Transforming IT Management

Slides:



Advertisements
Similar presentations
Transforming IT Management
Advertisements

Life Science Services and Solutions
1© Copyright 2014 EMC Corporation. All rights reserved. Results Lower operating costs Expect savings of $500K over three years Foundation laid for Software-Defined.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
COBIT - II.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
ISS IT Assessment Framework
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Information Technology Audit
1 What’s Driving You Towards BSM Adoption? Aligning IT with business priorities Improving service to end users Controlling IT costs IT process improvement.
Getting Smarter with Information An Information Agenda Approach
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Unify and Simplify: Security Management
Supporting tools in an IT Project & Portfolio Management environment Ann Van Belle -
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Information ITIL Technology Infrastructure Library ITIL.
Dell Connected Security Solutions Simplify & unify.
The Challenge of IT-Business Alignment
Roles and Responsibilities
Lean IT: Making Business Buoyant May Learnings >Limitations with manual monitoring >Business impact of an incident >Time to respond.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
December 14, 2011/Office of the NIH CIO Operational Analysis – What Does It Mean To The Project Manager? NIH Project Management Community of Excellence.
Service Transition & Planning Service Validation & Testing
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Private Cloud: Manage Data Center Services Business Priorities Presentation.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
Serving IT up with ITIL By Thane Price. IT is the laboratory’s pit crew  Goal : Make technology transparent while accomplishing valuable internal customer.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Azure Stack Foundation
Information ITIL Technology Infrastructure Library ITIL.
Building Business Transformation Capabilities Our perspective on the building blocks, structure and critical success factors to impact change Gillian.
SAM Baseline Review Engagement
Information Security Program
Updating the Value Proposition:
CIM Modeling for E&U - (Short Version)
IT Professional Perspective IT Strategy, Policy and Governance
CCNET Managed Services
Speaker’s Name, SAP Month 00, 2017
Making Information Security Manageable with GRC
Managing Technology at Plantronics
Ed oms team OMS: Log Analytics Ed oms team.
Securing the Threats of Tomorrow, Today.
Responds quickly to the business needs
A modern platform for Corporate Performance Management
The People Ready Vision for Business in the Enterprise
Managed Content Services
Enterprise Architecture at Penn State
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
GRC - A Strategic Approach
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Business Integration and Business Optimization in 2003
OU BATTLECARD: Oracle Identity Management Training
OU BATTLECARD: E-Business Suite Courses and Certifications
OU BATTLECARD: Oracle Database 12c
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

Transforming IT Management Karel Schmidtmayer Country Manager May 3, 2007

IT Managers Challenge Has Multiple Dimensions Drivers to Ensure IT Is an Engine Strategy and Planning Application Development Operations Security Defining the CIO Challenge While trying to ensure IT is an engine of growth, the challenges of the CIO can be summarized as follows Support the corporate strategy by aligning its investments with business goals Ensuring it provides high quality services that meet business expectations and the commitments they have made to the business Manage compliance and risk ….all while operating more efficiently to reduce costs This is no easy task in part because it requires that CIO think holistically… from strategy and planning, through service delivery and security This has proved difficulty, because each area has tended to operate as a functional silo; each having own requirements and own approaches to solving its top issues Align IT Investments With Business Goals Improve Service Levels Manage Compliance and Risk Reduce Costs September 21, 2018 EITM Overview Copyright © 2007 CA

Transforming IT Management Requires a Holistic Integrated Approach Maximize business value by aligning a portfolio of services with business objectives, balancing cost, resources and business risks. GOVERN Meet business demands by delivering reliable, high-quality services through an automated, optimized IT infrastructure. Transforming IT Management Requires a Holistic Integrated Approach Govern - maximizing business value by aligning a portfolio of services with business objectives, balancing cost, resources and business risk Manage - meeting business demands by delivering reliable, high-quality services through an automated, optimized IT infrastructure. Secure - protecting assets and manage risks by monitoring and enforcing policy-based controls, managing identities and ensuring appropriate access. MANAGE Protect assets and manage risks by monitoring and enforcing policy-based controls, managing identities and ensuring appropriate access. SECURE September 21, 2018 EITM Overview Copyright © 2007 CA

EITM: Transforming IT Management Enterprise IT Management (EITM) is CA’s vision for how to unify and simplify IT management to maximize the value to the business. EITM: Transforming IT Management CA has responded to these requirements with a powerful vision for how to transform the management of IT across the enterprise. It’s called Enterprise IT Management, or EITM, and it can help you to unify and simplify IT management to maximize value to the business. To enable the transformation, we deliver solutions that effectively govern, manage and secure IT Govern, Manage and Secure are the pillars of our EITM strategy …Let’s examine the EITM vision in a little more detail…. To transform IT management, CA delivers solutions that effectively govern, manage and secure IT. September 21, 2018 EITM Overview Copyright © 2007 CA

