SlideShare a Scribd company logo
Lessons learned: Outsourcing managed network services
Driven by financialneeds, a competitive managed services market, enhanced remote netw orkmanagement tools and
demanding business requirements, organizations are increasingly delegating controlof their netw ork -- including carrier
services and service management -- to third-party providers.
The potential benefits of implementing fully outsourced managed services include reduced cost of ownership (COO), accessto
externalexpertise/intellectualproperty, improved operationalperformance and abstracted management. A holistic outsourced
model can also allow organizations to better allocate internal resources on strategic projects and core businessactivities.
How ever, relinquishing end-to-end responsibility for the netw orkinfrastructure without systematically addressing the service
delivery model exposes the organization to significant financial, operational and strategic risks. To mitigate these risks and
maximize results, organizations should consider the follow ing best practices:
1. Simplify the process for provider and service tower termination. First, structure the contract with minimal bundling so
specific services can be terminated w ithout impacting others. For example, in a recent project involving an offshore provider,
the contract was designed with separate service towers, e.g., Managed Router Services, Netw orkSupport Services (LAN,
telephony, w ireless infrastructure), Dedicated on-site support, Data Center Management Services and Contact Center
Management Services.
Second, retain broad rights for termination for cause, and allow for termination due to provider performance issues.
Third, establish specific termination processesduring contract negotiations and build them into the agreement. Explicitly
address all aspects of termination, including termination-related charges, provider wind-down support, providerobligations after
termination, and the transfer of assets(equipment, software), contracts and even provider personnel. It is alw ays best to
negotiate termination details w hile you still have leverage (i.e., before the contract is signed), as it w illmake termination easier
w ith fewer costsand operational/legaldifficulties. Waiting to negotiate these terms until you're seriously contemplating or
initiating termination is too late as the provider w illlikely be less disposed to cooperate.
Know ing that w ell-defined termination processes are in place w ith service towersthat can be peeled off (reducing provider
revenue) makes termination a more effective and credible stickto use if the provider is not performing.
2. Establish clear SLAs with credits defined in the contract. SLAs should ramp up based on the service issue duration,
severity and number of defaults. Additionally, they should have both financialand non-financialremedies requiring:
• Rapid escalation processesto the provider's senior/executive management levels.
• Formal quarterly and annual review swith the provider's executive management level.
• Root cause analysis for every "Severity 1" incident.
• Detailed remediation plans.
• Performance improvement plans.
• New customer reference everysix months.
To enforce SLAs, the enterprise must dedicate internal resources to monitor provider performance (i.e., IT provider
management), address defaults, and consistently escalate chronic issues using predefined processesto hold the provider
accountable. [Also read: "Cloud computing and the truth about SLAs"]
3. Avoid pushing too hard on price to the exclusionof all else. Aspricing decreasesbelow an appropriate level, the overall
service and provider relationship becomes less tenable, risking inflexibility and "w orkto rule," substandard resource
assignment, and a poor overall experience. Squeezing the provider too hard on price creates the riskof having the provider
look for opportunities to gain back margins after the contract is signed. For example, they may eliminate promised resources,
sw ap dedicated/on-site roles for cheapershared/off-site resources (e.g., project management), or persistently demand change
orders for services not explicitly covered by the contract.
Still, if cost reduction is the main driver and a company plans to push hard during price negotiations, it w illneed to establish
provider management once the deal is done to strictly enforce SLAsand monitor performance; otherwise it can expect "nickel-
and-diming" and performance erosion fromproviders.
4. Engage vendor management early and throughoutthe engagement. In general, vendor management involves
delivering:
• Support in developing sourcing/termination strategies.
• Contract management (T&C/SLA/KPI compliance, performance reviews).
• Customer-vendor relationship management (fromonboarding to divesting).
• Financial management.
• Risk management.
With fully outsourced agreements, organizations are highly dependent on the provider and the quality of service delivery. Still,
companies often underestimate the value of vendor management. As a result, investment in and commitment to this critical
function is frequently lacking w ith the consequence being poor service delivery, chronic service issues, misallocation of
financialresources and unhappy users.
Keeping vendor management involved during each step of the sourcing/contracting processis essentialgiven their vital role in
managing provider performance and value creation during the contract term. This includes involving them in sourcing and
termination strategies before starting down the road to a fully outsourced network.
5. Think operationally when developingyour sourcingstrategy and negotiatingthe agreement. For example, document
the lifecycle of a circuit/service fromordering to expiration/termination, including every permutation (escalations, early
cancelation, non-acceptance, poor performance); then, askthe provider to identify and confirmtime frames for each process
step.
Keep in mind that not all process steps are necessarily key performance indicators (KPIs), nor must they carry financialcredits.
How ever, allsteps should be clearly documented in the contract. Formally documenting and monitoring KPIs w illencourage
provider performance and keep each process step moving. Of course, this chain of events is only as good as its w eakest link,
and the provider w illlikely exploit any action w ithout an explicit and w ell-documented KPI to "pad" the other process time
frames.
6. Maintain internal ownership of IT network architecture/design services. Ownership of these operationalfunctions better
positions IT to align the netw orkwith businessrequirements. Further, ownership builds criticalinternalexpertise that can aid
w ith networkand processoptimization, infrastructure refresh decisionsand, if needed, support the transition of the netw ork and
managed services to another provider.
Finding the right balance betw een leveraging the provider's resources/expertise while developing institutionalknow ledge may
be difficult, but it can be accomplished, for example, by assigning IT responsibility for managing documentation requirements
(e.g., as builts, configuration, netw orkdiagrams), negotiating the ability to hire provider staff assigned to the account, or
requiring asset transfer at contract termination.
7. Carefully consider assetownership. Fully outsourced deals historically use an "asset-heavy" modelw herein asset
ow nership is either transferred by the customer to the provider or provided directly by the provider. This model is leveraged by
both customer and provider for many reasons, including:
• One-time cash payment fromprovider to customer for existing assets.
• Reduced capital funding in favor of operating expenditures.
• Predictable cost streamand improved return on asset (ROA).
• Eliminates need for separate maintenance agreements; fewer providers may simplify provider management.
• Provider organizational scale/expertise/remote tools to drive ongoing operationalefficiencies and cost reductions.
• CPE capacity planning responsibility assumed by provider (e.g., if circuit upgrade requires router upgrade).
• Providers encourage it -- asset ow nership is a perfect way to create "stickiness"; once the provider services are in place, the
effort/cost to take backasset ow nership is perceived by the customer (correctly or not) to be prohibitive.
Despite these benefits, there is a grow ing preference foran asset-light model because of alternative lease-backfinancing,
w hich allow san organization to ow n the asset without significant capitaloutlay or giving up asset control. Further, improvement
in remote infrastructure management (RIM) tools and virtualization technologies mean customers can more easily deploy and
use these technologies. These enhanced RIM tools also allow offshore providersto compete more effectivelyagainst onshore
providers. [Also read: "Pros, cons of remote infrastructure management"]
If asset ow nership is the provider's responsibility, asset refresh commitments by the provider must be established during
contract negotiations. Keeping criticalIT assets current during contract termis an important to include in the finalagreement.
Additionally, companies should restrict the provider frompurchasing or leasing assets fromits affiliates or subsidiaries; s uch
relationships can obscure the underlying cost of assets, limit visibility into asset inventories and services billing, and make
service termination more difficult.
Ultimately, the pros and cons of asset ow nership must be carefully w eighed by both IT and finance to determine w hich asset
model makes the most sense.
8. Bundle transport services or negotiate a separate transportagreement? Bundling transport with the managed services
has the upside of giving responsibility for these time-consuming tasks to externalparties (e.g., orders, disconnects, billing
management, troubleshooting). Transport contract negotiations are also avoided w ith "only" the managed services contract to
w orryabout.
The dow nside? Bundling transport w ith managed servicesmeans carrier costs are no longer transparent. Cost visibility and
financialcontrolare diminished as transport billing becomes a lump-charge on the managed service invoice.
In addition, bundling often means the IT organization becomes further removed fromnetw orkservices. Asa result, internal
expertise about transport erodes further, thereby increasing IT's dependence on the provider. As with ownership of IT netw ork
architecture/design, maintaining an intimate know ledge of the netw orkis criticalto delivering real value to the business units.
9. Plan extensively before migratingto a fully outsourced environment. Numerous activities must take place before
executing the plan. In-depth discussions with the business units are needed to understand their requirements and future plans.
Developing detailed site migration schedules, financialmanagement processes, data center/site readinessplans, resource
plans, communication plans and process management (incident, problem, change, asset management, etc.) must be ready
before rolling out managed services.
Ongoing real estate activity, including pending M&A, must be understood and factored into the migration plan. Transition to a
fully outsourced model requires significant planning to properly execute by both the enterprise and provider partner(s)for the
ramp-up (and as needed w ind-down)to a 100% outsourced environment.
Migrating criticalIT netw orkinfrastructure and servicesto a fully outsourced environment is complex and risky but also has the
potential for significant cost and efficiencybenefits. Mitigating the risks requires preparing for and looking beyond the sourcing
event by developing a sound sourcing strategy, negotiating strong, flexible contract terms, having appropriate provider
management, and continuous involvement by IT. By taking these steps, organizations can help ensure the managed services
provider delivers realvalue to their business and customers.
Source : Netw orkworld
Recommended By Rick Moreno, GLOBAL INFORMATION TECHNOLOGY DIRECTOR, AT&T
Netw orkManagement / Managed Services / Outsourcing / IT Infrastructure
rick.moreno2015@gmail.com
rick (dot) moreno2015 (at) gmail (dot) com
https://www.linkedin.com/pub/rick-moreno/6/79a/850

