SlideShare ist ein Scribd-Unternehmen logo
1 von 13
How to Evaluate a Managed Services Firm By Chuck Vermillion CEO & Founder
Managed Service Solutions No “one size fits all” managed services solution will ever be ideal for every business.  When evaluating prospective providers, consider important services such as monitoring, reporting, backup, remote management and security.  Also consider key provider qualifications including location, third-party certifications, customer references, in-house staffing resources and contract items.  After outsourcing, you should see immediate results in cost controls and service delivery.  Each organization has different histories, experiences, goals and day-to-  day needs.  Before signing a long term contract or settling on a management solution that could turn out to be inadequate and overly expensive, you should carefully evaluate your company’s requirements realistically.
Managed Service Solutions As outsourcing managed services continues to grow significantly, businesses face a wide range of vendors and options.  A 2009 Gartner survey found that 42% of companies with a thousand employees or less had either fully or partially outsourced their data centers, while 28% are planning to do so within the next 12 months. As the trajectory continues upward for outsourcing managed services, selecting the right provider becomes the most critical exercise in any transition.  Once you have adequately assessed your organization’s strengths and weaknesses and defined your needs and success metrics, you are ready to begin the process of evaluating and selecting the managed services provider that’s the best fit for your business. To best realize your goals and long term efficiency benefits, your search process should focus on evaluating the following service and provider requirements.
Managed Services “Must Haves” Proactive and Constant Monitoring and Management.  Your IT partner should predict issues before they arise and affect your business. Basically, you want your provider to quickly address small problems before they become big ones.  A reputable managed services provider will not profit from problems, but from eliminating downtime. Availability of proactive 24/7/365 support is crucial for most businesses.    Comprehensive Reporting and Communication.  Your final choice for a managed services provider should be viewed as a collaborative extension of your IT organization.  You need your provider to submit monthly status reports and quarterly business reviews and continually reevaluate your IT network metrics and maintenance data.
Managed Services “Must Haves” E Your provider should regularly collect operational data and have a clear, established process in place for converting that information into better IT management decisions. The chain of communication between your team and the MSP team needs to be clear, direct and easy to navigate.   Reliable Backup and Restore Procedures.  With your provider, determine the timeframe you need for automatic backup and system restore functions.  Today’s always-on world requires some of the highest reliabilities the industry has had to deliver. And redundancy is key – of power, network, servers, storage and even entire data centers.  A SAS-70 audit ensures that claims of backup are in place and properly managed.  In addition, the SAS-70 audit assures any claim of preventative maintenance is backed up with proper documentation and service records.  The SAS70 audit will also substantiate any claims regarding change management.
Managed Services “Must Haves” Remote Management. In reality, most problems that arise in IT infrastructures can be quickly identified and fixed from a remote location. Does your managed services provider require a steady onsite presence? If so, find out why, and what benefits their presence will provide to your business. Your provider should provide comprehensive remote services management without having to spend time your locations.   Full Security Management. Determine whether your services include security management, such as firewall monitoring and patch applications. Do they offer remote data backup storage?  Make sure your solution fully addresses your organization’s IT security requirements.
Key Provider Qualifications Suitable Location.  Compare the location of prospective providers in terms of security (natural disasters, political unrest, etc.) and operational efficiencies to the costs.  According to a data center outsourcing survey by Enterprise Systems (esj.com) and SOURCINGmag.com, 80% of the survey respondents outsourced their data centers to service providers located in the United States. Most companies prefer to keep the business domestic, and in many cases, within the same time zone and close to their main business. Third-Party Certifications.  If you’re thinking of building your own data center, you must budget for SAS-70 auditing costs. These costs can easily run over $100,000 per year. Or, you can outsource your data center and select a vendor who has already made the SAS-70 investments.
Key Provider Qualifications A “SAS-70 audited” data center is a label used by many hosting companies to help show the value of their services.  The term “SAS-70″ or Statement on Auditing Standards No. 70, refers to a document that provides auditing standards for performing this specific type of audit on service organizations and is issued by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA).  SAS-70 consists of two types:  Type I – Evaluates the fairness of a service organization’s description of their internal controls. Typically, Type I auditing begins when a company first starts the SAS-70 process. Type II – Includes the Type I report and evaluates how the controls were operating over a set period of time, usually six months from when the Type I audit was first conducted.  It shows the managed services provider claims are accurate.
Key Provider Qualifications By reviewing a SAS-70 audit report, you can learn immediately what controls and capabilities are in place and if the data center has been audited by a CPA.  You can also confirm the provider’s processes – the riskiest portion of data center operations.  A SAS-70 audit will actually test all controls.   Excellent Customer References.  Check references thoroughly and make sure each provider supplies relevant and recent customer references. Ask references about their experience with escalations.  Also, have the provider disclose each partner it works with in delivering your services.  Finally, a vendor-agnostic provider should have established relationships with major equipment and software vendors.  Make sure your managed services provider represents your best interests and is able to negotiate advantageous pricing and maintenance contract terms on your behalf.
Key Provider Qualifications Qualified In-House Staff with Relevant Experience.  Ensure the provider you choose has experience working in your industry and with companies your size.  Also, ask prospective providers about retention, training and tenure of employees in key positions.  One reason many companies turn to managed services is the shortage of technical experts. You don’t want to select a provider who’s having the same staffing issue.   Finally, be careful of large, single-vendor solutions that lack the flexibility and customer support necessary to meet your organization’s unique needs. Instead, look for a provider who can become your trusted technology advisor and partner. .
Key Provider Qualifications Straight-Forward Contracts and Pricing. Carefully review your provider’s contract terms before signing. Analyze service levels.  For example, disaster recovery and business continuity are not interchangeable.  So compare the service level required for your business with what the provider contractually guarantees.    Take a careful look at how moves, adds and changes are managed in your agreement. Are you going to be invoiced for each one on a per-incident basis?  By evaluating contract terms early in the selection process, you can avoid unexpected costs that weaken the advantages you gain by deploying a managed services strategy.
  It’s All About Service Fulfillment ,[object Object],[object Object],[object Object]
About the Author Chuck Vermillion is CEO and founder of OneNeck IT Services, a leading provider of mid-market enterprise hosting and managed services since 1997. For more information about our Managed Services, visit http://www.oneneck.com/Solutions.aspx today.

