itil v3 nov 2011
TRANSCRIPT
-
8/12/2019 ITIL v3 Nov 2011
1/88
-
8/12/2019 ITIL v3 Nov 2011
2/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283
Company Confidential
Agenda:
This training intends to provide you basiclevel understanding of ITIL (Foundation)so that
You can understand the vocabulary of ITService Management
You have basic concepts of IT ServiceManagement
You take these concepts back to your work
You can take EXIN/ISEB Foundation exam
Company Confidential
What is a Service?
And Service Outlook
-
8/12/2019 ITIL v3 Nov 2011
3/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283
Company Confidential
Lets learn from a little boy
This is the story of a small boy who calledup the lady of a house offering to cleanher garden at half of the price of what thecurrent gardener was charging
She said No..
The boy insisted again, she again said No
The boy pleaded again but finally hung up
Company Confidential
Lets learn from a little boy
Owner of the departmental store from where theboy called, offered job to the boy, thinking thatthe poor boy was in dire need
Boy said, No Sir, thank you..
The owner was surprised and asked why theboy was begging for the cleaning job from thatlady if he did not need one.
Boy said, Sir, I work for the same lady, I was justchecking the quality of my services to her
-
8/12/2019 ITIL v3 Nov 2011
4/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283
Company Confidential
What is a Service?
A Service is a means of delivering valueto customers, by facilitating outcomes thecustomers want to achieve without theownership of specific costs and risks
When we hire a taxi to airport do we ownthe costs and risks?
Service Outlook thinking with totality of user experience
Company Confidential
What is Industry Today?
IT / ITES BPO / KPO / LPO / CRO
Banking / Finance / Insurance Plastic Money / Virtual Money Overflowing FDIs / NRIs, HNIs
becoming VCs
FMCG Packed Food, New Products, New
Concepts
Education More than 2000 professional colleges
only in India today
Tourism Growing day by day
Manufacturing / Auto
Core engineering, branches like Civil,Mechanical, Electronics all are shiningback
Telecom Leading world players in domestic
markets Everyone owns a cellphone, millions of
users, connected networks
Retail Malls, Multiplexes everywhere
Real Estate / Construction Boom Everywhere, increasing
property rates
Media / Fashion / Textile Do our parents know Job Titles like
RJ, VJ?
Aviation 5 Years ago what was Aviation?
Hospitality / Hotels No one thought of Event
Management earlier? Today people outsource their
marriage
Medical Need of the time Medical Tourism
Medical aid is very costly there
And New things like Online bettingand many more Have you seen the movie Luck?
-
8/12/2019 ITIL v3 Nov 2011
5/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283
Company Confidential
Key Features of Industry Segments
Industry is moving towards being a ServiceIndustry
So there is need of Service Management today
Information Technology is playing a verystrategic role in every sector
You cant scale up without a very effective use of ITin your business
Increasing competition leads to outsourcing /strategic partnerships
Should I buy a taxi and own it if 20 people travel toairport daily (@ 1000 per person)
Company Confidential
Is IT a Service?
Yes and if IT is,
We need the discipline of
IT Service ManagementIT Service Management
If IT is a Service then it needs to be managed.
ITSM is the discipline of managing IT as aservice
There are 4 Ps of Service Management; theyare People, Process, Products and Partners.
-
8/12/2019 ITIL v3 Nov 2011
6/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283
Company Confidential
Gartner Group* Maturity Model
Fire Fighting
Reactive
Proactive
Service
Value
IT tellingbusiness, howto be a better
business
* Governments of many countries follow Gartners recommendations
Service must always
deliver Value to its
customers
Company Confidential
Service Management as a Practice
Service Management is a set of organizational capabilities for
providing value to customers in the form ofservices
-
8/12/2019 ITIL v3 Nov 2011
7/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283
Company Confidential
Service Management - A Discipline
What is the vision?
Where do we wantto be?
How do we get there?
Did we get there?
Where are we now?
How do we keepthe momentum going?
Service & processimprovement
Measurabletargets
Baselineassessments
Measurements &metrics
Business vision,
mission, goals andobjectives
CSI Model
Company Confidential
IT Service Management
What is it?
The effective and efficient, process drivenmanagement of quality IT services
What is the added value?
