactory, one point is assigned to features that are partially present, two points are assigned to features that require an extra purchase in the vendor’s product portfolio or through a third party, three points are assigned to features that are fully present and native to the solution, and four points are assigned to the best-of-breed native feature.For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix. |
|
![]()
Scoring MethodologyInfo-Tech Research Group scored each vendor’s overall product attributes, capabilities, and market performance. Features are scored individually as mentioned in the previous slide. The scores are then modified by the individual scores of the vendor across the product and vendor performance features. Usability, overall affordability of the product, and the technical features of the product are considered, and scored on a five-point scale. The score for each vendor will fall between worst and best in class. The vendor’s performance in the market is evaluated across four dimensions on a five-point scale. Where the vendor places on the scale is determined by factual information, industry position, and information provided by customer references and/or available from public sources. | Product Evaluation Features
Vendor Evaluation Features
|

For an explanation of how the Info-Tech Harvey Balls are calculated, see Information Presentation – Criteria Scores (Harvey Balls) in the Appendix.
![]()

For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix.
![]()
Core Features
Additional FeaturesSocial Media Channel Integration – Inbound Social Moderation and Workflow Management Social Post Archival |
Feature Weightings
|
Product Evaluation Features
Vendor Evaluation Features
|
|
|
Players in the social listening and analytics scenario
|
||||||||||||
![]()

| What is a Value Score?
The Value Score indexes each vendor’s product offering and business strength relative to its price point. It does not indicate vendor ranking. Vendors that score high offer more bang-for-the-buck (e.g. features, usability, stability) than the average vendor, while the inverse is true for those that score lower. Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes. |
On a relative basis, Sysomos maintained the highest Info-Tech Value ScoreTM of the vendor group for this use-case scenario. Vendors were indexed against Sysomos’ performance to provide a complete, relative view of their product offerings.
|
| For an explanation of how price is determined, see Information Presentation – Price Evaluation in the Appendix.
For an explanation of how the Info-Tech Value Index is calculated, see Information Presentation – Value Index in the Appendix. |
|
![]()
![]()
Core Features
Additional FeaturesSocial Media Channel Integration – Outbound Social Moderation and Workflow Management Social Post Archival Social Asset Management Post Time Optimization Social Media Channel Integration – Inbound Trend Analysis Sentiment Analysis Dashboards and Visualization | Feature Weightings
|
![]()
Product Evaluation Features
Vendor Evaluation Features
|
|
![]()
|
Players in the social publishing and campaign management scenario
| ||||||||||||

![]()
| What is a Value Score? The Value Score indexes each vendor’s product offering and business strength relative to its price point. It does not indicate vendor ranking. Vendors that score high offer more bang-for-the-buck (e.g. features, usability, stability) than the average vendor, while the inverse is true for those that score lower. Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes. | On a relative basis, Sendible maintained the highest Info-Tech Value ScoreTM of the vendor group for this use-case scenario. Vendors were indexed against Sendible’s performance to provide a complete, relative view of their product offerings.
|
| For an explanation of how Price is determined, see Information Presentation – Price Evaluation in the Appendix. For an explanation of how the Info-Tech Value Index is calculated, see Information Presentation – Value Index in the Appendix. | |
![]()
![]()
Core Features
Additional FeaturesSocial Media Channel Integration – Outbound Social Moderation and Workflow Management Social Response Management Social Post Archival Sentiment Analysis Dashboards and Visualization Campaign Execution Trend Analysis Post Time Optimization | Feature Weightings
|
![]()
Product Evaluation Features
Vendor Evaluation Features
|
|
![]()
|
Players in the social listening and analytics scenario
| ||||||||||||

![]()
| What is a Value Score? The Value Score indexes each vendor’s product offering and business strength relative to its price point. It does not indicate vendor ranking. Vendors that score high offer more bang-for-the-buck (e.g. features, usability, stability) than the average vendor, while the inverse is true for those that score lower. Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes. | On a relative basis, Sendible maintained the highest Info-Tech Value ScoreTM of the vendor group for this use-case scenario. Vendors were indexed against Sendible’s performance to provide a complete, relative view of their product offerings.
|
| For an explanation of how Price is determined, see Information Presentation – Price Evaluation in the Appendix. For an explanation of how the Info-Tech Value Index is calculated, see Information Presentation – Value Index in the Appendix. | |
VENDOR LANDSCAPEVendor Profiles and Scoring |
This section of the Vendor Landscape includes the profiles and scoring for each vendor against the evaluation framework previously outlined.
|
![]() |
||
| Vendor Scoring
Use the Harvey Ball scoring of vendor and product considerations to assess alignment with your own requirements. Review the use-case scenarios relevant to your organization’s Use-Case Fit Assessment results to identify a vendor’s fit to your organization's SMMP needs. (See the following slide for further clarification on the use-case assessment scoring process.) Review the stoplight scoring of advanced features to identify the functional capabilities of vendors. |
![]() |
3 year TCO for this solution falls into pricing tier 8 between $500,000 and $1,000,000.
|
OVERVIEW
|
![]() |
Info-Tech Recommends
Adobe Social provides impressive features, especially for companies that position social media within a larger digital marketing strategy. Organizations that need powerful social analytics or social campaign execution capability should have Adobe on their shortlist, though the product may be an overbuy for social customer care use cases. |
![]() |
|
3 year TCO for this solution falls into pricing tier 6, between $100,000 and $250,000.
|
OVERVIEW
|
![]() |
Info-Tech Recommends
The free version of Hootsuite is useful for getting your feet wet with social management. The paid version is a great SMMP for monitoring and engaging your own social properties with good account and team management at an affordable price. This makes it ideal for SMBs. However, organizations that need deep social analytics may want to look elsewhere. |
![]() |
|
3 year TCO for this solution falls into pricing tier 7, between $250,000 and $500,000
|
OVERVIEW
|
![]() |
Info-Tech Recommends
Social Studio in Salesforce Marketing Cloud remains a leading solution. Organizations that need to blend processes across the enterprise that rely on social listening, deep analytics, and customer engagement should have the product on their shortlist. However, companies with more basic needs may be off-put by the solution’s price point. |
![]() |
|
3 year TCO for this solution falls into pricing tier 4, between $25,000 and $50,000
|
OVERVIEW
|
![]() |
Info-Tech Recommends
Sendible offers a viable solution for small and mid-market companies, as well as social agencies with a focus on customer engagement for marketing and customer service use cases. However, organizations that need deep social analytics may want to look elsewhere. |
![]() |
|
|
OVERVIEW
|
![]()
![]() |
Info-Tech Recommends
Sprinklr is a strong choice for small and mid-market organizations offering breadth of social media management capabilities that covers social analytics, engagement, and customer service. |
![]() |
|
3 year TCO for this solution falls into pricing tier 6, between $100,000 and $250,000
|
OVERVIEW
|
![]() |
Info-Tech Recommends
Sprout Social’s easy-to-understand benchmarking and dashboards, paired with strong response management, make it a great choice for mid-sized enterprises concerned with social engagement. However, organizations that want to do deep social analytics will need to augment the solution. |
![]() |
|
![]()
3 year TCO for this solution falls into pricing tier 4, between $25,000 and $50,000
| OVERVIEW
STRENGTHS
CHALLENGES
|
![]() |
Info-Tech Recommends
Sysomos’ broad array of good features has made it a frequent challenger to Marketing Cloud on analytics-centric SMMP evaluation shortlists. Enterprise-scale customers specifically interested in social listening and analytics, rather than customer engagement and campaign execution, will definitely want to take a look. |
![]() |
|
![]()
3 year TCO for this solution falls into pricing tier 6, between $100,000 and $250,000
| OVERVIEW
STRENGTHS
CHALLENGES
|
![]() |
Info-Tech Recommends
Cision has upped its game in terms of social workflow and response management and it monitors an above-average number of services. It is a steadfast tool for brands that are primarily interested in outbound customer engagement for marketing and customer service use cases. |
![]() |
|
|
This evaluation uses both functional and architectural considerations to eliminate vendors.
Knock-Out CriteriaCOTS vs. Open SourceDeployment Models
Interpreting the Results
|
2.1 |
2.2 |
|
| Analyze and shortlist vendors in the space | Select your SMMP solution |
Critical Points and Checks in Your Procurement
Info-Tech InsightIf you are still not sure of a vendor’s capabilities, we recommend sending an RFI before proceeding with an RFP. INFO-TECH OPPORTUNITYIf your organization lacks a clear procurement process, refer to Info-Tech's Optimize IT Procurement research to help construct a formal process for selecting application technology. | Info-Tech’s 15-Step Procurement ProcessUse Info-Tech's procurement process to ensure that your SMMP selection is properly planned and executed.
Much of your procurement process should already be outlined from your charter and initial project structuring.
|
INPUT: Requirements Workbook and requirements gathering findings
OUTPUT: Full documentation of requirements for the RFP and solution evaluation process
Completed in Section 3
No solution will meet 100% of your requirements. Control the number of mandatory requirements you place in your procurement process to ensure that vendors that are the best fit for your organization are not eliminated unnecessarily.
INPUT: Requirements package, Organization’s procurement procedures
OUTPUT: RFP
MATERIALS: Whiteboard and markers
PARTICIPANTS: Project manager, Core project team
Leverage Info-Tech’s SMMP RFP Template to convey your desired suite requirements to vendors and outline the proposal and procurement steps set by your organization.
Build Your RFP
Approval Process Each organization has a unique procurement process; follow your own organization’s process as you submit your RFPs to vendors.
|
Info-Tech RFP
|
![]() |
Adjust the scope and content of the Vendor Response Template to fit your SMMP procurement process and vendor requirements. |
Section |
Why is this section important? |
| About the Vendor | This is where the vendor will describe itself and prove its organizational viability. |
| Understanding of the Challenge | Demonstrates that understanding of the problem is the first step in being able to provide a solution. |
| Methodology | Shows that there is a proven methodology to approach and solve the challenge. |
| Proposed Solution | Describes how the vendor will address the challenge. This is a very important section as it articulates what you will receive from the vendor as a solution. |
| Project Management, Plan, and Timeline | Provides an overview of the project management methodology, phases of the project, what will be delivered, and when. |
| Vendor Qualifications | Provides evidence of prior experience with delivering similar projects for similar clients. |
| References | Provides contact information for individuals/organizations for which the vendor has worked and who can vouch for the experience and success of working with this vendor. |
| Value Added Services | Remember, this could lead to a long-term relationship. It’s not only about what you need now, but also what you may need in the future. |
| Requirements | Confirmation from the vendor as to which requirements it can meet and how it will meet them. |
Build a fair evaluation framework that evaluates vendor solutions against a set criteria rather than relative comparisons. INSTRUCTIONS
|
How to use this tool
|
Demo |
Invite vendors to come onsite to demonstrate the product and to answer questions. Use a demo script to help identify how a vendor’s solution will fit your organization’s particular business capability needs. |
| Make sure the solution will work for your business
Provide the vendor with some usage patterns for the SMMP tool in preparation for the vendor demo. Provide the following information to vendors in your script:
|
How to challenge the vendors in the demo
|
SMMP Demo Script Template |
INPUT: Requirements package, Use-case results
OUTPUT: Onsite demo
Don’t just choose the vendor who gave the best presentation. Instead, select the vendor who meets your functional requirements and organizational needs.
| Category | Weight | Vendor 1 | Vendor 2 | Vendor 3 | Vendor 4 |
| SMMP Features | 60% | 75% | 80% | 80% | 90% |
| Architecture | 25% | 55% | 60% | 90% | 90% |
| Support | 15% | 10% | 70% | 60% | 95% |
| Total Score | 100% | 60% | 74% | 80% | 91% |
| Use your objective evaluation to select a vendor to recommend to management for procurement. | |||||
Following the identification of your selected suite, submit your recommendation to the organization’s management or evaluation team for final approval.
![]() |
|
![]() |
Create an RFP for SMMP procurement
Our Info-Tech analyst will walk you through the RFP preparation to ensure the SMMP requirements are articulated clearly to vendors in this space. |
|
![]() |
Create SMMP demo scripts
An analyst will walk you through the demo script preparation to guide the SMMP product demonstrations and briefings offered by vendors. The analyst will ensure the demo script addresses key requirements documented earlier in the process. |

Estimated Timeline:
Info-Tech InsightEven a solution that is a perfect fit for an organization will fail to generate value if it is not properly implemented or measured. Conduct the necessary planning before implementing your SMMP. | Major Milestones Reached
Key Activities Completed
| Outcomes from This PhasePlans for implementing the selected SMMP tool. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 3.1: Establish best practices for SMMP implementation | Step 3.2: Assess the measured value from the project |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
|
Phase 3 Results & Insights:
|
|
3.1 |
3.2 |
|
| Establish best practices for SMMP implementation | Assess the measured value from the project |
Plan |
|
|
Create RFP |
|
|
Evaluate |
|
|
Implement |
|
|
An SMMP is a tool, not a substitute, for adequate cross-departmental social media oversight. You must coordinate efforts across constituent stakeholders.
