Network Compliance (VCI_IN Network) - IT Operations
At VOIS, we always establish robust firewall rules and network security that prevent unauthorised access to our network. We inspect incoming and outgoing traffic using security rules to identify and block threats.
Intelligent Ticket Routing - IT Platforms and Automation
We created the Intelligent ticket routing tool for Vodafone Germany and VOIS Egypt to eliminate the complex manual work of our colleagues in the GSL Business Technology team with a zero-touch operation to save their valuable time and effort.
Our Incident Management teams partnered with Vodafone Germany and built a database-to-database connection as a web-based application for fast, automated dispatching techniques, eliminating manual operations where there were delays. Our Intelligent Dispatching (DB) tool is connected to remedy any issues through Amazon Web Services (AWS) data migration services to get all relevant tickets and then pass those tickets to our logic and dispatching algorithm.
Vodafone uses technology, services, or systems managed by other sources, these applications are deemed as Shadow IT Applications and lead to the risk of low compliance and industrialisation of corporate systems. They could have detrimental impacts of breaching regulatory requirements, affecting customer experience, or financial performance due to duplication of systems, operational inefficiency, and increased licensed fees.
Challenges and Solutions
Challenges
Our goal was to understand and remediate the Shadow IT Risk in Vodafone. It has been an unknown, significant, and real risk to Vodafone. Our task was to assess over 1600 Shadow IT applications. After the assessments and risk identification, we needed to reduce risks and support the remediation. We wanted to build something that leaves a future capability behind using an offshore team to complete application assessments.
Solutions
We hired a team that can grow in VOIS and built the capability and processes through co-creation, and everyone brings their fresh ideas. We created a robust, consistent process for assessing a high volume of applications while maintaining the quality of each risk assessment. Later, we focused on data and used these assessments for insights that will help us understand the Shadow IT estate better, prioritize our risk reduction efforts, and look at cost-saving and consolidation activities. We’ve got over 60 data points that we can use for each application.
Value and Impact
Built a strong and highly skilled team
Finished the assessments of 942 of 1540 applications.
Dandified 203 High, 901 Medium, and 268 Low-Security risks, with 68 (33%) high risks that are remediated or reduced.
Strengthened customer-facing applications and applications with C4 data
prioritised efforts and tracked risk remediation progress.