ITSM is business aligned and maintains aholistic Service Lifecycle approach
Implementing ITSM in an organizationprovides gradual improvement
-
8/12/2019 ITIL v3 Nov 2011
8/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283
Company Confidential
Evolution of IT Service Management
Company Confidential
Business and IT Alignment
Objectives We want to make money
We want to build a brand
Core Business Processes Retail (inc POS)
Marketing
Buying and Procurement
IT Services Website, Email
Procurement System
Point of Sale
PCs, Networks, Servers
ITSM ensures provisions for What we need
Available when needed
At the right cost
-
8/12/2019 ITIL v3 Nov 2011
9/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283
Company Confidential
IT Infrastructure Library (ITIL)
The most commonly used IT ServiceIT ServiceManagement Best PracticeManagement Best Practice today
Its a public framework
Public frameworks are preferred overproprietary framework since the later isoften undocumented
ITIL is supported by complimentary
guidance which means knowledge specificto an industry sector
Company Confidential
How did it come into existence
UK Govt, realizing that the services from ITvendors were not up to the mark starteddocumenting the expectations from IT vendors as documented guidelines
Companies in Europe adopted the guidelines inearly 1990 They had little choice
Got worldwide attention when Microsoft used ITILfor developing its proprietary framework
i.e. MOF (Microsoft Operations Framework) ITIL version 2.0 was released in 2001
Usage got spread in the industry and got worldwiderecognition
-
8/12/2019 ITIL v3 Nov 2011
10/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
ITIL Made a difference
Different from ISO, CMM.. Focused on People
Well defined certification scheme
Customers ask for # of ITIL certifiedemployees in their RFPs
International Certification Bodies - APMG
EXIN European Examination Institute for Information Science
ISEB
The IInformation SSystems EExamination BBoard
Testing
Prometric Centers, TUV
Company Confidential
What happened after that?
The industry started using the frameworkand also realized benefits
It got momentum of being a communitylearning
Organizations using ITILJ.D. Edwards & Company, KPMG, Legal& General Insurance, LucentTechnologies, Mackenzie Financial
Corp., Manulife Financial, MenomineeIndian Tribe of Wisconsin, Merrill Lynch,Microsoft Corp., Mutual Life AssuranceCompany, National Westminster Bank,Nesbitt Burns, Network Associates,Ontario Hydro, Oracle, Perot Systems
UK Post Office, Peregrine Systems,Procter & Gamble, Remedy Corp.,Royal Bank of Scotland, Royal Mail,
Scottish Provident, Shell,GlaxoSmithKline, Standard LifeAssurance, The Equitable InsuranceCompany, Toronto Dominion Bank,Union Gas, Virginia Power, Vodafone,Zurich Insurance
And many more
-
8/12/2019 ITIL v3 Nov 2011
11/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
Organisations using ITIL Worldwide
ABN-AMRO BankAetna Life Insurance
AT&T Solutions
Australia Post
AXA Insurance Group
Bank of Canada
Bank of Montreal (Cebra, HarrisBank)
Barclays Bank
Bass Breweries
British Airways
British Telecom
Cable & Wireless
Canadian Fed. & Prov.Governments
Capital One ServicesCGI
CIBC
Computer SciencesCorporationConsumers Gas
DLJ Pershing
Dutch Land RegistryOffice
Dutch Railways
EDS
Exxon
Federal Express
GE Capital
General Accident
Great West Life
Guinness/UDV
Hewlett Packard
Hong Kong & ShanghaiBank
IBM/ISM
ING Bank
And many more
Company Confidential
Some Testimonials
Procter & Gamble
Started using ITIL in 1999 and realizeda 6% to 8% cut in operating costswithin first year
Another ITIL project has reduced helpdesk calls by 10%.
In four years, the company reportedoverall savings of about $500 million.
-
8/12/2019 ITIL v3 Nov 2011
12/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
Testimonials (contd)
Caterpillar
Embarked on a series of ITIL projects in2000.
After applying ITIL principles, the rate ofachieving the target response time forincident management on Web-relatedservices jumped from 60% to more than
90%.
Company Confidential
Testimonials (contd)
Nationwide Insurance
Implementing key ITIL processes in2001 led to a 40% reduction of itssystems outages.
The company achieved a $4.3 millionROI over the next three years
-
8/12/2019 ITIL v3 Nov 2011
13/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
ITIL A Paradigm Shift
Unlike the other process frameworks /standards it certifies people and not theorganizations
An organization can be only as good as thepeople working with
An established and well defined certificationscheme is in place to support ITIL.
This comprises three distinct levels:
Foundation, Practitioner and Manager
Company Confidential
Why Certify?
ITIL aware professionals make an organization Motivated, Cost effective, Productive, Service and
customer oriented, planned and structured and thereforeahead of competition
ITIL certified professionals are sought after in theindustry today
Knowing the benefits : The customers push vendors to have their people ITIL
aware and certified Number of ITIL certified employees is a key item in many RFQs
from customers Employers are pushing their employees to get ITIL awareand certified
It is generally being linked to the appraisal system in manyorganizations today
-
8/12/2019 ITIL v3 Nov 2011
14/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
ITIL Quick Facts
ITIL is not backed by a single company or a person. There isno profit motive or personal promotion.
ITIL is not from a singlecompany or a person
Its true! anyone can implement ITIL. However, it makes sensewhen the size of your helpdesk team is more than 5.
ITIL is for small, mediumand large companies
No one can certify products as ITIL-compliant. It is commonfor people to refer to PinkElephants certification. Please readthe fine print. https://www.pinkelephant.com/en-GB/ResourceCenter/PinkVerify/CompatibilityCompliance.htm
There are no ITIL-compliant products
If you are targeting certification, you must get ISO 20000 andBS 15000 standards, based on ITIL.
You cannot get yourcompany ITIL-certified
Consider it to be a good advice from IT Managers who havebeen there. It is up to you to take it or leave it. You canimplement ITIL the way it works best for you.
ITIL is not a standard
ExplanationQuick Facts
Company Confidential
Service Delivery & Support
Service Delivery
When you prepare for the service
The homework which you do beforeintroducing the service into live environment
Service Support
The support which you provide to the userswho use your service
-
8/12/2019 ITIL v3 Nov 2011
15/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
ITIL v2.0 - In common use
Service Support & Service Delivery Sets
Capacity
Management
Availability
Management
IT Service Continuity
Management
Incident
Management
Problem
Management
Change
Management
Configuration
Management
Release
Management
IT
Infrastructure
IT
Infrastructure
security
security
ServiceDeskServiceDesk
Financial
Management
Service Level
Management
Company Confidential
ITIL Version 3 Model
ITIL v3.0 provides worldrecognized best practicesfor ITSM Sources for best practices include
Public Frameworks
Standards
Proprietary knowledge oforganizations
Generally best practices are thosethat are successful in wide industryuse how others are doing it
-
8/12/2019 ITIL v3 Nov 2011
16/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
The Five Phases
Service Strategy: To attain market focus Where and how to compete? Setting Policies &Objectives
Service Design: To prepare it the best With optimized constraints
Service Transition: Managing Changes With smooth transition
Service Operation: Handhold your customers Provide Stable ongoing support
Continual Service Improvement Make it better and better (Learning & Improvement)
Company Confidential
What is in the books? Service Strategy - Practical Decision-Making
Helps the Top Management take appropriate business decisions
Provides guidance on Policies and Setting objectives
Service Design - Pragmatic Service Blueprint Focuses on design of Service Models, technology architecture, process and
measurement systems Decisions on: Outsource, shared services, co-source models? How to decide & how to
do it
Service Transition: Managing change, risk & QA Supports
Managing organization & cultural change during transition Control on the changes, keeping the SKMS update Provides handholding support to service operation
ELS
Service Operation: Responsive, stable services Through
Service Desk and other functions and processes
Continual Service Improvement: Measures that mean something &improvements that work Ensures
Overall health of ITSM Portfolio alignment in real Growth and maturity of Service Management practice
-
8/12/2019 ITIL v3 Nov 2011
17/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
3 Implementation Levels
Strategic Level: Where decisions aremade, policies set & funding levels areset
Tactical Level: Where decisions andpolicies are implemented within theallotted budgets
Operational Level: Where decisionstranslate into day-to-day actions and
policies affect working practices withinfinancial constraints
Company Confidential
2 Escalation Models
Horizontal or Functional
Throw more expertise
Vertical or Hierarchical Throw more power
-
8/12/2019 ITIL v3 Nov 2011
18/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
ITIL v3.0Qualification
scheme
ITIL v3 Highlights
Company Confidential
Some Basic Concepts
PLAN
Act DO
Check
Deming Circle
-
8/12/2019 ITIL v3 Nov 2011
19/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 1
Company Confidential
What is a Function?
A department, a group of people working together
to deliver an important set of tasks, examples offunctions include HR, Admin, SysAdmin, Financeetc
A function is a logical concept that refers to thepeople and automated measures and executes
a defined process, an activity or
a combination of processes or activities
In larger organizations a function may be brokenup and performed by several departments, teams
and groups, or it may be embodied within a singleorganizational unit.
Company Confidential
What is a Process?
A series of steps, all processes havespecific characteristics. These are:
1. It is measurable
2. It delivers a specific result
3. It responds to a specific event
4. It delivers its primary results to a customeror stakeholder
A process does not necessarily need to betimely
-
8/12/2019 ITIL v3 Nov 2011
20/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Company Confidential
More..
