Академический Документы
Профессиональный Документы
Культура Документы
Edition IV
www.hcltech.com|www.hclisd.com
Introduction:
The 2012 Technology Roadmap
2
Introduction: The 2012 Technology
Roadmap
3
Rethink Your Mobility Strategy
5
Boost Your Security Network
7
Evolve Your Data Center Strategy
9
Adopt Industrialized, Low-Cost IT
Services (ILCS)
11
Conclusion
t is the best of times and the worst of times for CIOs and
other IT professionals.
On the one hand, factors such as global delivery, industrialization, Cloud Computing, Big Data, Social Media and
Mobility are enabling enterprises to boost their efficiency
and productivity. On the other, these trends are creating an
IT landscape of unprecedented complexity and uncertainty.
As CIOs and business leaders try to navigate this unfamiliar
terrain while working to create a modern IT infrastructure
architecture that can support intensified consumerization,
technology disruption and voluminous Big Data they may
find themselves taking wrong turns or pursuing approaches
that lead to dead ends.
Thats why we offer here a technology roadmap one that
highlights useful landmarks and identifies areas to steer
clear of that you can refer to as you explore todays challenging IT environment.
Source: HCL
12
From the Gartner Files: Gartners Top
Predictions for IT organizations and
Users, 2012 and
Beyond Control Slips Away
26
About HCL
The CIO Handbook, Edition IV is published by HCL. Editorial supplied by HCL is independent of Gartner analysis. All Gartner research is 2012 by Gartner, Inc. All
rights reserved. All Gartner materials are used with Gartners permission. The use or publication of Gartner research does not indicate Gartners endorsement of HCLs
products and/or strategies. Reproduction or distribution of this publication in any form without prior written permission is forbidden. The information contained herein
has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner
shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject
to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research
should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered
in Gartner research. Gartners Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research
organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see
Guiding Principles on Independence and Objectivity on its website, http://www.gartner.com/technology/about/ombudsman/omb_guide2.jsp.
nterprise mobility is not a strange element to modern enterprises. It has been in the limelight for quite some time
and has been making enterprises (and the workforce)
more agile, efficient, and competitive. However, as a disruptive
trend, mobility has its own setbacks. While on one hand, it empowers the users, on the other, it jeopardizes enterprise security
and takes away control (over users as well as costs) from the
hands of enterprise IT.
Stemming challenges in the full swing are
Best Practices:
FIGURE 1
SOURCE: HCL
Success Cases:
A Fortune 500 Firm Turns to MDM for Security
Gartner Inc., Critical Capabilities for Mobile Device Management, G00213877, 29 July 2011
FIGURE 2
FIGURE 3
DDoS Prevention
SOURCE: HCL
Best Practices:
First, define the scope of security services and the level-ofservice expectations.
Then, evaluate the prospective MSSPs based on the following parameters: adherence to local compliance laws, geographic delivery capabilities, staff augmentation, device
management, real-time monitoring, and security expertise.
Finally, map the service delivery capabilities and security
expertise of your managed security service provider and
align them with your requirements and expectations. This
will always result in a successfully managed security engagement.
Success Cases:
Asias Largest Exchange Firm Derives Enhanced Business Value
with MSS
A Singapore-based, large stock exchange turned to HCL for
managed security services to reduce security risks that todays
Gartner Inc., MarketScope for Managed Security Services in Asia/Pacific, G00217190, 30 September 2011
revolutionary technologies of today such as Cloud Computing and next-stage virtualization. It will help enterprises consolidate better and achieve superior business results.
The next-generation data center of the future must essentially
have Cloud embedded in its architecture, besides Ethernet fabrics, high-density multi-core server hardware, high-bandwidth
networks, and virtualized servers and storage. A Cloud-ready
data center infrastructure can both support new service models at
the scale necessary to meet demand and operate at an efficiency
level that ensures profitability and support full virtualization.
However, this will require CIOs to move to the next level of
IT sourcing source the best IT services from the available
service providers operating in the market. The service providers
must be evaluated on the basis of their ability to offer a dynamic
and ready-to-deploy infrastructure, and the capability to cope
up with IT complexity as the requirements from their business
processes increase.
Enterprises must follow a phased methodology to devise a successful data center strategy. One of the HCL clients implemented a step-wise methodology that was cost-effective and ensured
a healthy bottom-line. Data center infrastructure restructuring
and service management fundamentally must be a part of data
center transformation projects to ensure that organizations
data center can readily adapt to constantly changing service
demands. Also, green initiatives are a must-have for the nextgeneration data center.
FIGURE 4
SOURCE: HCL
Leveraging its over three decades of experience in the IT services industry, HCL has devised a data center transformation
methodology for its customers. It is a structured approach to
build a future-ready data center infrastructure (see Figure 5).
Best Practices:
FIGURE 5
Source: HCL
SOURCE: HCL
Gartner Inc., Magic Quadrant for Data Center Outsourcing and Infrastructure Utility Services, North America, G00213700, 20 July 2011
The emerging ILCS model will transform and disrupt the existing IT services landscape by altering peoples common perceptions of pricing and value of IT services.
FIGURE 6
Corporate IT
Outsourced IT
-20%
Offshored IT
-30%
LOW-COST
IT
HIGH-COST
IT
2000
IU4SAP
$10 to $20
pupm
2010
Industrialized,
Low-Cost IT
-50% to -80%
Salesforce.com
$75
BPOS/Gmail
$2 pupm
Time
Gartner Inc., Gartners Top Predictions for IT Organizations and Users, 2012 and Beyond: Control Slips Away, G00226767, 23 November 2011
Gartner Inc., Behind the Cloud: The Rise of Industrialized, Low-Cost IT Services, G00209857, 1 February 2011
10
Conclusion
In the preceding pages, we have attempted to chart the broad contours of the emerging IT landscape. Of course, more detailed
maps will be needed as you explore particular regions for example, mobility, security or cloud computing of the new environment. But this article hopefully provides a helpful overview and suggests some areas worthy of further exploration.
Source: HCL
11
12
13
Market Implications:
Despite a limited direct market impact (~$20 billion by
2015), ILCS offerings will reset the ITO market price in the
next five years. We expect to see marketing messages like
We manage your SAP infrastructure for less than $10 per
user per month. Why are you spending more? to increasingly fuel CFOs and CEOs interest, further pushing IT
spending as an operating expense externally delivered and
no longer a capital expense internally managed.
This sort of external benchmark regardless whether the
advertisement is entirely applicable or not will accelerate
the transition toward industrialized, cloud-based services,
and will heavily impact the renewal of ITO contracts in the
next five years. Clients will either migrate toward new providers or ask their traditional outsourcers to deliver these
services at the right service quality and price points.
14
15
16
We expect the impending Windows 8 (by YE12) from Microsoft to contribute to the trend. This OS will run on ARM processers (in addition to Intel processors), and will be touchenabled for deployment on tablets, accelerating the uptake
of Outlook running on tablets and smartphones. We also
believe it is inevitable that Microsoft will release versions of
Outlook running on Android and iOS devices sometime in
the next year or two. Finally, the near-universal acceptance
of the Exchange Active Sync protocol for mobile access to
email and the rise of rich mobile device management tools
facilitates the broad use of mobile devices for email access. However, users will still have access to a desktop client,
in addition to mobile access mechanisms.
Market Implications:
We expect mobile device manufacturers Apple, Nokia,
Samsung, LG, Motorola, etc. to enter a new phase of competition to offer rich email clients to maintain rough parity and
to establish competitive differential. Email system vendors
Microsoft, IBM, VMware and Google are also likely to build
mobile clients for diverse set of devices for the same reason.
Market opportunities for mobile device management platform vendors will soar. Increased pressure will be on those
suppliers to accommodate an increasing portfolio of collaboration services, including IM, Web conferencing, social
networking and shared workspaces.
Recommendations:
Enterprises should:
Develop policies governing the use of corporate- and employee-supplied devices, and should implement rich device
management applications for controlling and securing remote access.
Upgrade email systems to versions that support rich browser
and mobile device access to email services.
Investigate opportunities to eliminate desktop email clients
to reduce PC complexity and eliminate local email archives.
Work with HR resources to optimize life/work balances and decrease employee stress due to growing availability expectations.
Ensure that the remote email access infrastructure has a
high degree of redundancy at all points to ensure continuous availability.
Plan to extend email mobility to adjacent collaboration services such as IM, shared workspaces and social networking.
Train users on best practices for email communications in a
mobile world (better, shorter subject lines, shorter messages,
clear action requests, etc).
17
Strategic Planning Assumption: By 2015, mobile AD projects targeting smartphones and tablets will outnumber native
PC projects by a ratio of 4-to-1.
Mobile and Wireless Communications
Analysis By: William Clark
Key Findings:
Smartphones and tablets represent over 90% of the net-new
growth in device adoption for the coming four years, and increasing application platform capability across all classes of
mobile phones is spurring a new frontier of innovation, particularly where mobile capabilities can be integrated with location,
presence and social information to enhance usefulness.
Mobile AD is rapidly moving through its adolescence, triggered by a broad increase in demand for all categories
of mobile applications: business-to-consumer (B2C), business-to-employee (B2E) and B2B.
The very definition of applications is changing many mobile
applications are mere shells (or hybrid) apps or applets Webtechnology-oriented, but wrapped in native device code.
Market Implications:
Smartphones and tablets represent over 90% of the net-new
growth in device adoption for the coming four years, and the
increasing application platform capability across all classes of
mobile phones is spurring a new frontier of innovation, particularly where mobile capabilities can be integrated with location,
presence and social information to enhance usefulness.
Web enablement, especially with the advent of HTML5, is a
key part of mobile application strategy, native or rich mobile AD demands are being triggered in all three areas:
In B2C, due to the marketing/advertising impact of
app stores, as well as the huge financial potential of
targeted context-aware advertising and offers, most
CMOs are demanding applications, which can add
even greater value or opportunity if they are resident
and provide stickiness to consumers. In addition, many
media-rich or gaming applications require native mobile
development. For consumer-facing enterprises, such
as retailers and consumer packaged goods, mobile
consumer application strategies cover Web, native and
messaging (SMS/MMS) channels, and comprehensive
strategies are linking these together.
In B2E, bring your own device (BYOD) is having a major impact on user demand, especially in requests for supporting
18
Gartner believes that inspectors certifications will eventually around 2016 become a viable alternative or
complement to third-party testing. This means that instead
of requesting that a third-party security vendor conduct
testing on the enterprises behalf, the enterprise will be
satisfied with a cloud providers certificate stating that a
reputable third-party security vendor has already tested its
applications.
Recommendations:
Demand assurances from cloud providers that their software
has been tested for security vulnerabilities. Security testing of
cloud providers systems conducted by reputable independent application security testing vendors is a preferred option.
An alternative is security testing conducted by the cloud provider itself.
Accept security certificates issued by trusted security vendors if
they meet your industrys and enterprises security standards.
Seek cloud services brokerages that demonstrate a proficiency in security inspection, auditing and certification.
Content Management
Strategic Planning Assumption: At YE16, more than 50% of
Global 1000 companies will have stored customer-sensitive
data in the public cloud.
Analysis By: Gavin Tay
Key Findings:
With the current global economy facing ongoing financial
pressure, organizations are compelled to reduce operational
costs and streamline their efficiency. Responding to this imperative, it is estimated that more than 20% of organizations
have already begun to selectively store their customer-sensitive data in a hybrid architecture that is a combined deployment of their on-premises solutions with a private and/or
public cloud provider in 2011.
In 2010, more than 40% of data archiving deployments
that contained sensitive data were to the cloud. Many CIOs
rank the improvement of their agility very high, but fear
the trade-off in introducing greater risk, such as lapses in
security, compliance, audit, availability, reputation or, importantly, custody of their critical data. Leaders of organizations must realize that by going to a hybrid architecture, not
only will they add significant complexity, but they will also
continue to bear both the tangible and intangible costs of
running multiple environments.
