How To Develop ITSM Cloud Strategies – Part 2

How To Develop ITSM Cloud Strategies – Part 2

How To Develop ITSM Cloud Strategies – Part 2 (Part 1

You Want What? When?

IT directors are justified in being skeptical of a typical business user’s ability to make appropriate technical choices. But, as scary as allowing business users to request technical services on their own might be, a scarier thought is the world of “shadow IT” that enterprising users have found outside the firewall that surrounds your secure and protected IT environment.

You have to know by now that turning the tide back on the consumerization of IT (bring-your-own-device) trend is not an option. A comprehensive service catalog can get you out ahead of your users in this regard. By providing the services users need in your service catalog, you can provide automation, workflow and orchestration and establish an approvals process that is consistent with your IT strategy. Orchestration could involve getting technologists involved as needed to make the right choices and ensure that their request fits your IT strategy. By giving users what they need in your managed IT environment, you keep them from going off and doing something risky with your data on the Internet.

Best Practices

You don’t have to be afraid of not knowing how to implement an ITSM strategy. There are many sources of proven best practices you can use to build one of your own. The two primary sources are Information Technology Infrastructure Library (ITIL) which focuses on aligning the needs of the business with IT services, and Control Objectives for Information and Related Technology (COBIT) which has been described as the ITIL of governance and cost management.

The most common place to start implementing an ITSM strategy is with the these three ITIL best practices:

  • Incident Management, including help desk best practices to categorize issues and automate the workflow to resolve them.
  • Problem Management, including processes for pattern analysis that will help you minimize the impact of problems.
  • Change Management, to ensure that you have and can manage standards and procedures for making changes and supporting your end users.

These three best practices are a great place to start, but, a poor place to stop. Thinking you are done at this point would be similar to having the architectural blueprints and material to build a castle and then stopping after the foundation is completed. There are many layers of interdependent functions that need to be implemented to address the full scope of a comprehensive ITSM strategy.

I should add that the most common pitfall that organizations make is trying to design and implement their own unique ITSM processes. There are many established processes available that you can adapt to your specific requirements. It is not necessary to re-invent all those wheels.

Do I Know You?

Just as IT pros have misgivings about their business users’ ability to make appropriate technology choices, business users, in turn, are skeptical that IT is actually on their side. Many surveys have indicated that IT departments often simply do not know how to apply technical innovation to accomplish business objectives. It’s not in their traditional skill set. That’s going to have to change.

A key part of ITSM is enabling communication between IT and business, and IT needs to take the lead on this process. One way to do that is by training or hiring a business strategist – part technologist part business analyst – who possesses enough technical knowledge to work well with developers and bring business knowledge to IT projects. This is a new role for IT. It is not necessarily the CIO’s role to be the business analyst. It is the CIO’s role, however, to make sure that someone is working as a liaison between business and technology. As we move increasingly toward what’s being called a “service defined enterprise” (SDE), business leaders are going to participate increasingly in technology decisions. IT needs to anticipate business needs or risk getting run over or sidelined by the trend.

The Road Ahead

Many IT environments evolved over the years in response to the dictates of circumstance and short-term crises. Most IT organizations still spend more than 70 percent of the resources keeping the lights blinking and putting out fires. That’s not going to be good enough in the future. An effective ITSM strategy is the only way to know that the decisions you make this week aren’t going to lead to the next train wreck six months from now.

We are on the threshold of the day when the IT infrastructure can respond dynamically to change according to processes and parameters spelled out in advance in an effective ITSM strategy. As the pace of business and IT races faster and faster, the businesses that succeed are going to be those that use ITSM best practices to ensure that business and technology are pulling together in the same direction. Without an effective ITSM strategy in place, circumstance will continue to make your decisions for you.

mike-alley

By Mike Alley,

Mike Alley is the resident evangelist at Logicalis for ITSM solutions and has nearly 30 years of experience in the technology industry. Mike joined Logicalis in 2006 through the acquisition of Carotek, a top HP partner in the Southeast. Prior to Carotek, Mike worked as a consulting manager at HP. He began his career as a hardware design engineer and software developer at Martin Marietta Energy Systems.

Visit www.unlikeanycloud.com to learn more about the IT Transformation Journey

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground We read everyday about the fast pace of business adoption of the cloud.  But children are adopting the cloud at just as an aggressive pace.  The Cloud is changing our children’s lives – the way they play, learn, and interact with others and the world around them.  I see children…

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Mr. Robot And Burning Online Privacy Risks Despite the rapid development of web tools and computer security systems, online privacy remains a serious issue for most web users. According to some statistics provided by isaca.org, the total number of online security incidents worldwide grew to 42.8 million, leaving a great number of victims behind. As one…

5 Reasons Why The U.S. Dominates The Digital World!

5 Reasons Why The U.S. Dominates The Digital World!

U.S. Dominates The Digital World! I have spent about half my working life in the US and the other half in Europe. During this time (25 years) it has been exciting to see digital trends over the years. There has never been a doubt that the US has been a dominant power in anything digital…

‘Tis The Season To Be Deploying Sensors

‘Tis The Season To Be Deploying Sensors

Deploying Sensors Overhead the Christmas Drones are buzzing, delivering packages to the good girls and boys. Back at the main location people are analyzing the good and bad data collected over the year about each person. Data analytics that is creating a list, gathering all the data and then checking the data on that list…

The Implication Of Consumers Not Having Their Heads In The Cloud

The Implication Of Consumers Not Having Their Heads In The Cloud

Customers CAN Better Protect Themselves The majority of cloud consumers don’t understand what cloud is let alone what the implications of transacting in the cloud or of having their data and digital assets stored in the cloud. As a result most consumers are their own worst enemy when it comes to putting themselves at risk…

Are You Sure You’re Ready For The Cloud?: Connectivity

Are You Sure You’re Ready For The Cloud?: Connectivity

Cloud Connectivity Many times when we think of “cloud” we think of the elastic compute and storage, but we forget one very important thing, connectivity. Even though connectivity is no part of the cloud itself, it does have a direct bearing on how we access it, use it, and play around with it. If our…

How Your Business Can Overcome Its Fear of BYOD

How Your Business Can Overcome Its Fear of BYOD

Overcoming BYOD Fear While the popularity of the remote workforce has been on the rise, more and more people are returning to the office to work out of fear that their business data isn’t secure, according to a Neustar report. A whopping 83 percent of respondents are worried about the security of their files, and 27…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising