Most organisations have their IT environment protected by some form of IT security solution, and and an increasing number have deployed virtualised desktop, server and storage solutions. The technologies used to virtualise and secure these environments are often highly sophisticated and equally expensive. However, the threats for both inbound and outbound security are continually evolving and there is no certainty that the solutions that you currently have deployed are fully protecting your organisation against today's aggressive assaults on organisations.
It is for this reason that KL starts its solutions lifecycle management services portfolio with Check-IT.
The aim of this first phase of our services offering is to determine if the NEED exists to modify, change or increment your existing virtualisation or security infrastructure or strategy.
How are you going to quantify the bottom-line benefits over traditional IT deployments versus virtualisation?
How do you know that the virtualisation suite that you have deployed is actually costing you less than your old environment?
How do you know that your defences are not being breached?
How do you know that your corporate data is only being distributed to authorised recipients?
How do you know that once received, this data is not being accidentally or consciously passed on to unauthorised parties?
How do you know that your policies are being adhered to, that your data - even if lost - is secure from unauthorised reading?
How do you know that you are compliant to the Regulatory bodies that control your organisation?
When looking at virtualisation, we look at the complete cost of ownership of your current infrastructure over a 3 year period and compare it with that of a virtualised solution. By creating 2 TCOs and comparing we can be certain that any technology that we recommend meets your budgets and your ROI targets.
Regarding Security, in partnership with our numerous best-of-breed vendors, we can conduct a range of Health Checks from entirely passive "watching" checks running for 10 - 20 days, through to full Security audits identifying the full risk that your organisation is currently running, as well as a REAL analysis of what is leaving through your gateways and end-points.
These System Health Checks will tell you clearly what you need to do - if anything - to provide compliant and rigorous security to your IT infrastructure.
It's all very well proving that there are loopholes and risks for your organisation in its IT Security, but how does that translate onto the bottom line? Simply stated, is there really a clear ROI for a given spend in a more advanced IT Security solution?
The question of ROI is one that is increasingly relevant in the current economic environment. Establishing ROI requires that the risks and current problems are clearly QUANTIFIED accurately and with the tacit agreement of all the customer's stakeholders. This must then be matched against the cost of procuring, deploying and supporting a solution, to ensure that your organisation sees a clear ROI that exceeds the hurdle rates and time-to-return specified by your Finance department.
KL has designed a 4 stage methodology - "PROVE-IT" - to assist our customers in understanding not just that they need a technology solution, but that by buying one it brings VALUE to the organisation.
Stage 1 - ESTIMATED Value
Stage 2 - POTENTIAL Value
Stage 3 - QUANTIFIED Value
Stage 4 - REALISED Value
Stage 3 is an in-depth analysis of the environment and will require detailed discussions and analysis not just of the technical issues, but also of the business processes and areas affected by those technologies. This is critical to evaluate accurately the ROI. This stage will result in a detailed report highlighting risks, costs, and recommendations. We will need the ready co-operation of a number of different stakeholders in your organisation to complete this stage accurately. As we will be working closely on your REAL information, KL will need to establish a full non-disclosure agreement prior to engagement to provide full confidentiality protection for you. This is a chargeable consulting engagement, but the output is YOURS and does not oblige you to purchase the solution from KL. It may be that this piece of work is the catalyst, business case and technical requirements definition for an RFP or tender.
Stage 4 is only relevant if you have bought from KL. As our mantra we believe in delivering VALUE to our customers. So what happens after you've purchased something? How many suppliers do you have the return to their customers and empirically ANALYSE whether or not they delivered the value that they said they would. This is what KL does in the 4th stage of our Prove-IT Methodology. Basically, did we deliver "what it said on the tin"!