Main
Log in

Sourcing & Staffing

Conclusion: This month, discussions regarding offshoring initiatives have been prominent following announcements by two vendors that plans are in progress to send work overseas. Though offshoring can be beneficial in terms of cost and the ability to obtain talent not available in the local market, the approach can cause difficulties for organisations. For instance, local protest or a loss of customer confidence can arise due to perceptions that offshoring practices are simple cost-cutting efforts which come at the expense of quality service. However, offshoring initiatives can be critical to meet demands for vendors to provide new, quality offerings in a highly competitive environment. The need to go beyond the local market is driven by more than mounting staff costs. Although risks associated with cultural barriers or customer backlash exist, benefits can be significant when providing unique and high-quality offerings. Vendors must achieve a balance between local and overseas services, as well as maintaining a positive view of offshoring as more than a simple cost-cutting exercise which results in low quality service, to an exercise that can enhance offerings resulting in improved services.

Conclusion: This month, security issues and responses to threats specific to managed service providers have been discussed. Attacks on vendors can be particularly serious because of provider interaction with customer environments and access to information. These difficulties can be exacerbated by other issues facing vendors, such as obtaining additional resources from contractors, inexperience or lack of expertise with complex, unfamiliar environments. Recent attacks on service providers have raised concerns because of threats to customer environments, as well as flow-on effects such as uncertainties relating to vendors and difficulties establishing trust with customers. New programs, education and vendor collaboration have been launched to address provider-specific security issues. It has been recognised that establishing best practices and protocols to help avert, detect and respond to security threats is required in the industry.

Conclusion: “C-suite” leaders including CIOs and IT managers must continually adapt and change their mindset to be digitally savvy in order to keep pace and influence the digital revolution at the workplace12. Failure to do so will increase risks to implement initiatives whilst harming their own careers and those under their care.

Conclusion: This month, there has been a range of company acquisitions, consolidations and partnerships in the managed services industry. These types of purchases can allow vendors to obtain resources necessary to adapt to emerging industries and new offerings. Purchasing providers can be beneficial, expanding and enhancing a firm’s products and services with the successful integration of companies. This has resulted in trends including more targeted purchases such as company assets, or the amalgamation of a number of vendors with very different specialties to provide new offerings and adapt to market shifts. Failure to adapt offerings and business structures which allow for these changes can impact on vendor credibility and is critical in a market where proactive, innovative and highly specialised providers are required by customers.

Conclusion: Increasingly, IT departments are looking for ways to divest their operations of undifferentiated activities – that is, activities that are common among most organisations. One technology that is ubiquitous across every organisation, in every vertical sector, is end-user computing. Theoretically, it should be an easy area of IT to be deployed via a fully managed service. In reality, IBRS has seen more failures in the space than successes.

The reasons why fully managed (aka “as-a-Service”) end-user computing initiatives fail is a result of the initial rationale for the go-to-market strategy and the resulting request for proposal (RFP).

Related Articles:

"IBRS Compass: Beyond the Desktop: Creating a Digital Workspace Strategy for Business Transformation" IBRS, 2016-01-02 11:39:29

"The Components of a Self-Service Desktop" IBRS, 2014-10-01 18:36:09

"The use and abuse of Personas for end-user computing strategies" IBRS, 2017-03-04 16:53:10

Conclusion: This month, discussions regarding the need to strengthen security and recovery solutions have been prevalent. The increased number of breaches which compromise private user data and interfere with business operations has become apparent. While technologies and frameworks can assist with avoiding and recovering from security events, weaknesses still exist when integrating security strategies with company structures and culture. Human error, and the failure to educate or provide all employees with skills to avoid, detect or respond to security events, has been flagged as a particular concern. Any security structure must provide resources that can support employee vigilance and slot into a company’s culture.

Conclusion: This month, IT vendor acquisitions and partnerships have been prominent. The incentive for companies with disparate products and services to consolidate has increased, resulting in strategic arrangements aimed at expanding offerings and future company developments. However, this kind of consolidation can result in difficulties when separate entities make efforts to integrate. This type of integration requires an orderly transition and establishing a solid foundation for ongoing operations to maximise benefits associated with new resources. Detailed planning and execution is necessary to establish direct relationships and better understand the resources available, customer base and externals from both companies and allow for a more consistent fit between internal departments as well as a framework for practical and flexible implementation of plans.

Conclusion: This month, discussions regarding enterprise agreements combining products and services to provide highly tailored solutions have been prominent. In particular, market transformation with smaller vendors offering new products, different enterprise consumption models, collaboration and new capabilities have driven growth in this area. A greater demand for flexible customisation and configuration of offerings has also driven growth, as well as vendors offering incentives to utilise products and services, or establishing partnerships in order to support organisations when developing solutions.

Conclusion: Whilst many organisations in Australia cite the lack of available IT skills to be a threat to their future growth or ability to complete digital transformation initiatives, Australia has a large often untapped pool of potential employees in candidates on the autism spectrum.

It is estimated that around 60 to 80 per cent of employable adults with autism spectrum disorder (ASD) struggle to find full time or steady employment, and those that do find employment are often underemployed, that is, employed in roles below their educational or professional level1. Recently tech companies have recognised this opportunity, and programs underway in Australia are successfully identifying, recruiting and supporting individuals on the autism spectrum with the potential to excel particularly in testing, data science and cyber security roles. All are high growth areas for employment.

Related Articles:

"Future-proofing your ICT team: Predictions and mitigation" IBRS, 2018-02-01 10:12:40

"Get serious and make IT staff upskilling a reality" IBRS, 2018-07-05 03:08:00

"Key skills to develop" IBRS, 2018-05-04 18:53:57

Conclusion: Since CRM modernisation will impact many major functional areas of the organisation, developing a communication plan to ensure the strategy is developed and executed in a consistent and well-supported manner will involve many different roles and responsibilities. Gone are the days when the CRM was primarily the domain of sales and the IT departments.

Related Articles:

"CRM modernisation Part 1: Strategy, planning & selection" IBRS, 2018-09-04 05:20:15

"CRM modernisation Part 2A: Creating a public sector stakeholder experience strategy" IBRS, 2018-09-04 06:46:34

"CRM modernisation Part 2B: Creating a customer experience strategy" IBRS, 2018-09-04 06:47:58

In the News

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles