itil v3 nov 2011

Upload: pratul-sharma

Post on 03-Jun-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 ITIL v3 Nov 2011

    1/88

  • 8/12/2019 ITIL v3 Nov 2011

    2/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283

    Company Confidential

    Agenda:

    This training intends to provide you basiclevel understanding of ITIL (Foundation)so that

    You can understand the vocabulary of ITService Management

    You have basic concepts of IT ServiceManagement

    You take these concepts back to your work

    You can take EXIN/ISEB Foundation exam

    Company Confidential

    What is a Service?

    And Service Outlook

  • 8/12/2019 ITIL v3 Nov 2011

    3/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283

    Company Confidential

    Lets learn from a little boy

    This is the story of a small boy who calledup the lady of a house offering to cleanher garden at half of the price of what thecurrent gardener was charging

    She said No..

    The boy insisted again, she again said No

    The boy pleaded again but finally hung up

    Company Confidential

    Lets learn from a little boy

    Owner of the departmental store from where theboy called, offered job to the boy, thinking thatthe poor boy was in dire need

    Boy said, No Sir, thank you..

    The owner was surprised and asked why theboy was begging for the cleaning job from thatlady if he did not need one.

    Boy said, Sir, I work for the same lady, I was justchecking the quality of my services to her

  • 8/12/2019 ITIL v3 Nov 2011

    4/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283

    Company Confidential

    What is a Service?

    A Service is a means of delivering valueto customers, by facilitating outcomes thecustomers want to achieve without theownership of specific costs and risks

    When we hire a taxi to airport do we ownthe costs and risks?

    Service Outlook thinking with totality of user experience

    Company Confidential

    What is Industry Today?

    IT / ITES BPO / KPO / LPO / CRO

    Banking / Finance / Insurance Plastic Money / Virtual Money Overflowing FDIs / NRIs, HNIs

    becoming VCs

    FMCG Packed Food, New Products, New

    Concepts

    Education More than 2000 professional colleges

    only in India today

    Tourism Growing day by day

    Manufacturing / Auto

    Core engineering, branches like Civil,Mechanical, Electronics all are shiningback

    Telecom Leading world players in domestic

    markets Everyone owns a cellphone, millions of

    users, connected networks

    Retail Malls, Multiplexes everywhere

    Real Estate / Construction Boom Everywhere, increasing

    property rates

    Media / Fashion / Textile Do our parents know Job Titles like

    RJ, VJ?

    Aviation 5 Years ago what was Aviation?

    Hospitality / Hotels No one thought of Event

    Management earlier? Today people outsource their

    marriage

    Medical Need of the time Medical Tourism

    Medical aid is very costly there

    And New things like Online bettingand many more Have you seen the movie Luck?

  • 8/12/2019 ITIL v3 Nov 2011

    5/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283

    Company Confidential

    Key Features of Industry Segments

    Industry is moving towards being a ServiceIndustry

    So there is need of Service Management today

    Information Technology is playing a verystrategic role in every sector

    You cant scale up without a very effective use of ITin your business

    Increasing competition leads to outsourcing /strategic partnerships

    Should I buy a taxi and own it if 20 people travel toairport daily (@ 1000 per person)

    Company Confidential

    Is IT a Service?

    Yes and if IT is,

    We need the discipline of

    IT Service ManagementIT Service Management

    If IT is a Service then it needs to be managed.

    ITSM is the discipline of managing IT as aservice

    There are 4 Ps of Service Management; theyare People, Process, Products and Partners.

  • 8/12/2019 ITIL v3 Nov 2011

    6/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283

    Company Confidential

    Gartner Group* Maturity Model

    Fire Fighting

    Reactive

    Proactive

    Service

    Value

    IT tellingbusiness, howto be a better

    business

    * Governments of many countries follow Gartners recommendations

    Service must always

    deliver Value to its

    customers

    Company Confidential

    Service Management as a Practice

    Service Management is a set of organizational capabilities for

    providing value to customers in the form ofservices

  • 8/12/2019 ITIL v3 Nov 2011

    7/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283

    Company Confidential

    Service Management - A Discipline

    What is the vision?

    Where do we wantto be?

    How do we get there?

    Did we get there?

    Where are we now?

    How do we keepthe momentum going?

    Service & processimprovement

    Measurabletargets

    Baselineassessments

    Measurements &metrics

    Business vision,

    mission, goals andobjectives

    CSI Model

    Company Confidential

    IT Service Management

    What is it?

    The effective and efficient, process drivenmanagement of quality IT services

    What is the added value?

    ITSM is business aligned and maintains aholistic Service Lifecycle approach

    Implementing ITSM in an organizationprovides gradual improvement

  • 8/12/2019 ITIL v3 Nov 2011

    8/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283

    Company Confidential

    Evolution of IT Service Management

    Company Confidential

    Business and IT Alignment

    Objectives We want to make money

    We want to build a brand

    Core Business Processes Retail (inc POS)

    Marketing

    Buying and Procurement

    IT Services Website, Email

    Procurement System

    Point of Sale

    PCs, Networks, Servers

    ITSM ensures provisions for What we need

    Available when needed

    At the right cost

  • 8/12/2019 ITIL v3 Nov 2011

    9/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283

    Company Confidential

    IT Infrastructure Library (ITIL)

    The most commonly used IT ServiceIT ServiceManagement Best PracticeManagement Best Practice today

    Its a public framework

    Public frameworks are preferred overproprietary framework since the later isoften undocumented

    ITIL is supported by complimentary

    guidance which means knowledge specificto an industry sector

    Company Confidential

    How did it come into existence

    UK Govt, realizing that the services from ITvendors were not up to the mark starteddocumenting the expectations from IT vendors as documented guidelines

    Companies in Europe adopted the guidelines inearly 1990 They had little choice

    Got worldwide attention when Microsoft used ITILfor developing its proprietary framework

    i.e. MOF (Microsoft Operations Framework) ITIL version 2.0 was released in 2001

    Usage got spread in the industry and got worldwiderecognition

  • 8/12/2019 ITIL v3 Nov 2011

    10/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    ITIL Made a difference

    Different from ISO, CMM.. Focused on People

    Well defined certification scheme

    Customers ask for # of ITIL certifiedemployees in their RFPs

    International Certification Bodies - APMG

    EXIN European Examination Institute for Information Science

    ISEB

    The IInformation SSystems EExamination BBoard

    Testing

    Prometric Centers, TUV

    Company Confidential

    What happened after that?

    The industry started using the frameworkand also realized benefits

    It got momentum of being a communitylearning

    Organizations using ITILJ.D. Edwards & Company, KPMG, Legal& General Insurance, LucentTechnologies, Mackenzie Financial

    Corp., Manulife Financial, MenomineeIndian Tribe of Wisconsin, Merrill Lynch,Microsoft Corp., Mutual Life AssuranceCompany, National Westminster Bank,Nesbitt Burns, Network Associates,Ontario Hydro, Oracle, Perot Systems

    UK Post Office, Peregrine Systems,Procter & Gamble, Remedy Corp.,Royal Bank of Scotland, Royal Mail,

    Scottish Provident, Shell,GlaxoSmithKline, Standard LifeAssurance, The Equitable InsuranceCompany, Toronto Dominion Bank,Union Gas, Virginia Power, Vodafone,Zurich Insurance

    And many more

  • 8/12/2019 ITIL v3 Nov 2011

    11/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    Organisations using ITIL Worldwide

    ABN-AMRO BankAetna Life Insurance

    AT&T Solutions

    Australia Post

    AXA Insurance Group

    Bank of Canada

    Bank of Montreal (Cebra, HarrisBank)

    Barclays Bank

    Bass Breweries

    British Airways

    British Telecom

    Cable & Wireless

    Canadian Fed. & Prov.Governments

    Capital One ServicesCGI

    CIBC

    Computer SciencesCorporationConsumers Gas

    DLJ Pershing

    Dutch Land RegistryOffice

    Dutch Railways

    EDS

    Exxon

    Federal Express

    GE Capital

    General Accident

    Great West Life

    Guinness/UDV

    Hewlett Packard

    Hong Kong & ShanghaiBank

    IBM/ISM

    ING Bank

    And many more

    Company Confidential

    Some Testimonials

    Procter & Gamble

    Started using ITIL in 1999 and realizeda 6% to 8% cut in operating costswithin first year

    Another ITIL project has reduced helpdesk calls by 10%.

    In four years, the company reportedoverall savings of about $500 million.

  • 8/12/2019 ITIL v3 Nov 2011

    12/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    Testimonials (contd)

    Caterpillar

    Embarked on a series of ITIL projects in2000.

    After applying ITIL principles, the rate ofachieving the target response time forincident management on Web-relatedservices jumped from 60% to more than

    90%.

    Company Confidential

    Testimonials (contd)

    Nationwide Insurance

    Implementing key ITIL processes in2001 led to a 40% reduction of itssystems outages.

    The company achieved a $4.3 millionROI over the next three years

  • 8/12/2019 ITIL v3 Nov 2011

    13/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    ITIL A Paradigm Shift

    Unlike the other process frameworks /standards it certifies people and not theorganizations

    An organization can be only as good as thepeople working with

    An established and well defined certificationscheme is in place to support ITIL.

    This comprises three distinct levels:

    Foundation, Practitioner and Manager

    Company Confidential

    Why Certify?

    ITIL aware professionals make an organization Motivated, Cost effective, Productive, Service and

    customer oriented, planned and structured and thereforeahead of competition

    ITIL certified professionals are sought after in theindustry today

    Knowing the benefits : The customers push vendors to have their people ITIL

    aware and certified Number of ITIL certified employees is a key item in many RFQs

    from customers Employers are pushing their employees to get ITIL awareand certified

    It is generally being linked to the appraisal system in manyorganizations today

  • 8/12/2019 ITIL v3 Nov 2011

    14/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    ITIL Quick Facts

    ITIL is not backed by a single company or a person. There isno profit motive or personal promotion.

    ITIL is not from a singlecompany or a person

    Its true! anyone can implement ITIL. However, it makes sensewhen the size of your helpdesk team is more than 5.

    ITIL is for small, mediumand large companies

    No one can certify products as ITIL-compliant. It is commonfor people to refer to PinkElephants certification. Please readthe fine print. https://www.pinkelephant.com/en-GB/ResourceCenter/PinkVerify/CompatibilityCompliance.htm

    There are no ITIL-compliant products

    If you are targeting certification, you must get ISO 20000 andBS 15000 standards, based on ITIL.

    You cannot get yourcompany ITIL-certified

    Consider it to be a good advice from IT Managers who havebeen there. It is up to you to take it or leave it. You canimplement ITIL the way it works best for you.

    ITIL is not a standard

    ExplanationQuick Facts

    Company Confidential

    Service Delivery & Support

    Service Delivery

    When you prepare for the service

    The homework which you do beforeintroducing the service into live environment

    Service Support

    The support which you provide to the userswho use your service

  • 8/12/2019 ITIL v3 Nov 2011

    15/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    ITIL v2.0 - In common use

    Service Support & Service Delivery Sets

    Capacity

    Management

    Availability

    Management

    IT Service Continuity

    Management

    Incident

    Management

    Problem

    Management

    Change

    Management

    Configuration

    Management

    Release

    Management

    IT

    Infrastructure

    IT

    Infrastructure

    security

    security

    ServiceDeskServiceDesk

    Financial

    Management

    Service Level

    Management

    Company Confidential

    ITIL Version 3 Model

    ITIL v3.0 provides worldrecognized best practicesfor ITSM Sources for best practices include

    Public Frameworks

    Standards

    Proprietary knowledge oforganizations

    Generally best practices are thosethat are successful in wide industryuse how others are doing it

  • 8/12/2019 ITIL v3 Nov 2011

    16/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    The Five Phases

    Service Strategy: To attain market focus Where and how to compete? Setting Policies &Objectives

    Service Design: To prepare it the best With optimized constraints

    Service Transition: Managing Changes With smooth transition

    Service Operation: Handhold your customers Provide Stable ongoing support

    Continual Service Improvement Make it better and better (Learning & Improvement)

    Company Confidential

    What is in the books? Service Strategy - Practical Decision-Making

    Helps the Top Management take appropriate business decisions

    Provides guidance on Policies and Setting objectives

    Service Design - Pragmatic Service Blueprint Focuses on design of Service Models, technology architecture, process and

    measurement systems Decisions on: Outsource, shared services, co-source models? How to decide & how to

    do it

    Service Transition: Managing change, risk & QA Supports

    Managing organization & cultural change during transition Control on the changes, keeping the SKMS update Provides handholding support to service operation

    ELS

    Service Operation: Responsive, stable services Through

    Service Desk and other functions and processes

    Continual Service Improvement: Measures that mean something &improvements that work Ensures

    Overall health of ITSM Portfolio alignment in real Growth and maturity of Service Management practice

  • 8/12/2019 ITIL v3 Nov 2011

    17/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    3 Implementation Levels

    Strategic Level: Where decisions aremade, policies set & funding levels areset

    Tactical Level: Where decisions andpolicies are implemented within theallotted budgets

    Operational Level: Where decisionstranslate into day-to-day actions and

    policies affect working practices withinfinancial constraints

    Company Confidential

    2 Escalation Models

    Horizontal or Functional

    Throw more expertise

    Vertical or Hierarchical Throw more power

  • 8/12/2019 ITIL v3 Nov 2011

    18/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    ITIL v3.0Qualification

    scheme

    ITIL v3 Highlights

    Company Confidential

    Some Basic Concepts

    PLAN

    Act DO

    Check

    Deming Circle

  • 8/12/2019 ITIL v3 Nov 2011

    19/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 1

    Company Confidential

    What is a Function?

    A department, a group of people working together

    to deliver an important set of tasks, examples offunctions include HR, Admin, SysAdmin, Financeetc

    A function is a logical concept that refers to thepeople and automated measures and executes

    a defined process, an activity or

    a combination of processes or activities

    In larger organizations a function may be brokenup and performed by several departments, teams

    and groups, or it may be embodied within a singleorganizational unit.

    Company Confidential

    What is a Process?

    A series of steps, all processes havespecific characteristics. These are:

    1. It is measurable

    2. It delivers a specific result

    3. It responds to a specific event

    4. It delivers its primary results to a customeror stakeholder

    A process does not necessarily need to betimely

  • 8/12/2019 ITIL v3 Nov 2011

    20/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Company Confidential

    More..

    Procedure: A Set of how to

    Roles: A Set of responsibilities

    Defined in a process and assigned to aperson or team.

    One person or team may have multiple roles

    Company Confidential

    Used for a process or a service

  • 8/12/2019 ITIL v3 Nov 2011

    21/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Service Strategy

    Making sense of the largest picture

    Practical Decision Making

    Company Confidential

    Service Lifecycle Mapping

  • 8/12/2019 ITIL v3 Nov 2011

    22/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Company Confidential

    Goals & Objectives of SS

    Goal is to help service providers to operate and grow successfully in the long-term

    provide the ability to think and act in a strategic manner

    Objectives:

    To provide direction for

    Growth

    Prioritizing investments and

    Defining outcomes

    against which the effectiveness of service management is measured

    To influence organizational attitudes and culture towards thecreation of value for customers through services

    To ensure effective communication, coordination, and control amongvarious parts of a service organization

    Company Confidential

    Concept of Utility and Warranty

    UTILITY

    WARRANTY

    T/F

    T/F

    T/F

    Fit forpurpose?

