What do you think of when you think of a "service"? Think about services where you work, you…
You expect for these basic services to be there; to be reliable. These services weren't always reliable in the years when they were first used. What made them reliable was applying consistent, best practice continual service improvement practices.
These rather mundane basic business office services have become reliable as a result of refining and improving technologies, coupled with evolving and improving facilities service management. Now these once unreliable and flawed facilities services are as efficient and consistent as possible, and are just expected to be working within our business environment. The expectations that these services will work all the time make them business utilities because they support and perform service functions that are vital to supporting and improving business.
In many ways, information technology (IT) systems and network services and technologies are at approximately the same stage in evolution as the electricity, plumbing, and lift utility mechanics were in around the 1930s to 1950s; they work most of the time and eventually deliver the services necessary to support business, but in many organizations, IT services are not considered to be completely reliable. In fact, oftentimes, the IT services are not coordinated across the enterprise to the maximum business benefit.
Effective and dependable IT services deliver value to the enterprise customers and help business units to achieve their goals, without requiring each of the business units to address the specific management risks and costs for each of the IT services. Automating IT services can increase business value by making IT services more reliable and consistent and shortening service delivery times. IT has become a utility within most businesses today. Unfortunately, IT is often implemented and managed in such a way that it is not reliable, is uncoordinated throughout the enterprise, and often seems to do more harm than good to the business in the opinions of the enterprise network users, who are IT's customers.
IT services deliver value to the business. If IT does not bring value to the business, it is not a service but rather an expensive business liability.
IT leaders responsible for IT service management must be able to answer the following questions if they expect to be effective:
As defined by "The Official Introduction to the ITIL Service Lifecycle" from the Office of Government Commerce (OCG), a customer is, "Someone who buys goods or Services. The Customer of an IT Service Provider is the person or group that defines and agrees the Service Level Targets. The term Customers is also sometimes informally used to mean Uses, for example 'this is a Customer-focused Organization."
Whether they even realize it, all successful IT leaders use the Deming Quality Cycle; Plan, Do, Check, Act (PDCA), throughout continual IT service improvement and life cycle quality controls. ITIL V3 depends heavily upon using PDCA.
PDCA is discussed in more detail later in this chapter.
To be effective and successful as an IT service management leader, you must:
The goal of this book is to help you with each of these important issues.
Essentially, a framework is a collection of controls organized to highlight what needs to be done at various levels of the organization. It's an outline, if you will, that tells what but not how, because that level of detail is something you must fill in based upon your own organization and its unique environment. Organizations are increasingly realizing the value of frameworks and more often using them to increase business efficiency and integrate supporting controls into the business processes.
As they relate to conformity and compliance, there are many frameworks that are currently being used throughout the world to make many businesses more effective and efficient with a number of compliance and risk management issues. The following list highlights some of the most popular frameworks:
All these frameworks, and others, can be used to business' benefit and to make IT service management more consistent and more predictable. Using frameworks within IT service management makes business processes that depend upon IT more predictable.
All the previously listed frameworks can provide benefit to any type of business organization. However, throughout this guide, I will be focusing on ITIL V3 as it relates to IT management services. Why? Because it is becoming increasingly important for IT services to be closely aligned and integrated with the business, and ITIL V3 fits the bill nicely by helping IT leaders to establish a business management approach and discipline for IT service management. ITIL V3 does a good job of mapping out the IT activities and services and relating them to the associated and similar aspects of running a business. In a nutshell, ITIL V3 helps to transform IT services into valuable business services.
The release of ITIL V3 brought much speculation in the IT management world. Would it clarify the methodologies? Would it make things more complicated and unworkable?
ITIL was updated to V3 by an international group of expert contributors. The new version features significant modifications designed to speed and simplify a business's implementation, adaptation, and application of service management processes that, if properly followed, result in operational improvement and service excellence.
ITIL V3 is a fantastic improvement, and truly takes the issues that were covered within ITIL V2 out of their silos and integrates them into the wide spectrum of business processes. In addition, V3 more clearly demonstrates how IT must support the business.
In ITIL V3, the ITIL V2 books have been boiled down into five core IT services management guidance topics for each phase of the IT services management life cycle. Each topic incorporates all the process topics that were within ITIL V2, and more clearly demonstrates how each of these processes fit into the IT services management life cycle. The following list provides a brief review of each of the IT services management and support processes within ITIL V2.
ITIL V2 Service Support focuses on IT services users. The processes involved include:
ITIL V2 Service Management processes provide practitioners with the framework to align business needs and IT provision requirements, and include the following processes:
ITIL V3 is easier for IT managers to follow and implement because it corresponds more closely to the life cycle of how business operates and is managed. It provides more of a roadmap for IT leaders to follow. The ITIL V3 publications update most of ITIL V2 in addition to extending the scope of ITIL in the domain of service management.
ITIL V3 basically includes all the ITIL V2 processes and the addition of significant other processes into five defined phases of IT services management:
Figure 1.1: PDCA as it applies to ITIL V3.
ITIL V3 provides practical and actionable methods to evaluate and improve the quality of IT services, advancing the overall maturity of the IT service management life cycle. Continual improvement can be made and measured within three enterprise levels:
By using an integrated IT service life cycle, IT leaders can review, analyze, and make improvement recommendations for each of the five life cycle phases. ITIL V3 also focuses on using classic use cases and processes to define required IT functionality and objectives as well as to design tests.
As defined by the Office of Government Commerce, use cases "define realistic scenarios that describe interactions between Users and an IT Service or other System."
ITIL V3 summarizes the continual improvement process in six steps:
The Service Desk is progressively more often seen as a business function rather than a technical function. IT service management leaders must ensure that the Service Desk is aligned accordingly.
Service Desk operation must contribute to the enterprise business goals, demonstrating that it is not simply an overhead or cost center, but that it is a true front-line business asset that allows for the quick and efficient gathering of data from network users over time to not only solve problems on a call-by-call basis but also improve IT service management by eliminating those problems at the source and improving IT services in support of business needs. The Service Desk can dynamically provide data as a part of a process of continual IT service management change and improvement.
The Service Desk is a critical component of the IT department and is the single point of contact of IT customers on a day-to-day basis. The Service Desk typically handles all incident and service requests, and usually uses specialized software automation tools to log and manage all these events.
The Service Desk is often underappreciated, but it is important for IT leaders to understand that a good Service Desk can, and often does, compensate for deficiencies throughout other parts of the IT organization. Likewise, a poorly managed and executed Service Desk, or even the absence of a Service Desk, will reflect poorly on the rest of the IT organization, even if the IT organization is in all other ways effective.
The primary goal of the Service Desk is to restore normal service to the IT customers as quickly as possible with minimum business impact. Businesses can use ITIL V3 concepts to improve their Service Desk service and value to the organization. For example, restoring normal service may involve fixing a technical fault, fulfilling a service request, or answering a query.
By viewing their responsibilities in terms of supporting business, and as promoted by ITIL V3 concepts, a Service Desk becomes more valuable to the business by consistently logging and documenting incident and service request details, providing first-line investigation, resolving the issues that they are able to, and escalating incidents and service requests that they cannot resolve within an agreed-upon timeframe. Without consistently performing these processes using a welldefined framework such as ITIL V3, the typical workday for Service Desk members will be performed on an ad hoc basis, and they will essentially be reinventing the wheel with each call that comes in, even for oft-reported problems and incidents.
Consider this scenario: you work at a small regional bank with three full-service customer locations and a Web site for bank transactions and for checking customer accounts. Your bank offers
Your IT organization supports all five of these business units.
What would you do first if you were given responsibility for the entire IT organization? Put ITIL V3 to work for you to increase IT's value for your business. When doing so, you should first create a comprehensive strategy to satisfy all your many kinds of customers. Answering the following questions will help you to create a workable and valuable strategy.
What are the unique differentiators between your business units? What services cannot be easily substituted? For our scenario, differentiators include:
For our scenario, consider that the following are, in order, the most-to-least profitable business units considering those that bring the business the most revenue:
Again, it is important to know your business unit services and products so that you can know the importance of the IT services you provide to each. By knowing the profitability for each, you can examine how the IT services you provide may be impacting this profitability. By knowing this, you can do some analysis around how your IT services impact profitability. For example, you can determine whether you are providing appropriate levels of IT service availability or whether business profitability could be made better by improved IT service levels. Or perhaps you could increase profitability within the least-profitable business units by implementing some of the same IT services that the most profitable business units are using.
After some checking and analysis, you determine that the most satisfied business units are personal loans and business loans: Why? Because of
A couple of ways to determine customer satisfaction with IT services is to survey customers through an online or physical form, whichever works best for your own particular organization; interview key business unit leaders who are also your customers.
Knowing why your customers are satisfied will help you to know the IT services that are being managed most successfully and providing the most value to the business.
