ict-valiokunta - shadow it 17.2.2012
DESCRIPTION
Esa Ahon esitys varjo IT:stä 17.2.2012 EP:n kauppakamarin ICT-valiokunnalleTRANSCRIPT
Esa AhoTulevaisuustoimistoFujitsu Finland
Varjo-it Shadow-it
Varjo-organisaatio
Valo synnyttää aina varjon
Varjo-it
Social-it EUAD BUAD
End-user-it
BYOD ILCS Consumer-it
Personal cloud
Consumerisation
Mobilisation
Social media
Cloud
Copyright 2012 FUJITSU
Trends & shadow-it
5 Copyright 2012 FUJITSU
Really?
more to productivitythan corporate-it.
Over the last 3 years user-it added …
The cloud paradigm shift
Increasing business
mobility
Cloud Computing EraValue
TimeClient / Server Computing Era
Increasing
efficiency
Virtualised Apps
Private Cloud
Enterprise Apps
Personal Apps
SaaS(IaaS, PaaS)
MarketplacesBusiness Services
Service ecosystem
Value Shift
Hybrid environmentWorkload jump
The role of IT, once "Dr. No," has changed to one of enabler, collaborator and orchestrator, particularly in the innovation arena.
IT practitioners have choices:Specialize and work forthird-party specialists (or vie for the limited specialist jobs withenterprises), or become morebusiness-focused and broadentheir knowledge and skills tobecome versatilists.
Gartner of the role of it
Historical division: it and business Centralised it Rigid it methodologies
Functionality over efficiency Functionality over architecture
“The more critical and important the application is, more harder it is to use and learn” “SAP rekisteröintivariantti”
What causes shadow-it?
Access and securityLicensed and controlledCost and efficiency, productivityTraditional business app – form based user interfaceDevelopment mentality (long, complex, best practices)
Vs. quickly something which is good enough and fun to use with easy access from anywhere and anytime
It way
Common Cloud Services
Private Infrastructure Services
ITIL based Services
Services to Meet End-users Expectations
Managing IT Service Deliveries
IT Service Desk Services
Reporting services
Product Delivery Services Problem Management
Incident ManagementService Manager
Availability Services
Change Management
Capacity services
On-site SupportServices
Copyright 2011 FUJITSU
Request intake
Repair Services Installation Services Recycling Services
Network Mgmt
Capacity Management
Service Management Services
Follow-up meetings
Metering ServicesInvoicingServicesBuffer store Services
Spare parts Services
Personal help Services
Asset managementLicense management
Service Quality Management
Lan-to-Lan Services
Service break mgmt
Back-officeServices
Account and access rights mgmt
Wks Standardization Services
Order mgmt ServicesProduct Delivery Services
IaaSPaas
DaaSMaaS
Resolution 1st callCategorization
AssignmentClosíng
Communication
Problem resolution Services
Automated sw delivery Services Backup, archiving Services
Communication Services
12
Cost
Productivity
User experience
Confidential Copyright Fujitsu Services 2011
High level it decision drivers
Copyright 2012 FUJITSU
More then 1 year ago, Cisco IT moved from an environment where all devices were corporate-owned and controlled, towards an environment allowing end users to choose from a broad catalog of devices as well as use their own devices.
One year later Mobile device count grew 59% up to
more then 43.000 devices. iPhones take up 40% of those devices, BlackBerry 32% and Cisco IT now sees a rapidly growing community of Tablet users (15%), as well as Android device users (10%).
Copyright 2012 FUJITSU
Case Cisco
The goal should not only be to minimize its risks, but to support and exploit its benefits.
You can’t stop shadow-it Strict control would just move
it deeper into the shadows Strict control measures would
undermine the reputation of the it organization, harming business agility, creativity and associated motivation
Strict control would limit sources of innovation
But no control and support will not work either
Copyright 2012 FUJITSU
Conclusions
The best practice is to recognize shadow IT as an inevitable and positive
aspect of a technologically literate workforce in a modern enterprise.
Regular, active monitoring of shadow IT by the IT organization
Provision by the IT organization of advice that enables and, where appropriate, encourages safe, effective, efficient, and connected deployment of shadow IT
Scrutiny and control by the IT organization of how shadow IT could affect critical aspects of enterprise performance, such as security and strategic or reputational threats
Copyright 2012 FUJITSU
Actions by Gartner
Measurement
Shadow-it is a thermometer If it isn’t working, something else, ie. shadow-it is
Standardization Means Creating Dynamic IT
The one-size-fits-all model is under strain from consumer IT
Consumer technology is an opportunity, not a threat
Organizations will remove technology constraints, such as fat clients or high-touch/silo apps
People use their own technology in the workplace
Organizations will have to be able to determine the best source of any service at any given time
Governance and risk perception will change Greater agility and empowerment of users Support agile working and fast decision-
making Self-service and consumer services will
become the norm
Evolution of End-user Services
2008 2011 2014 2017
Locked & well managed PCs
Hosted shareddesktops (VCS)
Reverseapps
publishing
Synch. local VM cache
Virtual desktops Appvirt.
PersonalCloud workspace
Virtual profilesContext aware provisioning
Corporate cloud
Private cloudApp
repositories
Workspaces for individuals, projects,
teams, expert networks