More Related Content

What's hot

ITIL Service Level Agreement Template
ITIL Service Level Agreement TemplateITIL Service Level Agreement Template
ITIL Service Level Agreement Template
Flevy.com Best Practices
 
April Service Level Management ITSM Share-and-Learn slides
April Service Level Management ITSM Share-and-Learn slidesApril Service Level Management ITSM Share-and-Learn slides
April Service Level Management ITSM Share-and-Learn slides
University ITSM
 
Service Level Agreement Template
Service Level Agreement TemplateService Level Agreement Template
Service Level Agreement Template
Demand Metric
 
Software Maintenance & Support Rationalization
Software Maintenance & Support RationalizationSoftware Maintenance & Support Rationalization
Software Maintenance & Support Rationalization
Flexera
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8Karthik Arumugham
 
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
Optimus BT
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level Agreement
KHNOG
 
ITIL V3 And Service Transition - ITSM Academy Webinar
ITIL V3 And Service Transition - ITSM Academy Webinar ITIL V3 And Service Transition - ITSM Academy Webinar
ITIL V3 And Service Transition - ITSM Academy Webinar
ITSM Academy, Inc.
 
IT outsourcing transformation
IT outsourcing transformation IT outsourcing transformation
IT outsourcing transformation
WGroup
 
Service level management
Service level managementService level management
Service level management
Yasir Karam
 
Finance Effectiveness Efficiency
Finance Effectiveness EfficiencyFinance Effectiveness Efficiency
Finance Effectiveness Efficiency
IMC Group
 
Itil v3 foundation study guide service transition
Itil v3 foundation study guide   service transitionItil v3 foundation study guide   service transition
Itil v3 foundation study guide service transition
Muhammad Zamzani
 
Service level management
Service level managementService level management
Service level management
ahmad abdelhafeez
 
Kinetic Data White Paper, Divide And Conquer To Accelerate Client Transitions
Kinetic Data White Paper, Divide And Conquer To Accelerate Client TransitionsKinetic Data White Paper, Divide And Conquer To Accelerate Client Transitions
Kinetic Data White Paper, Divide And Conquer To Accelerate Client Transitions
brettnorgaard
 
Service level agreement presentation
Service level agreement presentationService level agreement presentation
Service level agreement presentation
Ashimolowo Tomi
 
Addressing Contract Management Needs with SharePoint
Addressing Contract Management Needs with SharePointAddressing Contract Management Needs with SharePoint
Addressing Contract Management Needs with SharePoint
Optimus BT
 
Service Level Management PowerPoint Presentation Slides
Service Level Management PowerPoint Presentation SlidesService Level Management PowerPoint Presentation Slides
Service Level Management PowerPoint Presentation Slides
SlideTeam
 
Manage Rapid Changes and Exceed Service Levels
Manage Rapid Changes and Exceed Service LevelsManage Rapid Changes and Exceed Service Levels
Manage Rapid Changes and Exceed Service LevelsDavid Messineo
 