    Fit for use?

    OR

    AND

    Performance

    supported?

    Constraints removed?

    Available enough?

    Capacity enough?

    Continuous enough?

    Secure enough?

    T: TrueF: False

    Value-createdAND

    Two key elements which create value

  • 8/12/2019 ITIL v3 Nov 2011

    23/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Company Confidential

    Resources and Capabilities

    A1

    A2

    A3

    A4

    A5

    A9

    A8

    A7

    A6

    Capabilities Resources

    Management

    Organization

    Processes

    KnowledgeKnowledge

    People

    Financial capital

    Infrastructure

    Applications

    InformationInformation

    People

    Tangible & Intangible Assets

    Company Confidential

    SS Four Main Activities

    1. Define the market

    2. Develop the offerings

    3. Develop strategic assets

    4. Prepare for execution

  • 8/12/2019 ITIL v3 Nov 2011

    24/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Company Confidential

    Processes in Service Strategy(SS)

    1. Service Portfolio Management (SPM)

    2. Demand Management

    3. Finance Management

    Company Confidential

    Service Portfolio

    ServiceImprovement

    Plan

    Customer3

    Customer2

    Customer1

    MarketSpace 1

    MarketSpace 2

    MarketSpace 3

    Linked byservices

    Third-partyServices

    Market potential

    for services

    ServicePortfolio

  • 8/12/2019 ITIL v3 Nov 2011

    25/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Company Confidential

    SPM Goal & Objectives

    Goal of SPM is to Manage ServiceManage ServicePortfolioPortfolio by considering services interms of the business valuebusiness value theyprovide

    Service Portfolio Management is a dynamic method fora dynamic method for

    governing investmentsgoverning investments in service management acrossthe enterprise and managing them for value.

    Company Confidential

    SPM Process

    ServiceStrategy

    Define

    Analyse

    Approve

    Charter

    Inventories Business Case

    Value Proposition Prioritization

    Service Portfolio

    Authorization

    Communication Resource allocation

  • 8/12/2019 ITIL v3 Nov 2011

    26/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Company Confidential

    Understanding SLP

    SLP: a defined level of Utility and Warranty for aSLP: a defined level of Utility and Warranty for aparticular Service Packageparticular Service Package.

    Each SLP is designed to meet the needs of a

    Pattern of Business Activity PBA

    Company Confidential

    RACI Model

    The RACI model suggested in service strategyhelps in defining roles and responsibilities

    R Responsible

    A Accountable

    C Consulted

    I Informed

    One of more persons can be responsible for atask but only one person can be accountable

    Process owner is an I in the RACI matrix, what isexpected out of him?

  • 8/12/2019 ITIL v3 Nov 2011

    27/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Company Confidential

    Risk & Investment Decision

    VentureNew Market

    Growth

    New services Existing market

    DiscretionaryEnhance existing services

    Non-DiscretionaryMaintain Existing services

    Core

    Maintain Business critical services

    Transform the

    Business (TTB)

    Grow theBusiness (GTB)

    Run the Business(RTB)

    Risk

    Company Confidential

    Demand Mgmt Goal &

    ObjectivesGoal

    To understand and influence CustomerTo understand and influence Customerdemanddemand for Services and

    Provide capacity to meet these demandsProvide capacity to meet these demands

    Please note: At a Strategic level Demand Management can involve

    analysis of Patterns of Business Activity and User Profiles.

    At a Tactical level it can involve use of Differential Charging toencourage Customers to use IT Services at less busy times.

    It is very closely linked to capacity management

  • 8/12/2019 ITIL v3 Nov 2011

    28/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Company Confidential

    Finance Management Objectives

    Enhanced decision making

    Speed of change

    Service Portfolio Management

    Financial compliance and control

    Operational control

    Value capture and creation

    Company Confidential

    Activities of FM

    Budgeting

    Accounting

    Reporting

    Charging

    Concept of Differential charging

  • 8/12/2019 ITIL v3 Nov 2011

    29/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 2

    Company Confidential

    Typical Business Case Structure

    Introduction Presents the business objectives addressed by the service

    Methods and assumptions Defines the boundaries of the business case, such as time

    period, whose costs and whose benefits

    Business impacts The financial and non-financial business case results

    Risks and contingencies The probability that alternative results will emerge.

    Recommendations Specific actions recommended.

    Company Confidential

    Service Strategy Processes

    Service Portfolio Management

    Finance Management

    Demand Management

  • 8/12/2019 ITIL v3 Nov 2011

    30/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Service Design

    Pragmatic Service Blueprint

    Company Confidential

    Service Lifecycle Mapping

  • 8/12/2019 ITIL v3 Nov 2011

    31/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Company Confidential

    Goals & Objectives of SD

    DesigningDesigning

    services to satisfy business objectives, based onthe quality, compliance, risk and securityrequirements

    DeliveringDelivering

    more effective and efficient IT and businesssolutions and services aligned to business needs

    CoordinatingCoordinating

    all design activities for IT services to ensureconsistency and business focus

    Company Confidential

    Service Design Helps to

    Reduce Total Cost of Ownership (TCO)

    Improved quality & consistency ofservice

    Better handling of new or changedservices

    Improved service alignment with

    business Improved IT governance

    More effective SM and IT processes

  • 8/12/2019 ITIL v3 Nov 2011

    32/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Company Confidential

    Five major areas of ServiceDesign

    1. Service Portfolio Design Understand Service Portfolio, the SLPs and the

    Service Models (i.e. Structure and Dynamics)

    2. Service Design Identification of Business Requirements,

    definition of Service requirements and design ofServices

    3. Technology and architectural design4. Process design

    The Process Steps for each phase in Life Cycle

    5. Measurement design What all will be measured for each Process,Service and Technology Item (PST)

    Company Confidential

    Measurement Design

    If you cant measure it you cant manage it.

    Four types of metrics

    ProgressProgress: milestones and deliverables in thecapability of the process

    ComplianceCompliance: compliance of the process togovernance requirements, regulatory requirementsand compliance of people to the use of the process.

    EffectivenessEffectiveness: the accuracy and correctness of the

    process and its ability to deliver the right result EfficiencyEfficiency: the productivity of the process, its

    speed, throughput and resource utilization.

  • 8/12/2019 ITIL v3 Nov 2011

    33/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Company Confidential

    Different Sourcing Approaches

    In sourcingIn sourcing Utilizing internal resources

    OutsourcingOutsourcing Utilizing resources externalorganisation.

    CoCo--sourcingsourcing Often a combination of in & out sourcing

    Partnership or multi-sourcing Strategic partnerships

    Business Process Outsourcing (BPO)(BPO) Entirebusiness process or function outsourced

    Application Service Provision (ASP)(ASP) Applications ondemand

    Knowledge Process Outsourcing (KPO)(KPO) - Domain-based processes and business expertise

    Company Confidential

    Service Design Package

    Document (s)Document (s) defining all aspects of anall aspects of anIT ServiceIT Service and its Requirementsthrough each stage of its Lifecycle.

    A Service Design Package is producedproducedfor each new IT Service, major Change,for each new IT Service, major Change,or IT Service Retirement.or IT Service Retirement.