Weitere ähnliche Inhalte

Was ist angesagt?

Governance and relationship management
Governance and relationship management Governance and relationship management
Governance and relationship management WGroup
 
Justifying Your Data Quality Projects
Justifying Your Data Quality ProjectsJustifying Your Data Quality Projects
Justifying Your Data Quality ProjectsInnovative_Systems
 
7 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 20157 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 2015Continuum
 
IT Outsourcing- Delivering Unmatched Value
IT Outsourcing- Delivering Unmatched ValueIT Outsourcing- Delivering Unmatched Value
IT Outsourcing- Delivering Unmatched Valueoneneckitservices
 
SDM Presentation V1.0
SDM Presentation V1.0SDM Presentation V1.0
SDM Presentation V1.0KirSinc
 
Predicting the Customer Experience: A Convergence of Business Process, Decisi...
Predicting the Customer Experience: A Convergence of Business Process, Decisi...Predicting the Customer Experience: A Convergence of Business Process, Decisi...
Predicting the Customer Experience: A Convergence of Business Process, Decisi...Prolifics
 
Commercial Insurance Underwriting Business Process As Is Current State Diagra...
Commercial Insurance Underwriting Business Process As Is Current State Diagra...Commercial Insurance Underwriting Business Process As Is Current State Diagra...
Commercial Insurance Underwriting Business Process As Is Current State Diagra...Theresa Leopold
 
THE IMPORTANCE OF OUTSOURCING DATA ENTRY SERVICES
THE IMPORTANCE OF OUTSOURCING DATA ENTRY SERVICESTHE IMPORTANCE OF OUTSOURCING DATA ENTRY SERVICES
THE IMPORTANCE OF OUTSOURCING DATA ENTRY SERVICESColin Greenlaw
 
Cloudway sipm capabilities
Cloudway sipm capabilitiesCloudway sipm capabilities
Cloudway sipm capabilitiesSaumya S
 
A Fool With A Tool V2
A Fool With A Tool V2A Fool With A Tool V2
A Fool With A Tool V2Linz1769
 
Predicting the Customer Experience: A Convergence of Business Process, Deci...
 Predicting the Customer Experience: A Convergence of Business Process, Deci... Predicting the Customer Experience: A Convergence of Business Process, Deci...
Predicting the Customer Experience: A Convergence of Business Process, Deci...Nathaniel Palmer
 
The SLA Way to IT Success - Help IT Build Confidence and Credibility
The SLA Way to IT Success - Help IT Build Confidence and CredibilityThe SLA Way to IT Success - Help IT Build Confidence and Credibility
The SLA Way to IT Success - Help IT Build Confidence and Credibilityuptime software
 
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016TeamQuest Corporation
 
Austin Tech Introduction Deliver Business Value With It Service Management ...
Austin Tech Introduction   Deliver Business Value With It Service Management ...Austin Tech Introduction   Deliver Business Value With It Service Management ...
Austin Tech Introduction Deliver Business Value With It Service Management ...itilsme
 
Managed Service Provider (MSP) – Mastering the Winds of Change
Managed Service Provider (MSP) – Mastering the Winds of ChangeManaged Service Provider (MSP) – Mastering the Winds of Change
Managed Service Provider (MSP) – Mastering the Winds of ChangeEverest Group
 
Supply chain-optimization-sco-guide (1)
Supply chain-optimization-sco-guide (1)Supply chain-optimization-sco-guide (1)
Supply chain-optimization-sco-guide (1)Benoit St-jean
 
Regulatory Reporting Dashboard
Regulatory Reporting DashboardRegulatory Reporting Dashboard
Regulatory Reporting Dashboardaccenture
 

Was ist angesagt? (19)

Governance and relationship management
Governance and relationship management Governance and relationship management
Governance and relationship management
 
Justifying Your Data Quality Projects
Justifying Your Data Quality ProjectsJustifying Your Data Quality Projects
Justifying Your Data Quality Projects
 
7 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 20157 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 2015
 
isc_pov_final-28042015
isc_pov_final-28042015isc_pov_final-28042015
isc_pov_final-28042015
 
IT Outsourcing- Delivering Unmatched Value
IT Outsourcing- Delivering Unmatched ValueIT Outsourcing- Delivering Unmatched Value
IT Outsourcing- Delivering Unmatched Value
 
SDM Presentation V1.0
SDM Presentation V1.0SDM Presentation V1.0
SDM Presentation V1.0
 
Predicting the Customer Experience: A Convergence of Business Process, Decisi...
Predicting the Customer Experience: A Convergence of Business Process, Decisi...Predicting the Customer Experience: A Convergence of Business Process, Decisi...
Predicting the Customer Experience: A Convergence of Business Process, Decisi...
 
Commercial Insurance Underwriting Business Process As Is Current State Diagra...
Commercial Insurance Underwriting Business Process As Is Current State Diagra...Commercial Insurance Underwriting Business Process As Is Current State Diagra...
Commercial Insurance Underwriting Business Process As Is Current State Diagra...
 
THE IMPORTANCE OF OUTSOURCING DATA ENTRY SERVICES
THE IMPORTANCE OF OUTSOURCING DATA ENTRY SERVICESTHE IMPORTANCE OF OUTSOURCING DATA ENTRY SERVICES
THE IMPORTANCE OF OUTSOURCING DATA ENTRY SERVICES
 
Cloudway sipm capabilities
Cloudway sipm capabilitiesCloudway sipm capabilities
Cloudway sipm capabilities
 
A Fool With A Tool V2
A Fool With A Tool V2A Fool With A Tool V2
A Fool With A Tool V2
 
Predicting the Customer Experience: A Convergence of Business Process, Deci...
 Predicting the Customer Experience: A Convergence of Business Process, Deci... Predicting the Customer Experience: A Convergence of Business Process, Deci...
Predicting the Customer Experience: A Convergence of Business Process, Deci...
 
The SLA Way to IT Success - Help IT Build Confidence and Credibility
The SLA Way to IT Success - Help IT Build Confidence and CredibilityThe SLA Way to IT Success - Help IT Build Confidence and Credibility
The SLA Way to IT Success - Help IT Build Confidence and Credibility
 
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
 
Data Management Strategy
Data Management StrategyData Management Strategy
Data Management Strategy
 
Austin Tech Introduction Deliver Business Value With It Service Management ...
Austin Tech Introduction   Deliver Business Value With It Service Management ...Austin Tech Introduction   Deliver Business Value With It Service Management ...
Austin Tech Introduction Deliver Business Value With It Service Management ...
 
Managed Service Provider (MSP) – Mastering the Winds of Change
Managed Service Provider (MSP) – Mastering the Winds of ChangeManaged Service Provider (MSP) – Mastering the Winds of Change
Managed Service Provider (MSP) – Mastering the Winds of Change
 
Supply chain-optimization-sco-guide (1)
Supply chain-optimization-sco-guide (1)Supply chain-optimization-sco-guide (1)
Supply chain-optimization-sco-guide (1)
 
Regulatory Reporting Dashboard
Regulatory Reporting DashboardRegulatory Reporting Dashboard
Regulatory Reporting Dashboard
 

Ähnlich wie Why Outsource Application Management?

