In-demand Technology Skills
In-demand Technology Skills
Comprehending a Cloud Service Agreement (CSA) can be difficult. With the increasing clout of hyperscalers, buyers need to fully understand a CSA to effectively negotiate with cloud service providers. Learn how to better evaluate these contracts in this blog.
With the increased adoption of cloud services, Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure have come to dominate the public cloud space in recent years. The negotiating power of these hyperscalers has significantly increased, changing the dynamics of the CSA.
As the influence of cloud providers grows, customers need to carefully evaluate the proper terms and conditions in the CSA. First, let’s better understand the key terms:
The contract may be written according to the service delivery model selected, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or Software as a Service (SaaS). CSPs can modify their contract terms at any given time.
Based on our observations, many customers have difficulty understanding these contracts. With the growing portfolio of cloud services in every organization, understanding the nuances to better negotiate contracts with service providers is crucial.
Below is a practical reference to safeguard customers’ interests.
Ten Steps to Evaluate a Cloud Service Agreement
Driven by the increasing numbers of mobile workers during the pandemic, VDI implementation has rapidly grown as a secure solution that provides flexibility and cost savings. While it’s a good fit with today’s steadily growing remote workforce, VDI must be implemented properly to avoid pitfalls. Read on to learn the challenges and benefits of implementing a virtual desktop infrastructure.
Workplace infrastructure is quickly evolving. While Virtual Desktop Infrastructure (VDI) transformation has been in the industry for some time, COVID-19 has spurred its increased use to manage IT consumerization and control costs.
The benefits of implementing a virtual desktop infrastructure for enterprises can be remarkable and include easier accessibility for users, device flexibility, increased security, and lower costs. However, if not implemented correctly, VDI can bring organizational challenges. Many projects fail due to improper design leading to performance issues.
Based on our experiences helping organizations understand and optimize VDI implementation to achieve the right model for their budgets and timelines, we identified the following seven best practices:
There is clear intentionality as IT applications and infrastructure move to managed services, a shift that the global challenge to find talent across industries accelerated.
Pricing model asks are now moving from simple day rates to more complex pricing constructs, such as pricing for agile pods, weekly pricing, fixed fee, and output and outcome-based pricing. In such scenarios, getting the solution sizing right is often the difference between wins and losses in competitive deal scenarios.
Within a managed services model, providers will also need to correctly translate these underlying solution considerations and the value they bring to the client to ensure that the solution is evaluated for its true merit.
What questions will the webinar answer for the participants?
Who should attend?
With the meteoric rise in cyber attacks and cybersecurity talent shortage, Managed Detection and Response (MDR) can help enterprises improve incident detection, investigation, and response without more staffing. MDR provides a winning combination of technology, analytics, and human intelligence to improve cyber resiliency. Read on for recommendations for an effective cybersecurity approach.
The cybersecurity outlook has shifted from business and IT-driven to the C-suite. Enterprise investments are now geared towards establishing cyber resiliency programs with holistic threat advisory, comprehensive monitoring, and faster response as the key building blocks.
Let’s take a look at the elements enterprises want in cybersecurity.
Strategic enterprise priorities for running an effective cybersecurity program
With the right building blocks, MDR is becoming a near-term remedy for major enterprise cybersecurity challenges and helping companies meet their strategic priorities for effective cyber security programs.
Sophisticated threats are becoming difficult to detect because they can evade traditional controls and detection techniques. MDR aims to improve the struggling enterprise incident detection, investigation, and response capabilities.
MDR leverages next-generation technologies to hunt and respond better. Further, MDR brings the perfect amalgamation of technology, analytics, and human intelligence to bolster the enterprise cybersecurity position.
Our recent assessment of MDR services for leading technology enterprises analyzed the evolution of MDR technology vendors. We looked at their evolution from providing Endpoint Detection and Response (EDR) solutions to adding greater value through different services.
MDR service providers take different approaches to solutions and pricing services and can be classified in the following categories:
Type A vendors: They primarily position their EDR offerings as part of MDR services and typically provide an as-a-service model that includes the necessary software along with services
Type B vendors: These multi-threat vector-focused vendors cover not only endpoints but also include cloud-based workloads and networks in their solutions. They propose as-a-service and pure services models depending on the customer’s requirements and investment into detection and monitoring software in the current environment
Type C vendors: They are primarily managed security services providers delivering end-to-end security services along with MDR. In certain instances, they create bespoke offerings depending on customers’ requirements. They are typically vendor-agnostic and offer both as-a-service and a pure services model
Bringing together existing capabilities with an experienced provider is the key to jumpstarting the enterprise MDR journey.
Below are some recommendations to achieve success when implementing MDR services:
Once enterprises have kickstarted their MDR journey, they often can choose to combine overall cybersecurity and MDR services under one portfolio. In a few instances, we have observed the supply side proposing the convergence of the Security Operation Center (SOC) into the MDR solution to help enterprises save costs. Enterprises should leverage MDR in a way that complements their existing operations to essentially fill the gaps in their threat management strategy.
MDR pricing models and structures are still evolving. For example, Type A or Type C vendors usually prefer going with per unit-based pricing models where EDR and other software might or might not be included depending on requirements. Bespoke offerings can further modulate the price based on service inclusions and exclusions. Thus, different pricing metrics are offered, such as per asset, per user, etc., which slightly complicates matters and makes apples-to-apples comparisons difficult.
Additionally, we have observed that service providers may command premium prices because of the delivery location and type of value-adds included. For example, in the government sector, we have typically seen onshore delivery because of compliances, regulations, and discomfort with offshoring. At the same time, we have seen a few other cases where vendors leverage offshore locations for functions such as 24×7 monitoring to improve price positioning.
High-end threat hunting and cyber deception services are niche skills in the market. The current talent war creates a void in enterprise threat management strategy. Managed Detection and Response, with its suite of services, has the potential to emerge as a market winner.
Learn how to we can help you benchmark prices and contracts for a wide array of services, from contact center service IT to business processes. Our price benchmarking catalogs cover competitive market pricing for the most prominent locations across the globe.
What factors make this economic downturn different, and is IT services spending recession-proof? Despite recessionary fears, digital transformation and post-pandemic demand will help maintain IT services growth with more cautious tech spend moving forward. Learn the three strategies service providers should take now to plan for the slide in this blog.
By all accounts, it seems we are entering a cyclical phase of economic downturn. Gross Domestic Product (GDP) declined for the US, Italy, and Japan in the first quarter, while the UK, France, and Canada flatlined or deaccelerated meaningfully.
This has been visible a long way off, and the equity markets have adjusted their guidance for IT services stocks accordingly. However, we at Everest Group believe this is very different than past cyclical downturns.
To truly understand the nature of the impact on the IT services industry, we need to ask the following three questions:
Chart one tells us a few things:
A combination of the second and third factors is leading to the divergence between the IT services and aggregated economic activity, as measured by the GDP.
Now, look at this second chart. Suffice to say that IT services stocks have taken a beating in 2022.
While some stock price erosion can be attributed to inflationary pressures leading to margin compression, a significant part is due to negative macro expectations.
Curiously, during the same period, consensus revenue estimates have continued to expand (Accenture, Cognizant, Infosys, Wipro, TCS), and book-to-bill ratios remain healthy (expanded Year-over-Year for Capgemini and IBM, with mild deceleration for TCS and Accenture).
Quite simply, this downturn was visible a mile off. All of us could see it, as could customers, economists, governments, central banks, and equity markets. And a little bit like seeing a slow train coming, we skipped the tracks and readjusted our expectations. Consequently, it’s unlikely we will see a trainwreck, but tech Return on Investment (RoI) will be increasingly scrutinized.
Finally, we need to remember that the world is still coming out of COVID-19. Every enterprise made massive cost adjustments during the pandemic by automating routine tasks, moving to the cloud, and divesting non-core assets. In other words, many of the usual cost adjustment levers are already pre-adjusted, and one has to pause and ask – how much padding do we still have before we risk cutting too close to the bone?
Service providers will still need to readjust. Here are some recommended immediate steps to take:
To learn more about the increase and changing rates across the services industry, request a 30-minute briefing.
Application Management Services
SAP S-4 HANA Implementation Effort