Forrester: Latest Generation Of BPM Can Pay Big Dividends - InformationWeek
IoT
IoT
Government // Enterprise Architecture
News
7/15/2004
01:38 PM
50%
50%
RELATED EVENTS
[Dark Reading Crash Course] Finding & Fixing Application Security Vulnerabilitie
Sep 14, 2017
Hear from a top applications security expert as he discusses key practices for scanning and securi ...Read More>>

Forrester: Latest Generation Of BPM Can Pay Big Dividends

Enterprises need to take advantage of latest features, including graphics-based process simulation and optimization routines.

Companies seeking to improve their business processes should take a close look at the latest generation of BPM applications, writes Forrester Research principal analyst Ken Vollmer in a new brief.

In "How Business Process Management Can Improve The Process Life Cycle," Vollmer notes that traditional, manual management efforts have typically resulted in inefficient processes. However, BPM technology can help organizations overcome these limitations "through the utilization of new features that improve the functionality of each phase of the process life cycle and make it easier to implement process improvements."

Specifically, BPM solutions let organizations model processes and translate them into executable code so that they may be "controlled by internal application logic in conjunction with external job control software." This allows companies to manage the business process cycle as a closed loop, permitting business-level process monitoring and optimization.

In this last phase, companies have the information and opportunity to determine where and whether processes should be streamlines and enhanced. "In the past, this has been a highly manual activity that has serious built-in limitations due to the fact that it relied on indirect inputs and required a high level of process knowledge to analyze the process effectively." Vollmer writes. "Today, leading BPM tools support graphics-based process simulation and optimization routines (normally based on the process models defined in the definition phase) as well as reporting and analysis tools that can all be used to optimize the targeted processes."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll