SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Common Risks and Mitigation Strategies of Outsourcing
Common Risks and Mitigation Strategies of
                                              Outsourcing




According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering
market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years.

Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to
innovate faster than its competition and deliver their products to market first, supplement their
development teams and re-balance their development priorities in order to accelerate revenue
generation. Management and investors want to lower total cost of ownership and increase shareholder
value. Due to the standardization of software engineering processes, pricing pressure and margin
compression, evolving enterprise customer expectations, software companies are forced with the task of
delivering more complex product development with limited and decreasingly time frames.

Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven
by fundamental changes in customers' purchasing behavior.

To overcome all or some of the above problems more and more software companies turn to Product
Outsourcing i.e. hiring external vendors to develop a product for the company.




Gartner and Forrester recommend some of the following risk mitigation strategies when engaging IT
offshore services:




1. Executive level support
2. Planned Human Capital Management
3. Communication plan for all stakeholders
4. HR redeployment plan based on Portfolio sequencing and review
5. Risk management subgroup as part of the offshore steering committee to focus on compliance, data,
security, and privacy

Portfolio Management (determining whichapplication/functions are best developed/ supported offshore
versus onshore and the appropriate resource mix for various projects)

1. Methodology for determining what goes where
2. Guidelines for production support, maintenance, new development

IP Security (establishing an environment of trust with the selected vendor while executing the necessary
legal protections)

1. Make sure protections are in place in the event of turnover at the offshore vendor.
2. Consider outsourcing development work that will have little impact on your business if it is
“appropriated.” Groundbreaking research may be better held internally, while engineering on established
products can be outsourced offshore.

The risk of data and IP protection is inherently raised when working in international business. Determine
up front who owns the technology and/or the intellectual property that results from the software research
and development. What should the offshore third party be prevented from doing with respect to
developed or accessed intellectual property — sharing with others? Disclosing to others?


                                                                                 © Altoros Systems     2
Common Risks and Mitigation Strategies of
                                                Outsourcing




Geopolitical (border unrest, religious strife, war, terrorism, political process, etc.)

1. Geographic dispersion of sites
2. Onshore, offshore, near-shore strategy
3. Scenario planning for different levels/probabilities of risk
4. Detailed business continuity plans for vendor and user

Country (government support, political stability, labor characteristics, etc.)

1. Scenario planning for different levels/probabilities of risk by country
2. Sources of country information (INS, World Bank, IMF)
3. Multi-region sourcing
4. U.S.-based corporations with multiple overseas locations

Vendor (reliability, commitment to security, qualifications)

1. Site visits
2. Interview with the head of quality and delivery
3. Vendor due diligence plan based on technologies and skills
4. Audit of the CMM paper trail of an actual project
5. Defined SLA that reflect goals of offshore strategy, such as helping the client improve its CMM
capabilities
6. Comprehensive Master Agreement (covering labor rates, IP ownership, disaster recovery, security,
staffing rotation schedules, etc).



Language and Communications (different proficiency and comprehension levels, day-to-day
misunderstandings, etc.)

1. Common process and methodology
2. Language training
3. Effective handoffs/overlapping shifts and other communication plans
4. Work on security and telecom issues as soon as possible
5. Collaborative technologies
6. Acceptance criteria defined upfront (including signoff by business and IT, documenting required
functions, system performance, and test case scripts)

Culture Difference

1. Embed a project manager who has cross-cultural experience
2. Provide cultural sensitivity training to team members on both sides

It is critical to implement an ongoing program that stresses global and cross-cultural awareness, creating
a comfortable multicultural workplace.

Human Capital (getting the right skills, high turnover rates, etc.)

1. Fixed fee contracts (possibly at higher rates)
2. Awareness that you get what you pay for
3. Choosing vendors with low turnover and high CMM certification


                                                                                     © Altoros Systems   3
Common Risks and Mitigation Strategies of
                                                Outsourcing


4. Matching country versus needed skill sets
5. Background checks and third party references

Knowledge Transfer (offshore employees failing to acquire quickly sufficient knowledge of the systems,
the corporate culture, the industry, etc.)