Before implementing the SMMP, go through the appropriate organizational governance structures to ensure they have input into the deployment. If a social media steering committee is not already in place, rolling out an SMMP is a great opportunity to get one going. See our research on social media program execution for more details.
3.1.1 60 minutes
INPUT: Project stakeholders, SMMP mandate
OUTPUT: Social Media Governance Structure
MATERIALS: Whiteboard, Markers
PARTICIPANTS: Project Manager, Core project team
EXAMPLE
| Executive Sponsorship | ||||
| Social Media Steering Committee | ||||
| VP Marketing | VP Sales | VP Customer Service | VP Public Relations | CIO/ IT Director |
| Marketing Dept. | Sales Dept. | Customer Service Dept. | Public Relations Dept. | IT Dept. |
Leaders must ensure that the SMSC has a formal mandate with clear objectives, strong executive participation, and a commitment to meeting regularly. Create an SMSC Charter to formalize the committee governance capabilities.
Developing a Social Media Steering Committee Charter:
|
INFO-TECH DELIVERABLE![]() |
|
![]() |
CRM vendors still lag in out-of-the-box social features, making a separate SMMP purchase a given. For companies that have not formally integrated social media with CRM, IT should develop the business case in conjunction with the applicable business-side partner (e.g. Marketing, Sales, Service, PR, etc.).
An example of how an SMMP linked via CRM can provide proactive service while contributing to sales and marketing. |
“These tools are enabling sales, and they help us serve our customers better. And anything that does that, is a good investment on our part.” Chip Meyers, (Sales Operation Manager, Insource) |
SMMPs are a necessary single-channel evolutionary step, just like there used to be email-only and web chat-only customer service options in the late 1990s. But they are temporary. SMMPs will eventually be subsumed into the larger marketing automation ecosystem. Only a few best of breed will survive in 10 years.
3.1.2 1 hour
INPUT: SMMP data sources
OUTPUT: SMMP data migration inventory
MATERIALS: Whiteboard, Markers
PARTICIPANTS: Project Manager, Core project team
| Data Source | Migration/Integration Direction | Data Type/Use Case |
| Social Platform | Bidirectional | Recent Social Posts |
| Customer Data Warehouse | Bidirectional | Contact Information, Cases, Tasks, Opportunities |
|
IT: SMMP Maintenance Checklist
|
Even cloud-based platforms like SMMPs require a certain degree of maintenance around account controls, security, and content pruning. IT should assist the business units in carrying out periodic maintenance.
Using an SMMP can help mitigate many of the risks associated with social media. Review the risk categories on the next several slides to determine which ones can be mitigated by effective utilization of a dedicated SMMP.
| Risk Category | Likelihood | Risk(s) | Suggested Mitigation Strategy |
| Privacy and Confidentiality | High |
|
|
| Risk Category | Likelihood | Risk(s) | Suggested Mitigation Strategy |
| Trademark and Intellectual Property | Medium |
|
|
| Control over Brand Image and Inappropriate Content | Medium |
|
|
| Risk Category | Likelihood | Risk(s) | Suggested Mitigation Strategy |
| IT Security | Medium | Risk of employees downloading or being sent malware through social media services. Your clients are also exposed to this risk; this may undermine their trust of your brand. |
|
| Bandwidth | Low | Increase in bandwidth needs to support social media efforts, particularly when using video social media such as YouTube. |
|
| Risk Category | Likelihood | Risk(s) | Suggested Mitigation Strategy |
| Competitors Poaching Client Lists | Low | The ability for a competitor to view lists of clients that have joined your organization’s social media groups. |
|
| Increased Cost of Servicing Customers | Low | Additional resources may be allocated to social media without seeing immediate ROI. |
|
3.1.3 20 minutes
INPUT: Risk assessment inventory
OUTPUT: Top social media risks and mitigation plan
MATERIALS: Whiteboard, Markers
PARTICIPANTS: Project Manager, Core project team
| Rank | Risk Category | Mitigation Steps |
| High | Confidentiality | We have strong records retention requirements, so using a rules-based SMMP like SocialVolt is a must. |
| Medium | Brand Image | Ensure that only personnel who have undergone mandatory training can touch our social accounts via an SMMP. |
| Low | Competitors’ Poaching Lists | Migrate our Business Services division contacts onto LinkedIn – maintain no Facebook presence for these clients. |
Determine when, where, and how social media services should be used to augment existing workflows across (and between) the business process domains. Establish escalation rules and decide whether workflows will be reactive or proactively.
|
![]() |
The social media governance team should have high-level supervision of process workflows. Ask to see reports from line managers on what steps they have taken to put process in place for reactive and proactive customer interactions, as well as escalations and channel switching. IT helps orchestrate these processes through knowledge and expertise with SMMP workflow capability.
| Agency Model | |
![]() |
|
| Centralized Model | |
In this example, marketing owns and manages a single SMMP |
|
| Distributed Model | |
![]() |
|
3.1.4 1 Hour
INPUT: Deployment models
OUTPUT: Best fit deployment model
MATERIALS: Whiteboard, Markers
PARTICIPANTS: Project Manager, Core project team
| Agency Model | Centralized Model | Distributed Model |
![]() |
![]() |
![]() |
IT must assist the business by creating and executing a role-based training program. An SMMP expert in IT should lead training sessions for targeted groups of end users, training them only on the functions they require to perform their jobs.
Use the table below to help identify which roles should be trained on which SMMP features.
| PR Professionals | Marketing Brand, Product, and Channel Managers | Customer Service Reps and Manager | Product Development and Market Research | IT Application Support | |
| Account Management | |||||
| Response and Engagement | |||||
| Social Analytics and Data Mining | |||||
| Marketing Campaign Execution | |||||
| Mobile Access | |||||
| Archiving | |||||
| CRM Integration |
3.1 |
3.2 |
|
| Establish best practices for SMMP implementation | Assess the measured value from the project |
| Share of Voice
How often a brand is mentioned, relative to other brands competing in a defined market. User Engagement
Tracking reception of campaigns and leads brought in as a result. |
![]() |
Reach
Measurement of the size of market your brand advertisements and communications reach. Impressions
Cost to reach one percent of your organization’s audience. |
Product Innovation
Time-to-Market
|
![]() |
New Product Launches
Cancelled Projects
|
| Cost per Lead
The average amount an organization spends to find leads. Conversion Rate
How many sales leads are in the funnel at a given time. |
![]() |
Average Cycle Time
Average length of time it takes leads to progress through the sales cycle. Revenue by Lead
Total revenue divided by number of sales reps. |
Time to Resolution
First Contact Resolution
|
![]() |
Contact Frequency
Satisfaction Scores
|
| Employee Retention
The level of effort an organization exerts to maintain its current staff. Employee Engagement
A company where candidates would rather work over other companies. |
![]() |
Recruitment Cycle Time
Average length of time required to recruit a new employee. Employee Productivity
The ratio of employee referrals that complete the recruitment process. |
“There are conversations going on behind your back, and if you're not participating in them, then you're either not perpetuating the positive conversation or not diffusing the negative. And that's irresponsible in today's business world.” (Lon Safko, Social Media Bible)
3.2.1 30 minutes
INPUT: Social media goals
OUTPUT: SMMP KPIs
MATERIALS: Whiteboard, Markers
PARTICIPANTS: Representative stakeholders from different business units
For each listed department, identify the social media goals and departmental key performance indicators to measure the impact of the SMMP.
| Department | Social Media Goals | KPI |
| Marketing |
|
|
| Product Development |
|
|
| Sales |
|
|
| Customer Service |
|
|
| HR |
|
|
![]() |
|
3.1.1 |
![]() |
Establish a governance structure for social media management
Our Info-Tech analyst will walk you through the exercise of developing roles and responsibilities to govern your social media program. |
3.1.2 |
![]() |
Specify the data linkages you will need between your CRM and SMMP
The analyst will help you identify the points of integration between the SMMP and your CRM platform. |
3.1.3 |
![]() |
Determine your top social media risks
Our Info-Tech analyst will facilitate the discussion to identify the top risks associated with the SMMP and determine mitigation strategies for each risk. |
3.1.4 |
![]() |
Determine the best-fit deployment model
An analyst will demonstrate the different SMMP deployment models and assist in determining the most suitable model for your organization. |
3.2.1 |
![]() |
Identify departmental KPIs
An analyst will work with different stakeholders to determine the top social media goals for each department. |
Ashja, Mojtaba, Akram Hadizadeh, and Hamid Bidram. “Comparative Study of Large Information Systems’ CSFs During Their Life Cycle.” Information Systems Frontiers. September 8, 2013.
UBM. “The State of Social Media Analytics.” January, 2016.
Jobvite. “2015 Recruiter Nation Survey.” September, 2015.
Info-Tech’s Vendor Landscapes are research materials that review a particular IT market space, evaluating the strengths and abilities of both the products available in that space, as well as the vendors of those products. These materials are created by a team of dedicated analysts operating under the direction of a senior subject matter expert over a period of several weeks.
Evaluations weigh selected vendors and their products (collectively “solutions”) on the following eight criteria to determine overall standing:
Evaluated solutions within scenarios are visually represented by a Pathway to Success, based off a linear graph using above scoring methods:
Info-Tech’s Vendor Landscapes are researched and produced according to a strictly adhered to process that includes the following steps:
This document outlines how each of these steps is conducted.
Info-Tech works closely with its client base to solicit guidance in terms of understanding the vendors with whom clients wish to work and the products that they wish evaluated; this demand pool forms the basis of the vendor selection process for Vendor Landscapes. Balancing this demand, Info-Tech also relies upon the deep subject matter expertise and market awareness of its Senior Analysts to ensure that appropriate solutions are included in the evaluation. As an aspect of that expertise and awareness, Info-Tech’s analysts may, at their discretion, determine the specific capabilities that are required of the products under evaluation, and include in the Vendor Landscape only those solutions that meet all specified requirements.
Information on vendors and products is gathered in a number of ways via a number of channels.
Initially, a request package is submitted to vendors to solicit information on a broad range of topics. The request package includes:
These request packages are distributed approximately eight weeks prior to the initiation of the actual research project to allow vendors ample time to consolidate the required information and schedule appropriate resources.
During the course of the research project, briefings and demonstrations are scheduled (generally for one hour each session, though more time is scheduled as required) to allow the analyst team to discuss the information provided in the survey, validate vendor claims, and gain direct exposure to the evaluated products. Additionally, an end-user survey is circulated to Info-Tech’s client base and vendor-supplied reference accounts are interviewed to solicit their feedback on their experiences with the evaluated solutions and with the vendors of those solutions.
These materials are supplemented by a thorough review of all product briefs, technical manuals, and publicly available marketing materials about the product, as well as about the vendor itself.
Refusal by a vendor to supply completed surveys or submit to participation in briefings and demonstrations does not eliminate a vendor from inclusion in the evaluation. Where analyst and client input has determined that a vendor belongs in a particular evaluation, it will be evaluated as best as possible based on publicly available materials only. As these materials are not as comprehensive as a survey, briefing, and demonstration, the possibility exists that the evaluation may not be as thorough or accurate. Since Info-Tech includes vendors regardless of vendor participation, it is always in the vendor’s best interest to participate fully.
All information is recorded and catalogued, as required, to facilitate scoring and for future reference.
Once all information has been gathered and evaluated for all vendors and products, the analyst team moves to scoring. All scoring is performed at the same time so as to ensure as much consistency as possible. Each criterion is scored on a ten-point scale, though the manner of scoring for criteria differs slightly:
Cumulative Scoring is on a four-point scale. Zero points are awarded to features that are deemed absent or unsatisfactory, one point is assigned to features that are partially present, two points are assigned to features that require an extra purchase in the vendor’s product portfolio or through a third party, three points are assigned to features that are fully present and native to the solution, and four points are assigned to the best-of-breed native feature. The assigned points are summed and normalized to a value out of ten. For example, if a particular Vendor Landscape evaluates eight specific features in the Feature Criteria, the summed score out of eight for each evaluated product would be multiplied by 1.25 to yield a value out of ten to represent in a Harvey Ball format.
In Scalar Scoring, a score of ten is assigned to the lowest cost solution, and a score of one is assigned to the highest cost solution. All other solutions are assigned a mathematically-determined score based on their proximity to / distance from these two endpoints. For example, in an evaluation of three solutions, where the middle cost solution is closer to the low end of the pricing scale it will receive a higher score, and where it is closer to the high end of the pricing scale it will receive a lower score; depending on proximity to the high or low price it is entirely possible that it could receive either ten points (if it is very close to the lowest price) or one point (if it is very close to the highest price). Where pricing cannot be determined (vendor does not supply price and public sources do not exist), a score of 0 is automatically assigned.
In Base5 scoring a number of sub-criteria are specified for each criterion (for example, Longevity, Market Presence, and Financials are sub-criteria of the Viability criterion), and each one is scored on the following scale:
The assigned points are summed and normalized to a value out of ten as explained in Cumulative Scoring above.
Scores out of ten, known as Raw scores, are transposed as is into Info-Tech’s Vendor Landscape Shortlist Tool, which automatically determines Vendor Landscape positioning (see Vendor Landscape Methodology: Information Presentation – Vendor Landscape, below), Criteria Score (see Vendor Landscape Methodology: Information Presentation – Criteria Score, below), and Value Index (see Vendor Landscape Methodology: Information Presentation – Value Index, below).
Info-Tech’s criteria scores are visual representations of the absolute score assigned to each individual criterion, as well as of the calculated overall vendor and product scores. The visual representation used is Harvey Balls.
Harvey Balls are calculated as follows:
| Overall Harvey Balls represent weighted aggregates. | ![]() |
Criteria Harvey Balls represent individual raw scores. |
Within each Vendor Landscape a set of use-case scenarios are created by the analysts by considering the different outcomes and purposes related to the technology being evaluated. To generate the custom use-case vendor performances, the feature and Harvey Ball scoring performed in the Vendor Landscapes are set with custom weighting configurations. CalculationsEach product has a vendor multiplier calculated based on its weighted performance, considering the different criteria scored in the Harvey Ball evaluations. To calculate each vendor’s performance, the advanced feature scores are multiplied against the weighting for the feature in the use-case scenario’s configuration. The weighted advanced feature score is then multiplied against the vendor multiplier. The sum of each vendor’s total weighted advanced features is calculated. This sum is used to identify the vendor’s qualification and relative rank within the use case.
Each use case’s feature weightings and vendor/product weighting configurations are displayed within the body of slide deck. |
Use-Case Vendor Performance
Vendors who qualified for each use-case scenario are ranked from first to last in a weighted bar graph based on the features considered. |
Advanced features are determined by analyst expertise, leveraging information gained from conversations with clients. Advanced features chosen as part of the evaluation are representative of what Info-Tech clients have indicated are of importance to their vendor solution. Advanced features are evaluated through a series of partial marks, dedicated to whether the solution performs all aspects of the Info-Tech definition of the feature and whether the feature is provided within the solution. Analysts hold the right to determine individual, unique scoring criteria for each evaluation. If a feature does not meet the criteria, Info-Tech holds the right to score the feature accordingly. Use cases use features as a baseline of the inclusion and scoring criteria. |
![]() |
Info-Tech’s Value Index is an indexed ranking of solution value per dollar as determined by the raw scores assigned to each criteria (for information on how raw scores are determined, see Vendor Landscape Methodology: Scoring, above). Value scores are calculated as follows:
Where pricing is not provided by the vendor and public sources of information cannot be found, an Affordability raw score of zero is assigned. Since multiplication by zero results in a product of zero, those solutions for which pricing cannot be determined receive a Value Score of zero. Since Info-Tech assigns a score of zero where pricing is not available, it is always in the vendor’s best interest to provide accurate and up-to-date pricing. In the event that insufficient pricing is available to accurately calculate a Value Index, Info-Tech will omit it from the Vendor Landscape. |
Value IndexVendors are arranged in order of Value Score. The Value Score each solution achieved is displayed, and so is the average score.
Those solutions that are ranked as Champions are differentiated for point of reference. |
Info-Tech’s Price Evaluation is a tiered representation of the three-year Total Cost of Ownership (TCO) of a proposed solution. Info-Tech uses this method of communicating pricing information to provide high-level budgetary guidance to its end-user clients while respecting the privacy of the vendors with whom it works. The solution TCO is calculated and then represented as belonging to one of ten pricing tiers. Pricing tiers are as follows:
Where pricing is not provided, Info-Tech makes use of publicly available sources of information to determine a price. As these sources are not official price lists, the possibility exists that they may be inaccurate or outdated, and so the source of the pricing information is provided. Since Info-Tech publishes pricing information regardless of vendor participation, it is always in the vendor’s best interest to supply accurate and up to date information. Info-Tech’s Price Evaluations are based on pre-defined pricing scenarios (see Product Pricing Scenario, below) to ensure a comparison that is as close as possible between evaluated solutions. Pricing scenarios describe a sample business and solicit guidance as to the appropriate product/service mix required to deliver the specified functionality, the list price for those tools/services, as well as three full years of maintenance and support. |
Price EvaluationCall-out bubble indicates within which price tier the three-year TCO for the solution falls, provides the brackets of that price tier, and links to the graphical representation.
Scale along the bottom indicates that the graphic as a whole represents a price scale with a range of $1 to $2.5M+, while the notation indicates whether the pricing was supplied by the vendor or derived from public sources. |
| At the conclusion of all analyses, Info-Tech presents awards to exceptional solutions in three distinct categories. Award presentation is discretionary; not all awards are extended subsequent to each Vendor Landscape and it is entirely possible, though unlikely, that no awards may be presented.
Awards categories are as follows:
|
Vendor Awards for Use-Case Performance
|
Info-Tech takes the factual accuracy of its Vendor Landscapes, and indeed of all of its published content, very seriously. To ensure the utmost accuracy in its Vendor Landscapes, we invite all vendors of evaluated solutions (whether the vendor elected to provide a survey and/or participate in a briefing or not) to participate in a process of fact check.
Once the research project is complete and the materials are deemed to be in a publication ready state, excerpts of the material specific to each vendor’s solution are provided to the vendor. Info-Tech only provides material specific to the individual vendor’s solution for review encompassing the following:
Info-Tech does not provide the following:
Info-Tech provides a one-week window for each vendor to provide written feedback. Feedback must be corroborated (be provided with supporting evidence), and where it does, feedback that addresses factual errors or omissions is adopted fully, while feedback that addresses opinions is taken under consideration. The assigned analyst team makes all appropriate edits and supplies an edited copy of the materials to the vendor within one week for final review.
Should a vendor still have concerns or objections at that time, they are invited to a conversation, initially via email, but as required and deemed appropriate by Info-Tech, subsequently via telephone, to ensure common understanding of the concerns. Where concerns relate to ongoing factual errors or omissions, they are corrected under the supervision of Info-Tech’s Vendor Relations personnel. Where concerns relate to ongoing differences of opinion, they are again taken under consideration with neither explicit not implicit indication of adoption.
Publication of materials is scheduled to occur within the six weeks following the completion of the research project, but does not occur until the fact check process has come to conclusion, and under no circumstances are “pre-publication” copies of any materials made available to any client.
Info-Tech Research Group is providing each vendor with a common pricing scenario to enable normalized scoring of Affordability, calculation of Value Index rankings, and identification of the appropriate solution pricing tier as displayed on each vendor scorecard.
Vendors are asked to provide list costs for SMMP software licensing to address the needs of a reference organization described in the pricing scenario. Please price out the lowest possible 3-year total cost of ownership (TCO) including list prices for software and licensing fees to meet the requirements of the following scenario.
Three-year total acquisition costs will be normalized to produce the Affordability raw scores and calculate Value Index ratings for each solution.
The pricing scenario:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint helps you to establish a relationship with your stakeholders, both within and outside of IT. You’ll learn how to embed relationship management throughout your organization.
Use this tool to capture your findings as you work through the blueprint.
Customize this tool to obtain buy in from leadership and other stakeholders. As you continue through the blueprint, continue to leverage this template to communicate what your BRM program is about.
This worksheet template is used to outline what the BRM practice will do and associate the expectations and tasks with the roles throughout your organization. Use this to communicate that while your BRM role has a strategic focus and perspective of the relationship, other roles will continue to be important for relationship management.
This worksheet allows you to list the stakeholders and their priority in order to establish how you want to engage with them.
These job descriptions will provide you with list of competencies and qualifications necessary for a BRM operating at different levels of maturity. Use this template as a guide, whether hiring internally or externally, for the BRM role.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Set the foundation for your BRM practice – understand your current state and set the vision.
An understanding of current pain points and benefits to be addressed through your BRM practice. Establish alignment on what your BRM practice is – use this to start obtaining buy-in from stakeholders.
1.1 Define BRM
1.2 Analyze Satisfaction
1.3 Assess SWOT
1.4 Create Vision
1.5 Create the BRM Mission
1.6 Establish Goals
BRM definition
Identify areas to be addressed through the BRM practice
Shared vision, mission, and understanding of the goals for the brm practice
Determine where the BRM fits and how they will operate within the organization.
Learn how the BRM practice can best act on your goals.
2.1 Establish Guiding Principles
2.2 Determine Where BRM Fits
2.3 Establish BRM Expectations
2.4 Identify Roles With BRM Responsibilities
2.5 Align Capabilities
An understanding of where the BRM sits in the IT organization, how they align to their business partners, and other roles that support business relationships
Determine how to identify and work with key stakeholders.
Determine ways to engage with stakeholders in ways that add value.
3.1 Brainstorm Sources of Business Value
3.2 Identify Key Influencers
3.3 Categorize the Stakeholders
3.4 Create the Prioritization Map
3.5 Create Your Engagement Plan
Shared understanding of business value
A plan to engage with stakeholders
Determine how to continuously improve the BRM practice.
An ongoing plan for the BRM practice.
4.1 Create Metrics
4.2 Prioritize Your Projects
4.3 Create a Portfolio Investment Map
4.4 Establish Your Annual Plan
4.5 Build Your Transformation Roadmap
4.6 Create Your Communication Plan
Measurements of success for the BRM practice
Prioritization of projects
BRM plan
As long as humans are involved in enabling technology, it will always remain important to ensure that business relationships support business needs. At the cornerstone of those relationships is trust and the establishment of business value. Without trust, you won’t be believed, and without value, you won’t be invited to the business table.
Business relationship management can be a role, a capability, or a practice – either way it’s essential to ensure it exists within your organization. Show that IT can be a trusted partner by showing the value that IT offers.
|
Allison Straker
|
| Is IT saying this about business partners?
I don’t know what my business needs and so we can’t add as much value as we’d like. My partners don’t give us the opportunity to provide new ideas to solve business problems My partners listen to third parties before they listen to IT. We’re too busy and don’t have the capacity to help my partners. |
|
Are business partners saying this about IT?
IT does not create and deliver valuable services/solutions that resolve my business pain points. IT does not come to me with innovative solutions to my business problems/challenges/issues. IT blocks my efforts to drive the business forward using innovative technology solutions. IT does not advocate for my needs with the decision makers in the organization. |
While organizations realize they need to do better, they often don’t know how to improve.
… these are all things that a mature business relationship can do to improve your organization.
Key improvement areas identified by business leaders and IT leaders
Business relationships can take a strategic, tactical, or operational perspective.
While all levels are needed, focus on a strategic perspective for optimal outcomes.
Create business value through:
IT Benefits
|
Business Benefits
|
||
|
Increase your business benefits by moving up higher – from operational to tactical to strategic. |
|
|
When business partners are satisfied that IT understands their needs, they have a higher perception of the value of overall IT
The relationship between the perception of IT value and business satisfaction is strong (r=0.89). Can you afford not to increase your understanding of business needs?
(Source: Info-Tech Research Group diagnostic data/Business-Aligned IT Strategy blueprint (N=652 first-year organizations that completed the CIO Business Vision diagnostic))
A tale of two IT partners
One IT partner approached their business partner without sufficient background knowledge to provide insights. The relationship was not strong and did not provide the business with the value they desired. |
Research your business and be prepared to apply your knowledge to be a better partner.
The other IT partner approached with knowledge of the business and external parties (vendors, competitors, industry). The business partners received this positively. They invited the IT partners to meetings as they knew IT would bring value to their sessions. |

| 1) Survey your stakeholders to measure improvements in customer satisfaction | 2) Measure BRM success against the goals for the practice | |
Business satisfaction survey
|
|
|
|
||
Info-Tech has developed an approach that can be used by any organization to improve or successfully implement BRM.
|
Become a Trusted Partner and Advisor | |
KNOWLEDGE OF INDUSTRY
STRATEGIC |
Value Creator and Innovator
Strategic view of IT and the business with knowledge of the market and trends; a connector driving value-added services. |
|
KNOWLEDGE OF FUNCTIONS
TACTICAL |
Influencer and Advocate
Two-way voice between IT and business, understanding business processes and activities including IT touchpoints and growing tactical and strategic view of services and value. |
|
| TABLE STAKES:
COMMUNICATION SERVICE DELIVERY PROJECT DELIVERY OPERATIONAL |
Deliver
Communication, service, and project delivery and fulfillment, initial engagement with and knowledge of the business. |
|
| Foundation: Define and communicate the meaning and vision of BRM | ||
| IT | Partner | What to do to move to the next level | ||
Strategic PartnerShared goals for maximizing value and shared risk and reward | 5 | Strategic view of IT and the business with knowledge of the market and trends; a connector driving value-added services. Value Creator and Innovator | See partners as integral to business success and growth | Focus on continuous learning and improvement. |
Trusted AdvisorCooperation based on mutual respect and understanding | 4 | Partners understand, work with, and help improve capabilities. Influencer and Advocate | Sees IT as helpful and reliable | Strategic: IT needs to demonstrate and apply knowledge of business, industry, and external influences. |
Service ProviderRoutine – innovation is a challenge | 3 | Two-way voice between IT and business; understanding business processes and activities including IT touchpoints and growing tactical and strategic view of services and value. Priorities set but still always falling behind. | Views IT as helpful but they don’t provide guidance | IT needs to excel in portfolio and transition management. Business needs to engage IT in strategy. |
Order TakerDistrust, reactive | 2 | Focuses on communication, service, and project delivery and fulfillment, initial engagement with and knowledge of the business. Delivery Service | Engages with IT on an as-needed basis | Improve Tactical: IT needs to demonstrate knowledge of the business they are in. IT to improve BRM and service management. Business needs to embrace BRM role and service management. |
Ad HocLoudest in, first out | 1 | Too busy doing the basics; in firefighter mode. | Low satisfaction (cost, duration, quality) | Improve Operational Behavior: IT to show value with “table stakes” – communication, service delivery, project delivery. IT needs to establish intake/demand management.
|
(Adapted from BRM Institute Maturity Model and Info-Tech’s own model)
Business relationship management isn’t just about having a pleasant relationship with stakeholders, nor is it about just delivering things they want. It’s about driving business value in everything that IT does and leveraging relationships with the business and IT, both within and outside your organization.
Every organization will apply the BRM practice differently. Understand what’s needed within your organization to create the best fit.
When implemented properly, a BRM is a value creator, advocate, innovator, and influencer.
Before you can create incremental business value, you must master the fundamentals of service and project delivery.
Knowledge of your current situation is only half the battle; knowledge of the business/industry is key.
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Key deliverable:
Executive Buy-In and Communication Presentation TemplateExplain the need for the BRM practice and obtain buy-in from leadership and staff across the organization.
|
BRM WorkbookCapture the thinking behind your organization’s BRM program. |
|
BRM Stakeholder Engagement Plan WorksheetWorksheet to capture how the BRM practice will engage with stakeholders across the organization. |
|
BRM Role Expectations WorksheetHow business relationship management will be supported throughout the organization at a strategic, tactical, and operational level. |
|
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 8 to 12 calls over the course of 4 to 6 months.
What does a typical GI on this topic look like?
Phase 1 |
Phase 2 |
Phase 3 |
Phase 4 |
Phase 5 |
| Call #1: Discuss goals, current state, and an overview of BRM.
Call #2: Examine business satisfaction and discuss results of SWOT. |
Call #3: Establish BRM mission, vision, and goals. | Call #4: Develop guiding principles.
Call #5: Establish the BRM operating model and role expectations. |
Call #6: Establish business value. Discuss stakeholders and engagement planning. | Call #7: Develop metrics. Discuss portfolio management.
Call #8: Develop a communication or rollout plan. |
Workshop OverviewComplete the CIO-Business Vision diagnostic prior to the workshop. |
Contact your account representative for more information.
|
| Day 1 | Day 2 | Day 3 | Day 4 | Post-Workshop | |
| Activities |
Set the FoundationAssess & Situate |
Define the Operating ModelPlan |
Define EngagementImplement |
Implement BRMReassess |
Next steps and Wrap-Up (offsite) |
|
1.1 Discuss rationale and importance of business relationship management 1.2 Review CIO BV results 1.3 Conduct SWOT analysis (analyze strengths, weaknesses, opportunities, and threats) 1.4 Establish BRM vision and mission 1.5 Define objectives and goals for maturing the practice |
2.1 Create your list of guiding principles (optional) 2.2 Define business value 2.3. Establish the operating model for the BRM practice 2.4 Define capabilities |
3.1. Identify key stakeholders 3.2 Map, prioritize, and categorize the stakeholders 3.4 Create an engagement plan |
4,1 Define metrics 4.2 Identify remaining enablers/blockers for practice implementation 4.3 Create roadmap 4.4 Create communication plan |
5.1 Complete in-progress deliverables from previous four days 5.2 Set up review time for workshop deliverables and to discuss next steps |
|
| Deliverables |
|
|
|
|
|
| Assess
1.1 Define BRM 1.2 Analyze Satisfaction 1.3 Assess SWOT |
Situate
2.1 Create Vision 2.2 Create the BRM Mission 2.3 Establish Goals |
Plan
3.1 Establish Guiding Principles 3.2 Determine Where BRM Fits 3.3 Establish BRM Expectations 3.4 Identify Roles With BRM Responsibilities 3.5 Align Capabilities |
||
| Implement
4.1 Brainstorm Sources of Business Value 4.2 Identify Key Influencers 4.3 Categorize the Stakeholders 4.4 Create the Prioritization Map 4.5 Create Your Engagement Plan |
Reassess & Embed
5.1 Create Metrics 5.2 Prioritize Your Projects 5.3 Create a Portfolio Investment Map 5.4 Establish Your Annual Plan 5.5 Build Your Transformation Roadmap 5.6 Create Your Communication Plan |
| Who are BRM relationships with? |
|
The BRM has multiple arms/legs to ensure they’re aligned with multiple parties – the partners within the lines of business, external partners, and technology partners. | |
| What does a BRM do? | Engage the right stakeholders – orchestrate key roles, resources, and capabilities to help stimulate, shape, and harvest business value.
Connect partners (IT and other business) with the resources needed. Help stakeholders navigate the organization and find the best path to business value. |
|
|
| What does a BRM focus on? |
|
Demand Shaping – Surfacing and shaping business demand
Value Harvesting – Identifying ways to increase business value and providing insights Exploring – Rationalizing demand and reviewing new business, technology, and industry insights Servicing – Managing expectations and facilitating business strategy; business capability road mapping |
|
Many organizations face business dissatisfaction because they do not understand what the role of a BRM should be.
A BRM Is NOT:
|
A BRM Is:
|
Input: Your preliminary thoughts and ideas on BRM
Output: Themes summarizing what BRM will be at your organization
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
Download the BRM Workbook
Download the Executive Buy-In and Communication Template
Leverage the CIO Business Vision Diagnostic to provide clarity on:
|
|
1 hour
Input: CIO-Business Vision Diagnostic, Other business feedback
Output: Summary of your partners’ view of the IT relationship
Materials: Whiteboard/flip charts (physical or electronic)
Participants: CIO, IT management team
Use the BRM Workbook to capture ideas
Polish the goals in the Executive Buy-In and Communication Template
A SWOT analysis is a structured planning method organizations use to evaluate the effects of internal strengths and weaknesses and external opportunities and threats on a project or business venture.
Strengths (Internal)
|
Weaknesses (Internal)
|
Opportunities (External)
|
Threats (External)
|
1 hour
Input: IT and business stakeholder expertise
Output: Analysis of internal and external factors impacting the IT organization
Materials: Whiteboard/flip charts (physical or electronic)
Participants: CIO, IT management team
Capture in the BRM Workbook
| Assess 1.1 Define BRM 1.2 Analyze Satisfaction 1.3 Assess SWOT | Situate 2.1 Create Vision 2.2 Create the BRM Mission 2.3 Establish Goals | Plan 3.1 Establish Guiding Principles 3.2 Determine Where BRM Fits 3.3 Establish BRM Expectations 3.4 Identify Roles With BRM Responsibilities 3.5 Align Capabilities | ||
| Implement 4.1 Brainstorm Sources of Business Value 4.2 Identify Key Influencers 4.3 Categorize the Stakeholders 4.4 Create the Prioritization Map 4.5 Create Your Engagement Plan | Reassess & Embed 5.1 Create Metrics 5.2 Prioritize Your Projects 5.3 Create a Portfolio Investment Map 5.4 Establish Your Annual Plan 5.5 Build Your Transformation Roadmap 5.6 Create Your Communication Plan |
| Your strategy is a critical input into your program. Extract critical components of your strategy and convert them into a set of actionable principles that will guide the selection of your operating model.
|
|
Establish the vision of what your BRM practice will achieve.
Your vision will paint a picture for your stakeholders, letting them know where you want to go with your BRM practice.
The vision will also help motivate and inspire your team members so they understand how they contribute to the organization. Your strategy must align with and support your organization’s strategy. |
Good Visions
|
When Visions Fail
|
|
Begin the process of deriving the business relationship management vision statement by examining your business and user concerns. These are the problems your organization is trying to solve.
Paint the picture for your team and stakeholders so that they align on what BRM will achieve. |
Sample vision statements:
1 hour
Input: IT and business strategies
Output: Vision statement
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
| Strong vision statements have the following characteristics |
|
|
Use the BRM Workbook to capture ideas
Polish the goals in the Executive Buy-In and Communication Template
|
Make sure the practice’s mission statement reflects answers to the questions below:
The questions:
|
“A mission statement illustrates the purpose of the organization, what it does, and what it intends on achieving. Its main function is to provide direction to the organization and highlight what it needs to do to achieve its vision.” (Joel Klein, BizTank (in Hull, “Answer 4 questions to get a great mission statement.”))
Sample mission statements
|
To enhance the lives of our end users through our products so that our brand becomes synonymous with user-centricity. To enable innovative services that are seamless and enjoyable to our customers so that together we can inspire change. Apple’s mission statement: “To bring the best user experience to its customers through its innovative hardware, software, and services.” (Mission Statement Academy, May 2019.) Coca Cola’s mission statement: “To refresh the world in mind, body, and spirit, to inspire moments of optimism and happiness through our brands and actions, and to create value and make a difference.” (Mission Statement Academy, August 2019.) Tip: Using the “To … so that” format helps to keep your mission focused on the “why.” |
1 hour
Input: IT and business strategies, Vision
Output: Mission statement
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
“People don't buy what you do; they buy why you do it and what you do simply proves what you believe.” (Sinek, Transcript of “How Great Leaders Inspire Action.”)
Download the BRM Workbook
Download the Executive Buy-In and Communication Template
VALUE HARVESTING
|
|
DEMAND SHAPING
|
SERVICING
|
EXPLORING
|
|
VALUE HARVESTING
Success may mean that you:
|
DEMAND SHAPING
Success may mean that you:
|
| SERVICING
Success may mean that you:
|
EXPLORING
Success may mean that you:
|
1 hour
Input: Mission and vision statements
Output: List of goals
Materials: Whiteboard/flip charts (physical or electronic)
Participants: CIO, IT management team, BRM team
Download the BRM Workbook
Download the Executive Buy-In and Communication Template
| Assess 1.1 Define BRM 1.2 Analyze Satisfaction 1.3 Assess SWOT | Situate 2.1 Create Vision 2.2 Create the BRM Mission 2.3 Establish Goals | Plan 3.1 Establish Guiding Principles 3.2 Determine Where BRM Fits 3.3 Establish BRM Expectations 3.4 Identify Roles With BRM Responsibilities 3.5 Align Capabilities | ||
| Implement 4.1 Brainstorm Sources of Business Value 4.2 Identify Key Influencers 4.3 Categorize the Stakeholders 4.4 Create the Prioritization Map 4.5 Create Your Engagement Plan | Reassess & Embed 5.1 Create Metrics 5.2 Prioritize Your Projects 5.3 Create a Portfolio Investment Map 5.4 Establish Your Annual Plan 5.5 Build Your Transformation Roadmap 5.6 Create Your Communication Plan |
|
Your guiding principles should define a set of loose rules that can be used to design your BRM practice to the specific needs of the organization and work that needs to be done. These rules will guide you through the establishment of your BRM practice and help you explain to your stakeholders the rationale behind organizing in a specific way. |
Sample Guiding Principles
|
Input: Mission and vision statements
Output: BRM guiding principles
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
Download the BRM Workbook
Download the Executive Buy-In and Communication Template
| It may be useful to pilot the BRM practice with a small group within the organization – this gives you the opportunity to learn from the pilot and share best practices as you expand your BRM practice.
You can leverage the pilot business unit’s feedback to help obtain buy-in from additional groups. Evaluate the approaches for your pilot: |
Work With an Engaged Business Unit
This approach can allow you to find a champion group and establish quick wins. |
Target Underperforming Area(s)
This approach can allow you to establish significant wins, providing new opportunities for value. |
| Target the Area(s) Driving the Most Business Value
Provide the largest positive impact on your portfolio’s ability to drive business value; for large strategic or transformative goals. |
Work Across a Single Business Process
This approach addresses a single business process or operation that exists across business units, departments, or locations. This, again, will allow you to limit the number of stakeholders. |
Strategic BRMs are considered IT leaders, often reporting to the CIO.
In product-aligned organizations, the product owners will own the strategic business relationship from a product perspective (often across LOB), while BRMs will own the strategic role for the line(s) of businesses (often across products) that they hold a relationship with. The BRM role may be played by a product family leader.
BRMs may take on a more operational function when they are embedded within another group, such as the PMO. This manifests in:
Use the IT structure and the business structure to determine how to align BRM and business partners. Many organizations ensure that each LOB has a designated BRM, but each BRM may work with multiple LOBs. Ensure your alignment provides an even and manageable distribution of work.
|
Business Relationship Manager: Portfolio View
|
The BRM will look holistically across a portfolio, rather than on specific projects or products. Their focus is ensuring value is delivered that impacts the overall organization. Multiple BRMs may be responsible for lines of businesses and ensure that products and project enable LOBs effectively. |
Business Analyst: Product or Project View
|
The BA tends to be involved in project work – to that end, they are often brought in a bit before a project begins to better understand the context. They also often remain after the project is complete to ensure project value is delivered. However, their main focus is on delivering the objectives within the project. | |
Product Owner: Product View
|
The Product Owner bridges the gap between the business and delivery to ensure their product continuously delivers value. Their focus is on the product. |
Input: BRM goals, IT organizational structure, Business organizational structure
Output: BRM operating model
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
Download the BRM Workbook
Download the Executive Buy-In and Communication Template
Some titles that may reflect alignment with your partners:
Support BRM team members might have “analyst” or “coordinator” as part of their titles. |
Caution when using these titles:
|
Act as a Relationship Manager
|
Service Delivery
Service delivery breaks out into three activities: service status, changes, and service desk tickets
|
| Knowledge of the Business
Understand the main business activities for each department:
|
Influence Business and IT Stakeholders
|
Value Creator
|
Input: BRM goals
Output: BRM expectations
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
Download the BRM Workbook
Download the Executive Buy-In and Communication Template
Various roles and levels within your organization may have a part of the BRM pieWhere the BRM sits will impact what they are able to get done.The BRM role is a strategic one, but other roles in the organization have a part to play in impacting IT-partner relationship.Some roles may have a more strategic focus, while others may have a more tactical or operational focus. |
|
Input: BRM goals
Output: BRM-aligned roles
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team

Download the Role Expectations Worksheet
| STRATEGIC | Sets Direction: Focus of the activities is at the holistic, enterprise business level | “relating to the identification of long-term or overall aims and interests and the means of achieving them” | e.g. builds overarching relationships to enable and support the organization’s strategy; has strategic conversations | |
| TACTICAL | Figures Out the How: Focuses on the tactics required to achieve the strategic focus | “skillful in devising means to ends” | e.g. builds relationships specific to tactics (projects, products, etc.) | |
| OPERATIONAL | Executes on the Direction: Day-to-day operations; how things get done | “relating to the routine functioning and activities of a business or organization” | e.g. builds and leverages relationships to accomplish specific goals (within a project or product) |
Input: Current-state model, Business value matrix, Objectives and goals
Output: BRM-aligned roles
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
Leverage the Role Expectations Worksheet
| Assess 1.1 Define BRM 1.2 Analyze Satisfaction 1.3 Assess SWOT | Situate 2.1 Create Vision 2.2 Create the BRM Mission 2.3 Establish Goals | Plan 3.1 Establish Guiding Principles 3.2 Determine Where BRM Fits 3.3 Establish BRM Expectations 3.4 Identify Roles With BRM Responsibilities 3.5 Align Capabilities | ||
| Implement 4.1 Brainstorm Sources of Business Value 4.2 Identify Key Influencers 4.3 Categorize the Stakeholders 4.4 Create the Prioritization Map 4.5 Create Your Engagement Plan | Reassess & Embed 5.1 Create Metrics 5.2 Prioritize Your Projects 5.3 Create a Portfolio Investment Map 5.4 Establish Your Annual Plan 5.5 Build Your Transformation Roadmap 5.6 Create Your Communication Plan |
Value is not only about revenue or reduced expenses. Use this internal-external and capability-financial business value matrix to more holistically consider what is valuable to stakeholders.
|
Business Value Matrix Axes:Financial Benefits vs. Improved Capabilities
|
||||||||||||||||||||||||
Input: Product and service knowledge, Business process knowledge
Output: Understanding of different sources of business value
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
|
Use the BRM Workbook to capture sources of business value |
See appendix for more information on value drivers:
|
Example:
|
||||||||
|
A stakeholder is any group or individual who is impacted by (or impacts) your objectives. Challenges with stakeholder management can result from a self-focused point of view. Avoid these challenges by taking on the other’s perspectives – what’s in it for them. The key objectives of stakeholder management are to improve outcomes, increase confidence, and enhance trust in IT.
|
Challenges
|
Implications
|
| List the people who are identified through the following questions: | Take a 360-degree view of potential internal and external stakeholders who might be impacted by the initiative. | |||
|
|
Executives Peers Direct reports Partners Customers |
|
Subcontractors Suppliers Contractors Lobby groups Regulatory agencies |
Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.
Your stakeholder map defines the influence landscape your BRM team operates in. It is every bit as important as the teams who enhance, support, and operate your products directly.
Input: List of stakeholders
Output: Relationships among stakeholders and influencers
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
|
Use the BRM Workbook to capture stakeholders |
There are four areas in the map and the stakeholders within each area should be treated differently.
Input: Stakeholder Map
Output: Categorization of stakeholders and influencers
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
|
Level of Influence
Level of InterestHow much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product? |
Use the BRM Workbook to map your stakeholders
| Type | Quadrant | Actions |
| Players | High influence; high interest | Actively Engage
Keep them engaged through continuous involvement. Maintain their interest by demonstrating their value to its success. |
| Mediators | High influence; low interest | Keep Satisfied
They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust, and include them in important decision-making steps. In turn, they can help you influence other stakeholders. |
| Noisemakers | Low influence; high interest | Keep Informed
Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them. |
| Spectators | Low influence; low interest | Monitor
They are followers. Keep them in the loop by providing clarity on objectives and status updates. |
There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.
Apply a third dimension for stakeholder prioritization: support.
Support, in addition to interest and influence, is used to prioritize which stakeholders are should receive the focus of your attention. This table indicates how stakeholders are ranked:
Support can be determined by rating the following question: how likely is it that your stakeholder would recommend IT at your organization/your group? Our four categories of support:
Input: Stakeholder Map
Output: Categorization of stakeholders and influencers
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
|
Use the BRM Workbook to map your stakeholders |
BlockersPay attention to your “blockers,” especially those that appear in the high influence and high interest part of the quadrant. Consider how your engagement with them varies from supporters in this quadrant. Consider what is valuable to these stakeholders and focus your conversations on “what’s in this for them.” |
Neutral & EvangelistsStakeholders that are neutral or evangelists do not require as much attention as blockers and supporters, but they still can’t be ignored – especially those who are players (high influence and engagement). Focus on what’s in it for them to move them to become supporters. |
SupportersDo not neglect supporters – continue to engage with them to ensure that they remain supporters. Focus on the supporters that are influential and impacted, rather than the “spectators.” |
Input: Stakeholder Map/list of stakeholders
Output: Categorization of stakeholders and influencers
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
|
Download and use the BRM Stakeholder Engagement Plan |
| Agenda | |||||
| Stakeholder | Information Type | Meeting Frequency | Lower Maturity | Mid-Level Maturity | Higher Maturity |
| VP | Strategic | Quarterly |
|
|
|
| Director | Strategic, Tactical | Monthly |
|
|
|
| Manager | Tactical | Monthly |
|
|
|
Lower Maturity – Focus on service delivery, project delivery, and communication
Mid-Level Maturity – Focus on business pain points and a deeper knowledge of the business
Higher Maturity – Focus on creating value by leading innovative initiatives that drive the business forward
Stakeholder – Include both IT and business stakeholders at appropriate levels
Agenda – Manage stakeholders expectations, and clarify how your agenda will progress as the partnership matures
| Assess 1.1 Define BRM 1.2 Analyze Satisfaction 1.3 Assess SWOT | Situate 2.1 Create Vision 2.2 Create the BRM Mission 2.3 Establish Goals | Plan 3.1 Establish Guiding Principles 3.2 Determine Where BRM Fits 3.3 Establish BRM Expectations 3.4 Identify Roles With BRM Responsibilities 3.5 Align Capabilities | ||
| Implement 4.1 Brainstorm Sources of Business Value 4.2 Identify Key Influencers 4.3 Categorize the Stakeholders 4.4 Create the Prioritization Map 4.5 Create Your Engagement Plan | Reassess & Embed 5.1 Create Metrics 5.2 Prioritize Your Projects 5.3 Create a Portfolio Investment Map 5.4 Establish Your Annual Plan 5.5 Build Your Transformation Roadmap 5.6 Create Your Communication Plan |
Measure your BRM practice success
|
|
| Questions to ask | Are your metrics achievable? | |
|
S pecific M easurable A chievable R ealistic T ime-bound |
Embedding the BRM practice within your organization must be grounded in achievable outcomes.
Ensure that the metrics your practice is measured against reflect realistic and tangible business expectations. Overpromising the impact the practice will have can lead to long-term implementation challenges. |
![]() | 1 | Survey your stakeholders to measure improvements in customer satisfaction. | Leverage the CIO Business Vision on a regular interval – most find that annual assessments drive success. Evaluate whether the addition or increased maturity of your BRM practice has improved satisfaction with IT. | |
Business satisfaction survey
| ![]() | |||
![]() | ||||
|
2 |
Measure BRM success against the goals for the practice. |
Evaluate whether the BRM practice has helped IT to meet the goals that you’ve established. For each of your goals, create metrics to establish how you will know if you’ve been successful. This might be how many or what type of interactions you have with your stakeholders, and/or it could be new connections with internal or external partners. Ensure you have established metrics to measure success at your goals. |
|
|
||||
Input: Goals, The attributes which can align to goal success
Output: Measurements of success
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
|
Use the BRM Workbook |
| Partner instructions:
Please indicate how much you agree with each of the following statements. Use a scale of 1-5, where 1 is low agreement and 5 indicates strong agreement: Demand Shaping: My BRM is at the table and seeks to understand my business. They help me understand IT and helps IT prioritize my needs. Exploring: My BRM surfaces new opportunities based on their understanding of my pain points and growth needs. They engage resources with a focus on the value to be delivered. Servicing: The BRM obtains an understanding of the services and service levels that are required, clarifies them, and communicates costs and risks. Value Harvesting: Focus on value is evident in discussions – the BRM supports IT in ensuring value realization is achieved and tracks value during and beyond deployment. |
|
| IT needs to juggle “keeping the lights on” initiatives with those required to add value to the organization. Partner with the appropriate resources (Project Management Office, Product Owners, System Owners, and/or others as appropriate within your organization) to ensure that all initiatives focus on value. Info-Tech InsightNot every organization will balance their portfolio in the same way. Some organizations have higher risk tolerance and so their higher priority goals may require that they accept more risk to potentially reap more returns. | ![]() 80% of organizations feel their portfolios are dominated by low-value initiatives that do not deliver value to the business. (Source: Stage-Gate International and Product Development Institute, March/April 2009) |
All new requests are not the same; establish a process for intake and manage expectations and IT’s capacity to deliver value.Ensure you communicate your process to support new ideas with your stakeholders. They’ll be clear on the steps to bring new initiatives into IT and will understand and be engaged in the process to demonstrate value. |
|
|
| For support creating your intake process, go to Optimize Project Intake, Approval and Prioritization |
|
|
Use value as your criteria to evaluate initiativesWork with project managers to ensure that all projects are executed in a way that meets business expectations.
