Tagged - LFBP

Develop a Business Continuity Plan

Implement a structured and repeatable process, applied to one business unit at a time. Keep BCP planning efforts manageable and enable business unit leads to own their...
  • guided implementation icon

Establish a Service-Based Costing Model

Service-based costing brings clarity to IT expenditures and visibility to IT consumption. However, overcoming the challenges of service-based costing requires a logical...
  • guided implementation icon

Build an ERP Strategy and Roadmap

Organizations often do not have an ERP strategy and roadmap in place. The focus is often on selection and implementation phases of ERP, but without a foundation and...
  • guided implementation icon

Define Your Cloud Vision

This blueprint reviews the characteristics, pros, and cons of cloud services, helping readers understand when to employ software-, platform-, and...
  • guided implementation icon

Standardize the Service Desk

Go beyond the blind adoption of best-practice frameworks. No simple formula exists for improving service desk maturity. Use diagnostic tools to assess the current state...
  • guided implementation icon

Build a Business-Aligned IT Strategy

Create an IT strategy based on business needs, not just intuition. It is no longer enough to generate a text document and call it an IT strategy. Stakeholder attention...
  • guided implementation icon

Optimize IT Change Management

Infrastructure and application change occur constantly, driven by changing business needs, requests for new functionality, operational releases and patches, and...
  • guided implementation icon

Build Your Data Quality Program

Read this blueprint to understand Info-Tech's data quality methodology and why having quality data is essential for modern organizations.
  • guided implementation icon

Develop a Project Portfolio Management Strategy

With the right PPM strategy, IT leaders can enable executive decision makers to make sense of the excess of project demand and prioritize those initiatives that are of...
  • guided implementation icon

Develop and Deploy Security Policies

Informal, un-rationalized, ad hoc policies are ineffective because they do not explicitly outline responsibilities or compliance requirements, and they are rarely...
  • guided implementation icon
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us