{"id":4669,"date":"2025-12-19T15:40:15","date_gmt":"2025-12-19T15:40:15","guid":{"rendered":"https:\/\/convergeit.live-website.com\/?page_id=4669"},"modified":"2025-12-24T04:16:57","modified_gmt":"2025-12-24T04:16:57","slug":"strategieberatung","status":"publish","type":"page","link":"https:\/\/converge-it.de\/en\/strategieberatung\/","title":{"rendered":"Operational IT model"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"4669\" class=\"elementor elementor-4669\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ddf7da6 elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"ddf7da6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17277a4 elementor-widget elementor-widget-heading\" data-id=\"17277a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Operational IT Model<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b43df0 elementor-hidden-desktop elementor-hidden-tablet e-flex e-con-boxed e-con e-parent\" data-id=\"3b43df0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b2f489 elementor-widget elementor-widget-heading\" data-id=\"3b2f489\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Operational IT Model<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dde5b23 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"dde5b23\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2984518 e-grid e-con-full e-con e-child\" data-id=\"2984518\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96593e2 elementor-widget elementor-widget-image\" data-id=\"96593e2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" fetchpriority=\"high\" decoding=\"async\" width=\"720\" height=\"551\" src=\"https:\/\/converge-it.de\/wp-content\/uploads\/2024\/11\/ITGovernance-1.jpg\" class=\"attachment-large size-large wp-image-2318\" srcset=\"https:\/\/converge-it.de\/wp-content\/uploads\/2024\/11\/ITGovernance-1.jpg 941w, https:\/\/converge-it.de\/wp-content\/uploads\/2024\/11\/ITGovernance-1-300x230.jpg 300w, https:\/\/converge-it.de\/wp-content\/uploads\/2024\/11\/ITGovernance-1-768x588.jpg 768w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ac17f8 elementor-widget elementor-widget-text-editor\" data-id=\"7ac17f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\" translation-block\">The operational IT Model is derived from the corporate strategy. It is based on the pillars of <strong>Strategic Alignment, Performance Management, Operational Efficiency, and Risk Management<\/strong>. This consulting is complemented by established frameworks such as <strong>COBIT<\/strong> and <strong>ITIL<\/strong>.<\/p><p class=\" translation-block\">The operational (IT) model is largely determined by <strong>IT Governance<\/strong> and <strong>IT Compliance<\/strong>.<\/p><p>IT Governance and IT Compliance are closely linked and each contributes to a company being efficient and ethical.<\/p><p>Where IT governance supports business objectives and minimizes risks, compliance refers to adhering to legal regulations, industry standards, and internal guidelines.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ada3d94 elementor-hidden-desktop e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"ada3d94\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-04b3f19 e-grid e-con-full e-con e-child\" data-id=\"04b3f19\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1796dd7 elementor-widget elementor-widget-image\" data-id=\"1796dd7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" fetchpriority=\"high\" decoding=\"async\" width=\"720\" height=\"551\" src=\"https:\/\/converge-it.de\/wp-content\/uploads\/2024\/11\/ITGovernance-1.jpg\" class=\"attachment-large size-large wp-image-2318\" srcset=\"https:\/\/converge-it.de\/wp-content\/uploads\/2024\/11\/ITGovernance-1.jpg 941w, https:\/\/converge-it.de\/wp-content\/uploads\/2024\/11\/ITGovernance-1-300x230.jpg 300w, https:\/\/converge-it.de\/wp-content\/uploads\/2024\/11\/ITGovernance-1-768x588.jpg 768w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55d75c8 elementor-widget elementor-widget-text-editor\" data-id=\"55d75c8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\" class=\" translation-block\">The operational IT Model is derived from the corporate strategy. It is based on the pillars of <strong>Strategic Alignment, Performance Management, Operational Efficiency, and Risk Management<\/strong>. This consulting is complemented by established frameworks such as <strong>COBIT<\/strong> and <strong>ITIL<\/strong>.<\/p><p style=\"text-align: center;\" class=\" translation-block\">The operational (IT) model is largely determined by <strong>IT Governance<\/strong> and <strong>IT Compliance<\/strong>.<\/p><p style=\"text-align: center;\">IT Governance and IT Compliance are closely linked and each contributes to a company being efficient and ethical.<\/p><p style=\"text-align: center;\">Where IT governance supports business objectives and minimizes risks, compliance refers to adhering to legal regulations, industry standards, and internal guidelines.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-031bd79 e-grid elementor-hidden-mobile e-con-boxed e-con e-parent\" data-id=\"031bd79\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cce4909 elementor-widget elementor-widget-text-editor\" data-id=\"cce4909\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" style=\"text-align: center;\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\"><strong><span style=\"color: #000000;\">Strategic Alignment<\/span><\/strong><\/h2><p class=\" translation-block\">IT Governance \u2013 what is it? There's no single, universally accepted definition.<br> We call it \"management of (IT) management.\"<br> It's about the responsibility of top management for a smoothly functioning IT environment that supports business models. <br>COBIT 2019 enables holistic governance and management. The framework was published by ISACA (Information Systems Audit and Control Association). ISACA is an independent, global professional association for IT auditors, accountants, and experts in information security and IT governance. <br>COBIT uses a three-dimensional approach in its analysis. Across four domains, processes and activities in the context of resources \u2013 applications, information, infrastructure, and people \u2013 are analyzed and monitored with regard to seven KPIs (effectiveness, efficiency, confidentiality, integrity, compliance, and reliability). This provides top management with up-to-date transparency regarding the company's IT status at all times. <br>External consulting supports the implementation of the COBIT framework, the structured recording and documentation of the individual topics, and the creation of transparency regarding IT Governance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba12883 elementor-widget elementor-widget-text-editor\" data-id=\"ba12883\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" style=\"text-align: center;\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\"><strong>Performance Management\u200b<\/strong><\/h2><p class=\" translation-block\">The areas of <strong>IT controlling<\/strong> and <strong>IT Sourcing<\/strong> are particularly important for operational efficiency.<\/p><p class=\" translation-block\"><strong>IT controlling<\/strong> provides necessary management information for decision-making based on data from the company's own IT operations \u2013 often in relation to standard market values.<\/p><p class=\" translation-block\"><strong>IT Sourcing<\/strong> is the procurement strategy for processes and functions as an aspect of an IT operating model. In a broader sense, a distinction is made between keeping processes and functions within the company, insourcing (bringing them back in), and outsourcing (outsourcing) processes and functions. External consulting supports the transformation of KPIs and metrics into information that serves as an essential basis for decision-making for top management.<\/p><p>Furthermore, it provides the criteria that are of crucial importance as a basis for consideration in the decision-making process for \u201cIT sourcing\u201d.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2d34fd elementor-widget elementor-widget-text-editor\" data-id=\"a2d34fd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" style=\"text-align: center;\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\"><strong>Operational Efficiency\u200b<\/strong><\/h2><p class=\" translation-block\"><strong>ITIL<\/strong> deals with all possibilities of value creation between Service Provider (IT) and Service Consumer (user).<\/p><p class=\" translation-block\">The framework addresses goals for the continuous improvement of services and defines activities to improve service quality as well as processes with clear goals and metrics.<\/p><p class=\" translation-block\">The ITIL principle applies: If you can't measure it, you can't control it.<\/p><p>As part of the strategy development process, IT services are defined, developed, and incorporated into the service portfolio, both initially and in regular cycles. Based on this, ITIL artifacts such as incident, service, and change management are defined and integrated into IT processes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8de892 elementor-widget elementor-widget-text-editor\" data-id=\"f8de892\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" style=\"text-align: center;\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\"><strong>\u00a0 \u00a0 \u00a0 \u00a0Risk\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Management\u200b<\/strong><\/h2><p>IT Risk Management is the process of analyzing threats to a company's IT infrastructure and assessing the level of risk a company is willing to accept. The goal of IT risk management is to protect the company's IT systems and data from potential damage and threats, thereby ensuring the integrity, confidentiality, and availability of the company's IT infrastructure and data.<\/p><p class=\" translation-block\">Here, the <strong>Business Continuity Management<\/strong> framework is used to implement all preventative measures regarding IT security and data protection within a company. Business continuity encompasses the ability to maintain business operations within an organization even under emergency conditions. <br>Business Continuity Management (BCM) includes the development of strategies, concrete actions and plans, as well as an organizational structure for emergency response. It protects organizations from operational disruptions and demonstrates alternative procedures under emergency conditions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01a7263 e-grid elementor-hidden-desktop elementor-hidden-tablet e-con-boxed e-con e-parent\" data-id=\"01a7263\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35dc70e elementor-widget elementor-widget-text-editor\" data-id=\"35dc70e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" style=\"text-align: center;\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\"><strong><span style=\"color: #000000;\">Strategic Alignment<\/span><\/strong><\/h2><p style=\"text-align: center;\" class=\" translation-block\">IT Governance \u2013 what is it? There's no single, universally accepted definition.<br> We call it \"management of (IT) management.