Managing Contracts with SharePoint
Managing Contracts with SharePointManaging Contracts with SharePoint
Managing Contracts with SharePoint
Ram Prabhala
 
Sla ola
Sla olaSla ola

What's hot (20)

ITIL Service Level Agreement Template
ITIL Service Level Agreement TemplateITIL Service Level Agreement Template
ITIL Service Level Agreement Template
 
April Service Level Management ITSM Share-and-Learn slides
April Service Level Management ITSM Share-and-Learn slidesApril Service Level Management ITSM Share-and-Learn slides
April Service Level Management ITSM Share-and-Learn slides
 
Service Level Agreement Template
Service Level Agreement TemplateService Level Agreement Template
Service Level Agreement Template
 
Software Maintenance & Support Rationalization
Software Maintenance & Support RationalizationSoftware Maintenance & Support Rationalization
Software Maintenance & Support Rationalization
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8
 
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level Agreement
 
ITIL V3 And Service Transition - ITSM Academy Webinar
ITIL V3 And Service Transition - ITSM Academy Webinar ITIL V3 And Service Transition - ITSM Academy Webinar
ITIL V3 And Service Transition - ITSM Academy Webinar
 
IT outsourcing transformation
IT outsourcing transformation IT outsourcing transformation
IT outsourcing transformation
 
Service level management
Service level managementService level management
Service level management
 
Finance Effectiveness Efficiency
Finance Effectiveness EfficiencyFinance Effectiveness Efficiency
Finance Effectiveness Efficiency
 
Itil v3 foundation study guide service transition
Itil v3 foundation study guide   service transitionItil v3 foundation study guide   service transition
Itil v3 foundation study guide service transition
 
Service level management
Service level managementService level management
Service level management
 
Kinetic Data White Paper, Divide And Conquer To Accelerate Client Transitions
Kinetic Data White Paper, Divide And Conquer To Accelerate Client TransitionsKinetic Data White Paper, Divide And Conquer To Accelerate Client Transitions
Kinetic Data White Paper, Divide And Conquer To Accelerate Client Transitions
 
Service level agreement presentation
Service level agreement presentationService level agreement presentation
Service level agreement presentation
 
Addressing Contract Management Needs with SharePoint
Addressing Contract Management Needs with SharePointAddressing Contract Management Needs with SharePoint
Addressing Contract Management Needs with SharePoint
 
Service Level Management PowerPoint Presentation Slides
Service Level Management PowerPoint Presentation SlidesService Level Management PowerPoint Presentation Slides
Service Level Management PowerPoint Presentation Slides
 
Manage Rapid Changes and Exceed Service Levels
Manage Rapid Changes and Exceed Service LevelsManage Rapid Changes and Exceed Service Levels
Manage Rapid Changes and Exceed Service Levels
 
Managing Contracts with SharePoint
Managing Contracts with SharePointManaging Contracts with SharePoint
Managing Contracts with SharePoint
 
Sla ola
Sla olaSla ola
Sla ola
 

Viewers also liked

الكريم حصة Copy
الكريم حصة   Copyالكريم حصة   Copy
الكريم حصة Copy
Feda Nahawi
 
Walmart amp logos
Walmart amp logosWalmart amp logos
Walmart amp logos
samdonato
 
Curriculum Vitae - C. Ferreira
Curriculum Vitae - C. FerreiraCurriculum Vitae - C. Ferreira
Curriculum Vitae - C. FerreiraCameron Ferreira
 
The key points to start a startup
The key points to start a startupThe key points to start a startup
The key points to start a startup
julovesnewstuff
 
Better burger
Better burgerBetter burger
Better burger
mark0980
 
Walmart amp logos
Walmart amp logosWalmart amp logos
Walmart amp logos
samdonato
 
Doc May 3, 2016, 7-22 PM
Doc May 3, 2016, 7-22 PMDoc May 3, 2016, 7-22 PM
Doc May 3, 2016, 7-22 PMinfas ahamed
 