    SDP not produced for an emergencySDP not produced for an emergencychangechange

  • 8/12/2019 ITIL v3 Nov 2011

    34/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Company Confidential

    SCM - Scope, Goals & Objectives

    The goal is to ensure : that a Service Catalogue is produced and maintainedService Catalogue is produced and maintained,

    it contains accurate informationit contains accurate information on all operational & plannedservices

    Objectives:

    manage the information contained within the ServiceCatalogue

    ensure accuracy in

    current details, status, interfaces and dependencies

    of all services in scope

    Scope: All services that are being transitioned or have been transitioned

    to the live environment

    Company Confidential

    SCM Basic Concepts

    Business Service Catalogue contains

    details of all the Business services

    relationships to the business units and

    business process that rely on the IT services

    (This is the customer(This is the customers view of the Service Catalogue)s view of the Service Catalogue)

    Technical Service Catalogue contains

    details of all the IT services

    relationships to the supporting services shared services, components and CIs necessary

    to support the provision of the service to thebusiness

    (As you see it from inside)(As you see it from inside)

  • 8/12/2019 ITIL v3 Nov 2011

    35/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Company Confidential

    SCM Activities

    All services in operation are recorded inService Catalogue

    Ensure that the Information in Servicecatalogue is

    Accurate

    Up-to-date

    Consistent

    Backed up

    Company Confidential

    SLM - Goals

    The goal of Service Level Management isto ensure that:

    An agreed level of IT service is providedagreed level of IT service is provided forall current IT services

    Future services are delivered to agreedachievable targets

    Proactive measures are takenProactive measures are taken to seek and

    implement improvements to the level ofservice delivered

  • 8/12/2019 ITIL v3 Nov 2011

    36/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Company Confidential

    SLM - Process

    Service CatalogueService Catalogue (Technical & Business)

    SLRSLR - Service Level Requirements

    SLASLA - Service Level Agreement OLAOLA - Operational Level Agreement

    UCUC - Underpinning Contract

    MeasurementMeasurement

    Service ReportingService Reporting

    SIPSIP - Service Improvement Program

    Company Confidential

    Designing SLA Structures

    Separate SLA for each customercovering multiple services

    One SLA for all the customersthat use that service

  • 8/12/2019 ITIL v3 Nov 2011

    37/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Company Confidential

    Designing SLA Structures

    Multilevel SLAs Reduces duplication of effort

    while still providingcustomization

    At corporate level

    All generic issues are covered

    At customer level Issues specific to the customer

    are covered

    At Service Level

    All issues relevant to specificservice in relation to a specificcustomer are covered

    Company Confidential

    Service Provider & Types

    Service Provider:An organizationsupplying services to one or more Internal orExternal Customers

    Service Provider is often used in short for IT Service Provider

    There are three archetypes of businessmodels for service provisioning:

    Type I internalinternal service provider

    Type II shared servicesshared services unit

    Type III externalexternal service provider

  • 8/12/2019 ITIL v3 Nov 2011

    38/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Company Confidential

    SLM Key Activities

    Be aware of changing business needsEnsure all SLRs are identified, understood

    and documented

    Negotiating and agreeing service levels(internal or external)

    Formally documenting these levels ofservice in SLAs / OLAs

    Ensure an accurate Service Portfolio,

    Service Catalogue and all SLM documentsReport through SLAM Chart

    Company Confidential

    SLM Challenges

    Who do we negotiate with?

    A lack of accurate input, involvement andcommitment from the business and customers

    The tools and resources required to agree,document, monitor, report and reviewagreements and service levels

    The process becomes a bureaucratic,

    administrative process rather than an activeand proactive process delivering measurablebenefit to the business

  • 8/12/2019 ITIL v3 Nov 2011

    39/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 3

    Company Confidential

    SLM KPIs

    Percentage reduction in SLA targets missed Percentage reduction in SLA targets

    threatened

    Percentage increase in customer perceptionand satisfaction of SLA achievements, viaservice reviews and Customer SatisfactionSurvey responses

    Percentage reduction in SLA breachescaused because of third-party supportcontracts (underpinning contracts) & internalOLAs.

    Company Confidential

    Availability Mgt - Goals & Scope

    Goal : to ensure that

    level of service availability delivered in all services is

    matched to or exceeds

    the current and future agreed needs of the business

    in a cost-effective manner

    Scope :

    Designing, implementation, measurement, management

    and improvement of IT service and component availability

    And Not the business process

  • 8/12/2019 ITIL v3 Nov 2011

    40/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Company Confidential

    Availability Basic Concepts

    Fault tolerance (Resilience) Availability (MTBF)

    Reliability (MTBSI)

    Maintainability (MTTR)

    Serviceability (Third Party)

    MTBSI = MTBF + MTTR

    FARMSFARMS

    Vital Business FunctionVital Business Function

    Company Confidential

    Definitions

    Availability The ability of a service, component or CI to perform its agreed

    function when required. It is often measured and reported as apercentage

    Reliability A measure of how long a service, component or CI can perform its

    agreed function without interruption.

    Serviceability The ability of a third-party supplier to meet the terms of their

    contract. Often this contract will include agreed levels ofavailability, reliability and/or maintainability for a supportingservice or component

    Maintainability A measure of how quickly and effectively a service, component or

    CI can be restored to normal working after a failure. Fault tolerance

    The ability of an IT service, component or CI to continue tooperate correctly after failure of a component part.

    The term Vital Business Function (VBF) is used to reflect thebusiness critical elements of the business process supportedby an IT service

  • 8/12/2019 ITIL v3 Nov 2011

    41/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Company Confidential

    Availability Management

    Produce and maintain Availability Plan Provide advice and guidance on all availability-

    related issues

    Ensure availability achievements meet agreedtargets

    Assist with the diagnosis and resolution ofavailability related incidents and problems

    Ensure proactive and cost-effective measures to

    improve the availability

    Company Confidential

    ISM (Information Security Mgmt)

    Goal and scope The goal of the ISM process is to align IT

    security with business security and ensure thatinformation security is effectively managed in allservice and Service Management activities

    ISM must ensure that an Information Security Policy is produced,maintained and enforced

    Scope -The ISM process should cover use and

    misuse of all IT systems and services for all ITsecurity issues

    Important: ISP should be available to All

  • 8/12/2019 ITIL v3 Nov 2011

    42/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Company Confidential

    ISM

    The objective of information securitymanagement is to

    protect the interests of those relying on information,systems and communications from harm resultingfrom failures of

    Availability

    confidentiality and

    integrity

    An effective Information Security Policy available

    to everybody internal or external to theorganization

    Company Confidential

    Supplier Management

    To manage suppliers and relatedinformation, ensuring value for money.

    Scope includes all suppliers and contractsneeded to support the IT services

  • 8/12/2019 ITIL v3 Nov 2011

    43/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Company Confidential

    SM Basic Concepts

    The Supplier and Contracts Database(SCD )

    Supplier and Contract Management andperformance information and reports

    Supplier categorization

    Company Confidential

    SM Responsibilities

    Providing assistance in the developmentand review of SLAs, contracts,agreements or any other documents forthird-party suppliers

    Maintaining and reviewing a Supplierand Contracts Database (SCD)

  • 8/12/2019 ITIL v3 Nov 2011

    44/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Company Confidential

    Capacity Management

    The goal of the Capacity Managementprocess is to ensure that

    cost-justifiable IT capacity is matched to thecurrent and future agreed needs of the business ina timely manner

    Scope :

    IT Services

    IT Components

    Resources

    Company Confidential

    Capacity Management

    Concepts Balancing costs against resources

    needed

    Balancing supply against demand

    Business Capacity Management

    Service Capacity Management

    Component Capacity Management

  • 8/12/2019 ITIL v3 Nov 2011

    45/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Company Confidential

    Capacity Management - Methods

    Application Sizing To estimate the resource requirements to support a

    proposed change to an existing service (throughextrapolation)

    Modeling

    To predict the behaviour of IT services under a givenvolume and variety of work.

    Demand Management

    To influence user and customer demand for IT

    services and manage the impact on IT resources.

    Company Confidential

    Capacity Database

    Logical Database not just one physical database

    CMIS Capacity Management Information System

  • 8/12/2019 ITIL v3 Nov 2011

    46/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Company Confidential

    Capacity Management Responsibilities

    Ensuring adequate IT capacity to meet requiredlevels of service

    Identifying capacity requirements of business

    Understanding the current usage profile and themaximum capacity

    Sizing all proposed new services and systems,to ascertain capacity requirements

    (Above points apply to IT Services as well as IT Components)

    Company Confidential

    ITSCM Basic Concepts

    Disaster - an event that affects a service orsystem such that significant effort is required torestore the original performance level

    Business Impact Analysis

    The purpose of a Business Impact Analysis(BIA) is to quantify the impact to the businessthat loss of service would have

  • 8/12/2019 ITIL v3 Nov 2011

    47/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Company Confidential

    ITSCM - Goal & Scope

    Goal Support the larger business continuity plan

    Objective

    To ensure that required IT technical and servicefacilities can be resumed within required, and agreed,business timescales following a major disruption

    Scope

    Services, computer systems, networks, applications,data repositories, telecommunications, environment,

    technical support and Service Desk Also includes resources (People)

    Company Confidential

    ITSCM Stages

    Cold Standby

    More than 72 hours

    Warm Standby

    24 to 72 hours

    Hot Standby

    Less than 24 hours

  • 8/12/2019 ITIL v3 Nov 2011

    48/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Company Confidential

    ITSCM Responsibilities

    Performing Business Impact Analyses for allexisting and new services

    Implementing and maintaining the ITSCMprocess, in accordance with the organizationsBCM process

    Ensuring ITSCM plans, risks and activities arecapable of meeting the agreed targets underall circumstances

    Performing risk assessment and risk

    management to avert disasters wherepractical

    Company Confidential

    Service Design Processes

    Service Catalogue Management

    Service Level Management

    Capacity Management

    Availability Management

    Service Continuity Management

    Information Security Management

    Supplier Management

  • 8/12/2019 ITIL v3 Nov 2011

    49/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 4

    Service TransitionManaging Change, Risk & Quality

    Assurance

    Company Confidential

    Service Lifecycle Mapping

  • 8/12/2019 ITIL v3 Nov 2011

    50/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 5

    Company Confidential

    Service Transition Helps

    Set customer expectations on the performanceand use of the new or changed service

    Ensure there is minimal unpredicted impactwhile introducing new services

    Increase proper use of the services andunderlying applications and technologysolutions

    Provide clear and comprehensive plans for

    transition

    Company Confidential

    Change Management Objectives

    The objective of the ChangeManagement Process is :

    To ensure that changes are recordedand then evaluated, authorized,prioritized, planned, tested,implemented, documented andreviewed in a controlled manner.

  • 8/12/2019 ITIL v3 Nov 2011

    51/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 5

    Company Confidential

    Service Change

    The addition, modification or removal ofauthorized, planned or supported serviceor service component and its associateddocumentation.

    The Service Portfolio provides a cleardefinition of all current, planned andretired services.

    Company Confidential

    Change types

    NormalNormal Change

    Regular Default change

    StandardStandard Change

    Pre authorized

    EmergencyEmergency Change

    Which must be introduced ASAP

    ECAB

  • 8/12/2019 ITIL v3 Nov 2011

    52/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 5

    Company Confidential

    ChangeProcess

    scheduled

    closed

    *Includes build andtest the change

    CreateRFC

    Changeproposal(optional)

    AuthorizeChange proposal

    Record theRFC

    ReviewRFC

    Assess andevaluate change

    AuthorizeChange

    Plan updates

    Co-ordinate changeimplementation*

    Initiatorrequested

    ChangeManagement Ready for evaluation

    Changeauthority

    ChangeManagement

    ChangeManagement

    Evaluation report

    implemented

    Review and closechange record

    Work orders

    Work orders

    authorized

    Ready for decision

    UpdatechangeandconfigurationinformationinCMS

    Company Confidential

    Seven Rs of Change Management

    Who RAISEDRAISED the change?

    What is the REASONREASON for the change?

    What is the RETURNRETURN required from the change?

    What are the RISKSRISKS involved in the change?

    What RESOURCESRESOURCES are required to deliver thechange?

    Who is RESPONSIBLERESPONSIBLE for the build, test and

    implementation of the change? What is the RELATIONSHIPRELATIONSHIP between this change

    and other changes?

  • 8/12/2019 ITIL v3 Nov 2011

    53/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 5

    Company Confidential

    Change Authorization Model

    Communications,Decisions and

    Actions

    ChangeAuthority

    Examples ofConfiguration Level

    Impacted

    IT ManagementBoard

    CAB orEmergency CAB

    Local Authorization

    Change impacts multipleservices or Organizations

    Divisions

    Change which impactsonly local or service group

    Level 1

    Communications,Escalations for RFCs,

    Risks, Issues

    Level 2

    Level 3

    Level 4

    Business ExecutiveBoard

    Standard Change

    High Cost / Risks Change Requires Decisions

    from Executives

    Company Confidential

    Change Management KPIs

    The top five risk indicators of poorChange Management are:

    Unauthorized changes

    Above zero is unacceptable

    Unplanned outages

    A low change success rate

    A high number of emergency changes Delayed project implementations.

  • 8/12/2019 ITIL v3 Nov 2011

    54/88

  • 8/12/2019 ITIL v3 Nov 2011

    55/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 5

    Company Confidential

    SACM Objectives

    To define and control the componentsof services and infrastructure andmaintain accurate configurationinformation on the historical, plannedand current state of the services andinfrastructure.

    Company Confidential

    Configuration Management System

    A set of tools and databases that are used to managean IT Service Provider's Configuration data.

    The CMS also includes information about Incidents,Problems, Known Errors, Changes and Releases; andmay contain data about employees, Suppliers,locations, Business Units, Customers and Users.

    The CMS includes tools for collecting, storing,managing, updating, and presenting data about all

    Configuration Items and their Relationships. The CMS is maintained by Configuration

    Management and is used by all IT ServiceManagement Processes.

  • 8/12/2019 ITIL v3 Nov 2011

    56/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 5

    Company Confidential

    Configuration Item (CI)

    CI: Any Component that is managed theformal control of Change Management

    Information about each CI is recorded ina Configuration Record within theConfiguration Management System andis maintained throughout its Lifecycle byConfiguration Management.

    Company Confidential

    Configuration Item - CI

    Scope:

    CIs typically include

    IT Services

    Hardware

    Software

    Buildings

    People Formal Documentation

    e.g. Process documentation and SLAs

    SKMS

    CMS, CMDB,KEDB

    &

    other DBs

  • 8/12/2019 ITIL v3 Nov 2011

    57/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 5

    Company Confidential

    CMS Configuration Mgmt System

    Structured

    CMDBs

    CMDB1

    CMDB2

    CMDB3

    PresentationLayer

    Portal

    Change and ReleaseView Schedules/plans

    Change Request

    Status ChangeAdvisory Board

    agenda and minutes

    Asset ManagementView

    Financial AssetAsset Status ReportsAsset Statements and

    BillsLicence ManagementAsset Performance

    ConfigurationLifecycle View

    Projectconfigurations

    Service, Strategy,Design, Transition,

    Operationsconfigurationbaselines and

    changes

    TechnicalConfiguration

    ViewService

    ApplicationsApplicationEnvironment

    Test EnvironmentInfrastructure

    Quality ManagementView

    Asset and

    ConfigurationManagement

    Policies, Processes,Procedures, forms,

    templates, checklists

    Service Desk ViewUser assets

    User c onfiguration,

    Changes, Releases,Asset and Configuration

    item and relatedincidents, problems,

    workarounds changes

    KnowledgeProcessing

    Layer

    InformationIntegration

    Layer

    Data andInformation

    Sourcesand Tools

    Search, Browse, Store, Retrieve, Update, Publish, Subscribe, Collaborate

    Query and Analysis ReportingPerformance Management

    Forecasting, Planning, Budgeting ModellingMonitoring Scorecards,

    Dashboards Alerting

    Customer/ User Service Application Infrastructure mapping

    ServicePortfolio Service

    Package

    ServiceRelease

    ServiceChange

    Integrated Asset and ConfigurationInformation

    Common ProcessData and

    Information

    SchemaMapping

    Meta DataManagement

    DataReconciliation

    Extract,Transform,

    Load

    DataSynchronization

    Mining

    Project DocumentFilestore

    ProjectSoftware

    Definitive MediaLibrary

    Definitive

    Document Library

    DefinitiveMedia Library1

    DefinitiveMedia Library2

    Data Integration

    Discovery,Asset

    Managementand audit tools

    SoftwareConfiguration

    Management

    PlatformConfiguration Tools

    e.g. StorageDatabase

    Middleware NetworkMainframe

    Distributed Desktop

    EnterpriseApplications

    Access ManagementHuman Resources

    Supply ChainManagement

    Customer RelationshipManagement

    Company Confidential

    Generic Requirement of a CMS

    Self Help capability

    Workflow or Process Engine

    Integrated CMS

    Discovery/Deployment /Licensing Technology

    Remote Control

    Diagnostic Utilities

    Reporting Dashboards

    Integration with Business ServiceManagement

  • 8/12/2019 ITIL v3 Nov 2011

    58/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 5

    Company Confidential

    Definitive Media Library (DML)

    One or more locations in which the definitive andapproved versions of all software Configuration Itemsare securely stored. The DML may also contain associated CIs such as licenses and

    documentation.

    The DML is a single logical storage area even if there aremultiple locations.

    All SW in the DML is under the control of Change andRelease Management and is recorded in theConfiguration Management System.

    SW from the DML only is acceptable for use in aRelease

    Company Confidential

    RDM - Goal

    Release and Deployment ManagementRelease and Deployment Management

    Aims to build, test and deliver the capability toprovide the services specified by ServiceDesign that will accomplish the stakeholdersrequirements and meet the intended objectives.

    Its Goal

    is to deploy releases into production andestablish effective use of the service in order todeliver value to the customer and be able tohandover to service operations.

  • 8/12/2019 ITIL v3 Nov 2011

    59/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 5

    Company Confidential

    RDM Scope

    The scope of Release and DeploymentManagement includes:

    the processes, systems and functions topackage, build, test and deploy a releaseinto production and establish the servicespecified in the Service Design packagebefore final handover to service operations.

    Company Confidential

    Release Unit

    Components of an IT Service that arenormally Released together. (Package)

    A Release Unit typically includes sufficientComponents to perform a useful Function.

    For example one Release Unit could be aDesktop PC, including Hardware, Software,Licenses, Documentation etc.

    A different Release Unit may be the completePayroll Application, including IT OperationsProcedures and User training.

  • 8/12/2019 ITIL v3 Nov 2011

    60/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Company Confidential

    RDM Common Approaches

    Three Approaches

    Big bang vs phased

    Push and pull

    Automation vs manual

    Four Types

    Full, Package, Delta, Emergency

    Company Confidential

    ELS

    End

    SKMS/CMS

    Yes

    No

    Start

    Operate Service

    Collect serviceperformance data

    Plan and manageimprovements/riskmitigation/change

    Report serviceperformanceachieved

    Compare progressagainst ELS plan

    Verify servicestability

    Exit criteriamet?

    Identify quick wins/improvements/riskmitigation/changes

    Incident andProblem

    Management

    Change andConfiguration

    Management

    Service LevelManagement

    Provides resourcesfor actual release

  • 8/12/2019 ITIL v3 Nov 2011

    61/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Company Confidential

    Service V model - Example

    Define Customer/Business Requirements

    Define ServiceRequirements

    Design ServiceSolution

    Design ServiceRelease

    Develop ServiceSolution

    Componentand Assembly Test

    ServiceAcceptance Test

    1a

    2a

    3a

    4a

    5a 5b

    4b

    3b

    2b

    1b

    ServiceComponentBuild and

    Test

    Internal andexternal suppliers

    Level 1

    Level 2

    Level 5

    Level 4

    Level 3

    Service Review Criteria/Plan

    Service Acceptance Criteria/Plan

    Service Operational Criteria/Plan

    Service Release TestCriteria and Plan

    BL

    Levels ofconfiguration andtesting

    Baseline point

    Deliveries frominternal andexternal suppliers

    Validate Service

    Packages, Offeringsand contracts

    Service OperationalReadiness Test

    Service ReleasePackage Testleft-hand side

    represents the

    specification

    of the service

    requirements

    The right-handsidefocusesonthevalidationactivities

    that areperformed

    Company Confidential

    Service Knowledge Management System(SKMS)

    A set of tools and databases that are usedto manage knowledge and information.

    The SKMS includes the ConfigurationManagement System, as well as othertools and databases.

    The SKMS stores, manages, updates, and

    presents all information that an IT ServiceProvider needs to manage the fullLifecycle of IT Services.

  • 8/12/2019 ITIL v3 Nov 2011

    62/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Company Confidential

    KM Hierarchy

    DIKW Wisdom can not be stored in a tool

    Company Confidential

    Service Transition Processes

    Change Management

    Service Asset and Configuration Mgt

    Release and Deployment Mgt

    Service Validation and Testing

    Service Knowledge Mgt System

  • 8/12/2019 ITIL v3 Nov 2011

    63/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Service OperationResponsive, Stable Services

    Company Confidential

    Service Lifecycle Mapping

  • 8/12/2019 ITIL v3 Nov 2011

    64/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Company Confidential

    Goals & Objectives of SO

    The purpose of Service Operation is to: Coordinate and carry out the activities

    Work on processes required to deliver andmanage services at agreed levels

    Manage the technology that is used todeliver and support services.

    Company Confidential

    Business Value of SO

    Service value is modeled in ServiceStrategy

    The cost of the service is designed,predicted and Validated in ServiceDesign and Service Transition

    Measures for optimization are identified

    in Continual Service Improvement Service Operations is where the value is

    seen

  • 8/12/2019 ITIL v3 Nov 2011

    65/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Company Confidential

    Communications in SO

    Routine operational communication

    Communication between shifts

    Performance reporting

    Communication in projects

    Communication related to changes

    Communication related to exceptions

    Communication related to emergencies

    Training on new or customized processes and servicedesign

    Communication of strategy and design to ServiceOperation teams.

    Functions in ITIL V3

    ITIL v2 had only one function i.e. Service Desk, here we havefour categories

    TMF, AMF, ITOMF, SDF

  • 8/12/2019 ITIL v3 Nov 2011

    66/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Company Confidential

    Major SM Functions in ITIL V3

    TMF Technical Management Function Custodian of technical knowledge and expertise related to

    managing the IT

    AMF Application Management Function Custodian of technical knowledge and expertise related to

    managing applications Overlaps with Application Development

    ITOMF IT Operations Management Function Responsible for the daily operational activities needed to

    manage the IT Infrastructure Has IT Operations control & Facilit ies Management Overlaps with TMF & AMF

    SDF Service Desk Function SPOC Focuses on service restoration

    Company Confidential

    TMF & AMF

    TMF - Custodian of technical knowledge requiredto managing the IT infrastructure.

    Provides actual resources to support the ITSMLifecycle.

    AMF - Custodian of technical knowledgerequired to managing applications.

    Application Management is to applications whatApplication Management is to applications what

    Technical Management is to the IT InfrastructureTechnical Management is to the IT Infrastructure. Plays a role in all applications, whether purchased ordeveloped in-house.

    One of the key decisions : Build or Buy

  • 8/12/2019 ITIL v3 Nov 2011

    67/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Company Confidential

    ITOMF

    Responsible for the daily operational activities neededto manage the IT Infrastructure

    IT Operations Control Ensures that routine operational tasks are carried out

    Provides centralized monitoring and control activities

    Uses an Operations Bridge or Network Operations Centre

    Facilities Management Management of the physical IT environment

    (Data centers, computer rooms, etc)

    Please note:

    In large Data Centers Technical and Application Management are co-located with IT Operations

    In some organizations many physical components of the ITInfrastructure are outsourced and Facilities Management may includethe management of the outsourcing contracts

    Company Confidential

    SDF Objectives

    Restore the normal service to the usersas quickly as possible(In this context restoration of service is meant in the widest

    possible sense)

    It is SPOC Single point of contact

    While this could involve fixing a technicalfault, it could equally involve fulfilling a

    service request or answering a query oranything that is needed to allow the users toreturn to working satisfactorily

  • 8/12/2019 ITIL v3 Nov 2011

    68/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Company Confidential

    Local Service Desk

    For Local business

    needs and onsite

    support

    Desktop support

    Network support

    Application support

    Systems andoperations support

    Third party support

    ThirdParty

    Support

    Service Desk

    Network &OperationSupport

    ApplicationSupport

    DesktopSupport

    LocalUser

    LocalUser

    LocalUser

    First line support

    Company Confidential

    Centralized Service Desk

    In multi location environmentlocal SD becomes expensive

    Central SD is establishedserving all locations

    All service request are loggedat a central physical location

    Key benefits

    Reduced operational costs

    Consolidated Mgmt reports.

    Better resource allocation

    ThirdParty

    Support

    Centralized

    Service Desk

    Network &OperationSupport

    ApplicationSupport

    DesktopSupport

    CustomerSite 1

    CustomerSite 2

    CustomerSite 3

    Second Line Support

  • 8/12/2019 ITIL v3 Nov 2011

    69/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 6

    Company Confidential

    Virtual Service Desk

    Virtual service desk can beaccessed from anywhere inthe world

    If the organization is MNC itgives same benefits ofcentralized service desk

    Maintains central databaseaccessible from alllocations

    The only difficulty is theperson required at VirtualSD needs to be specialist

    Follow The Sun Model

    ServiceMgmt

    Database (S)

    User S it e 1 User S it e a

    SydneyService Desk

    AmsterdamService Desk

    ParisService Desk

    LondonService Desk

    Modem

    Modem

    Wan

    Virtual Service Desk

    Internet

    TorantoService Desk

    Telephone

    Fax

    Lan

    Lan New YorkService Desk

    Local Users

    Local Users Remote UsersThird Party Supplier

    Service Desk

    Company Confidential

    SDF Staffing Options

    Technically Unskilled

    Technically Skilled

    Technically Experts

    Super User

  • 8/12/2019 ITIL v3 Nov 2011

    70/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    SDF Metrics

    Customer / User satisfaction (CSAT / USAT) Average handling time (AHT) Timely escalations and resolutions First call resolution (FCR)

    Time within which calls are answered. Call escalations as specified in SLA Restoration of service within acceptable time and in

    accordance with the SLA Timely information to users about current and future

    changes and errors.

    Conduct customer surveys to determine Is the telephone answered courteously? Are users given good advice to prevent incidents?

    Company Confidential

    Service Lifecycle Mapping

  • 8/12/2019 ITIL v3 Nov 2011

    71/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    Service Operation Processes

    Event Management

    Incident Management

    Request Fulfillment

    Problem Management

    Access Management

    Company Confidential

    EM - Scope, Goals & Objectives

    Provides the entry point for theexecution of Service Operationprocesses and activities.

    Provides a way of comparing actualperformance and behavior againstdesign standards and SLAs.

    Provides a basis for Service Assuranceand Reporting; and ServiceImprovement.

  • 8/12/2019 ITIL v3 Nov 2011

    72/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    EM Basic Concepts

    An event can be defined as any detectable ordiscernible occurrence

    that has significance for the management of the ITInfrastructure or the delivery of IT service

    Please Note:

    Events are typically notifications created by an ITservice, Configuration Item (CI) or monitoring tool

    Events that signify regular operation

    Events that signify an exception

    Events that signify unusual, but not exceptional,operation

    Company Confidential

    Alert

    A warning that a threshold has beenreached, something has changed, or aFailure has occurred.

    Alerts are often created and managedby System Management tools and aremanaged by the Event Management

    Process.

  • 8/12/2019 ITIL v3 Nov 2011

    73/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    IM - Scope, Goals & Objectives

    Objective: Restore normal service operation as quickly as possible and

    minimize the adverse impact on business operations, thusensuring that the best possible levels of Service quality andavailability are maintained.

    Scope: Any event which disrupts, or which could disrupt, a service.

    Events communicated directly by users/technical staff

    Incident Management is the process for dealing with allincidents; this can include failures, questions or queriesreported by the users (usually via a telephone call to theService Desk), by technical staff, or automatically detected and

    reported by event monitoring tools.

    Company Confidential

    Incident

    An unplanned interruption to an ITService or a reduction in the Quality ofan IT Service.

    Failure of a Configuration Item that hasnot yet impacted Service is also anIncident.

    For example Failure of one disk from a mirrorset.

  • 8/12/2019 ITIL v3 Nov 2011

    74/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    IM Basic Concepts

    Normal service operation is defined here asservice operation within SLA limits.

    Major incidents

    A separate procedure, with shorter timescalesand greater urgency, must be used for majorincidents.

    A definition of what constitutes a majorincident must be agreed and ideally mappedon to the overall incident prioritization system

    They will be dealt with through the majorincident process.

    Company Confidential

    IM Important Concepts

    Timescales

    Must be agreed for all incident-handling (IH)stages

    Incident Model

    Chronological order of the IH steps / Ownerof actions / Timescales and thresholds forcompletion of the Actions

    Major incident Procedure to be kept separate

  • 8/12/2019 ITIL v3 Nov 2011

    75/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    Impact, Urgency and Priority

    Priority = Impact X Urgency

    Planning/

    planned

    low -4

    < 48 hours

    medium -3

    < 24 hoursLow

    low -4< 48 hours

    medium -3< 24 hours

    high -2< 8 hoursMedium

    medium -3< 24 hours

    high -2< 8 hours

    critical -1< 1 hourHigh

    LowMediumHigh

    Impact

    Urgency

    Incident Model

    Company Confidential

    Incident Management - Process

    No

    No

    End

    No

    No

    From Event Mgmt From Web Interface User Phone Call Email TechnicalStaff

    Incident Identification

    Incident Logging

    Incident Categorization

    Service Request?Yes

    Incident Prioritization

    To Request Fulfilment

    Major Incident ProcedureYes

    Major Incident?

    Initial Diagnosis

    Yes Functional Escalation2/3 Level

    Yes Functional EscalationNeeded?

    Investigation& Diagnosis

    Resolution andRecovery

    Hierarchic EscalationNeeded?

    YesManagementEscalation

    Incident Closure

  • 8/12/2019 ITIL v3 Nov 2011

    76/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    IM Challenges

    The ability to detect incidents as early aspossible.

    Convincing all users that all incidents mustbe logged.

    Availability of information about problemsand Known Errors.

    Integration into the CMS.

    Integration into the SLM process

    Company Confidential

    IM KPIs

    Total numbers of Incidents

    Breakdown of incidents at each stage

    Size of current incident backlog

    Number and percentage of major incidents

    Mean elapsed time to achieve incidentresolution or circumvention, broken down by

    impact code Percentage of incidents handled within

    agreed response time.

  • 8/12/2019 ITIL v3 Nov 2011

    77/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    RF - Scope, Goals & Objectives

    To provide a channel for users to request andreceive standard services for which a pre-defined approval and qualification process exists

    To provide information to users and customersabout the availability of services and theprocedure for obtaining them

    To source and deliver the components ofrequested standard services (e.g. licenses andsoftware media)

    To assist with general information, complaints orcomments

    Company Confidential

    RF Basic Concepts

    Service Requests will usually be satisfiedby implementing a Standard Change

    The ownership of Service Requestsresides with the Service Desk, whichmonitors, escalates, dispatches and oftenfulfils the user request.

    Pre-defined Request Models whichtypically include some form of pre-approval by Change Management

  • 8/12/2019 ITIL v3 Nov 2011

    78/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    Service Request

    A request from a User for information,or advice, or for a Standard Change orfor Access to an IT Service.

    For example to reset a password, or toprovide standard IT Services for a newUser.

    Service Requests are usually handled

    by a Service Desk, and do not requirean RFC to be submitted.

    Company Confidential

    PM - Scope, Goals & Objectives

    Goal & Objective

    To prevent problems and resulting incidentsfrom happening, to eliminate recurringincidents and to minimize the impact ofincidents that cannot be prevented

    Scope:

    Four Ps of service management

  • 8/12/2019 ITIL v3 Nov 2011

    79/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 7

    Company Confidential

    Problem

    A cause of one or more Incidents.

    The cause is not usually known at thetime a Problem Record is created,and the Problem ManagementProcess is responsible for furtherinvestigation.

    Company Confidential

    Workaround

    Reducing or eliminating the Impact of anIncident or Problem for which a full Resolution isnot yet available.

    For example by restarting a failed ConfigurationItem.

    Workarounds for Problems are documented inKnown Error Records.

    Workarounds for Incidents that do not haveassociated Problem Records are documented inthe Incident Record.

  • 8/12/2019 ITIL v3 Nov 2011

    80/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 8

    Company Confidential

    Known Error

    A Problem that has a documented RootCause and a Workaround.

    Known Errors are created and managedthroughout their Lifecycle by ProblemManagement.

    Known Errors may also be identified byDevelopment or Suppliers.

    Company Confidential

    Known Error Data Base (KEDB)

    A database containing all Known ErrorRecords.

    This database is created by ProblemManagement and used by Incident andProblem Management.

    The Known Error Database is part of the

    Service Knowledge Management System.

  • 8/12/2019 ITIL v3 Nov 2011

    81/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 8

    Company Confidential

    Access Management - Goal

    To provide authorized users the necessaryrights to use a service or group of services

    Actual execution of policies and actionsdefined in Security and AvailabilityManagement

    Company Confidential

    Access Management Basic Concepts

    Access : level and extent of a services functionality ordata that a user is entitled to use

    Identity : distinguishing information about an individualwhich verifies their rank or status on the org-chart

    (Every user MUST have a unique identity)

    Rights or privileges: set of services a user is permittedto use

    (actual settings permitting access to a service or service group)

    Services or service groups: Services clubbed togetherinto a group to facilitate access management according tofunctional relevance

    Directory Services: a tool or technology used to manageaccess and privileges

  • 8/12/2019 ITIL v3 Nov 2011

    82/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 8

    Company Confidential

    Balances in Service Operation

    Internal versus external focus (ITServices versus Technologycomponents)

    Stability versus Responsiveness

    Quality of Service versus Cost ofService

    Reactive versus Proactive

    Company Confidential

    Cost versus Quality

    Costofservice

    Quality of Service(Performance, Availability, Recovery)

    Range of optimalbalance betweenCost and Quality

    Service

  • 8/12/2019 ITIL v3 Nov 2011

    83/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 8

    CSI7 Step Improvement Process

    Measures that Mean Something

    and Improvements that Work

    Company Confidential

    Service Lifecycle Mapping

  • 8/12/2019 ITIL v3 Nov 2011

    84/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 8

    Company Confidential

    Goal & Objectives of CSI

    The primary purpose of CSI is to continuallyalign and realign IT services to the changingbusiness needs by identifying and implementingimprovements to IT services that supportbusiness processes

    Objectives: Review, analyze and make recommendations on

    improvement opportunities

    Service levels

    Improve effectiveness and efficiency in delivering servicesby ensuring applicable quality practices are used

    Company Confidential

    Business Value of CSI

    Increased organizational competency

    Integration between people and processes

    Reduction of redundancy increasesbusiness throughput

    Minimized lost opportunities

    Assured regulatory compliance that willminimize costs and reduce risk

    Ability to react to change rapidly.

  • 8/12/2019 ITIL v3 Nov 2011

    85/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 8

    Company Confidential

    PDCA Model

    Businessrequirements

    Externalrequirements

    Securityrequirements

    Request fornew service

    Service and processmeasurements

    Improved employeemorale

    New changedservices

    More effective andefficient processes

    Customersatisfaction

    Businessresults

    Managementresponsibilities

    DOImplement

    CSI

    ACTModify

    CSI

    Continual Service Improvement

    PLANCSI

    CHECKMonitor, measureand review CSI

    Company Confidential

    CSI Model Based on SM Discipline

    What is the vision?

    Where do we want

    to be?

    How do we get there?

    Did we get there?

    Where are we now?

    How do we keepthe momentum going?

    Service & processimprovement

    Measurabletargets

    Baselineassessments

    Measurements &metrics

    Business vision,mission, goals and

    objectives

  • 8/12/2019 ITIL v3 Nov 2011

    86/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 8

    Company Confidential

    Measurement Business value

    To Validate To Direct

    To InterveneTo Justify

    Your Measurement Framework

    Why Measure ? Purpose of reports

    Company Confidential

    Performance Baselines

    Purpose:

    Markers Marking start point

    For later comparison (Important)

    Decision making Does it needimprovement ?

    Where to establish:

    Strategic goals and objectives Tactical process maturity

    Operational metrics and KPIs

  • 8/12/2019 ITIL v3 Nov 2011

    87/88

    Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note

    [email protected] +91 98994 26283 8

    Company Confidential

    Types of Metrics

    Technology metrics Component & application performance , availability

    etc

    Process metrics

    CSFs, KPIs and activity metrics for the servicemanagement processes

    Service metrics

    These metrics are the results of the end-to-endservice.

    Component metrics are used to compute the servicemetrics.

    Company Confidential

    The 7 Step Improvement

    Process

    Identify Vision Strategy Tactical Goals Operational Goals

    1. Define what youshould measure

    7. Implementcorrective action

    6. Present and use theinformation, assessment

    summary, action plans, etc.

    2. Define what youcan measure

    3. Gather the dataWho? How? When?Integrity of data?

    4. Process the dataFrequency? Format?System? Accuracy?

    5. Analyze the dataRelations? Trends?According to plan?Targets met?Corrective action?

    Goals

  • 8/12/2019 ITIL v3 Nov 2011

    88/88