How To Develop ITSM Cloud Strategies – Part 1

How To Develop ITSM Cloud Strategies – Part 1

How to develop ITSM strategy that extends all the way to the cloud and drives business objectives as well as technology advances.

This is the first of a two part series on developing effective ITSM Cloud Strategies.

If you are like most IT organizations, you probably already have some kind of IT service management (ITSM) in place. You may have a ticketing system for incident management, maybe even the beginnings of a configuration management data base (CMDB). Your CIO might also have some cost management functions—it could be as simple as a spreadsheet he or she keeps up to date.

The good news is: you are not at square one. These are all valid pieces of ITSM. Too often, however, they are very disparate, depend on different toolsets that are not integrated, and, as a result, one hand is never really sure what the other is doing.

Basically, you’ve got the dots but not the big picture. If you want to be able to proceed along the IT transformation journey to cloud computing, you need to begin to connect the dots in some systematic way.

A Clear Vision

The first step in development of ITSM is a clear vision of where you want to go. ITSM can be your reliable GPS, but first you have to upload the data it needs to map your directions. A comprehensive ITSM strategy, as a result, needs to address:

1. IT operations and efficiencies that enable you to get the most from your current technology
2. Management functions that drive value with the organization; i.e., cost, finance and asset management.
3. Business enablement that aligns IT technology with business requirements and objectives.

I hasten to add: You don’t have to implement a comprehensive strategy all at once. In fact, defining a strategy allows you to address short-term pain points with the confidence that you are proceeding in the right long-term direction.

Once you have established a broad ITSM strategy, you need to select a toolset that offers the capabilities you will need to execute your strategy over time. Fortunately, there are many toolsets to choose from today that are comprehensive and fully integrated. Suffice to say: the days when adapting an ITSM tool meant fitting your business into the tool maker’s framework are at least a generation behind us. Toolsets have become so adaptable that they are being used in business units outside of IT as well. We recently helped a manufacturing client use ServiceNow to implement a supply chain operations application. They use it to manage their products and issues with their products the same way they would IT assets.

What Have you Done For Me Lately

A foundational component of an effective ITSM strategy is a service catalog which defines the IT services in enough detail to outline the technology and processes that are required to provide them. This, admittedly, is not a small task. In some organizations the service catalog can include upwards of 100 distinct IT services.

Describing all the services IT provides in a service catalog makes it possible to align IT services directly with the business services they support and has the additional advantage of helping IT show executive management all the valuable services IT provides the rest of the organization.

Development of a CMDB is also foundational. A CMDB allows the identification, management and tracking of the technology on which business services are built. A CMDB also allows you to determine what each service is costing you and identify the services — like service desk, select managed services, and cloud computing — that could be more efficiently handled by a qualified third party. Implementing an effective ITSM strategy, as a result, is both a requirement and an enabler of out-tasking and cloud computing. All the information a service provider needs to set up automation and orchestration parameters for a cloud solution is available in your service catalog and CMDB.

The service catalog is the primary interface between IT and business and allows business users to request specific services, everything from a new laptop, to servers and storage and a range of applications and services. Fully enabling this self-service capability is a major milestone on the IT transformation journey… Continued Part 2

My column next month will discuss how implementing ITSM empowers a closer alignment of business and technology throughout your organization. 

mike-alley

By Mike Alley, 

Mike Alley is the resident evangelist at Logicalis for ITSM solutions and has nearly 30 years of experience in the technology industry. Mike joined Logicalis in 2006 through the acquisition of Carotek, a top HP partner in the Southeast. Prior to Carotek, Mike worked as a consulting manager at HP. He began his career as a hardware design engineer and software developer at Martin Marietta Energy Systems.

Visit www.unlikeanycloud.com to learn more about the IT Transformation Journey

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…