Additional information
Source: Web-site of vendorThe project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
The project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
Ensure Security and Business Continuity
Improve Customer Service
Ensure Compliance
Centralize management
Manage Risks
No control over implementation
Non-compliant with IT security requirements
Risk of lost access to data and IT systems
Risk of attacks by hackers
Low employee productivity
Non-existent or decentralized IT incidents' management
Malware infection via Internet, email, storage devices
Employee personal use of corporate IT during working hours
Low quality of customer service
Unauthorized access to corporate IT systems and data