Choosing it managed service provider
Choosing it managed service providerChoosing it managed service provider
Choosing it managed service providerHEMinnovative
 
Measuring Quality of IT Services
Measuring Quality of IT ServicesMeasuring Quality of IT Services
Measuring Quality of IT ServicesiCore Limited
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITIONBhavanthSoni
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...31West Global Services
 
it outsourcing.pdf
it outsourcing.pdfit outsourcing.pdf
it outsourcing.pdfVograce
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guideMarie Peters
 
Step-by-Step Guide to Eval NSPs 2016
Step-by-Step Guide to Eval NSPs 2016Step-by-Step Guide to Eval NSPs 2016
Step-by-Step Guide to Eval NSPs 2016Eric Hyman
 
3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedIn3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedInScott Leydin
 
Accounts Payable Outsourcing: Streamlining Financial Processes Introduction
Accounts Payable Outsourcing: Streamlining Financial Processes IntroductionAccounts Payable Outsourcing: Streamlining Financial Processes Introduction
Accounts Payable Outsourcing: Streamlining Financial Processes IntroductionMYND Solution
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessSafar Safarov
 
CRM Systems Start With A Philosophy
CRM Systems Start With A PhilosophyCRM Systems Start With A Philosophy
CRM Systems Start With A PhilosophyRichard Bowden
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2Frank Corris
 
Evaluating Hosted CRM
Evaluating Hosted CRMEvaluating Hosted CRM
Evaluating Hosted CRMDemand Metric
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEeAuditor Audits & Inspections
 
Factors to consider while choosing an outsourcing partner | Web Synergies
Factors to consider while choosing an outsourcing partner | Web SynergiesFactors to consider while choosing an outsourcing partner | Web Synergies
Factors to consider while choosing an outsourcing partner | Web SynergiesTharun Bangari
 

Ähnlich wie Why Outsource Application Management? (20)

Choosing it managed service provider
Choosing it managed service providerChoosing it managed service provider
Choosing it managed service provider
 
Measuring Quality of IT Services
Measuring Quality of IT ServicesMeasuring Quality of IT Services
Measuring Quality of IT Services
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
 
it outsourcing.pdf
it outsourcing.pdfit outsourcing.pdf
it outsourcing.pdf
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guide
 
The Complete Guide to Vendor Onboarding Process.pptx
The Complete Guide to Vendor Onboarding Process.pptxThe Complete Guide to Vendor Onboarding Process.pptx
The Complete Guide to Vendor Onboarding Process.pptx
 
Step-by-Step Guide to Eval NSPs 2016
Step-by-Step Guide to Eval NSPs 2016Step-by-Step Guide to Eval NSPs 2016
Step-by-Step Guide to Eval NSPs 2016
 
3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedIn3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedIn
 
Accounts Payable Outsourcing: Streamlining Financial Processes Introduction
Accounts Payable Outsourcing: Streamlining Financial Processes IntroductionAccounts Payable Outsourcing: Streamlining Financial Processes Introduction
Accounts Payable Outsourcing: Streamlining Financial Processes Introduction
 
GRC tools
GRC toolsGRC tools
GRC tools
 
Vendor Management Buyers Guide
Vendor Management Buyers GuideVendor Management Buyers Guide
Vendor Management Buyers Guide
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP Business
 
Logicas Pres (Eng)
Logicas Pres (Eng)Logicas Pres (Eng)
Logicas Pres (Eng)
 
CRM Systems Start With A Philosophy
CRM Systems Start With A PhilosophyCRM Systems Start With A Philosophy
CRM Systems Start With A Philosophy
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2
 
Outsourced NOC Support.pdf
Outsourced NOC Support.pdfOutsourced NOC Support.pdf
Outsourced NOC Support.pdf
 
Evaluating Hosted CRM
Evaluating Hosted CRMEvaluating Hosted CRM
Evaluating Hosted CRM
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 
Factors to consider while choosing an outsourcing partner | Web Synergies
Factors to consider while choosing an outsourcing partner | Web SynergiesFactors to consider while choosing an outsourcing partner | Web Synergies
Factors to consider while choosing an outsourcing partner | Web Synergies
 

Mehr von oneneckitservices

AX Management: Should an Outsourcer Complete a SSAE 16 Type II Audit?
AX Management:  Should an Outsourcer Complete a SSAE 16 Type II Audit?AX Management:  Should an Outsourcer Complete a SSAE 16 Type II Audit?
AX Management: Should an Outsourcer Complete a SSAE 16 Type II Audit?oneneckitservices
 