Managing IT as a Service Business Is IT doing the right things? BUSINESS Is IT doing things right? Strategy Access EXECS IT USERS Alignment Quality SERVICES Managing IT as a Service Business Let’s look more closely at the EITM vision. IT is really concerned about two fundamental questions: Is IT doing the right things….setting the right course based on the business strategy Is IT doing things right….providing secure access and delivering high quality services Business demand manifests itself in two ways. Strategic and Operational Demand. To satisfy strategic demand senior IT execs need to understand the organization’s business objectives and strategy and set a corresponding IT strategy to support those business goals. By aligning IT investments to balance risk, cost and performance, Senior IT execs can analyze the IT portfolio to select and prioritize investments to define new, modify existing or stop investing in services. To satisfy the day to day operational demand ,IT needs to provide secure access to high-quality information services that users need to conduct business. EITM unifies the left hand strategy side to the right hand execution side through a unified service model to ensure IT is delivering value by ensuring IT is doing the right things and then doing those things right. September 21, 2018 EITM Overview Copyright © 2007 CA

Transforming IT Management Requires Integration GOVERN MANAGE SECURE INFRASTRUCTURE OPTIMIZATION Assets & Resources Service Impact BUSINESS SERVICE MANAGEMENT Identity SECURITY MANAGEMENT Service Portfolio IT GOVERNANCE UNIFIED SERVICE MODEL GOVERN MANAGE SECURE INFRASTRUCTURE OPTIMIZATION Assets & Resources Service Impact BUSINESS SERVICE MANAGEMENT Identity SECURITY MANAGEMENT Service Portfolio IT GOVERNANCE UNIFIED SERVICE MODEL Because of CA’s strength and ability to integrate across govern, manage and secure, we are uniquely able to help address our customers’ most pressing concerns. Consider as an example the challenge of ensuring and proving ongoing compliance with industry regulations. CA solutions give organizations holistic visibility into and control of their compliance processes. CA solutions support compliance initiatives by: Establishing and enforcing requirements for information access and record retention Ensuring and certifying the relevance of information Supporting change management processes to protect the long-term integrity of retained information Providing visibility into controls that are in place enterprise-wide to support compliance Automating repeatable compliance processes to lower the cost and risk of assuring and proving compliance As another example, suppose a CIO of a financial institution has been asked to deliver a new online service targeting retail customers. CA solutions assure the new service offering is successfully introduced and supported by: Providing the CIO with insight to facilitate an informed discussion with business executives – so decisions can be made to allocate resources away from existing projects to support the new service offering Managing the people and projects working on the new service offering to ensure on-time, on-target delivery Once the service is introduced, ensuring that customers receive secure access Ensuring that service performance meets agreed upon service levels—and monitoring that performance based on what a customer would experience Managing the entire infrastructure supporting that service. When a problem occurs, indicating that it is impacting a critical business service offering so that is it properly escalated and quickly resolved September 21, 2018 EITM Overview Copyright © 2007 CA

Security Management Identity Key Challenges Capability Solutions GOVERN MANAGE SECURE Key Challenges Deliver continuous compliance Protect assets and information Mitigate risks Enable user productivity Identity SECURITY MANAGEMENT Capability Solutions CA Identity & Access Management CA Security Information Management CA Threat Management UNIFIED SERVICE MODEL Security Management Integration with our security management solutions enables you to manage the identity and entitlements of users from a services perspective. You can ensure that any technology asset or IT user involved in supporting a given service has the appropriate, secure access they require. We enable you to proactively manage your entire security environment. We provide efficient, manageable, auditable and secure ways of connecting users, identities or processes to enterprise resources and information. These solutions help you protect assets and information, mitigate risks and enable user productivity. Additionally, CA security management solutions deliver a holistic and standardized approach to risk and compliance, so that processes can be automated and reused irrespective of regulation. In doing so, you will lower both the cost and risk of managing compliance across the enterprise. September 21, 2018 EITM Overview Copyright © 2007 CA

Security issues Security Issues Continuous Compliance Negative Security-Related Publicity Help Desk Overload Escalating Administration Costs Ghost User Accounts Accumulating & Inappropriate Privileges Auditors’ Requirements Leverage-able It Infrastructure Security Issues Operating costs are too high: The larger and more complex IT infrastructure becomes, the higher the costs of management are. In many cases, these costs increase exponentially with complexity. The CA Workload Automation solution provides a significant opportunity to realize substantial efficiency gains, and in many cases reduced software costs. September 21, 2018 EITM Overview Copyright © 2007 CA

Our Vision: A Modular Approach to Integrated IT Management Govern Manage Secure Incident & Problem Management Application & Performance Management Service Level Management Change & Configuration Management IT Asset & Financial Management Identity & Access Management UNIFIED SERVICE MODEL Security Information Management Project & Portfolio Management EITM Capabilities This slide can be used to lay out the EITM landscape. It details all of CA’s Capability Solutions to Govern, Manage and Secure IT. Present this slide to show your customers “the ideal EITM state” Information Governance Threat Management Service Availability Management Network & Voice Management Database Management Recovery Management Dynamic & Virtual Systems Management Application Performance Management Workload Automation September 21, 2018 EITM Overview Copyright © 2007 CA