This is a template to conduct a paper-based feasibility study to identify an Electronic Software Distribution tool or service.
http://flevy.com/browse/business-document/Feasibility-Study-Template-for-Electronic-Software-Distribution-32
Feasibility Study Template for Electronic Software Distribution
1. Desktop Management Evaluation Checklist
No Feature Description
Weight
1-5
Rating
0-3
Rank Comments
Rating
1-3
Rank Comments
1
Supports Disconnected
Users
Mobile workforce able to be managed through single
solution. Efficiently and reliably manages dial-up
employees. Reduces the many help desk calls
generated by mobile staff.
5
2 Byte Level Differencing
Eliminates need to send entire application over and
over. Greatly reduced update times. Increases quality
of service.
5
3 File Level Differencing Greatly reduces update times. 5
4 Bandwidth Throttling
Defines how much bandwidth should be used for
software distributions ensuring the network is not
crippled during a large update. Increases end user
experience by allowing user to continue working on
other tasks during package transmission.
5
5 Compression Reduces transport time. (Compression ratio) 3
6 Checkpoint Restart
Ensures applications are received in their entirety on
endpoint without having to restart a deployment.
Reduces administrative tasks and costs.
5
Mobility Sub Total
7 Brand Client Agent
Ability to add corporate logo and corporate syntax to
client agent. Ability to customize "look and feel" of
endpoint. Increases user comfort level. Increases
usability.
1
8 User Interface/GUI
Familiar Web based style user interface/Easy to use
graphical user interface
5
9 End user Support built-in end user HELP support 2
Usability Sub Total
10 Intelligent Targeting
Assign applications to relevant users, groups and
machines. Ability to define targets according to
inventory results. Dynamically target based upon
current endpoint characteristics.
5
11
Targeting based on user id
or group association
Ability to assign applications to users or groups who
require the application. (Required effective database
management - AD & User Registration systems)
5
12
Targeting based on
machine characteristics
Ability to assign applications to machines that require
the application as part of the machine profile.
(Required effective database management - AD & User
Registration systems) (eg: CompaqSoftpaq)
5
13 LDAP/AD Compliant
Ability to target based upon existing users and groups.
(Identify ownership of workstation based on user)
4
14 Subscription States
Policies enforced at endpoint. Ability to make
applications available, install applications, delete
applications from a users machine. Ability to stage
application on endpoint for later installation.
1
15 Automated Entitlement
Applications installed automatically upon inclusion in
target group. Once application assigned to a specific
profile, those users receive applications automatically.
(on going process - automatic updates as part of the
membership to a group) (eg: Project, Access, Visio
license).
5
16 Centrally Managed Policies
Define, distribute, and enforce application subscription
policies for entire user communities. Ability to assign
an Accounting application to anyone in accounting
department. As members of the department change,
no need to change subscription policies. Able to direct
applications to users who require it.
5
17
Delegated administrative
roles
Delegate ongoing administration of subscription
policies to individual administrators. Delegate
application administration to those IT departments
responsible for a set of endpoints.
3
Entitlement Sub Total
18 Intelligent Pull Technology
Ensures all endpoints receive latest updates regardless
of the current state of the machine. Reliably deploy all
packages to endpoints on a scheduled basis.
4
19 HTTP/HTTPS
Reliable, public protocol. Internet transmission
capabilities. Communicating over TCP/IP implies no
changes in existing infrastructure. Ability to
communicate over secured protocol.
2
20
Configurable Network Ports
Used for Delivery
Enables communication through firewall port settings.
Configuration flexibility. Corporate standards may be
applied.
4
21
Supported Platforms
Compliant with Company
Standards
Existing hardware infrastructure supported. (Windows
2000 desktops/Server,
5
22
Paltform - Novell File &
Print
Existing hardware infrastructure supported. Ability to
distribute package directly to a Novell Share.
3
23 Self-Updating Client Agent
Update Change Management software using same
Change Management tool.
5
24
Management Service
Provider (outsourced).
