+ All Categories
Home > Business > GDS International - FST - Summit - US - 9

GDS International - FST - Summit - US - 9

Date post: 19-May-2015
Category:
Upload: gds-international
View: 287 times
Download: 0 times
Share this document with a friend
Description:
Troux and Enterprise Portfolio Management - White Paper 1.0
Popular Tags:
23
Confidential Business Technology Management and the Enterprise Portfolio A Troux White Paper February 2012
Transcript
Page 1: GDS International - FST - Summit - US - 9

Confidential

Business Technology Management and the

Enterprise Portfolio

A Troux White Paper

February 2012

Page 2: GDS International - FST - Summit - US - 9

White Paper

2 CONFIDENTIAL

Contents Executive Summary ................................................................................................................................. 3

Introduction ............................................................................................................................................ 4

Business Technology Management .......................................................................................................... 5

The IT Planning Ecosystem....................................................................................................................... 6

The Journey to BTM ................................................................................................................................ 9

The Enterprise Portfolio......................................................................................................................... 10

The Enterprise Portfolio is Critical to High Priority Initiatives ................................................................. 14

Application Portfolio Management .................................................................................................... 15

M&A .................................................................................................................................................. 15

Cloud Planning................................................................................................................................... 16

Investment Management .................................................................................................................. 17

Solution Architecture ......................................................................................................................... 17

Change Management ........................................................................................................................ 18

The Troux Approach .............................................................................................................................. 19

Appendix: A Parable that Enlightens ...................................................................................................... 23

Page 3: GDS International - FST - Summit - US - 9

White Paper

3 CONFIDENTIAL

Executive Summary

CIO’s can better respond to the needs to reduce cost, improve compliance, and be more agile in

countering competitive threats by applying the principles of Business Technology Management

(BTM). Foundational to BTM is the Enterprise Portfolio. The Enterprise Portfolio is a

repository that contains information about the sum of all IT portfolios (Applications, Projects,

Technologies and Information) and their relationships to each other and to the Business

Portfolios (Business Architecture and Business Strategies).

The Enterprise Portfolio delivers analytics that greatly improve the processes that constitute

the BTM program. Furthermore an Enterprise Portfolio approach is critical to success for high

priority CIO initiatives such as Application Portfolio Management, Cloud Migration, M&A, etc.

Troux provides a solution that implements an Enterprise Portfolio approach to BTM that offers

a combination of software and know-how that insures customer success and self-sufficiency.

Page 4: GDS International - FST - Summit - US - 9

White Paper

4 CONFIDENTIAL

Introduction

CIO’s are faced with three major challenges: Cost, Compliance, and Competitive Threats.

We know that for most enterprises the IT budget allocated to “keep the lights on” is large --- up

to 80% of the IT budget. These costs are directly tied to sprawl & complexity that have come

about due to M&A or simply undisciplined growth over time.

Compliance is on everyone’s mind and since it is the IT systems that at the end of the day that

implement most of the business processes --- understanding those systems and how they

support the business is paramount to being responsive to compliance mandates.

Competitive Threats come about because the complexity of IT hinders agility and soaks up

innovation dollars that would be better spent improving the competitive stance.

It is these business drivers that are behind the strong interest in improving how IT supports the

business through Business Technology Management (BTM).

Page 5: GDS International - FST - Summit - US - 9

White Paper

5 CONFIDENTIAL

Business Technology Management

Wikipedia1 defines Business Technology Management (BTM) as:

“Business technology management (BTM) is a management science that seeks to unify

business and technology decision-making at every level in an enterprise. …

BTM builds bridges between previously isolated tools and standards for business

technology management by strategically incorporating both operational and

infrastructure levels of technology management to ensure that an enterprise’s business

strategy can be realized by the technology it deploys.”

Simply put, BTM brings together IT technology planning tools, processes and investments to

deliver improved business value. Of course this raises the question of what are these tools,

processes and investments and how can they best be orchestrated to deliver on the promise of

BTM?

1 http://en.wikipedia.org/wiki/Business_technology_management

Page 6: GDS International - FST - Summit - US - 9

White Paper

6 CONFIDENTIAL

The IT Planning Ecosystem

Figure 1 is a representation of the common IT planning systems deployed in most enterprises

today. In this diagram these systems are depicted in an ecosystem based on the types of

information they contain and the processes they enable. The horizontal ordinate represents

the spectrum of “run the Business” information to “change the Business” information and the

vertical axis represents whether the information is operational in nature or strategic in nature.

The positioning of the various systems is subjective, but generally speaking relative placement

represents the nature of each of these systems and the types of processes they support. For

instance, an enterprise’s ITSM investments are largely established to support ITIL processes and

to achieve IT operational excellence with a very limited viewpoint of future state strategic

information or processes.

Figure 1

The IT Management Ecosystem

The collection of the information found in this eco-system represents the “Enterprise Portfolio”

which we will discuss further in the next section. It’s also worth noting that for most

STRATEGIC INFORMATION

OPERATIONAL INFORMATION

RU

N T

HE

BU

SIN

ESS

CH

AN

GE TH

E BU

SINESS

FinancialManagement

EA ModelingProject

and PortfolioManagement

BPM

Data Management

ALM

ITSM

GRC

Page 7: GDS International - FST - Summit - US - 9

White Paper

7 CONFIDENTIAL

Enterprises this IT Management ecosystem requires multiple venders, each providing best of

breed solutions and processes.

Enterprises have invested in their current IT management systems to support a wide variety of

IT processes. Today most of these processes are silo-ed within a particular system, but in fact if

we step back and take a “big picture” view of these processes it is possible to identify a set of

interacting planning value chains that span IT in its entirety. These BTM value chains can be

characterized into four fundamental planning processes as shown in Figure 2.

1. Business and IT Planning: The process of business and IT strategic planning and

roadmapping.

2. IT Portfolio Governance: The processes of managing the risk, health, standards and

compliance of the IT assets such as infrastructure, applications, and services.

3. IT Demand to Delivery: The process of managing business demand , funding, solution

architecture, governance, and delivery.

4. IT Financial Management: The processes of IT financial budgeting, measurement,

reporting, and forecasting.

Figure 2

The BTM Value Chains

Business and IT strategic planning and roadmapping

Business & IT Planning

IT Portfolio Governance

Risk, health, standards and compliance management

IT Demand to Delivery

Business demand , funding, solution architecture and delivery

IT Financial Management

IT financial budgeting, measurement, reporting, and forecasting

Page 8: GDS International - FST - Summit - US - 9

White Paper

8 CONFIDENTIAL

These value chains do not exist independently, but instead create a value network through their

interactions. Figure 3 depicts an example showing how they interact. In this case a new

business need identified in the Business/IT planning value chain drives budget needs in the IT

Financial Management value chain resulting in a new program request in the Demand to

Delivery value chain that needs to be coordinated with investment needs (for example an

application modernization need) coming from the IT Portfolio Management value chain.

Figure 3

The BTM Value Network

As can be seen, the BTM space is comprised of a broad set of rich information sources and a

number of interacting value chains and processes that are each dependent on the other. It is

clearly a complex system and due to that complexity it can be chaotic and subject to the “IT

butterfly effect” where small changes in the environment can have unexpected and potentially

disastrous results.

IT Portfolio Management

Portfolio

Stewardship

Assess risks, opportunities

Plan to improve

Measure and Communicate

IT Demand Management

Capture Demands

Evaluate ExecuteMeasure and Communicate

IT Financial Management

Budgeting Allocation Reporting Forecasting

Business/IT PlanningManage Business Context

Assess GapsManage Plan

of ActionMeasure and

Align.

Page 9: GDS International - FST - Summit - US - 9

White Paper

9 CONFIDENTIAL

The Journey to BTM

The promise of BTM is to seamlessly automate the collection of IT value chains by leveraging

information found across the multi-vender IT management ecosystem. Given the complexity,

mission criticality, multi-vender and evolving nature of the IT eco-system, it’s unlikely any single

vender can deliver BTM in totality. That said, we at Troux have a single focus to help our

customers improve their BTM programs by providing out of the box analytics that span their

multi-vender eco-system and inform the IT value chains. To that end we approach the

challenge by integrating the IT eco-system into what we call the Enterprise Portfolio which

represents the dynamic, centralized repository that a true BTM solution requires (see Figure 4).

The complexity of the relationships between these systems is represented leveraging Enterprise

Architecture foundations. Furthermore both current and future states are represented.

Page 10: GDS International - FST - Summit - US - 9

White Paper

10 CONFIDENTIAL

The Enterprise Portfolio

An Enterprise Portfolio contains descriptions of all assets, both tangible and intangible, for

which IT is responsible and their relationships, not only to each other, but to the Business as

well. In addition to current state information, future state roadmaps are represented.

Figure 4

The Enterprise Portfolio

The assets for which IT has stewardship responsibilities can be broken down into the following

four portfolios:

Application portfolio: Applications are the touch point between the Business and IT.

The applications represent a substantial IT asset that requires continuous ongoing

management. Ultimately the Application portfolio collectively becomes in itself a

Troux 9 Business Technology Management Platform

Business Goals & Strategy

Business Architecture

Applications

TechnologyInformation

Projects

Enterprise Portfolio Management

Page 11: GDS International - FST - Summit - US - 9

White Paper

11 CONFIDENTIAL

sustainable asset with many stakeholders, leveraged for many use cases and periodically

referenced by almost everyone in the enterprise.

Project portfolio: Program and Project Portfolio Management (PPM) is a mature

capability practiced by many leading Enterprises today. Also referred to as Demand

Management, it’s the process by which Business stakeholders make decisions about

investment funding and execution of a change to the current IT or business operations.

When combined with an Enterprise Portfolio perspective, better decisions are enabled

across the entire portfolio of projects.

Technology portfolio: The Technology portfolio represents all the “hard” or “Physical” IT

assets the Enterprise has invested in. In addition it also contains the catalog of all

technology standards, their status in the Enterprise (approved, denied, etc.) and the

roadmap for each catagory item.

Information portfolio: The Information assets are critical in identifying information risks

and how existing data can be leveraged within the enterprise. Pro-actively managing

Information assets and their policy status such as sensitivity rankings helps keep those

assets under proper control. Using a portfolio approach to the management and policy

classification of information assets provides a comprehensive understanding of what

common information assets exist and how they relate to other portfolios, most notably

the Business and Applications.

Additionally, an Enterprise Portfolio will contain descriptions of the Business which can be

represented in two additional portfolios:

Business Strategy portfolio which captures all the intangible aspects that drive the

Business decisions going forward. This critical portfolio, referred to by Gartner as

“Business Context”2 , contains all the external drivers, strategies, requirements,

principles, goals and objectives affecting the Enterprise as a whole.

Business Architecture portfolio which describes the Business capabilities, processes,

products and organization

2 Gartner, “EA Must Include Defining Your Enterprise Context”, Publication Date: 2 March 2011 ID Number:

G00209976

Page 12: GDS International - FST - Summit - US - 9

White Paper

12 CONFIDENTIAL

Capturing and managing these business-oriented portfolios is a critical component in providing

visibility into the business alignment of the IT portfolios and investments. It is these elements,

the Business viewpoint, that enable a movement from an “IT Portfolio” view to a full

“Enterprise Portfolio” view.

For a different perspective on why the integrated multi-portfolio approach is important, the

reader is referred to the Appendix at the end of this document.

Much of the information that describes the IT portfolios exists today in repositories that

support IT processes such ITIL, ALM and PPM. As previously stated, the promise of BTM is to

integrate these silo-ed processes. The first step in this integration is the aggregation of the

various planning repositories into an Enterprise Portfolio.

As previously mentioned, Figure 1 is a representation of the various existing sources of

information about the IT portfolio. Each of these repositories is the authoritative source for

one aspect of the Enterprise Portfolio, but none are well suited as the Enterprise Portfolio

because they are purpose built to support well established critical processes such as Change

Management or Project Management.

As shown in Figure 5, what is required is an integration approach that aggregates information

from each repository and then enriches that information --- using enterprise architecture

foundations --- to describe relationships between the portfolios. Additionally, many of these IT

planning systems are solely focused on the current operational state, so, future plans or

roadmaps need to be defined for each portfolio so that effective planning can be accomplished

across multiple portfolios.

Page 13: GDS International - FST - Summit - US - 9

White Paper

13 CONFIDENTIAL

Furthermore, in order to manage and govern the information in the Enterprise Portfolio,

ongoing stewardship and governance has to be established and automated, via workflows, for

each portfolio, addressing data quality, currency and completeness criteria that can be trusted.

