• No results found

is it time to Outsource?

N/A
N/A
Protected

Academic year: 2021

Share "is it time to Outsource?"

Copied!
18
0
0

Loading.... (view fulltext now)

Full text

(1)

Email – is it time to Outsource?

ITLP Group IV May 2006

Joanne Hallisey, MIT Joyce Dickerson, Stanford Mark Silis, MIT

(2)

Email – is it time to Outsource?

Review reasons outsourcing is becoming more practical

Assemble & analyze findings

Formulate recommendations

Evaluate process

 Methodology used

(3)

Once a simple tool, email has evolved to a

complex, resource-intensive application demanding

integration & extended capabilities

Simple Email • Text-messages • Low volume • ASCII Business Messaging • Enterprise-caliber system • Security / Network protection • Scalability

• Features (integration, device access, Web interface, functionality, HTML, rich media attachments)

• Flexibility (faculty, staff, students, alumni, guests, etc.)

Cost/mailbox increasing

• Storage (file storage)

• Traffic (including SPAM & Virus management)

• Legacy hardware upgrades Complexity

• 24 x 7 customer support

(4)

As email has become more of a commodity, viable

outsourcing options are emerging

When does it make sense?

Outsource Communications

Services Outsource

Email & Web Access Email Appliance on own network Extent of Outsource • IBM Global Services • USA.net • Outblaze • Critical Path • Mirapoint • Power Elf Own System, Hosted Elsewhere Outsource Components (e.g. Spam & Virus) • Postini • MessageLabs

• Microsoft – Media Live • Google - gmail E xa m p le s

(5)

While the advantages of outsourcing are

increasing…

Infrastructure cost savings

Reduced staff support requirements

Potential ease of extending Email to a suite of

services

Vendor-managed spam and virus control

Industry-standard user interface

Vendor manages post-affiliation accounts with full

(6)

The disadvantages of outsourcing are significant…

Privacy concerns

Increased complexity and time in following up on

security incidents

Loss of overall control

Spam rules, customer service, costs

Ownership of email, esp. after leaving institution

Local skills become diluted or eliminated

Difficult to switch back if service is unsatisfactory

Complications integrating with campus offerings

(7)

Right answer depends on strategy, technology,

culture and market segmentation

Unique solution per educational institution – may

be a blend or a hybrid

Is it time to upgrade the current email infrastructure?

Can the users be segmented, and can they have different solutions? What are the cultural implications? How important is control of email?

(8)

Strategy: How does the outsource solution match

the university’s strategy?

Technical

 service provider’s technology solutions

 adherence to established standards and protocols

 service provider’s infrastructure

 system integration with university’s network infrastructure

 frequency of system upgrades

 system outage and upgrade notice

 browsers supported

 security mechanisms supported

Financial

 cost per mailbox

(9)

Technology: Does the potential provider pass the

technology filter?

Data Storage

 storage quota per mailbox

 process and cost for

increasing quota

 physical location of stored

data

 retention of email after

deletion

Equipment and Location

 data center location

 uninterruptible power supply

 redundant systems

 24X7 staffing

 adequate building security

 expected planned and

unplanned downtime

(10)

Cultural: Does the potential provider understand

your university environment?

Security and Privacy

 control of risk mitigation

 secure log-on to email server

 encrypted email

 system intrusion protection

 user privacy

 scanning email content

 sharing or selling user or

content information

 retention of deleted

email

Cultural/Political

 control of ownership of

business- critical email

 change management/learning

curve

 transition to the new system /

provider

 support processes for end

users and technical staff

 ads suppression and

associated costs

 email restore

 in the event of a system

failure

 in the event of a user

(11)

Market: Segmentation can provide insight to the

solution – one size doesn’t fit all

Email core to their

work & research

Reliability, Integrity,

Security, Control

Email is a ‘perk’ – want

the vanity domain

Many forward to

existing email boxes

Flexibility, portability

--Keep it for life

Mobility important

Enterprise customers

Faculty, staff

Individual customers

Students, alumni, visitors

(12)

What we recommend … it depends

No simple solution

Depends on strategic, cultural and political forces

Need a decision framework

Weightings particular to each enterprise

For example…

Enterprise users

Want Email only

Architecture needs a complete upgrade

(13)

What we recommend … it depends

Email Appliance on own Network Own System, Hosted Elsewhere Outsource Components

(eg Spam & Virus)

Outsource Email & Web

Access Outsource Email & Communicati ons Services Market Segmentation Enterprise Customers 1 1 1 0 0 Individual Customer 0 0 0 1 1 Market Needs

Clients demanding Integrated Business

Communications 0 1.5 1.5 1 1.5

Clients want email only 1 0.5 0.5 1.5 1

Technology Environment

Current Architecture Needs Complete Upgrade 1.5 0.5 0.5 1.5 1.5

Current Architecture Needs Partial Upgrade 1.5 0.5 1.5 0.5 0.5 Current Architecture Sufficient & Effective 0 1.5 1.5 0 0 Have technically talented staff to manage

system 0.5 0.5 1.5 0 0

Cultural Environment

Cultural Climate Receptive to Outsource -5 1.5 1.5 1.5 1.5

Scenario 1: Good environment for in-house or component outsouce option

(14)

What we recommend … it depends

Email Appliance on own Network Own System, Hosted Elsewhere Outsource Components

(eg Spam & Virus)

Outsource Email & Web

Access Outsource Email & Communicati ons Services Market Segmentation Enterprise Customers 1 1 1 0 0 Individual Customer 0 0 0 1 1 Market Needs

Clients demanding Integrated Business

Communications 0 1.5 1.5 1 1.5

Clients want email only 1 0.5 0.5 1.5 1

Technology Environment

Current Architecture Needs Complete Upgrade 1.5 0.5 0.5 1.5 1.5

Current Architecture Needs Partial Upgrade 1.5 0.5 1.5 0.5 0.5

Current Architecture Sufficient & Effective 0 1.5 1.5 0 0 Have technically talented staff to manage

system 0.5 0.5 1.5 0 0

Cultural Environment

Cultural Climate Receptive to Outsource -5 1.5 1.5 1.5 1.5 Cultural Climate Resistant to Outsource 1.5 1.5 1.5 -5 -5

Scenario 2: Good environment for outsouce option

(15)

Project methodology needed to be straight-forward

and easily accessible, given our time restraints

Team brainstorm - we did a lot of this by

teleconference

Interviews with CIO’s and others

Collection of university data

Review of the data and research

Reach consensus on recommendations

Create presentation deck

(16)

Primary & secondary research were the main tools

we used

Primary Research

 Stanford, MIT, Penn State

 Core IT  Alumni offices  Residential computing  Contacted vendors  Microsoft  Google 

Secondary Research

 Gartner  Educause

 CIC: Big Ten+

 Searched the Web

(17)

The lessons learned weren’t really a surprise to us

 A good collaboration tool would be very useful for remote teams

 integrated email, file storage, group editing, calendar/scheduling,

notifications, etc.

 Assignment of roles - Smaller group was easier to coordinate without

specific role assignments.

 There is never enough time.

 It is not always easy to get hands on the data...is it easier for

CIO's?

 Teleconference was a good tool, but schedules did not match well.

Lots of time was lost in missed meetings.

 In the end, it all came together.

 Filters vary from university to university, but not by that much.

 Technology varies a lot.

(18)

Email – is it time to Outsource?

Joanne Hallisey, MIT Joyce Dickerson, Stanford Mark Silis, MIT

References

Related documents

The Interoute outsource product portfolio gives carriers access to Europe’s premier network without the need to build or operate their own underlying network freeing up time

banking Underwriting acquisitions Mergers & Account statements Process transactions Recons Document management Account operations Retail/ commercial banking Credit cards

How to Decide Whether to Outsource an Email Messaging System Managing Microsoft’s Exchange Server: More, Better, Faster Microsoft SharePoint Portal Server: Industry &

Diagnostic accuracy of computed tomography scout film and chest X-ray for detection of rib fractures in patients with chest trauma: A cross-sectional study.... This is an open

Performance & Availability Monitoring Anomaly Detection IT Operations Management Event Correlation Business Line Impact Analysis Virtualization & Cloud Monitoring False

This experimental study showed that the properties of geopolymer-bonded plywood samples are significantly influenced by the various manufacturing parameters (lay-up times,

Pada perbandingan nilai medan listrik antara badan dan antar sirip arrester saat keadaan diberi tegangan nominal dengan saat diberikan arus impuls mengalami

An upward adjustment is indicated when the supervisory job substantially exceeds the situation credited under Factor I and the base level of work determined under Factor II is not