The two firms have created a Gershon quick start service, which is said to include a set of packaged services, default reports and preconfigured software aimed at quickly delivering key auditable capabilities to address the Report's recommendations, the companies said in a statement.
The software includes Compuware’s Changepoint, an IT portfolio management solution. It can be purchased outright or leased on a fully-hosted SaaS model.
Fujitsu Consulting will also provide a series of fixed-cost consulting engagements ‘designed to assist agencies in understanding their present level of ICT capability and effectiveness, the target level required and a gap analysis’.
"Under the Gershon recommendations this is an essential process," said Wade Buscombe, client executive at Fujitsu Australia.
"Knowing where you are, where you need to be, and how you are going to get there is fundamental.
"Without a baseline on existing capabilities, a strategy, and an integrated program of activities for capability improvement, agencies are putting at risk their day-to-day operations and their participation in major ICT projects and new policy proposals."
Compuware claimed ‘a number’ of agencies had shown interest in the service following a seminar in Canberra last week.
IT vendors team up to address Gershon findings
By
Staff Writers
on Dec 17, 2008 8:02AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Ingram Micro Ushers in the Age of Ultra

Tech For Good program gives purpose and strong business outcomes

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Channel can help lead customers to boosting workplace wellbeing with professional headsets
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report