1. Controlled transition process
2. Weekly meetings for transition team to review milestones
3. Right mix of offshore/onsite resources; controlled handoffs
4. Web-based knowledge/task management and other collaborative systems
5. Established process for transferring knowledge and resources back in-house
6. Updated tool and application licenses to support multiple sites

Knowledge transfer is an extremely important aspect of any outsourcing program management,
particularly if documentation is lacking. The time and effort to transfer knowledge and subject-matter
information to the service provider is a cost rarely accounted for by IT executives. Both parties must
establish a communication framework to transfer knowledge on objectives, issues, updates and results of
an outsourcing engagement.



Change Management (transition, organization, communication, governance, etc.)

1. Developed change-management program
2. Proactive communication of objectives, benefits, staff redeployment plans
3. Teambuilding exercises for the "retained organization"
4. Compensation for transition leaders

Business Continuity Risks and Mitigation Strategies

1. Detailed business continuity, recovery and resumption, crisis management and disaster recovery plans
for both vendor and customer Database on the offshore staff with their subject matter expertise and visa
status
2. Scenario planning for different levels and probabilities of risk
3. Project specific plans and prioritization
4. Additional emphasis on human capital contingencies
5. Analysis of BCP measure versus added costs

Risks and their mitigation during Sourcing Transition (Renew/Exit) Phase Exit Planning

1. Exit parameters identified in advance
2. Transition plan for physical infrastructure, knowledge, data, people
3. All relevant documentation is always available with the "retained" organization




Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and
large software companies for many different reasons. Cost reduction is typically the basis for offshore
outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by
constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as
operational difficulties associated with global outsourcing are gradually removed.

Having the right strategic offshore roadmap and governance model is critical.


                                                                                © Altoros Systems   4
Common Risks and Mitigation Strategies of
                                          Outsourcing




Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com




                                                                    © Altoros Systems   5

Weitere ähnliche Inhalte

Mehr von Altoros

Maturing with Kubernetes
Maturing with KubernetesMaturing with Kubernetes
Maturing with KubernetesAltoros
 
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentKubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentAltoros
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityAltoros
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksAltoros
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Altoros
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a BlockchainAltoros
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Altoros
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and KubernetesAltoros
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingAltoros
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple NodesAltoros
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayAltoros
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for KubernetesAltoros
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryAltoros
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFAltoros
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedAltoros
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsAltoros
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionAltoros
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesAltoros
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoTAltoros
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentAltoros
 

Mehr von Altoros (20)

Maturing with Kubernetes
Maturing with KubernetesMaturing with Kubernetes
Maturing with Kubernetes
 
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentKubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity Assessment
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and Kubernetes
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for Kubernetes
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
 

Kürzlich hochgeladen

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Kürzlich hochgeladen (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Common Risks and Mitigation Strategies of Outsourcing

  • 1. Common Risks and Mitigation Strategies of Outsourcing
  • 2. Common Risks and Mitigation Strategies of Outsourcing According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years. Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to innovate faster than its competition and deliver their products to market first, supplement their development teams and re-balance their development priorities in order to accelerate revenue generation. Management and investors want to lower total cost of ownership and increase shareholder value. Due to the standardization of software engineering processes, pricing pressure and margin compression, evolving enterprise customer expectations, software companies are forced with the task of delivering more complex product development with limited and decreasingly time frames. Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven by fundamental changes in customers' purchasing behavior. To overcome all or some of the above problems more and more software companies turn to Product Outsourcing i.e. hiring external vendors to develop a product for the company. Gartner and Forrester recommend some of the following risk mitigation strategies when engaging IT offshore services: 1. Executive level support 2. Planned Human Capital Management 3. Communication plan for all stakeholders 4. HR redeployment plan based on Portfolio sequencing and review 5. Risk management subgroup as part of the offshore steering committee to focus on compliance, data, security, and privacy Portfolio Management (determining whichapplication/functions are best developed/ supported offshore versus onshore and the appropriate resource mix for various projects) 1. Methodology for determining what goes where 2. Guidelines for production support, maintenance, new development IP Security (establishing an environment of trust with the selected vendor while executing the necessary legal protections) 1. Make sure protections are in place in the event of turnover at the offshore vendor. 2. Consider outsourcing development work that will have little impact on your business if it is “appropriated.” Groundbreaking research may be better held internally, while engineering on established products can be outsourced offshore. The risk of data and IP protection is inherently raised when working in international business. Determine up front who owns the technology and/or the intellectual property that results from the software research and development. What should the offshore third party be prevented from doing with respect to developed or accessed intellectual property — sharing with others? Disclosing to others? © Altoros Systems 2
  • 3. Common Risks and Mitigation Strategies of Outsourcing Geopolitical (border unrest, religious strife, war, terrorism, political process, etc.) 1. Geographic dispersion of sites 2. Onshore, offshore, near-shore strategy 3. Scenario planning for different levels/probabilities of risk 4. Detailed business continuity plans for vendor and user Country (government support, political stability, labor characteristics, etc.) 1. Scenario planning for different levels/probabilities of risk by country 2. Sources of country information (INS, World Bank, IMF) 3. Multi-region sourcing 4. U.S.-based corporations with multiple overseas locations Vendor (reliability, commitment to security, qualifications) 1. Site visits 2. Interview with the head of quality and delivery 3. Vendor due diligence plan based on technologies and skills 4. Audit of the CMM paper trail of an actual project 5. Defined SLA that reflect goals of offshore strategy, such as helping the client improve its CMM capabilities 6. Comprehensive Master Agreement (covering labor rates, IP ownership, disaster recovery, security, staffing rotation schedules, etc). Language and Communications (different proficiency and comprehension levels, day-to-day misunderstandings, etc.) 1. Common process and methodology 2. Language training 3. Effective handoffs/overlapping shifts and other communication plans 4. Work on security and telecom issues as soon as possible 5. Collaborative technologies 6. Acceptance criteria defined upfront (including signoff by business and IT, documenting required functions, system performance, and test case scripts) Culture Difference 1. Embed a project manager who has cross-cultural experience 2. Provide cultural sensitivity training to team members on both sides It is critical to implement an ongoing program that stresses global and cross-cultural awareness, creating a comfortable multicultural workplace. Human Capital (getting the right skills, high turnover rates, etc.) 1. Fixed fee contracts (possibly at higher rates) 2. Awareness that you get what you pay for 3. Choosing vendors with low turnover and high CMM certification © Altoros Systems 3
  • 4. Common Risks and Mitigation Strategies of Outsourcing 4. Matching country versus needed skill sets 5. Background checks and third party references Knowledge Transfer (offshore employees failing to acquire quickly sufficient knowledge of the systems, the corporate culture, the industry, etc.) 1. Controlled transition process 2. Weekly meetings for transition team to review milestones 3. Right mix of offshore/onsite resources; controlled handoffs 4. Web-based knowledge/task management and other collaborative systems 5. Established process for transferring knowledge and resources back in-house 6. Updated tool and application licenses to support multiple sites Knowledge transfer is an extremely important aspect of any outsourcing program management, particularly if documentation is lacking. The time and effort to transfer knowledge and subject-matter information to the service provider is a cost rarely accounted for by IT executives. Both parties must establish a communication framework to transfer knowledge on objectives, issues, updates and results of an outsourcing engagement. Change Management (transition, organization, communication, governance, etc.) 1. Developed change-management program 2. Proactive communication of objectives, benefits, staff redeployment plans 3. Teambuilding exercises for the "retained organization" 4. Compensation for transition leaders Business Continuity Risks and Mitigation Strategies 1. Detailed business continuity, recovery and resumption, crisis management and disaster recovery plans for both vendor and customer Database on the offshore staff with their subject matter expertise and visa status 2. Scenario planning for different levels and probabilities of risk 3. Project specific plans and prioritization 4. Additional emphasis on human capital contingencies 5. Analysis of BCP measure versus added costs Risks and their mitigation during Sourcing Transition (Renew/Exit) Phase Exit Planning 1. Exit parameters identified in advance 2. Transition plan for physical infrastructure, knowledge, data, people 3. All relevant documentation is always available with the "retained" organization Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and large software companies for many different reasons. Cost reduction is typically the basis for offshore outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as operational difficulties associated with global outsourcing are gradually removed. Having the right strategic offshore roadmap and governance model is critical. © Altoros Systems 4
  • 5. Common Risks and Mitigation Strategies of Outsourcing Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com © Altoros Systems 5