Lastly, integrations with other sources of record must be automated to the extent possible to

insure currency as a onetime “import” is insufficient to support on going the decision support

needs.

Figure 5

Enterprise Architecture Integrates Silos of Information

BPM

ProcessAnalysis

ProcessDesign

EnterpriseArchitecture

ProcessSimulation

ProcessExecution

ProcessMonitoring

Future StateArchitecture

Roadmaps

Governance

BusinessStrategy

Scenarios

PPM

TimeTracking

DemandManagement

ProjectPlanning

Investment Planning Projects

Costing

CMDB

IncidentManagement

Service LevelManagement

ChangeManagement

ConfigurationManagement

Current StateArchitecture

AvailabilityManagement

Applications

ResourceManagement

Standards

Page 14: GDS International - FST - Summit - US - 9

White Paper

14 CONFIDENTIAL

The Enterprise Portfolio is Critical to High Priority

Initiatives

When Troux is established as the Enterprise Portfolio, a number of critical new use cases are

unlocked enabling cross portfolio planning in support of BTM the vision (see Figure 6).

Figure 6

Troux Delivers the Enterprise Portfolio

To that end it is useful to move beyond the theory of an Enterprise Portfolio and better

understand how it would be used in delivering supporting high priority BTM initiatives. It is also

important to note that an Enterprise Portfolio cannot by itself deliver BTM, but rather it can

deliver critical analytics that improve the planning and decision making across all IT portfolios

and processes. The examples that follow are just a few of the numerous high value use cases

an Enterprise Portfolio approach to BTM enables.

STRATEGIC INFORMATION

OPERATIONAL INFORMATION

RU

N T

HE

BU

SIN

ESS

CH

AN

GE TH

E BU

SINESS

FinancialManagement

EA Modeling

Project and PortfolioManagement

Business Process Management

MDM

ALM

ITSM

Asset Mgmnt

Enterprise Portfolio

Management(Troux)

Page 15: GDS International - FST - Summit - US - 9

White Paper

15 CONFIDENTIAL

Application Portfolio Management

IT organizations are under constant pressure to better align to the business, optimize resource

usage, identify and redirect wasted spending, improve compliance, and increase agility. In

many organizations basic application maintenance expenditures account for over 80% of annual

budgets so finding efficiencies in the application portfolio can yield significant benefits.

Since the application portfolio is the touch point with the business it is essential that an

Application Portfolio Management program is a sustainable and continuous. It has a large

audience of users and is foundational to a large number of use cases beyond cost saving

including compliance, impact analysis, risk management, modernization, and investment

planning. What IT and business needs is complete visibility into the application portfolio with

detailed understanding of the upstream dependencies (business processes, functions and

strategies) and downstream dependencies (infrastructure, software, servers) of applications,

services and projects. IT organizations need the appropriate capabilities to effectively

communicate cost-optimization efforts, change impact, risk management plans and secure buy-

in from business partners as well as provide real-time reporting on the application portfolio

risk, health, compliance and alignment.

Troux solutions enables businesses to analyze and gain insight into how best to manage and

optimize the Application Portfolio through the understanding of the of the entire enterprise

portfolio. Troux provides an integrated and automated out-of-the-box application for

application portfolio management

M&A

Executing a M&A transaction requires companies to understand business, operational and IT

ramifications of consolidation and integration. In addition, acquiring or merging with another

enterprise requires understanding of how new portfolios align to business goals and strategies.

Page 16: GDS International - FST - Summit - US - 9

White Paper

16 CONFIDENTIAL

How those portfolios create new or enhancing existing business capabilities is key to a

successful M&A event.

IT infrastructures are not always assessed during the formative stages of a M&A project. This

can lead to serious business and technology misalignments when integrating two organizations.

. The key to successful acquisitions is to develop a successful integration plan that

accommodates business, operational and IT aspects.

Troux solutions allow enterprises to assess these potential pitfalls and help align the

organization's strategies, operating models, and IT assets, – ultimately helping the enterprise

gain a business- centric view of the necessary IT transformations by considering the entire

enterprise portfolio within context of the acquisition or merger.

