Outsourcing deals fail to support the business plan

Nearly 40% of IT departments have an outsourcing policy that is out of synch with the strategy of the business they are...

This Article Covers


Nearly 40% of IT departments have an outsourcing policy that is out of synch with the strategy of the business they are supporting, according to research by Gartner.

And despite the importance of IT outsourcing deals to the success of the business, 21% of IT directors questioned by the analyst firm said their outsourcing policy was "not at all aligned" with the business.

The snapshot of IT outsourcing emerged from a Gartner survey of 68 executives in large companies during its annual European Outsourcing and IT Services Summit in April.

The survey revealed widespread dissatisfaction with the performance of suppliers. More than 50% of those questioned, most of whom were IT directors, said they were in the process of changing suppliers.

The survey also underlined the rise of offshore outsourcing - 57% of respondents said they were considering outsourcing some IT to offshore locations.

IT directors' top priorities when outsourcing were: cost efficiency, service quality, adaptability and relationship management.

Few of those surveyed listed how to build a business case and disaster recovery as among their top priorities when outsourcing.

Wide area networks were the most popular part of IT to outsource, followed by voice and video networks and the IT helpdesk.

Asked how happy they were with different kinds of IT service - whether run in-house or from a supplier - respondents to the survey said they were most satisfied with distributed systems (Lans and PCs) and application support. They were least satisfied with IT helpdesks.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT outsourcing



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...