IT outsourcing management This refers to purchasing of the IT related functions

It outsourcing management this refers to purchasing

This preview shows page 4 - 6 out of 7 pages.

IT outsourcing management- This refers to purchasing of the IT-related functions or services from a third-party rather than developing them in-house. Security management- This refers to the identification of the company’s assets then develop, document, and implement the various policies as well as procedures that will enhance the protection of assets. User access management- It refers to the process of providing personal privileges withing the organization’s network and they are able to access to the tools, applications among other assets of the company. This may include, permissions as well as security requirements and access to the essential organization’s applications (Hsu & Marinucci, 2013). Backup and recovery management- This refers to a process that involves creation as well as storage of copies of data which then facilitates the protection of the organizations against any potential data damage or loss. This will then facilitate the restoration of the data lost and damaged. Auditing- This typically involves technical reviews reporting on configurations, technologies, infrastructure et cetera (Hsu & Marinucci, 2013). Description of the Importance of the IT Process IT outsourcing management- This refers to purchasing of the IT-related functions or services from a third-party rather than developing them in-house. This is advantageous to the company because it has the capability of saving the cost as well as time that the organization would otherwise spend on infrastructure as well as operations. In this regard, therefore, the organization
Image of page 4
Project Plan 5 should outsource services such as cloud computing. Besides reducing cost and saving on time, cloud computing will provide effective security of the organization’s data. Security management- This refers to the identification of the company’s assets then develop, document, and implement the various policies as well as procedures that will enhance the protection of assets (Cater-Steel, 2008). This is important to the organization because it aims at ensuring confidentiality, integrity as well as the availability of the information, data as well as IT services of the organization. The process further helps in detecting as well as fighting attacks as well as intrusions hence minimizing the damage caused by security breaches.
Image of page 5
Image of page 6

You've reached the end of your free preview.

Want to read all 7 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture