Information Technology Reference
In-Depth Information
•. Assess. all. of. the. possible. solutions. with. your. stake-
holder.team,.considering
•. Which. solution. or. combination. of. solutions. best.
addresses.your.speciications.(some.speciications.
might. have. greater. weight. than. others—these.
decisions.should.be.made.up.front.by.your.stake-
holder.team)?
•. Which.gives.the.most.value.for.its.actual.costs.(do.
not.forget.to.include.training,.setup,.management,.
and.ongoing.operations.and.maintenance)?
•. Which.is.the.most.feasible.for.deployment.in.a.rea-
sonable.time.frame?
•. Which.will.be.scalable,.robust,.and.resilient.enough.
to. serve. you. or. your. organization. into. the. future.
should.you.evolve.or.grow,.or.when.the.technology.
evolves.as.it.is.sure.to.do?
•. Finally,.document.your.decision.and.ensure.you.have.
buy-off.from.all.stakeholders,.especially.the.executives.
and.leaders.who.will.be.paying.the.bills.
The.purchase,.development,.and.deployment.of.an.auto-
mated. solution. can. be. of. great. value. in. avoiding. all. of. the.
risks.we.outlined.in.this.chapter.and.enhancing.your.ability.
to.address.all.of.the.requirements.for.keeping.your.data.safe.
It.is.absolutely.worth.your.time.to.consider.what.options.
are.available.to.automate.the.procedures.necessary.to.provide.
for.the.integrity.and.security.of.your.electronic.information.
Search WWH ::




Custom Search