Enviar pesquisa
Carregar
Common Risks and Mitigation Strategies of Outsourcing
•
2 gostaram
•
6,094 visualizações
Altoros
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 5
Baixar agora
Baixar para ler offline
Recomendados
How To Identify And Mitigate Security And Intellectual Property Risks When Ou...
How To Identify And Mitigate Security And Intellectual Property Risks When Ou...
Altoros
Supply Base Optimization
Supply Base Optimization
mubarak2009
Cloud vs. Traditional Hosting - Andrei Yurkevich @ CloudCamp Denmark 2011
Cloud vs. Traditional Hosting - Andrei Yurkevich @ CloudCamp Denmark 2011
Altoros
AWS 101 Guide
AWS 101 Guide
Richard Harvey
Six steps for securing offshore development
Six steps for securing offshore development
gmaran23
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Alan McSweeney
Outsourcing introduction & issues
Outsourcing introduction & issues
nishant_ns
Outsourcing and Vendor management
Outsourcing and Vendor management
Raminder Pal Singh
Recomendados
How To Identify And Mitigate Security And Intellectual Property Risks When Ou...
How To Identify And Mitigate Security And Intellectual Property Risks When Ou...
Altoros
Supply Base Optimization
Supply Base Optimization
mubarak2009
Cloud vs. Traditional Hosting - Andrei Yurkevich @ CloudCamp Denmark 2011
Cloud vs. Traditional Hosting - Andrei Yurkevich @ CloudCamp Denmark 2011
Altoros
AWS 101 Guide
AWS 101 Guide
Richard Harvey
Six steps for securing offshore development
Six steps for securing offshore development
gmaran23
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Alan McSweeney
Outsourcing introduction & issues
Outsourcing introduction & issues
nishant_ns
Outsourcing and Vendor management
Outsourcing and Vendor management
Raminder Pal Singh
Maturing with Kubernetes
Maturing with Kubernetes
Altoros
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity Assessment
Altoros
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
Altoros
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
Altoros
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Altoros
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
Altoros
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
Altoros
Containers and Kubernetes
Containers and Kubernetes
Altoros
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
Altoros
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
Altoros
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
Altoros
UAA for Kubernetes
UAA for Kubernetes
Altoros
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
Altoros
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
Altoros
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
Altoros
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Altoros
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Altoros
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Altoros
AI as a Catalyst for IoT
AI as a Catalyst for IoT
Altoros
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
Altoros
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Mais conteúdo relacionado
Mais de Altoros
Maturing with Kubernetes
Maturing with Kubernetes
Altoros
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity Assessment
Altoros
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
Altoros
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
Altoros
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Altoros
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
Altoros
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
Altoros
Containers and Kubernetes
Containers and Kubernetes
Altoros
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
Altoros
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
Altoros
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
Altoros
UAA for Kubernetes
UAA for Kubernetes
Altoros
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
Altoros
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
Altoros
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
Altoros
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Altoros
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Altoros
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Altoros
AI as a Catalyst for IoT
AI as a Catalyst for IoT
Altoros
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
Altoros
Mais de Altoros
(20)
Maturing with Kubernetes
Maturing with Kubernetes
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity Assessment
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
Containers and Kubernetes
Containers and Kubernetes
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
UAA for Kubernetes
UAA for Kubernetes
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
AI as a Catalyst for IoT
AI as a Catalyst for IoT
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
Último
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Último
(20)
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Common Risks and Mitigation Strategies of Outsourcing
1.
Common Risks and
Mitigation Strategies of Outsourcing
2.
Common Risks and
Mitigation Strategies of Outsourcing According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years. Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to innovate faster than its competition and deliver their products to market first, supplement their development teams and re-balance their development priorities in order to accelerate revenue generation. Management and investors want to lower total cost of ownership and increase shareholder value. Due to the standardization of software engineering processes, pricing pressure and margin compression, evolving enterprise customer expectations, software companies are forced with the task of delivering more complex product development with limited and decreasingly time frames. Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven by fundamental changes in customers' purchasing behavior. To overcome all or some of the above problems more and more software companies turn to Product Outsourcing i.e. hiring external vendors to develop a product for the company. Gartner and Forrester recommend some of the following risk mitigation strategies when engaging IT offshore services: 1. Executive level support 2. Planned Human Capital Management 3. Communication plan for all stakeholders 4. HR redeployment plan based on Portfolio sequencing and review 5. Risk management subgroup as part of the offshore steering committee to focus on compliance, data, security, and privacy Portfolio Management (determining whichapplication/functions are best developed/ supported offshore versus onshore and the appropriate resource mix for various projects) 1. Methodology for determining what goes where 2. Guidelines for production support, maintenance, new development IP Security (establishing an environment of trust with the selected vendor while executing the necessary legal protections) 1. Make sure protections are in place in the event of turnover at the offshore vendor. 2. Consider outsourcing development work that will have little impact on your business if it is “appropriated.” Groundbreaking research may be better held internally, while engineering on established products can be outsourced offshore. The risk of data and IP protection is inherently raised when working in international business. Determine up front who owns the technology and/or the intellectual property that results from the software research and development. What should the offshore third party be prevented from doing with respect to developed or accessed intellectual property — sharing with others? Disclosing to others? © Altoros Systems 2
3.
