Sie sind auf Seite 1von 44

| THE INDEPENDENT RESOURCE FOR IT EXECUTIVES

Q3 2010

Head in the clouds


The focus on Pa u l B u r n s
Ne o v i s e

cloud computing Laura DiDio


ITIC
Also in this issue: – Mar tin Kuppinger

search, security, and Kuppinger Cole

Matthew Lees
social technology Patricia Seybold Group
ETM ■ CONTENTS PAGE

Contents
11Editor and
contributors page 16 GRC—Step by step
In the last few years, GRC has emerged as the
40 Smooth transition
Public versus private cloud computing is one of
meeting point of efforts to ensure not only the hottest topics in IT at the moment, but there’s
compliance with regulatory requirements, but still a lot of confusion around its adoption—

13Industry snapshot a responsible approach to the management of


the enterprise risk that underlies regulatory
demands. SCOTT CRAWFORD
which has been higher than anyone expected.
STEVE BRASEN (ENTERPRISE
MANAGEMENT ASSOCIATES)
(ENTERPRISE MANAGEMENT talks with DENIS MARTIN and
ASSOCIATES) talks with LUCIO DE BROOKS BORCHERDING
15Professional profile RISI (MEGA INTERNATIONAL)
and LUC BRANDTS (BWISE), two
experts directly involved in helping organizations
(NAVISITE) about the scope and transition
of cloud computing.

shape their GRC strategy.

122 Events and features 46 Transforming business


26 The back office means
business
RANDY BRASCHE (GENESYS)
ETM’S ALI KLAVER interviews DEEPAK
JAIN (WIPRO) about enabling business growth
through IT infrastructure transformation.
and ETM’S ALI KLAVER explore how
companies are applying best practices from the
contact center to the back office to improve
efficiencies and meet service levels, all while
reducing cost.
50 Actionable Intelligence
DR. ANTON A. CHUVAKIN talks
about the usability and integration of security
information and event management (SIEM)

28 Pure logic
How can businesses better operate by
and touches on log management with the added
benefit of three industry experts; MICHAEL
LELAND (NITROSECURITY),
identifying and capturing defined logic and A.N. ANANTH (PRISM
repeatable rules? DANA GARDNER MICROSYSTEMS) and DEBBIE
(INTERARBOR SOLUTIONS) UMBACH (RSA, THE SECURITY
discusses business rules management (BRM), DIVISION OF EMC).
and explores the value of businesses being agile
in a safe way. He is joined by DON GRIEST
(FICO), RIK CHOMKO (INRULE
TECHNOLOGY) and BRETT
STINEMAN (IBM).
62 Create
factory
your own app
ETM’S ALI KLAVER chats to
EDDY PAUWELS (SERENA
SOFTWARE) about business process-

38 The key to success


As cloud computing takes a stronger hold on
driven application lifecycle management and
how they link to each other, as well as how
businesses can benefit from such a strategy.
the IT industry, organizations must realize
that there is a another factor that will ensure
its success. MARTIN KUPPINGER
(KUPPINGER COLE) writes about the
importance of service management.

8
CONTENTS PAGE ■ ETM

Contents
68 The pros and cons of
cloud
LAURA DIDIO (ITIC) describes
92 Seven reasons
PAUL BURNS (NEOVISE) shares
116One at a time
Enterprise search and subsequent workflow has
what to watch for if you’re considering making with ETM why every CIO must embrace Service long been confused with compliance and policies
the jump to cloud computing. She suggests it’s Level Management as a way to transform the IT for archiving. Information governance strategies
definitely a benefit, as long as you’ve done your organization. reset thinking in this area by establishing clear
research and it’s done right. use cases for accessing information versus those
that enable retention. SIMON TAYLOR

72 A marriage of sorts 94 Moving with the times


ETM’S ALI KLAVER talks to
(COMMVAULT) takes ETM’S ALI
KLAVER through the different faces of
enterprise search.
MIKE ATWOOD (HORSES FOR PRASHANTH SHETT Y
SOURCES) moderates a panel discussion (METRICSTREAM) about
on IT outsourcing touching on transformation, managing enterprise GRC programs in global
the cloud and some fantastic case studies with organizations, and how to realize the benefits that
the help of CHUCK VERMILLION can stem from successful implementation.
(ONENECK IT SERVICES) and
KARINE BRUNET (STERIA).
100 Business and IT—
side by side

84 SIEM satisfaction
One of the most ignored benefits of security
DANA GARDNER
(INTERARBOR SOLUTIONS)
moderates a discussion on the productivity
information and event management technology benefits and future of business process
is using SIEM technology to improve overall management with the help of MARK
IT operations. A. N. ANANTH and TABER (ACTIVE ENDPOINTS),
STEVE LAFFERTY (PRISM DR. ANGEL DIAZ (IBM) and
MICROSYSTEMS) talk to ETM’S ALI SAMIR GULATI (APPIAN
KLAVER about how improved operations is CORPORATION). This expert panel
seldom given much attention but might well examines BPM and explores what it delivers to
provide the most tangible cost justification. enterprises in terms of productivity and agility.

88 A question of semantics
ETM’S ALI KLAVER talks with DR. KATHY
110 Archiving on demand
MARTIN KUPPINGER
DAHLGREN (COGNITION (KUPPINGER COLE) talks to Astaro’s
TECHNOLOGIES) about an innovative ERIC BEGOC about mail archiving, how it’s
approach to meaning-based text processing changing, and what to expect in the future.
technology. Among a discussion on market trends
and the bottom line, it’s clear that Cognition is at the
forefront of search—now and into the future.
112Open innovation
With the rise and embrace of social networking
and software you could be forgiven for
thinking that we’re at the height of innovation.
MATTHEW LEES (PATRICIA
SEYBOLD GROUP) tells us how social
technology can make “innovation” more than
just a word.
9
EDITOR’S PAGE ■ ETM CONTRIBUTORS

Fo u n d e r / P u b l i s h e r
Amir Nikaein
Managing Editor
A l i K l av e r

Head in the clouds Creative Director


Ariel Liu
In t e r n D e s i g n e r
Je f f C e r i e l l o
It appears the IT world is slowly but surely opening up a realm of possibilities for
businesses globally. While we in the IT sphere have known this for a while, it’s just We b D e v e l o p e r
Vincenzo Gambino
coming to the attention of businesses looking at their SIEM solutions, their business
process management, and especially ROI. Po d c a s t / S o u n d E d i t o r
Mark Kendrick
An IT department stuck in the bowels of the building is quickly becoming a thing
of the past as business decision-makers realize that creative collaboration is the way to A ssociate Editors
M a r y Wr i g h t
go. Now, IT and management are rubbing shoulders—literally—and working across the He l e n a S t a w i c k i
gamut of business applications to find ways to grow, collaborate and innovate. Lee Lian Long
Our Q3 issue is a breath of fresh air and packed full of the answers to your questions. Account Executives
Why not start with our business rules management and business process management Jo e M i r a n d a
Sandino Suresh
podcasts (pages 28 and 100 respectively), as one of our favourite moderators, Dana Aicha Gultekin
Gardner, guides you through the essentials with the help of No r t h A m e r i c a n A c c o u n t E x e c u t i v e s
industry leaders. Fa r r a h Tu t t l e
Matthew Lees from the Patricia Seybold Group tells us how social technology can Ye s s i t A r o c h o
make “innovation” more than just a word (page 112), while I have an interesting chat Marketing Executive
with Dr. Kathy Dahlgren from Cognition Technologies about semantic search—certainly Alexandros Themistos
one to get the brain working (see page 88).
There is plenty more to read in this issue of ETM, and hopefully in these pages you’ll
find the perfect solution to your IT problems. And don’t forget, there are a wide range of Contributors
podcasts to enjoy on www.globaletm.com Pa u l B u r n s
Thank you for reading, and if you would like to contribute to any future issues of P r e s i d e n t a n d Fo u n d e r
ETM, please feel free to contact me via email at editor@enterpriseimi.com Ne o v i s e
Laura DiDio
Principal Analyst
I n f o r m a t i o n Te c h n o l o g y I n t e l l i g e n c e C o r p ( I T I C )
Mar tin Kuppinger
Senior Par tner and Founder
Kuppinger Cole
Matthew Lees
Senior Contributing Editor
Ali Klaver Patricia Seybold Group
Managing Editor

Enterprise Technology Management


is published by Informed Market Intelligence

How to contact the editor


We welcome your letters, questions, comments, complaints and compliments.
Please send them to Headquarters
Informed Market Intelligence, marked to the Editor, Informed Market Intelligence (IMI) Ltd
Farringdon House, 105-107 Farringdon Road, London, EC1R 3BU, United Kingdom Farringdon House, 105-107 Farringdon Road
or email editor@enterpriseimi.com London, EC1R 3BU, United Kingdom
PR submissions +44 207 148 4444
All submissions for editorial consideration should be emailed to editor@enterpriseimi.com
Reprints
For reprints of articles published in ETM magazine, contact sales@enterpriseimi.com New York
All material copyright Informed Market Intelligence 68 Jay Street, Suite #201, Brooklyn, NY 11201, USA
This publication may not be reproduced or transmitted in any form in whole or part without the written express consent of
the publisher. +1 718 710 4876

11
INDUSTRY NEWS ■ ETM

Industry snapshot
CALLING KENYA GROWTH IN NEW LICENSING
RUSSIA OPTIONS

Kenya is registering all mobile phone numbers Groteck Business Media reports that the It looks like the Microsoft Office license
in a bit to cut crime. Kidnappers often use information security market in Russia was per device concept has had a rethink. With
unregistered mobile numbers to text ransom able to develop during the economic crisis. the increasingly mobile workforce, and as
demands and it’s expected most people will Almost all segments grew in 2008, kept growing virtualization comes to the fore, Microsoft has
support the move to make life more difficult in 2009, and they anticipate growth in the had to clarify its SA policies. Since July, users of
for criminals. Users must supply ID and proof 2010-2011 period. The main drivers were a PC with an Office license have rights to Office
of address before they get a number, and any requirements towards protecting personal data 2010 Web Apps from PCs or external devices,
numbers still unregistered as of the end of July and information in public authorities. In the but companies will need to host the Office
will be disconnected. Tanzania is also involved in next two years they expect the implementation Web Apps on either SharePoint Server 2010 or
a similar process. of electronic document management and the SharePoint Foundation Server 2010.
protection of mobile devices to be big growth www.microsoft.com
areas.
www.groteck.com

JAPAN EMBRACES IBM PROBED VIRUS TARGETS


GOOGLE The European Commission has launched two
INDUSTRY
separate competition inquiries to discover
whether IBM has abused its position in the
mainframe market following complaints by two
software makers. The inquiries will examine
whether IBM prevented competitors from
operating freely and will look at their relations
with maintenance suppliers. IBM says the
inquiries have no merit.
Google has trumped Bing in a deal to provide
search results and related advertising to Yahoo PENTAGON HUNTS
Japan. The deal will see Google provide search
capabilities to 90% of the PC market and roughly
WIKILEAKS Siemens is tackling a virus that specifically targets
computers used to manage large-scale industrial
half of the mobile web market. This is a further The Pentagon is still on the hunt for the source control systems used by manufacturing and
boost for Google’s Japanese operation. On who leaked more than 90,000 classified US utility companies. Although this could be one of
another note, the China/Google row continues... military documents. Bradley Manning, the the biggest malicious software threats in recent
22-year-old Army intelligence officer currently years in the form of industrial espionage, Siemens
under arrest for leaking a variety of classified is actively looking to counteract it. They’ve
documents, databases and videos to Wikileaks, already discovered that it’s best to leave current
has not been ruled out as a suspect. Although passwords unchanged and to refrain from using
the leaks reveal past actions, the details are USB keys.
considered nonetheless damaging.

13
EXECUTIVE PANEL ■ GOVERNANCE, RISK AND COMPLIANCE

GRC—Step by step
In the last few years, GRC has emerged as the meeting point of efforts to ensure not only
compliance with regulatory requirements, but a responsible approach to the management

of the enterprise risk that underlies regulatory demands. SCOTT


CRAWFORD
(ENTERPRISE MANAGEMENT ASSOCIATES) talks with LUCIO DE RISI
(MEGA INTERNATIONAL) and LUC BRANDTS (BWISE), two experts
directly involved in helping organizations shape their GRC strategy.

http://www.GlobalETM.com

16
GOVERNANCE, RISK AND COMPLIANCE ■ EXECUTIVE PANEL

SC: THERE HAS BEEN A LOT OF TALK SC: THAT LINES UP VERY WELL
ABOUT GRC OVER THE PAST FEW WITH WHAT WE’VE SEEN AT EMA.
YEARS, AND TO MANY IT SOUNDS THERE’S DEFINITELY A VERY LARGE
QUITE BROAD AND UNDERSTANDABLY ELEMENT OF RISK, AND LUCIO, THE
SO, CONSIDERING THE BREADTH OF ISSUE YOU BRING UP DOES REVOLVE
WHAT IS INCLUDED TYPICALLY IN A TO A CERTAIN EXTENT AROUND
GRC PROGRAM. LUC, HOW DO YOU GOVERNANCE.
AND BWISE DEFINE GRC? ORGANIZATIONS THAT WE WOULD

LB:
QUALIFY AS HIGH PERFORMERS HAVE
We feel that there is a need to PLACED A GREAT DEAL OF EMPHASIS
integrate all the different “levels” of defence in ON SETTING THE TONE AT THE TOP,
the organization. So with the first level we want IF YOU WILL, AND THE SUPPORT OF
to help businesses to responsibly implement SENIOR MANAGEMENT IN TERMS OF
policies and procedures, report incidents, DEFINING PRIORITIES, STRATEGY AND
implement controls and so on. A TRULY RESPONSIBLE APPROACH TO
This is supported by a second level ENTERPRISE GOVERNANCE.
of defence, whether it’s risk management ONE OF THE THINGS EVIDENT
compliance or quality management FROM OUR RESEARCH HAS BEEN NOT
departments, and that’s where a big JUST SETTING THE TONE AT THE TOP
convergence effort is taking place—trying to BUT SENIOR MANAGEMENT SUPPORT
integrate all the different risk languages into FOR GRC EFFORTS. IT’S CRITICAL, NOT
one. We see GRC as often being mistaken for JUST FOR LEADING GOVERNANCE
just that second level of defence. INITIATIVES, BUT FOR IMPLEMENTING
There’s also more to it, a third level of RISK MANAGEMENT TACTICS—AND
defence, where internal audit does their THAT INCLUDES MEASURES SUCH AS
independent review of that information, trying ENFORCEMENT, FOR EXAMPLE.
to leverage the data that’s out there as much as LUCIO, WHAT ARE SOME OF THE
possible. THINGS THAT YOU THINK HELPS
Finally, there’s a fourth level of defence, the ORGANIZATIONS SUCCEED IN
external auditor and regulators, who hopefully DEFINING EFFECTIVE GOVERNANCE?

LD:
also take that information into account.
What we’re trying to establish, and what First, I’d like to enhance the kind
organizations are trying to get across, is that all of dichotomy in how to approach GRC in
these different entities, departments and views initiatives, and then position the sponsorship
within an organization need to be speaking a from top managers with respect to these two
single risk language. There’s a strong element different approaches. These two approaches are
of risk and a very important component of not opposed, but complementary.
compliance that is being governed by the One is what you would call approach based
processes that help these four levels of defence on controls, and the second is based on business
to cooperate. improvement. The role of senior management is

LD:
different in these two different cases.
Based on customer experience, I Let me clarify what I mean. In some cases,
think that GRC doesn’t mean the same thing for the companies need to apply what I call the
everybody—just the initiatives today cover a control-based approach. For example, you
large spectrum of requirements. need to respect US law about not exporting to
An analyst’s definition would call GRC a some countries, or you have to guarantee that
set of policies, processes, methodologies and you provide the appropriate data to the stock
tools that a company implements to phase the exchange. If you’re in Europe you know that you
increasing pressure of internal and external cannot provide any advertising, or you must be
regulation, and to guarantee that all conditions sure that you’re not referring to smoking, for
are met to achieve business goals. instance.
In the beginning, GRC was formed to In all these cases, which are basically
basically put together siloed initiatives within matters of respecting the law and other strict
one global approach, then the acronym of GRC rules, I think that the control-based approach is
was born. Today, that model of GRC is more the one that companies must apply, even if it’s
about implementing a holistic approach to not the only one.
target first business performance, and then fix The second one that I mentioned, which I
the technical problems within each department. call the business improvement-based approach,

17
HEAD TO HEAD ■ BUSINESS PROCESS MANAGEMENT

The Back Office


means Business
Randy
Brasche(Genesys)
and ETM’S ALI KLAVER explore
how companies are applying best
practices from the contact center
to the back office to improve
efficiencies and meet service levels,
all while reducing cost.

AK: RANDY, WHY DOES THE BACK Usually a piece of work goes into a queue, AK: THAT’S A GREAT EXAMPLE—CAN
OFFICE WANT TO EMULATE THE just like a telephone call would go into a YOU PERHAPS TAKE US THROUGH A
CONTACT CENTER OR FRONT OFFICE? queue, then the contact center, usually the FEW MORE?

RB: RB:
back office person, has to pull that piece
Well, if you think of the contact of work out of the queue and they have to I have a few other great examples.
centre, they’ve had years to become efficient. The validate it in terms of actually doing the work. Typically, when you think of the back
calls that go into a contact centre get prioritized, Then they have to go one step further and office, there are usually some penalties or
routed, sent to the right agent, and so on. execute the work. costs associated with it. If you think about
When you look at the back office, they What we’ve found is that the process of provisioning a service like your telephone, or
sometimes have six times the amount of finding the piece of work and pulling it out of doing a credit card dispute, there’s usually a
workers, three to five times the costs, and a lot the queue usually takes about three minutes or service level associated with that.
of the time they’re very inefficient. so, and that’s tremendously inefficient when Say that we took, for example, one of our
Perhaps you had to submit an insurance you’re talking about thousands and thousands customers who is a large telecommunications
claim and normally you might be very happy of work items in the back office every year. company. When they don’t provision a
with your experience of the contact center Imagine, for example in the same contact telephone service from the back office, they
submitting that request, but when it came to center, if someone were to go ahead and call in, have to pay fines to the front office, the contact
actually being processed it gets delayed. and an agent looked at all the calls in the queue center and to the customer.
And in terms of cost, especially since it’s and saw that a person wanted to change their Imagine if all this work is sitting there
three to five times the cost in the back office, account information. They could then pull it and they might have two piles—one might
that’s a lot of money companies are spending out and take care of that customer very quickly be something as simple as just changing
mostly on individuals in the back office, cherry and easily. account information, and the other pile is for
picking work, not taking the right items, or the Imagine how inefficient and frustrating provisioning a new service—obviously you
work not being aligned to the right person. it would be for the customer on the telephone want to go in and prioritize the provisions on
to wait for an extended period of time, or get your services to ensure that you don’t have to
AK: WHAT ARE YOU FINDING IS THE put through to the wrong department, when pay a fine.
SOURCE OF THESE INEFFICIENCIES? all they wanted was the change their account Similarly, one of our customers tries to

RB:
information—these are the exact same move ahead quickly and set up new credit card
There are usually a couple of steps things that are happening in the back office account that they receive from the web, but
that are taken in the back office when a work today. they get stuck in the back office and they don’t
item is processed. get prioritized. These prospects actually end

26
BUSINESS PROCESS MANAGEMENT ■ HEAD TO HEAD

up getting credit cards from other companies I’ll use another real-time
because they weren’t processed appropriately
or quickly enough in the back office. So that’s a
example. We did a pilot with
a customer in Australia and “ back office
... these
case of lost revenue.
Both cases are from a service level
they typically had a problem
with their nine to five work processes are being relied
agreement perspective, and at times you may
have to pay fines for not meeting them. From
day and the fact that, at
five o’clock when work was front office
on by the
contact centre...”
the other credit card example, this is lost done, they still had a lot of
revenue and lost customers that you could have unfinished work and items and the
had because you were very inefficient in the that weren’t processed that
back office. were high priority. ESSENTIAL TO REALLY JUMP ON THESE
Once we worked with them, implementing BACK OFFICE BUSINESS PROCESSES TO
AK: WHAT ARE SOME OF THE EXISTING this process, their nine to five work day went ENSURE THAT YOU’RE GETTING THE
TECHNOLOGIES IN THE BACK OFFICE from nine o’clock until two o’clock, so they had BEST POSSIBLE RESULT YOU CAN.
THAT COULD BENEFIT FROM THESE three extra hours to re-provision these workers NOW FOR OUR LAST QUESTION, WHAT
NEW EFFICIENCIES? to do other items that could actually benefit CAN THOSE COMPANIES LISTENING

RB:
from the next day’s worth of work. TODAY DO TO GET STARTED?

RB:
There are a lot of new technologies
that, if you think about it, any process or work AK: THAT’S ANOTHER FANTASTIC It really requires self assessment and
based item can use to their advantage. EXAMPLE RANDY. WHAT TYPES OF some internal thinking in terms of: What are my
The simplest might be a fax server, and COMPANIES WOULD BENEFIT? processes? How are they being done? How are

RB:
I’ll give you an example in a second. Another my workers being utilized? What are their skill
one might be a service request system, such as The logical ones are obviously the sets? How do I determine which items are the
a Remedy, trouble ticketing system, a Siebel most paper process-intensive companies such higher business priority? The list can be endless.
system or SAP system, and all the way up to as insurance companies that have to deal with A lot of companies are doing this back
the more complex systems such as a business claims, financial services and so forth. But there office transformation today and I think it
process management system. are a lot of other companies that you might not really becomes an issue of self assessment. You
The simplest example I could give is that even think about. need to take a close look at what you do in the
most people can relate to a fax service. I was These are companies that have to process back office and re-prioritize your resources,
using an airline several years ago and they leads that they get from their websites, or other your processes, and also implement new
missed crediting me for 5000 miles .They said to companies that have some sort of government technologies to ensure that you’re becoming
fax my request in and that it would be rectified. regulation and service levels associated with more efficient.
So I did that and nothing happened, even when them—to use the credit card example, when At the end of the day, when you’re talking
I faxed it again. I ended up getting so frustrated you have to go ahead and issue your credit card about six times the amount of back office
that I switched airlines. dispute—then that has to be fulfilled within a workers at three to five times the cost, that
Had they actually known my status as a gold certain period of time. translates into a lot of money.
customer, looked at the fax, and attached a high So if you think about any company across Also, these back office processes are being
priority tag to it and sent it to the right agent, the board and any vertical industry, there’s relied on by the front office and the contact
along with an SLA associated with it saying that always some sort of business process associated centre, and you’re also talking about customer
I needed to be responded to within 24 hours, in the back office, so any company could really satisfaction which can result in customer
then I might not have ended up leaving and benefit from this. defection. But if you can keep those customers
going to another airline. happy, then these happy customers are going to
I’m now a happy customer at the airline AK: YOU’RE TALKING ABOUT spend more money.
I switched to, so that’s a great example of a CATERING ACROSS A WIDE RANGE OF So it really requires self assessment and
technology that could actually benefit from this INDUSTRIES HERE, AND ESPECIALLY looking internally to see where you can
type of a process. IN THIS ECONOMIC CLIMATE IT’S improve.

AK: THE BOTTOM LINE IS STILL SUCH


AN IMPORTANT ASPECT OF DAILY
BUSINESS LIFE RANDY, SO CAN YOU
Randy Brasche |
TELL ME WHAT THE TYPICAL ROI AND DIRECTOR OF PRODUCT MARKETING
SAVINGS ARE? GENESYS

RB: It’s pretty dramatic, when you think


about it, if you prioritize the work items based
Randy is responsible for driving adoption of Genesys’ market-
leading customer service and sales solutions. Prior to Genesys, he
was a founding member and director of product marketing at Active
upon value and send them to the right person Reasoning, and held marketing and product strategy positions at Cable
in the back office just like you would with a and Wireless, Exodus, Oracle, Informix and Liberate Technologies.
telephone call in the front office and the contact Randy is the author of the popular IT Compliance for Dummies
center. We’ve seen a dramatic improvement of and Dynamic Contact Center for Dummies books.
about 15-25% efficiencies in the back office.

27
EXECUTIVE PANEL ■ BUSINESS RULES MANAGEMENT

Pure logic

http://www.GlobalETM.com

28
BUSINESS RULES MANAGEMENT ■ EXECUTIVE PANEL

How can business better operate by identifying and capturing defined logic and
repeatable rules? DANA GARDNER (INTERARBOR SOLUTIONS)
discusses business rules management (BRM) and explores the value of businesses
being agile in a safe way. He is joined by DON
GRIEST (FICO), RIK
CHOMKO (INRULE TECHNOLOGY) and BRETT STINEMAN
(IBM).

DGARDNER: DON, TELL ME A LITTLE in healthcare as well. That is increasing the need framework was almost brand new, to focus on
BIT ABOUT YOUR HISTORY. HOW IS IT for decision-making with great transparency rule technology for that particular framework
THAT BUSINESS RULES MANAGEMENT and also being able to minimize the impact to and platform.
PLAYS AN IMPORTANT ROLE AT YOUR the overall return on the company. We’ve been doing that ever since and
COMPANY? If you look at retail, it’s exploding in really pushing harder to be a solution for the

DGriest:
terms of what the web has done and in terms .NET platform that provides the authoring,
FICO is probably best of consumer expectations about how many management, storage and execution of the rules
known for FICO score which is used in credit combinations of different products are available applied on that platform.
decisions, when you get a credit card or apply and greater competitive pressure to get the I think what I’ve seen over the last few
for a loan for a house. It’s been around 50 years right price point and the right offer to the right years has been changing a little bit more than
now and started with a couple of statisticians, customer—and actually still make money what was there before. There are always the top
Bill Fair and Earl Isaac. doing it. three industries that you would apply business
They came up with a way of using data rules to—insurance, financial services and
analytics to improve decisions. They quickly DGARDNER: I’M GOING TO GUESS healthcare—and while those are still going
found out that giving people a good credit score THAT AT FICO YOU OFFER SERVICES strong today there seems to be an uptake in a lot
wasn’t enough and that they needed to apply THAT AMOUNT TO BUSINESS RULES of other industry sectors that might be looking
those decisions in making offers on products MANAGEMENT, BUT I BET YOU to use rules, outside those top three.
and making decisions about the credit risk. ALSO EMPLOY IT WITHIN YOUR For example, take the entertainment
So they started building applications for ORGANIZATION. SO YOU’RE A industry. One of our clients is actually using
banking and then eventually insurance, retail, BUSINESS RULES CONSUMER AS WELL rules to manage their project plans to enforce
healthcare and other industries to help them AS USER? consistency and promote realistic planning for a

DGriest:
make decisions informed both by the best large scale video production.
practices that were in the policies, but and by Definitely. FICO So it’s kind of interesting where we’re seeing
analytics including predictive analytics, predictive is known for its scores, so that uses rules this use of rules grow out from perhaps what
modelling, simulation and optimization. management to implement those scores. They people would traditionally apply rules to, and
Today, we sell both applications and then create formulas that take information at the trying to branch into other industries.
tools underneath that help us build those credit bureaus and apply scoring techniques to
applications—business roles management being create a score. We then have applications that DGARDNER: BRETT STINEMAN AT IBM,
a critical one of those. our customers use in origination. HOW DO YOU SEE YOUR BRM MARKET
So when you fill out the loan it actually SHIFTING OR PERHAPS GROWING IN
DGARDNER: WHAT’S CHANGING? helps to walk that through the process— THE NEXT FEW YEARS?

BS:
WHAT MAKES BUSINESS RULES a culmination of normal business process flow
MANAGEMENT SO IMPORTANT TODAY? but also business rules being at the centre of I’m sure most people have a fairly
DO YOU AGREE THAT COMPLEXITY IS that. So, yes, it’s used throughout the company. good idea of who IBM is in terms of the various
SPINNING OUT OF CONTROL? software, hardware and services that we provide.

DGriest:
DGARDNER: RIK AT INRULE In terms of business rules management, our
I agree that there TECHNOLOGY, TELL US A LITTLE offering came from an acquisition of a company
have been a number of changes in the market. BIT ABOUT WHAT YOU DO, WHAT called ILOG that occurred in 2009.
Obviously, the recent economy changes have YOU PROVIDE, AND HOW YOU SEE ILOG has a long history, going back
put a lot of pressure on efficiency and doing THE LANDSCAPE FOR BUSINESS 20 years, in a variety of different types of
more with less. This means you need to make RULES MANAGEMENT SHIFTING OR decision technologies—both from a business
faster, cheaper decisions, and you need to be ADVANCING? rules standpoint as well as optimization

RC:
able to make changes to those decisions faster. and visualization technologies, all of which
At the same time, we’ve got more regulatory InRule was started about eight were used to help organizations make better 
pressures coming in not just in banking but also years ago and we decided, at the time the .NET decisions for various parts of their businesses.

29
ANALYST FEATURE ■ SERVICE MANAGEMENT IN THE CLOUD

The key to success


As cloud computing takes a stronger hold on the IT industry, organizations
must realize that there is a another factor that will ensure its success.
MARTIN KUPPINGER (KUPPINGER COLE)
writes about the importance of service management.

C
loud computing is the hype topic in IT. And without a doubt, cloud computing is about a fundamental paradigm shift in IT.
However, it is not so much about procuring external services. It is about the way IT services are produced, procured and managed—
internally as well as externally. That is where service management comes into play.
Service management, from the Kuppinger Cole perspective, is the key success factor for cloud computing. When talking about cloud
computing, it’s something different than “the cloud”.
First of all, there are several clouds, in the sense of environments which deliver IT services. These might be internal or external; they might be private or
public; but all of them provide IT services at different levels of granularity. These levels range from granular web services to coarse-grain services like complete
application environments and many SaaS (Software as a Service) approaches.
Cloud computing, on the other hand, is about selecting, purchasing/requesting, orchestrating and managing these services. The management spans the
entire range from technical aspects to auditing and accounting.
While the services might be delivered by many clouds, there has to be one consistent management approach. This approach has to cover internal and
external IT services. It is about one view on the IT, regardless of the service provider (or cloud, to use that term).

