How To Develop ITSM Cloud Strategies – Part 1

How To Develop ITSM Cloud Strategies – Part 1

How to develop ITSM strategy that extends all the way to the cloud and drives business objectives as well as technology advances.

This is the first of a two part series on developing effective ITSM Cloud Strategies.

If you are like most IT organizations, you probably already have some kind of IT service management (ITSM) in place. You may have a ticketing system for incident management, maybe even the beginnings of a configuration management data base (CMDB). Your CIO might also have some cost management functions—it could be as simple as a spreadsheet he or she keeps up to date.

The good news is: you are not at square one. These are all valid pieces of ITSM. Too often, however, they are very disparate, depend on different toolsets that are not integrated, and, as a result, one hand is never really sure what the other is doing.

Basically, you’ve got the dots but not the big picture. If you want to be able to proceed along the IT transformation journey to cloud computing, you need to begin to connect the dots in some systematic way.

A Clear Vision

The first step in development of ITSM is a clear vision of where you want to go. ITSM can be your reliable GPS, but first you have to upload the data it needs to map your directions. A comprehensive ITSM strategy, as a result, needs to address:

1. IT operations and efficiencies that enable you to get the most from your current technology
2. Management functions that drive value with the organization; i.e., cost, finance and asset management.
3. Business enablement that aligns IT technology with business requirements and objectives.

I hasten to add: You don’t have to implement a comprehensive strategy all at once. In fact, defining a strategy allows you to address short-term pain points with the confidence that you are proceeding in the right long-term direction.

Once you have established a broad ITSM strategy, you need to select a toolset that offers the capabilities you will need to execute your strategy over time. Fortunately, there are many toolsets to choose from today that are comprehensive and fully integrated. Suffice to say: the days when adapting an ITSM tool meant fitting your business into the tool maker’s framework are at least a generation behind us. Toolsets have become so adaptable that they are being used in business units outside of IT as well. We recently helped a manufacturing client use ServiceNow to implement a supply chain operations application. They use it to manage their products and issues with their products the same way they would IT assets.

What Have you Done For Me Lately

A foundational component of an effective ITSM strategy is a service catalog which defines the IT services in enough detail to outline the technology and processes that are required to provide them. This, admittedly, is not a small task. In some organizations the service catalog can include upwards of 100 distinct IT services.

Describing all the services IT provides in a service catalog makes it possible to align IT services directly with the business services they support and has the additional advantage of helping IT show executive management all the valuable services IT provides the rest of the organization.

Development of a CMDB is also foundational. A CMDB allows the identification, management and tracking of the technology on which business services are built. A CMDB also allows you to determine what each service is costing you and identify the services — like service desk, select managed services, and cloud computing — that could be more efficiently handled by a qualified third party. Implementing an effective ITSM strategy, as a result, is both a requirement and an enabler of out-tasking and cloud computing. All the information a service provider needs to set up automation and orchestration parameters for a cloud solution is available in your service catalog and CMDB.

The service catalog is the primary interface between IT and business and allows business users to request specific services, everything from a new laptop, to servers and storage and a range of applications and services. Fully enabling this self-service capability is a major milestone on the IT transformation journey… Continued Part 2

My column next month will discuss how implementing ITSM empowers a closer alignment of business and technology throughout your organization. 

mike-alley

By Mike Alley, 

Mike Alley is the resident evangelist at Logicalis for ITSM solutions and has nearly 30 years of experience in the technology industry. Mike joined Logicalis in 2006 through the acquisition of Carotek, a top HP partner in the Southeast. Prior to Carotek, Mike worked as a consulting manager at HP. He began his career as a hardware design engineer and software developer at Martin Marietta Energy Systems.

Visit www.unlikeanycloud.com to learn more about the IT Transformation Journey

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Mr. Robot And Burning Online Privacy Risks Despite the rapid development of web tools and computer security systems, online privacy remains a serious issue for most web users. According to some statistics provided by isaca.org, the total number of online security incidents worldwide grew to 42.8 million, leaving a great number of victims behind. As one…

Here Are Four Ways To Elevate IT

Here Are Four Ways To Elevate IT

Here Are Four Ways To Elevate IT Prior to joining the consulting side of the industry, I worked in corporate IT for the first 7-8 years of my career. While my time in corporate IT has long come to a close, I can still vividly recall the pain points and dreaded battles I endured. A…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

An Old Recurring Revenue Model Gains New Converts

An Old Recurring Revenue Model Gains New Converts

An Old Recurring Revenue Model Due to a range of market forces, a recurring revenue model that’s been used for decades in industries such as airplane manufacturing is undergoing a resurgence. Widely referred to as outcome-based pricing, output-based pricing, and performance pay, it offers companies a compelling way to stand out in a crowded field.…

From Startup To Becoming Enterprise Grade

From Startup To Becoming Enterprise Grade

Becoming Enterprise Grade How can an emerging business make a successful transition from selling to SMB customers that fueled their early growth to the enterprise customers that enable long-term profitability? What works with SMB customers often won’t get you a seat at the enterprise table. To make deep inroads into enterprise accounts, you have to…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor