Advisory Note: IT-Initiatives 2012-2013: a 6*3-Matrix Report - 70612

Report Details

Which initiatives should be top on the agenda of CIOs in 2012/2013? This Advisory note suggests answers to this question, based on the ongoing research of KuppingerCole. The report proposes three initiatives within six areas, which promise specific benefits for the future development of IT. They represent responses to current and future trends. The goal is an IT, which is fit for the future, but at the same time based on what is feasible, and is oriented at the meaningful and the observable changes of the requirements.

The report concisely describes each of the areas for action naming the activities which are meaningful from our perspective together with their reasons. This will provide a basis for planning the IT budget in 2012/2013 and in subsequent years.

The topics themselves are prioritized within each of the three areas. The most important areas of interest are named first, according to the perspective of KuppingerCole. Depending on the actual status of the IT organization, but also taking the current requirements into account, the topics can be identified where investments will be prioritized.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Apr 19, 2012

Advisory Note: IT-Initiatives 2012-2013: a 6*3-Matrix Report - 70612

Which initiatives should be top on the agenda of CIOs in 2012/2013? This Advisory note suggests answers to this question, based on the ongoing research of KuppingerCole. The report proposes three initiatives within six areas, which promise specific benefits for the future development of IT.…

€495.00 Get Access

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Latest Insights

Hot Topics

Spotlight

Learn more

Cyber Defence Center

Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00