Management Service Provider (outsourced). 2
25 Modular Architecture
Add functionality as business expands. Eliminate
purchase of unnecessary functionality. Decreases total
cost of ownership.
5
26
Large number of endpoints
supported
Ability to support thousands of simultaneous endpoints
efficiently and cost effectively. (3000 to 5000
simultaneous endpoints with scalability to 30000 over
all population)
5
4. Infrastructure
Product 1 Product 2
1. Mobility
2. Usability
3. Entitlement
Page 1 ESD Feasibility Study Template
2. Desktop Management Evaluation Checklist
No Feature Description
Weight
1-5
Rating
0-3
Rank Comments
Rating
1-3
Rank Comments
Product 1 Product 2
27
Fan Out Distribution
(Repeaters)
Provides mechanism for serving many endpoints from
more than one server. Off loads processing from
primary server. Minimizes WAN traffic.
5
28
Load Balancing Servers
(Mirrors)
Efficiently support large numbers of endpoints.
Provides disaster recovery or backup mechanism.
Fault tolerant infrastructure.
5
29
Caching Capabilities
(Proxies)
Intelligently caches most frequently accessed
applications giving the ability to serve information
locally.
3
30 Scale as needed
Ability to scale as business and implementation expand
without cumbersome architecture re-work. Enables
architectural flexibility.
3
31
Addressing user with
multiple machines
how do we know which one is production machine? 4
32
Client agent
configuration/Nearest
Server Auto Detection
How do you configure client agent to access a local
server? How does the client auto configures for the
nearest available distribution point?
5
Infrastructure Sub Total
33 Centralized Logging
Logs collected in open database. Ability to create
custom reports based on log entries and information
important to our organization. Ability to filter on error
codes or severity levels will reduce time to debug
failures and proactively fix problems. Increases quality
of service.
4
34 Activity Reporting
Reports on all system activity including traffic reports,
summary reports, resource consumption reports, and
application version reports by endpoint. Increases
environmental understanding.
5
35 Role Based Administration
Administrators may be assigned control over a certain
set of tasks based on their responsibilities and skill
level.
3
36 Compliancy Reports Able to generate compliancy reports on demand 5
37 Installation stats able to generate installation statistics 5
Reporting Sub Total
38 Package Segmentation
Ability to manage all operating system environments
through one solution. Tool automatically detects
proper package to distribute for endpoint operating
system or endpoint language. Ability to distribute multi-
language and multi-operating system (Windows 2000
desktops/servers ) packages.
4
39 Packaging Flexibility
Ability to package applications for distribution, shrink-
wrap/third party applications, custom or in-house
applications, service packs, Java, Visual Basic, MSI or
file packages. Ensures any application may be
managed through the solution.
2
40 MSI Compliant
Provides patch and transform management. Controls
windows installer policies. Logs all MSI installer
actions. Adds value to MSI packaging. Makes MSI
management feasible. Import
2
41 Package Editing
Ensures package contents are exactly as desired
without having to repackage.
2
42 Windows Platform Support
Delivery of applications and content to Windows
platforms available.
5
Packaging Sub Total
43
Central Management
Capabilities/Remote
Administration of Endpoint
Agent
All endpoints may be manipulated using a central
management console. Central administration over
packages, entitlement, and remote endpoints.
Remotely administer endpoints. Install applications,
repair applications or uninstall applications from a
single management console. Reduces administrative
tasks. Reduces support/help desk calls.
5
44
Remote Administration of
Server Components
Ability to manage system from a single console. Ability
to run servers in a "lights out" environment.
1
45 LDAP/AD Compliant
Administration roles may be assigned using existing
users and group associations saving administrative
time.
4
46 Command Line
Allows simplistic job mimicking. Enables multiple
deployment objects to be quickly created.
1
47
Easy-to-Use Graphical
Interface
Consistent easy to use interface across product
functionality. Online help available and extensive.
4
48
Comprehensive Endpoint
Management
Manage all facets of user environment including
operating system patches, service packs, registry
entries, .ini files, configuration files, environment
variables, and applications.
2
49
Multiple Installation
Methods
Configurable user interaction. May distribute packages
in silent, semi-silent or fully interactive mode.
4
50 Publish and Subscribe
Deliver applications to users who are authorized to use
the application by sampling publishing the application.
Changes to applications are automatically downloaded
to users of the application. Ensures corporate desktop
standards are followed.
4
51
Automatic Scheduled
Updates
Endpoints automatically check-in to receive latest
updates. No end user or administrative intervention
required. (Client agent)
4
52 On Demand Installation
Users able to pull applications on demand from an
easy to use web interface. Authorization based upon
user characteristics.
4
53 Easily Repeat Deployments
Once a deployment is defined; run the deployment
according to schedule with no manual intervention. (re-
install)
2
5. Reporting
6. Packaging
7. Administration
Page 2 ESD Feasibility Study Template
3. Desktop Management Evaluation Checklist
No Feature Description
Weight
1-5
Rating
0-3
Rank Comments
Rating
1-3
Rank Comments
Product 1 Product 2
54 Package Prerequisites
Determines if sufficient resources available or package
dependencies exist on target before installation.
2
55 Uninstall Applications
Remove superfluous applications on endpoints.either
installed by product or external. Ability to manage
application lifecycle.
2
56 Pre-Install Scripting ability to assess and modify machine state 2
57 Post-Install Scripting
Power to manage processing that must occur after a
task is performed such as clean-up procedures.
2
58 Rollback
If a problem exists with a deployment, rollback
capability increases quality of service and decreases
administrative costs. (Vendor limitations apply) (Native
& non-native)
2
59 Verify/Repair
Ensures applications are intact on endpoints.
Increases endpoint availability. Decreases time to
diagnose and fix problems. Reduces help desk calls.
(vendor limitations apply)
2
Administration Sub Total
60 Encryption Security Requirements. Administrative Security. 5
Security Sub Total
61 Support Procedures
Reliable, helpful support team. Flexible support
packages offered.
3
62
Professional Services
Available
Involvement of Professional Services may decrease
time to market for distribution product. Ensures best
practices followed during implementation.
3
63
Implementation &
methodology Timeframe
Ability to easily implement the solution in a desirable
and accomplishable time frame. 3 to 6 months
3
64 Comprehensive Training
Ensures all staff are knowledgeable and comfortable
performing daily tasks. Decrease time to market.
Decreases total cost of ownership.
3
65 On-going support provide on-going support 3
Implementation & Support
Sub Total
66 WMI Compliant
Based on latest standards. All available machine
information collected. (if BIOS info is blank (like make
or serial number), how is the info collected?)
5
67
Hardware Information
Gathered
Comprehensive understanding of owned hardware
assets. Enables companies to proactively upgrade or
replace hardware. Identifies hardware eligible for lease
renewal.
5
68
Software Information
Gathered
Essential to understanding machine environment.
Provides ability to look at 'snap shot' of the machine
characteristics. Reports information used for license
compliance. Physical Software inventory, registry
check or Add Remore programs
5
69 Open Database as Target
Open published database schema allows for
customized reporting. Inventory information is
available to anyone having database access.
5
70
Reporting from Inventory
Database Available
Easily generate information on machines within your
domain. Ability to integrate information with asset
management system.
4
71
Non-Intrusive Inventory
Scan
Initial scan accomplished in less than two minutes;
subsequent scans performed in seconds. Does not
interfere with machine processing. Transparent to end
user. Store and forward or connection dependent.
Subsequent scans only sends delta
5
72 Customizable
Accommodates collection of custom IT asset
information. Ability to extend inventory information
collected to include information important to
organization.
3
73
Schedule Inventory
Collection
Ability to schedule inventory collection on demand 4
Inventory Sub Total
74
SW Pricing Structure
(License + Maintenance)
Licence for 20,000 users + 1 year maintenance +
11. Pricing
8. Security
9. Implementation & Support
10. Inventory
Page 3 ESD Feasibility Study Template