IT’S NOT ABOUT IAM FOR THE CLOUD Approaches that aren’t focused on supporting the flexible change from internal to external
Given that, we have to redefine our IAM a hybrid cloud environment can only be tactical services and back.
strategies. We have to think about how to approaches, if at all. On the other hand, internally Consuming external services is one element
manage everything consistently. That excludes focused tools have to expand their reach to of the overall IT service provisioning. And it is, by
approaches that run externally and only manage external services. the way, an element which is in place in virtually
the external services. IAM in the cloud only any organization. Think about web hosting,
for the cloud is contradictory to the target of ONE IT—ONE MANAGEMENT web conferencing and many other applications
managing everything consistently. Thus, we need It obviously doesn’t make any sense to deal with which are frequently provided by external service
to expand what we have (or should have) in IAM, external services that differ with internal services. providers.
and access governance to support our future IT That will make management inconsistent, The quintessence of cloud computing is that
infrastructure. redundant and error-prone, plus, it will inhibit it standardizes the service management across

38
SERVICE MANAGEMENT IN THE CLOUD ■ ANALYST FEATURE

all types of services and thus allows you the vendor marketing, about having descriptions In other words: service management
flexibility to choose services from different from the business perspective of their is the foundation for an “ERP for IT”, the
providers. Another effect is that internal requirements to IT. ERP application which is still missing today.
IT services have to become standardized It is not about availability management However, today’s service management
and (from a cost perspective) produced for business processes or something similar, it applications aren’t an ERP for IT, even while
efficiently—internal IT service production is about mapping the required IT services to a some vendors tend to start telling this to their
should significantly benefit from that approach business requirement—for example, mapping customers.
by becoming more “industrialized” and storage and archiving services, information
automated. rights management and other services to the FOCUS ON SERVICE MANAGEMENT—
requirement, that contracts are handled in a AND SUCCEED WITH CLOUD
FOCUS BEYOND SERVICE defined way. COMPUTING
FUNCTIONALITY One element within such a business Looking at cloud computing and service
To fulfill the security and governance service management is providing the input for management, it is obvious that these two things
requirements, service management has to the governance requirements of IT services. can’t be separated. Service management is the
focus not only on the functional aspects (and, These requirements typically are derived from foundation for successful cloud computing.
like frequently seen today when looking at the business requirements, including regulatory And cloud computing will drive the service
cloud, costs). compliance. management initiatives in organizations and

“While the services might be


will require the internal IT to standardize
their services.

clouds
The most important reason for this is that
otherwise the internal IT can’t prove that they

delivered by many
are providing the most appropriate services
, because they can’t directly compare with

consistent
cloud services. Only with complete service
requirements, including the governance aspect,
there has to be one can internal IT can validate that their service

approach.”
procurement suits the needs of the business
management better than the (sometimes) cheaper external
service.
For each service there has to be ERP FOR IT It will absolutely change the way the
“governance” requirements, including aspects An interesting opportunity within this approach internal IT is working—but it is the only
like encryption of data, requirements for of consequently using service management opportunity the internal IT has: standardize
privileged access management, allowed paradigms at all levels is that the ability for services, optimize the service production,
locations for processing and storing the data, accounting will significantly increase. Once and be better in meeting all the service
and many more. everything is understood as a well-defined requirements.
When describing services and defining service, it is relatively easy to have a price tag on From an overall IT perspective, service
the service requirements, there has to be a these services. management is key to success in cloud
standardized set of such requirements to ensure That, in consequence, will allow you to computing as well because it is the prerequisite
that these aspects are considered when selecting do much better resource planning and to for being able to flexibly switch between
the (internal or external) service provider. predict costs of new business services (eg. new internal and external service providers and
The most appropriate provider isn’t the one requirements to the IT) much more reliably back.
with the most advanced functionality or the than before.
lowest cost—as long as he doesn’t meet the
governance requirements.

BUSINESS SERVICE MANAGEMENT


When talking about service management in the
Martin Kuppinger |
FOUNDER AND SENIOR PARTNER
context of cloud computing, it becomes obvious
that there are multiple layers of services. Within KUPPINGER COLE
IT services there is a range from single web Martin established Kuppinger Cole, an independent analyst company, in
services at the application level to complex SaaS 2004. As founder and senior partner he provides thought leadership on
applications. However, that can be managed topics such as identity and access management, cloud computing and IT
with a consistent approach because the service management.
fundamental principles of service management Martin is the author of more than 50 IT-related books, as well as
apply to any level of service. being a widely-read columnist and author of technical articles and reviews
Beyond the IT perspective, there has to be in some of the most prestigious IT magazines in Germany, Austria and
business service management as well. Business Switzerland. He is also a well-known speaker and moderator at seminars
service management is, in contrast to today’s and congresses.

39
HEAD TO HEAD ■ CLOUD COMPUTING

Smooth
transition
Public versus private cloud computing
is one of the hottest topics in IT at the
moment, but there’s still a lot of confu-
sion around its adoption—which has
been higher than anyone expected.
STEVE BRASEN
(ENTERPRISE MANAGE-
MENT ASSOCIATES) talks
with DENIS MARTIN and
BROOKS BORCHERDING
(NAVISITE) about the scope of
cloud computing and its transition.

http://www.GlobalETM.com

40
CLOUD COMPUTING ■ HEAD TO HEAD

SB: TODAY WE’LL BE TALKING ABOUT PUBLIC VERSUS Typically you can get on a public cloud, whether it’s for compute
PRIVATE CLOUD COMPUTING, CERTAINLY A HOT TOPIC and storage or a combination of them, usually within minutes by simply
AND ONE AROUND WHICH THERE IS A LOT OF CONFUSION. providing a credit card number and commitment to pay and then your
I DON’T SEEM TO BE ABLE TO PICK UP A TRADE MAGAZINE access is immediately available. So it’s a very simple on-boarding process.
THESE DAYS WITHOUT SEEING REPEATED REFERENCES TO The challenge on the public cloud, because it is geared for larger groups
CLOUD. of users and for a general usage case and not for specific usage cases, is that
ACCORDING TO EMA PRIMARY RESEARCH, IN FACT, 11% it’s geared typically for non-production services with very low service level
OF ALL BUSINESSES HAVE ALREADY ADOPTED SOME FORM agreement guarantees, and in some cases almost to the point of best effort-
OF CLOUD SERVICES IN ORDER TO ACHIEVE THEIR BUSINESS type performance.
OBJECTIVES. THIS IS VERY FAST ADOPTION WE’RE SEEING, You really don’t rely on them for services other than things like
FOR WHAT IS REASONABLY CONSIDERED A FAIRLY NEW development or some sloppy bursting that you might need, but for today
TECHNOLOGY. WE’VE PROJECTED THIS TO BE SOMEWHERE at least, they’re not geared for the rigors required for producing and
BETWEEN A $40-50 BILLION DOLLAR INDUSTRY BY THE END supporting production applications.
OF 2011, AND GROWING ROUGHLY TO $160 BILLION BY 2015. Private clouds, on the other hand, inherently have all of the features
YET WITH ALL THIS PROMISE AND HYPE, IT’S SURPRISING required for not only doing high level SLAs, but also providing the
THAT THERE DOESN’T SEEM TO BE MUCH CONSENSUS complete infrastructure lifecycle management.
ON EXACTLY WHAT CLOUD IS AND WHERE THE SCOPE IS, So in the case of public cloud, you might only have the ability to
WHICH LEADS ME TO MY FIRST QUESTION—HOW WOULD manage your CPU and the amount of memory, but you don’t have control
YOU DEFINE THE SCOPE OF CLOUD COMPUTING, AND HOW over firewalls and load balancers and the other components that are
DO YOU DIFFERENTIATE PUBLIC AND PRIVATE CLOUD required to provide the use of the machine that you created, the firewall
COMPUTING? rules that you apply to it, the load balancing and so on.

DM:
On the private side, since it is fully controlled, you do have the ability
You’re right Steve, there is a lot of confusion in the to create and work on the machines, apply firewall rules to them, apply
market today around cloud. Today we’ll talk about it primarily from an load balancing as needed, and then expose them from either the back end
infrastructure perspective, but even then there’s a lot of confusion about network or expose them on the public network space automatically.
what a public cloud is compared to a private cloud. It’s a much more robust environment for providing a range of services,
In that spectrum from private to public, the consensus defining factor whether it’s simply for development and testing, and all the way to the level
that’s emerging is how many customers are on the cloud. If there is more of providing production services with four nines or five nines availability.
than one, it’s typically defined or put in the bucket of being a public cloud.

“... a quasi-private
If it’s only one, then it’s eligible to be qualified as a private cloud.
Even then there are a number of options or gradients along that
spectrum where it’s not so black and white. For example, NaviSite
offers private hardware where we can put one customer on a piece
of hardware, yet they’re sharing other components of the underlying
infrastructure.
cloud, as an extension
Is that private, or is that public? We think of it as quasi-private and of your IT environment, is re-
win-win
we think we provide all the benefits of a private cloud without any of
the downsides. It’s not so cut and dry that there is a single differentiator
between public and private. ally a on
BB: I’d like to add to what Denis said and to your initial points,
Steve, around rapid adoption. both sides.”
BB:
If you take a step back and consider why cloud has become so
interesting and gathered so much hype, it’s because it is a true revolution I think a couple of the general benefits, be it public or private, is
and a true transformation of the way that companies are consuming IT the fact that cloud services do have a promise of mitigating the complexity
resources. of IT. So, from a consumer perspective, it is easer to look at this as an
So be it public, private or a hybrid of anywhere in between, I think alternative to acquire these resources, be they compute resources, or be
at least in our generation, that we’ve very rarely seen something of this they application on demand or SaaS-type capabilities.
magnitude that is changing the fundamental consumption paradigm of IT. So from both, there is this promise that we can make it much simpler
We certainly have experienced that where we’re based here, in to consume IT. And on both, I think there’s also a promise, be it public or
the enterprise space, but you can see this very rapid consideration of private, consumer or enterprise, that there will be a reduction in capital
alternatives to the way that companies are consuming IT resources from expenditure and an increase in operational efficiency across the spectrum.
consumers across the enterprise spectrum. Where the differentiation comes between public and private, as Denis
mentioned, is that they’re built to deliver enterprise-type class services—
SB: WHAT ARE THE PRIMARY BENEFITS AND CHALLENGES OF at least, that’s the approach that we’ve taken at NaviSite.
PUBLIC AND PRIVATE CLOUD IMPLEMENTATIONS? So it’s taking everything from the quality of the underlying

DM:
infrastructure and technology through to everything else that would be
From the public cloud perspective, the biggest benefit is the required such as the security standards, the wraparound services that you
ease of access and the ease of on-boarding. would expect, and then the ongoing support.

41
ASK THE EXPERT ■ IT INFRASTRUCTURE TRANSFORMATION

Transforming
business
ETM’S ALI KLAVER interviews
DEEPAK JAIN (WIPRO)
about enabling your business growth
through IT infrastructure transformation.

http://www.GlobalETM.com

AK: CAN YOU GIVE US A BRIEF SUMMARY OF WIPRO’S Unlike many Indian IT companies focused on remote infrastructure
INFRA STRUCTURE SERVICES BACKGROUND AND HOW YOU management and cost arbitrage, we also focus on improving the business
HELP BUSINESSES SUCCEED? KPI’s, for example, how IT can help in faster inventory turns or reduce

DJ:
cycle time for order to cash, or how we can reduce cost to serve for our
Wipro has been offering IT Infrastructure services to its customers clients’ end customers.
for over 25 years. Our customers are spread across North America, Europe,
Asia Pacific and Middle East geographies. Wipro’s IT infrastructure business AK: LET’S TACKLE THE SUBJECT OF TODAY—IT
is US$926 million and contributes 21% of our IT services revenues globally. INFRA STRUCTURE TRANSFORMATION. HOW DO YOU DO IT?
We’re seeing robust growth in this business and have been ahead of HOW DOES IT TRANSLATE INTO COST SAVINGS?

DJ:
company growth at 40% CAGR for the last three years. We have seven
datacenters and 17 global command centers including 14 security operations IT Infrastructure optimization and transformation has to be
centers globally. Over 16,000 associates work for this division. looked at through four broad areas:
Our growth strategy is to keep on expanding our portfolio and, today, CONSOLIDATION: Our experience of working with customers across
in our infrastructure services business, we offer end-to-end IT outsourcing industries proves that consolidation is a big lever for cost savings. As IT
solutions from design and implementation services, managed services, DC assets increase so does IT infrastructure complexity, creating significant
outsourcing including technology transformation, and audits to continually management problems. In addition, data center energy consumption
improve the performance of IT systems. is skyrocketing, not to mention the energy prices rise. Therefore, the
We also have comprehensive offerings to cater to complete IT security consolidation approach should focus on:
management services (consult –deploy –manage–audit). We also have a • Consolidation of IT operations, such as a central monitoring and
strong offering on the Core Telecom networks. command centre, IT service desk and knowledge database
• Consolidation of IT Infrastructure, such as a reduced number of
AK: HOW DO YOU HELP BUSINESSES SUCCEED IN THE datacenters and computer rooms
CURRENT MARKET? • Consolidation of IT procurement. We believe that procurement for

DJ:
global organizations gives them the scale to negotiate and manage
Our approach is to partner with our customers and look at long hardware and software spend better
term relationships. Our domain knowledge helps us understand the clients’ • Consolidation of services through shared model for service desks, and
business better, and then propose solutions more aligned to business. factory model for application packaging.

46
IT INFRASTRUCTURE TRANSFORMATION ■ ASK THE EXPERT

STANDARDIZATION: Simplification is again an important lever for that IT operations, technology adoption and spend on IT transformation is
controlling costs. Over time, many customers have added complexity into optimal at all times and can be a function of the business growth.
their IT environments which could be in the form of disparate applications,
operating systems, technologies, processes and tools being used. AK: WHAT ARE THE LEVERS FOR SUSTAINABLE COMPETITIVE
We recommend our customers make one-time investments to ADVANTAGE THROUGH INFRA-TRANSFORMATION?

DJ:
standardize the IT estate and look at ROI over five to seven years.
RATIONALIZATION: Application and infrastructure rationalization is IT transformation positions organizations to:
another key driver for cost reduction. BETTER MANAGE COST AND RISK: Our hindsight experience of
VIRTUALIZATION: Both on the data center side and on the end user side. delivering these services for close to three decades helps us to do the job with
The data center side is where one consolidates the servers and storage across the least possible risk, and at the most optimized cost through our Global
the enterprise. This leads to lower support costs and easier administration Delivery Model.
without sacrificing compute power and storage capacity. SUPPORT BUSINESS INNOVATION: Our domain understanding and
On the desktop side—virtualization of desktop or VDI—this leads to its trends helps us to understand our customers’ current and future needs.
better control over the desktops, lower costs and increased ease of desktop We drive innovation in our solution to bring about business innovation for
management and refresh. our customers.
SCALE MORE EFFECTIVELY: We are not into product reselling on a
AK: WHY IS IT IMPORTANT FOR A BUSINESS TO DO THIS NOW, stand-alone basis, and we’re not incentivized to dump more products. We
PARTICULARLY IN THE CURRENT ECONOMIC CLIMATE? WHAT analyze the customers’ current needs and the impact of their ever changing
ARE THE MAIN BENEFITS? business environment. That helps us to provide the most optimized solution

DJ:
for today’s challenges while keeping scalability in mind for future growth.
The CIO/CTO organizations have realized that after a phase of REDUCE ARCHITECTURAL COMPLEXITY: Through application
over abundance there is a need to get to a state of equilibrium. rationalization and infrastructure consolidation, we try to simplify IT for
Also, the future trends and technologies, including the disruptive our customers so that it becomes easily manageable and more meaningful to
trends like cloud computing, will require organizations to seriously look at their business.
consolidation, standardization and rationalization. Therefore, it’s important INCREASE THE VALUE OF REVENUE-GENERATING SERVICES:
that organizations are ready to make the best advantage and avoid high In many cases today we help our customers to increase their touch points
transition/migration costs as these trends mature. with their own customers, reduce their time to market, help them to deliver
The cost take-out initiative that companies started in 2008-09 also more efficient services to their customers, and become more agile and
continues because it was a multi-year program. First tranche of savings competitive in the market place.
came in from discounts from vendors. However, to get a sustainable cost ENHANCED END USER EXPERIENCE: While traditional methods
advantage, transformation is essential. Without this further cost take-out will of monitoring IT services have been quite discrete in their approach, today
be extremely difficult. we measure our performance through the eyes of the business user that
We also believe that organizations will consolidate their business experiences our services.
portfolios and that the center of economic activity will shift to newer It is no longer enough if the servers are up 99.99% and the network is up
geographies—time to market will be the key parameter to gain market share. 99.99% etc; what really matters is that the end user who is trying to complete
Therefore, end users will not be bothered about the technology used a transaction through an application is able to do it in the specified time.
but will be more focused on the functionality it delivers. The economic By monitoring the performance across each layer of the chain we are able to
environment will move customers from being buyers of technology and control the performance and deliver enhanced end user experience.
building on capacity, to looking at capacity on demand and utility models.
Companies that achieve the above will be quick in making the best use AK LET’S LOOK TO THE FUTURE—WHERE DO YOU SEE THE
of on-demand computing and manage flexibility of infrastructure costs based FUTURE OF IT INFRA STRUCTURE TRANSFORMATION IN THE
on business cycles. NEXT TWO TO FIVE YEARS, AND WIPRO’S PART IN IT?

AK: WHAT IS YOUR FAVORITE CASE STUDY THAT REALLY


HIGHLIGHTS WHAT WIPRO CAN DO IN THIS SPHERE?
DJ: Wipro is very actively promoting a concept called “21st Century
Virtual Corporation”. Essentially it means organizations globally should have:

DJ: We have multiple case studies to talk about, and there are three
important ones in particular.


A detailed look at core and non-core processes
Lean process optimization to drive sustainable productivity improvement
We are currently engaged with a customer in the energy and utility space • Optimization of technology to enable innovation
to transform their retail business, and one of the key KPI’s is to bring down • Extended execution leveraging “partners” versus contractors in a whole
their cost to serve by 10% per subscriber. new way.
Secondly, we’re working with a client in the retail space to help manage
their IT cost as a function per square foot of retail space. By virtue of three decades of experience in IT services and solutions, Wipro
And thirdly, we manage IT cost as a function on the number of is increasingly being chosen as a partner of choice by customers for IT
subscribers for a client in the telecom space. transformation.
All of the above are large deals, not in the context of technology Customers are increasingly looking to achieve business and IT
transformation alone, but more importantly in terms of business alignment, more meaningful reporting, better coordination between various
transformation. We believe that IT costs as a function of customer revenues departments, a reduction of the overheads associated with managing
is important, but linking it to business parameters like the ones above ensures multiple vendors, and so on.

47
EXECUTIVE PANEL ■ SECURITY INFORMATION AND EVENT MANAGEMENT

Actionable
Intelligence

http://www.GlobalETM.com

50
SECURITY INFORMATION AND EVENT MANAGEMENT ■ EXECUTIVE PANEL

DR. ANTON A. CHUVAKIN talks about the usability and integration of


security information and event management and touches on log management
with the added benefit of three industry experts; MICHAEL
LELAND
(NITROSECURITY), A.N. ANANTH (PRISM MICROSYSTEMS)
and DEBBIE UMBACH (RSA, THE SECURITY DIVISION OF
EMC).

AC: WHAT ARE YOUR CRITICAL Setting expectations and getting executive
SUCCESS TIPS FOR USERS? HOW DO sponsorship and support is very key. The
YOU INCREASE THE CHANCE OF SIEM customers that we’ve seen have the most success
DEPLOYMENT BEING SUCCESSFUL with implementations. It starts from the top,
EARLY ON AND THEN GET TO assigning resources and making sure that folks
ONGOING OPERATIONAL SUCCESS? are on board.

ML:
There are some process changes that go
The most important thing is to along with it—the technology is not going to
manage expectations and align the necessary work like magic. It’s a tool and it needs to be
resources. Ensure that you have agreement adopted by individuals and users.
from every department that expects to benefit I would also suggest you start with simple
from a SIEM, and make sure the technical use cases based on policies you’ve already
resources they can apply to the planning and defined and for which you may or may not
implementation phases, as well as what metrics already have processes in place, but at least
they’re going to use, measure the success. you’re starting small and you can get them
When working with larger organizations in place. That helps you to validate and gain
and enterprises with de-centralized networking, confidence in the system.
it’s likely that a SIEM vendor was probably One example would be server monitoring.
selected having gone through a proof of concept You want to try to identify whether someone
deployment. The learning from these test runs is compromising a server and knowing this
can be critical to planning and successfully information can prevent insider abuse before
implementing production SIEM’s. significant damage is done. So getting server
Identify where the obstacles throughout the user monitoring processes in place is an early
organization might be as well as the individuals use case to start with.
who support the effort and can help champion Another common use case is firewall
the cause, trying to find some way that each area monitoring to meet compliance needs as well
of the enterprise will benefit from the tool. as to make sure that you can identify activity
Also, don’t assume that a SIEM that patterns for forensics purposes, for example.
performs well in its concept with just two The next thing would be to really iterate over
weeks’ worth of production data will perform these use cases.
equally as well with 12 months. If you can’t So you start with the simple use cases and
generate in the kind of volume your SIEM then plan for the next phase of use cases which
will be faced with in the real world, make sure maybe a little bit more advanced. This way
the vendor can supply sample data or provide you’re taking baby steps as you go, validating,
access to a host with commensurate volumes of making accomplishments, and then preparing
information to demonstrate what you’ll be faced yourself for future success.

AA:
with a year down the road.

DU: You should think of it as a classic IT


I agree with you in terms of the project. Plan, install, tune and train. When I say
POC and production environments. A lot of plan, it’s about involving the stakeholders who
folks don’t anticipate what their volume will be might use this and then, better yet, the vendor
and assume that it’s going to be able to scale. that you’ve selected, because quite often they can
Vendors can provide tools to inject that data have useful advice for you. Think about volume,
and there are other options to help you do that. usage, what you’re going to audit and so on.

51
HEAD TO HEAD ■ BUSINESS PROCESS-DRIVEN ALM

Create your own


app factory
ETM’S ALI KLAVER chats to EDDY PAUWELS
(SERENA SOFTWARE) about business process-driven
application lifecycle management and how they link to each other, as
well as how businesses can benefit from such a strategy.

http://www.GlobalETM.com
62
BUSINESS PROCESS-DRIVEN ALM ■ HEAD TO HEAD

AK: EDDY, CAN YOU GIVE US A QUICK INTRODUCTION OF differentiate themselves and set
YOURSELF AND SERENA SOFTWARE? themselves apart.

EP:
Understanding the business
I am based out of Belgium and head up the Product Marketing process is vital to being successful.
Department for ALM within Serena and have been with the company for Another vital aspect is the timing,
about five years. I have a Masters in Computer Science from the University because the window that you
of Brussels and I have been working in ALM for over 20 years now. have in order to create something
During those years I have witnessed the evolution in methods as well as new that is leading edge is very
in tooling to support the development process and have seen applications small in today’s economy because
morph from a monolithical source file to currently thousands of tiny little everything is moving so fast.
files that need to be combined. So whenever possible, you
I have also seen development teams being spread more and more should aim to try to configure apps
globally. I have seen the internet changing the capabilities we have in the or assemble them together so that
marketplace, and also the number of platforms and operating systems that you can create new processes and
have been introduced over the years. automate them. You have to be
As a result, the complexity to build applications with confidence has able to do this with a limited set of
only become harder to do and this is actually one of the main reasons that resources because IT is very constrained with resources.
brought me to Serena. We have a mission to help enterprises develop and In the early days the only way to create a new application was by
deliver applications with confidence, given the increase in complexity and coding or engineering and it took sometimes months or years to do it.
pressure from the business. Now we have learned over time what we can deliver some of them by
So who is Serena? Serena is an enterprise skill company with over 29 configuring and assembling them together.
offices worldwide. We have over 700 employees of which more than 300 are Configuring apps are especially suited for automating business
in engineering which is significant for a company in IT. We produce over processes that are evolving rapidly because business itself can evolve very
$200 million in revenue each year. rapidly, so sometimes you even need overnight agility to respond to those
We have a size that enterprises feel comfortable working with and that requirements and this is where configuring apps is the way to go.
sets us apart from the smaller players, but on the other hand we also have a Sometimes, if you don’t have the building blocks or it’s too complex,
very dedicated focus on ALM and app factories which set us apart from the you need to use the limited IT resources, but in order to be successful
mega-vendors because they can’t bring that to the party. they need to have a very close alignment and understanding of the
Serena is owned by Silver Lake which is the world-leading technology business and the processes itself.
investor. As a company we think that, as in a modern supply chain driven So the way I look at business process-driven ALM means putting the
factory where you can order highly customized products and get them business processes and constraints at the forefront of the development
into a predictable period of time, plus get them in high quality and at process so that you can create those killer apps. Ideally you could do that
competitive cost, it should be the same when you’re creating applications. by configuring, assembling or by coding them, but always put the business
They should come in the same predictable way so that you can develop process upfront.
them similar to those supply chains within factories. This is what we call
“create your own app factory”. AK: WHAT DO YOU MEAN WITH CONFIGURING APPS? I HEARD
At Serena we have developed a solution set to deliver and create your YOU TALK ABOUT PROCESS AUTOMATION, SO HOW DOES
own app factory yourself. The purpose of a factory, if you look at the factory THAT LINK TO BPM AS WE KNOW IT TODAY?

EP:
itself, is to produce goods that are in demand in the market so that they can
be sold and profit can be made. I have been asked that a couple of times, and I think that business
Similarly, you want apps that can be used within a business because the process management and automation has indeed some alignment with what
business demands it, and they can add value to the business process. This is I call configuring of apps. But the problem lies more in the details.
why I love to speak about business process-driven ALM. When you’re looking at the traditional BPM tools they are extremely
labour intensive. I heard some of our customers talking about creating
AK: WHAT DO YOU MEAN BY BUSINESS PROCESS-DRIVEN ALM? those applications in months. What we do with Serena technology is

EP:
provide an ecosystem that allows you to create those applications with the
As I mentioned before, more and more apps are getting at more technical savvy business people so that you can collaborate with IT,
the core of the business process. In today’s world, apps are critical to but not necessarily consuming all the IT resources for doing it.
create competitive advantage regardless of industry. I see it in all business This way you’re not only reducing the amount of IT resources that you
areas—banking, automotive, air space and defence. need, but you’re also doing it in a tenth of the time and cost in comparison
Organizations want to have killer apps—those that bring in to the traditional BPM tools in the market. This gives us a unique position
revenue more effectively than the competition and that remove cost in the space.
more effectively than the competition. They can provide necessary We do that by providing a tool that is extremely flexible and simple,
transparency more effectively than the competition, and better service to it is highly graphical as well so that you can configure those modules
customers more effectively than the competition as well. in a graphical way with limited or no coding at all which gives you the
This is what killer apps are, and if you can’t deliver them on time possibility to come to market extremely quickly. We’re giving you almost
then your competitor or successor will. This is what organizations overnight agility in order to be able to respond to the changes that you
are trying to look for—applications within that business that can might have in your business environment. 

63
ANALYST FEATURE ■ CLOUD COMPUTING

The pros and cons


of cloud
LAURA DIDIO
(ITIC)talks about the
partnerships, and divisions,
between the two sets of players
in the current virtual desktop
infrastructure market—Citrix/
Microsoft and VMware/EMC.

E
very year or so the high
technology industry gets a new
What are the organization’s top IT spending priorities
buzzword or experiences a for 2010 (select all that apply*)?
paradigm shift which is hyped as Disaster recovery 47%
Upgrade server hardware 45%
“the next big thing”.
Deploy new apps to support the business 44%
For the last 12 months or so, cloud Server virtualization software 41%
computing has had that distinction. Anyone Replace older versions of server OS 37%
reading all the vendor-generated cloud Security 36%
Upgrade desktop OS 36%
computing press releases and associated
Upgrade desktop hardware 35%
news articles and blogs would conclude that Storage 31%
corporations are building and deploying both Upgrade legacy server-based apps/DBs 30%
private and public clouds in record breaking Improve revenue and profitability 27%
numbers. Increase bandwidth 24%
Skills training for existing IT staffers 17%
The reality is much more sobering. While Desktop virtualization (VDI) 15%
there is a great deal of interest in the cloud Upgrade the WAN infrastructure 13%
infrastructure model, the majority of midsized Add remote access and mobility 11%
and enterprise organizations are not rushing to Application virtualization 11%
Green datacenter initiatives 10%
deploy private or public clouds in 2010.
Add IT staff 9%
An ITIC independent web-based Build a private cloud infrastructure 6%
survey that polled IT managers and C-level Implement a public cloud infrastructure 2% *Total may exceed 100%
professionals at 700 organizations worldwide Copyright © 2009 ITIC All Right Reserved
in January 2010, found that spending on cloud
adoption was not a priority for the majority of Despite the many articles written about Organizations can choose to deploy a
survey participants during calendar 2010 (see public and private cloud infrastructures private cloud infrastructure where they host
Figure 1). over the past 18 months, many businesses their services on-premise from behind the
However, that is not to say that remain confused about cloud pecifics such as safety of the corporate firewall. The advantage
organizations—especially mid-sized and characteristics, costs, operational requirements, here is that the IT department always knows
large enterprises—are not considering cloud integration and interoperability with their what’s going on with all aspects of the corporate
implementations. ITIC research indicates existing environment or how to even get started. data from bandwidth and CPU utilization to
that many businesses are more focused all-important security issues.
on performing much needed upgrades to DE-MYSTIFYING THE CLOUD Alternatively, organizations can opt for
such essentials as disaster recovery, desktop What is cloud computing? Definitions vary. The a public cloud deployment in which a third
and server hardware, operating systems, simplest and most straightforward definition party like Amazon Web Services (a division of
applications, bandwidth and storage before is that a cloud is a grid or utility style pay-as- Amazon.com) hosts the services at a remote
turning their attention to new technologies like you-go computing model that uses the web to location. This latter scenario saves businesses
cloud computing. deliver applications and services in real-time. money and manpower hours by utilizing the

68
CLOUD COMPUTING ■ ANALYST FEATURE

host provider’s equipment and management. All to the customer. Examples of this are PUBLIC CLOUDS—ADVANTAGES AND
that’s needed is a web browser and a high-speed Salesforce.com, which has one of the most DISADVANTAGES
internet connection to connect to the host to popular, widely deployed, and the earliest The biggest allure of a public cloud
access applications, services and data. cloud-based CRM application; and Google infrastructure over traditional premises-based
However, the public cloud infrastructure Apps, which is experiencing solid growth. network infrastructures is the ability to offload
is also a shared model in which corporate Google Apps comes in three editions— the tedious and time consuming management
customers share bandwidth and space on the Standard, Education and Premier (the first chores to a third party. This in turn can help
host’s servers. two are free). It provides consumers and businesses:
Organizations that are extremely concerned corporations with customizable versions of
about security and privacy issues, and those that the company’s applications like Google Mail, • Shave precious capital expenditure
desire more control over their data, can opt for a Google Docs and Calendar. monies because they avoid the expensive
private cloud infrastructure in which the hosted • Platform as a Service (PaaS) offerings; investment in new equipment including
services are delivered to the corporation’s examples of this include the above- hardware, software and applications as well
end users from behind the safe confines of an mentioned Amazon Web Services and as the attendant configuration planning and
internal corporate firewall. Microsoft’s nascent Windows Azure provisioning that accompanies any new
However, a private cloud is more than just Platform. The Microsoft Azure cloud technology rollout.
a hosted services model that exists behind platform offering contains all the elements • Accelerated deployment timetable. Having
the confines of a firewall. Any discussion of of a traditional application stack from the an experienced third party cloud services
private and/or public cloud infrastructure operating system up to the applications and provider do all the work also accelerates the
must also include virtualization. While the development framework. It includes deployment timetable and most likely means
most virtualized desktop, server, storage and the Windows Azure Platform AppFabric less time spent on trial and error.
network environments are not yet part of a (formerly .NET Services for Azure) as well as • Construct a flexible, scalable cloud
cloud infrastructure, just about every private the SQL Azure Database service. Customers infrastructure that is tailored to their
and public cloud will feature a virtualized that build applications for Azure will host business needs. A company that has
environment. it in the cloud. However, it is not a multi- performed its due diligence and is working
Organizations contemplating a private tenant architecture meant to host your entire with an experienced cloud provider can
cloud also need to ensure that they feature very infrastructure. With Azure, businesses will architect a cloud infrastructure that will scale
high (near fault tolerant) availability with at rent resources that will reside in Microsoft up or down according to the organization’s
least “five nines” (99.999%) uptime or better. datacenters. The costs are based on a per business and technical needs and budget.
The private cloud should also be able to usage model. This gives customers the
scale dynamically to accommodate the needs flexibility to rent fewer or more resources The potential downside of a public cloud is
and demands of the users. And unlike most depending on their business needs. that the business is essentially renting common
existing, traditional datacenters, the private • Infrastructure as a Service (IaaS) is space with other customers. As such, depending
cloud model should also incorporate a high exactly what its name implies: the entire on the resources of the particular cloud model,
degree of user-based resource provisioning. infrastructure becomes a multi-tiered hosted there exists the potential for performance,
Ideally, the IT department should also be cloud model and delivery mechanism. Both latency and security issues as well as acceptable
able to track resource usage in the private cloud public and private clouds should be flexible response, and service and support from the
by user, department or groups of users working and agile. The resources should be available cloud provider.
on specific projects for chargeback purposes. on demand and should be able to scale up or Risk is another potential pitfall associated
Private clouds will also make extensive use scale back as business needs dictate. with outsourcing any of your firm’s resources
of business intelligence and business process and services to a third party. To mitigate
automation to guarantee that resources are CLOUD COMPUTING—PROS AND risk and lower it to an acceptable level, it’s
available to the users on demand. CONS essential that organizations choose a reputable,
Given the Spartan economic conditions Cloud computing like any emerging experienced third party cloud services provider
of the last two years, all but the most cash-rich new technology has both advantages very carefully.
organizations (and there are very few of those) and disadvantages. Before beginning Ask for customer references and check their
will almost certainly have to upgrade their any infrastructure upgrade or migration, financial viability. Don’t sign up with a service
network infrastructure in advance of migrating organizations are well advised to first perform a provider whose finances are tenuous and who
to a private cloud environment. thorough inventory and review of their existing might not be in business two or three years
Organizations considering outsourcing any legacy infrastructure and make the necessary from now.
of their datacenter needs to a public cloud will upgrades, revisions and modifications. The cloud services provider must work
also have to perform due diligence to determine Next, the organization should determine closely and transparently with the corporation
the bona fides of their potential cloud service its business goals for the next three to five to build a cloud infrastructure that best suits
providers. There are three basic types of cloud years to determine when, if, and what type the business’ budget, technology and business
computing although the first two are the most of cloud infrastructure to adopt. It should goals.
prevalent. They are: also construct an operational and capital To ensure that the expectations of both
expenditure budget and a timeframe that parties are met, organizations should create a
• Software as a Service (SaaS) which uses includes research, planning, testing, evaluation checklist of items and issues that are of crucial
the web to deliver software applications and final rollout. importance to their business and incorporate

69
EXECUTIVE PANEL ■ IT OUTSOURCING

A marriage of sorts

MIKE ATWOOD (HORSES FOR SOURCES) moderates


a panel discussion on IT outsourcing touching on transformation,
CHUCK
the cloud and some fantastic case studies with the help of
VERMILLION (ONENECK IT SERVICES) and KARINE
BRUNET (STERIA).
http://www.GlobalETM.com

72
IT OUTSOURCING ■ EXECUTIVE PANELL

MA: AS YOU EXPAND YOUR BUSINESS, We also provide organizational consulting to the application level that includes not only the
WHAT IS YOUR IDEAL CLIENT AND assess the maturity of the organization and their enterprise or ERP application management, but
WHAT LETS YOU RECOGNIZE THAT? processes, and advise on that. also functional consulting on top of that.

KB:
Our support centre is one where someone
A typical client is one that wants to MA: CHUCK, WHAT IS YOUR IDEAL can not only call in if they’re having a technical
experience a big transformation in the coming SCENARIO? issue, but they can also call our support centre if

CV:
months or years. It can be transformation of its they’re having functional issues, such as getting
IT or its entire organization, perhaps through For us it starts with pain—we don’t a batch release in the ERP system, or how to
mergers and acquisition. I think this is where an like that our customers are in pain—but we like better use the manufacturing functionality to
outsourcer can bring the best value. to talk to companies that are experiencing pain accomplish a particular task.
Looking especially at the profile of Steria, because, generally speaking, they’re trying to Also, with regards to the EDI or electronic
we work very closely with our clients to assist avoid the experience of managing their own IT data interchange, we will host and manage
them in their transformation. So for us, a very systems and have just had enough. They want customers’ EDI translators. We’ll establish the
good client is one with a transformation agenda. someone else to do it for them. trading relationships with the trading partners,
Or, they recognize the pain when they’re test those transaction sets, and then ensure that
MA: AND IN TERMS OF IT RESOURCES, implementing a new system and have decided they go forward in production.
IS WHAT YOU’RE PROVIDING HOSTING, they’re not up to the task of effectively When there are errors flagged by the
AND HOW DOES THAT HELP WITH A managing that new environment. translator, we’ll research the nature of the issue
TRANSFORMATION? The second thing we look for is a and then forward that information back to

KB:
complicated environment. I think we really someone in the company to help fi x whatever
I think we’re providing not differentiate ourselves when we find that it’s data issue is causing the problem. It’s almost
resources but services, and that’s what we mean not just a single application our customers business process outsourcing in some of these
by outsourcing. are looking to host or outsource, but rather, cases.
Steria is a mid-sized player in the market they’re looking to outsource a multiple set We also do outsourcing of desktop
and it’s one of the top ten players in the of applications on several different types of administration. In some cases it’s done with on
European market. One of our differentiators is infrastructure. site desktop resources, and in others it’s done
the fact that we have very good proximity and This is where we’re best able to differentiate with the desktop resources in our location in a
flexibility with our clients. our capabilities. depot fashion. We have a very broad capability.
Prior to migrating a client, one of our
key capabilities is to be flexible enough in the MA: AND DO YOU PROVIDE ANY SORT MA: AND WHEN YOU DO THE
transformation phase to adapt our service OF TRANSFORMATIONAL SERVICES? OUTSOURCING, WHAT ASSETS DO

CV:
solution to whatever the client challenges are. YOU OWN AND WHAT ASSETS DO
Another demonstration of that flexibility may IT outsourcing generally creates YOU ADVISE THE CLIENT THAT THEY
lie in that one part of our service incorporates transformation within a company because OUGHT TO KEEP OWNERSHIP OF?

CV:
an offshore alternative, but we may still need you’re significantly changing the way they view
people on site for certain services because the and access their IT services. With regards to We’re pretty flexible with regards
client is not mature enough to have everything calling it transformational services—no, we to asset ownership. Generally speaking, we
fully outsourced. don’t provide any services described as such. encourage customers to keep the assets they
We are able to accommodate that, and then We know who we are as an outsource started with. We move the assets from their
industrialize the service delivery and the service provider of IT services. We pride ourselves facilities to our facilities and provide the
mechanism to achieve an efficient delivery. on the fact that customers would look at us services.
not as a vendor, but recognize us as one of However, as the relationship starts to
MA: DO YOU PROVIDE ANY TRANS- their employees. mature and the assets come to the end of their
FORMATIONAL CONSULTING SERVICES? useful life, our customers can decide what

KB:
MA: ONE OF THE ISSUES THAT they’re going to do from a new equipment
We provide two types of NORMALLY ARISE WHEN SOMEONE acquisition perspective. Oftentimes they look
transformation consulting services; one in the IS THINKING ABOUT OUTSOURCING to OneNeck’s cloud services as an alternative
technical aspect which is about transforming your IS: WHAT EXACTLY DO I OUTSOURCE? to owning their own assets. However, from a
IT infrastructure—meaning virtualization and WHAT IS THE SCOPE OF THE desktop perspective, they normally continue to
platform as a service or cloud—and one which is OUTSOURCING PROJECT, AND WHAT own their own assets.
much more on the organizational level. AM I GOING TO SEND OUT? CHUCK,
Restructuring the way you operate your WHAT WOULD YOU ADVISE A CLIENT MA: IS THERE SOME SCOPE THAT
IT services can be tricky, but as a mid-sized THAT THEY SHOULD OUTSOURCE? WOULD BE TOO SMALL OR THAT YOU

CV:
player, we see more and more clients deciding WOULDN’T TAKE ON?

CV:
on selective sourcing. This requires that they We can provide a broad array of
organize the governance, processes and how services and do everything for our customers; No, for us it’s all about making
they’re going to manage multiple suppliers, as from as low as the base infrastructure providing sure our customers are satisfied and that we’re
well as the potential to mix with internal teams. the data centre services, all the way through solving a business problem. 

73
ASK THE EXPERT ■ SECURITY INFORMATION AND EVENT MANAGEMENT

SIEM
satisfaction
One of the most ignored benefits of security
information and event management technology
is using SIEM technology to improve overall
IT operations. A. N. ANANTH and
STEVE LAFFERTY (PRISM
MICROSYSTEMS) talk to ETM’S ALI
KLAVER about how improved operations is seldom
given much attention but might well provide the
most tangible cost justification.

AK: ANANTH, COULD YOU GIVE have everywhere is to verify that the accounts directory. You can put that username into your
US A FEW EXAMPLES OF SIEM IN for these departing employees have been list and start looking for any activity from those
OPERATIONAL USE CASES? properly terminated. usernames for the next few weeks.

AA:
There is a use case which is called the This is a failsafe to make absolutely sure
One example that’s clear in these pink slip null which is essentially when HR that there is no further activity. If you’re doing
recessionary times is that people have had tells you that a person has been let go or has Active Directory you’ve probably removed that
turnover in staff, particularly in North America, chosen to resign, which to IT means that their username or disabled them, but they could have
as so-called pink slips. A problem that IT people access and accounts must be removed from the configured a service with their name, as we

84
SECURITY INFORMATION AND EVENT MANAGEMENT ■ ASK THE EXPERT

AA:
found out with one of our customer locations this technology can do a lot for middle
some time back. Yes—after all, the old adage about management.
So it’s a good idea to do this because it’s an ounce of prevention being worth a pound So if you present this information to the
very inexpensive to run and should be coming of cure is right in this sense. The ROI with this end users of the data it would be of much
up empty if you’ve done your job right. It’s a technology in the operations use case is quite greater value to the entire business process. As
fantastic way of assuring yourself that things compelling. the technology is currently used and named
have gone according to plan. We’re well aware that IT budgets (SIEM) it is often limited to one or two tricks,
If you look at the security vulnerabilities, everywhere are under pressure and are however it’s capable of a lot more and of
a lot of it happens because of default accounts shrinking. For example, the typical ratio of offering much greater value.

SL:
that have been dormant for a long time and no system administrator to server which used to
one ever turned them off after the use was over. be 1-25 a year or so ago has jumped up to 1-40. Certainly, the business owner can
So the pink slip null is a really good operational That means one system administrator is now provide context to the data that IT operations
use case. responsible for 40 machines and this is even simply can’t because they don’t understand
Another example is update failure of true after you have virtualized. the usage patterns and the typical things that
antivirus. One of our customers is a government So the pressure on the system administrator people would do in their operation or in their
contractor that chooses to use McAfee, and to manage these machines and uptime is a big organization—so that’s a great point.

AA:
their concern is that the antivirus has not deal for all these organizations. These machines
updated on a nightly basis. There is no fun all have some business function, otherwise they To give you a specific example of
in looking for successes because most of the wouldn’t exist. this; a sales manager focuses entirely on quotes
time that’s what you get, but they look for an To be able to automate this so that and he knows about underperforming sales
update failure and those desktops or servers, for expensive expert admins can focus on the people.
whatever reason, couldn’t update. real issues and those that are going to become For example, say a member of the team isn’t
A very small percentage of machines will issues, as opposed to having to chase your tail doing well and the sales manager is unhappy
have this issue so it’s a small report, but it’s and react all the time, is a compelling one. Ops with him. The fact that that salesman has sensed
also very useful because this is an operational people will generally find that this technology it and has begun copying all of his quotes off
problem. If any of your machines are not can be their friend. They’re the ones who onto a USB would be a major red flag for the
properly updated they could potentially infect suffer all the time having to stay back on long sales manager, but might mean nothing at all
the whole network. weekends for upgrades and being called in the to IT because that salesman is authorized and

SL:
middle of the night. within his rights to do this.
Operations is tasked with keeping The more that you can head that off at the Showing that kind of trend to the data
the infrastructure running. Typically, when pass, as it were, the better SLA you’ll have in owner versus the custodian can make a huge
something goes wrong in the infrastructure, your organization. difference and can be very valuable inside an

SL:
the only way they hear about it is when a enterprise.
user calls and says their service or application There is also a lot of functionality
isn’t running. that SIEM will provide to help with capacity AK: WHY DO YOU THINK OPERATIONS
With SIEM collecting all of the planning and performance of your critical GETS SHORT SHIFT WHEN COMPARED
information from all the systems, applications, systems. TO SECURITY COMPLIANCE?

AA:
users and everything else, it has unique Looking at CPU trends, memory trends
knowledge of things that will going wrong and disk space trends allows you to anticipate I do think that the security guys
before they go wrong. So operations can go long term issues and plan well in advance to thump their chests and get a lot of attention.
in there and proactively prevent things from get more disk space, put more memory in, or Quite frankly, in 2010, security is everyone’s
happening before the user is actually perhaps deploy your critical applications on problem and has loomed large in all of our
impacted. bigger servers. sensibilities.
It can also monitor things, as Ananth Our observation is that security folks will
mentioned before, like process and service AK: SO SIEM ACTUALLY TIES INTO typically leverage the compliance requirements
monitoring and virtual infrastructure THE OVERALL BUSINESS STRATEGY AS in order to get whatever they need and
monitoring. WELL? operations comes third in the sense that, once

AA:
All these infrastructure components that the evaluation is done, operations gets to
are pulling off logs that the SIEM product Traditionally, SIEM has been actually use it. So their use cases aren’t often
is monitoring—collecting, alerting on and something that only a subset of the IT considered on par.
everything else—greatly helps operations in department has tended to use for limited It is also a fault of the analyst community
being able to keep that infrastructure running purposes, for example, security or compliance. that has chosen to position this technology as
well and available to the end users. This is shallow root, meaning the SIEM—this is limiting in and of itself.
technology is capable of doing a lot more The log management space has a number
AK: IT SEEMS THAT SIEM IS ALMOST A within the enterprise, but that potential is not of applications, security being perhaps one of
SAFEGUARD IN ANTICIPATING WHAT realized. the most important, but it’s certainly not the
WILL HAPPEN RATHER THAN DEALING We know that data owners, usually middle only one. If a user chooses to limit their use of
JUST WITH THE CLEANUP, SO THE management, are the people that understand this technology and security, that’s fine, but it
BENEFITS ARE FAIRLY TANGIBLE AND the data best, but IT is the custodian of doesn’t mean the technology itself is limited in
OBVIOUS. the system on which the data resides, and some fashion.

85
HEAD TO HEAD ■ SEARCH TECHNOLOGY

A question of
semantics ETM’S ALI KLAVER talks with DR
KATHY DAHL-
GREN (COGNITION TECHNOLOGIES)
about an innovative approach to meaning-based text processing
technology. Among a discussion on market trends and the bot-
tom line, it’s clear that Cognition is at the forefront of search—
now and into the future.

http://www.GlobalETM.com

AK: CAN YOU GIVE US A BRIEF OVERVIEW OF COGNITION, Almost all search engines use statistics or popularity rankings to bring up
WHAT YOU DO, AND PERHAPS TOUCH ON THE BACKGROUND search results based on your search terms or phrases. Google, for example,
OF THE TEAM YOU WORK WITH? uses a combination of statistical methods and popularity rankings. But the

KD:
problem with statistics or popularity rankings is that you only get the most
Cognition Technologies, based in Culver City, California, is “likely” results for your search. It is just not possible for it to be precise.
made up of a team of PhD’s that have been with me for 20 years. We have Cognition is precise, while at the same time being complete and
developed, with over 450 man years, a search engine that is years ahead of its exhaustive in what it finds. This difference between statistical methods and
time. popularity rankings and what we do is huge. We understand the search terms
While everyone else has been developing statistics-based search, we and phrases.
have been using linguistics to really understand the complexity of language I started at IBM working on this in the 80s, and now with a team of PhD
so that the computer will understand you. It is the next evolution in search computational linguists we have gone against the popular opinion of our
technology. time. I have really invested in the belief that what we call semantic search is
We patented a semantic search architecture, known as CognitionSearch, critical to being able to do effective search.
that employs a unique mix of linguistics and mathematical algorithms. We’ve So to clarify what we do, because it is a bit complicated, we not only
developed a special program that actually understands English to some understand the search terms or phrases, but we also get all the synonyms
extent. And I really stress “understand”. The Cognition team has built the within a context. This issue of context is super important in search. Just think
largest computational semantic map of English in the world today. about any time you say something—it’s not just about the words, it’s also

88
SEARCH TECHNOLOGY ■ HEAD TO HEAD

everything around it. For example, if you want to look up websites on heart This will become the mainstream approach and this is what the
disease, you’re not interested in documents about “the heart of the city” or CognitionSearch tools enable.
“the heart of the matter”.
Cognition understands the context to find only the desired information. AK: TAKE US THROUGH WHAT YOU CAN OFFER YOUR
At the same time, Cognition finds synonyms like “cardiac disorder” and CUSTOMERS. HOW WILL WORKING WITH YOU IMPROVE
more specific concepts like “ischemia” and “fibrillation”. We understand what THINGS SUCH AS APPLICATION PERFORMANCE, USER
you’re looking for so we can get 90% precision and 90% recall linked not only SATISFACTION AND SO ON?

KD:
to the search terms but to the “meaning” of what you’re looking for.
CognitionSearch really helps organizations that need to find very specific Cognition is helping Microsoft Bing bring intelligence to their
information in terabytes of data. We have developed solutions for law firms search function in collaboration with Microsoft division Powerset.
and scientists developing drugs to find very specific information in their Cognition Text Analytics analyze a document base for word, concept,
unstructured data. frequent word sequences and unknown words. Measures of frequency and
For example, if you’re looking in a huge database of scanned articles and salience are reported. These analytics highlight unusual or unexpected
you want to find one relevant piece of information among literally tens of terminology which may be suspicious for a legal case or very useful in a
thousands of documents and emails, it takes half the amount of time with market research case. Also, they provide input to a customization process
Cognition as with other methods. And Cognition finds the smoking gun that where the “company speak” or local slang of the client or customer base can
can be missed altogether because of variations in wording. be added to the Cognition semantic map.
We deliver savings of 50% for our customers just by eliminating the sheer Cognition More-Like-This interprets the meaning of documents and
man hours that are needed to go through all that unstructured data. can find those with similar content. The basis document can either be a
I also want to stress how easy we are to integrate into your technology document in a Cognition index or any document identified by URL. Unlike
stack—we’re certainly not a headache at all. We work on Windows and Unix other document-similarity systems, Cognition More-Like-This is based on
and are a plug and play kind of technology. CognitionSearch easily fits on top conceptual similarity rather than string similarity.
of any unstructured data environment. Auto-categorization is where Cognition reads and understands
documents, and places them in categories provided by the client. Auto-
AK: WHY ARE YOU FOCUSING ON THE SEMANTIC WEB NOW? categorization compares the salient concepts with given category meanings
WHAT HAS CAUSED THE RISE IN SEMANTIC SEARCH? and ranks the match. Various statistical methods are deployed for the

KD:
comparison along with the Cognition ontology.
There’s a lot of buzz relating to upcoming “Web 3.0” and the Cognition Document Foldering enables the user to automatically place
semantic web. Over the last 15 years, finding simple terms through popular documents in pre-chosen topic areas, for example, for a legal case. Foldering
queries has been the norm. queries are often complex concept Booleans that express the content of the
Even though in total count 80% of today’s queries are popular, in terms topic areas, and the results are segregated into the appropriate folders. Each
of distinct queries, 80% of them are unique. This “long tail” presents a part of the Boolean is interpreted linguistically with semantic concepts.
daily problem, especially for the professional searcher with something very The semantic search engine, CognitionSearch, is available for use in,
particular in mind. for example, Wikipedia.cognition.com and medline.cognition.com. Users
Attempting more specific or complex queries has made all of us aware experience finding all and only the desired information and don’t waste time
of the drawbacks of today’s search technologies. More and more, people browsing irrelevant documents. Cognition finds the particular content you‘re
want to think of the web as a giant database from which they can get looking for.
answers to their questions. The Cognition Ad Matcher interprets the meaning of queries, documents
To sort through all this information requires context, disambiguation of and phrases and ad copy. Using meaning as the medium, this ad placement
the queries and the use of more natural or conversational language. Simply technology maximizes the number of ad phrases matched and minimizes the
said, when a computer understands meaning it can do intelligent search, poor matches.
reasoning and combining. This demands the kind of semantic capabilities
that Cognition has now. AK: HOW DOES COGNITION DIFFER TO OTHER SOLUTION
One of the interpretations of the term “semantic web” has involved PROVIDERS IN THE MARKET AT THE MOMENT?

KD:
hand coding of documents with semantic tags and relationships among
them. Semantic tagging has had a following but ultimately it won’t be Other solutions in the space use pattern-matching or statistical
practical. methods to compute relevance, guess meaning and match documents and
As content continues to grow at an exponential pace, who is going to query. Such methods make many errors, typically performing with 20%
do all the tagging and how do all the definitions stay synchronized? For precision and recall.
others, the semantic web means automatically interpreting the documents Statistical methods are popular as they have the promise of relatively
for meaning and automatically inferring relationships among them. low development cost while yielding improvements that are hoped to be

“Many companies need highly precise and thorough search


capabilities of their unstructured data—we can deliver
that and we are the only ones who can!”
89
HANALYST FEATURE ■ SERVICE LEVEL MANAGEMENT

Seven Reasons
PAUL BURNS (NEOVISE) shares with ETM
why every CIO must embrace Service Level Management as a
way to transform the IT organization.

S
ervice Level Management (SLM) components rather than the more abstract always a large number of projects and processes
is not the hottest hot topic in IT. notion of IT services. Others have implemented competing for the attention of IT, and not all of
In fact, it is not even a new topic. ad hoc processes which address—at least them can be managed to peak levels of benefit.
SLM has been in use for many superficially—a couple of aspects of SLM such So why should an investment in SLM receive
years, improving IT service quality, as service level monitoring or reporting. priority over other initiatives?
performance and availability. It has also been This is not to suggest that ad hoc While seven specific reasons will be offered
used to increase customer focus and grow the implementations are not worthwhile or that here, it is also helpful to look at two conceptual
maturity of the IT organization. “to do SLM properly” requires strict adherence benefits of “SLM done right”. First, SLM can
Still, many CIOs have yet to implement to every possible element of SLM. The idea is be foundational. Rather than being treated as
SLM to any significant degree. Some remain that SLM must be firmly embraced in order to an independent process, SLM should provide
focused on infrastructure and technology achieve the most benefit. Of course, there are support to other critical IT processes.

SLM should not just be about monitoring and differently—it helps IT take more of a leading news to any CIO today, the idea of managing
reporting on service levels, it should also be role within that world. services rather than technology has not yet fully
about ensuring the right resources are applied to With the conceptual benefits of SLM in permeated all IT organizations.
the right services in order to optimally support mind, as well as some SLM philosophy, every The concept of a service is supposed to
user needs. CIO should be ready to learn why they must provide a level of abstraction above the IT
To do this, the SLM process needs to embrace SLM. If your IT organization is already infrastructure and even many applications.
link with other IT processes from financial using SLM heavily, the following seven points This way, IT consumers are not bothered with
management and service definition to supplier should still provide some fresh thoughts on the details such as servers, operating systems,
management and continuous improvement. what you could be getting from your SLM VLANs or SANs.
The second conceptual benefit of SLM is process. If SLM is still an ad hoc process However, this abstraction is not just for the
that it can be transformational. SLM should or only used on a limited basis within your IT consumer—it must also be used by the IT
be used to drive a greater understanding of organization, these seven points may help you organization. Only by adding the end-to-end
customer needs and their relative business identify some important gaps. service perspective can the IT organization
priorities. This clarity should result in far better Finally, if you are still just considering SLM, operate in a way that both allows them to
alignment between the IT organization and the it is hoped that these seven reasons will provide drill in to deep technical issues, and maintain
business it serves. that last bit of evidence or motivation required an appropriate interface for the consumer.
The actions of IT should then begin to to move your SLM project forward. Adopting SLM helps ensure the IT organization
provide more direct value through consumable has an appropriate level of service-orientation.
services rather than indirect value through the REASON ONE: SLM IS FOCUSED ON
technology infrastructure that supports those SERVICES REASON TWO: SLM ENABLES QUALITY
services. Let’s face it; most IT consumers only care about Quality is an interesting and involved topic
SLM as a transformational process not the services they receive and not at all about the of its own. For example, depending on the
only helps the IT organization see the world underlying technology. While that shouldn’t be particular situation, there can be several

92
SERVICE LEVEL MANAGEMENT ■ ANALYST FEATURE

competing dimensions of quality. Do users REASON FIVE: SLM SETS SLM helps ensure that budget discussions
view quality as higher when trouble tickets are EXPECTATIONS are based on facts and tradeoffs, rather than
resolved quickly or when they don’t have to SLAs need to be visible. Users should be able dreams and politics.
be re-opened again for a slightly different use to see at a glance the committed service levels
case? Users may be willing to trade off one for for a given service. Otherwise they are far more REASON SEVEN: SLM IMPROVES IT
the other to some degree, and IT organizations likely to arrive at a set of expectations that has MANAGEMENT
often find themselves trading off quality nothing to do with what the IT team intends The level of complexity in IT is growing every
dimensions such as speed and reliability. to deliver. day. IT managers, from supervisors to the CIO,
There can also be economic or cost When a user knows that a particular must rely on technical specialists, third parties
differences when trading off dimensions of application is not typically available on the and others more than ever to design, deploy and
quality. It turns out that the process of creating weekend, frustrations can be greatly reduced operate IT systems.
a service level agreement (SLA) can go a long even if the user still wants the application SLM helps management transfer
way toward arriving at the proper quality mix available every day. responsibility to others by clarifying service
for IT services. SLM is just what is needed Of course, setting expectations should not attributes and required service levels. For
to drive this process with inputs from users, simply mean keeping expectations low. Some different departments within the same IT
business leadership and the IT organization. service levels may be improving over time and organization, operating level agreements
that represents some positive publicity which (OLAs) may be used to formalize expectations
REASON THREE: SLM ENABLES should not be lost. around technical services in support of SLAs.
PRIORITIES Further, IT should indeed be “on the hook” For third parties, SLAs and underpinning
As a CIO, you don’t just want things done for delivering to the challenging service levels to contracts help transfer responsibility for how
right; you also want the right things done. As which they have committed. The business that things get done while maintaining management
discussed, the notion of quality helps get things IT supports has commitments to its customers control over the outcomes and related service
done right. However, it is the separate notion and owners and must know it can rely on IT to levels.
of prioritization that helps the right things meets its needs. This indirect approach to management
get done. So what is the best approach to take allows IT to scale without creating a loss of
for prioritizing capital investments, hiring, REASON SIX: SLM FACILITATES control. Every CIO that makes use of critical
improvement projects, or anything else within NEGOTIATION third party services—whether through desktop
IT that has inherent tradeoffs? Since IT organizations do not have the luxury support services, software as a service (SaaS),
There are many approaches that can help, of an “all you can spend” budget, they must or others—must have a proven SLM process in
and perhaps no single approach will work in all demonstrate the value they deliver through place.
cases. Yet there is a lot to be said for leveraging services. However, the related budget process SLM is neither the newest nor the hottest
the priorities that are established for various IT is not as simple as it may sound. The business topic in the IT industry today; however it
services as part of the SLM process. Through will always want and need more service than it does provide a solid foundation for IT. SLM
SLM, the IT organization should build an is receiving, and the IT organization will always is not a process that stands alone or simply a
under- standing of which services provide the want and need more budget than it software package that can be purchased and
most value. The needs of those services should is granted. installed. It is a philosophy that touches on
be addressed before the needs of lower priority So once again, the SLM process is involved many other IT processes and provides the
services. with tradeoffs—in this case in the role of most value when woven in to the broader IT
negotiator. The list of services and associated management fabric.
REASON FOUR: SLM IS PROACTIVE service levels can become central to the budget SLM also provides a way for the IT
One easy recipe for creating an under- discussion. For example; “This is the value we organization to transform itself. Rather than
performing IT organization is to be reactive— are delivering today, under the current budget. focusing on technical infrastructure, SLM
there are so many ways for IT to become Alternatively, with the incremental budget allows IT to address end-to-end services in
reactive. proposal, we can improve the performance and support of user and business needs. If you are a
How many dashboards and reports and reliability of the CRM system.” CIO, you now have at least seven good reasons
statistics are available to analyze? While this to embrace SLM.
type of information is critical, the risk is that
IT may begin to drive too many decisions from
lists of issues, problems and challenges. What
Paul Burns |
is needed instead is for IT to be proactive. That
PRESIDENT AND FOUNDER, NEOVISE
means deciding on desired outcomes up-front, Neovise is an IT industry analyst firm that uniquely adds business
and then making them happen. perspective to technology. Paul has nearly 25 years experience in the
Reviewing a report that says email is down software industry, driving strategy for enterprise software solutions
for one to two hours every month, and then through product management, competitive analysis and business
pulling together a team to resolve it, is reactive. planning. He has held a series of leadership positions in marketing
Having an agreed amount of email availability and R&D, and spent two years as Research Director/Senior Analyst at
documented in an SLA, and having made the another firm immediately prior to founding Neovise.
appropriate investment to ensure it—as well Paul earned both B.S. in Computer Science and M.B.A. degrees
as detect issues early, before they impact the from Colorado State University.
SLA—is proactive.

93
ASK THE EXPERT ■ GOVERNANCE, RISK AND COMPLIANCE

Moving with the


times ETM’S ALI KLAVER talks to PRASHANTH
SHETTY (METRICSTREAM) about
managing enterprise GRC programs in global organizations,
and how to realize the benefits that can stem from successful
implementation.

http://www.GlobalETM.com

94
GOVERNANCE, RISK AND COMPLIANCE ■ ASK THE EXPERT

AK: TELL US ABOUT THE SOLUTIONS YOU OFFER. WHAT YOU I would say some organizations are starting to figure out how to work
CAN DO FOR CUSTOMERS OUT THERE? through this by starting with the basics and keeping their focus on business

PS:
objectives and performance metrics, then using that as a starting point to
MetricStream is the market leader in enterprise-wide governance, move forward.
risk, compliance and quality solutions for global corporations.
MetricStream solutions are used by leading corporations such as AK: WHAT STEPS ARE GLOBAL ORGANIZATIONS TAKING IN
NASDAQ, The United Bank of Switzerland, TVA, Amedisys, Cummins, ORDER TO CONSOLIDATE THEIR GRC PROCESS? CAN YOU TALK
and many other customers in diverse industries including energy, financial ABOUT SOME OF THE PRACTICAL CHALLENGES OF TRYING
services, pharmaceuticals and manufacturing. We manage their risk TO REALIZE THE INTEGRATION OF GRC INITIATIVES IN THESE
processes, internal audit, and regulatory and industry mandated compliance. GLOBAL ORGANIZATIONS?

PS:
In addition, we also own a web property called Compliance Online
which is used by over one million compliance professionals worldwide for The one fact that organizations are beginning to realize is that,
the purpose of gathering compliance intelligence, training and discussion until now, disparate functions of audit, risk management, compliance,
groups. MetricStream has also been ranked as the world leader in enterprise policy governance and so on, are not truly siloed initiatives, rather, they are
GRC and IT GRC solutions by leading independent industry analysts. interconnected with one another. And companies are now looking to exploit
In summary, we are a privately-held profitable company with investments the benefits of this interconnectedness.
from some of the best known names in venture capital including Kleiner So when we talk about consolidation, it can be realized in many different
Perkins Caulfield & Byers, as well as Advanced Equities. ways. One of the common ways is using, for example, a risk-based approach
to audit and compliance. Organizations first begin by identifying the major
AK: LET’S LOOK AT MARKET TRENDS—WHAT ARE THE KEY material risks facing the company and then use that to drive compliance
CHALLENGES THAT ORGANIZATIONS ARE FACING TODAY testing and audit strategies, or both. In fact, MetricStream’s solutions
FROM A GRC PERSPECTIVE? themselves are designed to support exactly this approach of the risk-based

PS:
methodology.
We’ve seen a few different challenges. I would classify them Another approach to consolidation that we’ve seen is addressing the
primarily as organizational, operational and technology challenges. so-called multiple compliance problem by using a standardized set of either
On the organizational side this really has to do with a lack of sufficient business process or IT controls to address, in a rationalized manner, several
buy-in on the importance of GRC from the upper echelons of management. different regulatory and policy requirements.
This either happens because there are other pressing priorities, or some of So again, our platform and our solutions really support this risk-based
them just don’t want to change the status quo. approach as well as this notion of shared or rationalized controls. And this
In fact, I was recently in a meeting with some executives in a leading level of consolidation is starting to enable customers to derive the maximum
pharmaceutical company and one of them said: “We’ve been in business benefit from their solutions.
for over 100 years and we didn’t have to do anything special on the GRC As straightforward as this sounds, consolidation is not always easy and
front—so why change now?” this is because some companies don’t even have a discipline of formal risk
I think this reflects some of the organizational mentality that is management so they don’t know what their major material risks are and how
contributing to the challenge of GRC adoption. As a result, GRC to measure them.
sometimes gets adopted very sporadically or inconsistently, which makes it Another issue is that there are times when the data lies in disparate,
quite ineffective. separate systems and companies have to take on the overhead to do a lot
Secondly, there’s the operational challenge—even when the of this technical data migration to get the integration to work. That is not
organizational buy-in does exist, companies still face the execution always easy.
challenge which is: How do I really operationalize this? Where do I get
started? What sequence do I proceed in? This is the classic case of there AK: I KNOW GRC IS A RELATIVELY NEW TERM, BUT WHAT IS
being too many things on the table and not being sure where to begin. YOUR PERSPECTIVE ON THE EMERGING CONVERGENCE OF
Finally, the challenge on the technology side is that ever since GRC ENTERPRISE GRC AND IT GRC?

PS:
became a mainstream term in the last few years, there have been myriad
technologies that have been positioned as GRC-centric. Several technology At MetricStream, we believe that this current distinction between
solutions like business process modelling or BPM, business intelligence or enterprise GRC and IT GRC is based on a dated understanding of the
BI, and event monitoring—these are just some examples. market, and is fairly quickly bound to change.
Companies are also faced with the decision of which technology This separation was more from a convenience standpoint and was
solution to deploy, and which is more effective than the others. They also artificially divided into two spaces, but honestly, from what we’ve seen, there
have to consider how much technology to deploy versus human judgement. is a good deal of overlap and a natural convergence of EGRC and IT GRC.
After all, functions such as compliance, controls and audits have been We believe that IT GRC, for instance, is not just driven by technical
done manually for a long time—and for good reason—because a lot of objectives alone but by business objectives such as corporate performance
these are based on human judgement. So you really need to strike the right indicators, which in turn are tied to the integrity of IT processes and systems.
balance between technology automation and judgement. These are just And these are exactly the same drivers as enterprise GRC so they do share
some of the challenges that we’ve seen. And in spite of these challenges much in common.

95
EXECUTIVE PANEL ■ BUSINESS PROCESS MANAGEMENT

Business and IT—


side by side

DANA GARDNER (INTERARBOR SOLUTIONS) moderates a


discussion on the productivity benefits and future of business process management with the help

of MARK TABER (ACTIVE ENDPOINTS), ANGEL DIAZ (IBM)


and SAMIR GULATI (APPIAN CORPORATION). This expert panel

examines BPM and explores what it delivers to enterprises in terms of productivity and agility.
100
BUSINESS PROCESS MANAGEMENT ■ EXECUTIVE PANEL

DG: WHAT IS IT FROM YOUR VANTAGE when there is, it catches fire very quickly.
POINT ABOUT BPM THAT IS MAKING Typically, IT comes along for the ride and
IT SO POPULAR NOW? WHAT ARE THE then realizes that it’s an extremely powerful
BUSINESS AND TECHNOLOGY DRIVERS technology and can be applied in a number of
THAT ARE MAKING THIS THE RIGHT different areas, so the business imperative is key.
TIME FOR MANY FOLKS TO BE GETTING What is happening now is that business
INTO BPM IN A BIG WAY? is getting more and more educated about the

MT:
benefits BPM drives and all the ideas that can
The big trend that we see is a reduce cost, increase productivity and lead to
power shift from central IT (mega-projects) to things like improved response time or agility.
the line of business. This has huge implications What we’re finding with our customers—
because of the fact that smaller departments because they’re maturing now in terms of
are much more expertise-bound and require the usage of BPM—they’re seeing things like
real-time ROIs. increased quality where you have more process
What is most important to the project consistency and better rigour in terms of the
manager is gaining efficiency while at the same way you’re doing business.
time reducing risk. The ROI must be believable It leads to better executive management
for the current year. Proof is much more visibility of end-to-end processes and improved
rigorous and this is where BPM comes into play. customer service. BPM is finding its way into

AD:
a lot of customer-facing processes and that is
I think all of us who have been in impacting customer retention and service with
the BPM business know that it’s been around improved risk management as a by-product.
for quite some time; everything from the basic So I think business is now appreciating all
assembly line to providing power to the people, the other benefits of using BPM technology that
and allowing business folks to be first class aren’t the traditional benefits of reduced cost
participants in the design and understanding and improved response time.
of what the key business outcomes are, and the In a time where people are now trying to
rapid implementation of those. come out of this recession and introduce some
It’s important when you look at where our new products, it’s critical to have that end-to-
customers are headed in the next year or so. end visibility.
It’s very clear that yesterday’s best in class is no Business is leading this comeback but
longer good enough. The workforce needs to be technology trends are driving adoption. It
more productive and we expect that across the really has to do with increased collaboration.
board—a 26% increase in productivity. If you look at the workforce today, everyone is
Supplier’s lead times, 62% faster in two adopting social media and wants to work more
years; stock to stock, 50% faster in two years. effectively. BPM is the perfect platform to drive
Key organizations need to be 25% more efficient that.
in two years. How are we going to get there? And with the increasing mobile workforce,
By very prescriptive approaches, as Mark was BPM technology can adapt to this new
saying, by focusing on business problems and workforce that is both collaborative and
involving all the stakeholders, business leaders, mobile. This will really drive adoption from a
line of business executives, IT developers and technology perspective.
business analysts.
These people are needed to deliver DG: IT’S INTERESTING THAT WE’VE
imitative, quick solutions to the market that TALKED ABOUT COLLABORATION IN
address those specific customer needs. It is a A SOCIAL CONTEXT AND THE FACT
greater inflection point in both business and THAT THE OLD STATIC APPLICATION
technology. FOR COMMUNICATIONS MIGHT NOT
The confluence of many technology BE THE BEST WAY TO COMMUNICATE
buzz words and acronyms to do with social, ACROSS PROCESS BOUNDARIES AND
textural capabilities, dynamic networks, DOMAINS.
IT conversions—that type of technology FROM YOUR PERSPECTIVE AT
converging with the business needs is bringing ACTIVE ENDPOINTS, MARK, DO THE
us to an exciting point in the industry. BPM AND COLLABORATION TREND

SG:
LINES EITHER MEET OR DIVERGE—
For us, business has always led the WHAT IS THE RELATIONSHIP?

MT:
charge for BPM initiatives. There has to be a
compelling business need to deploy BPM and I am going to take maybe a

101
HEAD TO HEAD ■ MAIL ARCHIVING

Archiving on demand
MARTIN KUPPINGER (KUPPINGER COLE)
talks to Astaro’s ERIC BEGOC about mail archiving,
how it’s changing, and what to expect in the future.

http://www.GlobalETM.com

MK: ERIC, MANY PEOPLE STILL DO NOT KNOW THAT MOST of deleting any email that I was not sure I would ever need it again. But
COUNTRIES ENFORCE STRICT BUSINESS REGULATIONS the real charm of an intelligent archiving solution, in addition to providing
GOVERNING EMAIL ARCHIVING. HOW CAN THIS BE? compliance, is that I may delete any email without any other thought.

EB:
Because every time I delete a message I know it is securely stored in the
Well Martin, the problem is that everybody is in a kind of standby archive and that I will find it again in seconds whenever I need it.
state. If one does not really know what standards should be enforced because
the requirements and the consequences of not being compliant are not clear, MK: SO THERE’S MUCH MORE VALUE THAN JUST FULFILLING
one just waits. COMPLIANCE NEEDS, WHICH I THINK IS VERY IMPORTANT,
Another problem is that most email archiving solutions are far too BECAUSE THERE’S A REAL BUSINESS VALUE IN MAKING
expensive and require much administration. So I guess at the current time, PEOPLE MORE EFFICIENT. SO WHAT SOLUTIONS FOR EMAIL
a lot of companies would rather just wait and hope that being caught doing ARCHIVING ARE OUT THERE, AND HOW DO THEY DIFFER
nothing is cheaper than implementing what should be a business standard. FROM EACH OTHER?

MK: WHY SHOULD EMAILS BE ARCHIVED IN THE BUSINESS


ENVIRONMENT, OR WHY HAVE THEY TO BE ARCHIVED THERE?
EB: There are different kinds. First, there’s the traditional mail
archiving software that just installs on an email server. It may look like a

EB:
cheap and easy way to archive those emails, but you should keep in mind that
First and foremost, and you’ve actually already stated it, these solutions are limited by the hardware and are not very scalable.
archiving emails is the law. So I’d like to point why that is. Email today Another approach out there is the email archiving appliances which take
is seen to be on a par with printed business letters. And no one has ever off the load from the main servers. This is a good thing, but as those vendors
doubted that you have to archive documents that are related to your are traditionally more active in the storage areas, those solutions are complex
contracts which include business communication in written form. It was and expensive. Plus, we will still have those scalability issues at some point.
just a logical consequence to make the archiving of emails obligatory. And let’s not forget that those software and hardware-based solutions
Also, the burden of proof lies directly with you when there is any will both require additional expenditure for maintenance and upgrade, for
arguable text matter at hand. If you can’t prove your position, you will have example. So you need an unlimited capacity and scalability—why not make
to pay a penalty. And still compliance is not the best thing about a good use of a cloud?
email archiving solution.
MK: WHAT ADVANTAGES DO YOU SEE IN ARCHIVING
MK: THAT IS THE SORT OF THE MESSAGE WE HEAR ALL THE SOLUTIONS TO MAKE USE OF THE CLOUD?

EB:
TIME FROM THE INDUSTRY—WHAT ELSE IS THERE?

EB: Well, in the traditional solutions we just saw, you needed to go


That’s right, for example, with productivity. In terms of personal through several steps. You had to contract your IT partner, order the product,
organization, when an employer searches for a specific email he may waste a wait for delivery—and of course wait for your partner to install it which is a
good part of an hour. very lengthy and complex process. On top of that there are all the troubles
Some time ago, I had many folders in my email inbox and I was scared that I mentioned before.

110
MAIL ARCHIVING ■ HEAD TO HEAD

Therefore, we set about creating a solution that solves all those problems,
and we decided to go for a cloud-based solution. Astaro Mail Archiving
makes archiving really easy.
Eric Bégoc|
PRODUCT MANAGER, ASTARO
There’s an automated set-up process providing step-by-step guidance
which will get you up and running 15 minutes from the initial stand up. Eric started with Astaro at the beginning
You won’t spend any time on recurring maintenance tasks such as daily of 2008. He has amounted extensive
monitoring, for example. Also, updates are supplied automatically so you are experience in the email security and
always using the latest software releases. archiving technology areas through his
Other big advantages of course include unlimited storage capacity, so days at the security provider GROUP
scalability and hardware upgrades are no longer an issue—even if you want Technologies.
to archive emails for decades. The Google-like search helps you to find Today, with more than 15 years of
messages in seconds and, together with a seamless Outlook integration, project and product experience in the IT
people work the way in which they are comfortable, so additional training is business, Eric is responsible for the Astaro
not an issue. Mail Archiving product.

MK: SO ARCHIVING BUSINESS EMAILS FROM THE CLOUD—I


THINK A LOT OF PEOPLE WON’T FEEL REALLY COMFORTABLE Another example of what to pay attention to is usability—for your IT
WITH THIS THING ABOUT PRIVACY ISSUES AND COMPLIANCE. administrators as well as your employees. Check if a solution offers quick and
HOW DO YOU SEE THIS TOPIC? easy access to archive email as well as if it contains features that simplify the

EB:
auditing tasks you will require.
Well true, but why is that? It’s because people assume that cloud
providers are not as safe as their service providers next door. And that of MK: SO YOU TALKED ABOUT SEVERAL REASONS FOR MOVING
course is just because the guy next door gives them a feeling of trust, which is TO THE CLOUD, AND BEFORE YOU ALSO TALKED ABOUT THE
based on emotion as much as on facts. PROBLEM OF TRUST IN THE CLOUD AND THE PROBLEM OF
So how can people ensure that their provider won’t breach the privacy TRUSTING THE PROVIDER.
laws or, for example, forward company communication to other parties? It’s ARE THERE ANY SPECIFIC POINTS WE SHOULD LOOK AT
a difficult issue based only on trust. TO ENSURE THAT IT’S NOT ONLY ABOUT TRUST, BUT THAT
The repeated statement: “We need to make the cloud secure”, is WE ALSO HAVE SOME ASSURANCE THAT WE REALLY CAN
something that is true for every solution and every provider without TRUST A SPECIFIC PROVIDER FOR FULFILLING COMPLIANCE
exception. REQUIREMENTS WHEN ARCHIVING MAIL FROM THE CLOUD?

MK: IF I WANTED TO ARCHIVE MY EMAILS IN THE CLOUD


AND WAS LOOKING FOR A SOLUTION, AND IN FACT FOR A
EB: Well, if you’re looking at those providers I think it’s always a good
idea to look at their processes and of course trusting the provider who has a
PROVIDER, WHAT SHOULD I PAY ATTENTION TO? transparency and make available all that information so that you can assure

EB:
yourself about how their processes are in place, how they are living, and trust
There are many cloud solutions out there. When thinking in those solutions.
about selection criteria, the first thing that springs to mind may be Of course, if you look at those providers you will often find that
those compliance and local regulations, but there’s more that should be transparency is really very key to their service.
considered. Whether a solution matches those local regulations can be
found out very quickly. MK: SO PROVIDERS WHO ARE OPEN ABOUT WHAT THEY’RE
One important point is to make sure that a solution comes without DOING ARE MORE TRUSTWORTHY. I PERSONALLY THINK THAT
hidden costs, for example. Storage space which is included in a subscription THE CLOUD IS A VERY INTERESTING PLACE TO DO EMAIL
is often limited in other offerings. If you need more later on, the cost ARCHIVING, AND I ALSO FULLY AGREE WITH IT BEING ABOUT
will rise. WHAT THE REAL BUSINESS VALUE OF IT IS. IT’S NOT ONLY
Also, find out what has happened to archives for email boxes that are COMPLIANCE; IT’S ABOUT HOW YOU CAN RETRIEVE ALL OF
no longer needed—for example when an occasional employee leaves the THIS INFORMATION AND KNOWLEDGE WITHIN EMAILS IN AN
company. If continuing to archive them costs you money, you budget for EFFICIENT WAY.
email archiving.

Martin Kuppinger - MODERATOR|


FOUNDER AND SENIOR PARTNER,
KUPPINGER COLE + PARTNER

Martin established Kuppinger Cole, an independent analyst company, in 2004. As founder and senior partner he
provides thought leadership on topics such as Identity and Access Management, Cloud Computing and IT Service
Management.
Martin is the author of more than 50 IT-related books, as well as being a widely-read columnist and
author of technical articles and reviews in some of the most prestigious IT magazines in Germany, Austria and
Switzerland. He is also a well-known speaker and moderator at seminars and congresses.

