Main
Log in

Irene Pimentel

This email address is being protected from spambots. You need JavaScript enabled to view it.

Irene Pimentel is an IBRS analyst who focuses on news and information on the global IT Outsourcing market. Irene provides IBRS clients with up to date information on all outsourcing deals that are taking place helping our clients understand who is winning business in what markets. With over 10 years experience as a management consultant, Irene has worked with some of Australia's largest blue chip companies and public sector organisations. Irene has also worked as a research manager for an IT sourcing consultancy, providing clients with targeted intelligence and advice for their specific IT sourcing transactions.

Conclusion: This month, there has been increased discussion regarding security services; in particular, the growth of the Australian security service provider industry and benefits associated with procuring locally. Now that customers recognise security as a basic function, a strong local security services sector has evolved. Local vendor expertise within the Australian market, regulations, customer demands and the security environment as it pertains to Australian businesses is invaluable when establishing mechanisms to avoid and respond to security incidents. Security is a necessity, but vendors must be prepared, and more importantly understand the local market, as well as businesses, to ensure customers can avoid, continually educate staff about and respond to security incidents effectively.


Register to read more...


Conclusion: This month, attention has been drawn to vendors and managed service providers requiring customer transformation or migration to new frameworks and associated customer reluctance to do so. For instance, platform enhancements may necessitate migration to new systems or upgrades because of an inability to support ageing systems. Old platforms may simply not be compatible with newer resources, technologies or procurement models. However, these types of enhancements can be disruptive or costly for customers if they are not prepared for changes. Further difficulties can arise with existence of intertwined, hybrid systems within enterprises or systems which perform critical functions if changes interfere with business operations. Simply removing the capacity to access ageing systems and associated support is not sufficient. Businesses must prepare in advance when investing in products and services, in conjunction with vendors. The development of strategies and sharing responsibility for forward planning, education and engagement, as well as support for shifts, are necessary. The provision of other resources or advice from vendors, or obtaining services from third-party specialists dedicated to transformation strategy development and implementations, can also be beneficial. Whilst vendors must evolve, customers must also be prepared to make these changes and understand what kind of impact it can have on their operations.


Register to read more...


Conclusion: This month, the high activity in mergers and acquisitions has continued. However, there has been additional discussion on the impact of these acquisitions on the industry in general, as well as the high volume, and whether this type of activity could have a negative effect on the Australian market – in particular, if the current regulatory frameworks governing mergers and acquisitions are sufficient to protect competition and avert potential misuse of market power. It is critical that regulators are aware of industry trends and how new practices may affect the market, as well as be open to feedback from vendors that have direct experience with circumstances regulators may not be familiar with.


Register to read more...


Conclusion: This month, a number of failures due to external vendor systems performing essential functions have been prominent. Disruption caused by these types of outsourced solution failures become disproportionate when they facilitate critical tasks conducted by consumers. Similarly, reactions can be disproportionate when tasks are deeply intertwined with others, such as government agencies requiring submissions of consumer information or reports to set schedules. These types of failures highlight the fragility of systems and the need for sturdy response measures in case of disruption – responses which must extend beyond technical and local issues, but also cater to practical matters. For instance, an acknowledgement from certain government agencies that consumers depend on vendors to fulfil regulatory requirements, and allowances from agencies when failures interfere with customers meeting their responsibilities to these agencies. Vendors require different layers of protection and responses. This includes dealing with externals and their associated issues that can increase difficulties of failures if not identified and factored into vendor response measures.


Register to read more...


Conclusion: This month, the number of tenders and plans has continued to grow, highlighting the important role projects play when it becomes necessary to replace legacy systems, capitalise on new or evolving solutions or simply adapt to changed business operations or environments. Customers understand that avoiding complacency and market disconnect is critical, yet this still exists, with project plans to replace technologies such as paper-based messaging or tape data storage being announced just this month. It is critical for vendors to provide advice and ongoing support for customers in order to strengthen and simplify migrations and transformation, and more importantly, identify project objectives and final goals when replacing legacy systems.


