PRODUCT > Strategy Planning

Strategy Planning

Development of Information Systems Strategy Plans (ISSP)

Overview

Information System Strategy Plan helps the management to plan and develop its IT infrastructure (hardware, software, personnel etc.) to support the business goals and objectives aligned with the long term vision of the organization. Generally an ISSP covers a planning horizon of 3 – 5 years, with more specific plan for the first three years and a somewhat flexible plan for the years 4 and 5 which can again become a starting point of the next five years plan.

What’s at Stake

If not planned keeping in view the organization’s mid term and long term goals, computerization efforts can end up in a situation risking the followings:

  • The hardware acquired (servers, workstations, communications etc.) may not support the business needs of the organization in the coming years. It can also lead to technology inconsistencies which can make data sharing more difficult across various functions of the organization.
  • The hardware acquired (servers, workstations, communications etc.) may not support the business needs of the organization in the coming years. It can also lead to technology inconsistencies which can make data sharing more difficult across various functions of the organization.
  • The software applications acquired may not support the actual business processes in place.
  • Large scale IT projects may end up in cost and time over runs and user fatigue in implementing a system which does not conform to the business processes.
  • IT support services may get over burdened in catering for the demand from users in different departments.

How Does EDS Help

EDS provides the services of its staff having rich experience in developing ISSPs for medium and large organizations. The ISSP developed by us provides a comprehensive blueprint of the hardware and software needs of an organization covering the following aspects:

 

  • Assessment of business information needs based on discussions with the senior and middle management about the business objectives and goals for the next 3 – 5 years.
  • Development of broad outline / features of the software applications needed to generate the business information identified in the above step.
  • Assessment of existing IT infrastructure in terms of servers, workstations, LAN, WAN and analysis of the software applications running at the organization.
  • Development of specifications for hardware and communication infrastructure to support the organization in implementing the software applications identified in the above step.
  • Identification of IT staffing requirements in terms of skill sets, training needs for the existing staff etc. to support the IT infrastructure.
  • Development of project plan in terms of time lines and costs for various activities including hardware procurement, installation, software development/ acquisition and implementation.

Once a policy for user access has been documented, the management can randomly check the actual security settings against the policy document to ensure its IT assets are well protected against unauthorized access.

IMAGES

DOCUMENTS

CLIENTS