Cloud Planning

The cloud creates opportunities for IT and business --- improvements in agility, efficiency, cost

and simplification. Every enterprise needs to look at cloud transformation initiatives to not only

understand the business benefit and operation differentiation they can provide, but t also

understand the ramifications and implications to the business of making such a transformation.

In answering the question “what and how to move to the cloud” IT organizations have a

number of facets they needs to assess including multiple deployment options, project and

budget risk, security risks, elasticity of demand, regulatory implications, SLA’s and audit

challenges and finally the expected ROI of the various cloud transformation initiatives.

Troux solutions allow enterprises to understand their enterprise portfolios, to identify and

assess application candidates for migration to a cloud environment within the context of

technology risk, application suitability, security considerations and alignment to business goals

and strategies. By understanding the cloud opportunity through the lens of all the affected

enterprise portfolios, businesses can build better cloud transformation initiatives.

Page 17: GDS International - FST - Summit - US - 9

White Paper

17 CONFIDENTIAL

Investment Management

Large enterprises are faced with an ever increasing array of investment demands. To make

effective, impactful decision about which investments to pursue and which to reject requires a

deep understanding of those investment proposals within the context of the overall enterprise

portfolio.

Investments and program proposals need to be evaluated as part of the business and IT

planning process. To make the right decision, executives need to understand the alignment of

the potential investment landscape to the strategic goals and intent of the business. For

example, a proposed investment in application modernization or cloud transformation needs to

be evaluated with respect to the impacted enterprise goals, strategies and business capabilities

together with an understanding of existing application and technology roadmaps.

Troux solutions allow enterprises to assess investment and program proposals using a business-

centric view of the impacts and align these proposals to business goals and business

capabilities. New understanding of the investment with respect to the impact on the

Application, Technology, Process and Information Portfolios is gained.

Solution Architecture

Delivering on time and on budget is always a top CIO priority and CIOs need to make best use of

scarce project funding. Key to delivering projects on time that meet the business need is

excellent solution architecture. Solution architecture is an architectural abstraction of an end-

to-end solution consisting of applications, information and technology to support specific

business capabilities and business strategies. Without insight to the enterprise portfolio it is

problematic to design a successful solution architecture.

Solution Architecture must understand the current state the new solution will integrate with

and leverage opportunities for re-use in the current portfolio. Additionally, solution

Page 18: GDS International - FST - Summit - US - 9

White Paper

18 CONFIDENTIAL

architectures must adhere to the published catalog of technology standards and patterns and

architecture governance boards will use these catalogs to govern project compliance. Good

solution architectures inform deployment teams so they can better understand how the

solution fits into the enterprise, how it integrates with other aspects of the IT portfolio and how

it supports the business.

Troux offers a purposed product based on The Open Group’s TOGAF approach to enterprise

architecture that supports the full TOGAF ADM insuring that solution architectures address all

aspects of the enterprise portfolio.

Change Management

Most CMDB/ITSM systems implement data models that represent elements of the business

architecture such as CI owners and the business processes supported. In practice however, this

information is not populated because it is not the remit of the Operations teams to manage this

type of information. Hence it is difficult for operation change teams to understand risks and

business impacts of change requests.

As the business becomes more and more dependent on IT to run all business processes the

direct impact to the business of SLA failures becomes more and more acute. Better

understanding of impacted business capabilities and organizations improves the operations

team’s ability to mitigate risk and improve SLA’s.

Troux provides integrations with leading ITSM products. These integrations allow business

architecture portfolios to augment the ITSM tools being used by the operations teams. By

providing the ITSM tools with access to the enterprise portfolio, the business architecture can

be automatically provisioned to the ITSM tools enabling Change Teams to better manage

change impacts and improve SLA’s.

Page 19: GDS International - FST - Summit - US - 9

White Paper

19 CONFIDENTIAL

The Troux Approach

Troux provides industry leading software that delivers rapid and continuous value by utilizing an

Enterprise Portfolio approach to BTM, By leveraging out of the box analytics that give insight

into the interconnected nature of the Enterprise Portfolio Troux’s solution delivers rapid and

sustainable business value. (see Figure 4).