How to Evaluate a Managed Services Firm
How to Evaluate a Managed Services FirmHow to Evaluate a Managed Services Firm
How to Evaluate a Managed Services Firmoneneckitservices
 
What is a Liquidation Auction?
What is a Liquidation Auction?What is a Liquidation Auction?
What is a Liquidation Auction?oneneckitservices
 
IT service provider, IT outsourcing, OneNeck IT Services
IT service provider, IT outsourcing, OneNeck IT ServicesIT service provider, IT outsourcing, OneNeck IT Services
IT service provider, IT outsourcing, OneNeck IT Servicesoneneckitservices
 
Virtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case studyVirtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case studyoneneckitservices
 
Disaster Recovery- A Case Study
Disaster Recovery- A Case StudyDisaster Recovery- A Case Study
Disaster Recovery- A Case Studyoneneckitservices
 
IT Hosting- AFundamental BusinessProcess
IT Hosting- AFundamental BusinessProcessIT Hosting- AFundamental BusinessProcess
IT Hosting- AFundamental BusinessProcessoneneckitservices
 
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT ServicesERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Servicesoneneckitservices
 
IT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT ServicesIT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT Servicesoneneckitservices
 

Mehr von oneneckitservices (9)

AX Management: Should an Outsourcer Complete a SSAE 16 Type II Audit?
AX Management:  Should an Outsourcer Complete a SSAE 16 Type II Audit?AX Management:  Should an Outsourcer Complete a SSAE 16 Type II Audit?
AX Management: Should an Outsourcer Complete a SSAE 16 Type II Audit?
 
How to Evaluate a Managed Services Firm
How to Evaluate a Managed Services FirmHow to Evaluate a Managed Services Firm
How to Evaluate a Managed Services Firm
 
What is a Liquidation Auction?
What is a Liquidation Auction?What is a Liquidation Auction?
What is a Liquidation Auction?
 
IT service provider, IT outsourcing, OneNeck IT Services
IT service provider, IT outsourcing, OneNeck IT ServicesIT service provider, IT outsourcing, OneNeck IT Services
IT service provider, IT outsourcing, OneNeck IT Services
 
Virtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case studyVirtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case study
 
Disaster Recovery- A Case Study
Disaster Recovery- A Case StudyDisaster Recovery- A Case Study
Disaster Recovery- A Case Study
 
IT Hosting- AFundamental BusinessProcess
IT Hosting- AFundamental BusinessProcessIT Hosting- AFundamental BusinessProcess
IT Hosting- AFundamental BusinessProcess
 
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT ServicesERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
 
IT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT ServicesIT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT Services
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Why Outsource Application Management?

