Sei sulla pagina 1di 84

Nov / Dec 2009

| THE INDEPENDENT RESOURCE FOR IT EXECUTIVES

Lisa Erickson-Harris
Enterprise Management Associates (EMA)
Roy Illsley
Butler Group
Clive Longbottom
Quocirca
Michael Lock
Aberdeen Group

Join the IT revolution


Prepare for the future
ETM ■ CONTENTS PAGE

7 Editor and
contributors page 36 Working hand in hand
Finding and implementing a DLP
solution that works across your infrastructure
45 The season for change
The management of IT change can
make or break effective IT service manage-
is key to staying secure in the face of new ment. SCOTT CRAWFORD (ENTERPRISE

8 Welcome
ETM
to the new look technologies. ETM’s ALI KLAVER talks to
KATIE CURTIN-MESTRE and ANDREW
MOLONEY (RSA, THE SECURITY
MANAGEMENT ASSOCIATES) moderates
a discussion with GEORGE GERCHOW and
JOHN MURNANE (EMC) who say that change
DIVISION OF EMC) about the role of content management is central to assuring the quality

10 cost-saver
The service desk:
and driver
The service desk is central to key process
awareness in successful DLP implementation. of IT.

development activities and a target for IT


executives in search of cost-saving measures.
LISA ERICKSON-HARRIS (ENTERPRISE
41 ITSM—payback time?
Responding to change quickly and
50 Future focus
Current market forces are changing
the way we see the future, and the roles of
effectively while keeping an eye on the bottom
MANAGEMENT ASSOCIATES) says that IT service management and the service desk
line is proving to be problematic for a lot of
the service desk is, no doubt, experiencing a are only becoming more important for the
organizations. CLIVE LONGBOTTOM (QUO-
resurgence in the market. running of the business. LISA ERICKSON-
CIRCA) tells us why ITSM is great for business.
HARRIS (ENTERPRISE MANAGEMENT
ASSOCIATES) moderates a discussion with

14 Data intelligence
three industry experts; CHRIS WILLIAMS
(BMC), TIM ROCHTE (CA) and MATT
David Hatch (ABERDEEN
FRENCH (SERVICE-NOW.COM).
GROUP) moderates a panel discussion on the
challenges and business performance effects that
data management has on business intelligence
initiatives. He is joined by ANDREW DE
ROZAIRO (SYBASE) and SANDY STEIER 26
(1010DATA).

26 The paradigm shift


The main message that ESM conveys
is about the need for greater transparency of
total asset usage. ROY ILLSLEY (BUTLER
GROUP) tells us that ESM, with its cross
business unit visibility, provides the information
on what areas need to be addressed.

32 Deep dive into


SIEM 2.0
CHRIS PETERSEN (LOGRHYTHM) tells
ETM’s ALI KLAVER that the limitations of
SIEM 1.0 have been holding companies back for
years, and why SIEM 2.0 is definitely worth the
upgrade.

4
CONTENTS PAGE ■ ETM

Contents page

60 It’s called business


intelligence for a reason 80 Career path
How do you make the data you already
82 Events and features

have work for you? BILL DUNN (DUNN


SOLUTIONS GROUP) says it’s easy if you have
the right strategy and the right tools. Interview
by ETM’s ALI KLAVER.
76

64 Security and business


continuity
With an impressive list of partners and clients,
NETASQ is fast becoming the security
solution provider. FRANÇOIS LAVASTE and
DOMINIQUE MEURISSE (NETASQ) join
ETM’s ALI KLAVER to discuss exactly what they
can do for you.

68 Secrets to success
Dedicated action is needed to get
the best out of small and medium sized
businesses. MICHAEL LOCK (ABERDEEN
GROUP) tells us how to slash cost and empower
the business user.

72 Security at its best


Astaro are so concerned about your
security that they’re going to give you their
product—free. GERT HANSEN (ASTARO)
talks to ETM’s ALI KLAVER about why SMBs
will triumph, the future of security, and why
they’re giving away free solutions for everyone.

76 management
Proactive information
ETM’s ALI KLAVER talks to SIMON TAYLOR
(COMMVAULT) about changing the way
organizations think about and manage their
information into a top-down approach that aligns
both IT and business perspectives.

5
Spend less
Improve
Access Control

BHOLD Enterprise Authorization


Management

Preventive Authorization Management


60% to 80% automated authorizing
Let people work not wait for access

Minimize Identity Management (IdM) -


implementation Risks
A solution within weeks
Complete integration with Microsoft IdM solutions

Reduce Cost of Compliance


Reduce IT Audit efforts on access with more than 50%
Prevent unauthorized access and fraud

Make IT Responsive to Business Change


Adopt reorganizations in days
IT doesn’t need to be an impediment to change

www.bholdcompany.com

info@bholdcompany.com
Editor’s Page n ETM Contributors

Fo u n d e r / P u b l i s h e r
Amir Nikaein
Managing Editor
A l i K l av e r
Ar t Director
Ariel Liu
He a d o f D i g i t a l
Xiao Gang Lu
Fi n a n c e D i r e c t o r
M i c h a e l Ng u y e n

The IT revolution Po d c a s t / S o u n d E d i t o r
Mark Kendrick
A ssociate Editors

T
M a r y Wr i g h t
his issue heralds something fresh, new and exciting for ETM. The team Ann Read
has been hard at work developing a new website in order to give you, our Account Executives
audience, everything you need at the touch of a button. For a snapshot Jo e M i r a n d a
Sandino Suresh
check out page 8, or why not jump onto to www.globaletm.com and have
a look around for yourself. Marketing Executive
Michael Le

We’re also very excited about the new poll function on our website. You can vote on a
Contributors
new poll each week—both fun and serious—and the results and the comments so far
have been surprising. Plus, don’t forget to register while you’re there. It’s free and you L i s a E r i c k s o n - Ha r r i s
R esearc h D irec to r
have hundreds of whitepapers, podcasts, information and tools at your fingertips. Enterprise Management A ssociates (EM A)
Roy Illsley
Our bumper issue is full of up-to-date research and fantastic guidance to help you Senior Research Analyst
make the right decisions for your organization. As well as our many and varied Butler Group
podcasts, Roy Illsley from the Butler Group writes about how Enterprise Service Clive Longbottom
Management gives visibility across the entire business, and Clive Longbottom from S e r v i c e D i r e c t o r, B u s i n e s s P r o c e s s Fa c i l i t a t i o n
Quocirca
Quocirca tells us that ITSM allows you to respond to change quickly and effectively
while keeping an eye on the bottom line. Michael Lock
Research Analyst, Business Intelligence
A b e rd e e n G r o u p
Michael Lock focuses on small and medium sized businesses and how to slash cost
while empowering the business user, while Lisa Erickson-Harris, as well as moderating
one of our panel podcasts on the Service Desk, also writes about how it is central to How to contact the editor
We welcome your letters, questions, comments,
key process development activities and those in search of cost-saving measures. complaints, and compliments.
Please send them to
Informed Market Intelligence, marked to the Editor,
If you’re an avid reader of ETM, you’ll notice a new page at the end of this issue about Studio F7, Battersea Studios, 80 Silverthorne Road,
London, SW8 3HE or email editor@enterpriseimi.com
the career and company of one of our favourite analyst partners. This page will give
PR submissions
you a snapshot view of what a company (and a particular person) can do for you, and All submissions for editorial consideration should be
emailed to editor@enterpriseimi.com
we’d like to thank Martin Kuppinger of Kuppinger Cole for being our first “Career
Reprints
path” expert. For reprints of articles published in ETM magazine,
contact sales@enterpriseimi.com
All material copyright Informed Market Intelligence
I hope that we’ve provided some handy updates and essential solutions in this bumper This publication may not be reproduced or transmitted in any form in
whole or part without the written express consent of the publisher.
issue, and that they help in your day-to-day business processes.

Thank you for reading, and if you would like to contribute to any future issues of Enterprise Technology Management
is published by Informed Market Intelligence
ETM, please feel free to contact us at www.globaletm.com or via email at editor@
enterpriseimi.com

Headquarters
Informed Market Intelligence (IMI)
IMI Ltd, Battersea Studios, 80 Silverthorne Road
Ali Klaver London, SW8 3HE, United Kingdom
Managing Editor +44 207 148 4444
Tokyo
1602 Itabashi View Tower, 1-53-12 Itabashi
Itabashi-Ku173-0004, Japan
Dubai (UAE)
4th Floor, Office No: 510, Building No.2
(CNN Building), Dubai Media City, Dubai

7
FoCus on EtM n rEbranding

ETM’s new look

| T HE I NDEPENDENT R ESOURCE F OR IT E XECUTIVES

E
NEW CONCEPT nterprise Technol-
NEW IDENTITY ogy Management—
three words, or one
company. They are
conceptually separated, but can be
operated together. They are individual,
but corporate. ETM has created a brand new
concept for the business of enterprise technology
management, presenting it through the new logo. This extensive but
grouped image with bright and modern technical blue and silver grey
heralds a new vision of quality products and services for the future of
our targeted IT market.

T
he ETM website is
always the first

N
face we show to
our audience and EW WEBSITE
clients. ETM has launched a
brand new dynamic website
N EW STRATEGY
with a fresh, clean and styl-
ish appearance to enhance
our professional products and
services. The user-friendly interface
and logical flow of operation helps us-
ers to quickly and easily find the up-to-date
information they need. The development at the interactive digital
magazine showcase and ETM video sections attract and retain atten-
tion from the very beginning. Audience and client participation and
interaction are a strong function of the website—featuring polls, the
latest news and industry-leading blogs to continually pull our dedi-
cated audience back to the ETM website. They want to stay current,
competitive, and interact with expert IT commentary—all of which
they find at ETM. We are, in effect, building a virtual network-
ing environment for current and potential audiences to exchange,
and thereby strengthen, their IT knowledge and experience. This
strategy will drive large amounts of traffic to the website, boost the
visiting rate, and secure the future inbound rate. ETM is not only an
IT management information website, but

M
also the leading IT social networking
stage.

WE HOPE YOU inimizing


ENJOY THE cost and

NEW - LOOK ETM achieving


maximum
return is the key to ETM’s
rebranding.

8
Map out a course
to IT Management
Success with EMA
EMA Coverage Areas Include:
• ITIL
• CMDB
• Service Desk
• Service Catalog
• Security & Risk Management
• IT Governance
• Network Management
• SLM/BSM
• Storage
• Systems Management
• Virtualization
• Application Management
• Green IT
• And more!

Register for an EMA Website Account to Access Enterprise Management Associates


Free Resources, including: (EMA) is a leading industry
analyst firm dedicated 100% to
• Webinars IT management technologies.
• White Papers Find out how EMA can help
you successfully map out IT
• Podcasts Management solutions in support
• EMA Solutions Center of your business goals. Visit
www.enterprisemanagement.com

Register Today:
www.enterprisemanagement.com/registeretm
ANALYST FEATURE ■ IT SERVICE DESK

The service desk:


cost-saver and driver

T he service desk is central to key process development activities and a target for IT executives in search of cost-
saving measures. LISA ERICKSON-HARRIS (ENTERPRISE MANAGEMENT ASSOCIATES) says that the
service desk is, no doubt, experiencing resurgence in the market.

IT executives in charge of leading IT service


Figure 1: The Modern Service Desk
management (ITSM) initiatives should stand
up and take note of the service desk. While
adoption of help desk technologies began
more than 20 years ago, the rudimentary
Knowledge Management Service Desk
beginnings of the early trouble-ticketing MobileSupport
systems have changed. Self-Service
Service desks are at the center of ITIL Domains Service Model
Service Catalog SLM
ITSM activity both operationally as well Governance Compliance Audit

as strategically. The IT service desk is now Varying License Models


Security/Identity

at the heart of asset management, change


management, knowledge management, the
Configuration Management System (CMS),
and more (see Figure 1).

© 2008 Enterprise Management Associates, Inc.

10
IT SERVICE DESK ■ ANALYST FEATURE

The purpose of the early help desk was to Figure 2 Enterprise Priorities for the Service Desk
ensure the operability of technology within
What are your organization’s larger management goals for the service desk?
the enterprise. Users experiencing difficulty
would be assisted by help desk personnel to
Improving customer satisfaction 82%
smooth the way for technology to support all New or improved process deployment 72%
job functions—trouble-tickets were generated, Reducing costs 70%

issues escalated, and users were put back Improve integration with external systems 46%

to work as issues were resolved. This was a Develop financial measurement metrics for the service desk 44%
Assess return-on-investment in sevice desk software and services 37%
simple concept with far-reaching results when
Replace current help desk/ service desk software solution 33%
implemented successfully. Other (please specify) 3%
Fast-forward 20 years and the service desk 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
is pivotal to the ITSM movement that is well
% Valid cases (mentions/valid cases)
underway. Similarly, the service desk represents © 2008 Enterprise Management Associates, Inc.

low-hanging fruit for cost-saving efforts in IT.


In this article, we’ll take a look at both
dynamics—assessing why the service desk is so Sixty-two percent of participants in this EMA interviewed a large, financial
important for broader ITSM strategies and how research are either already declaring the services firm that expressed its best practices
it can be used to realize short-term cost-savings service desk to be part of the company’s viewpoint—one that it shares with many of
for corporations. ITSM strategy or planning to do so. This its peers:
sentiment supports anecdotal insights
SERVICE DESK AS A DRIVER OF ITSM that have been gleaned from corporate IT “We really got started in April of 2006. The

E
INITIATIVES by EMA. initial spark was getting our arms around the
nterprise Management Associates One of the big challenges for companies infrastructure we had—what is out there—from
(EMA) began noting increased moving down the path of an ITIL deployment an operational perspective. The idea had always
interest in the service desk in strategy is that of determining the best been to leverage the ITIL framework, but we
2006/2007, coincident with starting point for its efforts. Is it best to never assumed that the chief objective was
increased investment in the IT Infrastructure start by designing a CMS system? Or more to be ITIL compliant, if there even is such a
Library (ITIL) best practice adoption. appropriate to define services and their thing. Rather we would harness ITIL insights
In 2009, EMA conducted a research associated service level agreements (SLAs)? to improve our resources and processes for
study called The Aging Help Desk: Migrating Enterprises have clear choices to make. The incident, change, problem, and configuration
to a Modern Service Desk to gain insight most appropriate direction is not always so management.”
into the increased investment in the service obvious.
desk. Over 150 participants in this study The service desk represents one of several In addition to problem, incident and
took a web-based survey and 16 additional good “starting points” for ITIL initiatives. The change management, a number of other
companies were interviewed. This research benefit of the service desk as a starting point priorities are on the radar screen of enterprise
captured IT executive sentiments toward the is that it builds on a discipline that is mature IT. The service catalog, connectivity with the
function of the service desk in its operations and very familiar to most organizations. CMS, process development and knowledge
and its goals and priorities for investment. Additionally, companies can tackle problem, management all surfaced as important goals
High-ranking management goals for incident and change management together— for the service desk—all indicative of the key
the service desk were to improve customer and often do just that. role the service desk has in ITSM initiatives.
satisfaction (82%), process deployment Sixty-four percent of respondents have From a business point-of-view, service
(72%), and cost reduction (70%). Research deployed or are planning to deploy ITILv3. desk leaders are focused on executive
also shows that there is a need for multi- Incident, problem and change management dashboards, SLM for the service desk, and
language support and a smaller, but growing, are the most frequently-deployed ITIL customer surveys. The service desk clearly
interest in financial metrics for the service disciplines and remain the most critical for understands the need to align the service
desk (44%), (see Figure 2). the service desk. support function with the business. 

11
ANALYST FEATURE ■ IT SERVICE DESK

Figure 3 Importance of Best Practices


TRIMMING IT EXPENSE IN THE
Which of the following best practice related capabilities are important to your organization’s

S
SERVICE DESK help/service desk solution?
Some may be amazed that the
Incident management 90%
service desk can play such a pivotal Problem management 86%
role in ITSM initiatives, and at Change management 79%
the same time be an area where Service level management 77%

measurable cost saving can be achieved. Service catalog 58%


ITIL configuration management system 53%
The reality is that the service desk is an
Support for ITIL v3 46%
increasingly smart investment for advancing
Support for ITIL v2 30%
service management, and at the same time, Other (please specify) 1%
cuts operational expenses. This dynamic 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

exists due to ageing technology that often % Valid cases (mentions/valid cases)
© 2008 Enterprise Management Associates, Inc.
carries with it a high cost of ownership,
mergers and acquisitions over a period of time
that have created multiple service support customizations that may have been service desk solution may not be taking
operations and a relative low level of maturity needed at one point in time, but are no advantage of its breadth of capabilities.
in the area of self-service. longer necessary. While spending IT Many, if not most, service desk solutions
These conditions offer good news to IT budget to replace an existing system can now incorporate several ITIL disciplines
executives. IT organizations typically have a sometimes feel like a luxury, the result in a single solution.
number of choices with respect to how to save for the help/service desk domain can Implementing even one or two
IT expense in the service desk. Some options: mean a very quick return on investment additional ITIL functions serves to
while the new solution helps to expand expand the service desk’s reach and
 REPLACEMENT OF AGEING the ITSM footprint of the historical demonstrate additional value to the
TECHNOLOGIES help desk. organization for the same investment.
Many help desk deployments have
far outlived their usefulness in the  SERVICE DESK CONSOLIDATION  OUTSOURCING
organization. Maintenance costs can be Operating multiple service desks Outsourcing often creates anxiety for
very expensive as can the investment is expensive. Companies can find IT professionals as the industry has
in continuing themselves in a position where mergers experienced the competitive strain that
and acquisitions have taken place and it has created over the past five to 10
resulted in the addition of service years. That said, outsourcing front-line
desk operations with disparate support for routine applications can be
toolsets, now all serving the a low-cost solution that relieves support

“… the service same company.


Careful
consolidation of some
staff to focus on more strategic activities.

 BETTER USE OF SELF-SERVICE AND


desk is an increas- of these support
teams can reduce
KNOWLEDGE MANAGEMENT
Most service desk organizations have
ingly smart investment staff requirements,
eliminate
yet to deploy self-service and knowledge
management in any significant way.
for advancing service maintenance
contracts on
Toolsets have these capabilities and so
IT support managers can wisely take
management, and at the multiple products,
and improve
advantage of these existing capabilities
to put some of its workload at the source
same time, cuts oper- workflows as of the problem. This often results in

ational expenses.”
processes are refined happier users that feel in control of their
during the course of issues.
consolidation. Cost reduction and more effective
use of the service desk does not by
 EXPANDING THE any means equate to abandoning the
SERVICE DESK FOOTPRINT traditional service desk. It is quite
Organizations fortunate enough to evident that there is no need to stifle
have purchased a strong, ITIL-focused the evolution of the service desk even in

12
IT SERVICE DESK ■ ANALYST FEATURE

times of economic distress. or not it was customized.


Continuing to move forward The return value in this example has
today with streamlining workflow, two different perspectives. This company
consolidation of operations, incremental will realize significant value in deploying a
implementation of additional best solution that supports ITIL best practices
practice components, and even planning improving operations and the customer
for consolidating customer service with experience. At the same time, it will incur
the IT help desk are all potential actions near-term expenses as it invests in both the
that can be taken in addition to product new technology and best practice education
replacements. for its staff. Measurement of value will come
Any and all of them will position from reduced cost of ownership in the new
IT for greater growth when budget product suite, as well as positive relationships
dollars are easier to come by, and the with users across the company. The net result
groundwork will be in place to take will be an upside gain in a relatively short
advantage of it. payback window.
Some organizations may not be in a
PULLING ITSM AND COST SAVING position to expend this initial capital due to

T
TOGETHER economic conditions in its market segment.
hese two dynamics—a central Recognizing the reality that may exist, it is so
role in ITSM combined with important to consider all the ways in which
strong opportunities for cost cost saving and organizational value can be
savings—is a good news story achieved with the service desk.
for IT and enterprises. Not often does IT, The service desk will continue to play
or any business discipline for that matter, a pivotal role in any service support and
identify an area of investment that offers delivery strategy. Wise CIOs and other IT
this much value to the organization while strategists will capitalize on the momentum
at the same time representing a domain for that the service desk is gaining to deliver IT
managing costs. service management.
The best advice for IT is to choose Many enterprises will choose to deploy
carefully and make those choices most only part of ITIL best practices over the long-
relevant to your organization. Each company haul and others will tackle it all. Incident,
will want to apply the possibilities in a slightly problem and change management will clearly
different way. be included for all.
For instance, if your company has a The service desk is inherently right in
help desk product that was developed the middle of this dynamic. It also plays a
and deployed prior to ITIL acceptance strong role in building corporate goodwill and
and adoption, it is very likely that the customer perceptions for organizations where
requirements for service support exceed the service desk is externally facing.
the capabilities of your current solution. It is an exciting time for service desk
This situation dictates replacement of that leaders who are now enjoying a new respect
product just to meet basic requirements. The for their function and professional staff,
maintenance costs are likely to be significant and at the same time have the opportunity
depending upon which solution and whether to influence the direction of the IT service
support and delivery engine.

Lisa Erickson-Harris
RESEARCH DIRECTOR, Enterprise Management Associates (EMA)

Lisa has over 18 years experience in the computer industry, having


served in a variety of technical, marketing and managerial roles. Lisa
focuses on service level management, business process management,
small-to-medium business infrastructure management needs, and
partnership strategies for channels and strategic relationships.
Prior to joining EMA, Lisa was responsible for the SPECTRUM
Partners program for Cabletron Systems (now Aprisma). She writes
as a guest columnist frequently for Network World Fusion and
contributes articles to slm-info.org. Lisa is also co-author of SLM
Solutions: A Buyer’s Guide, now in its third edition.

13
EXECUTIVE PANEL ■ BI AND DATA MANAGEMENT

Data intelligence

http://www.GlobalETM.com

14
BI AND DATA MANAGEMENT ■ EXECUTIVE PANEL

“... volume, velocity

D AVID HATCH (ABERDEEN GROUP)


moderates a panel discussion on the challenges
and business performance effects that data
management has on business intelligence initiatives. He
and value... are coming
together to put incredible
is joined by ANDREW DE ROZAIRO (SYBASE) and amounts of pressure on BI
SANDY STEIER (1010DATA).
infrastructure...”
DH: ABERDEEN RESEARCH CONDUCTED IN THE PAST FOUR
WEEKS HAS SHOWN THAT ONE OF THE TOP CAUSES OF Another
FAILED BI PROJECTS ARE THE BARRIERS AND CHALLENGES example is in the
THAT COMPANIES FACE WITH DATA MANAGEMENT AND THE pharmaceutical industry where
PREPARATION OF DATA FOR REPORTING AND ANALYTICS. companies do various kinds of studies on drug
LET ME JUMP STRAIGHT INTO THE FIRST QUESTION purchase patterns. All these require fairly ad hoc manipulation of very large
FOR SANDY AT 1010DATA. SANDY, DATA MANAGEMENT amounts of raw data, and they can’t be accomplished with the usual OLAP-
DISCIPLINES AND CAPABILITIES HAVE BECOME A FOCAL type pre-aggregation which is much more fixed.
POINT FOR BUSINESS INTELLIGENCE PROJECTS. WHAT Also, there is a time series component to the analysis which traditional
ARE SOME OF THE TOP BUSINESS PRESSURES THAT YOUR database structures don’t support very well. So the challenge is really
CUSTOMERS ARE EXPERIENCING REGARDING THE NEED FOR in managing tremendous amounts of data, in a form that can easily be
MANAGING DATA FOR THEIR BI APPLICATIONS? analyzed, in the way that it needs to be analyzed.

SS: In today’s world, competition is becoming more and more keen


and important and companies need to be smarter about how they do
DH: YOU BRING UP THAT NEXUS WHERE THE DATA VOLUMES
AND THE RESPONSE TIME NEEDED ARE REALLY WHERE THE
things—that means in many cases that they need to analyze more data. BATTLEGROUND IS NOW, AND COMPANIES ARE REALIZING
There is, in fact, more data available nowadays and so in theory they can do THAT THEY NEED TO ANALYZE MORE DATA, BUT THEY NEED
that, but obviously they need to overcomesome significant hurdles. TO DO IT FASTER.
Another issue is that their competitors are going to be analyzing more LET’S MOVE ON TO SYBASE. ANDREW, SLOW RESPONSE
data, so if they don’t, they’ll fall behind. Management knows this and TIME TO CRITICAL BUSINESS INFORMATION CAN REALLY
they’re demanding more sophisticated reporting and analysis—and they BE THE DIFFERENCE BETWEEN SUCCESS AND FAILURE.
want it faster—so basically the challenge for most shops is that not only IN FACT, OUR RESEARCH FINDINGS OVER THE PAST FOUR
is the volume of data so much bigger, the way that the data needs to be WEEKS HAVE SHOWN THAT THERE IS A DIRECT AFFECT ON
analyzed doesn’t work with traditional architectures. BUSINESS PERFORMANCE WHEN MANAGEMENT CAN’T GET
One example that we’re seeing a lot of is the need for retailers to AT THE INFORMATION THEY NEED WITHIN THE DECISION
analyze a lot of point of sale data which is very voluminous. Another very WINDOW THAT’S NECESSARY. HOW SHOULD COMPANIES
common example is in the financial services industry where people need VIEW RESPONSE TIME, AND WHERE ARE THE FIRST PLACES
to analyze years of payments and millions of loans, and we all know what WHERE COMPANIES SHOULD LOOK TO IMPROVE RESPONSE
happens when the proper analysis is not done on loans like mortgages—the TIME WHEN ACCESSING HUGE VOLUMES OF DATA?
whole world has found that out already. 

15
EXECUTIVE PANEL ■ BI AND DATA MANAGEMENT

ADR: Let’s pick up those three issues. First, let’s look at where
we should look to improve the response time and then address queried
prepare it, whether this includes rebuilding indexes and then choosing
where the data needs to be stored for optimal results and so on. And this
response which is what most people associate with when we talk about slows downs the change process considerably.
improving response times. Then I’d like to take a look at another dimension We have a BI partner in the UK called Anari, who’s used a combination
of it which is more the agility side—the ability to respond to change. of Sybase IQ and our modelling and metadata management solution to
The first thing is, when you’re looking for a response time deliver a new BI project for a major airline. They were able to deliver it in
improvement, it’s important to realize that most of the performance of half the time partly because they could cut out the steps of thinking about
analytics is down to the preparation and the structuring of the data. indexes and aggregates, but also because they were able to test against full
Throwing in additional hardware or memory provides a short-term volumes of data because the performance was so good.
fi x, but it’s expensive and it doesn’t address the root cause of the problem. So the customer ends up paying 50% less consultancy time, but the
If we accept that the data architecture is the single biggest factor affecting other huge benefit is that they bring the product to market in half the time.
performance, then using a database platform that was built from the ground So I think both types of response time are really important, and they’re
up for analytics is fundamental. both under pressure. Having a BI infrastructure that allows you to deliver
And since analytics is performed on columns, column-based fast performance and agility is a real competitive advantage.
architecture, and a query processor tuned for columns, it is critical to get
the fastest response. So, how does this architectural approach translate into DH: THAT‘S A NICE SEGUE INTO ANOTHER AREA THAT I’D
response time? LIKE TO TALK ABOUT—SANDY, ANDREW JUST MENTIONED
If we look at query response first, business users have become THE IMPORTANCE OF PREPARATION, STRUCTURING AND
conditioned by Google to be able to ask any question pointed at the net and OVERALL DATA MANAGEMENT NECESSARY FOR ANALYTICS—
get a response in seconds. And it’s hard for these business users to accept ALL SO THAT THE QUERY RESPONSE TIME IS FAST.
that a query against a much smaller set of data inside company walls should AS ANDREW SAID, GOOGLE HAS EXEMPLIFIED THE
take any longer. So there’s extreme pressure on getting a quick response for IMPORTANCE OF PREDICTABLE RESPONSE TIME AND
ad hoc queries. WHAT WE’VE FOUND IN OUR RESEARCH IS THAT WHEN
At Fortis Bank, we have users firing 115,000 ad hoc queries against the RESPONSE TIME IS NOT PREDICTABLE THIS LEADS TO
Sybase IQ data warehouse and 57% of these queries are now responded to LOWER ADOPTION OF BI ASSETS THAN IS EXPECTED, AND
within a second. IN FACT, LOW ADOPTION FOR BI ASSETS IS OFTEN CITED AS
Predictability is the other component that’s very important in terms THE CAUSE FOR THE LACK OF ROI IN BI INVESTMENTS. OUR
of response time. At Barclays Global Investors where risk reports take RESEARCH HAS FOUND THAT ADOPTION ISSUES ARISE FROM
between two and 30 minutes, there’s now no single report that takes over SEVERAL CAUSES; EASE OF USE, LACK OF DETAILED DATA
one minute. REQUIRED BY THE END USER, LONG TRAINING CYCLES ETC.
Finally, let’s turn to the agility question. The addition of a new set BUT THE MAIN ISSUE THAT CONTINUES TO BE IDENTIFIED
of data and most BI architectures AS THE TOP CHALLENGE IS AROUND QUERY RESPONSE
involves lots of decisions about TIME AS A RESULT OF POOR DATA INTEGRATION, DATA
how to structure COLLECTION AND DATA AGGREGATION, LEADING TO QUERY
it, how to PERFORMANCE ISSUES.
ARE YOU SEEING THIS WITHIN THE FIELD AS WELL, AND
WHAT NEW APPROACHES ARE OUT THERE THAT WILL HELP
ORGANIZATIONS DEAL WITH THIS?
“... new technologies are
SS: We are absolutely seeing increased demands for data
much more flexible in the integration—I agree 100%.
Earlier I mentioned the financial services industry. It has become
sense that they allow 
combinations of data
from various sources...”

16
EXECUTIVE PANEL ■ BI AND DATA MANAGEMENT

standard operating procedure in that industry to build analysis on multiple changes can be implemented more quickly and databases can be put up
disparate data sets that come from all different sources; let’s say payment more quickly, including data from various sources.
histories, housing price indexes, employment statistics, credit histories—a DH: YOU MENTIONED SOMETHING VERY INTERESTING
whole range of things. THERE WHEN YOU IDENTIFIED THE TWO CHALLENGES. THE
People need to take all of this data that comes from different places FIRST ONE IS GETTING THE METADATA STRAIGHT AND YOU
and that has different formats, put it all together and come out with some MENTIONED THAT A LOT OF TIMES THIS IS DATA THAT IS
integrated analysis, and everyone is doing this. Major banks like Goldman NOT FAMILIAR TO THE USER, WHETHER IT’S THE IT USER
Sachs, JP Morgan, Credit Suisse, UBS and Bank of America use 1010data to OR DEVELOPER DEVELOPING THE BI APPLICATIONS OR
do exactly this sort of analysis. What we find is that not only do they need WHETHER IT’S THE BUSINESS USER OR BUSINESS ANALYST.
to do this all the time, but the types of data that come into play increase IN FACT, WE RECEIVED AN OPEN TEXT RESPONSE IN
over time, so this gets to Andrew’s point about changes. ONE OF OUR SURVEYS THAT SAID; “DATA ACCESS IS
One day they may be working with six data sets and then RESTRICTED TO IT STAFF—PERIOD.” AND
the next day they need to work with seven data sets, WHEN WE DELVED INTO THAT AND HAD
and that needs to be integrated smoothly. And it SOME CONVERSATIONS WITH OUR
is quite a challenge for most people to put this RESPONDENTS WE FOUND THAT
all together, given the fact that any one of
these data sets by itself could be a challenge “... competition is THERE ARE SOME ISSUES WITH
THE INABILITY OF BUSINESS
and when you put them all together it
compounds the problem. becoming more and more MANAGEMENT TO BUILD THEIR
OWN REPORTS, DATA VIEWS AND
Retail is another good example.
Data comes from many different groups keen and important and ANALYTICAL MODELS BECAUSE
OF THAT LACK OF FAMILIARITY
within a company, even from several
businesses like bricks and mortar stores, companies need to be WITH THE META-DATA YOU
JUST MENTIONED.
catalogues, websites etc.
To put it into perspective there are smarter about how they do THERE’RE SOME NEW
TECHNOLOGIES OUT THERE
really two challenges here. The first is
getting the metadata straight, or in other things...” THAT ARE SPEEDING UP AND
AUTOMATING THE PROCESS AND
words, figuring out what all that data is. When MAKING MULTIPLE AND DISPARATE
you’re collecting data from multiple sources, but SOURCES MORE ACCESSIBLE, BUT IS
the application designers or those people doing the THIS REALLY CHANGING THE SITUATION
analysis aren’t necessarily always familiar with this data, FOR THAT END USER, ANDREW? AND IF SO,
it’s kind of new and so there needs to be a way of exploring the HOW IS THIS CHANGING?

ADR:
data and figuring it out—that’s one challenge.
The second challenge is managing all that data that is very voluminous, One of the barriers that we’ve seen to a wider adoption of
and it has to be done at a reasonable price. Fortunately, in terms of new IT outside the IT environment has been the reporting layer. The reporting
developments, technologies like ours and perhaps others help in the fact layer in the past often wasn’t business-friendly enough and required quite a
that—and this comes back to a point that Andrew made that I completely bit of understanding about data structures and data management principles
agree with—the new technologies require much less design and set up which is absolutely in line with what Sandy was saying earlier on.
time. We’ve started to see some improvement on the BI reporting investors
The typical formal process by which one goes and figures out exactly improving their interface, but the other side that’s really held people back
what the database should look like, and how it’s going to be accessed and has been the technology infrastructure, and there have been two critical
so on, can be compressed dramatically, in some cases eliminated. Therefore areas that have restricted this wider adoption.

18
ANY USER, ANY QUERY, ANY TIME.

ANY QUESTIONS?
Look to Sybase IQ for all your answers.
Unlimited headroom for data and users, incremental scalability to grow and adapt, the
freedom to leverage standard hardware and operating system, and the flexibility to choose your
reporting and analytics tools. Add the strategic advantage of faster, more accurate answers to
complex queries, unbounded reporting, deep-dive data mining, and predictive analytics. Now you
have insight-driven perspective into risks, opportunities, and rewards—high-performance business
analytics proven in over 3,100 unique installations at 1,700+ companies.
It takes a smarter analytics platform to power the new business reality. It takes Sybase IQ.

www.sybase.com/bi

Copyright © 2009 Sybase, Inc. All rights reserved. Sybase and the Sybase logo are trademarks of Sybase, Inc.
® indicates registration in the United States of America. All products and company names are trademarks of
their respective companies.
EXECUTIVE PANEL ■ BI AND DATA MANAGEMENT

One is the restricted visibility to the entire data set, and then the
second big limiting factor has been performance in a mixed workload
environment. Andrew has focused on delivering
If we look at the limited visibility issue first, we find that a lot of business value through technology for the
traditional environments’ user access to data is limited to a subset of data, past 23 years. An Electrical Engineering
so it’s either the data available in cubes, or another architecture’s data is and Computer Science degree from the
isolated depending on which server you’re accessing it through. Massachusetts Institute of Technology
Now, with a column-based architecture, all information is visible and with an MBA from INSEAD, Europe’s
accessible to all users and it’s only limited by the security privileges which leading Business School, provides him
is obviously very important. So this is one of the ways in which we’ve made with a unique mix of technical and
this democratic access to the information much easier. business perspective.
The second bottleneck has been performance. So even when systems Andrew has over 16 years in
are performing really well in general, there is this great fear of the Andrew De Rozairo management roles in the Data
unexpected query—and this goes back to the point that Sandy made BUSINESS Management Industry, including as CEO
before. DEVELOPMENT of a VC-backed encryption start-up,
In the past, BI architecture was such that you really had to know a little MANAGER EMEA and European Managing Director of
bit about data management and data structure in order to be able to ask the Sybase an American data monitoring Software
right type of question. Company. In his current role as Business
When you open this up to a larger user base you’ll find that there are Development Manager EMEA for Sybase,
queries that are sent to your business intelligence infrastructure which may Andrew works with strategic clients and
be completely valid and valuable to the business, but the data is not well partners to develop and deliver business
prepared and not well structured for that kind of query. value propositions based on leading-edge
In the traditional environment that query can slow down all other BI Sybase modeling, metadata management
users on the system and this meant that IT felt that they had to control and analytics technology solutions.
these queries, either writing the queries themselves, filtering them, or a lot
of customers were finding that they have teams of query tuners.
This works with small groups of people, but it’s not scalable to a large every day and send it out to their different customers. Now what they’ve
user base. We’ve seen a number of large projects that started off small, done is provided this access directly to the customers who can build
everything was working fine, then they scaled out and hit this unexpected their own reports, and it’s very often this move to self-service that forces
query issue, slowing down all the BI users. They have actually scaled back to companies to think about their fundamental data architecture and say; “Is
a small number of users who understood data management and who wrote this the right approach? Is the architecture that I have going to scale out so
the right kinds of queries. So we see these as two infrastructures that have that we can do self-service so that it is successful?”
really limited the adoption of BI outside IT staff.
Most BI projects in the past have been limited to tens or maybe DH: THAT LEADS ME TO THE FINAL QUESTION ADDRESSED
hundreds, at the most, of users. Once customers can remove these TO BOTH OF YOU. ANDREW JUST REFERRED TO WHAT WE SEE
restrictions partly around data visibility, but secondly more tolerance, for HAPPENING THROUGH OUR RESEARCH AT THE ABERDEEN
unexpected queries you can really open out to and support thousands of GROUP, WHICH IS A MAJOR SHIFT IN TECHNOLOGICAL
concurrent users. DEVELOPMENTS THAT ARE DRIVING ACCESS TO DATA AND
We have thousands of concurrent users at places like Superfarm in DELIVERY OF DATA IN A SELF-SERVICE ENVIRONMENT TO
Israel, a leading retailer, and Experion here in the UK. What we see is PEOPLE WHO NEED TO MAKE BUSINESS DECISIONS, AND NOT
definitely a move towards self-service inside business intelligence so we SPEND TIME ON TECHNOLOGY TASKS.
want to make this data available to a much wider group of people. WE ARE SEEING SELF-SERVICE, INDEED AS ANDREW JUST
A good example is Nielson Media Research who wanted to cut a CD MENTIONED, AS SOMETHING THAT CAN ALSO BE CUSTOMER-

20
BI AND DATA MANAGEMENT ■ EXECUTIVE PANEL

FACING. IT’S NOT JUST INTERNALLY FOCUSED ACCESS TO


DATA, BUT DATA THAT CAN BE LEVERAGED AND USED TO
FACT FILE_ Sybase HELP FIRM-UP CUSTOMER RELATIONSHIPS.

H
ARE YOU BOTH SEEING THAT SAME THING, AND WHAT
ISTORY ARE THE TECHNOLOGIES AND THE TECHNOLOGICAL
ADVANCEMENTS BEHIND THAT? HOW IS SELF-SERVICE BI
GOING TO HELP ORGANIZATIONS IMPROVE THEIR OVERALL
BUSINESS PERFORMANCE?

> Sybase has a rich 25-year history as a technology leader, start-


SS: I should start by saying that I agree with what Andrew has said.
In fact, I’ve just written a whitepaper, which hasn’t yet gotten out to all
ing from its creation in 1984 by Mark Hoffman and Bob Epstein in of our customers, which talks about what I call transparent databases—
California. transparent in the sense that they are visible to the user community, which
> Sybase has consistently created technology that enables the Un- is exactly the point that Andrew was making.
wired Enterprise by delivering enterprise and mobile infrastructure, In terms of the general direction, I think we’ve hit on the fact that it’s
development and integration software solutions. about making databases more transparent and more agile so that they can
change quickly and deal with more data from more sources more easily;

P
that they can do more sophisticated types of analysis without having to be
RODUCTS carefully designed and so on.
But there is one additional point that I think builds off of that in
terms of how a business approaches a project, and that is that, if in fact
new technologies like ours enable people to put up databases much
more quickly without the usual formal requirements and design phases,
organizations can try out different services and products before making
> Sybase products range from database to government solutions. a commitment. This takes a tremendous amount of risk out of the entire
> Database management software: Best-fit infrastructure for manag- process.
ing data within multiple distributed environments and for a variety of In fact, we’ve seen in many cases that, in a pilot project, if an
purposes. organization is looking at multiple competing vendors, for example, the
> Business continuity software: Reduces the cost of remote data actual final data warehouse can in fact be constructed as part of the pilot.
recovery while reducing business risk and ensuring data integrity. And so it’s not that the pilot is done on a subset of data and some small
> Business intelligence and analytics software: Delivers high-perfor- mock-ups of the ultimate deliverable, but the ultimate deliverable is what is
mance enterprise analytics and business intelligence without blowing created during the pilot project.
the budget or abandoning investments in technology and knowledge We did something like that for Dollar General for instance—in fact
resources. most of our customers use that approach. Their pilots basically are the
> Mobile commerce: Delivers mobile services from mobile messag- entire project.
ing interoperability to mobile content delivery and mobile commerce If you think about it, this means that the company can really see how
services. the competing products work in a real production-like system, and it means
> Government solutions: Select information technology, manage- that there’s no risk in it because they don’t have to decide on a certain
ment and mobile solutions for government agencies. technology, and then maybe a year or two later it will work or maybe it
> Healthcare solutions: Provides the healthcare industry with timely will fail.
and secure access to vital medical information. In this case, they know it works, and so when they decide to go with

21
EXECUTIVE PANEL ■ BI AND DATA MANAGEMENT

some combination of vendors they know that not only will it work, but
it already has worked, which is a very powerful paradigm shift in the way David is responsible for all Aberdeen
these projects get done. Research programs and overall operations
of the company. In his research capacity,
DH: ANDREW, SANDY HAS JUST MADE A VERY IMPORTANT David focuses on the delivery of
POINT AND THAT IS THAT A RAPID ITERATION APPROACH actionable information to the enterprise.
TO BUILDING DATABASES HAS OPENED UP DOORS FOR This encompasses both traditional
COMPANIES TO ‘TRY BEFORE THEY BUY’, TO REALIZE THE business intelligence (BI) and emerging
REAL BUSINESS IMPACT (OR NOT) BEFORE THEY MOVE methods (client/server, web applications,
FORWARD, WITHOUT RISKING A MULTI-YEAR PROJECT IN SOA-enabled applications, On-Demand
THE PROCESS—IN FACT OUR RESEARCH WOULD AGREE WITH via SaaS, Hosting/ASP, and appliances).
David Hatch—
THIS BEING AN IMPORTANT CAPABILITY. David also has expertise in the application
Moderator
WHAT ELSE IS IMPORTANT FOR LISTENERS TO of BI within specific vertical market
SENIOR VICE
UNDERSTAND IN TERMS OF THE LATEST TECHNOLOGICAL environments including healthcare,
PRESIDENT
ADVANCEMENTS? supply chain, manufacturing, publishing,
AND GENERAL

ADR:
agriculture, wholesale/distribution and
MANAGER
I guess we see an almost perfect storm hitting business insurance.
Aberdeen Group
intelligence today, where it’s really volume, velocity and value that are David holds a BA, Communications
coming together to put incredible amounts of pressure on BI infrastructure. degree from the University of
Let’s look at volume first. For years we’ve been talking about BI Massachusetts, has completed seminar
delivering better improved operations from the board room to the mail work in Project Management Excellence
room. If we’re going to be able to deliver on that we have to manage the at Boston University, and Marketing
simultaneous explosions of data and the user population. Innovative Technologies at Harvard
We’ve already built a data warehouse, we already have thousands of University.
concurrent users and that pressure is going to keep building, so one of
the key developments is the ability to grow and to independently scale
processing, memory and storage to be able to allow companies to grow analytics and the requirements of predictive analytics on response time.
incrementally. Here the business is looking for insight rather than information; they’re
I agree 100% with Sandy—companies don’t want to risk making big looking at the root cause of problems rather than just the symptoms.
lump-sum investments, they want to grow as their needs grow and I think This requires complex analysis against really granular data at a speed that
the introduction of grid technology to be able to do this independently and encourages multiple iterations. So you ask a question, it comes back, you
slowly as your needs grow is an important one. ask it again, and in order to do that you really need fast response time.
The second point is velocity. We talked before about the fact that the One of the hurdles in the past has been that in order to do these
world is getting much more impatient and that there is less and less time to calculations you need to pull data out of the data warehouse, perform your
return responses. calculations, your statistical functions and your analytics against it and
We see lots of vendors in the BI industry talking about real-time BI then turn it back into the data warehouse. So one of the things we see as a
data warehouses where they trickle-feed information in order to provide big step forward is in database or in analytics which removes that delay or
fast response times. We provide that as well, but we’re seeing some critical latency in the process.
applications, the most demanding applications, where we have to make We’ve talked about volume and we’ve talked about velocity, and I
decisions before the data evens hits the database. think the third big factor is value. In the past we’ve always had a growing
economy for a long time so even though the volume and velocity challenges
The other area that we’re seeing draw lots of pressure is around predictable have been there, there hasn’t been the same economic pressure on us. In

22
EXECUTIVE PANEL ■ BI AND DATA MANAGEMENT

this environment we’re all under cost constraints and we’re expected to
contribute to the savings.
Sybase IQ has always been a leader in terms of data volume reductions FACT FILE_ 1010data

H
which reduce your storage costs and so on, but one of the things that
we’ve added on to that is information lifecycle management so you can set ISTORY
up data retention policies that automatically move data from higher cost
storage down to lower and lower cost as the access frequency decreases. We
think that’s the backdrop against which people are working today.
So, the additional challenge of having to deliver value while responding
to volume and velocity pressures has stopped people throwing hardware
at a problem, and forced them to fundamentally look at whether the basic > 1010data was founded in 2000 by pioneers of large-scale data
approach of what they’re doing is sound. systems on Wall Street. Drawing on experience and new technologies,
We’ve got over 3000 customer installations and we’re seeing more and the company developed a web-based service and underlying software.
more vendors taking a column-based approach to solving this problem—to > For almost a decade, 1010data has provided analytics, business
us that’s very strong feedback; that a column-based architecture is helping intelligence and data publishing and warehousing services to top tier
them to weather the storm. companies in many sectors.

P
With more than a quarter century of
industry experience, Sandy Steier is RODUCTS
recognized as an innovator behind
the adoption of advanced analytic
technologies by financial services
institutions.
Before co-founding 1010data,
Sandy was a Vice President and manager > 1010data’s data management architecture is, in theory, almost infi-
of research and technology at UBS nitely scalable and is architected to handle multi-terabyte databases at
North America, where he supported a fraction of the cost and with much higher performance than other
Sandy Steier several trading desks and contributed data management approaches.
VICE PRESIDENT significantly to the evolution of the firm > Financial services: Combines the power of a high-performance
AND into a leader in the use of advanced back-end database with a web-based, front-end user interface, em-
CO-FOUNDER technologies. Previously, as Senior Vice powering financial institutions with the tools they need to analyze,
1010data President at Lehman Brothers, Sandy led manage and present data.
the effort to migrate mortgage-backed > Retail and consumer packaged goods: This analytical data platform
securities analytical programming from combines a powerful back-end database with a flexible front-end tool,
mainframes to workstations. Earlier enabling fast, reliable queries of detailed data.
in his career, while a Vice President at > Data warehousing: Provides a unique platform that combines
Morgan Stanley, Sandy was responsible front-end usability with back-end functionality. Delivered as a man-
for product development and analysis aged solution, 1010data allows analysts to quickly construct complex
of fixed-income securities and the and sophisticated queries on very large datasets and get results in
supporting technology effort. seconds.

24
www.KUPPINGERCOLE.com
ANALYST FEATURE ■ ENTERPRISE SERVICE MANAGEMENT

The paradigm shift


The main message that ESM conveys is about the need for greater
transparency of total asset usage. ROY ILLSLEY (BUTLER GROUP)
tells us that ESM, with its cross-business unit visibility, provides the
information on what areas need to be addressed.

26
ENTERPRISE SERVICE MANAGEMENT ■ ANALYST FEATURE

while also reducing the environmental


impact on the planet, they will
provide other organizations

“... the current with some idea of how ESM


principals can operate in

economic their business sectors.