19
Market Implications:
As global organizations commence a progressive journey to
the public cloud, their primary objectives to consistently delight patriotic and new customers, as well as improve business performance, will continue to remain a priority. In so
doing, organizations will reduce operational costs, gain efficiency, increase business agility and attain regulatory compliance. This journey to the public cloud will take organizations to the next level to fulfill these objectives; however, it
will inevitably prove to be one with its fair set of challenges.
They include:
Organizations operating in countries that require data residency, each with its distinct laws.
The data privacy laws of world governments, for example,
intrusion of privacy by mining data of public clouds.
Security risk and vulnerabilities (e.g., physical, network,
software platform and auditing/governance policies) of the
public cloud infrastructure will change as the cloud evolves.
Lack of standards for intercloud dependency or integration.
Organizations will recognize the need to re-engineer their
business processes and governance/data retention policies
as they embark on the public cloud. The growth of organizational roles such as legal counsel, infrastructure planning
engineers, and network and security specialists will be in
much greater demand.
Recommendations:
For international information communication authorities:
Governing bodies from all countries should collaborate on
a mutually developed cloud standard and framework of
operation, such as the Cloud Data Management Interface
from SNIA.
Harness their efforts in being an advocate for greater regulation in public clouds, and examine providing legal assistance, particularly smaller organizations that have proceeded with initial adoption.
For organizations:
Continue pilots and active projects using public cloud offerings with less sensitive data before progressing to customersensitive data, such as finance/accounting, CRM, project
management, supply chain management, HR, manufacturing, business partner management, etc.
IT leaders should examine the nuances and risk of a public
cloud or, conversely, should prepare better in anticipation
20
of their adoption, for example, disaster recovery, high-availability SLAs, authentication vulnerabilities, in-country regulations for data retention and application compatibility.
Weigh the tangible and intangible costs of each risk. Examples of questions to ask include:
How much does it cost to migrate from one public cloud provider to another (traces of intellectual property left behind)?
How much money and/or reputation will the organization
suffer from downtime (unrecoverable data)?
Legal counsels of organizations should assess the jurisdiction
of data ownership in the event of a liquidation or seizure,
especially when operating on a global platform.
Network and security specialists should conduct a walkthrough of the vendors data center for compliance or audit
checks as they would their organizations infrastructure.
IT and Operational Technology
Strategic Planning Assumption: By 2015, 35% of enterprise
IT expenditures for most organizations will be managed outside
the IT departments budget.
Analysis By: Brian Prentice
Key Findings:
Most IT organizations are allocating 80% their budgets to
keep the lights on expenses. The other 20% of IT spending
is for activities that grow and transform the business.
Next-generation digital enterprises are being driven by a new
wave of business managers and individual employees who
no longer need technology to be contextualized for them by
an IT department. These people are demanding control over
the IT expenditure required to evolve the organization within
the confines of their roles and responsibilities. Numerous examples of this pressure exist today:
Cloud computing is expected to grow to 20% or more of the
total IT budget by 2013. Our research indicates there is already significant non-IT involvement in decision making with
finance, marketing, HR and other business, acting as key
stakeholders between 25% to 30% of the time and funding
computing services between 10% to 30% of the time.
Global spending on media tablets is forecast to increase
at an annual average rate of 52% through 2015. That is
set against a backdrop of weakening demand for traditional
PCs in developed economies. These devices will have an
increased impact on the enterprise, yet it is users who are
driving both the purchases and, as a result, the platform support decisions required by the IT organization.
spending will continue to increase, but CIOs will have diminished control over it. A majority of organizations between
50% and 60% will see IT expenditures managed outside
the IT department growing to 35% of total spending. By and
large, this will not be offset by equivalent reductions in the IT
departments budget, as Gartner sees an ongoing increase
in IT budgets of 1.5% to 2.5% over the next four years. However, this extent of IT expenditure within the business is not
universal. More conservative organizations roughly onequarter will see a lower level of IT expenditure outside the
IT department. This will more likely be 20% to 25%. The remaining one-quarter, with highly conservative IT and non-IT
professionals, will see little to no IT expenditure outside the
IT department.
Ultimately, CIOs will find themselves faced with an existential
question are they ultimately being asked to do the same
or more with less, or do they need to recast their organizations value proposition in the context of a changed business
landscape and funding assumptions.
Recommendations:
CIOs should increase their focus toward connective technology the enabling tools that tie business solutions together.
Connective technologies include master data management,
business intelligence (BI) and analytics, business process
management (BPM) suites, composition technology, process
and data integration, service-oriented architecture (SOA)
governance technology, and identity and access management architectures.
Put the I back in IT. Many IT organizations are skewed toward technology when the emerging digital enterprise thrives
on information. While individual lines of business will generate and analyze large volumes of data, it is the IT organization that is best positioned to act as the data caretaker.
Central to achieving this outcome is to recognize that data
is an asset in its own right not a theoretical asset, but one
that should ultimately be accounted for in the organizations
balance sheet.
Supply Chain
Strategic Planning Assumption: By 2014, 20% of Asiasourced finished goods and assemblies consumed in the U.S.
will shift to the Americas.
Analysis By: Michael Dominy
21
Key Findings:
Political, environmental, economic and supply chain risks
are causing many companies serving the U.S. market to
shift sources of supply whether they are toys, toothpaste,
equipment subassemblies or commodity parts that go into
finished products from Asia to the Americas, including
Latin America, Canada and the U.S. Except in cases where
there is a unique manufacturing process or product intellectual property, most products are candidates to be relocated.
North American enterprises underestimate the total supply
chain costs of offshoring the supply network to Asia. Escalating oil prices globally and rising wages in many offshore
markets, plus the hidden costs associated with offshore outsourcing, erode the cost savings that didnt account for critical supply chain factors, such as inventory carrying costs,
lead times, demand variability and product quality.
Double-digit economic growth in many offshore markets means
a larger portion of output generated in those markets will be
consumed within those markets instead of being exported to
developed markets. Locating manufacturing or sourcing from
suppliers that are closer to customer demand enables enterprises to respond faster, thereby reducing risks, lead times and
costs, including transportation and inventory carrying costs.
There are examples of manufacturers across industries and retailers shifting manufacturing or sourcing locations from China
to the Americas. Manufacturers of products for which labor is a
smaller percentage of total cost, or whose quality and intellectual property concerns are more pronounced, have been more
inclined to move production back to the Americas.
22
The net result is that enterprises will need help assessing, redesigning and transforming internally oriented supply chains into
market-focused, demand-driven value networks. Supply chain
service providers, including consulting and advisory firms, will
need to deliver more sophisticated and comprehensive supply chain assessments that can model various scenarios, and
represent them in strategic and financial terms that chief executives and boards of directors can understand.
The persistently high unemployment rate in the U.S. will lead
more states to offer tax breaks to companies that set up local
operations.
Factors that will cause the prediction to come true:
Asian, and especially Chinas, policies regarding currency
valuation and exchange rates do not change dramatically.
Incentives offered by national and local governments within
countries in the Americas continue or expand.
Fuel prices increase, with oil prices reaching $100 or more
per barrel.
Continued general economic growth in Asian countries, and
China specifically, will consume an increasing amount of capacity and manufacturing output produced by China.
Persisting concerns surround intellectual property protection.
Productivity gains in the Americas continue to offset the Asian
total cost advantage.
The ability to respond more quickly to demand, especially
volatile demand, in American markets makes it necessary for
enterprises to have shorter supply chains, with manufacturing plants being located closer to points of demand.
Market Implications:
Market Implications:
Enterprises need to ensure that they are evolving their security defenses and processes to deal with changing vulnerabilities and changing attacks.
To meet the demands of changing delivery models like the
cloud and the use of smartphones and mobile devices, enterprises must make a radical change in how they manage
and secure IT.
Key Findings:
As IT delivery methods meet demand for the use cloud services and employee-owned devices, new software vulnerabilities will be introduced, and innovative attack paths will
be developed by financially motivated attackers.
