"Thats the way we always do it" - Is this the right way or is there an Alternative?
· Business Investigation - this phase involves the gathering and analysis of information to gain an understanding of the current business situation and to make explicit the vision and needs of the business. The alignment of the concept to the business strategy is validated and the value of
· Business Investigation - this phase involves the gathering and analysis of information to gain an understanding of the current business situation and to make explicit the vision and needs of the business. The alignment of the concept to the business strategy is validated and the value of the initiative is assessed. This can be broken down into the following deliverable's and activities:
Deliverable Approval
Business Profile Consultant
Concept Statement Sponsor
Concept Feasibility Report Sponsor
Strategic IT Plan/Roadmap Owner
Activities
· Initiative Investigation - To investigate approved business concepts to clarify the business scope and determine the technical feasibility of the initiatives alternatives identified. Prepare a business proposal outlining the recommended initiative strategy, estimated investment and resource requirements. The proposal provides a mechani
· Initiative Investigation - To investigate approved business concepts to clarify the business scope and determine the technical feasibility of the initiatives alternatives identified. Prepare a business proposal outlining the recommended initiative strategy, estimated investment and resource requirements. The proposal provides a mechanism for communicating initiatives to other business units, enabling them to plan their involvement and for the initiation of projects and subsequent hand-over to nominated teams
Deliverable Approval
Requirements Specification Sponsor
Solution Strategy Assessment Sponsor
Conceptual Solution Design TechOwner
Solution Proposal Sponsor
Activities
· Business Justification - This phase involves the definition and analysis of the financial metrics and business benefits for the business concept. The findings are used to validate the business value and are used to measure against other investments under consideration
Deliverable Approval
Business Justi
· Business Justification - This phase involves the definition and analysis of the financial metrics and business benefits for the business concept. The findings are used to validate the business value and are used to measure against other investments under consideration
Deliverable Approval
Business Justification Report Sponsor
Activities
A reusable set of methodologies to deliver the identified Transformation strategy and the expected business benefits identified These Stages Include:
A reusable set of methodologies to deliver the identified Transformation strategy and the expected business benefits identified These Stages Include:
Solution Development - This stage involves developing all the components of the solution. The components developed include a development and test environment for the Proof of Concept, which is used to validate that the solution meets the user requirements. The development environment is an extension on the prototype development and is w
Solution Development - This stage involves developing all the components of the solution. The components developed include a development and test environment for the Proof of Concept, which is used to validate that the solution meets the user requirements. The development environment is an extension on the prototype development and is where the detailed design is taken from a conceptual stage to a physical stage. Integration, application verification, and automated builds are key elements of this stage along with rigorous testing and quality assurance .
Solution Delivery - The Solution Delivery stage is when the solution is implemented into the production environment. Once the full production implementation is complete the project is reviewed, closed off, the solution handed over to the operational management teams, and any lessons learned from the project documented
Solution Delivery - The Solution Delivery stage is when the solution is implemented into the production environment. Once the full production implementation is complete the project is reviewed, closed off, the solution handed over to the operational management teams, and any lessons learned from the project documented
Business Readiness and Change - Business Readiness and Change management are critical components in ensuring that the business is prepared for the impact of implementing the new solution. Preparing the business for change requires a detailed communications strategy and planning exercise. Providing the right levels of communication and u
Business Readiness and Change - Business Readiness and Change management are critical components in ensuring that the business is prepared for the impact of implementing the new solution. Preparing the business for change requires a detailed communications strategy and planning exercise. Providing the right levels of communication and user training are critical elements in ensuring a successful solution implementation. This stage also implements the detailed processes and procedures required for the operational support teams to effectively manage the new solution.
Protection methodology's designed to applied to a business of any size. From one off security and compliance assessments to an end to end continuous security operational services to understand and minimise risk profiles for business. Predefined repeatable services are available below but a customised engagement can also be created using t
Protection methodology's designed to applied to a business of any size. From one off security and compliance assessments to an end to end continuous security operational services to understand and minimise risk profiles for business. Predefined repeatable services are available below but a customised engagement can also be created using the building blocks below.
High Level Security assessment – A High Level IT Security Review allows the customer to better understand their current security posture in relation to international standards and best practices. It will identify at a high level, the areas of ICT Security that need attention and provide a baseline from which decisions can be made. Reviewing ICT Security posture is a pro-active, risk avoidance process that is aimed at reducing exposure and costs arising from a potential security breach. This can also include:
A set of support and protection services to enable the business investment to perform, minise the risk profile and deliver on the identified outcomes
Operational readiness assessment - Perform a high level assessment of the current state of the organisation operational strategy is performed, resulting in creation of a baseline. The gap be
A set of support and protection services to enable the business investment to perform, minise the risk profile and deliver on the identified outcomes
Operational readiness assessment - Perform a high level assessment of the current state of the organisation operational strategy is performed, resulting in creation of a baseline. The gap between the envisioning initiatives and the current state of the organisation can be determined. This can also include
Operational review assessment - Perform a high level assessment of the current state of the organisation operational practices. This can also include