Why You Need ITSM Onboard Before You Take Off To The Cloud

Why You Need ITSM Onboard Before You Take Off To The Cloud

Why You Need ITSM Onboard Before You Take Off To The Cloud

Before strapping themselves into the cockpit of a jet airplane, most reasonable people would want to have a pretty detailed idea of what was involved in flying a plane. They’d want to know how the controls worked and how to respond to the variety of situations they could expect to encounter in flight. They would understand that once airborne, things happen much too fast to study up on what to do in an emergency.

The same could be said about cloud computing: like jet airplanes, cloud computing involves many interrelated systems that need to perform within very exact parameters or risk zooming out of control at extremely high speeds. Unfortunately, there are IT directors today who are strapping themselves into a cloud computing strategies without fully understanding what has to happen to deliver IT services to their business users without falling out of the sky.

cloud humor

Go Fast Safely

Cloud computing technology today makes it possible for pools of IT resources to respond intelligently and dynamically to each other and to the changing demands of business requirements. But, as advanced as it is, there is no intelligence inherent in any cloud computing technology. The intelligence to inform the millions of interactions involved in a typical cloud environment needs to come from the people who design, manage and support it.

An ITIL-based ITSM strategy is the most effective framework to upload your collective intelligence into the increasingly educatable technologies in your extended IT environment. The faster you go, the more critical it is to be able to view and govern where you’re headed.

Based on our experience with a range of organizations, here are five reasons ITSM should be a part of every cloud strategy:

1. IT Efficiency – As the delivery of IT services is increasingly pushed to the cloud by business units with tailored needs – often distributed to different service providers or service models – the governance of incident and change management becomes critical to creating a cloud strategy that maintains the efficiencies and speed gained by moving to the new model in the first place.

2. Business Alignment With more service providers targeting individual business units rather than the IT department, IT must be able to quickly assess the impact of new service offerings and how they can be tied into the company’s overall IT strategy.

3. Automated Service Management – IT must manage what it cannot automate, therefore, the automation of key processes in governing the evolution of a company’s service delivery options is critical. Without an ITSM strategy, IT, while trying to control chaos, can become the very bottleneck that its new delivery model exists to resolve.

4. Change Management – IT pros are accustomed to being the controllers of their technology kingdoms, but as cloud models evolve, direct control over every portion of the service delivery landscape lessens. As a result, it is even more critical today to be able to manage and track changes to ensure that what’s working in an in-house data center and what’s being delivered by a host of disparate service providers is all working seamlessly, catching and correcting issues that could cause serious performance degradations or other significant problems before they occur.

5. Self Service – Making it possible for end users to request IT services for themselves is a key component of the cloud computing model. Self-service does not mean instant gratification, however. You need to have things like chargeback and/or show back so you can demonstrate that you are spending money by serving yourself these corporate assets. Without appropriate parameters built into an ITSM strategy, self service provisioning can be like the wild West all over again.

No Excuse

It used to be that only large organizations could justify the cost of implementing ITSM. The available tools were expensive to install and often overwhelming to implement. A new wave of system management toolsets available as software-as-a-service (SaaS), however, has now made developing and implementing an ITSM strategy as doable as it is critical. The current front runner among SaaS ITSM toolsets is ServiceNow, but there are others like Cherwell, and EarlyVista, as well as SaaS applications from the more traditional service management vendors like BMC, HP and IBM.

A key advantage of the new generation of ITSM toolsets is that all the necessary functions are available within a fully integrated application. An ITIL-based framework already exists. You don’t have to spend all your time, and money building it. You can begin by adopting appropriate best practices in phases and tweak them as your strategy evolves.

A key hazard in the development of ITSM strategy is the tendency of IT professionals to seek out technical detail and dive in. Loosing the forest for the trees is probably the most common source of failure of ITSM strategies. The goal of a well designed ITSM strategy is not just to keep technologies interacting intelligently. The ultimate goal is delivery IT services that directly support and enhance an organization’s business objectives, or, in the case of governmental agencies, their mission to serve. ITSM is not just for IT.

This is where having a clear vision of where you want to go and the leadership to execute it is critical. It takes a resolute, guiding hand to steer an ITSM strategy through the inevitable turbulence of special interests as IT and business stakeholders pursue their own objectives.

On the positive side, the challenge of developing a comprehensive ITSM strategy has within it a unique opportunity to develop an environment of active collaboration between business and IT stakeholders that reflects the intelligent, interactive, collaboration you are creating between technologies within your extended IT environment.

In my next column, I would like to map out the stages you need to complete to design and implement an ITSM strategy that will ensure that when you take off for the cloud, you know where you are going and how to get there safely, securely and effectively.

mike-alley

By Mike Alley, Logicalis Director of ITSM

Mike Alley is the resident evangelist at Logicalis for ITSM solutions and has nearly 30 years of experience in the technology industry. Mike joined Logicalis in 2006 through the acquisition of Carotek, a top HP partner in the Southeast. Prior to Carotek, Mike worked as a consulting manager at HP. 

Visit www.unlikeanycloud.com to learn more about the IT Transformation Journey

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
The Lighter Side Of The Cloud – Hiding Spots

The Lighter Side Of The Cloud – Hiding Spots

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Exploiting AI and Blockchain Technology

Fintech Exploiting AI and Blockchain Technology

AI and Blockchain Technology The field of artificial intelligence (AI) had progressed rapidly in the last ten years, though first recognized in the 1950s. From autonomous motor vehicles to digital personal assistants, the technology is making its way into a variety of industries, enabling better task automation, language processing, and data analytics. But more recently,…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

What’s On The Horizon For Cloud Computing

What’s On The Horizon For Cloud Computing

Cloud Computing Trends Now that we are a little more than halfway through 2016, many experts are beginning to make their predictions about cloud computing for the rest of the year and beyond. While many of the trends aren’t too unexpected (the ever increasing acceptance of cloud solutions by businesses, for instance) other trends are…

Tesla Solar Plan Would Cost Billions To Implement

Tesla Solar Plan Would Cost Billions To Implement

A 1,500-word manifesto that Elon Musk unveiled last week, outlining his plan to expand Tesla Motors Inc.’s electric-vehicle line and to build “stunning solar roofs,” may end up costing the company tens of billions of dollars to carry out. Musk, Tesla’s chairman and chief executive officer, gave the estimate on Tuesday after a tour of the…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), “worldwide revenues for big data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…