The consumerization trend will cause continuing disconnects
between the use of consumer-grade services and devices, and
enterprise-oriented processes and governance approaches,
enabling attacks against critical business and customer data
.
At every major change in the way IT gets delivered (going from mainframe to client/server, client/server to Web,
etc.), software development and IT operations management
processes break, and new forms of vulnerabilities are introduced and exploited by attackers. In the 2011 to 2016 time
frame, IT delivery is changing to add the use of cloud-based
services and support the use of employee-owned laptops,
smartphones and tablets.
At the same time, cyber attacks have moved from simple vandalism to targeted, financially motivated attacks that use sophisticated techniques to evade detection and steal sensitive
business and customer data. These methods are often used
later by politically motivated attackers (such as Anonymous),
as well as nation-launched attacks, often called advanced
persistent threats. In 2011 alone, Sony had to publicly announce security incidents that cost over $200 million, and
RSA filed U.S. Securities and Exchange Commission (SEC)
statements acknowledging direct costs of over $65 million.
Other companies have seen all of their corporate emails
published on the Internet, with enormous financial impact.
The combination of new vulnerabilities and more targeted
attacks will lead to continued growth in bottom-line financial
impact due to successful cyber attacks. Recognizing this, the
SEC issued guidance detailing circumstances that will require publicly traded companies to fully disclose the impact
of security incidents.
Recommendations:
23
include the majority of operators driven by competitive pressures and a me too approach. Linking this surcharge to global
energy prices will help average the costs across different regions,
and will allow an externally determined and clearly identified
base index to be used to determine the surcharge. By visibly
highlighting the energy component, they also highlight the sustainability issues surrounding carbon emissions that many cloud
users have sought to conveniently avoid by moving transaction
processing off their premises and systems. A visible energy surcharge neatly transfers the onus (and carbon emissions) back
to the user which is likely to be a significant issue as carbon
trading schemes emerge more strongly.
In the long term, the surcharge could become a variable
component (capable of falling and increasing), although
this seems unlikely given the global trends and the focus on
long-term sustainability.
Market Implications:
Business and IT leaders and procurement specialists must expect to see energy costs isolated and included as a variable
element in future cloud services contracts.
This additional uncertainty represents an increased business
risk and price volatility that must be considered in the decision
to move toward externally sourced cloud-based services.
24
Recommendations:
Information Management
Strategic Planning Assumption: Through 2015, more than
85% of Fortune 500 organizations will fail to effectively exploit
big data for competitive advantage.
Analysis By: Steve Prentice
Key Findings:
Current trends in smart devices and growing Internet connectivity are creating significant increases in the volume of
data available, but the complexity, variety and velocity with
which it is delivered combine to amplify the problem substantially beyond the simple issues of volume implied by the
popular term big data.
Collecting and analyzing data is not enough it must be
presented in a timely fashion so that decisions are made as
a direct consequence that have a material impact on the
productivity, profitability or efficiency of the organization.
Hence, technical and management capabilities both need
to be established in order to progress from data to decision.
25
About HCL
stablished in 1976 as an IT garage setup, HCL is a $6.2 billion leading global technology and IT enterprise comprising two companies listed in India - HCL Technologies and HCL Infosystems. HCL leverages its extensive global offshore infrastructure
and network of offices in 31 countries to provide holistic, multi-service delivery in key
industry verticals including Financial Services, Manufacturing, Consumer Services, Public
Services and Healthcare. HCL takes pride in its philosophy of Employees First, Customers
Second which empowers our 88,000 transformers to create a real value for the customers. Since its inception into the global landscape after its IPO in 1999, HCL Technologies,
a leading global IT services company, focuses on `transformational outsourcing, underlined by innovation and value creation, and offers integrated portfolio of services including infrastructure management, software-led IT solutions, engineering and R&D services
and BPO. The companys fastest growing line of business HCL Technologies Infrastructure
Services Division, also known as HCL ISD, manages mission critical environments and
handles over 3 million devices for over 1.7 million end users.
26