Surprisingly, after your checking and analysis, you determine that the traditional banking services division is the least satisfied. Why? Because
Your research and analysis, coupled with the consideration of your customer satisfaction, reveals that your internal business continuity services, applications services, and internal Service Desk are most effective. Why? Because
Research and analysis reveals a significant problem with the organization to which you outsource your online ecommerce activities, revealing this is a major area of ineffectiveness.
Why? Because
Knowing which IT services are least effective will help you to know the associated characteristics and features of those IT services that need to be improved, changed, or replaced to make IT services more effective.
Using the information from the answers to these six questions, you can now create a strategy to address the significant issues revealed. It is likely you will scrutinize the outsourced vendor, which has been shown to be a big problem, and consider whether to find another outsourced vendor to replace it. Alternatively, considering internal IT service is so good, you may decide to train your existing IT staff, or expand your staff, and bring the Web site ecommerce IT services management functions in-house.
When answering these questions, think about your IT strengths and weaknesses related to business strategies (such as new target customers, new business services, new services delivery options, and so on), what defines success, what are the threats, what are the vulnerabilities, what are the possible service differentiators, and so on. Knowing the answers to these, you can create a strategy to provide the best service and deliver the best value to your customers. It will also help you to prioritize your resource investments in IT services.
Creating an effective strategy will help you to transform IT services management into a strategic business asset, becoming truly more like business service management. Those reading and hearing your strategy will be able to see the relationship between each of the business services and the corresponding IT systems and processes that support them.
To effectively and successfully manage the IT organization, you must not only know IT well but also have solid knowledge of your business unit services and products, operations management, marketing, finance, information security, organizational development, industrial engineering, and compliance.
After creating your strategy, determine whether your strategy addresses questions similar to the following:
To be successful with IT service management, IT leaders must think and take actions strategically. Creating a well-thought-out strategy will have many benefits to enable this strategic thinking:
By following an effective strategy, IT leaders will turn strategic management into a strategic asset.
Those who read the newly created IT service management strategy should be able to clearly see the relationships between each of the IT services, systems, and processes and the business services, objectives, and goals that they support.
IT service management supports and improves business processing. To be most effective, IT service management leaders need to create an IT service management strategy. The following are the types of business relationships that should be clearly documented within an effective IT service management strategy to show the impact IT services have upon business:
In recent history, IT leaders have been fortunate to have new technology solutions to allow IT personnel to immediately be notified of incident, problem, configuration, change, and release processes automatically, and through the use of centralized automation management. This has led to a reduction in operational costs, improved service delivery, and ensured compliance and ITIL best practices through repeatable automation methods.
Many organizations are reluctant to invest in automation tools for IT operations, though, because they believe IT services are being delivered good enough without them, that automation is an expensive waste of money that has no significant positive improvement upon business, or some other reason. However, as the previous scenario pointed out, a failure to automate key IT services, such as the Service Desk, may be a significant reason business customers are dissatisfied with IT services and view IT operations as being inhibitors, instead of facilitators, of business.
Just a few examples of how IT services can be automated include the following:
There are many benefits to automating IT services. In general, IT service management automation results in IT becoming more predictable, reliable, and accountable. Automation improves and supports IT governance and mitigates risk. IT services automation also supports a wide range of compliance requirements, improves IT processes, and makes them more efficient. Automation makes feedback easier and more valuable.
Let's take a closer look at how automating active monitoring of CIs can help to determine current status and availability at any point in time. Table 1.1 shows how monitoring some specific CIs related to backup processes can provide valuable information to IT services personnel, in addition to clearly showing the relationship of the CIs with the business's security, privacy, and compliance requirements and impacts.
CI | (A)ctive/ (P)assive | Security | Privacy | Compliance |
Backup system | A | Yes | No | Yes |
Backup application | A | Yes | No | Yes |
Backup encryption | A | Yes | Yes | Yes |
Backup UPS | P | Yes | No | Yes |
Backup inventory | P | Yes | Yes | Yes |
Backup data | P | Yes | Yes | Yes |
Backup access control | A | Yes | Yes | Yes |
Backup version control | A | Yes | No | Yes |
Backup server | P | Yes | No | Yes |
Backup transport | P | Yes | Yes | Yes |
Backup intrusion detection | A | Yes | Yes | Yes |
Backup activity | A | Yes | No | Yes |
Table 1.1: How backup CI monitoring supports privacy, security, and compliance.
Automated active monitoring, also sometimes called pro-active monitoring, detects events that indicate when a system, service, or process is having problems, may be about to fail, and so on. Automation, done correctly, can simulate the knowledge of experienced IT professionals and allows for pro-active problem management processes.
