IT as a Service (ITaaS), What Businesses Are In For

IT as a Service (ITaaS), what Businesses are in for

There are so many models under XaaS that it is becoming hard to keep track of them all. We have PaaS, SaaS, IaaS, NaaS, and MaaS just to name a few of the more common ones and we have new ones being developed as we speak. Now let’s add another one to that list. IT as a service just recently came into the scene and from the name alone it seems that it sounds like “Everything as a Service.” However, this is not really a service model, but rather a new delivering model or operating platform. How’s that for confusing?

ITaaS does not really belong under XaaS, I just wanted to hammer it down back there. ITaaS in simple terms basically means that IT is being offered as a service along with whatever services and technology that entails. The service revolves around various IT services, rather than technology, being offered mostly through the cloud. But physical delivery is often used in conjunction with remote services as well.

Though this has been around for a while in some form or another, the cloud is the best enabler for ITaaS which allows service providers global reach with very powerful tools that help customers achieve their goals. And since legacy apps are not really going away anytime soon, there are still a lot of business that use COBOL apps and similarly old programs, ITaaS packages services and applications to be used by different users within the organization. In fact, most ITaaS providers provide services to their own organization rather than to third party customers.

But organizations going into ITaaS make some very bad fundamental decisions. They tend to be too technology-centric, which is not normally bad, but it can have some dire repercussions in this case. They focus on how to deploy hybrid cloud systems on top of their existing systems and then focus on how to deliver the services that they require. This often ends up as half-baked and overly pricey ventures. The correct approach would be to become customer-centric. If an organization is serious about ITaaS, it should start its planning with the business users and the applications and services they need and not with the technology management wants.

They should start by asking questions like:

  1. What applications and services do the users and developers need in order to be efficient and/or be innovative?
  2. How will the overall business process change when these applications and services are deployed?
  3. Will it actually promote innovative and cost-effectiveness and can our IT pull this off?

In short, it should be user demand that drive the ITaaS design and approach rather than infrastructure.

By Abdul Salam

Sorry, comments are closed for this post.

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…