Download Info-Tech’s Project Value Scorecard Development Tool. |
|
|||||||||||
Input: Value criteria
Output: Prioritized project listing
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team


| Download Info-Tech’s Project Value Scorecard Development Tool. |
Visualize where investments add value through an initiative portfolio mapAn initiative portfolio map is a graphic visualization of strategic initiatives overlaid on a business capability map. Leverage the initiative portfolio map to communicate the value of what IT is working on to your stakeholders. Info-Tech InsightProjects will often impact one or more capabilities. As such, your portfolio map will help you identify cross-dependencies when scaling up or scaling down initiatives. | Example initiative portfolio map
|
Input: Business capability map
Output: Portfolio investment map
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team

| Download Info-Tech’s Initiative Portfolio Map Template. |
To support the BRM capability at your organization, you’ll want to communicate your plan. This will include:
|
|
Input: Engagement plan, BRM goals
Output: Annual BRM plan
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
| Capture in the BRM Workbook
Communicate using the Executive Buy-In and Communication Template |
|
Input: SWOT analysis
Output: Transformation roadmap
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
Example:
Enablers
| Blockers
| Mitigation
|
Capture in the BRM Workbook
| Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.
The change message should:
|
Five elements of communicating change
(Source: The Qualities of Leadership: Leading Change) |
“We tend to use a lot of jargon in our discussions, and that is a sure fire way to turn people away. We realized the message wasn’t getting out because the audience wasn’t speaking the same language. You have to take it down to the next level and help them understand where the needs are.” (Jeremy Clement, Director of Finance, College of Charleston, Info-Tech Interview, 2018)
Be Relevant
|
Be Clear
|
Be Concise
|
Be Consistent
|
Input: Prioritized list of stakeholders
Output: Communication Plan
Materials: Whiteboard/flip charts (physical or electronic)
Participants: Team
AudienceAll BRM Staff |
Purpose
|
Communication Type
|
CommunicatorCIO |
Timing
|
Business Value
Service Catalog
Intake Management
|
|
|
“Apple Mission and Vision Analysis.” Mission Statement Academy, 23 May 2019. Accessed 5 November 2020.
Barnes, Aaron. “Business Relationship Manager and Plan Build Run.” BRM Institute, 8 April 2014.
Barnes, Aaron. “Starting a BRM Team - Business Relationship Management Institute.” BRM Institute, 5 June 2013. Web.
BRM Institute. “Business Partner Maturity Model.” Member Templates and Examples, Online Campus, n.d. Accessed 3 December 2021.
BRM Institute. “BRM Assessment Templates and Examples.” Member Templates and Examples, Online Campus, n.d. Accessed 24 November 2021.
Brusnahan, Jim, et al. “A Perfect Union: BRM and Agile Development and Delivery.” BRM Institute, 8 December 2020. Web.
Business Relationship Management: The BRMP Guide to the BRM Body of Knowledge. Second printing ed., BRM Institute, 2014.
Chapman, Chuck. “Building a Culture of Trust - Remote Leadership Institute.” Remote Leadership Institute, 10 August 2021. Accessed 27 January 2022.
“Coca Cola Mission and Vision Analysis.” Mission Statement Academy, 4 August 2019. Accessed 5 November 2020.
Colville, Alan. “Shared Vision.” UX Magazine, 31 October 2011. Web.
Cooper, Robert, G. “Effective Gating: Make product innovation more productive by using gates with teeth.” Stage-Gate International and Product Development Institute, March/April 2009. Web.
Heller, Martha. “How CIOs Can Make Business Relationship Management (BRM) Work.” CIO, 1 November 2016. Accessed 27 January 2022.
“How Many Business Relationship Managers Should You Have.” BRM Institute, 20 March 2013. Web.
Hull, Patrick. “Answer 4 Questions to Get a Great Mission Statement.” Forbes, 10 January 2013. Web.
Kasperkevic, Jana. “Bill Gates: Good Feedback Is the Key to Improvement.” Inc.com, 17 May 2013. Web.
Merlyn, Vaughan. “Relationships That Matter to the BRM.” BRM Institute, 19 October 2016. Web.
“Modernizing IT’s Business Relationship Manager Role.” The Hackett Group, 22 November 2019. Web.
Monroe, Aaron. “BRMs in a SAFe World...That Is, a Scaled Agile Framework Model.” BRM Institute, 5 January 2021. Web.
“Operational, adj." OED Online, Oxford University Press, December 2021. Accessed 29 January 2022.
Sinek, Simon. “Transcript of ‘How Great Leaders Inspire Action.’” TEDxPuget Sound, September 2009. Accessed 7 November 2020.
“Strategic, Adj. and n.” OED Online, Oxford University Press, December 2016. Accessed 27 January 2022.
“Tactical, Adj.” OED Online, Oxford University Press, September 2018. Accessed 27 January 2022.
“The Qualities of Leadership: Leading Change.” Cornelius & Associates, 23 September 2013. Web.
“Twice the Business Value in Half the Time: When Agile Methods Meet the Business Relationship Management Role.” BRM Institute, 10 April 2015. Web.
“Value Streams.” Scaled Agile Framework, 30 June 2020. Web.
Ward, John. “Delivering Value from Information Systems and Technology Investments: Learning from Success.” Information Systems Research Centre, August 2006. Web.
Make MoneyThis value driver is specifically related to the impact a product or service has on your organization’s ability to show value for the investments. This is usually linked to the value for money for an organization. Return on Investment can be derived from:
Be aware of the difference among your products and services that enable a revenue source and those which facilitate the flow of funding. |
Save MoneyThis value driver relates to the impact of a product or service on cost and budgetary constraints. Reduce costs value can be derived from:
Budgetary pressures tied to critical strategic priorities may defer or delay implementation of initiatives and revision of existing products and services. |
OperationsSome products and services are in place to facilitate and support the structure of the organization. These vary depending on what is important to your organization, but should be assessed in relation to the organizational culture and structure you have identified.
|
Risk and ComplianceA product or service may be required in order to meet a regulatory requirement. In these cases, you need to be aware of the organizational risk of NOT implementing or maintaining a service in relation to those risks. In this case, the product or service is required in order to:
|
Internal InformationUnderstanding internal operations is also critical for many organizations. Data captured through your operations provides critical insights that support efficiency, productivity, and many other strategic goals. Internal information value can be derived by:
|
Collaboration and Knowledge TransferCommunication is integral and products and services can be the link that ties your organization together. In this case, the value generated from products and services can be to:
|
PolicyProducts and services can also be assessed in relation to whether they enable and support the required policies of the organization. Policies identify and reinforce required processes, organizational culture, and core values. Policy value can be derived from:
|
Customer RelationsProducts and services are often designed to facilitate goals of customer relations; specifically, improve satisfaction, retention, loyalty, etc. This value type is most closely linked to brand management and how a product or service can help execute brand strategy. Customers, in this sense, can also include any stakeholders who consume core offerings. Customer satisfaction value can be derived from:
|
Market InformationUnderstanding demand and market trends is a core driver for all organizations. Data provided through understanding the ways, times, and reasons that consumers use your services is a key driver for growth and stability. Market information value can be achieved when an app:
|
Market ShareMarket share represents the percentage of a market or market segment that your business controls. In essence, market share can be viewed as the potential for more or new revenue sources. Assess the impact on market share. Does the product or service:
|
Service design involves an examination of the people, process and technology involved in delivering a service to your customers.
Service blueprinting provides a visual of how these are connected together. It enables you to identify and collaborate on improvements to an existing service.
The main components of a service blueprint are:
Customer actions – this anchors the service in the experiences of the customer
Front-stage – this shows the parts of the service that are visible to the customer
Back-stage – this is the behind-the-scenes actions necessary to deliver the experience to the customer
Support processes – this is what’s necessary to deliver the back-stage (and front-stage/customer experience), but is not aligned from a timing perspective (e.g. it doesn’t matter if the fridge is stocked when the order is put in, as long as the supplies are available for the chef to use)
Physical Evidence and Time are blueprint components can be added in to provide additional context & support
Personalize
|
Show Proof
|
Reference
|
Test & Learn
|
Download the Job Descriptions:
The saying goes, "as time goes by," but these days, we should say "as speed picks up." We're already in month two, so high time we take a look at the priorities you hopefully already set at the end of last year.
January 17th, 2025 is when your ability to serve clients without interruption is legislated. At least when you are in the financial services sector, or when you supply such firms. If you are not active in the financial arena, don’t click away. Many of these requirements can just give you an edge over your competition.
Many firms underestimated the impact of the legislation, but let’s be honest, so did the European Union. The last pieces of the puzzle are still not delivered only two days before the law comes into effect.
What is DORA all about again? It is the Digital Operational Resilience Act. In essence, it is about your ability to withstand adverse events that may impact your clients or the financial system.
Aside from some nasty details, this really is just common sense. You need to be organized so that the right people know what is expected of them, from the accountable top to the staff executing the day to day operations. You need to know what to do when things go wrong. You need to know your suppliers, especially those who supply services to your critical business services. You need to test your defenses and your IT. You may want to share intelligence around cyber-attacks.
There, all of the 45 business-relevant DORA articles and technical standards in a single paragraph. The remaining articles deal with the competent authorities and make for good reading as they provide some insights into the workings of the regulatory body. The same goes for the preamble of the law. No less than 104 “musings” that elaborate on the operating environment and intent of the law.
If you’re firm is still in the thick of things trying to become compliant, you are not alone. I have seen at least one regulator indicating that they will be understanding of that situation, but you must have a clear roadmap to compliance in the near future. Your regulator may or may not be in line with that position. In the eastern-most countries of the EU, signals are that the regulator will take a much tougher stance.
(This kind of negates one of the musings of the law; the need for a single view on what financial services firms must adhere to to be considered compliant and resilient. But I think this is an unavoidable byproduct of having culturally diverse member states.)
I dare to say that firms typically have the governance in place as well as the IM processes and testing requirements. The biggest open items seem to be in the actual IT hard operational resilience, monitoring and BCM.
Take a look at your own firm and make an honest assessment in those areas. They key resilience (DORA-related or not) is knowing how your service works and is performing from a client perspective.
You need to know how a client achieves all their interaction goals with your company. Typically this is mapped in the client journey. Unfortunately, this usually only maps the business flow, not the technical flow. And usually you look at it from the client UX perspective. This is obviously very important, but it does not help you to understand the elements that ensure you that your clients can always complete that journey.
The other day, I had a customer journey with an online ski-shop. I had bought two ski helmets in size M, the same size my adult son and I had. When the helmets arrived it turned out they were too small. So, ok, no worries, I start the return process online. Once we complete the initial steps, after a few days I notice that the price for only one helmet is shown on the site. This, despite the indicators that both helmets are approved to be returned. Later both helmets are shown as effectively returned. Refund still shows one helmet’s price. What gives? I give it some more time, but after ten days, I decide to enquire. The site still shows refund for one helmet.
Then I receive an email that both helmets will be refunded as they accepted the state of the helmets (unused) and amount of the refund is now correct. Site still shows the wrong amount.
This is obviously a small inconvenience, but it does show that the IT team does not have a full view of the entire customer journey and systems interactions. You need to fix this.
Suppose this is not about two ski helmets, but about ski or home insurance. Or about the sale of a car or a B2B transaction involving tens or hundreds of thousands of dollars or euro, or any other currency? Does your system show the real-time correct status of the transaction? If not, I would, as a consumer, decide to change provider. Why? Because the trust is gone.
Resilience is about withstanding events that threaten your service to your clients. Events are nit just earthquakes or floods. Events are also wrong or missing information. To protect against that, you need to know what the (value) chain is that leads to you providing that service. Additionally, you need to know if that service chain has any impediments at any moment in time. Aka, you need to know that any service request can be fulfilled at any given time. And to have the right processes and resources in place to fix whatever is not working at that time.
And that is in my opinion the biggest task still outstanding with many companies to ensure true resilience and customer service.
EA’s role in brokering and negotiating overlapping areas can lead to the creation of additional efficiencies at the enterprise level.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
In an accelerated path to digitization, the increasingly important role of enterprise architecture is one of collaboration across siloes, inside and outside the enterprise, in a configurable way that allows for quick adjustment to new threats and conditions, while embracing unprecedented opportunities to scale, stimulating innovation, in order to increase the organization’s competitive advantage.
Enterprise architecture, seen as the glue of the organization, aligns business goals with all the other aspects of the organization, providing additional effectiveness and efficiencies while also providing guardrails for safety.
In an accelerated path to digitization, the increasingly important role of enterprise architecture (EA) is one of collaboration across siloes, inside and outside the enterprise, in a configurable way that allows for quick adjustment to new threats and conditions while embracing unprecedented opportunities to scale, stimulating innovation to increase the organization’s competitive advantage.