Firstly, the business
environment provides opportunities that
ESM presents may not
the ideal backdrop for a always be obvious,

renewed ideology on how particularly in organi-


zations where IT is

to tackle some of the not represented


at the C-level—as
most difficult business much of the value of
ESM is contained in its
challenges...” ability to provide a plat-
form for cross-business unit
collaboration.
Many organizations are
considering how real business process

E
automation can be achieved, while currently
nterprise
the processes being automated represents only a
Service Manage-
part of the entire business process. For example,
ment (ESM) has been used in a very
consider the simplified mobile sales process. In IT
targeted and focused manner by those
business process terms this is modelled as a sales
organizations that have implemented it. ESM
person with a laptop, complete with all relevant
lacks the hype that other technologies have
information, a method of connecting to corporate
achieved in recent years, but Butler Group believes
systems, and the ability to generate a sales invoice.
that ESM provides a potential paradigm shift
However, in real business terms the mobile
for organizations; especially if it’s used to deliver
sales process also relies upon the car used to get to
maximum organizational value, and as such could
the meetings, the mobile phone used to arrange
create significant changes in how IT is used and
them, and the traffic conditions and distance
perceived in the organization.
the sales person has to travel (with a secondary
The natural extension of ESM could be used
impact on their stress level and therefore sales
to consider the employee as an asset, however, this
performance). All of these elements are currently
degree of intrusion into an individual’s personal
unmonitored, and by implication not able to be
life may be considered a step too far.
optimized in terms of the entire business process.
ESM recognizes the fact that currently IT as-
Therefore, ESM can help by capturing the
sets are, for the most part, monitored and managed
information on company car location and routes
by many organizations, but devices and equipment
taken, mobile telephone usage and signal strength,
beyond the IT world is Somebody Else’s Problem
and model the total time allocated to one sales
(SEP). This approach has restricted the value that
opportunity.
organizations can obtain from investments in
plant, machinery and other equipment, because
What are the benefits?
these devices hold valuable information that is not
The benefit to the organization of obtaining
combined with other information currently held
information in a format that can be combined with
in IT data silos.
other organizational data is that it enables true
Therefore, by extending the reach of asset
business process optimization to be performed.
management and making them industry-specific,
In our example, the sales person may be planning
operational processes can be developed so all of an
their routes based on the value of the potential
organization’s assets are monitored and managed.
sale, while if their routes were planned based on
a true cost of sale model then the routes may be
Some prime examples
different, and the overall profit margin for the
The leading industrial sectors of this ESM move-
department increased.
ment are healthcare and utilities, and by under-
Another benefit that ESM provides is it en-
standing how these sectors in particular believe
ables an organization to understand the real value
ESM helps to improve operational efficiencies,
of any investment in assets, again in our example of

27
ANALYST FEATURE ■ ENTERPRISE SERVICE MANAGEMENT

what the business value of the company car is. This For IT, this business process perspective pro-
particular question has other aspects that contrib- vides the platform needed to support the transition
ute to the equation, such as how many organiza- towards the “everything is a service” approach to
tions understand the real impact on profit margin IT delivery. The extension of the asset knowledge
of the sales person driving that particular make/ database, and by implication the assets’ business
model of car. This becomes even more contentious relevance and how these are part of any business
when compared to the overall business significance services being consumed, can be mapped to the IT
of the product/service being sold. services being provided.
As can be seen, this level of knowledge and While this “everything is a service” approach
analysis opens up the proverbial can of worms in may be a few years away from being widely
that it challenges some accepted working practices adopted, ESM provides an enabling layer for when
that have previously been considered a “cost of organizations are ready to move to the new model
doing business”, and not specifically allocated to for IT delivery.
the task at hand.
This level of knowledge and management Working solutions
may appear to be excessive, but as the economic The benefits alluded to in the last section may ap-
recession deepens, more and more organizations pear to be theoretical in terms of how they can be
are looking to make their operations as cost-effec- used, but two industry sectors are actively working
tive as possible. In order to fully understand the on adoption of ESM capabilities—the utilities and
impact an asset has and the use that asset is put to healthcare sectors.
requires organizations to adopt an enterprise-wide The utilities sector has been driven to ESM
approach to all its assets, resources and procedural through the demand from central governments
activities. for reduced CO2 emissions targets agreed to at the
The example of the company car can then be Kyoto summit. For many Western economies the
put into context. If, for example, its contribution to power infrastructure requires significant invest-
cost of sale is small when compared to the manu- ment to modernize its distribution and generation
facturing costs, and the evidence demonstrates the facilities.
biggest other costs (excluding manufacturing) are The UK and US are committed to introduc-
incurred in the logistics of moving stock from fac- ing the “smart meter”, which is capable of being
tory to store, then informed decisions can be made managed remotely and reports its status in terms of
on what action needs to be taken. power consumption in near real-time. 
Enterprise Service Management and its relationship to business
processes

Source: Butler Group

28
Part of the Datamonitor Group

Imagine an analyst firm that


understands the specific business
issues of your industry...
Only Ovum harnesses the power of 150+ ICT analysts working
collaboratively with 350+ business analysts to understand how IT
can be used to maximise your business returns. Welcome to the new
world of Collaborative Intelligence.

“Vendor and enterprise research and advisory buyers should


put the new Ovum on their short lists”

Analysts of Analysts

Contact us today at enquiries@ovum.com


for a free publication containing a range
of articles on the future of IT from both a
technology and business perspective

WWW.OVUM.COM
ANALYST FEATURE ■ ENTERPRISE SERVICE MANAGEMENT

These devices, when installed in households use of a specialist piece of equipment may only be for greater transparency of total asset usage. The
and businesses, will enable the consumer to see required occasionally, but in order to ensure it can utilities and healthcare sectors have embraced
the cost of their energy usage, but the real value provide the level of care this equipment may need ESM because of legislation forcing change in the
of these devices will be how the information can to be permanently located in the A&E depart- case of utilities, and the need to improve a public
be collected and used to help the power distribu- ment. However, if the hospital knew the location service by better utilizing its existing assets in an
tion companies ensure energy is of all such devices and the current environment of increased government scrutiny for
available only when needed, status in terms of importance the healthcare industry.
and is provided from sup- to the patients’ wellbeing, The drivers are clearly linked to the pressure to
plies that reduce the then these could be do things differently within an environment where
transmission loss to re-allocated for use service is a key factor in the public’s perception.
a minimum. on a priority-needs However, we believe that any wider use of ESM
The exten- basis. is likely to be driven by external pressures—sales
sion of the
“smart meters”
“... ESM provides Another
complication
departments are unlikely to volunteer to return
their company cars without some valid evidence
will be that
organizations
a potential that hospitals
face is ensuring
to demonstrate the impact in terms of a product’s
profit margin.
can invest in
manufacturing
paradigm shift for that patients
receive the cor-
Therefore, it is our contention that the cur-
rent economic environment provides the ideal
plants that oper-
ate at optimum
organizations...” rect medication,
which involves
backdrop for a renewed ideology on how to tackle
some of the most difficult challenges—dealing
performance levels knowing not only with a retail environment and its last 100 meters
by understanding who the patient is, but of the supply chain, for example—and ESM with
the demands of produc- also their clinical history. its cross-business unit visibility, can provide the
tion, the availability of This level of information information on what areas should be addressed.
energy supply, and the value/ is very sensitive and covered by Finally, focusing on ESM from an IT
cost that increased production at that many different data protection laws in department’s perspective, then the challenge of
particular time represents. different countries. Therefore, the challenge is to technologies such as cloud computing, SOA, and
The healthcare industry has approached the ensure that when a doctor visits a patient they can virtualization, when coupled with the growth in
use of ESM from a different angle. It has the chal- access the information from a central reposi- mobile devices—estimates state that 15 billion
lenge of tracking equipment, people (both staff tory, with confidence that they have the correct mobile internet enabled devices are expected to
and patients) and data (prescribed medication information, and that data protection laws are not be in use by 2015, and 30 billion Radio Frequency
for example). The primary purpose is to ensure broken. Identification (RFID) tags in use by 2010—
that it can maximize its investment in the assets represents a major challenge to ensure that
it has and to do this it needs more information Looking ahead organizations obtain value through matching
on when expensive assets are being used, where The future for ESM is not a simple case of raising these devices with other assets and processes, and
they are and who is using them. For example, in awareness through a marketing campaign. The therefore understanding where waste and value
Accident and Emergency (A&E) departments the message that ESM conveys is one of the need co-exist.

Roy Illsley
SENIOR RESEARCH ANALYST,
Butler Group

Roy has over 23 years of IT experience,


working for a variety of consultancy and
end-user companies with experience in
the defense, utilities, automotive, retail,
and Fast Moving Consumer Goods
(FMCG) industries.
Roy has delivered keynote speeches at Butler Group Strategy
Briefings, Master Classes and at external trade events. Roy is quoted
regularly in the computing press and is recognised as Butler Group’s
expert on Infrastructure and Systems Management, with a secondary
area of IT Strategy and Policy.

30
What’s New
What’s Next
see it at INterop

Don’t miss the leaDing business


technology event
See the full range of IT solutions, learn what’s new and identify technology must-haves for your business.

Interop is the only event to give you a comprehensive and unbiased understanding of the latest innovations—
including cloud computing, virtualization, security, mobility and data center advances—that will help position
your organization for growth.

exhIbItors INclude:

coNFereNce tracks:
save 30% or get a Free expo pass • application Delivery • Mobile Business
Register with priority code CNJXNL01 • Cloud Computing
• Data Center
• Networking
• storage
www.interop.com/lasvegas • enterprise 2.0 • Video Conferencing
• Governance, Risk and Compliance • Virtualization
• Green it • VoiP and Unified Communications
• it security and Risk Management

*30% off discount applies to Flex, 4-Day and Conference Passes. Discount calculated based on
the on-site price and not combinable with other offers. Proof of current IT involvement required.
Prices after discount applied: Flex: $2,306.50 | 4-Day: $2,026.50 | Conference: $1,606.50 ©2010 TechWeb, a division of United Business Media LLC.
IN THE HOTSEAT ■ SECURITY INFORMATION AND EVENT MANAGEMENT

Deep dive into


SIEM 2.0

http://www.GlobalETM.com

C HRIS PETERSEN (LOGRHYTHM), tells ETM’s ALI KLAVER that the limitations of SIEM 1.0 have held
companies back for years, and why SIEM 2.0 is defi nitely worth the upgrade.

AK: WE KNOW THERE ARE USERS WITH FIRST GEN SIEM’S Another key weakness of SIEM 1.0 is limited forensics and
AND THEY’RE LOOKING AT UPGRADING FOR MORE contextualization. That comes down to not making immediately available
FUNCTIONALITY, AND THERE ARE CERTAIN LIMITATIONS a rich set of data around the event that helps an analyst understand what
OF SIEM 1.0 PRODUCTS—CAN YOU RUN OUR AUDIENCE they’re looking at—whether it’s a security issue, a compliance issue or
THROUGH THE FIVE THAT LOGRHYTHM HAS EXPERIENCED? an operations issue. This type of contextualization allows the analyst

CP:
to corroborate information around an event to better understand what
If I were to boil it down to what I consider to be the top five happened, and the resultant impact of the event.
limitations of SIEM 1.0 products, the first would be security-centric focus. The fourth point is that there was a lot of promise around correlation
When this market was being developed 10 years ago, the primary use early on in SIEM 1.0 development. I think we’ve come to realize that while
cases were around security—specifically data reduction. So the resulting it’s certainly valuable, and a core component of SIEM products, there may
architecture and product use really had a security-centric focus and didn’t be too much reliance on correlation as the be-all-and-end-all.
provide much in the way of operations, compliance and audit use cases. We not only need correlation but also other types of analytics combined
We’ve realized, since then, that log data is very relevant and useful in a variety with more forensic information to enable machines to make better
of areas, especially operations and compliance in addition to security. So I decisions, provide better information to users and support the instant
think this is one significant limitation of SIEM 1.0 products. response process.
Another limitation is that there was too much attention focused on data Lastly, a key weakness is that SIEM 1.0 is overly complex and expensive.
reduction which was the primary use case for first generation SIEM products In terms of making the technology useful, the sophistication and the
delivering only high quality “events”. The problem was, they didn’t collect complexity far exceed the capabilities and budget constraints of a lot of
and retain a lot of valuable forensic information—primarily log data—which organizations. In many cases there’s a high, up-front ticket price, but an even
meant analysts never had access to this information when they needed it to more significant expense required on the deployment, care and feeding of a
support day-to-day analytics and forensics across the business. very complex beast, resulting in a high total cost of ownership.

32
SECURITY INFORMATION AND EVENT MANAGEMENT ■ IN THE HOTSEAT

AK: WHAT DO YOU THINK ARE THE MAIN CHALLENGES FOR and environment, looking for sensitive data that might serve to better
SIEM 1.0 USERS? themselves financially.

CP:
These are very difficult things to detect inside of networks because
One key challenge is that SIEM 1.0 users don’t have forensic they’re unknown. There’s no specific attack pattern and it occurs over a long
infrastructure in place because they have an event management solution. period of time.
What you really want is a log and event management solution that spans the I think we need to look at behavioural-based techniques detecting this
entire IT infrastructure. type of activity. Because we have these platforms now with SIEM 2.0 that
So all logs can be viewed across all the different layers—networking, are collecting log, forensic and network information, we can begin to build
device, host, application, database—and events can be identified while much more sophisticated models around which behaviours can be defined,
maintaining access to all the raw log information, when needed, to help and can then detect more anomalous and unknown activity that could be
support an investigation. very high risk.
For example, log data doesn’t always have the right context—
a log might contain two IP addresses. So which was the attacker and which AK: SO CHRIS, ARE YOU SAYING THAT YOU NEED MORE DATA,
was the target? It might contain two user names, but which user actually PARTICULARLY APPLICATION LAYER DATA, TO AUGMENT THE
performed the action? We need that contextualization and enrichment in OPERATIONAL AND SITUATIONAL PICTURE?

CP:
order to make that data more valuable.
Another challenge for SIEM 1.0 users is environmental awareness— Yes, absolutely. And we’re back to that second key point from the
bringing in more information around the events in question and first question, where SIEM 1.0 products only bring in highly-filtered event
understanding what is actually happening at the network layer, collecting data to correlate against, build a behavioural profile against, or perform
net flow data, and being able to correlate network traffic activity with IDS statistical analysis against.
events and alarms. This is a big challenge in terms of enriching The more data that is available to these analytic engines, the more
the overall experience of what information is available to help make better capability there is in terms of the type of correlative rules that can be
decisions, or to better enable automated analysis capabilities. created and applied to that data.
There is also a lot of focus on where events took So we need lots of information to understand what’s
place. We not only want to know where activity going on and to feed to these machines’ learning
occurred in terms of devices and hosts, but we techniques that will detect more sophisticated
also want to know who did it. There needs to activity. It needs to span from the physical

“... we need to feed the


be as much information on who performed realm (like physical badge readers), to
the action as where it occurred. network flow data and in everything

human capability with


Lastly, I want to bring up scalable in between. The more information
robust monitoring, analysis and we have, the more hope we have of

information in a form
reporting. I’ve heard horror stories understanding what normal and
from early SIEM products where abnormal is.

that can be more easily


loading 10,000 events would cause the
console to crash. That is not scalable AK: WITH THIS VAST AMOUNT

digested...”
analytics—we’re talking about collecting OF DATA AND INFORMATION, IT
millions or hundreds of millions of logs CERTAINLY MUST BE A DAUNTING
per day in a typical installation that may TASK FOR ANALYSIS?

CP:
need to be translated and boiled down to a
million or more events per day. It is, and that is why automated
So the analysis layer needs to scale in order analysis is the end goal and where I think we will
to bring huge amounts of data into a single analysis continue to advance for the foreseeable future.
interface and allow “drill-down” in a very rich, high- We’ll see more sophisticated methods for looking across
performance manner. all of this data and pulling out the needle in the haystack—identifying
those things that are highest risk and should be looked at immediately. We
AK: SIEMS HAVE TRADITIONALLY PLAYED A ROLE IN THE need to get to that point and we’re making a lot of progress, but there’s still
CORRELATION OF NETWORK OR INFRA STRUCTURE LEVEL a lot of evolution left.
INFORMATION—HAVE SIEMS EVOLVED IN THE LAST FEW In the meantime, and even after, we still need to analyze a lot of
YEARS? information because in the end the human brain/eye is still the best

CP:
analysis engine available today.
This is where the “state-of-the-art” is evolving and will continue We need to feed the human capability with information in a form
to evolve. Certainly, there is impressive capability in the market in terms that can be more easily digested through things like aggregation, and
of correlating network and security level information, but it needs to go where trends can be more easily spotted through effective visualization
beyond correlation—which is typically pattern-based. This means that techniques, so that I can actually look at millions of logs or events in a
we’re looking for something familiar which we’re pretty capable of doing. single pane of glass and get to a root issue or cause very quickly.
But, we’re not so capable of detecting those things that are somewhat That is part of what we call total performance with our solution.
known and, even worse, those things that are completely unknown. SIEM 2.0 products not only meet scalability requirements in terms of
An example of that might be a rogue user—I have an internal user collection, but they present that information effectively to users. That is
gone rogue who begins to slowly and meticulously scan the network total performance. 
33
IN THE HOTSEAT ■ SECURITY INFORMATION AND EVENT MANAGEMENT

AK: YOU’VE GONE THROUGH THE CHALLENGES OF SIEM 1.0 A lot of compliance standards require organizations to do this. They don’t
AND TOUCHED ON WHAT’S NEEDED IN AN UPGRADE. SO NOW necessarily need to purchase intrusion detection, but they need to support
LET’S STEP UP TO SIEM 2.0. DO YOU THINK THE LIMITATIONS intrusion detection as a function in the business.
THAT YOU JUST DESCRIBED ARE ADDRESSED APPROPRIATELY SIEM 2.0 products make supporting that security business function
IN THE NEXT GENERATION OF PRODUCTS? much more achievable and efficient. All events can be brought into a single

CP:
central location with prioritization methods telling you the most
We’re certainly making progress as an critical event at any point in time, plus some automated analysis
industry. Right now you have solutions that on top along with correlation to identify those needles in
were designed to provide this platform the haystack.
from day one. I consider LogRhythm Many compliance standards also require you to
one of those solutions—where the have an incident management and support process
architecture lends itself to providing
the level of analytics capabilities “SIEM 2.0 products not so that if something occurs you know how to
respond appropriately.
I’ve been talking about.
And then there are other only meet scalability re- SIEM 2.0 has built-in incident
management which reduces the cost of
SIEM 1.0 products that
have acquired integrated log quirements in terms of col- responding and managing incidents. For
example, SOX requires privileged-user
management technology.
They’ve bolted it on and tried to lection, but they present that monitoring. which is needed to monitor
users who have “the keys to the kingdom”.
make it work with their SIEM 1.0
platform and some will be better information Being able to bring all the log data in
across the entire IT infrastructure enables a
at that than others.
There are also log management effectively to users.” level of privileged-user monitoring that is very
difficult, if not impossible, to achieve without a
vendors that have gone out and centralized logging solution.
acquired security event management Finally, there’s file integrity monitoring, which is
technology and tried to integrate those. often a specific requirement of PCI to detect when a file is
The success of these endeavours will be accessed, modified, read or moved. This functionality is much
dependent upon how well they’re able to integrate this more powerful when it’s an integrated part of a SIEM 2.0 platform.
functionality. I certainly think those organizations and products designed Those are the highlights, but there are numerous areas where SIEM 2.0
from the outset to do both and provide this SIEM 2.0 platform truly have can help a company achieve compliance coverage. Personally, I think SIEM
an advantage. 2.0 is quite a bargain for the money, because you get a lot of compliance
coverage and value with a single solution. And you can also implement
AK: I THINK IT’S IMPORTANT TO LOOK AT COMPLIANCE mitigating controls for a lot of other areas, plus you have the ability to
BECAUSE NO DOUBT OUR AUDIENCE ARE FINDING THAT monitor and report certain types of activity.
STANDARDS LIKE PCI-DSS, SOX AND SO ON ARE CAUSING With SIEM 2.0 you have a very large platform for detection. Combined
THEM NIGHTMARES. SO HOW IS SIEM HELPING USERS COPE with the other value that data can bring to the IT help desk to support the
WITH THESE STANDARDS? internal audit process, application developers and so on, I think you get a

CP:
lot of value for your dollar with the SIEM 2.0 platform—beyond immediate
SIEM can help in a variety of ways. One is the log management compliance needs. So I think it’s very good thing to consider early on as
component which collects data, archives it, safeguards it and allows you to part of your overall compliance strategy.
retrieve it—months or even years later. Then there are the more traditional
security event management capabilities in terms of real-time monitoring,
incident management, remediation and support. Chris Petersen combines extensive
A lot of standards require you to look at daily logs, centralize and industry experience in information
safeguard them, and keep them for a certain period of time. SIEM 2.0 assurance and network security
products can help automate that process, increase capability and significantly with an innovative approach to
reduce the cost. Compliance is probably one of the biggest drivers in the technology. This drives LogRhythm’s
market right now in terms of people purchasing SIEM 2.0 platforms. strategic vision of delivering the
Next is automatic log analysis and reporting. SIEM 2.0 can help to most comprehensive Log and Event
automate a lot of the analysis requirements and provide scalable, consistent Management solution on the market
and consolidated reporting across all of that data. To do that in any today.
reasonably-sized environment without a SIEM 2.0 solution in place capable Chris has served on the faculty
of automating much of it would be very, very difficult. of the Institute for Applied Network
There’s also exception detection. Compliance requirements often Chris Petersen Security, has numerous speaking
call for specifically looking for things that should not be occurring on the CTO AND engagements, and is frequently quoted
network. SIEM 2.0 can help detect the movement of data between the PCI CO-FOUNDER, in industry leading publications.
environment, for example, and external networks, automatically building LogRhythm He holds a degree in Accounting/
rules to notify administrators appropriately. Information Systems from Colorado
Next is central intrusion detection, monitoring, analysis and response. State University.

34
HEAD TO HEAD ■ DATA LOSS PREVENTION

Working hand-in-hand

http://www.GlobalETM.com

F
inding and implementing a DLP solution that
works across your infrastructure is key to
staying secure in the face of new technologies.
AM: I think the key is content awareness, as Katie says. This brings a
whole new dimension to the ways we’re able to secure information.
ETM’s ALI KLAVER talks to KATIE CURTIN-
MESTRE and ANDREW MOLONEY (RSA, THE AK: WHAT REALITIES ARE DRIVING THE ADOPTION OF DLP
SECURITY DIVISION OF EMC) about the role of SOLUTIONS?
content awareness in successful DLP implementation
AM: I think we’re seeing an unprecedented shift in the way we
operate businesses, both around the world and obviously here in Europe
AK:THERE IS A LOT OF CONFUSION IN THE MARKET AROUND as well.
WHAT CONSTITUTES A DATA LOSS PREVENTION SOLUTION. Just think about, for example, the number of different identities that now
CAN YOU SHARE HOW YOU DEFINE THIS TERM? operate in your organization. We don’t just have employees any more—we

KCM:
have contractors, temporary employees of various descriptions, suppliers
The term we use is the same as the analyst community— accessing our data, and we have our customers increasingly self-servicing
specifically the Gartner definition. Gartner defines a data loss prevention their requirements.
solution as tools that are used to prevent inadvertent or accidental leaks or If you think about the amount of information we’re creating now,
exposure to sensitive enterprise information, using content inspection tools. it’s being generated at an unprecedented rate. Then we’re accessing that
The key part is that these solutions use content inspection to protect the information across an increasingly complex infrastructure.
data. A solution that does encryption of your hard drive, for example, does It’s also about mobility and the way in which we’re virtualizing and
help to prevent the loss of data, but would not be a DLP solution as per the looking at cloud computing. All of this creates a very complex challenge for
definition that the vendor and analyst community are using. securing information.

36
DATA LOSS PREVENTION ■ HEAD TO HEAD

When we think about the risks that data protecting sensitive information stored in the
is being exposed to as it moves between these data centre whether that is your databases, AK: YOU’RE BOTH ABSOLUTELY RIGHT,
various people and types of infrastructure, we SharePoint sites, your file servers and so on. AND IT’S ALSO ABOUT BRINGING
need to take a completely different approach to This is important so you can protect your IT BACK TO A MORE BASIC LEVEL
how we secure information. information across the infrastructure with one AND UNDERSTANDING HOW YOUR

KCM:
way to define a policy, and one way to protect INFORMATION WORKS, WHERE
The other thing I would add the information. IT GOES, HOW IT’S USED AND SO
is that there are two main reasons now that Another key consideration of any particular ON. THOSE CONSIDERATIONS ARE
customers typically deploy a DLP solution. solution is to look at the investment that has ALSO VITAL IN CONSIDERING A DLP
The first is a need to comply with relevant been made around developing the policy SOLUTION.
regulations, for example around protecting library to define what information is considered SO, DOES A DLP SOLUTION
credit card data, or perhaps relevant regulations sensitive. REALLY HELP A CEO TO SLEEP BETTER
either EMEA-wide or in particular countries You also want to look at the accuracy of the AT NIGHT? AREN’T THEY MORE
around securing the personally identifiable policies offered by the vendor. The accuracy of a CONCERNED ABOUT CONTROLLING
information of clients. solution is very important because it has a lot to THEIR SENSITIVE DATA THROUGH
The other big driver is securing intellectual do with whether you can prevent sensitive data ENCRYPTION, ACCESS CONTROL AND
property, and that’s any information that might from leaking out of the organization, but more DATA CONTROL STRATEGIES VERSUS
be sensitive to the business, from road map importantly it has a major TCO element to it. ADOPTING DLP?

KCM:
information to customer contact information. If you have a lot of false positives, that means
There was a case of this recently in the UK you need more security analysts to sift through I think that control strategies
where a Telco suffered a large data breach from those incidents that are not legitimate. are very important in protecting sensitive
employees obtaining information about the The other key thing to look at is how well data but in and of themselves are probably
mobile contracts of their clients to sell back to the solution integrates with other security insufficient.
the competition. products in your environment. For example, When we work with clients who have

AM:
how does the solution integrate with whatever deployed DLP we find that the reason sensitive
That’s just one of many examples tool you might be using for Security, Event and information is often put at risk is not due to lack
we’re seeing. I was reading a story that’s just Information Management? of controls, but rather issues around broken

AM:
come out on the wire where 100,000 German business processes within an organization. This
credit cards have been recalled following a I’d like to add another level here. is often related to issues around the education of
suspected security breach at a Spanish payment As you move around Europe we’ve got the the end user of the company’s security policies.
processor. implementation of the various European A good case in point here is one of our
We’re operating across multiple boundaries directives, like the European Privacy Directive, customers who found that every day at around
and these breaches, while they obviously put for example, and they’re all slightly different 5pm the employees were sending out sensitive
individuals at risk potentially, are also incredibly across the markets in Europe. information from work to their hotmail and
damaging for the organizations involved. I think it’s important when you’re choosing Gmail accounts. After looking into it further, it
When we think about the complexity of the a technology that you’re also choosing a long turned out they were doing this because they
infrastructure we’re now trying to protect, it’s term partner who has the critical mass and wanted to continue to work from home, and
clear that traditional security controls just aren’t the ability to continue to develop that content were doing so
able to meet the challenge. library at the speed with which regulation and because
best practices evolve in your particular they
AK:I COMPLETELY AGREE, IT IS market.
BECOMING MORE COMPLEX ACROSS I’d also re-emphasise the
THE BOARD, PARTICULARLY WHEN
YOU’RE TALKING ABOUT THINGS
point that you made, Katie. The
great thing about DLP is it
“... find the champi-
LIKE PCI AND MIGRATING INTO
VIRTUALIZATION. SO WHAT SHOULD
adds content awareness to
your overall information
ons in your organization
CUSTOMERS TAKE INTO ACCOUNT
WHEN SEARCHING FOR DATA LOSS
security strategy, and
this system level view of
that really care about protect-
PREVENTION SOLUTIONS TODAY? your overall information ing sensitive data and who are
KCM:
security infrastructure and
One key consideration
is to evaluate DLP solutions that can
the degree to which the
DLP technology enables
going to be the advocates for
protect information holistically across the
infrastructure.
the rest of your policy and
strategy, becomes incredibly
deploying a data loss preven-
It’s not only those solutions that can
find sensitive data on the end point, but also
important.
Selecting not just best in class
tion solution.”
solutions that can address the requirements technology but also best in class
to protect sensitive information travelling via in terms of integrating into a broader
the network, and also looking at finding and system becomes really critical as well.

37
HEAD TO HEAD ■ DATA LOSS PREVENTION

found their corporate VPN too cumbersome LEVEL. MANY CUSTOMERS ARE DLP Assessment Tool

F
to use. WORRIED THAT THEY MIGHT
So DLP will help you uncover broken RUN INTO PROBLEMS DEPLOYING or customers who want to under-
business practices and educate the end user DLP DUE TO CONCERNS AROUND stand their risk profile for securing
about the important role they need to play in EMPLOYEE PRIVACY, SO HOW CAN THIS sensitive data
terms of securing sensitive information. If you CHALLENGE BE ADDRESSED?

KCM:
simply block people’s activities you might not Together with the research firm
get to the root cause of why people are behaving We run into this issue quite Aberdeen Group, RSA is offering a compli-
the way they are. a lot. It comes up globally but I would say it mentary web-based tool to help enterprise

AM:
especially comes up in EMEA where the laws companies assess their current capabilities to
Equally, if you started to block protecting the rights of the employees are quite safeguard sensitive data. Based on over 22 years
some of these activities that are happening in a strong. of customer research conducted by the Aberdeen
blanket ban type of way you’re also potentially We recently addressed this issue at the RSA Group, this tool benchmarks customer’s data
impacting your business. conference where we convened a panel with protection practices relative to their peers and
What Katie’s example just described was Stewart Room from Field Fisher Waterhouse also quantifies the cost savings associated with in-
people working from home and actually adding who’s an expert in IT and privacy, as well as one vesting in DLP based on the number of security/
value to the business—do you really want to of our customers in Europe from Scandinavian audit incidents and the cost per incident. This
stop that, or do you first want to understand Airlines, and we discussed this issue at length. online survey assessment takes approximately 10
the nature of the information that is potentially What we found during the panel discussion minutes to complete, and delivers a customized
being put at risk by exposing it on a public email is that it’s very possible to proceed with a DLP report to help you understand your organization’s
system? implementation, even in organizations where current capabilities for safeguarding critical data.
Often we talk about moving from a scenario employee privacy is a big concern.
where it’s about bad people trying to do bad The keys to success are threefold. First, your Begin the complimentary data loss prevention
things, to one where the primary risk is good company has to have an established, enterprise- assessment at http://rsadlpassessment.aberdeen.
people doing dumb things. I think DLP is a wide network or systems usage policy. If that com
fantastic enabling technology to address many policy is in place and it clearly states that emails

KCM:
of those kinds of risks. They’re either doing may need to be monitored, you’re going to be
things because the systems and processes don’t able to move forward with your DLP project We would recommend
allow them to work any other way, or they’re with confidence. starting with an implementation either within
fundamentally badly educated in terms of Second, it’s important to ensure the network or looking at data at rest, because
security risk. transparency so employees are aware of the you’re going to see a more effective return on
So DLP, in its ability to provide security activity and that a DLP solution is in place. your DLP.
controls around unstructured data and The third point is an organizational one. The network is a good place to start because
data which is living outside of The security team have to work it’s a lot more straightforward to implement.
the normal databases and with the relevant stakeholders After deploying the project you’re going to have
normal controls, is from the human resources a good sense of what sensitive information is
incredibly powerful department, legal and moving through your email or being leaked out
in that context.
“...evaluate DLP the employee union
to ensure there is
over the network. The value of looking at doing
a data loss prevention project within your data
AK: THAT’S
A GREAT solutions that can pro- project buy-in. If
you follow these
at rest or data centre is it really helps you to get
to a more proactive stance.
EXAMPLE—
IT’S NOT tect information holisti- best practices it is
possible to be able
We often find that customers don’t even
know where their sensitive information is,
NECESSARILY
THE cally across the infra- to implement DLP
successfully even in
especially in unstructured repositories like
SharePoints and fileservers. So if you do have
MALICIOUS
SHARING OF structure. ” organizations where
employee privacy is an
sensitive information on your end point then it
came from somewhere else, and you really want
INFORMATION, issue. to find out where that information is and what
IT’S PEOPLE WHO steps you can take to protect it.
ACTUALLY WANT TO AK: PERHAPS WE After getting to a roll out of DLP in your
WORK FROM HOME AND SHOULD GIVE SOME ADVICE network and looking at your data at rest, the
ARE UNAWARE OF ANY OTHER TO OUR AUDIENCE ABOUT next step is to tackle the end point. If you start
WAY TO DO IT. I THINK IT’S VITAL TO BEGINNING THEIR DLP INITIATIVE. out on the end point and there are challenges
UNDERSTAND EXACTLY HOW YOUR WHERE IN THE INFRA STRUCTURE with the project, you end up blocking people
INFORMATION IS BEING USED AND IS THE BEST PLACE TO START A DLP from doing their work and can raise a lot of
WHAT THE MOTIVATION IS BEHIND PROJECT? MANY OF OUR READERS ARE other issues. You might end up having problems
PEOPLE DOING THESE SORTS OF VERY CONCERNED ABOUT SECURITY with your DLP project before you can get it off
THINGS. ON THE END POINT, FOR EXAMPLE, SO the ground.
LET’S TAKE IT TO ANOTHER IS THIS THE BEST PLACE TO START? The other thing that we think is really

38
DATA LOSS PREVENTION ■ HEAD TO HEAD

important, along with looking at where within deploying DLP because they have a
the infrastructure to start a DLP project, is vested interest in protecting their
what steps to take. We recommend starting intellectual property.
first by monitoring what’s happening in
your organization as it relates to sensitive
The other thing to look at
is quantifying the value of “When we think
information, moving from monitoring to
then auditing what is occurring and looking
deploying DLP within an
organization. It’s going to about the complexity of
to address issues around broken business
processes or end user education.
center around looking at
the number of security the infrastructure we’re now
The last and final step is actually blocking
people from sending data on thumb drives,
incidents relating to
sensitive data and also trying to protect, it’s clear that
blocking email communications and so on.
Following that three-step process, versus
the cost per incident.
We have found traditional security controls
jumping to a blocking, will enable more
successful projects.
that companies that
deploy DLP not only just aren’t able to meet the
AM: Let me underline that with an
reduce the number of
security incidents, but also challenge.”
example and reinforce Katie’s point. In the last reduce the cost of addressing The
week or so, I’ve been reading about my local an incident over time, and that other
council here in the UK who have had three also shows how you can quantify piece
laptops stolen, one of which contained 14,000 the benefits of deploying DLP in an that I’d add
records of people registered for postal voting. organization. is something we

AM:
You have to ask yourself, how did 14,000 talked about earlier. This is the integration
records end up on a laptop? With the right DLP I’d say number one is to not with other parts of your information security
controls in the network, you’ve got to believe try and boil the ocean. In any successful infrastructure—specifically a Security,
that potentially those records might never have information security strategy you’re going to Information and Event Management platform.
ended up on a laptop, and might have stayed take an information-centric and risk-based If you think about the additional power
safe and secure back in the infrastructure, on a approach to defining where your priorities that might be gained from making that platform
server and under tighter control. really lie. content-aware, so that you can now see a
I think that’s a good example of where Figure out what the information is that you security event and can understand the kind of
an end point strategy would have been the really care about and what the real risks are, and information that is being put at risk, then that
secondary line of defense as opposed to the that will give you a really good starting point in gives you a very powerful platform to build out
primary line of defense. Then the stolen laptop figuring out who the key stakeholders are and the business case. It also helps management
would have been far less of an issue had that how to move the project forward in a practical and the decision makers in your organization
information not resided on it. and meaningful way, as well as giving you understand why you’re prioritizing the various
the best return on investment in the shortest projects and stages of a project.
AK: THAT’S A FANTASTIC EXAMPLE. possible time.
WHAT ADVICE CAN YOU GIVE
CUSTOMERS WHO ARE LOOKING
TO BUILD A BUSINESS CASE FOR
DATA LOSS PREVENTION IN THEIR
ORGANIZATION?

KCM: One of the most important


things is to find the champions in your
Andrew Moloney
DIRECTOR OF
Katie Curtin-Mestre
DIRECTOR OF
MARKETING, PRODUCT
organization that really care about protecting MARKETING
EMEA
sensitive data and who are going to be the RSA
RSA
advocates for deploying a data loss prevention
solution.
For example, if your project is more Andrew is responsible for ensuring the Katie Curtin-Mestre is the Director of Product
compliance-oriented, you want to have the legal communication of RSA’s strategy and approach Marketing at RSA, The Security Division of
team and your compliance organization behind for identifying, assessing and mitigating EMC. In this role, she is responsible for market
you and in favour of moving forward with the information risk. strategy development, go-to-market planning
DLP project. Previously responsible for RSA’s business in and execution, and business analytics.
If your concern is more around protecting the EMEA Financial Services sector, he brings a Prior to RSA, Katie held a variety of product
intellectual property such as road map wealth of experience and knowledge to the topic. marketing and product management roles at
information or data, then the relevant business He has wide experience in the industry, having EMC in the storage resource management,
unit owners or people within a functional worked for both established and start-up com- storage virtualization, replication and storage
organization are going to be advocates of munications, software and mobile vendors. hardware market segments.

39
Could you use a little
direction when
choosing a
DLP solution?

One company is ready to guide you.


Visit www.rsa.com/SelectingDLP and download
“Five Considerations for Selecting a Data Loss Prevention Solution.”
ITSM—
payback time?
Responding to change quickly and effectively while keeping an eye on the bottom line is proving to be problematic for a lot
of organizations. CLIVE LONGBOTTOM (QUOCIRCA) tells us why ITSM is great for business.
ANALYST FEATURE ■ IT SERVICE MANAGEMENT

I
In many organizations, more money is spent MAKE ITSM WORK FOR YOU and therefore even more prone to problems and
keeping the IT infrastructure running than is T Service Management (ITSM) is one way expensive to manage.
invested in new IT capabilities used for supporting for IT departments to gain control over the ITSM comes to the rescue as it drills in to each
the business. And yet, the vast majority of servers IT infrastructure, and to do it in a manner machine and builds up a complete picture of what
in use are running at less than 10% utilization. that can make IT far more capable of doing there is on that machine—all the hardware, the
Desktop machines tend to be configured at its job—supporting and facilitating the firmware and the software, along with the revision
different patch levels—or even running with business. and patch level of each item. Then, when a change
a range of operating system versions. Data is Quocirca research (www.quocirca.com/ needs to be made, ITSM can rapidly identify all
duplicated many times over, and storage utilization pages/analysis/reports/view/store250/ devices that can be automatically upgraded.
rates only hit around 30% before someone decides item20971) shows that few organizations know For those that cannot be automatically
that more capacity should be brought in. how many IT assets they have across their directly upgraded with the patch/upgrade due to
Strangely enough, all of this seems to be environment. Without such information very an underlying problem, ITSM can advise on what
hidden from the business because the perception little control is possible, and yet asset inventory needs to be done. If it is something as simple as a
by IT people is (and this is more than likely management tools have been around for new device driver, it can automatically provision
correct) that if the truth were known, there would some time. Once a believable and trustworthy that, and then do the upgrade. For something more
be a few heads that would need to roll. knowledge of the IT inventory has been built up, fundamental (e.g. an old machine that fails to meet
Any business unit that allows inefficiencies including mobile and other occasionally connected the hardware requirements for the upgrade), it can
of 70-90% to continue needs root and branch devices such as home workers’ PCs, ITSM can start be left at its existing level while raising an exception
reform—particularly with the current pressure to add real value. to IT service personnel to identify that this had to
on spending. The biggest issue is not that such On each computing device there is a “stack”— be done—and give the reason why.
inefficiencies are there—it’s that they do not need the software that makes the whole thing do what it Even in cases such as these, many ITSM
to be there. is meant to. This starts down at the firmware level systems can automate the ordering of a new device
IT systems have grown with little control; the of the basic input/output system (BIOS), and then that meets the requirements for the new upgrade.
mindset has been on “one application per hardware possibly a hypervisor (if virtualization is being Once the new kit has been delivered and installed
server”. As a new department or division asks for used), an operating system, possibly an application in the data centre or at the user’s desk, ITSM can
something, a new application is provisioned on a server platform, and then the application or service then ensure that the new device is brought up to
new server. Each decision in itself probably made that is required to carry out a given function or date by checking its configuration and automating
sense at the time, but the problem with the sum series of functions. any updates as required.
total of all decisions is that many organizations now The trouble is that each link in this chain This then brings in other areas of ITSM, for
have IT systems that are out of control, with little can (and does) change. There will also be example, the help desk. Cutting out manual tasks
real knowledge of what is there and what it is doing. dependencies up and down the chain—a change means more cost savings, and in many cases,
at the application level may well be dependent efficiencies are introduced that can really start to
on device drivers held at the operating system provide payback. For example, providing web-
layer. Therefore, manual updates across a large based self-service to users for areas such as resetting
IT inventory can lead to multiple failures, passwords means that help desk staff are freed for
requiring the rolling back of the other more complex or challenging activities.
change to a known position, and Enabling web-based ordering of IT and office
then manual updates to the equipment can ensure that employees order from
dependent underpinnings. authorized suppliers—maximizing volumes and
This is expensive, so optimizing discount levels. Self-service portals
prone to error, and can enable users to request specific software that
many machines can then be provisioned to them automatically, and

“ITSM... should be
will either end cross-charged accordingly.
up in a hybrid or ITSM tools can track software licences as

seen as a core invest- unknown state,


with the manual
part of a machine’s inventory, ensuring that an
organization is neither under- nor over-licensed.
ment, as a necessity, changes carried
out making each
Many ITSM systems automate the movement of
licences from one machine to another which is very
as a competitive machine different cost-effective where concurrent licensing is allowed.

advantage.”

42
IT SERVICE MANAGEMENT ■ ANALYST FEATURE

“IT systems have


grown with little
control...”

S
BUILDING COMPETITIVE ADVANTAGE start with, but will increasingly need less as their help desk staff that can be spent on business issues.
o, the main benefit of ITSM is faith in ITSM grows. If ITSM can be used to gain None of the thing previously mentioned
automation—cutting out much sufficient control over an IT environment to change particularly stretch targets, yet just imagine how
of the expensive and error-prone the operational expense/investment spend ratio by the business would view such savings. ITSM
human activity from IT management just a few percentage points, it can make a major should no longer be seen by an organization as a
processes. However, the majority difference to most organizations. cost or as a “nice to have”: it should be seen as a
of ITSM systems acknowledge that many The worst organizations are running at around core investment, as a necessity, as a competitive
organizations will not want everything fully an 80/20 ratio—if this can be moved to only advantage.
automated from the get-go. Therefore, the majority a 70/30, an organization will be investing 50% If not, the risk is that everyone else will go
of processes will still include the kicking off of more in supporting the business. If the utilization for full ITSM—and then the lack of it is a definite
events that include human interaction, even if it is of server hardware can be increased to 20% from competitive disadvantage. ITSM not only brings in
only to validate and agree a course of action that 10%, then half the amount of hardware will be control, it also brings in flexibility. Without ITSM
ITSM will do automatically anyway. required—with the concomitant savings in power an organization will always be fire fighting and will
Quocirca has found that most organizations that go with this. If 20% less calls come through to be unable to respond to change as rapidly as the
require a high degree of human intervention to the help desk, you gain 20% more time from your business requires.

Clive Longbottom
SERVICE DIRECTOR, BUSINESS PROCESS FACILITATION, Quocirca

In his position Clive covers the need for companies to understand the core processes in their value chains, and the
technologies that should be utilized to facilitate these processes in the most flexible and effective manner. In his
remit, Clive covers collaborative tools, workflow, business process discovery and management tools, service-based
architectures and outsourcing, as well as other associated areas such as security, voice/data convergence, and IT
asset optimization.

43
GARTNER SYMPOSIUM/ITXPO

THE WORLD’S MOST IMPORTANT GATHERING


OF CIOs AND SENIOR IT EXECUTIVES

BALANCING COST, RISK AND GROWTH


Symposium/ITxpo 2009® is designed to deliver the insight,
tools and relationships you need to get through what may be
the toughest year of your career. More than 200 presentations
delivered by world-renowned Gartner analysts will cover all
facets of how business technology can help you strike the right
balance between cost optimization, risk mitigation and a carefully
timed return to growth. In challenging times, organizations rely on
their leaders.

IT leaders rely on Symposium.

Vision ROI
Meet IT’s best minds. Immediately actionable
Keynotes by top CEOs. take-aways for each of nine
IT leadership roles.
Experience
CIOs, senior IT executives, and Solutions
industry experts conferring on The world’s top technology
tough challenges. companies across IT.

Visit gartnerinfo.com/symposium/etm for an exclusive Enterprise Technology Management discount on


your registration.

18 – 22 OCTOBER, ORLANDO, FLORIDA


GARTNER.COM/US/SYMPOSIUM
© 2009 Gartner, Inc. and/or its affiliates. All rights reserved.
Gartner is a registered trademark of Gartner, Inc. or its affiliates. 2 – 5 NOVEMBER, CANNES, FRANCE 2009
For more information, e-mail info@gartner.com or visit gartner.com. GARTNER.COM/EU/SYMPOSIUM
The world’s most important gathering
of CIO’s and senior IT executives
CHANGE MANAGEMENT ■ HEAD TO HEAD

The season for change


T he management of IT change can make or break effective IT service management. SCOTT CRAWFORD
(ENTERPRISE MANAGEMENT ASSOCIATES) moderates a discussion with GEORGE GERCHOW and
JOHN MURNANE (EMC) who say that change management is central to assuring the quality of IT.

http://www.GlobalETM.com

SC: CHANGE MANAGEMENT IS SOMETHING THAT WE AT OF YOUR PROGRAM. IT SOUNDS LIKE THAT’S BEEN THE
EMA RECOGNIZE AS BEING CENTRAL TO A NUMBER OF VITAL EXPERIENCE OF YOUR CUSTOMERS AS WELL, JOHN.

JM:
IT INTERESTS. IT CAN CERTAINLY BE A KEY ENABLER OF
PERFORMANCE AVAILABILITY AND SERVICE LEVEL DELIVERY I think you’ve both referred to a couple of critical things here.
WHILE PROBLEM/INCIDENT CHANGE CAN BE AT THE HEART One is, knowing what to measure. That sounds very self-evident but it in
OF SOME OF IT’S GREATEST PROBLEMS. effect defeats people before they even get out of the gate.
EMC HAS IDENTIFIED FOUR CRITICAL SUCCESS FACTORS It’s very closely related to something you referred to Scott which is that
FOR CHANGE MANAGEMENT—CAN YOU DESCRIBE EMC’S people design processes but often fail to execute them. And because you’re
TAKE ON THIS GEORGE? not executing them, you don’t really have anything to measure, and when

GG:
you design these processes you have to consider those two key factors.
I think it starts off with visibility. A lot of organizations don’t How am I going to execute these processes? Can I execute them? Are these
have clear visibility to what changes are taking place, especially if they go practical, tangible things that I can drive into my organization? If they are
outside of the process. that will be very closely aligned to what you can measure.
We’ve started to get to the point where people are using workflow or I know this sounds slightly vague, but the most common issue we have
change management processes, but what’s really important is having that is where people have engineered metrics for their performance that can’t
visibility across the IT infrastructure. be measured. They pull together lots of different data from lots of different
Another factor is lSO—what is the impact of the change that actually silos every month and just bring it together.
took place? That leads to accountability. So if I have visibility into the This is a major issue in a number of businesses both internally and in
changes, now I have accountability as well. terms of relations to your outsourcers and so on. I know it’s slightly off
Let’s say that you’re supposed to patch 1000 systems, or update 100 topic, but we have people in the business world doing a lot of interaction
different router’s IOS’s. Did you really do that or not? How many people with third parties, and in a lot of the cases they’ve outsourced the
go in and verify that those changes took place? So we see that visibility also management of critical bits of their infrastructure. But what they’ve
leads to accountability. struggled to do is drive a change process that incorporates all those players.
The other side of that is measurement. Now that I have visibility and There are different drivers and different demands, but the trick is to
accountability, I can start measuring my change management process. work out exactly what it is you need to measure.

SC: FROM EMA’S PERSPECTIVE THE THINGS THAT ARE MOST SC: THAT’S ONE OF THE THINGS WE’VE SEEN AS BEING A
CRITICAL ARE DEFINING YOUR CHANGE MANAGEMENT CRITICAL SUCCESS FACTOR, CERTAINLY IN AREAS SUCH AS IT
PROCESSES AND IMPLEMENTING THEM. GOVERNANCE AND RISK CONTROL. HAVING SUPPORT FROM
NEXT IS MONITORING THE ENVIRONMENT OR SENIOR MANAGEMENT IS ABSOLUTELY ESSENTIAL BECAUSE
CAPTURING THAT VISIBILITY, BUT MEASUREMENT IS ALSO WITHOUT IT YOU ARE HANDICAPPING YOUR ABILITY TO SEE
IMPORTANT TO MONITOR THE SUCCESS AND EFFECTIVENESS THROUGH A MATURE APPROACH TO CHANGE MANAGEMENT.

45
HEAD TO HEAD ■ CHANGE MANAGEMENT

JM: It continues to fascinate me in the world of today the amount of


businesses that still need to address that question. The stability of your IT
GG: You need a separate process for an emergency change. For
example, I was the worst possible person to work with in IT when it came
infrastructure is now becoming a critical metric of the performance of your to emergency changes because I was fighting fires all the time. It’s an
business and is directly connected to your ability to compete and deliver emergency change, it’s late in the change management process, and I had to
revenue and your goods and services. get them through.
In change management it’s dangerous to elevate one process over The issue is that there’s not enough time and visibility to understand
another, but I believe the benefits of change management are so stateable the impact of an emergency change, what the cause and effect is going to
in terms of getting control of that infrastructure in order to effectively drive be and if everything gets audited and logged. So there has to be a separate
the profitability of your business, that it’s rapidly reaching the point where process that has accountability for emergency changes and how often
it’s an essential function. they’re being done.

SC: THAT’S A VERY GOOD POINT AND I THINK A LOT OF


ORGANIZATIONS ARE SEEING THIS AS REFLECTING THE
JM: I agree George, I think emergency changes often cause people
the most trouble because you actually do your change management
MORE MATURE ORGANIZATION. CAN YOU TALK ABOUT retrospectively. You don’t have time to get the CAB together and drive it
THE IMPACT CHANGE CONTROL HAS AND THE BENEFITS through all the forms, so you make the change, but what’s critical is that you
OF IMPROVING STABILITY AND RESOLVING SOME OF THESE retrospectively understand why.
ROOT CAUSE ISSUES THAT LEAVE BUSINESSES IN FIRE And what you do then, coming back to this cycle of visibility, is that
FIGHTING MODE SO MUCH? you’re able to measure the emergency changes you’re having more critically.

