IT Service Management (ITSM) And The Cloud

IT Service Management (ITSM) And The Cloud

IT Service Management (ITSM) And The Cloud

IT service management is an integral player in cloud computing, but figuring out where ITSM ends and the cloud vendor begins can be a trial to say the least. ITSM’s role in cloud computing varies from a symbiotic relationship between an IT department or company and a 3rd party cloud vendor, to a fully integrated cloud system that is built and operated by the same department. In this bit we’re going to address the possible benefits and dangers of both approaches.

manufacturing

(Image Source: Shutterstock)

ITIL Lifecycle and the Cloud

ITSM’s best practice lifecycle is about service strategy design, service transition, service operation, and continual service improvement. When ITSM interacts with cloud vendors at least part of that ITIL lifecycle needs to be outsourced to the cloud vendor. The biggest draw and advantage of cloud computing for an IT service professional is that if an entire corporation is running their programs directly off of the cloud, then performing a software update requires only that the cloud be updated that one time, rather than that each computer has to have it installed individually.

In the first part of the lifecycle, the strategy design phase, ITSM can clearly operate on its own. Here the current system problems are addressed and solutions are developed. However during service transition the lines begin to blur. Should the update be installed by the IT personnel or the cloud vendor? If something is wrong who will be responsible for addressing the problem? It’s not always immediately obvious whether a problem stems from the new program code, or from the way it’s interacting with the existing programs on the cloud. The IT personnel may know what’s in their update, but since they won’t have built the cloud themselves they may not be able to troubleshoot some problems, and vice versa. Dealing with this type of confusion requires thorough, well-defined, and effective change management procedures.

ITIL Lifecycle integrated in the Cloud

A variety of ITIL service management software types now offer tools for ITIL integrated cloud computing which means cloud and ITSM professionals are working together throughout the entire ITIL lifecycle. Since this means keeping both groups of IT professionals in-house this means potentially higher costs for the business. Of course as businesses continue to outsource more and more of their IT services outright, and as industry software becomes more commercially available rather than having to be created in-house, it will become increasingly cost-effective as third party IT firms begin offering fully integrated cloud computing management and IT services.

BYOD, the Cloud, and the ITIL Lifecycle

An additional benefit of an integrated Cloud Service/ITSM team is that the two together will have a considerably easier time working out exactly what type of support software will be required for mobile management or integration of foreign devices from third party vendors in order to make them function on the cloud.

By Kyle Hurst,

Kyle Hurst writes for manufacturing supplier about IT services, ERP software, and manufacturing software.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…