Better burger
Better burgerBetter burger
Better burger
mark0980
 
الكريم حصة Copy
الكريم حصة   Copyالكريم حصة   Copy
الكريم حصة Copy
Feda Nahawi
 

Viewers also liked (13)

cv
cvcv
cv
 
الكريم حصة Copy
الكريم حصة   Copyالكريم حصة   Copy
الكريم حصة Copy
 
Walmart amp logos
Walmart amp logosWalmart amp logos
Walmart amp logos
 
Curriculum Vitae - C. Ferreira
Curriculum Vitae - C. FerreiraCurriculum Vitae - C. Ferreira
Curriculum Vitae - C. Ferreira
 
SEPSIS(1)
SEPSIS(1)SEPSIS(1)
SEPSIS(1)
 
The key points to start a startup
The key points to start a startupThe key points to start a startup
The key points to start a startup
 
Better burger
Better burgerBetter burger
Better burger
 
Redbull 140326120029-phpapp01
Redbull 140326120029-phpapp01Redbull 140326120029-phpapp01
Redbull 140326120029-phpapp01
 
Walmart amp logos
Walmart amp logosWalmart amp logos
Walmart amp logos
 
Doc May 3, 2016, 7-22 PM
Doc May 3, 2016, 7-22 PMDoc May 3, 2016, 7-22 PM
Doc May 3, 2016, 7-22 PM
 
Better burger
Better burgerBetter burger
Better burger
 
الكريم حصة Copy
الكريم حصة   Copyالكريم حصة   Copy
الكريم حصة Copy
 
SEPSIS(1)
SEPSIS(1)SEPSIS(1)
SEPSIS(1)
 

Similar to Lessons learned

Multi-supplier governance
Multi-supplier governance Multi-supplier governance
Multi-supplier governance
WGroup
 
Outsourcing - Reza Hagel CPO & Principle
Outsourcing - Reza Hagel CPO & PrincipleOutsourcing - Reza Hagel CPO & Principle
Outsourcing - Reza Hagel CPO & Principle
Reza Hagel - CHIEF PROCUREMENT OFFICER
 
Unit 1 chap4 it service management
Unit 1 chap4 it service managementUnit 1 chap4 it service management
Unit 1 chap4 it service management
MusTufa Nullwala
 
Regulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsRegulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and Models
Paul Kuiken
 
Comprehensive infrastructure outsourcing
Comprehensive infrastructure outsourcingComprehensive infrastructure outsourcing
Comprehensive infrastructure outsourcing
WGroup
 
17. Process: ocp cfops integration
17. Process: ocp cfops integration17. Process: ocp cfops integration
17. Process: ocp cfops integration
ssusereb347d
 
HCLT Whitepaper: IT Outsourcing Transformation
HCLT Whitepaper: IT Outsourcing Transformation HCLT Whitepaper: IT Outsourcing Transformation
HCLT Whitepaper: IT Outsourcing Transformation
HCL Technologies
 
Five ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contractFive ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contract
WGroup
 
Mortgage LOS Implementation: A Roadmap for Sustainability
Mortgage LOS Implementation: A Roadmap for SustainabilityMortgage LOS Implementation: A Roadmap for Sustainability
Mortgage LOS Implementation: A Roadmap for Sustainability
Cognizant
 
ISHIR White Paper - It is Time to Switch Your Offshore Outsourcing Vendor
ISHIR White Paper - It is Time to Switch Your Offshore Outsourcing VendorISHIR White Paper - It is Time to Switch Your Offshore Outsourcing Vendor
ISHIR White Paper - It is Time to Switch Your Offshore Outsourcing Vendor
ISHIR
 
Order To Cash for Services Business
Order To Cash for Services BusinessOrder To Cash for Services Business
Order To Cash for Services Business
Naresh Lamba
 
Legal Transformation and Contract Remediation
Legal Transformation and Contract RemediationLegal Transformation and Contract Remediation
Legal Transformation and Contract Remediation
accenture
 
3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedIn3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedInScott Leydin
 
Post Award Contract Management for IT Suppliers v1.0 20200701
Post Award Contract Management for IT Suppliers v1.0 20200701Post Award Contract Management for IT Suppliers v1.0 20200701
Post Award Contract Management for IT Suppliers v1.0 20200701
Peter Soetevent
 
Application sourcing focused on value, not cost alone
Application sourcing focused on value, not cost aloneApplication sourcing focused on value, not cost alone
Application sourcing focused on value, not cost alone
WGroup
 
