ict-valiokunta - shadow it 17.2.2012

20
Esa Aho Tulevaisuustoimisto Fujitsu Finland Varjo-it Shadow-it

Upload: etelae-pohjanmaan-kauppakamari

Post on 18-Dec-2014

744 views

Category:

Technology


0 download

DESCRIPTION

Esa Ahon esitys varjo IT:stä 17.2.2012 EP:n kauppakamarin ICT-valiokunnalle

TRANSCRIPT

Page 1: ICT-valiokunta - Shadow IT 17.2.2012

Esa AhoTulevaisuustoimistoFujitsu Finland

Varjo-it Shadow-it

Page 2: ICT-valiokunta - Shadow IT 17.2.2012

Varjo-organisaatio

Valo synnyttää aina varjon

Varjo-it

Page 3: ICT-valiokunta - Shadow IT 17.2.2012

Social-it EUAD BUAD

End-user-it

BYOD ILCS Consumer-it

Personal cloud

Page 4: ICT-valiokunta - Shadow IT 17.2.2012

Consumerisation

Mobilisation

Social media

Cloud

Copyright 2012 FUJITSU

Trends & shadow-it

Page 5: ICT-valiokunta - Shadow IT 17.2.2012

5 Copyright 2012 FUJITSU

Really?

more to productivitythan corporate-it.

Over the last 3 years user-it added …

Page 6: ICT-valiokunta - Shadow IT 17.2.2012
Page 7: ICT-valiokunta - Shadow IT 17.2.2012

The cloud paradigm shift

Increasing business

mobility

Cloud Computing EraValue

TimeClient / Server Computing Era

Increasing

efficiency

Virtualised Apps

Private Cloud

Enterprise Apps

Personal Apps

SaaS(IaaS, PaaS)

MarketplacesBusiness Services

Service ecosystem

Value Shift

Hybrid environmentWorkload jump

Page 8: ICT-valiokunta - Shadow IT 17.2.2012

The role of IT, once "Dr. No," has changed to one of enabler, collaborator and orchestrator, particularly in the innovation arena.

IT practitioners have choices:Specialize and work forthird-party specialists (or vie for the limited specialist jobs withenterprises), or become morebusiness-focused and broadentheir knowledge and skills tobecome versatilists.

Gartner of the role of it

Page 9: ICT-valiokunta - Shadow IT 17.2.2012

Historical division: it and business Centralised it Rigid it methodologies

Functionality over efficiency Functionality over architecture

“The more critical and important the application is, more harder it is to use and learn” “SAP rekisteröintivariantti”

What causes shadow-it?

Page 10: ICT-valiokunta - Shadow IT 17.2.2012

Access and securityLicensed and controlledCost and efficiency, productivityTraditional business app – form based user interfaceDevelopment mentality (long, complex, best practices)

Vs. quickly something which is good enough and fun to use with easy access from anywhere and anytime

It way

Page 11: ICT-valiokunta - Shadow IT 17.2.2012

Common Cloud Services

Private Infrastructure Services

ITIL based Services

Services to Meet End-users Expectations

Managing IT Service Deliveries

IT Service Desk Services

Reporting services

Product Delivery Services Problem Management

Incident ManagementService Manager

Availability Services

Change Management

Capacity services

On-site SupportServices

Copyright 2011 FUJITSU

Request intake

Repair Services Installation Services Recycling Services

Network Mgmt

Capacity Management

Service Management Services

Follow-up meetings

Metering ServicesInvoicingServicesBuffer store Services

Spare parts Services

Personal help Services

Asset managementLicense management

Service Quality Management

Lan-to-Lan Services

Service break mgmt

Back-officeServices

Account and access rights mgmt

Wks Standardization Services

Order mgmt ServicesProduct Delivery Services

IaaSPaas

DaaSMaaS

Resolution 1st callCategorization

AssignmentClosíng

Communication

Problem resolution Services

Automated sw delivery Services Backup, archiving Services

Communication Services

Page 12: ICT-valiokunta - Shadow IT 17.2.2012

12

Cost

Productivity

User experience

Confidential Copyright Fujitsu Services 2011

High level it decision drivers

Page 13: ICT-valiokunta - Shadow IT 17.2.2012

Copyright 2012 FUJITSU

Page 14: ICT-valiokunta - Shadow IT 17.2.2012

More then 1 year ago, Cisco IT moved from an environment where all devices were corporate-owned and controlled, towards an environment allowing end users to choose from a broad catalog of devices as well as use their own devices.

One year later Mobile device count grew 59% up to

more then 43.000 devices. iPhones take up 40% of those devices, BlackBerry 32% and Cisco IT now sees a rapidly growing community of Tablet users (15%), as well as Android device users (10%).

Copyright 2012 FUJITSU

Case Cisco

Page 15: ICT-valiokunta - Shadow IT 17.2.2012

The goal should not only be to minimize its risks, but to support and exploit its benefits.

You can’t stop shadow-it Strict control would just move

it deeper into the shadows Strict control measures would

undermine the reputation of the it organization, harming business agility, creativity and associated motivation

Strict control would limit sources of innovation

But no control and support will not work either

Copyright 2012 FUJITSU

Conclusions

Page 16: ICT-valiokunta - Shadow IT 17.2.2012

The best practice is to recognize shadow IT as an inevitable and positive

aspect of a technologically literate workforce in a modern enterprise.

Regular, active monitoring of shadow IT by the IT organization

Provision by the IT organization of advice that enables and, where appropriate, encourages safe, effective, efficient, and connected deployment of shadow IT

Scrutiny and control by the IT organization of how shadow IT could affect critical aspects of enterprise performance, such as security and strategic or reputational threats

Copyright 2012 FUJITSU

Actions by Gartner

Page 17: ICT-valiokunta - Shadow IT 17.2.2012

Measurement

Shadow-it is a thermometer If it isn’t working, something else, ie. shadow-it is

Page 18: ICT-valiokunta - Shadow IT 17.2.2012

Standardization Means Creating Dynamic IT

The one-size-fits-all model is under strain from consumer IT

Consumer technology is an opportunity, not a threat

Organizations will remove technology constraints, such as fat clients or high-touch/silo apps

People use their own technology in the workplace

Organizations will have to be able to determine the best source of any service at any given time

Governance and risk perception will change Greater agility and empowerment of users Support agile working and fast decision-

making Self-service and consumer services will

become the norm

Page 19: ICT-valiokunta - Shadow IT 17.2.2012

Evolution of End-user Services

2008 2011 2014 2017

Locked & well managed PCs

Hosted shareddesktops (VCS)

Reverseapps

publishing

Synch. local VM cache

Virtual desktops Appvirt.

PersonalCloud workspace

Virtual profilesContext aware provisioning

Corporate cloud

Private cloudApp

repositories

Workspaces for individuals, projects,

teams, expert networks

Page 20: ICT-valiokunta - Shadow IT 17.2.2012