Automated reactive monitoring, also sometimes called passive monitoring, triggers an action after an event or failure. For example, if server performance falls below a specified threshold value, it can be automatically rebooted.
Automating IT processes makes IT more accountable. By automating audit trails and activity logs, accountability for actions taken within the IT services environment are not left to chance by human action. This automated control over IT systems and device configurations results in improved compliance and security postures. You can easily validate the settings and history of actions at any point in time. Internal and external auditors alike both like seeing this type of documentation.
Automation tools can support a very wide range of IT service management functions. Let's consider just a few examples of how automation can do so, all of which make IT operations more efficient as well as more valuable to business:
Most organizations use what are often considered classic tools that the IT service delivery team can leverage to help support the IT services management strategy and improve IT operations. These include, but are not limited to, the following:
It is important to realize that an effective IT service management solution is more than just a set of tools. Organizations have many different tools right now. IT leaders must know and understand how to make them work together to realize the greatest IT operations efficiencies and improved business value.
We've been examining the Service Desk throughout this chapter as an example of how IT operations impacts the business view and business value of IT services; let's revisit it again to see how the Service Desk can be improved with these classic tools. Typically, the Service Desk is the single point of contact for IT issues. Contact with the Service Desk is typically via phone, email, Web interface, or events such as alarms, pages, and even instant messaging.
The major goal of the Service Desk is to restore normal service to users as quickly as possible. The responsibilities of a Service Desk often include:
Organizations can automate the classic tools that exist to support all these responsibilities. To be most effective and efficient, IT leaders can use unified IT service management tools to accomplish all the benefits of these classic tools in a centrally managed and coordinated manner, making IT service management processes even more effective and efficient than before.
There are a large, and growing, number of tools and practices that can be used to improve upon IT service management that are also used to improve the management of all types of business services throughout the enterprise. These complementary tools and practices can not only coexist within the enterprise they can also be leveraged and used in partnership with other areas within the company in ways to lower the associated costs and make use of existing resources. The following are some of the most common complementary services that IT leaders should consider using to make IT management more efficient and effective, in addition to having synergy with ITIL.
There is already a wide range of assessments performed throughout business organizations. IT service management can be enhanced through the use of similar assessments. ITIL makes extensive use of assessments within the framework.
Assessments use review, inspection, and analysis to determine whether a policy, standard, or set of guidelines are being followed. Assessments can enhance IT services management, and business in general, by ensuring records and data are accurate, that effectiveness and efficiency goals are being met, and so on. An audit is just one type of assessment, performed by an independent and objective entity. However, other types of self-assessments can be performed to improve IT services management.
Education, including periodic training and ongoing awareness communications and activities, is absolutely necessary to achieve effective and efficient business goals and success. Each person with job responsibilities must know how to perform those responsibilities according to policies, procedures, and the company expectations. IT service management functions cannot be performed with the most value to the organization if the personnel involved have not been effectively educated for how to do the involved activities.
Deploying IT services, and any business process, is not a trivial task. Proper design of the systems, applications, and other associated components is essential to successful deployment. Using consultants, either internal to your organization or subject matter experts (SMEs) from outside your organization, can provide the fresh eyes, knowledge, and viewpoints necessary to avoid design, implementation, and management pitfalls. Also, building on the knowledge and experience of others can leverage that knowledge to ensure that key elements of deployment and management are addressed and key risks are mitigated.
Most organizations now outsource many business functions. The reasons for outsourcing are many. Some include an effort to save money by not having to hire more staff to perform the outsourced functions, or perhaps the existing staff does not have the expertise to perform the activities. Outsourcing IT service management activities requires IT leaders to consider their outsourcing strategy, the role of the outsourced organization, and how to make decisions based upon those activities and functions that are outsourced.
Software as a Service (SaaS) is generally the term used for when applications are delivered as a service using the Internet as the delivery mechanism. One of the quickly growing trends is using SaaS solutions, most commonly it seems for creating backups, doing log management, and for providing protections against all types of malware. These SaaS services typically are delivered and accessed via the Internet. Service patch processing, mentioned earlier, is an example of how SaaS can be used to make IT services more efficient and valuable to business. IT service management leaders must consider the impacts of using SaaS solutions, and how to make business decisions when the active control of these services is in the hands of outside vendors.
For information security practitioners "SaaS" more commonly stands for Security as a Service, and generally refers to the growing trend of delivering information security applications as Internet-based services, on-demand, to consumers and businesses. Probably the most common are antivirus, antispam, and anti-spyware services.