Open Policy Control Platforms
Open Policy Control PlatformsOpen Policy Control Platforms
Open Policy Control PlatformsComputaris
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor managementRaminder Pal Singh
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure managementShoaib Patel
 
IT outsourcing renegotiation
IT outsourcing renegotiationIT outsourcing renegotiation
IT outsourcing renegotiation
WGroup
 

Similar to Lessons learned (20)

Multi-supplier governance
Multi-supplier governance Multi-supplier governance
Multi-supplier governance
 
Outsourcing - Reza Hagel CPO & Principle
Outsourcing - Reza Hagel CPO & PrincipleOutsourcing - Reza Hagel CPO & Principle
Outsourcing - Reza Hagel CPO & Principle
 
Unit 1 chap4 it service management
Unit 1 chap4 it service managementUnit 1 chap4 it service management
Unit 1 chap4 it service management
 
Regulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsRegulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and Models
 
Comprehensive infrastructure outsourcing
Comprehensive infrastructure outsourcingComprehensive infrastructure outsourcing
Comprehensive infrastructure outsourcing
 
17. Process: ocp cfops integration
17. Process: ocp cfops integration17. Process: ocp cfops integration
17. Process: ocp cfops integration
 
HCLT Whitepaper: IT Outsourcing Transformation
HCLT Whitepaper: IT Outsourcing Transformation HCLT Whitepaper: IT Outsourcing Transformation
HCLT Whitepaper: IT Outsourcing Transformation
 
Five ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contractFive ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contract
 
Mortgage LOS Implementation: A Roadmap for Sustainability
Mortgage LOS Implementation: A Roadmap for SustainabilityMortgage LOS Implementation: A Roadmap for Sustainability
Mortgage LOS Implementation: A Roadmap for Sustainability
 
ISHIR White Paper - It is Time to Switch Your Offshore Outsourcing Vendor
ISHIR White Paper - It is Time to Switch Your Offshore Outsourcing VendorISHIR White Paper - It is Time to Switch Your Offshore Outsourcing Vendor
ISHIR White Paper - It is Time to Switch Your Offshore Outsourcing Vendor
 
Order To Cash for Services Business
Order To Cash for Services BusinessOrder To Cash for Services Business
Order To Cash for Services Business
 
Legal Transformation and Contract Remediation
Legal Transformation and Contract RemediationLegal Transformation and Contract Remediation
Legal Transformation and Contract Remediation
 
3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedIn3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedIn
 
Post Award Contract Management for IT Suppliers v1.0 20200701
Post Award Contract Management for IT Suppliers v1.0 20200701Post Award Contract Management for IT Suppliers v1.0 20200701
Post Award Contract Management for IT Suppliers v1.0 20200701
 
Application sourcing focused on value, not cost alone
Application sourcing focused on value, not cost aloneApplication sourcing focused on value, not cost alone
Application sourcing focused on value, not cost alone
 
Open Policy Control Platforms
Open Policy Control PlatformsOpen Policy Control Platforms
Open Policy Control Platforms
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor management
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure management
 
IT outsourcing renegotiation
IT outsourcing renegotiationIT outsourcing renegotiation
IT outsourcing renegotiation
 
wn Managed Hosting Final.SP
wn Managed Hosting Final.SPwn Managed Hosting Final.SP
wn Managed Hosting Final.SP
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Lessons learned