\"<br> It's about the responsibility of top management for a smoothly functioning IT environment that supports business models. <br>COBIT 2019 enables holistic governance and management. The framework was published by ISACA (Information Systems Audit and Control Association). ISACA is an independent, global professional association for IT auditors, accountants, and experts in information security and IT governance. <br>COBIT uses a three-dimensional approach in its analysis. Across four domains, processes and activities in the context of resources \u2013 applications, information, infrastructure, and people \u2013 are analyzed and monitored with regard to seven KPIs (effectiveness, efficiency, confidentiality, integrity, compliance, and reliability). This provides top management with up-to-date transparency regarding the company's IT status at all times. <br>External consulting supports the implementation of the COBIT framework, the structured recording and documentation of the individual topics, and the creation of transparency regarding IT Governance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9acc095 elementor-widget elementor-widget-text-editor\" data-id=\"9acc095\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" style=\"text-align: center;\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\"><strong>Performance Management\u200b<\/strong><\/h2><p style=\"text-align: center;\" class=\" translation-block\">The areas of <strong>IT controlling<\/strong> and <strong>IT Sourcing<\/strong> are particularly important for operational efficiency.<\/p><p style=\"text-align: center;\" class=\" translation-block\"><strong>IT controlling<\/strong> provides necessary management information for decision-making based on data from the company's own IT operations \u2013 often in relation to standard market values.<\/p><p style=\"text-align: center;\" class=\" translation-block\"><strong>IT Sourcing<\/strong> is the procurement strategy for processes and functions as an aspect of an IT operating model. In a broader sense, a distinction is made between keeping processes and functions within the company, insourcing (bringing them back in), and outsourcing (outsourcing) processes and functions. External consulting supports the transformation of KPIs and metrics into information that serves as an essential basis for decision-making for top management.<\/p><p style=\"text-align: center;\">Furthermore, it provides the criteria that are of crucial importance as a basis for consideration in the decision-making process for \u201cIT sourcing\u201d.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc274aa elementor-widget elementor-widget-text-editor\" data-id=\"fc274aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" style=\"text-align: center;\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\"><strong>Operational Efficiency\u200b<\/strong><\/h2><p style=\"text-align: center;\" class=\" translation-block\"><strong>ITIL<\/strong> deals with all possibilities of value creation between Service Provider (IT) and Service Consumer (user).<\/p><p style=\"text-align: center;\" class=\" translation-block\">The framework addresses goals for the continuous improvement of services and defines activities to improve service quality as well as processes with clear goals and metrics.<\/p><p style=\"text-align: center;\" class=\" translation-block\">The ITIL principle applies: If you can't measure it, you can't control it.<\/p><p style=\"text-align: center;\">As part of the strategy development process, IT services are defined, developed, and incorporated into the service portfolio, both initially and in regular cycles. Based on this, ITIL artifacts such as incident, service, and change management are defined and integrated into IT processes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2044948 elementor-widget elementor-widget-text-editor\" data-id=\"2044948\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" style=\"text-align: center;\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\"><strong>\u00a0 \u00a0 \u00a0 \u00a0Risk\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Management\u200b<\/strong><\/h2><p style=\"text-align: center;\">IT Risk Management is the process of analyzing threats to a company's IT infrastructure and assessing the level of risk a company is willing to accept. The goal of IT risk management is to protect the company's IT systems and data from potential damage and threats, thereby ensuring the integrity, confidentiality, and availability of the company's IT infrastructure and data.<\/p><p style=\"text-align: center;\" class=\" translation-block\">Here, the <strong>Business Continuity Management<\/strong> framework is used to implement all preventative measures regarding IT security and data protection within a company. Business continuity encompasses the ability to maintain business operations within an organization even under emergency conditions. <br>Business Continuity Management (BCM) includes the development of strategies, concrete actions and plans, as well as an organizational structure for emergency response. It protects organizations from operational disruptions and demonstrates alternative procedures under emergency conditions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Operatives IT-Modell Operatives IT-Modell Das operative IT-Modell leitet sich von der Unternehmensstrategie ab\u00a0 Es beruht auf den S\u00e4ulen Strategic Alignment, [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"class_list":["post-4669","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/converge-it.de\/en\/wp-json\/wp\/v2\/pages\/4669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/converge-it.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/converge-it.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/converge-it.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/converge-it.de\/en\/wp-json\/wp\/v2\/comments?post=4669"}],"version-history":[{"count":146,"href":"https:\/\/converge-it.de\/en\/wp-json\/wp\/v2\/pages\/4669\/revisions"}],"predecessor-version":[{"id":5325,"href":"https:\/\/converge-it.de\/en\/wp-json\/wp\/v2\/pages\/4669\/revisions\/5325"}],"wp:attachment":[{"href":"https:\/\/converge-it.de\/en\/wp-json\/wp\/v2\/media?parent=4669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}