IT Service Management (ITSM) And The Cloud

IT Service Management (ITSM) And The Cloud

IT Service Management (ITSM) And The Cloud

IT service management is an integral player in cloud computing, but figuring out where ITSM ends and the cloud vendor begins can be a trial to say the least. ITSM’s role in cloud computing varies from a symbiotic relationship between an IT department or company and a 3rd party cloud vendor, to a fully integrated cloud system that is built and operated by the same department. In this bit we’re going to address the possible benefits and dangers of both approaches.

manufacturing

(Image Source: Shutterstock)

ITIL Lifecycle and the Cloud

ITSM’s best practice lifecycle is about service strategy design, service transition, service operation, and continual service improvement. When ITSM interacts with cloud vendors at least part of that ITIL lifecycle needs to be outsourced to the cloud vendor. The biggest draw and advantage of cloud computing for an IT service professional is that if an entire corporation is running their programs directly off of the cloud, then performing a software update requires only that the cloud be updated that one time, rather than that each computer has to have it installed individually.

In the first part of the lifecycle, the strategy design phase, ITSM can clearly operate on its own. Here the current system problems are addressed and solutions are developed. However during service transition the lines begin to blur. Should the update be installed by the IT personnel or the cloud vendor? If something is wrong who will be responsible for addressing the problem? It’s not always immediately obvious whether a problem stems from the new program code, or from the way it’s interacting with the existing programs on the cloud. The IT personnel may know what’s in their update, but since they won’t have built the cloud themselves they may not be able to troubleshoot some problems, and vice versa. Dealing with this type of confusion requires thorough, well-defined, and effective change management procedures.

ITIL Lifecycle integrated in the Cloud

A variety of ITIL service management software types now offer tools for ITIL integrated cloud computing which means cloud and ITSM professionals are working together throughout the entire ITIL lifecycle. Since this means keeping both groups of IT professionals in-house this means potentially higher costs for the business. Of course as businesses continue to outsource more and more of their IT services outright, and as industry software becomes more commercially available rather than having to be created in-house, it will become increasingly cost-effective as third party IT firms begin offering fully integrated cloud computing management and IT services.

BYOD, the Cloud, and the ITIL Lifecycle

An additional benefit of an integrated Cloud Service/ITSM team is that the two together will have a considerably easier time working out exactly what type of support software will be required for mobile management or integration of foreign devices from third party vendors in order to make them function on the cloud.

By Kyle Hurst,

Kyle Hurst writes for manufacturing supplier about IT services, ERP software, and manufacturing software.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…