111
ANALYST FEATURE ■ SOCIAL TECHNOLOGY

Open
innovation
With the rise and embrace of social networking and software
you could be forgiven for thinking that we’re at the height of
innovation. MATTHEW LEES (PATRICIA
SEYBOLD GROUP) tells us how social technology
can make “innovation” more than just a word.

112
SOCIAL TECHNOLOGY ■ ANALYST FEATURE

“Concentrate!”
shot or lost a point: “You’re not concentrating!”
my high school tennis coach would yell from behind the fence. Repeatedly. Every time I placed a bad

So I’d concentrate harder, or at least try to. But on what? Mostly I’d just say the word “concentrate” in my head, over and over like a special mantra, as if
saying it was the same as performing the act, hoping that would do the trick. I don’t think it did.
In reality, many factors, both physical and mental, were at play: my own (admittedly limited) athletic prowess, the (often superior) skills of my opponent
and our relative levels of determination, in addition to our own abilities to concentrate. It seems a wasteful and distracting thing, then, for my coach to zero in
on my supposed lack of concentration—better perhaps to have provided more specific guidance (such as: “Hit it to his backhand!”).
I am reminded of this these days as the interest in—and hype around—innovation increases. While I’m a strong proponent of business innovation the
word is too often treated as if it has a magical property. “Here’s what we’ll do” an exec will say; “We’ll create a cross-organizational team to innovate. We’ll give
the group a fashionable name, we’ll give them a charter, and we’ll send an email to tell everyone else what they’re doing. Then we’ll let them go and… well…
they’ll innovate.”
When I hear things like this my mind conjures up a picture of my tennis coach in an office cubicle, yelling “innovate!” to everyone who passes by, as if
saying the word itself will make it so.”

A NEW LANDSCAPE Today’s software systems bring an impressive “But social networking provides people
The desire and need for innovation have been array of features and capabilities that provide who don’t know each other very well the
with us as long as human beings have walked not only channels for communication and opportunity to interact around things they’re
the planet. And people have always found collaboration between and among employees, interested in, that they care about, and that they
ways of innovating, utilizing whatever skills, but also workflows and administrative and need to make decisions around. In that way
resources and determination at their disposal. analytic tools that make these systems both it’s an innovation accelerator. People can share
(Many of us today may find it hard to imagine productive and cost effective. ideas regardless of race, age, gender, ethnicity
a world before computers, but as far as I know, or geographical border. And that’s really
the wheel was invented without a dedicated 3—AN OPEN AND COLLABORATIVE profound.”
design team, CAD software or a wiki.) MINDSET And IBM should know, because for many
But desire or need alone isn’t enough to Driven by both the business and consumer years it has run programs to foster innovation
spark new ideas and generate real change. worlds, people are not only more easily able to among its nearly 400,000 employees. Adler
Although innovation is an inherent part of who share their opinions and ideas, they are more goes on to say, “Within the enterprise, it’s the
we are and, therefore, how we do business, we comfortable than ever before in doing so. (In same principle. At IBM, we’re doing business
haven’t always been good at it. With the need fact, they are increasingly expecting to be able in 170-plus countries around the world. We’ve
to stay relevant and ahead of the competition to do so.) been using social technologies for many years.
only increasing, organizations can’t depend We innovated 10 years ago with the World Jam,
on innovation as a result of serendipity or the WHAT SOCIAL TECHNOLOGY BRINGS a crowdsourcing program that empowered
brainpower of a small group. TO THE TABLE innovation through technology.”
Rather, companies need to lay the How do connectivity, software and collaborative
groundwork so that innovation can occur mindsets play out in the business world (and 2—GETTING THE WORD OUT
on a regular, repeatable basis, involving as beyond)? There are five primary considerations: Greg Matthews is a social media director
many minds as possible. That’s the underlying with global communications firm WCG. He
principle of crowdsourcing—in the big picture, 1—SCALE just completed a six-year stint with insurance
if enough ideas and perspectives are shared, You need a crowd to crowdsource. Social giant Humana, most recently as Director of
the end result will be more innovative, more technologies can connect people across the Consumer Innovation. In recognizing the
transformative, and more feasible than anything globe and support innovation efforts between importance of innovation as a core value,
an individual or small team could come up with. dozens, hundreds, thousands or millions of he says: “The big step for us at Humana was
So, while the desire and need for innovation people. forming the Innovation Center, a department
aren’t new, what is new is the landscape that Steve Adler, Director of Information dedicated specifically to foster innovation.
grew out of the internet boom of the past Governance Solutions at IBM, sees all this But it wasn’t supposed to be the only place for
10 to 15 years. In particular, there are three as a game changer. He says: “Social media is innovation. We wanted innovation to be a part
components that make innovation easier and probably one of the most important inventions of our DNA as a company.”
more accessible than ever before. These are: in mankind. It is the first type of technology— Many organizations have taken similar
and there will be others—that allows people routes, creating special groups to spearhead
1—CONNECTIVITY to communicate with content directly, and innovation efforts. However, these groups may
There is currently the ability for people to without knowing each other. or may not look to leverage social technology.
connect with each other (and with information “If you think about other technologies— Humana did, particularly because, as Matthews
of interest and important to them) via fax, email, the World Wide Web—you have to adds: “The greatest ideas in the world are of no
computers and mobile devices 24 hours a day know something about the other people (such use if nobody hears about them. It was always
from just about anywhere in the world. as their fax number or email address) or you harder when you couldn’t communicate easily
are broadcasting to everyone, hoping that some and effectively on what was going on within
2—SOFTWARE APPLICATIONS small portion is interested in what you’re saying. the Innovation Center. So number one for us

113
ASK THE EXPERT ■ ENTERPRISE SEARCH

One at a time
Enterprise search has long been confused with compliance and policies for
archiving. Information governance strategies reset thinking in this area by
establishing clear use cases for accessing information versus those that enable
retention. SIMON TAYLOR (COMMVAULT) takes ETM’S ALI KLAVER
through the different faces of enterprise search.

http://www.GlobalETM.com

116
ENTERPRISE SEARCH ■ ASK THE EXPERT

AK: THE TOPICS OF COMPLIANCE AND query, particularly public organizations asking reporting and therefore have a lot of internal
E-DISCOVERY OR E-DISCLOSURE BOTH for information in an electronic format. needs for searching that start off on a yearly basis.
SPEAK TO EFFECTIVE ENTERPRISE Then we have the idea of the HR But then, of course, the institutions
SEARCH, BUT IT’S A MUCH BROADER department, running an internal investigation that tend to perform search on a regular
SUBJECT. WHAT DO YOU SEE AS and trying to find information in relation to basis typically tend to be more government
THE TYPICAL REQUIREMENTS FOR perhaps a dispute between two employees. organizations, including US Federal, American
ENTERPRISE SEARCH, AND WHAT That obviously causes some form of enterprise state and local, and outside the US, European
TYPE OF DATA IS MORE COMMONLY search. governments where all have some form of FOI
ACCESSED? We’ve already talked about the example in or Data Protection Act requirement, to search

ST:
the legal environment, but then of course there’s and disclose information based on subject
Firstly, let’s break the question down corporate productivity and the idea that maybe access requests made by the public.
into some of the reasons why we hear about at an end user level, individuals need to find Government institutions particularly also
enterprise search and then we can go into use things more quickly and don’t want to spend have the pressure of having to do multiple
cases that probably make more sense. lots of time looking for email, for example. searches for particular requests, with a very
In the context of issues like compliance we Also, in a more general sense, corporates limited amount of time to do them. They can
often hear about search as a means of auditing may be doing something like a corporate social vary between 20 to 40 days, and when you’re
records that in turn have to be kept, which responsibility report that can often take up to getting multiple requests per week it’s quite a lot
is of course the predominate driver around nine months to complete. They’ll often have of effort to fulfil these requirements.
compliance, the forced retention of records and to search local information stores and lots of But there are also very specific industries
so on. different sites and geographies to check for like pharmaceutical and healthcare that have
For e-discovery, or e-disclosure as it’s things like green credentials or social reporting forced retention of medical requirements and
referred to in Europe, it’s very much around considerations in countries, and bring all that compliance legislation, but at the same time
finding evidence and unstructured information together into a report they release with their have to audit activity requests against them and
that needs to follow a particular process or a financial results. So that’s another driver. perform very specific searches for individual
court action. The general exercise of event- There are more specific things like looking medical records.
driven search is actually very similar in both of for data privacy breaches, or use of things In the pharmaceutical industry, they might
these situations in terms of effort, even though like credit card information or social security find themselves in repeated litigation and
the process use cases are slightly different. or national insurance numbers in structured therefore have to perform frequent searches
So when we look across the enterprise, what content that shouldn’t be there, and exposing against defined custodian-based criteria in order
sort of data then is focused around enterprise those as potential risks. to manage legal holds or preservations against
search? Well, it’s really everything today. In the financial world the use cases around expected electronic evidence.
Historically, it’s always been about compliance, including conforming to legislation The telecommunications industry is
perhaps more structured records. Very like Basel III, financial services Acts per country another good example in relation to legislation,
commonly now, particularly in situations and also in the US, SEC 17-a, from the security including the Data Retention Directive
like e-discovery scenarios, we see searches in exchange commission, force the retention of in Europe where they are forced to retain
relation to unstructured content including word local broker-deal related transaction records, electronic records for two years and then, on
documents, office documents, emails, assets but more importantly the audit of those records. request, go and discover records for perhaps
not only on the file system but also records in In this context enterprise search is criminal investigation and all sorts of things.
repositories, including document management specifically about the audit and supervision
systems and covering all types of assets—for requirements. AK: AT ETM WE’VE BEEN HEARING
example, sound bites and images that have been A LOT ABOUT THE MINING OF
stored. AK: SO YOU’RE SAYING THAT UNSTRUCTURED INFORMATION
Medical records including images are a ENTERPRISE SEARCHES ARE A LOT IN CONNECTION WITH SEARCH.
good example of this as they have to be kept for BROADER THAN JUST DELVING HOW DOES THIS DIFFER FROM
HIPAA/healthcare compliance including audit INTO RECORDS. AND SOME TRADITIONAL BUSINESS
search requirements. ORGANIZATIONS OBVIOUSLY HAVE INTELLIGENCE, AND WHAT DO YOU
In general though, types of search do vary MORE REQUIREMENTS THAN OTHERS SEE AS THE MAIN DRIVERS?

ST:
quite a bit and although historically driven TO PERFORM ACTUAL SEARCHES.
in siloed use cases, what we’re seeing now is CAN YOU HIGHLIGHT THE MORE This is actually a very important
a lot more interest in developing enterprise PROMINENT INDUSTRIES AND question because a lot of people get quite
search that covers the broader enterprise. EXPLAIN WHAT THEY NEED AND WHY? confused about business intelligence and how it

ST:
This is all types of data, including structured, relates to unstructured information.
semi-structured and unstructured sources, I think enterprise search does occur Business intelligence started from the
and finding a way of bringing that together in a in some specific industries more than others. premise of bringing together structured data in
single approach. If you look at things like corporate social a particular repository or a data warehouse for a
Good examples of particular use cases that responsibility and more of the internal type of specific reporting need, organized in a particular
fit into modern enterprise search include things enterprise search, you find the retail industry as hierarchy so that you can easily report and mine
like FOI requests or subject access requests, as being a very good example of organizations that into it. This is how business intelligence tools
they’re often called in Europe, where people produce a lot of corporate social responsibility evolved.

117
EVENTS AND FEATURES ■ 2010

Events and features 2010


ETM is focusing on:
BI, Security and Virtualization
ICCCN 2010 INTEROP MUMBAI ENERGY DATA STORAGE 2010
DATES: 2 – 5 August 2010 DATES: 28 – 30 September 2010 DATES: 3 – 4 November 2010
LOCATION: Zurich, Switzerland LOCATION: Mumbai, India LOCATION: London, UK
URL: http://icccn.org/icccn10 URL: www.interop.in/index/htm URL: www.smi-online.co.uk/events/overview.
asp?is=5&ref=3543
TDWI WORLD CONFERENCE GIL 2010: MIDDLE EAST
DATES: 15 – 20 August 2010 DATES: 5 – 6 October 2010 DATA MANAGEMENT AND
LOCATION: San Diego, CA LOCATION: Abu Dhabi, UAE INFORMATION QUALITY CONFERENCE
URL: www.tdwi.org/Education/Conferences/ URL: www.gil-global.com/middleeast + DATA WAREHOUSING AND BUSINESS
index.aspx INTELLIGENCE CONFERENCE EUROPE
RSA CONFERENCE EUROPE 2010
GIL 2010: INDIA DATES: 12 – 14 October 2010 DATES: 3 – 5 November 2010
DATE: 1 September 2010 LOCATION: London, UK LOCATION: London, UK
LOCATION: Bangalore, India URL: www.rsaconference.com/2010/europe/ URL: www.irmuk.co.uk/dm2010
URL: www.gil-global.com/india index.htm
TDWI WORLD CONFERENCE – FALL 2010
GARTNER OUTSOURCING AND VENDOR GARTNER SYMPOSIUM/ DATES: 7 – 12 November 2010
MANAGEMENT SUMMIT ITEXPO ORLANDO 2010 LOCATION: Orlando, FL
DATES: 14 – 16 September 2010 DATES: 17 – 21 October 2010 URL: http://tdwi.org/pages/education/
LOCATION: Orlando, FL LOCATION: Orlando, FL conferences.aspx
URL: www.gartner.com/technology/summits/ URL: www.gartner.com/technology/
na/outsourcing/index.jsp symposium/orlando/index.jsp GIL 2010: CHINA
DATE: 9 November 2010
GARTNER SYMPOSIUM/ITXPO BRAZIL 2010 INTEROP NEW YORK LOCATION: Shanghai, China
DATES: 14 – 16 September 2010 DATES: 18 – 22 October 2010 URL: www.gil-global.com/china
LOCATION: Sao Paulo, Brazil LOCATION: New York, NY
URL: www.gartner.com/technology/ URL: www.interop.com/newyork GARTNER 23RD ANNUAL APPLICATION
symposium/brazil/index.jsp ARCHITECTURE, DEVELOPMENT AND
GIL 2010: ASIA PACIFIC INTEGRATION SUMMIT
GARTNER SECURITY AND RISK DATES: 19 October 2010 DATES: 15 – 17 November 2010
MANAGEMENT SUMMIT LOCATION: Singapore LOCATION: Los Angeles, CA
DATES: 22 – 23 September 2010 URL: www.gil-global.com/asia URL: www.gartner.com/technology/summits/
LOCATION: London, UK na/applications/index.jsp
URL: www.gartner.com/technology/summits/ VIRTUALIZATION WORLD,
emea/security/index.jsp DATACENTRE TECHNOLOGIES 2010 + INFOSECURITY RUSSIA 2010
SNW EUROPE DATES: 17 – 19 November 2010
BUSINESS ANALYSIS CONFERENCE DATES: 26 – 27 October 2010 LOCATION: Moscow, Russia
EUROPE 2010 LOCATION: Frankfurt, Germany URL: www.infosecurityrussia.ru/#googtrans/
DATES: 27 – 29 September 2010 URL: www.virtualizationworld.net ru/en-EN
LOCATION: London, UK
URL: www.irmuk.co.uk/ba2010

Interested in contributing?
If you’re an analyst, consultant or an independent and would like to contribute a vendor-neutral piece to future issues of ETM,
please contact the managing editor:

Ali Klaver: aklaver@enterpriseimi.com.

122
ETM Q3 ISSUE ■ 2010

To read the

full version of the Q3 issue,


please go to

“www.globalETM.com”
please go to
full version of the Q2 issue,
To read the

TBC

Das könnte Ihnen auch gefallen