![]() |
Milena Litoiu
|
The Digital transformation journey brings Business and technology increasingly closer.
Because the two become more and more intertwined, the role OF Enterprise Architecture increases in importance, aligning the two in providing additional efficiencies.
THE Current need for an accelerated Digital transformation elevates the importance of Enterprise Architecture.
More than 70% of organizations revamp their enterprise architecture programs. (Info-Tech Tech Trends 2022 Survey)
Most organizations still see a significant gap between the business and IT.
EA's role in brokering and negotiating overlapping areas can lead to the creation of additional efficiencies at the enterprise level.
Approaches:
A plethora of approaches are needed (e.g. architecture modularity, data integration, AI/ML) in addition to other Agile/iterative approaches for the entire organization.
Data is a unique resource that keeps growing, presenting opportunities along the way. CIOs and IT leaders can use rapidly evolving technologies and capabilities to harness this data and its value for the organization.
IT leaders must prepare their teams and operations with the right knowledge, capabilities, and strategies to make sure they remain competitive in 2023 and beyond. Nine trends that expand on the three common Vs of data – volume, velocity, and variety – can help guide the way.
The path to becoming more competitive in a data-driven economy differs from one company to the next. IT leaders should use the data and analytics trends that align most with their organizational goals and can lead to positive business outcomes.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Data technologies are rapidly evolving. Understanding data's art of the possible is critical. However, to adapt to these upcoming data trends, a solid data management foundation is required. This report explores nine data trends based on the proven framework of data V's: Volume, Velocity, Variety, Veracity, Value, Virtue, Visualization, Virality, and Viscosity.
In this report, we explore nine data use cases for emerging technologies that can improve on capabilities needed to compete in the data-driven economy. Use cases combine emerging data trends and modernization of existing capabilities.
When organizations begin to prioritize data, they first consider the sheer volume of data, which will influence data system design. Your data systems must consider the existing and growing volume of data by assessing industry initiatives such as digital transformation, Industry 4.0, IoT, consumer digital footprint, etc.
|
The largest data center in the world is a citadel in Reno, Nevada, that stretches over 7.2 million square feet! Source: Cloudwards, 2022 |
IoT devices will generate 79.4 zettabytes of data Source: IDC, 2019 |
There were about 97 Source: “Volume of Data,” Statista, 2022 |
Data attracts more data and an ecosystem of applications and services
SharePoint, OneDrive, Google Drive, and Dropbox offer APIs and integration opportunities for developers to enhance their products.
Social media platforms thought about this early by allowing for an ecosystem of filters, apps, games, and effects that engage their users with little to no additional effort from internal resources.
Focus on data gravity and avoid cloud repatriation
Data gravity is the tendency of data to attract applications, services, and other data. A growing number of cloud migration decisions will be made based on the data gravity concept. It will become increasingly important in data strategies, with failure potentially resulting in costly cloud repatriations.
Emerging technologies and capabilities:
Data Lakehouse, Data Mesh, Data Fabric, Hybrid Data, Cloud Data, Edge Computing
| 47% |
Centralized cloud storage going down in 2 years |
22% |
| 25% |
Hybrid storage (centralized + edge) going up in 2 years |
47% |
Source: CIO, 2022
What worked for terabytes is ineffective for petabytes
When compared to on-premises infrastructure, cloud computing is less expensive and easier to implement. However, poor data replication and data gravity can significantly increase cloud costs to the point of failure. Data gravity will help organizations make better cloud migration decisions.
It is also critical to recognize changes in the industry landscape. The goal of data processing and analytics is to generate the right data for users to act on. In most cases, the user is a human being, but in the case of autonomous driving (AD), the car takes on the role of the user (DXC Technology).
To avoid cloud repatriation, it will become prudent for all organizations to consider data gravity and the timing of cloud migration.
The velocity element of data can be assessed from two standpoints: the speed at which data is being generated and how fast the organization needs to respond to the incoming information through capture, analysis, and use. Traditionally data was processed in a batch format (all at once or in incremental nightly data loads). There is a growing demand to process data continuously using streaming data-processing techniques.
Emerging technologies and capabilities:
Edge Computing
|
Google announced it has a quantum computer that is 100 million times faster than any classical computer in its lab. Source: Science Alert, 2015 |
The number of qubits in quantum computers has been increasing dramatically, from 2 qubits in 1998 to 128 qubits in 2019. Source: Statista, 2019 |
IBM released a 433-qubit quantum chip named Osprey in 2022 and expects to surpass 1,000 qubits with its next chip, Condor, in 2023. Source: Nature, 2023 |
Make data accessible to everyone in real time
Trend in Data Velocity
Data democratization means data is widely accessible to all stakeholders without bottlenecks or barriers. Success in data democratization comes with ubiquitous real-time analytics. Google highlights a need to address democratization in two different frames:
Emerging technologies and capabilities:
Data Lakehouse, Streaming API Ecosystem, Industry 4.0, Zero-Copy Cloning
Nearly 70% of all new vehicles globally will be connected to the internet by 2023.
Source: “Connected light-duty vehicles,” Statista, 2022
Enable real-time processing with API
In the past, data democratization has largely translated into a free data set and open data portals. This has allowed the government to freely share data with the public. Also, the data science community has embraced the availability of large data sets such as weather data, stock data, etc. In the future, more focus will be on the combination of IoT and steaming analytics, which will provide better responsiveness and agility.
Many researchers, media companies, and organizations now have easy access to the Twitter/Facebook API platform to study various aspects of human behavior and sentiments. Large technology companies have already democratized their data using real-time APIs.
Thousands of sources for open data are available at your local municipalities alone.
6G will push Wi-Fi connectivity to 1 terabyte per second! This is expected to become commercially available by 2030.
The variety of data types is increasingly diverse. Structured data often comes from relational databases, while unstructured data comes from several sources such as photos, video, text documents, cell phones, etc. The variety of data is where technology can drive business value. However, unstructured data also poses a risk, especially for external data.
|
The number of IoT devices could rise to 30.9 billion by 2025. Source: “IoT and Non-IoT Connections Worldwide,” Statista, 2022 |
The global edge computing market is expected to reach $250.6 billion by 2024. Source: “Edge Computing,” Statista, 2022 |
Genomics research is expected to generate between 2 and 40 exabytes of data within the next decade. Source: NIH, 2022 |
Employ AI to automate data management
New tools will enhance many aspects of data management:
Enabling AI-assisted decision-making tools
Trend in Data Variety
Augmented data management will enhance or automate data management capabilities by leveraging AI and related advanced techniques. It is quite possible to leverage existing data management tools and techniques, but most experts have recognized that more work and advanced patterns are needed to solve many complex data problems.
Emerging technologies and capabilities:
Data Factory, Data Mesh, Data Fabric, Artificial Intelligence, Machine Learning
Data Fabric vs. Data Mesh: The Data Journey continues at an accelerated pace
|
Data Fabric |
Data Mesh |
|---|---|
|
Data fabric is an architecture that facilitates the end-to-end integration of various data pipelines and cloud environments using intelligent and automated systems. It’s a data integration pattern to unify disparate data systems, embed governance, strengthen security and privacy measures, and provide more data accessibility to workers and particularly to business users. |
The data mesh architecture is an approach that aligns data sources by business domains, or functions, with data owners. With data ownership decentralization, data owners can create data products for their respective domains, meaning data consumers, both data scientists and business users, can use a combination of these data products for data analytics and data science. |
More Unstructured Data
95% of businesses cite the need to manage unstructured data as a problem for their business.
Data veracity is defined as the accuracy or truthfulness of a data set. More and more data is created in semi-structured and unstructured formats and originates from largely uncontrolled sources (e.g. social media platforms, external sources). The reliability and quality of the data being integrated should be a top concern. The veracity of data is imperative when looking to use data for predictive purposes. For example, energy companies rely heavily on weather patterns to optimize their service outputs, but weather patterns have an element of unpredictability.
|
Data quality affects overall labor productivity by as much as 20%, and 30% of operating expenses are due to insufficient data. Source: Pragmatic Works, 2017 |
Bad data costs up to Source: MIT Sloan Management Review, 2017 |
Veracity of data is a true test of your data capabilities
Trend in Data Veracity
Veracity is a concept deeply linked to identity. As the value of the data increases, a greater degree of veracity is required: We must provide more proof to open a bank account than to make friends on Facebook. As a result, there is more trust in bank data than in Facebook data. There is also a growing need to protect marginalized communities.
Emerging technologies and capabilities:
Zero Trust, Blockchain, Data Governance, IoT, Cybersecurity
The identity discussion is no longer limited to people or organizations. The development of new technologies, such as the IoT phenomenon, will lead to an explosion of objects, from refrigerators to shipping containers, coming online as well. If all these entities start communicating with each other, standards will be needed to establish who or what they are.
|
IDENTITY Age Gender Address Fingerprint Face Voice Irises |
IDENTITY Password Passphrase PIN Sequence |
IDENTITY Access badge Smartcard Security token Mobile phone ID document |
IDENTITY Motor skills Handwriting Gestures Keystrokes Applications use |
The IoT market is expected to grow 18% to 14.4 billion in 2022 and 27 billion by 2025.
Source: IoT Analytics, 2022
Data can be valuable if used effectively or dangerous if mishandled. The rise of the data economy has created significant opportunities but also has its challenges. It has become urgent to understand the value of data, which may vary for stakeholders based on their business model and strategy. Organizations first need to understand ownership of their data by establishing a data strategy, then they must improve data maturity by developing a deeper understanding of data value.
|
94% of enterprises say data is essential to business growth. Source: Find stack, 2021 |
Start developing your data business
Data monetization is the transformation of data into financial value. However, this does not imply selling data alone. Monetary value is produced by using data to improve and upgrade existing and new products and services. Data monetization demands an organization-wide strategy for value development.
Emerging technologies and capabilities:
Data Strategy, Data Monetization Strategy, Data Products
Netflix uses big data to save $1 billion per year on customer retention.
Source: Logidots, 2021
Data is a strategic asset
Data is beyond currency, assets, or commodities and needs to be a category
of its own.
Data monetization is currently in the speculative territory, which is unacceptable. It should instead be guided by sound data management theory.
We have become more and more dependent on data, analytics, and organizational protection policies. Data virtue is about leveraging data securely and ethically. This topic has become more critical with the advent of GDPR, the right to be forgotten, and related regulations. Data governance, which seeks to establish an oversight framework that manages the creation, acquisition, integrity, security, compliance, and quality of data, is essential for any organization that makes decisions about data.
|
Cultural obstacles are the greatest barrier to becoming data-driven, according to 91.9% of executives. Source: Harvard Business Review, 2022 |
Fifty million Facebook profiles were harvested for Cambridge Analytica in a major data breach. Source: The Guardian, 2018 |
Encourage noninvasive and automated data governance
Trend in Data Virtue
Adaptive data governance encourages a flexible approach that allows an organization to employ multiple data governance strategies depending on changing business situations. The other aspect of adaptive data governance is moving away from manual (and often slow) data governance and toward aggressive automation.
Emerging technologies and capabilities:
AI-Powered Data Catalog and Metadata Management,
Automated Data Policy Enforcement
|
“To effectively meet the needs and velocity of digital organizations and modern practices, IT governance must be embedded and automated where possible to drive success and value.” Source: Valence Howden, Info-Tech Research Group |
|
“Research reveals that the combination of AI and big data technologies can automate almost 80% of all physical work, 70% of data processing, and 64% of data collection tasks.” Source: Forbes, 2021 |
Simple and easy Data Governance
Tools are not the ultimate answer to implementing data governance. You will still need to secure stakeholders' buy-in and engagement in the data process. Data governance automation should be about simplifying the execution of roles and responsibilities.
“When you can see where your data governance strategy can be improved, it’s time to put in place automation that help to streamline processes.”
Source: Nintex, 2021
Today, data storytelling is led by the user. It’s the manual practice of combining narrative with data to deliver insights in a compelling form to assist decision makers in engaging with data and analytics. A story backed by data is more easily consumed and understood than a dashboard, which can be overwhelming. However, manual data storytelling has some major shortcomings.