GG:
For example, I have a series of emergency security changes. Is it because
From our standpoint change management is the absolute key I’ve got a flaw in my security? So we see the essence of change management
because if you just mention the two changes you save, I think configuration is about stabilizing your business.
would be the same if things didn’t change.
Security policies for example—my standards would be the same if SC: THIS SPEAKS TO ONE OF THE METRICS FROM OUR 2008
things didn’t change. My services would not go down if things did not STUDY AT EMA THAT WAS REALLY INTERESTING TO US:
change. If they can get a good solid change management process that has WHEN WE SURVEYED ORGANIZATIONS IN TERMS OF THE
visibility and accountability, then they’ll be ahead of the ball game. GUIDANCE IT ORGANIZATIONS ADOPT MOST, ITIL CAME OUT
Let’s also not lose sight of governance. As a security person, or as a line ON TOP AS THE ONLY ONE ADOPTED BY A MAJORITY, AT 55%.
of business, if I can have visibility into what changes I keep making to the NOR WAS THE NEXT MOST COMMONLY ADOPTED GUIDANCE
infrastructure that may impact our parts of the organization, then that’s key. ANY OF THE COMPLIANCE- OR GOVERNANCE-RELATED
STANDARDS OR FRAMEWORKS SPECIFIC TO IT—IT WAS
SC: OBVIOUSLY ONE OF MY PRIMARY INTERESTS IN CHANGE QUALITY MANAGEMENT.
CONTROL IS ITS IMPACT ON SECURITY. GEORGE, HOW DOES TALK TO US A LITTLE BIT ABOUT BRINGING BUSINESS
CHANGE MANAGEMENT AND SECURITY WORK TOGETHER, QUALITY, IT AND CHANGE MANAGEMENT TOGETHER.

JM:
AND WHAT DOES A MATURE APPROACH HAVE TO DO WITH
AN EFFECTIVE RESPONSE TO A SECURITY ISSUE? Quality practice standards are very much driven by constant

GG:
examination of the business to understand what changes you can make to
Well, there’re a couple of different ways to look at it. The first continually improve the quality of what you’re doing.
one is that not enough security people have a role within change control In many ways they predate the ITIL or IT management framework
or a change advisory board (CAB). Change directed by business or IT can and I believe there’re trying to achieve the same goal. ITIL is about how
affect the security and compliance posture especially when it comes to PCI. you manage your IT functions effectively and ensure quality initiatives,
The other side of it is that when a security guy wants to push a change specifically how you run your business to induce best practice.
out there—how is that going to impact our business? We have to be able to They’re set out in a very similar place and, as a result, in organizations
do business first and we have to be able to service our customers. who adopt ITIL and already have Six Sigma best practice or similar
Missing those things really makes the change management process frameworks in place, they tend to be very successful because they
ineffective, and you’re shooting things out to the environment without understand continual service improvement and examination.
understanding what the cause and effect is going to be on the business. You design a process and within that process you have an actual
methodology to continually improve and guide it, and I believe they’re very
SC: ONE OF THE THINGS I HEAR ABOUT FAIRLY OFTEN IS similar in intent.

GG:
THE QUESTION OF HOW TO BALANCE A WELL-DEFINED
APPROACH TO CHANGE CONTROL WITH THE NEED TO I’m in complete agreement. I think that Six Sigma approaches
RESPOND TO AN EMERGING HIGH-PRIORITY VULNERABILITY and continual service improvement lie really well with ITIL. People pick
OR THREAT, PARTICULARLY WHEN AN ACTIVE EXPLOIT IS up ITIL first for their organization to get IT running, but then they need to
CIRCULATING IN THE WILD. start putting measurement in place and then improvement which takes us
HOW DO HIGH-PERFORMING ORGANIZATIONS DEAL to the fourth step.
WITH THIS SITUATION WHEN AN EMERGENCY CHANGE If I’m going to improve my overall infrastructure, I have to start finding
CANNOT WAIT THROUGH THE SOMETIMES VERY DELIBERATE deficiencies to create projects to get better when it comes to my quality of
PROCESSES A CONFIGURATION CONTROL BOARD MAY service delivery from IT to the business.
REQUIRE FOR LESS URGENT CHANGES? As an example, one of the best questions I’ve ever heard in my life

46
CHANGE MANAGEMENT ■ HEAD TO HEAD

about improvement was a management service SC: PLUS THE OPPORTUNITY THAT MANAGEMENT AND VIRTUALIZATION
provider who said they were going to a virtual MAKES THE CASE FOR INTEGRATING TO WORK TOGETHER AS A KEY
infrastructure but they wanted to know if SECURITY MORE EFFECTIVELY INTO ENABLER FOR A TOP-DOWN APPROACH
the virtual machines were more efficient at THE VIRTUALIZED ENVIRONMENT. TO IT GOVERNANCE.

JM:
delivering IT services to the business. Do they WHAT ARE SOME OF THE ASPECTS
have more incidents, more problems, and Absolutely, there’s no question in OF CHANGE METRICS THAT ARE
more staff members working on those virtual my mind that virtualization creates a whole DIRECTLY RELEVANT TO SECURITY?
machines than I do my physical machines? Until raft of additional security considerations. The YOU ALLUDED TO PRIORITIZING
I can answer those questions I cannot fully say decision to move into that virtualized space VULNERABILITY REMEDIATION AND
that the virtualization move for my organization should directly involve the security function EMERGENCY PROCESSES—HOW
what a good one. and CAB. DO ORGANIZATIONS DETERMINE
The only way to start doing that is to put Virtualization is a great example for ITSM. AND MEASURE WHAT IS MOST
analytics and metrics across the virtual and You get what happens in IT because it’s such IMPORTANT AS PART OF A MATURE
physical environment and asking which one has an immature function which is proven by the CHANGE MANAGEMENT PROCESS
the greatest cost in the environment. fact that the underlying technologies change THAT RECOGNIZES THE IMPACT OF
so rapidly. Virtualization goes from having a SECURITY?

GG:
SC: THAT’S A GREAT POINT, BECAUSE one-to-one relationship between a physical
VIRTUALIZATION IS HAVING SUCH server and a host to having a one-to-many. That Here’s where the line of business
AN IMPACT ON THE BUSINESS, AND creates, by default, massive security issues— shouldn’t control the entire change process.
THIS IS AN AREA THAT IS CENTRAL never mind the management issues. For example, when I was working for a financial
TO ASSURING AN EFFECTIVE In turn you’ve got compliance, governance organization they decided to buy software that
VIRTUALIZATION STRATEGY. and so on, and what happens in IT is that required all of the back end sequel databases
HAVING VISIBILITY INTO people rush in to stop new technologies because to have blank SA passwords. Come the day of
THE CONFIGURATION OF THE the reasons to do so are compelling, and implementation they had spent well over six
INDIVIDUAL VIRTUAL MACHINES virtualization is a great example of that. figures, and then here we are rolling it out with
AND COMPLICATIONS WITH blank SA passwords.
THINGS LIKE NETWORKING AND SC: YOU ALLUDE TO THE POTENTIAL How many audits do you think we
COMMUNICATIONS WILL INTRODUCE OF THINGS LIKE PREVENTATIVE would fail because of that, and how many
A NUMBER OF NEW PARAMETERS INTO CHANGE CONTROL WHICH, FROM A vulnerabilities are opened up? Without having
MANAGING THE ENVIRONMENT. SECURITY PERSPECTIVE, SOMETIMES that visibility from a security standpoint it’s
THAT COMES BACK TO OUR GETS GROUPED UNDER THE GENERAL very difficult.
DISCUSSION OF METRICS. GEORGE, CATEGORY OF WHITELISTING. Let’s take software updates. I’m doing a
YOU’VE MENTIONED A FEW, BUT GEORGE, PERHAPS YOU CAN TELL software update within the environment—
WHAT ARE SOME OF THE METRICS US ABOUT THE ADVANTAGES AND what does that software really look like to the 
INVOLVED IN MEASURING AND CHALLENGES OF A PREVENTATIVE
MANAGING CHANGE IN THE VIRTUAL APPROACH TO CHANGE CONTROL?

GG:
ENVIRONMENT THAT GO BEYOND THE Scott Crawford -
EXAMPLES YOU’VE ALREADY SHARED? Sure, I think taking preventative Moderator

GG:
change control is great especially when it MANAGING
One of the first ones is the rate of comes to a virtual environment. In virtual RESEARCH
constant change within the virtual environment environments people are making any changes DIRECTOR,
itself. We talk about virtual sprawl all the they want and most of them aren’t even going Enterprise
time—are my machines moving around the through the normal processes, so I think it’s Management
different types of environments and what’s the a great place to start again by forcing those Associates (EMA)
cause and effect of that to the business? changes to go through, the same way I would in
Another one is how is the virtual the physical environment. Scott Crawford, CISSP, CISM, heads the
environment affecting my PCI or compliance If people are defining service catalogues, Security and Risk Management practice at
posture? Because of the complex virtual then I have to make accountability of what’s Enterprise Management Associates (EMA).
environment, we find that it’s harder for people virtual and what’s not, and I don’t see that a The former head of information security for
to stay compliant because they don’t have that lot. I also don’t see regulatory compliance or the Comprehensive Nuclear-Test-Ban Treaty
visibility. governance. Are these mandated machines? Organization’s International Data Centre
Here is where security is so important. If Are these mandated router switches? How does in Vienna, Austria, Scott has been an IT
security starts getting involved in the change that fit into my service catalogue so I can truly professional in both the private and public
management process and sitting on that CAB, understand the impact of those changes from a sectors.
now they have visibility across not only the security and compliance perspective? A frequent speaker at industry conferences
virtual and physical infrastructure, but across and events, Scott is also a Commercial-certified
the different silos of IT. This gives them true SC: WE’VE HAD SOME LONG TALKS pilot and flight instructor. He can be reached at
visibility into what’s happening within IT WITH YOUR TEAM, GEORGE, ABOUT scrawford@enterprisemanagement.com.
operations and lines of business. THE POTENTIAL FOR CHANGE

47
HEAD TO HEAD ■ CHANGE MANAGEMENT

environment? Let’s say that I have a database start paying more attention to ITIL, ITSM and that didn’t previously talk to each other now do.
that I know is regulatory mandated by PCI, Six Sigma in general because this gives them a Security needs to get close to this planning
however the front end interface does not. And vehicle to tie right into the business. phase and to that architecture, and at the end
now anybody can access that data. of the day that’s what change management is.
SC: I COULDN’T AGREE MORE WITH It all breaks down into processes, ITIL and
SC: JOHN, ONE OF THE THINGS THAT. IN SOME ORGANIZATIONS WE terminology, but at the end of the day we’re just
WE HEAR FROM ORGANIZATIONS, SEE SECURITY OPERATIONS THAT talking about trying to manage your IT function
PARTICULARLY THE LESS MATURE IN HAVE A “RED TEAM” AND A “BLUE more effectively.
TERMS OF ITSM, IS THAT THEY MAY TEAM” COMPONENT. FOR THOSE
BE ITIL SCEPTICS BECAUSE THEY NON-SECURITY PROS, A “RED TEAM”
HAVE NOT EXPERIENCED EFFECTIVE IS BASICALLY THE VULNERABILITY
IMPLEMENTATION. HOW DO THEY ASSESSMENT AND PENETRATION
IDENTIFY THE THINGS THAT REALLY TESTING FUNCTION, WHILE “BLUE
DO DELIVER TANGIBLE BENEFIT TEAM” REFERS TO VULNERABILITY George Gerchow
WITH AN ITIL APPROACH TO CHANGE REMEDIATION AND WORKING WITH DIRECTOR
MANAGEMENT? IT OPS TO IDENTIFY AND RESOLVE OF BUSINESS
DEVELOPMENT
JM:
VULNERABILITIES.
That’s a good question, but my ANY SPECIFIC GUIDANCE AND CORPORATE
answer isn’t necessarily what you’d hear a lot. PARTICULARLY MORE ON THE “RED STRATEGY,
ITIL is a management methodology for TEAM” SIDE IN TERMS OF INCREASING EMC
managing IT. It’s not prescriptive. What it’s AWARENESS AND SENSITIVITY TO
really saying is that you need to manage your IT CHANGE MANAGEMENT PROCESSES, George Gerchow brings 15 years of IT and
function the same way you manage any other AS WELL AS FOR IT OPERATIONS PROS systems management expertise to the application
part of your business. Because IT is immature, TO BE MORE AWARE OF HOW BETTER of IT processes and disciplines that impact
highly volatile and frankly very complex, you TO WORK WITH VULNERABILITY the security, compliance and operational
need to adopt the wisdom and knowledge of ASSESSMENT AND REMEDIATION? status of complex, heterogeneous computing

GG:
a community of people who have evolved this environments.
platform to get you further. It’s got to be a combination of George’s practical experience and insight
Change management is like a balance sheet both process and tools, and this is something from managing the infrastructures of some of
of finance. It’s where you start. The challenge that drives process people crazy when I say it at the world’s largest corporate and government
of managing that function, back to ITIL, is to conferences. institutions makes him a highly regarded speaker
sequence what you’re doing and in what order. The first place to start is dealing with the and invited panellist on topics including ITIL,
I don’t see that discipline can be anything but process. If I can start getting processes defined configuration management and operational and
beneficial to the business. then I’m part of the way there, but I have to security compliance.
have the tools, again, to have the visibility,
SC: DRAWING THAT PARALLEL WITH accountability, measurement, and then
FINANCE IS A GREAT EXAMPLE, improvement across the organization. So I must
BUT WHAT SPECIFIC GUIDANCE start combining those two.
WOULD YOU RECOMMEND TO Most of these tools need to start having
THE ORGANIZATION THAT NEEDS interfaces and integration back into service desk
TO IMPROVE THEIR CHANGE and change management workflows. John Murnane

JM:
MANAGEMENT PROCESSES AND IT SERVICE
SECURITY MANAGEMENT THROUGH It’s no longer possible to plan just MANAGEMENT
IMPROVED CHANGE CONTROL? processes or just tools—nor should you. My SPECIALIST,

GG:
view is that when you move into complex places EMC
A great way to start implementing like virtualization, you will never successfully
and improving it is getting everybody on the manage those environments without being able John Murnane is an ITSM Specialist with EMC
same page and having the right people on the to execute your processes across your combined Ionix, a division of EMC devoted to best practice
CAB across different parts of the infrastructure. tool environment. IT and Service Management. John has over
You have so many different silos when it comes Security blankets the entire IT function and 15 years experience in IT infrastructure and
to organizations that nobody really talks and so does change management, and that’s why processes, gained on both the client and vendor
plays together. they need to sit side by side because they’re very side.
I think change management is a perfect closely related when you’re talking about the John’s extensive experience includes providing
place to start. If you get the right people on actual nuts and bolts of running an IT function. ITSM implementation and consultancy services
it you have one common central repository Once you start automating and controlling to customers of all sizes across all industry sectors.
where you can start seeing changes. And people processes and using very sophisticated toolsets, With a strong understanding of current and future
can start discussing what the impact of those you now create a scenario where it becomes, market demands, John frequently presents on a
changes may be. in principle, easier to create a lot more security wide range of ITSM and industry topics.
I also think that security people need to problems in the environment because things

48
Keep your
eye on IT

EMC Ionix
From Physical to Virtual to Cloud. Next Generation IT Management

EMC’s Ionix portfolio of IT and Service Management solutions delivers the visibility and control
needed to effectively manage your physical and virtualised environments while meeting increasing
service-level requirements.

In short, EMC Ionix helps you realise the business value of IT in today’s rapidly changing environments,
including specific solutions for:

• Automated ITIL Service Management


• Service Discovery and Dependency Mapping
• IT Operations Intelligence and Root Cause Analysis
• Data Center Automation and Compliance

To understand & demonstrate the tangible benefits an ITIL approach can deliver to your business,
visit: www.emcionix.com/servicemanager/uk to access EMC’s ITIL ROI Calculator.

EMC2, EMC, Ionix and where information lives are registered trademarks of EMC Corporation. © Copyright 2009 EMC Corporation. All rights reserved.
EXECUTIVE PANEL ■ THE SERVICE DESK

Future focus

http://www.GlobalETM.com

C
urrent market forces are changing the way we see the future, and the roles of IT service management
and the service desk are only becoming more important for the business. LISA ERICKSON-HARRIS
(ENTERPRISE MANAGEMENT ASSOCIATES) moderates a discussion with three industry experts:
CHRIS WILLIAMS (BMC), TIM ROCHTE (CA) and MATT FRENCH (SERVICE-NOW.COM).

50
THE SERVICE DESK ■ EXECUTIVE PANEL

CW:
LEH: LET’S START WITH TIM AT CA. ONE OF THE MARKET
FORCES SHAPING THE SERVICE DESK OF THE FUTURE IS THE That’s a pretty large topic, but it does have some unifying
SERVICE CATALOGUE AND SERVICE REQUEST FUNCTIONALITY. themes to it.
HOW DOES CA SEE THIS DISCIPLINE AS CONNECTED TO THE Let’s take a look at what organizations are faced with today and what
SERVICE DESK, OR NOT, AND WHERE IS THE TECHNOLOGY they’ve faced historically as far as getting their arms around the different
HEADED? solutions and versions they have and managing the nomenclatures associated

TR:
with the different moving parts in their IT stack, whether it is from internally
We’re certainly seeing that same trend in the market. More and developed releases and products or those provided by vendors.
more IT departments are looking at how best to align with the business, and The CMS definitely plays a very strong and integral part as a unifying
the shift of service catalogues and request management ITIL is critical for reference architecture or structure that organizations can use to better
that. manage all of those different offerings.
We’re seeing it tracking along with the ITIL v3 adoption curve which What sits behind this is a need not only to embrace the technologies—
has been dramatically faster than the v2, largely because it’s building on this can certainly drive that if we’re talking about utilizing, for example, a
that adoption curve in the first place. It starts to tie together the classic federation process, so that we don’t have to replicate all of the data from
service desk best practices in terms of making it a single point of contact different sources—but you still have timely and accurate management of the
and automating the front end etc, as well as providing clear communication references to the different versions that are being consumed.
between IT and customers. There’s also the need to embrace a couple of very basic cultural shifts
When you start looking at a service catalogue you start getting a unified which is one faction that is the missing gauntlet for a lot of organizations—
service model. It gets stored together, all the elements are linked so that that is a dynamic shift to understanding how to properly record names,
everyone can agree on what really matters, and you can bring both service reference and reconcile them.
support and delivery into one cohesive path. Essentially it’s about how to better utilize the disparate standards
What seems to be the driving force is that IT has to start looking at across the entire organization, even though there are some prerequisite
things from a business perspective. They have to describe what they’re doing requirements that have already been identified as common processes.
in business language, provide standardized packages and options that work So does the CMS actually drive this? I think yes, it’s a very strong
well with their customers and the rest of the business, and ultimately provide component. Going back to Tim’s response, when we get down to the
links out to some form of accountability. portfolio level and understand the management practices, then we can
This doesn’t always have to go as far as charge back, although service utilize the CMS to go even further into the vendor
catalogues certainly do start providing that infrastructure, but often it’s just consolidation activities or financial
being used for a show-back and making it possible to have communication considerations that we want to
about what the relative merits of the service are compared to the alternatives. standardize.
When you tie it in with request management you also get the advantage But again,
of making self-service work well, so that it’s clear to the end user what they’re
asking for:
you still need
those common “It’s important
> What are the constraints?
> What is the opportunity?
practices,
standards and to have that whole
> What does it cost?
> Does it let you track how it’s being consumed?
nomenclatures
in place in holistic model in your
> Do you get to automate the delivery?
> Are there standardized processes and ways to measure the fulfilment etc.
order to make
the CMS a very mind.”
effective tool.
At the end of the day you get to measure that much better, you have better
cost data so you understand the portfolio and you relate the costs to what the LEH: THOSE ARE
value is—this is the business service rather than just technical service. GOOD INSIGHTS CHRIS.
Ultimately we think that in the future it leads to looking at service THE CMS, FORMERLY THE
portfolio management across the board rather than individual services. CMDB, CERTAINLY HAS TAKEN OFF.
WE’VE SEEN STEADY GROWTH AND THE CHALLENGES FOR
LEH: THAT IS CERTAINLY IN ALIGNMENT WITH EMA’S INTEGRATION JUST GET STRONGER AS WE DIVERSIFY OUR
RECENT RESEARCH THAT WE EXPECT TO TAKE OFF OVER TECHNOLOGY BASE IN IT.

CW:
THE NEXT YEAR. THE NEXT QUESTION IS FOR CHRIS AT BMC.
INTEGRATION, AUTOMATION AND WORK FLOW ARE KEY That’s true. I think there is one other driving factor that’s a very
TECHNOLOGIES FOR ADVANCING A MATURE PROCESS-DRIVEN positive proponent, which is that IT on the whole is becoming a bit more
SERVICE DESK OPERATION. THESE INTEGRATIONS CROSS mature.
BUSINESS AND SILO MANAGEMENT DOMAINS. The elements available to support these different practices have definitely
HOW DOES BMC RECOMMEND INTEGRATING SOLUTIONS grown over the past few years and the understanding of how to deploy and
INVOLVING MANY THIRD PARTIES AND KEEPING UP WITH manage them is increasing. I think we’re seeing a more intelligent approach
THE EVER-CHANGING WEB LEVELS OF THESE PRODUCTS, to the different tools and how to leverage those in ITIL-based environments.
AND WOULD YOU SEE THE CMS AS BEING THE ONE SINGLE
ANSWER TO THIS DILEMMA, AND CAN IT SERVE WELL IN AN LEH: I WILL SHIFT GEARS HERE INTO A COMPLETELY
ENTERPRISE WITH MULTIPLE VENDOR SOLUTIONS? DIFFERENT DOMAIN OF EXPERIENCE FOR MATT FROM 
51
EXECUTIVE PANEL ■THE SERVICE DESK

SERVICE-NOW.COM. IN MANY MANAGEMENT


TECHNOLOGY DOMAINS, SOFTWARE-AS-
A-SERVICE HAS EMERGED AS A MEANS
FOR MOVING FORWARD WITH
LIMITED BUDGET AND WITHOUT
THE HEADACHES OF MAINTAINING
EQUIPMENT AND SOFTWARE IN- “There are so many dif-
HOUSE.
CAN YOU DISCUSS THE ferent moving parts in IT
FLAVOURS OF IMPLEMENTING
SOFTWARE-AS-A-SERVICE THAT service management and
ARE IN USE IN THE MARKET?
HOW HAS SERVICE-NOW.COM you need to develop a very
CHOSEN TO ARCHITECT ITS SAAS
SOLUTION? strong long term plan...”
MF: I think there is a tremendous
amount of momentum toward software-
as-a-service, but I think there’s also confusion
surrounding the service. From our perspective we see
a different type of movement than just cost-savings and the
momentum behind software-as-a-service. It’s attributed simplification and
not so much the technology aspect.
Our customers are not buying Service-now.com simply because it’s
software-as-a-service—and I think there are a lot of advantages when you talk
about total cost of ownership—but it’s really more about using the flavours
of technology that are used when you go home at night. For example, using
online banking, amazon.com and iGoogle. These web applications are what’s
familiar to us.
Our goal is to bring the same usability, simplicity and power of online
business to consumer apps to IT (what we call the consumerization of IT), to
make IT and the tools that you use much more familiar and easier to use.
Software-as-a-Service is a term that our competition tends to overuse.
Our competitors are marketing their hosted client server applications as SaaS,
when in reality, they are simply a regurgitation of a 1990s Application Service
Provider (ASP) model.
The big difference here is that what software-as-a-service, salesforce.
com and even service-now.com have done is we’re delivering a more modern
software—a technology that automatically upgrades. This happens three
times a year where a company receives continuous improvement and new
functionality on a regular basis as opposed to what we’ve dealt with in the
past. You also have access to the software and can make as many changes as
you like over time.
Salesforce.com was the pioneer in Software-as-a-Service where multi-
tenancy was the preferred delivery model. Service-now.com has learned a
great deal from Salesforce.com, but we have also done things very differently.
At the core, our application is delivered as a single-tenant system where
each customer instance includes a dedicated data base and application set.
We believe this architecture allows us to be highly scalable while ensuring
customer data is not mixed with other systems.
We think that software-as-a-service has been very beneficial for our
customers, not only from a usability standpoint, but also total cost of
ownership avoidance. Our SaaS delivery model reduces consulting and
management costs by up to 70%, removes upgrade costs and eliminates
infrastructure costs.

