Premium Essay

Term Paper: Diginotar, Part 6b

In:

Submitted By Chai2013
Words 11146
Pages 45
Discover the Hidden Costs of Outsourcing
Avoid surprises. Uncover, measure and mitigate hidden costs.

Info-Tech Research Group

1

Introduction
IT leaders report that hidden costs in outsourcing add an average of 25% to the price of the engagement. Understand the hidden costs of outsourcing and take steps to mitigate them.
This Research Is Designed For: This Research Will Help You:

 Business and IT leaders seeking to minimize the unanticipated costs of outsourcing.

 Predict the magnitude of the hidden costs of outsourcing to get a better sense of the total cost picture.

 CIOs and other IT leaders assessing the costs of an impending outsourcing project.

 Manage your outsourcing engagement to reduce hidden costs and increase your net benefit.

 IT leaders selecting a vendor for an outsourcing engagement.

 IT leaders responsible for managing outsourcing engagements.

 Decrease hidden costs both for contracts that are already signed, as well as contracts that are up for review or renewal.

 Both cloud-based and traditional outsourcing arrangements (Info-Tech considers cloud computing a form of outsourcing).

Info-Tech Research Group

2

Executive Summary
Info-Tech research shows that there are seven types of costs that IT leaders fail to anticipate at least 20% of the time. The seven types fit into four higher-level cost categories. Info-Tech recommends strategies for avoiding each hidden cost.
Costs related to transitioning into the engagement: adapting to standards and training costs

1. Adapting to submissions standards: Define the process improvements you will need to work with each potential vendor. 2. Training costs for vendor staff: Reduce training costs by keeping the same vendor staff on all your projects.
Fee-related costs: Fees for additional services (that you thought were included)

3. Carefully

Similar Documents

Premium Essay

Cis 550, Term Paper: Diginotar, Part 6b

...Running head: CIS 500, Case Study 1: Stratified Custom Manufacturing, Part 2 
 ABSTRACT This paper develops a security policy document for my mid-sized organization “Canar Networkung Organization”. The paper will include measures to protect against breaches and act as a proactive defense. It defines the segments of policy that are purpose, audience, document information and scope for the success of organization. This paper also develops the policy criteria that protect the organization from proactive defense and organizational risks. It examines the objectives, complains, responsibilities, implementations and control of policy criteria in order to enhance the organization. The paper also details the policy measurement in order to mitigate the organizational threats, and provides an effective security elements for the enhancement of the organization. Introduction: The policy This policy is the procedure and principle that guides the decisions and the rational outcomes of an organization. The subjective and the objective decisions can be assisted by policy in order to make better environment to the organization. Policies include the set of decision that can be associated by the senior management in an organization. Document information: The framework of Canar Networkung Organization could be provided by document information for the development of organization...

Words: 7361 - Pages: 30