Problem # 1: Telling stories on more than just the insights noticed by people
Problem # 2: Poor data literacy and the limitations of manual self-service
Problem # 3: Scaling data storytelling across the business
Use AI to enhance data storytelling
Trend in Data Visualization
AI and natural language processing will drive future visualization and data storytelling. These tools and techniques are improving rapidly and are now designed in a streamlined way to guide people in understanding what their data means and how to act on it instead of expecting them to do self-service analysis with dashboards and charts and know what to do next. Ultimately, being able to understand how to translate emotion, tropes, personal interpretation, and experience and how to tell what’s most relevant to each user is the next frontier for augmented and automated analytics
Emerging technologies and capabilities:
AI-Powered Data Catalog and Metadata Management,
Automated Data Policy Enforcement
Augmented data storytelling is not that far away
Emotions are a cornerstone of human intelligence and decision making. Mastering the art of storytelling is not easy.
Industry experts predict the combination of data storytelling with augmented and automated techniques; these capabilities are more than capable of generating and automating parts of a data story’s creation for end users.
The next challenge for AI is translating emotion, tropes, personal interpretation, and experience into what is most essential to end users.
Source: Yellowfin, 2021
Data virality measures data spread and popularity. However, for data virality to occur, an ecosystem comparable to that of traditional or modern digital marketplaces is required. Organizations must reevaluate their data strategies to ensure investment in appropriate data domains by understanding data virality. Data virality is the exact opposite of dark data.
Dark data is “all the information companies collect in their regular business processes, don’t use, have no plans to use, but will never throw out.”
Source: Forbes, 2019
Make data easily accessible
Trend in Data Virality
The data marketplace can be defined as a dynamic marketplace where users decide what has the most value. Companies can gauge which data is most popular based on usage and decide where to invest. Users can shop for data products within the marketplace and then join these products with other ones they’ve created to launch truly powerful data-driven projects.
Emerging technologies and capabilities:
AI-Powered Data Catalog and Metadata Management,
Automated Data Policy Enforcement
“Data is like garbage. You’d better know what you are going to do with it before you collect it.”
– Mark Twain
Journey from siloed data platforms to dynamic data marketplaces
Data remains a complex topic due to many missing foundational components and infrastructure. Interoperability, security, quality, discoverability, speed, and ease are some of those missing foundational components that most organizations face daily.
Data lacks an ecosystem that is comparable to those of traditional assets or commodities. Data must be available in open or closed data marketplaces to measure its value. These data marketplaces are still in their infancy.
“Data markets are an important component of the data economy that could unleash the full potential of data generated by the digital economy and human activity in general.”
Source: ITU Journal, 2018
Compared to water, a fluid with a high viscosity flows more slowly, like honey. Data viscosity measures the resistance to flow in a volume of data. The data resistance may come from other Vs (variety, velocity, etc.).
Increase efficiency by removing bottlenecks
Consider XOps for a second. It makes no difference what X is. What's important is matching operational requirements to enterprise capabilities.
These Operations guys are demanding!!
Trend in Data Viscosity
The merger of development (Dev) and IT Operations (Ops) started in software development with the concept of DevOps. Since then, new Ops terms have formed rapidly (AIOps, MLOps, ModelOps, PlatformOps, SalesOps, SecOps, etc.). All these methodologies come from Lean manufacturing principles, which seek to identify waste by focusing on eliminating errors, cycle time, collaboration, and measurement. Buzzwords are distractions, and the focus must be on the underlying goals and principles. XOps goals should include the elimination of errors and improving efficiencies.
Emerging technologies and capabilities:
Collaborative Data Management, Automation Tools
Data observability, a subcomponent of DataOps, is a set of technical practices, cultural norms, and architecture that enables low error rates. Data observability focuses on error rates instead of only measuring data quality at a single point in time.
|
Data Quality Dimensions
|
→ |
ERROR RATES Lateness: Missing Your SLA System Processing Issues Code Change That Broke Something Data Quality |
Avoid following trends solely for the sake of following them. It is critical to comprehend the concept and apply it to your industry. Every industry has its own set of problems and opportunities.
Highlight the data trends (or lack thereof) that have been most beneficial to you in your organizations. Follow Info-Tech’s approach to building a data practice and platform to develop your data capabilities through the establishment of data goals.
|
|
|
Rajesh Parab Director, Research & Advisory Data and Analytics |
Chris Dyck Research Lead Data and Analytics |
“Data technologies are rapidly evolving. Understanding what’s possible is critical. Adapting to these upcoming data trends requires a solid data management foundation.”
– Rajesh Parab
|
|
|
Executive Counselor Info-Tech Research Group |
Executive Counselor Info-Tech Research Group |
Bean, Randy. “Why Becoming a Data-Driven Organization Is So Hard.” Harvard Business Review, 24 Feb. 2022. Accessed Oct. 2022.
Brown, Annie. “Utilizing AI And Big Data To Reduce Costs And Increase Profits In Departments Across An Organization.” Forbes, 13 April 2021.
Accessed Oct. 2022.
Burciaga, Aaron. “Five Core Virtues For Data Science And Artificial Intelligence.” Forbes, 27 Feb. 2020. Accessed Aug. 2022.
Cadwalladr, Carole, and Emma Graham-Harrison. “Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach.”
The Guardian, 17 March 2018. Accessed Aug. 2022.
Carlier, Mathilde. “Connected light-duty vehicles as a share of total vehicles in 2023.” Statista, 31 Mar. 2021. Accessed Oct. 2022.
Carter, Rebekah. “The Ultimate List of Big Data Statistics for 2022.” Findstack, 22 May 2021. Accessed Oct. 2022.
Castelvecchi, Davide. “Underdog technologies gain ground in quantum-computing race.” Nature, 6 Nov. 2023. Accessed Feb. 2023.
Clark-Jones, Anthony, et al. “Digital Identity:” UBS, 2016. Accessed Aug 2022.
“The Cost of Bad Data – Infographic.” Pragmatic Works, 25 May 2017. Accessed Oct. 2022.
Demchenko, Yuri, et al. “Data as Economic Goods: Definitions, Properties, Challenges, Enabling Technologies for Future Data Markets.“ ITU Journal: ICT Discoveries, Special Issue, no. 2, vol. 23, Nov. 2018. Accessed Aug 2022.
Feldman, Sarah. ”20 Years of Quantum Computing Growth.” Statista, 6 May 2019. Accessed Oct. 2022.
“Genomic Data Science.” NIH, National Human Genome Research Institute, 5 April 2022. Accessed Oct. 2022.
Hasbe, Sudhir, and Ryan Lippert. “The democratization of data and insights: making real-time analytics ubiquitous.” Google Cloud, 15 Jan. 2021.
Accessed Aug. 2022.
Helmenstine, Anne. “Viscosity Definition and Examples.” Science Notes, 3 Aug. 2021. Accessed Aug. 2022.
“How data storytelling and augmented analytics are shaping the future of BI together.” Yellowfin, 19 Aug. 2021. Accessed Aug. 2022.
“How Netflix Saves $1B Annually using AI?” Logidots, 24 Sept. 2021. Accessed Oct. 2022
Hui, Kenneth. “The AWS Love/Hate Relationship with Data Gravity.” Cloud Architect Musings, 30 Jan. 2017. Accessed Aug 2022.
ICD. “The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025, According to a New IDC Forecast.” Business Wire, 18 June 2019. Accessed Oct 2022.
Internet of Things (IoT) and non-IoT active device connections worldwide from 2010 to 2025” Statista, 27 Nov. 2022. Accessed Nov. 2022.
Koch, Gunter. “The critical role of data management for autonomous driving development.” DXC Technology, 2021. Accessed Aug. 2022.
Morris, John. “The Pull of Data Gravity.” CIO, 23 Feb. 2022. Accessed Aug. 2022.
Nield, David. “Google's Quantum Computer Is 100 Million Times Faster Than Your Laptop.” ScienceAlert, 9 Dec. 2015. Accessed Oct. 2022.
Redman, Thomas C. “Seizing Opportunity in Data Quality.” MIT Sloan Management Review, 27 Nov. 2017. Accessed Oct. 2022.
Segovia Domingo, Ana I., and Álvaro Martín Enríquez. “Digital Identity: the current state of affairs.” BBVA Research, 2018. Accessed Aug. 2022.
“State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally.” IOT Analytics, 18 May 2022. Accessed. 14 Nov. 2022.
Strod, Eran. “Data Observability and Monitoring with DataOps.” DataKitchen, 10 May 2021. Accessed Aug. 2022.
Sujay Vailshery, Lionel. “Edge computing market value worldwide 2019-2025.” Statista, 25 Feb. 2022. Accessed Oct 2022.
Sujay Vailshery, Lionel. “IoT and non-IoT connections worldwide 2010-2025.” Statista, 6 Sept. 2022. Accessed Oct. 2022.
Sumina, Vladimir. “26 Cloud Computing Statistics, Facts & Trends for 2022.” Cloudwards, 7 June 2022. Accessed Oct. 2022.
Taulli, Tom. “What You Need To Know About Dark Data.” Forbes, 27 Oct. 2019. Accessed Oct. 2022.
Taylor, Linnet. “What is data justice? The case for connecting digital rights and freedoms globally.“ Big Data & Society, July-Dec 2017. Accessed Aug 2022.
“Twitter: Data Collection With API Research Paper.” IvyPanda, 28 April 2022. Accessed Aug. 2022.
“Using governance automation to reduce data risk.” Nintex, 15 Nov. 2021. Accessed Oct. 2022
“Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2020, with forecasts from 2021 to 2025.” Statista, 8 Sept. 2022. Accessed Oct 2022.
Wang, R. “Monday's Musings: Beyond The Three V's of Big Data – Viscosity and Virality.” Forbes, 27 Feb. 2012. Accessed Aug 2022.
“What is a data fabric?” IBM, n.d. Accessed Aug 2022.
Yego, Kip. “Augmented data management: Data fabric versus data mesh.” IBM, 27 April 2022. Accessed Aug 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess the current situation by identifying technology service consumers in the organization, their interfaces with IT, the level of service they require, and their sentiment toward IT.
Categorize the technology consumer groups into four business profiles based on their characteristics to identify implications based on technology consumption patterns for the target IT operating model.
Select implementation models for the four core elements of the IT operating model and optimize governance, sourcing, process, and organizational structure to create the target IT operating model.
Create, assess, and prioritize initiatives to reach the target IT operating model. Construct a roadmap to show initiative execution.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify the IT and business strategies, so that the target IT operating model can be constructed to support them.
Identify the implications for the IT operating model and understand how to optimally construct it.
Create consumer groups for consumer experience mapping and consumer profile classification.
1.1 Review business and IT strategies.
1.2 Identify implications for the IT operating model.
1.3 Identify internal technology consumer groups.
1.4 Identify external technology consumer groups.
Implications for the IT operating model
List of internal and external technology service consumer groups
Identify the interfaces with IT for the consumer group, its level of technology service requirement, its sentiment toward IT, and its needs from IT.
Consumer group needs from IT and feelings toward IT are identified.
2.1 Identify interview candidates for the consumer groups.
2.2 Complete consumer group questionnaire.
2.3 Complete consumer experience map.
2.4 Classify the consumer group into a business profile.
Consumer experience map for first group
Business profile classification
Continue mapping the experience of consumer groups and classify them into profiles based on their needs to draw implications for the target IT operating model.
Consumption patterns from the consumer groups are defined and implications for the target IT operating model are drawn.
3.1 Continue interviews for consumer groups.
3.2 Complete consumer experience map.
3.3 Classify the consumer group into a business profile.
3.4 Aggregate the consumption patterns for the business profile and document implications.
Consumer experience map for second group
Business profile classification
Aggregated consumption patterns
Implications for consumption patterns
Map the target operating model to show how each element of the IT operating model supports the delivery of IT services to the consumer groups.
Identify whether the current IT operating model is optimally supporting the delivery of IT services to consumer groups from the four core IT operating model elements.
4.1 Determine the approach to IT governance.
4.2 Select the optimal mix of sourcing models.
4.3 Customize the approach to process implementation.
4.4 Identify the target organizational structure.
Target IT operating model
Create initiatives and communicate them with a roadmap to show how the organization will arrive at the target IT operating model.
The steps to reach the IT operating model are created, assessed, and prioritized.
Steps are ordered for presentation.
5.1 Identify initiatives to reach the target IT operating model.
5.2 Create initiative profiles to assess initiative quality.
5.3 Prioritize initiatives based on business conditions.
5.4 Create a roadmap to communicate initiative execution.
Initiative profiles
Sunshine diagram
Determine your organization’s social media maturity with Info-Tech’s Maturity Assessment Tool
Assessing where you fit on the social media maturity continuum is critical for setting the future direction of your social media program. We’ll work through a short tool that assesses the current state of your social media program, then discuss the results.
Info-Tech’s Social Media Maturity Assessment Tool will help you determine your company’s level of maturity and recommend steps to move to the next level or optimize the status quo of your current efforts.