Why You Need ITSM Onboard Before You Take Off To The Cloud

Why You Need ITSM Onboard Before You Take Off To The Cloud

Why You Need ITSM Onboard Before You Take Off To The Cloud

Before strapping themselves into the cockpit of a jet airplane, most reasonable people would want to have a pretty detailed idea of what was involved in flying a plane. They’d want to know how the controls worked and how to respond to the variety of situations they could expect to encounter in flight. They would understand that once airborne, things happen much too fast to study up on what to do in an emergency.

The same could be said about cloud computing: like jet airplanes, cloud computing involves many interrelated systems that need to perform within very exact parameters or risk zooming out of control at extremely high speeds. Unfortunately, there are IT directors today who are strapping themselves into a cloud computing strategies without fully understanding what has to happen to deliver IT services to their business users without falling out of the sky.

cloud humor

Go Fast Safely

Cloud computing technology today makes it possible for pools of IT resources to respond intelligently and dynamically to each other and to the changing demands of business requirements. But, as advanced as it is, there is no intelligence inherent in any cloud computing technology. The intelligence to inform the millions of interactions involved in a typical cloud environment needs to come from the people who design, manage and support it.

An ITIL-based ITSM strategy is the most effective framework to upload your collective intelligence into the increasingly educatable technologies in your extended IT environment. The faster you go, the more critical it is to be able to view and govern where you’re headed.

Based on our experience with a range of organizations, here are five reasons ITSM should be a part of every cloud strategy:

1. IT Efficiency – As the delivery of IT services is increasingly pushed to the cloud by business units with tailored needs – often distributed to different service providers or service models – the governance of incident and change management becomes critical to creating a cloud strategy that maintains the efficiencies and speed gained by moving to the new model in the first place.

2. Business Alignment With more service providers targeting individual business units rather than the IT department, IT must be able to quickly assess the impact of new service offerings and how they can be tied into the company’s overall IT strategy.

3. Automated Service Management – IT must manage what it cannot automate, therefore, the automation of key processes in governing the evolution of a company’s service delivery options is critical. Without an ITSM strategy, IT, while trying to control chaos, can become the very bottleneck that its new delivery model exists to resolve.

4. Change Management – IT pros are accustomed to being the controllers of their technology kingdoms, but as cloud models evolve, direct control over every portion of the service delivery landscape lessens. As a result, it is even more critical today to be able to manage and track changes to ensure that what’s working in an in-house data center and what’s being delivered by a host of disparate service providers is all working seamlessly, catching and correcting issues that could cause serious performance degradations or other significant problems before they occur.

5. Self Service – Making it possible for end users to request IT services for themselves is a key component of the cloud computing model. Self-service does not mean instant gratification, however. You need to have things like chargeback and/or show back so you can demonstrate that you are spending money by serving yourself these corporate assets. Without appropriate parameters built into an ITSM strategy, self service provisioning can be like the wild West all over again.

No Excuse

It used to be that only large organizations could justify the cost of implementing ITSM. The available tools were expensive to install and often overwhelming to implement. A new wave of system management toolsets available as software-as-a-service (SaaS), however, has now made developing and implementing an ITSM strategy as doable as it is critical. The current front runner among SaaS ITSM toolsets is ServiceNow, but there are others like Cherwell, and EarlyVista, as well as SaaS applications from the more traditional service management vendors like BMC, HP and IBM.

A key advantage of the new generation of ITSM toolsets is that all the necessary functions are available within a fully integrated application. An ITIL-based framework already exists. You don’t have to spend all your time, and money building it. You can begin by adopting appropriate best practices in phases and tweak them as your strategy evolves.

A key hazard in the development of ITSM strategy is the tendency of IT professionals to seek out technical detail and dive in. Loosing the forest for the trees is probably the most common source of failure of ITSM strategies. The goal of a well designed ITSM strategy is not just to keep technologies interacting intelligently. The ultimate goal is delivery IT services that directly support and enhance an organization’s business objectives, or, in the case of governmental agencies, their mission to serve. ITSM is not just for IT.

This is where having a clear vision of where you want to go and the leadership to execute it is critical. It takes a resolute, guiding hand to steer an ITSM strategy through the inevitable turbulence of special interests as IT and business stakeholders pursue their own objectives.

On the positive side, the challenge of developing a comprehensive ITSM strategy has within it a unique opportunity to develop an environment of active collaboration between business and IT stakeholders that reflects the intelligent, interactive, collaboration you are creating between technologies within your extended IT environment.

In my next column, I would like to map out the stages you need to complete to design and implement an ITSM strategy that will ensure that when you take off for the cloud, you know where you are going and how to get there safely, securely and effectively.

mike-alley

By Mike Alley, Logicalis Director of ITSM

Mike Alley is the resident evangelist at Logicalis for ITSM solutions and has nearly 30 years of experience in the technology industry. Mike joined Logicalis in 2006 through the acquisition of Carotek, a top HP partner in the Southeast. Prior to Carotek, Mike worked as a consulting manager at HP. 

Visit www.unlikeanycloud.com to learn more about the IT Transformation Journey

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to being a mission-critical component, BODs are also becoming more interested in what their organizations are doing to plan their incident…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to a more flexible and accessible solution — whether public or private. By putting the right system in place, businesses can…

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete – take call centers as an example – there is only so much that you can do with data from…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how safely the cars are driving, not how safe they are from cyber-attack – the McAfee Threat Predictions 2016 Report warned…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to these attacks with calls for tighter control and regulations, from the Society for Worldwide Interbank Financial Telecommunication (SWIFT) beefing up…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of your control. But in order to effectively provide quality services with the focus on the customer, providers need to ensure…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand, but in an ever-changing technology landscape and with complex, inter-related business operations to manage, implementing GRC can seem like a…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that 64 percent of medium and large businesses believe cloud infrastructure is more secure than legacy systems. What factors contribute to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls systems, retail terminals and scanners, and kiosks to medical devices, heating and lighting systems, connected homes, and smart cars. Identity…