Common Risks and
Mitigation Strategies of Outsourcing Geopolitical (border unrest, religious strife, war, terrorism, political process, etc.) 1. Geographic dispersion of sites 2. Onshore, offshore, near-shore strategy 3. Scenario planning for different levels/probabilities of risk 4. Detailed business continuity plans for vendor and user Country (government support, political stability, labor characteristics, etc.) 1. Scenario planning for different levels/probabilities of risk by country 2. Sources of country information (INS, World Bank, IMF) 3. Multi-region sourcing 4. U.S.-based corporations with multiple overseas locations Vendor (reliability, commitment to security, qualifications) 1. Site visits 2. Interview with the head of quality and delivery 3. Vendor due diligence plan based on technologies and skills 4. Audit of the CMM paper trail of an actual project 5. Defined SLA that reflect goals of offshore strategy, such as helping the client improve its CMM capabilities 6. Comprehensive Master Agreement (covering labor rates, IP ownership, disaster recovery, security, staffing rotation schedules, etc). Language and Communications (different proficiency and comprehension levels, day-to-day misunderstandings, etc.) 1. Common process and methodology 2. Language training 3. Effective handoffs/overlapping shifts and other communication plans 4. Work on security and telecom issues as soon as possible 5. Collaborative technologies 6. Acceptance criteria defined upfront (including signoff by business and IT, documenting required functions, system performance, and test case scripts) Culture Difference 1. Embed a project manager who has cross-cultural experience 2. Provide cultural sensitivity training to team members on both sides It is critical to implement an ongoing program that stresses global and cross-cultural awareness, creating a comfortable multicultural workplace. Human Capital (getting the right skills, high turnover rates, etc.) 1. Fixed fee contracts (possibly at higher rates) 2. Awareness that you get what you pay for 3. Choosing vendors with low turnover and high CMM certification © Altoros Systems 3
4.
Common Risks and
Mitigation Strategies of Outsourcing 4. Matching country versus needed skill sets 5. Background checks and third party references Knowledge Transfer (offshore employees failing to acquire quickly sufficient knowledge of the systems, the corporate culture, the industry, etc.) 1. Controlled transition process 2. Weekly meetings for transition team to review milestones 3. Right mix of offshore/onsite resources; controlled handoffs 4. Web-based knowledge/task management and other collaborative systems 5. Established process for transferring knowledge and resources back in-house 6. Updated tool and application licenses to support multiple sites Knowledge transfer is an extremely important aspect of any outsourcing program management, particularly if documentation is lacking. The time and effort to transfer knowledge and subject-matter information to the service provider is a cost rarely accounted for by IT executives. Both parties must establish a communication framework to transfer knowledge on objectives, issues, updates and results of an outsourcing engagement. Change Management (transition, organization, communication, governance, etc.) 1. Developed change-management program 2. Proactive communication of objectives, benefits, staff redeployment plans 3. Teambuilding exercises for the "retained organization" 4. Compensation for transition leaders Business Continuity Risks and Mitigation Strategies 1. Detailed business continuity, recovery and resumption, crisis management and disaster recovery plans for both vendor and customer Database on the offshore staff with their subject matter expertise and visa status 2. Scenario planning for different levels and probabilities of risk 3. Project specific plans and prioritization 4. Additional emphasis on human capital contingencies 5. Analysis of BCP measure versus added costs Risks and their mitigation during Sourcing Transition (Renew/Exit) Phase Exit Planning 1. Exit parameters identified in advance 2. Transition plan for physical infrastructure, knowledge, data, people 3. All relevant documentation is always available with the "retained" organization Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and large software companies for many different reasons. Cost reduction is typically the basis for offshore outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as operational difficulties associated with global outsourcing are gradually removed. Having the right strategic offshore roadmap and governance model is critical. © Altoros Systems 4
5.
Common Risks and
Mitigation Strategies of Outsourcing Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com © Altoros Systems 5
Baixar agora