Additionally, Troux also provides a prescriptive approach to ensure customer success and on-

going customer self sufficiency. These “Troux Accelerators” are based on an “outside in”

approach that focuses on answering a set of business critical questions that are aligned to

Troux’s rich set of out of the box analytics (see Figure 7).

Page 20: GDS International - FST - Summit - US - 9

White Paper

20 CONFIDENTIAL

Figure 7

Troux’s Outside in Approach

Based on years of experience working with hundreds of customers, Troux Accelerators deliver a

structured, yet agile approach to help you align and synchronize your BTM program to realize

better execution, control risk, and improve financial performance.

Troux Accelerators are a proven prescriptive set of best practices, designed to deliver

immediate value by answering critical business questions, and packaged so your BTM program

provides your decision makers and stakeholders with rich information and analytics. As a result,

you can operationalize Program Management, Stewardship, and Governance.

The APM accelerator is based on a four step program (see Figure 8)

1. The Success Planning Phase – establishes the foundation for success; defining the vision,

goals, targeted value, & stakeholder priorities; level-setting the team, and setting the

course forward

RISK

MANAGEMENT& SECURITY

ALIGNINGBUSINESS AND IT

AGILITY &

INNOVATION

How do I rapidly estimate costs of

change

What are the impacts of change?

What are my

transformation plans and options?

UNDERSTANDING THE ENTERPRISE

Where are technology risks

associated with roadmap?

What technology

is about to go out of support?

What technology risk does my business have?

What are IT’s plans to mitigate risks?

What information is used by

what business processes?What are the

dependencies?

How good is my data and how do I improve it?

How are my costs

management plans performing?

How do my run and change the business

costs compare?

Where are the candidates for taking cost out?

REDUCING THE COST OF IT

What are the

business and IT plans? What is the IT landscape

by business area?

How is IT supporting the business?

Page 21: GDS International - FST - Summit - US - 9

White Paper

21 CONFIDENTIAL

2. The Data Quality Phase – operationalizes data stewardship; enabling domain stewards

through best practices to keep key data current, correct, & complete.

3. The Information Analysis Phase – identifies opportunities; executing key analytics and

examining the results for trends and anomalies that illuminate possible change

opportunities for consideration

4. The Business value Phase – makes decisions; using the results of analyses in governance

body actions & investment planning processes.

Figure 8

Troux Accelerator Methodology

Troux recognizes that one size doesn’t fit all and you need to size your approach to you

objectives and business imperatives. To that end, Troux offers three categories of Accelerators

to meet your needs and budgets:

1. Quick Start Accelerator - Quickly populate a targeted set of out-of-the-box Troux

analytics with the data required to get immediate value from your Troux software.

Typically time boxed to 2 months.

2. Rapid Answers Accelerator - Provide analytics for a high priority, near-term need within

an APM program --- typically within 3 months.

Page 22: GDS International - FST - Summit - US - 9

White Paper

22 CONFIDENTIAL

3. Program Accelerator - Establish an APM program that is operationalized and sustained

through Program Management, Stewardship, and Governance, providing a set of

analytics to communicate information centered on one or more functional areas. ---

Typically in 4 months. The program accelerator can be implemented on previously

executed Rapid Answers or Quick Start Accelerators

Page 23: GDS International - FST - Summit - US - 9

White Paper

23 CONFIDENTIAL

Appendix: A Parable that Enlightens

There is an ancient parable that originated in India about the blind men and an elephant. Each

blind man is given a chance to feel a different part of an elephant and describe what an

elephant is like. One man who handles the trunk says it is like a snake, another who feels the

tusk says it is like a spear, another who touches the tail says it is like a rope etc. They violently

disagree about what the elephant is, with no resolution to the debate.

The Enterprise Portfolio is much like the elephant in this story. If we don’t see it in its totality

including the Business viewpoint we cannot understand how all the parts make a whole

enterprise. Furthermore we risk endless debates that result in no business value.

For example, if we are looking to make decisions about the Application portfolio and are only

analyzing projects and applications, we are overlooking four additional domains (Business

Strategy, Business Architecture, Technology and Information). Without analytics that consider

all dimensions of the problem space it is highly unlikely the right application decisions will be

taken --- and in fact much like the blind men and the elephant --- there can be much

disagreement and little business value delivered.


Recommended