Register to read more...


Conclusion: This month, discussions regarding rising costs associated with outsourcing have been prominent. Whilst benefits from outsourcing in the form of efficiency and financial savings have been clear for some time, customers can find that savings are not as high as expected due to increased complexities associated with new offerings and associated implementation. For instance, customers that moved to the Cloud for storage and compute solutions benefited from the large number of vendors in the market and more competition. However, as the market has matured, customers demand more sophisticated offerings to leverage new technologies such as artificial intelligence and machine learning. As a result, infrastructure and associated services have become more costly, coupled with add-ons and Software-as-a-Service costs. Whilst cost benefits remain a priority for customers, it is also important for thorough cost optimisation reviews, and the engagement of specialist services to rationalise and assist with the management and restraint of outsourcing expenses.


Register to read more...


Conclusion: This month, discussions regarding offshoring initiatives have been prominent following announcements by two vendors that plans are in progress to send work overseas. Though offshoring can be beneficial in terms of cost and the ability to obtain talent not available in the local market, the approach can cause difficulties for organisations. For instance, local protest or a loss of customer confidence can arise due to perceptions that offshoring practices are simple cost-cutting efforts which come at the expense of quality service. However, offshoring initiatives can be critical to meet demands for vendors to provide new, quality offerings in a highly competitive environment. The need to go beyond the local market is driven by more than mounting staff costs. Although risks associated with cultural barriers or customer backlash exist, benefits can be significant when providing unique and high-quality offerings. Vendors must achieve a balance between local and overseas services, as well as maintaining a positive view of offshoring as more than a simple cost-cutting exercise which results in low quality service, to an exercise that can enhance offerings resulting in improved services.


Register to read more...


Conclusion: This month, security issues and responses to threats specific to managed service providers have been discussed. Attacks on vendors can be particularly serious because of provider interaction with customer environments and access to information. These difficulties can be exacerbated by other issues facing vendors, such as obtaining additional resources from contractors, inexperience or lack of expertise with complex, unfamiliar environments. Recent attacks on service providers have raised concerns because of threats to customer environments, as well as flow-on effects such as uncertainties relating to vendors and difficulties establishing trust with customers. New programs, education and vendor collaboration have been launched to address provider-specific security issues. It has been recognised that establishing best practices and protocols to help avert, detect and respond to security threats is required in the industry.


Register to read more...


Conclusion: This month, there has been a range of company acquisitions, consolidations and partnerships in the managed services industry. These types of purchases can allow vendors to obtain resources necessary to adapt to emerging industries and new offerings. Purchasing providers can be beneficial, expanding and enhancing a firm’s products and services with the successful integration of companies. This has resulted in trends including more targeted purchases such as company assets, or the amalgamation of a number of vendors with very different specialties to provide new offerings and adapt to market shifts. Failure to adapt offerings and business structures which allow for these changes can impact on vendor credibility and is critical in a market where proactive, innovative and highly specialised providers are required by customers.


Register to read more...


Conclusion: This month, discussions regarding the need to strengthen security and recovery solutions have been prevalent. The increased number of breaches which compromise private user data and interfere with business operations has become apparent. While technologies and frameworks can assist with avoiding and recovering from security events, weaknesses still exist when integrating security strategies with company structures and culture. Human error, and the failure to educate or provide all employees with skills to avoid, detect or respond to security events, has been flagged as a particular concern. Any security structure must provide resources that can support employee vigilance and slot into a company’s culture.


Register to read more...


In the News

The pros and cons of shadow IT In today’s business world - WHICH-50 - 23 July 2019

Shadow IT sounds like a covert — quite possibly dark — force. And to some people it may well be. But the truth is both far simpler and more complex. According to Cisco, Shadow IT is the use of...
Read More...

Busting The Three Big Cloud Myths - WHICH-50 - 11 June 2019

Organisations that are resisting the shift to cloud computing are often basing their decisions on common misconceptions around security, price and integration. That’s a key finding in a recent...
Read More...

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap