Additional information
Source: Web-site of vendorThe project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
The project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
Ensure Security and Business Continuity
Ensure Compliance
Centralize management
Manage Risks
Insufficient risk management
Complex and non-transparent business processes
Non-compliant with IT security requirements
Risk of data loss or damage
Risk of attacks by hackers
No control over the state of communication channels
Risk or Leaks of confidential information
Unauthorized access to corporate IT systems and data
Inability to forecast execution timelines
No control over data access