  • 1. Lessons learned: Outsourcing managed network services Driven by financialneeds, a competitive managed services market, enhanced remote netw orkmanagement tools and demanding business requirements, organizations are increasingly delegating controlof their netw ork -- including carrier services and service management -- to third-party providers. The potential benefits of implementing fully outsourced managed services include reduced cost of ownership (COO), accessto externalexpertise/intellectualproperty, improved operationalperformance and abstracted management. A holistic outsourced model can also allow organizations to better allocate internal resources on strategic projects and core businessactivities. How ever, relinquishing end-to-end responsibility for the netw orkinfrastructure without systematically addressing the service delivery model exposes the organization to significant financial, operational and strategic risks. To mitigate these risks and maximize results, organizations should consider the follow ing best practices: 1. Simplify the process for provider and service tower termination. First, structure the contract with minimal bundling so specific services can be terminated w ithout impacting others. For example, in a recent project involving an offshore provider, the contract was designed with separate service towers, e.g., Managed Router Services, Netw orkSupport Services (LAN, telephony, w ireless infrastructure), Dedicated on-site support, Data Center Management Services and Contact Center Management Services. Second, retain broad rights for termination for cause, and allow for termination due to provider performance issues. Third, establish specific termination processesduring contract negotiations and build them into the agreement. Explicitly address all aspects of termination, including termination-related charges, provider wind-down support, providerobligations after termination, and the transfer of assets(equipment, software), contracts and even provider personnel. It is alw ays best to negotiate termination details w hile you still have leverage (i.e., before the contract is signed), as it w illmake termination easier w ith fewer costsand operational/legaldifficulties. Waiting to negotiate these terms until you're seriously contemplating or initiating termination is too late as the provider w illlikely be less disposed to cooperate. Know ing that w ell-defined termination processes are in place w ith service towersthat can be peeled off (reducing provider revenue) makes termination a more effective and credible stickto use if the provider is not performing. 2. Establish clear SLAs with credits defined in the contract. SLAs should ramp up based on the service issue duration, severity and number of defaults. Additionally, they should have both financialand non-financialremedies requiring: • Rapid escalation processesto the provider's senior/executive management levels. • Formal quarterly and annual review swith the provider's executive management level. • Root cause analysis for every "Severity 1" incident. • Detailed remediation plans. • Performance improvement plans. • New customer reference everysix months. To enforce SLAs, the enterprise must dedicate internal resources to monitor provider performance (i.e., IT provider management), address defaults, and consistently escalate chronic issues using predefined processesto hold the provider accountable. [Also read: "Cloud computing and the truth about SLAs"] 3. Avoid pushing too hard on price to the exclusionof all else. Aspricing decreasesbelow an appropriate level, the overall service and provider relationship becomes less tenable, risking inflexibility and "w orkto rule," substandard resource assignment, and a poor overall experience. Squeezing the provider too hard on price creates the riskof having the provider look for opportunities to gain back margins after the contract is signed. For example, they may eliminate promised resources, sw ap dedicated/on-site roles for cheapershared/off-site resources (e.g., project management), or persistently demand change orders for services not explicitly covered by the contract. Still, if cost reduction is the main driver and a company plans to push hard during price negotiations, it w illneed to establish provider management once the deal is done to strictly enforce SLAsand monitor performance; otherwise it can expect "nickel- and-diming" and performance erosion fromproviders. 4. Engage vendor management early and throughoutthe engagement. In general, vendor management involves delivering: • Support in developing sourcing/termination strategies. • Contract management (T&C/SLA/KPI compliance, performance reviews). • Customer-vendor relationship management (fromonboarding to divesting). • Financial management. • Risk management. With fully outsourced agreements, organizations are highly dependent on the provider and the quality of service delivery. Still, companies often underestimate the value of vendor management. As a result, investment in and commitment to this critical function is frequently lacking w ith the consequence being poor service delivery, chronic service issues, misallocation of financialresources and unhappy users.
  • 2. Keeping vendor management involved during each step of the sourcing/contracting processis essentialgiven their vital role in managing provider performance and value creation during the contract term. This includes involving them in sourcing and termination strategies before starting down the road to a fully outsourced network. 5. Think operationally when developingyour sourcingstrategy and negotiatingthe agreement. For example, document the lifecycle of a circuit/service fromordering to expiration/termination, including every permutation (escalations, early cancelation, non-acceptance, poor performance); then, askthe provider to identify and confirmtime frames for each process step. Keep in mind that not all process steps are necessarily key performance indicators (KPIs), nor must they carry financialcredits. How ever, allsteps should be clearly documented in the contract. Formally documenting and monitoring KPIs w illencourage provider performance and keep each process step moving. Of course, this chain of events is only as good as its w eakest link, and the provider w illlikely exploit any action w ithout an explicit and w ell-documented KPI to "pad" the other process time frames. 6. Maintain internal ownership of IT network architecture/design services. Ownership of these operationalfunctions better positions IT to align the netw orkwith businessrequirements. Further, ownership builds criticalinternalexpertise that can aid w ith networkand processoptimization, infrastructure refresh decisionsand, if needed, support the transition of the netw ork and managed services to another provider. Finding the right balance betw een leveraging the provider's resources/expertise while developing institutionalknow ledge may be difficult, but it can be accomplished, for example, by assigning IT responsibility for managing documentation requirements (e.g., as builts, configuration, netw orkdiagrams), negotiating the ability to hire provider staff assigned to the account, or requiring asset transfer at contract termination. 7. Carefully consider assetownership. Fully outsourced deals historically use an "asset-heavy" modelw herein asset ow nership is either transferred by the customer to the provider or provided directly by the provider. This model is leveraged by both customer and provider for many reasons, including: • One-time cash payment fromprovider to customer for existing assets. • Reduced capital funding in favor of operating expenditures. • Predictable cost streamand improved return on asset (ROA). • Eliminates need for separate maintenance agreements; fewer providers may simplify provider management. • Provider organizational scale/expertise/remote tools to drive ongoing operationalefficiencies and cost reductions. • CPE capacity planning responsibility assumed by provider (e.g., if circuit upgrade requires router upgrade). • Providers encourage it -- asset ow nership is a perfect way to create "stickiness"; once the provider services are in place, the effort/cost to take backasset ow nership is perceived by the customer (correctly or not) to be prohibitive. Despite these benefits, there is a grow ing preference foran asset-light model because of alternative lease-backfinancing, w hich allow san organization to ow n the asset without significant capitaloutlay or giving up asset control. Further, improvement in remote infrastructure management (RIM) tools and virtualization technologies mean customers can more easily deploy and use these technologies. These enhanced RIM tools also allow offshore providersto compete more effectivelyagainst onshore providers. [Also read: "Pros, cons of remote infrastructure management"] If asset ow nership is the provider's responsibility, asset refresh commitments by the provider must be established during contract negotiations. Keeping criticalIT assets current during contract termis an important to include in the finalagreement. Additionally, companies should restrict the provider frompurchasing or leasing assets fromits affiliates or subsidiaries; s uch relationships can obscure the underlying cost of assets, limit visibility into asset inventories and services billing, and make service termination more difficult. Ultimately, the pros and cons of asset ow nership must be carefully w eighed by both IT and finance to determine w hich asset model makes the most sense. 8. Bundle transport services or negotiate a separate transportagreement? Bundling transport with the managed services has the upside of giving responsibility for these time-consuming tasks to externalparties (e.g., orders, disconnects, billing management, troubleshooting). Transport contract negotiations are also avoided w ith "only" the managed services contract to w orryabout. The dow nside? Bundling transport w ith managed servicesmeans carrier costs are no longer transparent. Cost visibility and financialcontrolare diminished as transport billing becomes a lump-charge on the managed service invoice. In addition, bundling often means the IT organization becomes further removed fromnetw orkservices. Asa result, internal expertise about transport erodes further, thereby increasing IT's dependence on the provider. As with ownership of IT netw ork architecture/design, maintaining an intimate know ledge of the netw orkis criticalto delivering real value to the business units. 9. Plan extensively before migratingto a fully outsourced environment. Numerous activities must take place before executing the plan. In-depth discussions with the business units are needed to understand their requirements and future plans. Developing detailed site migration schedules, financialmanagement processes, data center/site readinessplans, resource plans, communication plans and process management (incident, problem, change, asset management, etc.) must be ready before rolling out managed services. Ongoing real estate activity, including pending M&A, must be understood and factored into the migration plan. Transition to a fully outsourced model requires significant planning to properly execute by both the enterprise and provider partner(s)for the ramp-up (and as needed w ind-down)to a 100% outsourced environment.
  • 3. Migrating criticalIT netw orkinfrastructure and servicesto a fully outsourced environment is complex and risky but also has the potential for significant cost and efficiencybenefits. Mitigating the risks requires preparing for and looking beyond the sourcing event by developing a sound sourcing strategy, negotiating strong, flexible contract terms, having appropriate provider management, and continuous involvement by IT. By taking these steps, organizations can help ensure the managed services provider delivers realvalue to their business and customers. Source : Netw orkworld Recommended By Rick Moreno, GLOBAL INFORMATION TECHNOLOGY DIRECTOR, AT&T Netw orkManagement / Managed Services / Outsourcing / IT Infrastructure rick.moreno2015@gmail.com rick (dot) moreno2015 (at) gmail (dot) com https://www.linkedin.com/pub/rick-moreno/6/79a/850