  • 1. How to Evaluate a Managed Services Firm By Chuck Vermillion CEO & Founder
  • 2. Managed Service Solutions No “one size fits all” managed services solution will ever be ideal for every business. When evaluating prospective providers, consider important services such as monitoring, reporting, backup, remote management and security. Also consider key provider qualifications including location, third-party certifications, customer references, in-house staffing resources and contract items. After outsourcing, you should see immediate results in cost controls and service delivery. Each organization has different histories, experiences, goals and day-to- day needs. Before signing a long term contract or settling on a management solution that could turn out to be inadequate and overly expensive, you should carefully evaluate your company’s requirements realistically.
  • 3. Managed Service Solutions As outsourcing managed services continues to grow significantly, businesses face a wide range of vendors and options. A 2009 Gartner survey found that 42% of companies with a thousand employees or less had either fully or partially outsourced their data centers, while 28% are planning to do so within the next 12 months. As the trajectory continues upward for outsourcing managed services, selecting the right provider becomes the most critical exercise in any transition.  Once you have adequately assessed your organization’s strengths and weaknesses and defined your needs and success metrics, you are ready to begin the process of evaluating and selecting the managed services provider that’s the best fit for your business. To best realize your goals and long term efficiency benefits, your search process should focus on evaluating the following service and provider requirements.
  • 4. Managed Services “Must Haves” Proactive and Constant Monitoring and Management. Your IT partner should predict issues before they arise and affect your business. Basically, you want your provider to quickly address small problems before they become big ones. A reputable managed services provider will not profit from problems, but from eliminating downtime. Availability of proactive 24/7/365 support is crucial for most businesses.   Comprehensive Reporting and Communication. Your final choice for a managed services provider should be viewed as a collaborative extension of your IT organization. You need your provider to submit monthly status reports and quarterly business reviews and continually reevaluate your IT network metrics and maintenance data.
  • 5. Managed Services “Must Haves” E Your provider should regularly collect operational data and have a clear, established process in place for converting that information into better IT management decisions. The chain of communication between your team and the MSP team needs to be clear, direct and easy to navigate.   Reliable Backup and Restore Procedures. With your provider, determine the timeframe you need for automatic backup and system restore functions. Today’s always-on world requires some of the highest reliabilities the industry has had to deliver. And redundancy is key – of power, network, servers, storage and even entire data centers. A SAS-70 audit ensures that claims of backup are in place and properly managed. In addition, the SAS-70 audit assures any claim of preventative maintenance is backed up with proper documentation and service records. The SAS70 audit will also substantiate any claims regarding change management.
  • 6. Managed Services “Must Haves” Remote Management. In reality, most problems that arise in IT infrastructures can be quickly identified and fixed from a remote location. Does your managed services provider require a steady onsite presence? If so, find out why, and what benefits their presence will provide to your business. Your provider should provide comprehensive remote services management without having to spend time your locations.   Full Security Management. Determine whether your services include security management, such as firewall monitoring and patch applications. Do they offer remote data backup storage? Make sure your solution fully addresses your organization’s IT security requirements.
  • 7. Key Provider Qualifications Suitable Location. Compare the location of prospective providers in terms of security (natural disasters, political unrest, etc.) and operational efficiencies to the costs. According to a data center outsourcing survey by Enterprise Systems (esj.com) and SOURCINGmag.com, 80% of the survey respondents outsourced their data centers to service providers located in the United States. Most companies prefer to keep the business domestic, and in many cases, within the same time zone and close to their main business. Third-Party Certifications. If you’re thinking of building your own data center, you must budget for SAS-70 auditing costs. These costs can easily run over $100,000 per year. Or, you can outsource your data center and select a vendor who has already made the SAS-70 investments.
  • 8. Key Provider Qualifications A “SAS-70 audited” data center is a label used by many hosting companies to help show the value of their services. The term “SAS-70″ or Statement on Auditing Standards No. 70, refers to a document that provides auditing standards for performing this specific type of audit on service organizations and is issued by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA).  SAS-70 consists of two types:  Type I – Evaluates the fairness of a service organization’s description of their internal controls. Typically, Type I auditing begins when a company first starts the SAS-70 process. Type II – Includes the Type I report and evaluates how the controls were operating over a set period of time, usually six months from when the Type I audit was first conducted. It shows the managed services provider claims are accurate.
  • 9. Key Provider Qualifications By reviewing a SAS-70 audit report, you can learn immediately what controls and capabilities are in place and if the data center has been audited by a CPA. You can also confirm the provider’s processes – the riskiest portion of data center operations. A SAS-70 audit will actually test all controls.   Excellent Customer References. Check references thoroughly and make sure each provider supplies relevant and recent customer references. Ask references about their experience with escalations. Also, have the provider disclose each partner it works with in delivering your services. Finally, a vendor-agnostic provider should have established relationships with major equipment and software vendors. Make sure your managed services provider represents your best interests and is able to negotiate advantageous pricing and maintenance contract terms on your behalf.
  • 10. Key Provider Qualifications Qualified In-House Staff with Relevant Experience. Ensure the provider you choose has experience working in your industry and with companies your size. Also, ask prospective providers about retention, training and tenure of employees in key positions. One reason many companies turn to managed services is the shortage of technical experts. You don’t want to select a provider who’s having the same staffing issue.   Finally, be careful of large, single-vendor solutions that lack the flexibility and customer support necessary to meet your organization’s unique needs. Instead, look for a provider who can become your trusted technology advisor and partner. .
  • 11. Key Provider Qualifications Straight-Forward Contracts and Pricing. Carefully review your provider’s contract terms before signing. Analyze service levels. For example, disaster recovery and business continuity are not interchangeable. So compare the service level required for your business with what the provider contractually guarantees.   Take a careful look at how moves, adds and changes are managed in your agreement. Are you going to be invoiced for each one on a per-incident basis? By evaluating contract terms early in the selection process, you can avoid unexpected costs that weaken the advantages you gain by deploying a managed services strategy.
  • 12.
  • 13. About the Author Chuck Vermillion is CEO and founder of OneNeck IT Services, a leading provider of mid-market enterprise hosting and managed services since 1997. For more information about our Managed Services, visit http://www.oneneck.com/Solutions.aspx today.