From Clutter to Control - Time to Spring Clean the Applications Portfolio - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next From Clutter to Control - Time to Spring Clean the Applications Portfolio-3 Next

Visibility is needed to gain a line of sight into your applications portfolio. Organizations are often spending 70 percent or more of their technology budget on “keeping the lights on” – some of which is used to maintain rogue and redundant applications.

Making a list of everything in your wardrobe will help you better determine what you’ve actually got and how you would like to see it organized. The same holds true for your applications. You also need an accurate and complete inventory of what’s in your overall applications portfolio to help you define a business and technical architecture to build toward. For each application, you’ll want to know where it resides, who’s responsible for it, how much it costs, the effort to support it, and its business value and associated risks.

The biggest single business issue that many IT organizations wrestle with is trying to contain the size of the applications portfolio they are asked to manage. Many organizations simply fail to take a hard look at which applications can be retired and, as a result, the cost of the IT infrastructure needed to support all those applications spirals out of control. Here are some tips from Hewlett-Packard about how to rationally clean up the applications portfolio.

More Slideshows:


Five Tips for Securing Sensitive Customer Data Data tokenization combined with corporate security office best practices may have prevented the world's largest email breach.

What to Look for in a Videoconferencing System Key features to consider before purchasing a videoconferencing system.


Six Unified Communications Application Benefits Unified communications users experience a multitude of benefits – both in terms of employee time savings as well as direct financial savings.

 

Related Topics : LG

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.