LEH: THANKS MATT, IT SOUNDS LIKE A GREAT DEAL OF


FLEXIBILITY CAN BE BUILT IN FOR THOSE ORGANIZATIONS.
LET’S TOUCH ON YET ANOTHER SERVICE DESK TOPIC WITH

52
THE SERVICE DESK ■ EXECUTIVE PANEL

CHRIS AT BMC ON KNOWLEDGE MANAGEMENT, WHICH IS


ONE OF MY FAVOURITE TOPICS.
KNOWLEDGE MANAGEMENT HAS RISEN TO THE TOP
PRIORITY LIST FOR FORWARD-THINKING SERVICE DESK
LEADERS IN THE ENTERPRISE. IT OFFERS SO MUCH IN TERMS
OF IDENTIFYING ROOT CAUSE QUICKLY AND PUTTING
TOOLS IN THE HANDS OF SUPPORT ANALYSTS TO SOLVE
ISSUES, AND IT ALSO PUTS INFORMATION IN THE HANDS OF
USERS TO SOLVE THEIR OWN PROBLEMS.
IS THERE A WAY FOR SERVICE DESK LEADERS TO PUT
AN EFFECTIVE KNOWLEDGE MANAGEMENT PROGRAMME
IN PLACE WITHOUT SIGNIFICANTLY ADDING STAFFING
RESOURCES? IF SO, HOW CAN A KM TOOLSET ASSIST WITH
THAT EFFORT? WE UNDERSTAND THAT KM IS A PROCESS
THAT HAS TO BE MANAGED TO KEEP KNOWLEDGE FRESH,
SO IF YOU COULD RESPOND IN THE CONTEXT OF LIFECYCLE
UNDERSTANDING FOR KM THAT WOULD BE GREAT.

CW: I think you’re hitting it straight on there when you talk about
the importance or at least the awareness about knowledge management
today.
It directly affects everything that we try to accomplish within incident
and problem management—specifically getting down to the roots, keeping
problems from re-occurring and eliminating the critical impact to different
services.
It really has come down to a couple of base items that organizations
have recognized. One is that the idea of hero-worship, or the tribal
knowledge that exists in an organization that they’ve relied on for so long,
isn’t scaleable. If anything, it is more costly to hoard that knowledge rather
than share it across other ITSM disciplines that rely upon the information
to restore services, provide work around processes, or to relay to respective
service customers and consumers, as quickly as possible.
There are also underlying business initiatives that go with that. It’s a
more competitive environment than ever before, and of course everything
comes down to reducing cost. No matter what type of vertical industry that
we look at in the past few years, that’s been the common mantra among IT
and business organizations.
So how do I do more with less, and better yet, how do I become more
productive with less? This drives right to the portion of your question
about getting programs into effect without having to add resources.
When you look at knowledge management you also have to take one
step up and look at what knowledge management serves beyond just
problems and incidents. That goes back to users helping themselves.
Every transaction that an end-user can perform on their own saves
time or cost, one way or another, across the service desk. So getting that
information into the hands of the end-users and then changing how they
look at utilizing not only the services, but the information that goes with
those services, is something that drives the effective implementation of
knowledge management endeavours without adding head count.
The other side to that are those people traditionally fighting the fires.
If we simply shift some of their activities to root cause analysis, doing the
diagnostics, recording, documenting and so on, you become more effective
in the incident triage practice and then the problem management practice,
which effectively contributes to eliminating those occurrences.
Another thing would be to use service mechanisms which should be
part and parcel to a knowledge management solution to see how effective,
for example, articles are; how they’re being absorbed, and what kind of
feedback they’re getting, not just from IT but from the end user. So there’re
a lot of different elements at play here, but I think one of the things that 

53
EXECUTIVE PANEL ■THE SERVICE DESK

really drives us in this case is a sound integrated technology set. IN HEARING YOUR THOUGHTS ON HOW THE FUNCTIONALITY
It’s one thing to have knowledge available, to publish it and spend a INCLUDED IN THAT CORE PACKAGE WAS PUT TOGETHER,
lot of time in creating that information. But unless you can indoctrinate HOW THE DECISIONS WERE MADE ABOUT WHAT SHOULD BE
that, let’s say, into an incident process or a problem documentation process INCLUDED, AND ALSO HOW IT HAS WORKED OUT FOR YOU?

TR:
where service desk representatives can actually do the pattern recognition
against the knowledge articles, then we’ve actually fostered that knowledge I think you’re seeing the same dynamic in the market that we
management culture into other IT disciplines. are—that it’s not so much about one-stop shopping as having one set of tools
We’ve learnt over the past twenty years or so that when you have to go that work well together.
back and re-create the knowledge of how we do our workaround, how we I think customers have gotten tired of playing the piecemeal game of
do the fix, how we eliminated a problem, post-fact, it’s probably not going to everybody pointing to the other on why these things don’t connect together
be as accurate or as effective as if it was part of the native process itself— and why they don’t work well together. They’re becoming more and more
performing our jobs. inclined to look at a single vendor.
So to recap: it’s part of a larger self-service But as you point out, Lisa, the flip side of that
environment, it’s getting the end-users on board is to do with the challenge which is to rip and
and it’s making sure that the information that replace everything you have which is a
is provided is accurate through surveys and completely non-viable option for most
making it an in-screen process to the rest customers, or use point solutions
of the IT service management processes. for specific areas where individual
organizations are different from
LEH: IF YOU LOOKED AT the mass, or different from
YOUR KM TOOLSETS AND
SEPARATED THEM OUT
“... software-as-a-service has the way a particular primary
vendor looks at a problem.
FROM THE PROCESS,
WOULD YOU SAY THERE ARE
really taken hold and at this point We think we’ve done a
pretty good job of addressing
TWO OR THREE IMPORTANT
FEATURES FOR USERS THAT
we don’t believe it’s a trend the balance of providing
comprehensive solutions
ARE LOOKING TO DO A LOT
OF THE VERY PRACTICAL
anymore, we believe it’s modern as well as making a point
to ensure they all work well
THINGS THAT YOU’RE
SUGGESTING HERE?
software.” in an open environment that
connects up to other systems.

CW:
Now that’s providing a single
One of the things is answer which was a really big
making sure that you’ve got access to change in the IT service management
the knowledge articles that support the approach a year ago, where we rebundled
work-around, restoration and problem solving Service Desk Manager into a comprehensive
activities. Having that data native to an incident product.
record or a problem record drives effective process We came to the conclusion that there was a
management. certain core set of functionality that worked well together and
Having direct links and search tools for patterns and context is vital was process integrated so significantly that the technology should be tied
to the creation of incident tickets. Knowledge provided to you in-flight together as well.
rather than having to request it will certainly drive the use of a problem or Obviously, incident/problem management fit together and change
knowledge management tool as far as finding solutions and utilizing the data. management layers on top of that, and knowledge management and
The more interaction we have, breaking down the silos between service automation tools are needed to make that management work efficiently. Then
management disciplines, will lead to more effective use of knowledge, so I we included some discovery tools to get to configuration data correctly. That
really do believe in interdisciplinary use of the knowledge tool itself. was created into one base unit which we call Service Desk Manager.
It’s bigger than the normal atomic level things are sold in, but it’s the
LEH: NOW WE’LL MOVE TO TIM AT CA, AND THIS QUESTION IS reality of what we believe needs to tie together to do IT service management
RELATED TO THE VERY BROAD DISCIPLINES OF ITIL, BUT ALSO correctly.
HOW CA HAS CHOSEN TO BREAK THEM DOWN. Ideally we’re really trying to take a very customer-centered viewpoint
IN EMA RESEARCH, USERS HAVE INDICATED A PREFERENCE on this, with a best-practices recommendation and what we consider a
IN PURCHASING ITSM SOLUTIONS FROM A VENDOR THAT minimum set that we priced competitively. We then work with our customers
OFFERS A BROAD PRODUCT SWEEP. WITH A LARGE VENDOR, to find out the best answer from there.
SUCH AS YOURSELF, AND MANY SERVICE MANAGEMENT
PRODUCTS, HOW DOES A USER GET WHAT THEY NEED LEH: TIM, WOULD YOU SAY THAT SPECIFIC PACKAGING WAS
WITHOUT BREAKING THE BANK, AND HOW DOES IT NOT GEARED TOWARDS MID-MARKET CUSTOMERS, OR WOULD
BECOME TOO EXPENSIVE? YOU SAY THE NEED THAT YOU’RE DISCUSSING CUT ACROSS
I’M AWARE THAT CA HAS PACKAGED TOGETHER A CORE COMPANY SIZE; SMALL, MEDIUM AND LARGE?

TR:
OFFERING MEANT TO MEET ALL THE BASIC SERVICE DESK
NEEDS FOR SOME ORGANIZATIONS, AND I’D BE INTERESTED I really think it cuts across them with different dynamics, but 
54
WWW.BMC.COM

BECAUSE I.T. BUDGETS ARE SHRINKING, NOT I.T. RESPONSIBILITIES.


BECAUSE EXTRACTING EVERY OUNCE OF EFFICIENCY IS THE ORDER OF THE DAY.
BECAUSE I.T. SHOULD DO MORE THAN KEEP THE LIGHTS ON AND THE SERVERS RUNNING.

BECAUSE BUSINESS RUNS ON I.T.

© 2009. BMC Software, Inc. All rights reserved.


EXECUTIVE PANEL ■THE SERVICE DESK

Lisa has over 18 years of experience in


the computer industry, having served
in a variety of technical, marketing and
managerial roles. Lisa focuses on service
level management, business process
“... you should
management, small-to-medium business
infrastructure management needs, and
involve the security team
partnership strategies for channels and
strategic relationships.
very early on—simply
Lisa Erickson-
Prior to joining EMA, Lisa was
responsible for the SPECTRUM Partners
because you have to get their
Harris, RESEARCH
DIRECTOR,
program for Cabletron Systems (now
Aprisma). She writes as a guest columnist
buy-off and they will have
Enterprise
Management
frequently for Network World Fusion and
contributes articles to slm-info.org. Lisa is
good recommendations.”
Associates (EMA)
also co-author of SLM Solutions: A Buyer’s
Guide, now in its third edition.

Chris Williams is responsible for the


Product Marketing of BMC Software’s
Service Support Discipline which essentially the needs are the same. There are core processes
includes BMC Remedy IT Service that are necessary for running ITSM and they’re the same for mid-sized guys as
Management Suite, Service Desk Express, for the larger guys.
and the Service Resource Planning Suite. The mid-sized ones are more likely to be in that mode of: I can just buy it,
In this role, Chris manages a team that put it in and not have to worry about it. The big ones are looking at it from the
focuses on solution level strategies that sense that everything should fit together and they should be clean and tidy. I
leverage the comprehensive capabilities think it applies to both even though the thought processes might be different.
of integrated IT processes and practices,
Chris Williams,
whose efficiencies and effectiveness are LEH: AND NO DOUBT FOR THE LARGE COMPANIES IT’S THE
LEAD AND SENIOR
advanced through the use of the BMC JUMPING OFF POINT FOR OTHER THINGS. LET’S ROUND OUT
MANAGER,
Service Support offerings. THE QUESTIONS WITH ANOTHER ONE FOR MATT AT SERVICE-
BMC Service Support
Chris has over 27 years of IT NOW.COM.
Solutions
experience including 15 years managing THE SERVICE DESK, CHANGE MANAGEMENT AND THE
data centers, operations and technical CMS ARE OFTEN SEEN AS STRATEGIC LYNCHPINS IN AN ITSM
support organizations for financial, STRATEGY. EMA HAS SEEN THE SERVICE DESK AS A STARTING
government, retail and manufacturing POINT FOR ITSM INITIATIVES, AND CHANGE MANAGEMENT
organizations and is an ITIL v3 certified OFTEN GETS LINKED VERY TIGHTLY AND THEN OF COURSE THE
instructor. CMS SOMETIMES GETS BUILT INTO THAT. MANY CIO’S WANT TO
KEEP THESE DISCIPLINES CLOSE TO HOME. HOW WOULD YOU
EASE THESE CONCERNS AND PERHAPS COUNTER THEM WITH A
SAAS-BASED SOLUTION?

MF: That’s a very good question. We’ve seen that the CMS has been the
foundation for understanding and defining what’s in your service portfolio.
In the last year and a half, security questions, or the “Where does my data
reside?” question, does not come up as often as it used to. In our discussions
with prospective clients, there is a much higher understanding of SaaS which I
believe has alleviated the perceived risk.
One thing we highly recommend, if you are interested in software-
as-a-service, is that you should involve the security team very early
on—simply because you have to get their buy-off and they will have good
recommendations.
We don’t see too much concern from the CIO as to where their CMS data
resides. One of our largest customer verticals is the financial sector. These
organizations have had a lot of experience in communicating and sending
financial data over the wire for many years.
We take a lot of those daily working principles and embed them into our
technology to allow CIO’s to become more comfortable and familiar with

56
THE SERVICE DESK ■ EXECUTIVE PANEL

what we’re doing from a security standpoint. For example, if you look at a data Tim Rochte is currently responsible for
center and you’re talking to a software-as-a-service vendor, make sure that their CA’s Service Desk Manager in the Service
data center is SAS 70 Type II certified. I would also recommend that you do an Management group. Prior to CA, he held
onsite visit so you can see what type of physical security they have in place, and product management, marketing and
so you can understand where your data will be living. strategy positions with several technology
One of the common themes that we hear is that the data center we’re companies in the United States and
providing is more secure than their own data center. As a SaaS vendor, we view Europe, including BMC/Remedy,
security to be a core competency of our service. We take it very seriously and Questra and NCR.
have built the highest level of redundancy and data protection into our service. In addition to numerous user group
Outside of the data center and the physical security, you’re also looking events, he has spoken at conferences
Tim Rochte,
at communications security—is the application built using SSL and HTTPS for META Group and Pink Elephant, as
SENIOR
secure connections? well as HDI Australia and US. He holds
PRINCIPAL
The other aspect of software-as-a-service that I think is interesting is the fact an ITIL foundation level certificate. He
PRODUCT
that although the data resides in our data center, the customer still owns it and if earned a Bachelor degree in economics
MARKETING
they choose to move from the service they have the ability to take their data. from the University of California at Davis,
MANAGER,
So, going back to the beginning of the discussion, I think software-as- and an MBA from the Darden School at
CA Inc.
a-service has really taken hold and at this point we don’t believe it’s a trend the University of Virginia.
anymore, we believe it’s modern software.

LEH: I LIKE THE POINT YOU MADE ABOUT HOW SOFTWARE-AS-


A-SERVICE CAN BE A BETTER SOLUTION, AND YOU REALLY LAID Matt leads a team that is responsible for
DOWN SOME KEY CONSIDERATIONS FOR ANYONE THAT MAY BE strategically positioning Service-now.
THINKING OF GOING DOWN THAT PATH. com’s brand, applications, employees,
I WONDER AT THE TRIO OF DISCIPLINES; THE SERVICE customers and partners as market and
DESK, PROBLEM/CHANGE AND THE CMS—ARE YOU SEEING IN industry thought-leaders. Matt has 13
YOUR PROSPECTS THAT TRIO AS SOMETHING THAT IS PURSUED years of enterprise software marketing,
REGULARLY IN AND OF THEMSELVES? sales and product strategy experience.

MF:
Prior to Service-now.com, Matt
The Service-now.com subscription includes access to all drove product line strategy at Oracle,
applications. While a number of customers have chosen to deploy Service-now. Matt French, Peregrine Systems and most recently
com in a “big bang” ITIL implementation, most start with incident, problem, DIRECTOR OF Symantec Altiris. As a member of the
change and CMDB/CMS light. But we’ve also seen companies lead with change MARKETING, Altiris Business Unit within Symantec,
management and the CMDB or CMS. Service-now.com Matt held positions of Director of Product
Employee self-enablement supported by request management has also been Marketing, Business Line Manager of
an area of high interest. The IT organization only gets so many opportunities to Altiris Service and Asset Management
set customer expectation and increase their perception. Service request can also applications, and Director of Global
help to reduce the cost of service and ensure end users are given tools that allow System Integrator Strategy.
them to receive service in a way that best meets their needs.

LEH: THANKS, MATT, FOR THAT FINAL WORD. I HOPE THIS


PODCAST SHEDS LIGHT ON JUST HOW BROAD THE SERVICE DESK
OPERATION HAS BECOME. AT EMA WE THINK IT’S A LEAST A
20-YEAR-OLD MARKET, MOVING FROM THE HELP DESK TO WHAT
THE SERVICE DESK IS TODAY, AND ALL THAT’S DEMANDED OF IT
AND DELIVERY ON THAT SERVICE DESK MESSAGE.
WE’VE TALKED ABOUT A NUMBER OF AREAS, NOT EVERY
AREA BY ANY STRETCH, BUT I’D LIKE TO INVITE EACH OF
THE PARTICIPANTS TO CONTRIBUTE A CLOSING REMARK TO
SUMMARIZE THEIR MAIN THOUGHTS.

TR: I think there has been some good conversation on how important
knowledge management is and we certainly agree with that in our offering.
In terms of how many customers are looking at a SaaS offering instead of
just a conventional on-premise model—CA is very much going down that path
as an option for our customers. This has raised a whole spectrum of issues in
this field that are going on right now.

CW: We’ve been going through a vast set of topics, but I think we need
to impart to the consumers of IT service management solutions the idea of 
57
EXECUTIVE PANEL ■ THE SERVICE DESK

working with industry recognized leaders.


There are so many different moving parts in IT service management
and you need to develop a very strong long term plan as far as prioritization
and the return on your efforts from the investment of the solutions, but also
the implementation time and the yielding results from those activities. It’s
important to have that whole holistic model in your mind. Every consumer
should be aware of where they’re going and if it aligns with their business
needs.
One of the things that BMC Software has done for years is take that
approach for business service management, looking at the big picture and
making sure that our customers are aligned with their long-term missions.

MF: I think it’s been a discussion full great information for the audience.
My main parting thought here is that if you feel like you’re stuck in a tool
or that your organization is not able to mature further, I would recommend
taking a step back and defining what you’re trying to achieve as an organization.
Forget about the tools and instead define your IT organizational goals, and
then look for a tool after that.

58
Frost & Sullivan’s premier networking event, Growth, Innovation and Leadership (GIL), brings together the best
and brightest of visionaries, innovators and leaders to inspire and be inspired.This interactive exchange of fresh
ideas, innovative strategies and proven best practices empowers CEO’s and senior executives with the necessary
tools to accelerate the growth rate of their companies.

Join us - learn, share, engage, inspire and be inspired.


CEO’s and their growth teams frequent GIL to:

· Focus on driving growth, innovation and leadership


· Discover fresh and innovative ideas
· Exploit opportunity in any economic climate
· Network with cross-industry peers
· Gain a 360 degree perspective of their industry
· Learn best-practices in driving growth
· Benchmark award-winning tools and strategies
· Actively engage in our global community
· Advance their ability and career
· Become innovators, visionaries and leaders
GIL 2010: Israel
Attend Today! Growth, Innovation and Leadership
www.gil-global.com/Israel A Frost & Sullivan Global Congress
Email: yifat.wegner@frost.com on Corporate Growth
Tel: +972 9 9502888 March 15, 2010
Israel Congress Center
HEAD TO HEAD ■ BUSINESS INTELLIGENCE

It’s called business


intelligence for a reason
How do you make the data you already have work for you? BILL DUNN (DUNN SOLUTIONS GROUP) says it’s
easy if you have the right strategy and the right tools. Interview by ETM’s ALI KLAVER.

http://www.GlobalETM.com

FACT FILE

H
ISTORY

• William M. Dunn founded Dunn Solutions Group Inc. in September 1988.


• The firm grew throughout the 1990s, becoming a successful consulting firm serving a variety of Fortune 500 companies.
• In 1995, Dunn Solutions Group added quality assurance and business intelligence practice areas to its original custom application development
services.
• User interface development and web design/services were added in 2001 with the acquisition of Streams, a Chicago web design firm.
• In January 2007, Dunn Solutions Group was acquired by Cranes Software International, a Bangalore, India-based software and solutions provider.

60
HEAD TO HEAD ■ BUSINESS INTELLIGENCE

AK: BILL, WITH VIRTUALLY system and make it available to front-line AK: LET’S PAUSE HERE TO MAKE SURE
EVERY BIG SOFTWARE COMPANY managers, you can change the behaviour of the OUR AUDIENCE IS WITH US. HERE AT
OFFERING BUSINESS INTELLIGENCE people making purchase decisions. ETM WE SEE THAT THE DEFINITION
TOOLS TODAY, AND WITH EACH Take a simple example like an office manager OF BUSINESS INTELLIGENCE HAS
TAKING A DIFFERENT MARKETING who is ordering office supplies. They do this CHANGED AS THE TECHNOLOGIES
ANGLE, HOW IS DUNN SOLUTIONS without really understanding the impact down BEHIND IT HAVE CHANGED�SO HOW
GROUP POSITIONING BUSINESS the road. But if that person gets a report on a DOES DUNN SOLUTIONS GROUP
INTELLIGENCE? monthly basis that says they already have four DEFINE IT NOW?

BD: BD:
thousand Post-it notes, this may change their
We have a new marketing initiative behaviour, because they’re normally just on Our feeling about BI is very different
and are focusing on business intelligence—the re-order. today from when we started. We got into the
business side of it. The underlying concept is that But if they have this information, they can BI world in the mid-1990s, and at that point BI
business intelligence is not just the technology— re-evaluate how they’re going to spend money. meant writing and distributing reports. But BI
it’s actually a key part of your business strategy. Of course, this could apply to manufacturing today is much more than that.
With business intelligence, organizations and even staffing, so getting information out of BI now, the way we define it, is proactive
of all sizes can turn data into insight, which the back office and into the front office is very use of knowledge. So if we are able to get the
helps them make informed decisions, find important. information, assimilate it, score it, and then push
hidden opportunities, and measure and manage The next point is finding it from your it out to those who need it on a timely basis and
performance. customers. We all want to say that the change their behaviour in a positive way, that is
The big one is empowering people with the customer is king, but the truth is that not every business intelligence.
information they need to do their jobs better— customer should be treated like a king, and 
knowing the truth about your business, versus most organizations don’t know who their best
gut feel, and allowing you to make predictions, customers are. So who should we treat like a
FACT FILE

P
identify inefficiencies and sharing important king? BI will be able to help us there too.
knowledge that everyone believes. If we can analyze our customers and
RODUCTS
understand which ones are contributing to
AK: I HEARD YOU SAY “IDENTIFY our profitability, we’ll not only be treating
INEFFICIENCIES” IN YOUR ANSWER. those customers as kings, but in fact turn
• Dunn Solutions Group covers
TODAY, BUSINESSES OF ALL SIZES ARE customers that are costing us money over to our
Application Development, Busi-
WORKING HARD TO CUT COSTS, BUT competitors.
ness Intelligence and Predictive Analytics.
HOW CAN BI SAVE MONEY AND DRIVE I know that sounds odd, but sometimes
• Products include ALM Analytics, Legal
EFFICIENCY IN AN ORGANIZATION? you have to get rid of some of your customers in
Dashboard, SAP BusinessObjects and One
BD:
order to focus on the better customers, and BI
Point Law Enforcement Analytics.
There are about five different ways to will help us do that.
• Partners include IBM, Microsoft, SAP
drive BI efficiency. From an optimization of resources and
BusinessObjects and Oracle.
The first one, looking deeper for hidden operations standpoint—we need to apply
• They boast a consulting and training arm which
costs and wastes, is about finding cost-savings computers to help do things quicker. That’s really
is focused on a “practitioner’s approach”,
beyond the expenses that you cut first. The what we’ve been saying in IT for the past thirty
offering practical insight that increases the
problem comes when the obvious things are years.
effectiveness of the training experience.
gone, and those that are left are not obvious. Up to now we’ve been taking processes that
• They offer four levels of training:
How do you find those hidden costs and wastes? are manual and automating them, but without
> Instructor-Led Training (ILT):
You can do this by leveraging business automating the decision-making. BI can help you
Stand-up training on-site and at various
intelligence. You can extract from your core automate some of the obvious decisions that may
open-enrolment facilities, including
systems information about how you’re spending be bottlenecks in the organization.
training for virtually every core tool from
money, which vendors you’re using, how much For example, if you’re in the insurance
major software companies including SAP
you’re paying them and so on. business you could use predictive analytics and
BusinessObjects, Microsoft, HP/Mercury.
For example, you can consolidate that BI modelling for 70 per cent of your approve/
> Jumpstart™: Implementing a new
information from multiple divisions of an disapprove transactions, leaving you to focus on
technology? Jumpstart provides the
organization that may be spending money with the 30 percent of the transactions that really do
roadmap for success with an expert to
a vendor, find out that you’re spending more need human intervention.
work closely with development teams.
with a particular vendor, and perhaps negotiate The last one is avoiding ongoing leakage.
> Mentor+™: This is one-on-one consulting/
a better rate. People spend a lot of energy in a downturn
training on specific technical topics or
A lot of information is tied up inside of identifying these things, and then over time they
high-level concepts.
back-office accounting systems—they’re really forget about it.
> Computer-Based Training (CBT):
processing the information—but it’s the frontline What BI will do is automate this into a
Develops and delivers online training
people that are analyzing it. process which makes it harder to forget —it’s
solutions and learning-management
This brings me to my second point, which is on a dashboard that you see every day. BI lets
systems (LMS) for clients to be used for
tying the front office to the back office. If you you take these ideas and then automate them in
on-demand pre- and post-training review.
free up the information that’s in your accounting simple ways.

61
HEAD TO HEAD ■ BUSINESS INTELLIGENCE

AK: THAT’S A GOOD POINT�IT’S A Bill Dunn


PROACTIVE USE OF KNOWLEDGE. FROM


PRESIDENT, Dunn Solutions Group
A BUSINESS POINT OF VIEW, WHAT ARE
THE CHARACTERISTICS OF A GOOD Bill Dunn founded Dunn Solutions Group in 1988. Over the next 21
BUSINESS INTELLIGENCE SOLUTION? years he grew the company from a small boutique firm to a 75-employee

BD:
consulting firm that serves Fortune 500 and aggressive, growing companies
I’m a big evangelist of information throughout North America. Today the company, owned by Cranes Software
being distributed throughout the entire International, has headquarters in Chicago with offices in Minneapolis,
organization. A lot of the time we hear Raleigh, Charlotte, Fort Lauderdale and Bangalore, India. Dunn received both his Bachelor’s and


customers talk about the CEO or the VP getting Master’s degrees in Computer Science from the University of Illinois at Urbana-Champaign. He
an executive dashboard, and this is important if gained early experience at AT&T, Bell Laboratories and U.S. Robotics.
those people are making strategic decisions. But I
think that misses the true promise of BI. For instance, we use SAP BusinessObjects’ day project, deliver value, and then deliver more
Information needs to be made available Data Integrator—a great product for getting data value maybe six months later on an engagement
at all levels of the organization, not just upper from the source systems to the destination. As a that adds to that.
management, and BI needs to be integrated into by-product of that, if your data is not the cleanest
core business processes on a daily basis. in the world, consider using the Data Quality tool. AK: LET’S EXPLORE THAT A LITTLE
Credit decisions are a great example of Once you’ve got your data warehouse built, MORE. WHY IS IT BETTER TO BREAK A BI
integrated BI—a number of organizations have you want to allow people to access information INITIATIVE INTO PIECES? AND WHAT IS
a credit decision in less than five seconds. That is in a very easy and intuitive way. To do that you THE BEST WAY TO GO ABOUT IT?

BD:
a strategic decision made by a line manager that should leverage an ad hoc querying tool that is
has a whole bunch of BI behind it. web-based, so that IT doesn’t stand between the I think that for most mid-market
BI helps grease the wheel of commerce. If users and the data. organizations, they don’t have the option to do
you know about your vendors and can make You also want to standardize on your the whole thing at one time. They generally don’t
strategic decisions quickly without having to do reporting tool. Once people learn how to use it, have the budget, and may not have the time to do
a lot of research each time, you can move your there will be a higher adoption rate, and your BI a complete BI initiative in one shot.
company forward. initiative will be much more successful. What I suggest they do is start with the
Finally, for people who need to look at low-hanging fruit. There’s a lot of value in doing a
AK: LET’S NOW LOOK AT SOLUTIONS information at a glance—we like to joke about small BI solution that’s architected properly and
FOR OUR AUDIENCE�WHAT ARE them as: “If the dial is green, you can go golfing can add value right away. The nice thing about BI
THE KEY ENABLING TECHNOLOGIES today” dashboards. These are what you want to as opposed to other types of IT initiatives is that
DUNN SOLUTIONS GROUP UTILIZES IN put in front of people that have the KPIs as to it can grow.
SOLUTIONS? how their business is doing. Then you want to Say you start with a departmental solution. If

BD:
start thinking about the next level and looking it’s architected properly, you can add additional
To get the BI vision accomplished we ahead versus looking in the rear view mirror. departments, and before you know it you’ve got
don’t need to build things from scratch. We are an enterprise solution—but you didn’t have to
very lucky to be in an area where there’s a lot of AK: HOW ARE BI SOLUTIONS FOR MID­ start that way.
great technology we can leverage. For example, MARKET COMPANIES DIFFERENT THAN A big part of being successful, especially in
Dunn Solutions Group is a SAP BusinessObjects THOSE FOR HUGE ENTERPRISE LEVEL the mid-market, is partnering. Look at the top
Gold Partner, and we leverage many of SAP’s ORGANIZATIONS? vendors in the industry, partner with software

BD:
tools and products to accomplish our BI vendors with the right solution and who
initiatives. Smaller organizations need exactly are BI-focused, and partner with consulting
Let me take you through what I would the same things as larger organizations. Until very organizations who can help you get there without
consider to be the core tools and technologies. recently that was difficult to do because the tools having to figure it out by yourself.
At the very heart is the database. You can use and the technologies were so expensive that only Over time, most people feel that the
any solid database engine—Oracle, SQL Server, four to five hundred companies could afford them. value they get out of partnering with the right
UDB, even MySQL—but having the database I’d say there’s a lot of good news for mid- consulting firm and buying the software far
is not enough. To have an effective BI solution sized organizations and some fantastic tools— exceeds any savings from doing it themselves.
you need to work with people that know how the same enterprise tools that are available for And the long-term value is that they can build on
to create the data model that will hold your larger companies are now available, and priced this solution.
information. appropriately, for smaller companies. We’ve been We have a client that literally spends twenty-
Then you need to get the information out of working with SAP and some other vendors on five thousand dollars every six months on their
those core transactional systems and into your delivering these types of tools to the mid-market BI initiative. That’s not a lot of money for the
data warehouse or data mart. In the past, people so they can benefit from BI, just like larger value they’re getting while they continue to build
used to write code to do this, which is very hard organizations. on their initiative. Over time, they’re going to
to maintain and upgrade, plus it doesn’t give you The one thing that smaller organizations have a complete BI solution that they can deploy
any information about what’s happening inside need to know is that BI doesn’t need to be done to their entire organization. But in the interim,
those transformations. So the second thing you as a big-bang project. We break many of our they’re getting value out of the solution they’re
want to do is get an ETL tool. projects into bite-sized chunks. You can do a 90- deploying today.

62
BI IS A BUSINESS STRATEGY. Turn data into insight.
Make informed decisions. Find hidden opportunities.
Measure and manage performance. Empower employees.
Know the truth about your business. Make predictions.
Identify inefficiencies. Share important knowledge.
OUR BI SOLUTIONS CHANGE HOW BUSINESS WORKS.

LEARN ABOUT OUR CONSULTING SERVICES


800.486.DUNN DUNNSOLUTIONS.COM

CHICAGO • MINNEAPOLIS • RALEIGH • CHARLOTTE • FORT LAUDERDALE • BANGALORE


IN THE HOTSEAT ■ PROFESSIONAL PROFILE

Security and business


continuity

W
ith an impressive list of partners and AK: LET’S JUMP STRAIGHT INTO THE FIRST QUESTION—
clients, NETASQ is fast becoming the CAN YOU GIVE OUR AUDIENCE AN EXPLANATION OF WHO
NETASQ IS?
security solution provider. FRA NÇOIS
LAVASTE and DOMINIQUE
MEURISSE (NETASQ ) join ETM’s ALI KLAVER to
FL: Absolutely. NETASQ is a United Threat Management technology
pioneer and visionary, and we are a leader in security appliances. Our
discuss exactly what they can do for you. award-winning solutions are designed to protect the networks, data and
applications of our customers against what has become an ever-increasing
issue to them, i.e.cyber-criminal activity.
Our customers particularly value our capacity to block intrusions,
hackers, viruses, malware and spam as well as filter content. They highly rate
our ability to reduce internal risks and to enable secure mobility with our
SSL and IPsec VPN.
Since its inception in France 10 years ago, NETASQ has enjoyed double
digit growth year over year. We employ 90 people world-wide and are a
profitable company.
Our vision is to permanently innovate in order to protect businesses
http://www.GlobalETM.com of all size with the highest level of security against both known and

64
PROFESSIONAL PROFILE ■ IN THE HOTSEAT

“... NETASQ’s solutions


unknown threats, also known as zero-day stand out clearly stand out from demonstrates
threats. Our customers range from SMBs with from those NETASQ value.
a few workstations to the largest multi-site developed by those developed by other Let’s take a few
infrastructure both in the private and the public other security examples.
sector. vendors. security vendors.” Amadeus in
Spain delivers next-
AK: NOW WE KNOW WHO YOU ARE, AK: SO WHY generation solutions
CAN YOU TELL US ABOUT NETASQ’S DOES NETASQ to travel agencies
STRATEGY? THINK THEY ARE mostly to make airline

FL:
THE BEST SECURITY reservations. They experienced
We invest 20% year after year in SOLUTIONS PROVIDER? a significant increase in the number
research and development to innovate in WHY SHOULD A COMPANY COME TO of web transactions due to the success met by
technologies that are a true differentiator. YOU? low-cost companies, and did not want this to

DM:
In addition to this, our company has impact their business SLA of three seconds to
always been geared to implement a proximity NETASQ has designed the most acknowledge a reservation.
policy with our customers who are reached powerful technology to proactively protect After testing different solutions, they chose
and supported through a two-tier distribution against the newest forms of cyberthreat. NETASQ to secure their highly sophisticated
network. Our sales model is totally indirect. The NETASQ Software Engine is designed and intense web traffic, thereby blocking all
In each of the regions we focus on— at the driver of the Kernel and starts at the malware and viruses which could affect their
Europe, the Middle East, Africa, Asia-Pacific— highest OSI model of deep stateful inspection business SLA.
we have recruited highly qualified value-added of the content (Protocol and Heuristic Analysis, Persian Bank in Tehran, Iran, is another
distributors who in turn closely work with re- Contextual Signatures) and then should the example. During the most recent presidential
sellers, integrators, Telco operators and MSSPs. threat have not already been blocked, activates election Iran experienced the most damaging
Over eight hundred certified and active traditional security features such as IPS and FW. cyber attacks known worldwide.
partners are actively working with us. They Since the IP packet is processed in this way, They wanted to secure their business
distribute and install NETASQ solutions in over our software engine allows: and after conducting in-depth testing and
thirty countries. We naturally also have channel a thorough analysis of the logs provided by
sales and pre-sales teams in France, the UK, > Control and protection against every kind of the different solutions they envisaged, they
Benelux, Italy, Spain and a team covering the threat ( DoS, SQL injection, TCP Scan, etc). chose NETASQ. Their reason was simply
rest of the world. that NETASQ solutions provide the most
> Exceptional network performance because comprehensive information in the area of
AK: SO FRANÇOIS, YOU’RE ESSENTIALLY processes are run sequentially and top- down, log collection as well as the highest level of
OFFERING A SECURITY SOLUTION whereas other solutions on the market have a protection.
THAT HAS GLOBAL REACH. MY NEXT “lego style” approach by which processes are Another great illustration is the reason why
QUESTION IS FOR DOMINIQUE—WHAT run in parallel. we were selected by a French bank. This bank
ARE SOME OF THE MAIN BENEFITS OF was concerned about phishing attacks made to
WORKING WITH NETASQ? > High level security features to inspect content online banking environments and the impact

DM: such as AV, spam, malware and URL filtering. this might have on their business.
To date, NETASQ has sold fifty They conducted an exhaustive risk
thousand appliances to over fifteen thousand > The best UTM performance. analysis and discovered that there existed
customers worldwide, 30% of which are in some very specific types of attacks that could
environments that are highly sensitive to This allows us to deliver outstanding UTM potentially give unauthorized access to their
security issues (governmental organizations, performance with the lowest TCO within a online accounts. Since their current security
military forces, the European Council, banks three-year time frame. provider could only recommend to wait for the
or Nuclear Industries). None of them have development of specific patches, they decided
complained of suffering damages after being AK: CAN YOU GIVE OUR AUDIENCE to evaluate other solutions including NETASQ.
attacked. SOME VALUABLE CUSTOMER They were most impressed because this
At a time when there are daily reports in FEEDBACK THAT DEMONSTRATES threat was already blocked by NETASQ’s
the media or internet of prejudices met by NETASQ’S VALUE? software engine, and they therefore

DM:
companies after they have been the victims of implemented NETASQ solutions throughout
security attacks, NETASQ’s solutions clearly Our customer feedback truly their web data centre. 
65
IN THE HOTSEAT ■ PROFESSIONAL PROFILE

Another business case is the example of the public integrator of Upon joining NETASQ in 2004, Dominique
Telecom Malaysia. This company has overall responsibility for secured Meurisse first assumed the general management
internet access to the public and governmental organizations in Malaysia. of NETASQ for France before directing
Given the particular nature of their customers and the obligation to NETASQ’s Sales and Marketing in 2006.
protect highly sensitive information, they chose NETASQ and have been Dominique kicked off his career at 3Com
using our solutions for five years now. Europe in 1987 first as the Manager of Corporate
Accounts, then as the Manager of VARs. In
AK: THANK YOU DOMINIQUE, THOSE ARE SOME 1991, as the co-founder of network integrator
FANTASTIC GLOBAL CASE STUDIES. FRANCOIS, FOR THE ARCHE Communications, he was the Director
FINAL QUESTION, CAN YOU TELL US ABOUT NETASQ’S of Sales and Marketing. In 1999, he became
Dominique
INTERNATIONAL REPUTATION? the cofounder of ClarITeam (European QoS
Meurisse
FL:
operator) and was its General Manager. From
EXECUTIVE VICE
NETASQ has been recently awarded EAL4+ level certification 2002 to 2004, he was the Director of Infovista for
PRESIDENT, SALES
based on Common Criteria 3.1. These are the latest and most France and the Benelux countries.
AND MARKETING,
constraining international standards. Dominique Meurisse holds an engineering
MEMBER OF THE
Moreover, the European Council granted NETASQ the degree of Telecommunication from ESME
MANAGEMENT
RESTREINT UE certification, thereby acknowledging that NETASQ Sudria Paris and holds an Executive MBA from
BOARD
solutions have the capacity to protect sensitive information in the entire HEC-PARIS.
NETASQ
European Union. This is very a high level recognition and a much sought
after recommendation.
In addition, each time our solutions have been evaluated by François Lavaste took over the presidency
independent laboratories or been appraised by the press, they won “Best of NETASQ’s management board in early
Buy”, or four stars, and were granted several times the “Security Product 2007. Prior to that role, he was the General
of the Year” awards. Manager of TRICIPHER, a specialist in strong
Therefore our sole and only mission is to develop security solutions authentication, for Europe, the Middle East
which proactively protect the information system of our customers. We and Africa. He began his career in IT in 1992
enable business continuity and ensure our clients that threats will not as a partner in the creation of Eneide, a CRM
jeopardize their activity, thereby contributing to their success because software company, publisher of CONSO+, which
they can focus 100% on their own mission. was acquired by Coheris in 2000. In 1996, he
moved to the Silicon Valley where he stayed for
François Lavaste 10 years and joined Intuit, the worldwide leader
CHAIRMAN OF THE in financial management software. From 2001, as
MANAGEMENT Vice President of Marketing, he contributed to
BOARD the success of BRIGHTMAIL, the pioneer and
NETASQ leader in anti-spam technologies that Symantec
“… our sole and only acquired in 2004; as well as to the success of
CYANEA SYSTEMS, which specializes in
mission is to develop application performance measurement software
and was acquired by IBM in 2004; and that of
security solutions which Mindjet, the publisher of the MINDMANAGER
software program.
proactively protect the François Lavaste graduated from ESCP-EAP,
a European graduate business school, and holds
information system of our an MBA from the Harvard Business School.

customers.”

http://www.GlobalETM.com

66
ANALYST FEATURE ■ BI FOR THE SMB

“For most
organizations the
key to improving
decision quality comes
down to timeliness of
information.”

Secrets to success
Dedicated action is needed to get the best out of small and medium sized businesses. MICHAEL LOCK
(ABERDEEN GROUP) tells us how to slash cost and empower the business user.

Benchmarking Best-in-Class SMBs

A
berdeen’s research demonstrates a marked increase in the use and economy. The research supports this claim in showing that the top business
applicability of business intelligence (BI) technology in small pressure forcing SMBs to invest in BI solutions is the need to improve the
and medium sized businesses (SMBs). By examining methods speed of access to relevant business data (see Figure 1).
to improve business visibility, optimize delivery of BI, and Utilizing BI for better and faster data access has paved the way for
manage the Total Cost of Ownership (TCO), SMBs are seeing measurable significant performance improvements for some SMBs. Aberdeen used four
performance improvements across many areas of their organizations. key performance criteria to distinguish Best-in-Class SMBs from Industry
Average and Laggard SMBs. Best-in-Class SMBs achieved the following mean
The research shows that Best-in-Class SMBs are leveraging a broad spectrum class performance:
of organizational capabilities to deliver BI to more users and deploy the
solution in a shortened time frame; all in a self-service, non IT-assisted 29% average year over year increase in operating profit
capacity. This benchmark report is based on feedback from 530 SMB
organizations worldwide. 4.0% average year over year decrease in BI cost per user
For most organizations, the key to improving decision quality comes
down to timeliness of information. Much has been said and written about 99% deliver BI to end-users in a self-service capacity
the speed of business in today’s environment. Mass collaboration and the
improvement in information access have brought about a situation in which 14 days average deployment time of BI applications.
organizations need clean, relevant information, and they need it quickly.
Faster and more informed decisions enable a company to react more
quickly to threats and opportunities and remain competitive in a struggling

68
BI FOR THE SMB ■ ANALYST FEATURE

Figure 1: Top pressures driving BI investment for SMBs

Source: Aberdeen Group, July 2009

Figure 2: Best-in-Class BI technologies in use

Source: Aberdeen Group, July 2009

Requirements for success

B
ased on the findings of the Competitive shows that Best-in-Class SMBs are 62% more the use of automation. Aberdeen’s research
Framework and interviews with end likely than all others to have this capability. shows that Best-in-Class SMBs are more than
users, Aberdeen’s analysis of the Best- twice as likely as Laggards to automate report
in-Class demonstrates that successful  Organization—one of the most generation and delivery to end users.
deployment and use of analytical tools in the SMB commonly cited barriers to a successful BI
market depends on a combination of specific implementation has to do with support from  Performance measurement—one thing that
capabilities and technology enablers. Aberdeen’s the executive ranks, or lack thereof. Having many companies struggle with, particularly in
research has identified several capabilities that Best- executive level support will help facilitate faster the SMB space, is not only providing access to
in-Class companies leverage in order to achieve implementation and promote greater adoption BI for more employees, but also ensuring that
their analytical goals. within the organization. The research shows the solution is actually being utilized. A logical
that Best-in-Class SMBs are 42% more likely way to understand this conundrum of access
 Process—recent Aberdeen research shows than Laggards to have garnered executive level versus usage is simply to measure usage levels
that even smaller businesses are managing an support for their BI initiative. of the BI system. Top performing SMBs were
average of 15 unique data sources. As data is more than twice as likely as all other SMBs to
collected from these multiple sources (such  Knowledge management—companies monitor this BI usage level.
as transactional systems, spreadsheets, data lacking expertise in managing the end-to-
warehouses and external data sources), it is end process of BI—as it relates to ETL, data  Technology—when it comes to the types
of paramount importance to define a formal warehousing and other expertise intensive of BI solutions in place, the research shows
process for this activity. Aberdeen’s research processes—stand to benefit greatly through that Best-in-Class companies are more likely

69
ANALYST FEATURE ■ BI FOR THE SMB

Figure 3: Best-in-Class SMBs move towards “pervasive BI”

Source: Aberdeen Group, July 2009

than all other SMBs to use several different more applicable and usable for non-technical company will deploy BI to one strategic function
technologies. The most common BI business users, many companies are trying to such as sales, marketing or finance. Once the
solution—traditional historic reporting and move towards this goal of “pervasive BI” in the value of the solution has proven itself out in
analysis—is still the most commonly used organization. In fact, the research shows that one area of the organization, the company
technology in place at all companies, but Best-in-Class SMBs are far more likely than all will look to expand its use in other areas of the
the Best-in-Class are working to achieve a other companies to have a pervasive deployment company, eventually leading to a more pervasive
balance of both strategic and tactical tools for of BI or a heavy usage of BI within their deployment of BI and the associated Best-in-
analysis (see Figure 2). organizations (see Figure 3). Class performance.
The fact that Laggard SMBs are more likely In order to improve BI adoption and drive
Key takeaways

O
to be using BI on a point solution or project basis more sustainable business improvements,
ne of the quickest ways to doesn’t necessarily mean that these companies SMB organizations should consider taking the
achieve a tangible return from don’t have the potential to reach Best-in-Class following action:
a BI investment is to widen the status. In many cases the research shows that
adoption and usage of the tool Industry Average and Laggard companies  Define sets of business unit KPIs that roll up
to more employees within the organization. simply have a younger deployment of BI and are to the overall company strategy
The economies of scale inherent in this type of struggling to find the right balance of people,  Start to migrate away from spreadsheets and
BI expansion produces a situation in which a process and technology to fully realize the benefit toward dedicated BI
nominal increase in resources is required to equip that these solutions offer.  Invest in developing a formalized training
a much larger set of users, and thus the cost-per- Frequently, a Best-in-Class company will program for end-users
user goes down. get to that level by utilizing a “land and expand”  Examine the use of outward customer-facing
As BI solutions have matured and grown strategy for BI deployment. In other words, a dashboards and BI tools.

Michael Lock
RESEARCH ANALYST, BUSINESS
INTELLIGENCE
Aberdeen Group “Best-in-Class
Michael Lock is a Research Analyst focusing SMBs are far more
on end-user adoption and usage of business
intelligence (BI) technology. In addition likely… to have a
to being widely published on the topic
of BI, Michael has written on a broad range of topics including unified pervasive deployment
communications, enterprise mobility, IT service management, green storage,
voice over Wi-Fi, and business process management (BPM). of BI or a heavy usage
Michael’s past research focused on the use of BI within the SMB
segment, collaborative techniques for BI usage, and the adoption of BI of BI…”
dashboard visualization tools in the enterprise.

70
HEAD TO HEAD ■ ACCESS SECURITY

Security at its best


Astaro are so concerned about your security that they’re going to give you their product—free. GERT HANSEN
(ASTARO) talks to ETM’s ALI KLAVER about why SMBs will triumph, the future of security, and why they’re
giving away free solutions to everyone.

http://www.GlobalETM.com

“... we actually
want to help these
businesses to avoid
sacrificing security for
efficiency and/or cost.”

72
ACCESS SECURITY ■ HEAD TO HEAD

A
GH:
K: ASTARO HAS SAID THAT THEY THINK
SMALL AND MEDIUM-SIZED BUSINESSES ARE
A CRITICAL PART OF STRENGTHENING THE
WORLD ECONOMY. WHY IS THIS?

I think that’s not only our opinion—many politicians share it.


We think the main reason is that many SMBs these days are led down
more conservative and cautious roads, and are subject to high requirements
created by investors or the public market. This type of conservative
“The reduction in
complexity and the increased
ease of use to administer to our
integrated web user interface
is obviously the preferred
business management keeps them strong even in tough times like the
current one. choice...”
Large enterprises need loans of banks or even the government. The
smaller companies maintain a steady and stable business and if you sum up
all the smaller companies, they equal in size, or are even greater, than the
larger enterprises. It is this fact that is currently helping to strengthen the This means
world economy, in our opinion. they get enterprise
firewall security at no cost
AK: TELL US MORE ABOUT YOUR NEW FIREWALL EDITIONS, and the business also gets better protection
THE ASTARO ESSENTIAL FIREWALL FOR BUSINESS USE AND compared to consumer devices.
THE ASTARO ESSENTIAL FIREWALL FOR VMWARE?

GH:
AK: THAT’S FANTASTIC NEWS GERT. AT A TIME WHEN
Astaro has been building and selling security products for close COMPANIES ARE LOOKING TO STRENGTHEN THEIR BOTTOM
to 10 years. During that time we have seen many different trends, and two LINE, IT’S INTERESTING THAT ASTARO IS GIVING AWAY THEIR
trends which we have seen lately have led to a decrease in company security. PRODUCT. SO WHY IS THIS, AND WHAT IS INCLUDED UNDER
The first one is a constant removal into virtualization. More and more THE TERM “FREE”?

GH:
companies are investing in virtualized environments and migrate many if not
all of their servers and network infrastructure into virtualization. That’s a good question—basically there are two motivators.
This certainly gives them many benefits such as better resource The first one is that we actually want to help these businesses to avoid
utilization, more and increased flexibility, better disaster recovery and so on. sacrificing security for efficiency and/or cost.
But at the same time they are decreasing their security level because there are The second one is that we hope the reach of Astaro will be increased and
not many security solutions available that run in the virtualized environment. that if people get used to our feature-rich and easy-to-use solutions they will
Those that are available are either very expensive or extremely buy the Professional edition once their security needs increase.
complicated to manage—some are even both. But for increased usability What we mean regarding the term “free” is that included in the Essential
people are willing to sacrifice security and connect all machines, left Firewall edition is:
unprotected, to each other. Using this type of networking infrastructure we
are finding ourselves back in the year 2000. > A complete internet router that is able to replace any existing
As a solution, and in order to help these customers, we have created equipment you have
an Essential Firewall edition of our Astaro Security Gateway product that
delivers the basic security functions to secure the virtual environment. This > An enterprise grade firewall to control who is allowed to communicate
will also be maintained free of charge. with whom
With this, every company can keep their current security policy while
migrating towards virtualization. This is just one trend where we want to help > Remote access for windows PC, iPhones and other mobiles to securely
customers. connect back to the company to use internal resources
The second trend we see is triggered mainly by the economic situation
the world finds itself in at the moment. Companies with financial challenges > A detailed reporting solution that easily shows you what is going on in
are increasingly using consumer network equipment to protect their your network and what the solution did for you.
company, primarily because it is cheaper.
Again, these companies are willing to sacrifice security to save money. The Essential Firewall edition also includes free updates to the software
In order to help these customers, we use the same Essential Firewall of and free support from our web portal, www.astaro.org. We think these are
our Astaro Security Gateway product and give it away free of charge to all the essential security functions that every company must have in the current
businesses. climate once they are connected to the internet. 

73
HEAD TO HEAD ■ ACCESS SECURITY

AK: WHY DO YOU FEEL THAT THE POINTS YOU MENTIONED


ARE THE ESSENTIAL SECURITY FUNCTIONS AND NOT AK: LET’S QUICKLY TAKE A LOOK AT INTEGRATION. WILL
OTHERS? USERS NEED TO DEACTIVATE OR COMPLETELY REPLACE THE

GH:
SECURITY SOLUTIONS THEY ALREADY HAVE IN PLACE IN
Well, security is a wide and complex field. There are many ORDER TO USE THE ASTARO ESSENTIAL FIREWALL?

GH:
different techniques and solutions available to protect a company and their
assets. That option is completely up to the customer to decide. A
We looked at the minimum requirement that every company should company can actually augment their existing installation by using the
have and the feature we selected was the least common denominator— Essential Firewall as an add-on to an existing solution, or they can replace it
therefore we included it in the Essential edition. completely.
Astaro offers a lot more of the security functions in our Professional The reduction in complexity, and the increased ease of use to
edition that customers are able to licence. But that really depends on administer to our integrated web user interface is obviously the preferred
what the customer needs and what their security policy indicates. Every choice, but again, a company needs to decide exactly what is right for them.
company needs to evaluate and decide for themselves what is
important to them. AK: HOW IS THIS OFFERING DIFFERENT TO THE FREE
HOME USE EDITION ASTARO OFFERS?

GH:
AK:AT ETM, OUR MEMBER BASE
INCLUDES QUITE A LOT OF SMALL The Free Home Use edition, which has
AND MEDIUM SIZED BUSINESSES. now been available for many years, is limited to
SO TELL ME, HOW WILL THIS home use only. We have many thousands of people
OFFERING BENEFIT THEM? “... every company can using the Home Use edition today and the

GH:
community around this is steadily increasing.
For those small keep their current security You can actually monitor it at www.astaro.org/
companies who are currently ourcommunityportal.
looking for a new security solution, policy while migrating The Home Use edition includes the
or if their existing security solution complete feature set of the Astaro Security
is up for renewal, they can now save towards virtualization.” Gateway product, but it’s not permitted to be
money and use our solution for free. used in companies and it’s limited to a maximum
This will help them to invest of 50 users.
the saved money into other business- Up until now administrators could only
generating activities like sales and use this at home. But with the new Essential Firewall
marketing, and it will therefore help them edition, they are now able to use an unlimited version of
to save cost on one side, and invest it wisely in the Astaro Security Gateway product with a reduced feature
business-driving tasks on the other. set, also in their company, completely free of charge.

Gert Hansen
CHIEF SOFTWARE
ARCHITECT,
Astaro

Gert Hansen co-founded Astaro in early 2000 and is


responsible for product strategy and software design.
He was previously with the internet service provider
Plannet Systems, and also co-founded the web
development company Timenet, collecting extensive
experience in both technology and entrepreneurship.
Gert studied computer science at the Technical
University of Karlsruhe.

74
ASK THE EXPERT ■ E-DISCOVERY AND COMPLIANCE

Proactive Information
Management
ETM’s ALI KLAVER talks to SIMON TAYLOR (COMMVAULT) about changing the way organizations think
about and manage their information into a top-down approach that aligns both IT and business perspectives.

http://www.GlobalETM.com

“We’re aligning,
for the first time and
through a single piece
of technology, better
information and then data
management of those
information assets.”

76
E-DISCOVERY AND COMPLIANCE ■ ASK THE EXPERT

A ST:
K: IT’S OBVIOUSLY NO One of the things we’ve been trying to
SECRET THAT MISMANAGING First of all, if we focus on the risk do, ever since we released the early version of
DATA CAUSES HUGE DOWN- aspect again, by organizing information more Simpana, is minimize the cost burden at an IT
STREAM PROBLEMS IN proactively you reduce the number of copies and level to do typical data management tasks that, for
BOTH INFORMATION DISCOVERY AND align them to particular business strategies and instance, other vendors have different products
RECORDS COMPLIANCE. WHY IS THIS classifications, thereby intuitively reducing risk. to do.
STILL SUCH A PROBLEM FOR MANY People keep records to reduce risk, so What Simpana 8 brings is a whole layer of
ORGANIZATIONS? risk is a big driver. In proactively organizing information management capability built on

ST: information so that it’s classified correctly and top of earlier releases of Simpana 6 and 7 that
The best way to answer this is if we organized for the right retention, businesses introduced very intuitive content indexing based
separate out the requirements for discovery. A lot get better rationalization of records, and that’s on every single piece of data that we touch, so that
of the traditional problems are caused because the underlying principle of good records we’re exposing all of this data at a business level
organizations approach it from a top-down management. and making it more accessible.
perspective, so it’s business-driven need around If we think about accessing content from I like to think of Simpana as being a type of
some form of risk. an e-discovery perspective, one of the biggest technology that transforms data into information
Typically what happens, if we take records problems from a litigation approach is that too and makes it more valuable to better access,
compliance for example, is that an organization much information gets generated. organization and classification. Today, Simpana
takes a very siloed and implementation approach For example, in the US, a simple set of criteria is a technology that has very defined unified
from an IT perspective to group together that as part of federal rules of civil procedure meet and management of data so that we reduce the cost
information and keep it in a particular way. confer sessions, which is typically an e-discovery- burden.
For instance, if you look at a finance based discussion between attorneys, can result in Finally, the classification and work process
organization complying to something like SEC masses of amounts of information that needs to technology that we’ve introduced, which we call
legislation, they would take a very supervisory be sifted through. content director, takes it one step further.
approach to the way they’re looking at content— However, if information was more intuitively We suggest that within the software you can
keep all their email communications, store them identifiable, organized, readily accessible and create patterns of analysis of information so that
in a particular silo and interrogate that content. aligned to access requirements, then you would if you identify particular records or classifications
The problem in doing this is that you end reduce almost implicitly the nature of the data of information assets that meet particular
up with multiple different sorts of silos and that’s being generated with a direct flow-on effect requirements, not only can you group and orient
repositories, basically because no one has been of time and cost benefits. them to particular business departments or
thinking about it from a bottom-up perspective. In summary, some of the key advantages of individuals, but you can also workflow them and
Now, if we took an e-discovery stance, what being more proactive is that you understand the put them into different technologies.
causes most of the pain, particularly with data records, reduce the amount you’re keeping and In effect, we are trying to create an almost
mismanagement, is having to search multiple have better alignment with retention policies—by information middle-ware, or an information
different environments—online sources, definition you’re achieving a better level of movement technology, that not only understands
applications, file systems, offline media, backup— compliance. the nature of information but allows you to
and other difficult environments like laptops Good policies lead to good litigation realign how that information is organized at a
and desktops which have to be imaged and management and reduced risk, so organizing business level.
interrogated fairly forensically to gather content. information and having it readily accessible
The answer is to think about how to means that what you access, from an e-discovery AK: YOU’VE TOUCHED ON COST
consolidate some of this data. So with these two perspective, is likely to be more responsive in ALREADY WHICH IS GREAT, BUT
separate things—the keeping of records and the first instance and therefore create better BECAUSE IT’S SUCH A HUGE ISSUE AT
organizing for compliance and supervision, versus downstream efficiencies which will ultimately THE MOMENT, CAN YOU TELL US HOW
e-discovery and finding things quickly when reduce your legal costs. SIMPANA 8 HELPS DRIVE DOWN COST?

ST:
litigation or FOI requests hit—you get good
alignment as to how information needs to be AK: OKAY SIMON, LET’S GIVE THE On an IT level, the nature of the
more proactively and strategically managed across AUDIENCE SOME SOLUTIONS. TELL platform technology itself means that you don’t
the organization. US MORE ABOUT YOUR PRODUCT need to implement multiple pieces of technology
OFFERING—COMMVAULT SIMPANA 8? to do the same thing with one technology and
AK: TRADITIONALLY IT’S BEEN A TOP-
ST: different components.
DOWN PERSPECTIVE WHEN IN FACT Simpana 8 is a milestone in our So straight away, processes such as archiving,
IT’S ORGANIZING INFORMATION technology. It’s the largest release we’ve ever back-up and replication are achieved with the
IN A CONSISTENT AND BOTTOM- delivered as part of the 12-year history of the same platform as those with one management
UP WAY THAT WORKS. SO WHAT Simpana version. interface. This reduces, fairly significantly, the cost
ARE THE CUSTOMER ADVANTAGES What is fairly significant about 8 is that burden of most organizations in implementing
OF A PROACTIVE INFORMATION we’ve introduced a lot of additional information data management software.
MANAGEMENT STRATEGY, management capabilities—classification engines The fact that, in Simpana 8, we took our single
PARTICULARLY AS IT RELATES TO and more intuitive data mining capabilities—that instance technology to the next level and created
LITIGATION AND CORPORATE ultimately allow people to organize, mine and a block level de-duplication technology that was
GOVERNANCE? access data quickly. built into everything we do at a software level, 

77
ASK THE EXPERT ■ E-DISCOVERY AND COMPLIANCE

means that if you’re archiving, backing up or projects fail is because they’re not joined downside to taking a more proactive approach
replicating, we only store that data once. up—it’s a top-down driven strategy that stops to the way they organize information.
This creates masses of reduction in terms when it hits applications.
of duplication of data and sometimes up to 40 Now we’re looking at how to streamline the AK: HOW IS SIMPANA 8 DIFFERENT
times less storage, just by using our software. business and IT-based information management FROM OTHER OFFERINGS IN THE
At an information level—let’s just focus so that the right level of efficiency is achieved MARKET TODAY, AND WHAT IS THE
on e-discovery because that’s a very good which directly benefits people exploiting and MAIN POINT OF DIFFERENCE?

ST:
example—with the electronic e-discovery managing records.
reference model, which is a 9-step process that a Finally, there are the high-level executives There are two main points of
lot of organizations follow when they’re finding who are concerned about risk. The underlying difference, and the first is unified technology.
electronically stored information for litigation, concern is that a lot of these executives We are doing with one technology what many
the main cost burdens are to do with what are accountable for the way information is other technologies have to implement separate
organizations do to find evidence. organized and retained, and if it isn’t retained in technologies for.
The second area of cost is legal, incurred the correct way they can be liable. For instance, the Microsoft business
through the processing and review of This joins everyone up from the top information search technology within Simpana
information. Using our type of technology you right down to an IT level, and it makes them allows us to exploit assets and information in a
can classify information more explicitly when understand what role they play in delivering a way that’s aligned with the way users typically
you’re trying to find it for a particular set of more joined-up information strategy. find information, and it does that very quickly.
criteria, which then drives down cost. It isn’t really about individual stakeholders, It really doesn’t matter how many different
By proactively content indexing and it’s about everyone being involved in the whole impressions of information we gain from
managing information, you don’t need to spend strategy so they understand the role they play the business or applications—ultimately
time sifting through information to provide in the better organization of information across the technology is about ensuring that we’re
the two or three thousand pieces of data that the business. minimizing the cost burden.
you think are the most responsive you can find Unification at the data level has direct
that information in just a matter of minutes, AK: THIS SOUNDS LIKE A FLOW- benefits at an IT level, and the way we exploit
significantly reducing both the IT and the ON EFFECT, SO IF A COMPANY information obviously gives direct productivity
business cost involved in doing that. CAN IMPLEMENT A CONSISTENT and risk-reduction benefits at a business level
When you’re faced with a litigation cost INFORMATION MANAGEMENT because we’re exposing information in a way
that is exceeding $800,000 for an average case, SOLUTION ACROSS THE BOARD, that is non-challenging.
and you’re able to collapse the amount of effort YOU’LL ONLY SEE THE BENEFITS. LET’S The second thing that is more important
required in pinpointing evidence by 50-60%, NOW LOOK AT A GLOBAL SCALE— from a business point of view is that we work
you can see that what you do proactively at an HOW DOES COMMVAULT SIMPANA 8 from a joined-up thinking approach. We’re
IT level has huge benefits in terms of passing APPEAL TO VARIOUS INDUSTRIES AND aligning, for the first time and through a single
responsive data to attorneys. VERTICALS ACROSS THE GLOBE? piece of technology, better information and

ST: then data management of those information


AK: THE COST AND TIME SAVINGS We have a broad customer base with assets.
SOUND CONSIDERABLE, BUT HOW over 10,000 customers across nearly every IT get the benefits they want, and more
WILL COMMVAULT SIMPANA 8 vertical worldwide. importantly, the business gets the benefit that
BENEFIT STAKEHOLDERS CROSS- When you look at information management they want in terms of reduced risk and better
FUNCTIONALLY, SUCH AS IT, LEGAL, it becomes very apparent that certain industries access to information.
COMPLIANCE, END-USER AND OTHER are more pertinent than the others. For
VARIOUS GROUPS, ACROSS THE instance, the finance community is very highly-
ORGANIZATION? regulated with strict compliance requirements Simon Taylor
SENIOR
ST: around retaining and supervising information
Most people talking about that are also aligned to institutions such as the DIRECTOR,
information compliance and governance in SEC. INFORMATION
the industry today refer to joined-up strategies Similarly, there are very tight regulations ACCESS AND
between business and IT. The only way you can in the pharmaceuticals industry and how drugs MANAGEMENT,
join up a strategy is to have cross-functional are managed, created, patents are filed and CommVault
teams that understand the stakeholders involved information is made accessible when litigation
in that process. These approaches benefit all of arises. Simon is Senior Director for the
these people implicitly. On a worldwide basis one of the biggest CommVault Information Access and
For instance, better organization of increasing drivers to get people more focused Management business worldwide,
information to do with email, whether you’re in this area is litigation and e-discovery of including information risk, e-discovery,
keeping it for e-discovery reasons or better electronically stored information. Lots of compliance, information search, archiving
compliance, leads to better application industries are now faced with challenges in and data analysis. His field of expertise
management. court around electronic content and they need covers a range of topics including
You’ve also got CIOs that are trying to to immediately find evidence. information and data intelligence, data
implement a holistic approach to information Most organizations have some form warehousing, application and information
management. The reason why a lot of those of exposure in this area so there’s really no management.

78
When litigation arises,
will you have everything you need
at your fingertips?
Access & discover relevant ESI—including email messages, files,
and backup data—at a moment’s notice with Simpana® software.
When faced with legal challenges, every minute matters. After all, opposing counsel isn’t going to wait
while you sift through years of documents, trying to find relevant data. CommVault® Simpana® 8
makes eDiscovery simple by providing you with a range of information management
capabilities to deliver efficient and intuitive legal access to corporate email messages,
files, and collaboration data. Simpana 8 enables search and classification across all
ESI including laptop/desktops, backup copies, managed legal preservation, and
archive retention—all from a single console and single infrastructure.
To find out more about the most comprehensive, risk-averse,
and cost-managed eDiscovery solution in
existence, go to commvault.com.

BAC K UP & R E C O V E RY A R C H IV E R E P LIC AT IO N R E S O U R C E MA NA GEMENT SEARCH

©1999-2009 CommVault Systems, Inc. All rights reserved. CommVault, the “CV” logo, Solving Forward, and Simpana are trademarks or registered trademarks of CommVault Systems, Inc. All other third party brands,
products, service names, trademarks, or registered service marks are the property of and used to identify the products or services
servi of their respective owners. All specifications are subject to change without notice.
CAREER PATH ■ MARTIN KUPPINGER

Career path

Meet: Martin
Founder and Senior Partner
Kuppinger
Kuppinger Cole + Partner

M
artin Kuppinger is the author of more than 50 IT-related books, as well as being a widely-read
columnist and author of technical articles and reviews in some of the most prestigious IT magazines
in Germany, Austria and Switzerland. He is also a well-known speaker and moderator at seminars
and congresses. His interest in Identity Management dates back to the 80s, when he also gained
considerable experience in soft ware architecture development. He shares his career path so far with ETM...

WHAT IS THE BEST ADVICE YOU’VE RECEIVED?

MK: A professor of mine once said when discussing options for


studying and a future profession: “If you feel that you’ll ever regret not doing
that step, do it.” Martin Kuppinger
Founder and Senior Partner
WHAT IS THE MOST REWARDING EXPERIENCE YOU’VE HAD? Kuppinger Cole + Partner

MK: Apart from my personal life, I have had many positive and
rewarding experiences. Overall I feel the most rewarding thing is when
business appears to be fair and trust is honoured. But I also like hearing
feedback from competitors like: “This guy really knows a lot about Identity FACT FILE
Management”.
> Kuppinger Cole + Partner (KCP), founded in 2004, has become the
WHAT DO YOUR COLLEAGUES SAY ABOUT YOU? WHAT ARE leading Europe-based analyst company for all topics around Identity
YOUR STRENGTHS? Management and Digital Identities.

MK: It’s probably best to ask them... but overall I think that my
strengths are trustworthiness, knowledge and fairness.
> KCP stands for expertise, thought leadership and a vendor-neutral
view on the broader “identity market”, including aspects like classical
Identity and Access Management (IaM), Information Rights Manage-
IF YOU COULD CHANGE ONE THING ABOUT YOUR JOB, WHAT ment (IRM), Identity Risk Management, Digital Certificates, Cards and
WOULD IT BE? Tokens, Single Sign-On, Auditing, Federation, User Centric Identity

MK:
home office.
I would like to spend less time travelling and more time at my
Management and Identity 2.0, and many more.

> Services include: Kuppinger Cole Strategic Advice, Kuppinger Cole


Readiness Analysis, Moving from Cost Drivers to Business Support, Role
WHAT DO YOU DO WHEN THE GOING GETS TOUGH? Analysis and Role Management, and Structured Approach for Successful

MK: Sports such as running and cycling help to really free up the
mind. Besides this, personal task management reduces the risk of the going
IAM Projects.

> KCP provides results in their free newsletters and the comprehensive
getting tough in the first place. monthly KCP market view newsletter, through webinars, reports, studies,
keynote presentations and events.
HOW DO YOU STAY UP-TO-DATE PROFESSIONALLY?

MK: Briefings with vendors and end users are always interesting
because they’re essentially the front line, and I keep up with recent research.
> KCP research covers over 100 companies in the broader IAM space
without limiting itself to any key players. They observe the leading com-
panies as well as the emerging ones.

If you would like more information about Martin Kuppinger go to www.kuppingercole.com, read his blog at http://blogs.kuppingercole.com,
or visit www.id-conf.com for the European Identity Conference 2010, a Kuppinger Cole event.

80
EVENTS AND FEATURES ■ 2009/2010

Events and features 2009/2010


ETM is focusing on
BI, GRC and Security
INTERCONNECTION WORLD FORUM 2010 GARTNER BUSINESS PROCESS GARTNER INFRASTRUCTURE,
DATES: 25 – 28 January 2010 MANAGEMENT SUMMIT OPERATIONS AND DATA CENTER SUMMIT
LOCATION: London, UK DATES: 1 – 2 March 2010 DATES: 24 – 25 March 2010
URL: www.iir-events.com LOCATON: London, UK LOCATON: Sydney, Australia
URL: www.gartner.com/it/page.jsp?id=928017 URL:www.gartner.com/it/page.jsp?id=1177915
INTERNATIONAL CONFERENCE ON
COMPUTER EDUCATION, MANAGEMENT GARTNER BUSINESS INTELLIGENCE AND GARTNER BUSINESS INTELLIGENCE
TECHNOLOGY AND APPLICATION INFORMATION MANAGEMENT SUMMIT SUMMIT
DATE: 27 – 28 January 2010 DATES: 2 – 3 March 2010 DATES: 12 – 14 April 2010
LOCATION: Kathmandu, Nepal LOCATON: Sydney, Australia LOCATON: Las Vegas, NV
URL: www.coemta.org URL: www.gartner.com/it/page.jsp?id=1175212 URL:www.gartner.com/it/page.jsp?id=1118023

BLACK HAT BRIEFINGS AND TRAINING DC GARTNER IDENTITY AND ACCESS GARTNER ENTERPRISE INTEGRATION
2010 MANAGEMENT SUMMIT SUMMIT
DATES: 31 January – 3 February 2010 DATES: 3 – 4 March 2010 DATES: 13 – 14 April 2010
LOCATION: Arlington, VA LOCATON: London, UK LOCATON: Sao Paulo, SP
URL: www.blackhat.com/html/dc2010/dc2010- URL: www.gartner.com/it/page.jsp?id=928020 URL:www.gartner.com/it/page.jsp?id=1188513
home.html
CLOUD CONNECT GARTNER ENTERPRISE TECHNOLOGIES
GARTNER BUSINESS INTELLIGENCE DATES: 15 – 18 March 2010 SUMMIT
SUMMIT LOCATON: Silicon Valley, CA DATES: 21 – 22 April 2010
DATES: 1 – 2 February 2010 URL:www.cloudconnectevent.com LOCATON: Mexico City, Mexico
LOCATION: London, UK URL:www.gartner.com/it/page.jsp?id=1188514
URL: www.gartner.com/it/page.jsp?id=927913 GARTNER CUSTOMER RELATIONSHIP
MANAGEMENT SUMMIT INTEROP LAS VEGAS
MARKETING WORLD 2010 DATES: 16 – 17 March 2010 DATES: 25 – 29 April 2010
DATES: 8 February 2010 LOCATON: London, UK LOCATON: : Las Vegas, NV
LOCATION: San Francisco, CA URL:www.gartner.com/it/page.jsp?id=934115 URL:www.interop.com/lasvegas
URL: www.frost.com/prod/servlet/summits-
details.pag?eventid=169406039&as=attend GARTNER CIO LEADERSHIP FORUM
DATES: 21 – 23 March 2010
TDWI WORLD CONFERENCE 2010 LOCATON: Phoenix, AZ
DATES: 21 – 26 February 2010 URL: www.gartner.com/it/page.jsp?id=1189395
LOCATION: Las Vegas, NV
URL: http://events.tdwi.org/events/las-vegas- GARNTER BUSINESS PROCESS
world-conference-2010/home.aspx MANAGEMENT SUMMIT
DATES: 22 -24 March 2010
VIRTUAL EDGE SUMMIT LOCATON: Las Vegas, NV
DATES: 22 – 23 February 2010 URL:: www.gartner.com/it/page.jsp?id=1216615
LOCATON: Santa Clara, CA
URL: www.virtualedge.org

Interested in contributing?
If you’re an analyst, consultant or an independent and would like to contribute a
vendor-neutral piece to future issues of ETM, please contact the managing editor,
Ali Klaver: aklaver@enterpriseimi.com.

82
My CEO doesn’t
know my name.
And that’s the way
I plan to keep it.

Effective data security is key to


Our solution provides a multi-level approach
preventing breaches, simplifying the
to data security and compliance:
compliance process and reducing risk
• NetIQ® Security ManagerTM – from Log
to your organization. Let us help you
Management to Complete SIEM
focus your time, money and resources
• NetIQ® Secure Configuration ManagerTM –
on more strategic projects, reduce Compliance Assessment to Security Configuration Auditing
the workload of securing critical
• NetIQ® Change GuardianTM – Privileged-User
information, and streamline compliance Management and File Integrity Monitoring
reporting for mandates such as PCI DSS, • NetIQ® Aegis® – the First IT Process Automation
HIPAA, NERC, and Sarbanes-Oxley. Platform for Security and Compliance

If you’d like to find out more about how NetIQ can help you with data security and critical compliance
mandates, visit www.netiq.com/undertheradar or contact info@netiq.com.

© 2009 NetIQ Corporation. All rights reserved. NetIQ, the NetIQ logo, NetIQ Security Manager, NetIQ Secure Configuration Manager, NetIQ Change Guardian, and NetIQ Aegis are trademarks or
registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other jurisdictions. All other company and product names may be trademarks or registered trademarks of their
respective companies.

Potrebbero piacerti anche