Industry groups vow to be involved as bill makes its way to the next parliament
users - News, Features, and Slideshows
'The security perimeter in organisations is dissolving - IT and security management can no longer count on well-defined network security perimeters to protect their organisations,' according to the latest Global Threat Intelligence report.
Extensive academic research shows that the majority of mergers fail to increase shareholder value, often because the integration of acquired business units takes longer than anyone planned. So the ability to effectively integrate the information systems of merged business units is a key success factor for any acquirer.
Even though there are a lot of corporate integration consultants, the execution of their strategic plans seems to go awry...particularly when it comes to CRM systems.
Forrester says ‘invisible IT’ comes in two forms – shadow IT systems implemented in business units outside of IT’s sight; and the unplanned, untracked and unmanaged requests of IT.
Invisible IT results from a lack of process and discipline by both IT and end users when it comes to requesting and providing IT resources, notes analyst Craig Symons in a recent Forrester report. By extending IT governance beyond strategic requests to tactical requests, through service portfolio management and a service catalogue, IT can ensure all its efforts are tracked and managed, bringing a clear picture of IT demand.