Procedure: A Set of how to
Roles: A Set of responsibilities
Defined in a process and assigned to aperson or team.
One person or team may have multiple roles
Company Confidential
Used for a process or a service
-
8/12/2019 ITIL v3 Nov 2011
21/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Service Strategy
Making sense of the largest picture
Practical Decision Making
Company Confidential
Service Lifecycle Mapping
-
8/12/2019 ITIL v3 Nov 2011
22/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Company Confidential
Goals & Objectives of SS
Goal is to help service providers to operate and grow successfully in the long-term
provide the ability to think and act in a strategic manner
Objectives:
To provide direction for
Growth
Prioritizing investments and
Defining outcomes
against which the effectiveness of service management is measured
To influence organizational attitudes and culture towards thecreation of value for customers through services
To ensure effective communication, coordination, and control amongvarious parts of a service organization
Company Confidential
Concept of Utility and Warranty
UTILITY
WARRANTY
T/F
T/F
T/F
Fit forpurpose?
Fit for use?
OR
AND
Performance
supported?
Constraints removed?
Available enough?
Capacity enough?
Continuous enough?
Secure enough?
T: TrueF: False
Value-createdAND
Two key elements which create value
-
8/12/2019 ITIL v3 Nov 2011
23/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Company Confidential
Resources and Capabilities
A1
A2
A3
A4
A5
A9
A8
A7
A6
Capabilities Resources
Management
Organization
Processes
KnowledgeKnowledge
People
Financial capital
Infrastructure
Applications
InformationInformation
People
Tangible & Intangible Assets
Company Confidential
SS Four Main Activities
1. Define the market
2. Develop the offerings
3. Develop strategic assets
4. Prepare for execution
-
8/12/2019 ITIL v3 Nov 2011
24/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Company Confidential
Processes in Service Strategy(SS)
1. Service Portfolio Management (SPM)
2. Demand Management
3. Finance Management
Company Confidential
Service Portfolio
ServiceImprovement
Plan
Customer3
Customer2
Customer1
MarketSpace 1
MarketSpace 2
MarketSpace 3
Linked byservices
Third-partyServices
Market potential
for services
ServicePortfolio
-
8/12/2019 ITIL v3 Nov 2011
25/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Company Confidential
SPM Goal & Objectives
Goal of SPM is to Manage ServiceManage ServicePortfolioPortfolio by considering services interms of the business valuebusiness value theyprovide
Service Portfolio Management is a dynamic method fora dynamic method for
governing investmentsgoverning investments in service management acrossthe enterprise and managing them for value.
Company Confidential
SPM Process
ServiceStrategy
Define
Analyse
Approve
Charter
Inventories Business Case
Value Proposition Prioritization
Service Portfolio
Authorization
Communication Resource allocation
-
8/12/2019 ITIL v3 Nov 2011
26/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Company Confidential
Understanding SLP
SLP: a defined level of Utility and Warranty for aSLP: a defined level of Utility and Warranty for aparticular Service Packageparticular Service Package.
Each SLP is designed to meet the needs of a
Pattern of Business Activity PBA
Company Confidential
RACI Model
The RACI model suggested in service strategyhelps in defining roles and responsibilities
R Responsible
A Accountable
C Consulted
I Informed
One of more persons can be responsible for atask but only one person can be accountable
Process owner is an I in the RACI matrix, what isexpected out of him?
-
8/12/2019 ITIL v3 Nov 2011
27/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Company Confidential
Risk & Investment Decision
VentureNew Market
Growth
New services Existing market
DiscretionaryEnhance existing services
Non-DiscretionaryMaintain Existing services
Core
Maintain Business critical services
Transform the
Business (TTB)
Grow theBusiness (GTB)
Run the Business(RTB)
Risk
Company Confidential
Demand Mgmt Goal &
ObjectivesGoal
To understand and influence CustomerTo understand and influence Customerdemanddemand for Services and
Provide capacity to meet these demandsProvide capacity to meet these demands
Please note: At a Strategic level Demand Management can involve
analysis of Patterns of Business Activity and User Profiles.
At a Tactical level it can involve use of Differential Charging toencourage Customers to use IT Services at less busy times.
It is very closely linked to capacity management
-
8/12/2019 ITIL v3 Nov 2011
28/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Company Confidential
Finance Management Objectives
Enhanced decision making
Speed of change
Service Portfolio Management
Financial compliance and control
Operational control
Value capture and creation
Company Confidential
Activities of FM
Budgeting
Accounting
Reporting
Charging
Concept of Differential charging
-
8/12/2019 ITIL v3 Nov 2011
29/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 2
Company Confidential
Typical Business Case Structure
Introduction Presents the business objectives addressed by the service
Methods and assumptions Defines the boundaries of the business case, such as time
period, whose costs and whose benefits
Business impacts The financial and non-financial business case results
Risks and contingencies The probability that alternative results will emerge.
Recommendations Specific actions recommended.
Company Confidential
Service Strategy Processes
Service Portfolio Management
Finance Management
Demand Management
-
8/12/2019 ITIL v3 Nov 2011
30/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Service Design
Pragmatic Service Blueprint
Company Confidential
Service Lifecycle Mapping
-
8/12/2019 ITIL v3 Nov 2011
31/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Company Confidential
Goals & Objectives of SD
DesigningDesigning
services to satisfy business objectives, based onthe quality, compliance, risk and securityrequirements
DeliveringDelivering
more effective and efficient IT and businesssolutions and services aligned to business needs
CoordinatingCoordinating
all design activities for IT services to ensureconsistency and business focus
Company Confidential
Service Design Helps to
Reduce Total Cost of Ownership (TCO)
Improved quality & consistency ofservice
Better handling of new or changedservices
Improved service alignment with
business Improved IT governance
More effective SM and IT processes
-
8/12/2019 ITIL v3 Nov 2011
32/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Company Confidential
Five major areas of ServiceDesign
1. Service Portfolio Design Understand Service Portfolio, the SLPs and the
Service Models (i.e. Structure and Dynamics)
2. Service Design Identification of Business Requirements,
definition of Service requirements and design ofServices
3. Technology and architectural design4. Process design
The Process Steps for each phase in Life Cycle
5. Measurement design What all will be measured for each Process,Service and Technology Item (PST)
Company Confidential
Measurement Design
If you cant measure it you cant manage it.
Four types of metrics
ProgressProgress: milestones and deliverables in thecapability of the process
ComplianceCompliance: compliance of the process togovernance requirements, regulatory requirementsand compliance of people to the use of the process.
EffectivenessEffectiveness: the accuracy and correctness of the
process and its ability to deliver the right result EfficiencyEfficiency: the productivity of the process, its
speed, throughput and resource utilization.
-
8/12/2019 ITIL v3 Nov 2011
33/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Company Confidential
Different Sourcing Approaches
In sourcingIn sourcing Utilizing internal resources
OutsourcingOutsourcing Utilizing resources externalorganisation.
CoCo--sourcingsourcing Often a combination of in & out sourcing
Partnership or multi-sourcing Strategic partnerships
Business Process Outsourcing (BPO)(BPO) Entirebusiness process or function outsourced
Application Service Provision (ASP)(ASP) Applications ondemand
Knowledge Process Outsourcing (KPO)(KPO) - Domain-based processes and business expertise
Company Confidential
Service Design Package
Document (s)Document (s) defining all aspects of anall aspects of anIT ServiceIT Service and its Requirementsthrough each stage of its Lifecycle.
A Service Design Package is producedproducedfor each new IT Service, major Change,for each new IT Service, major Change,or IT Service Retirement.or IT Service Retirement.
SDP not produced for an emergencySDP not produced for an emergencychangechange
-
8/12/2019 ITIL v3 Nov 2011
34/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Company Confidential
SCM - Scope, Goals & Objectives
The goal is to ensure : that a Service Catalogue is produced and maintainedService Catalogue is produced and maintained,
it contains accurate informationit contains accurate information on all operational & plannedservices
Objectives:
manage the information contained within the ServiceCatalogue
ensure accuracy in
current details, status, interfaces and dependencies
of all services in scope
Scope: All services that are being transitioned or have been transitioned
to the live environment
Company Confidential
SCM Basic Concepts
Business Service Catalogue contains
details of all the Business services
relationships to the business units and
business process that rely on the IT services
(This is the customer(This is the customers view of the Service Catalogue)s view of the Service Catalogue)
Technical Service Catalogue contains
details of all the IT services
relationships to the supporting services shared services, components and CIs necessary
to support the provision of the service to thebusiness
(As you see it from inside)(As you see it from inside)
-
8/12/2019 ITIL v3 Nov 2011
35/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Company Confidential
SCM Activities
All services in operation are recorded inService Catalogue
Ensure that the Information in Servicecatalogue is
Accurate
Up-to-date
Consistent
Backed up
Company Confidential
SLM - Goals
The goal of Service Level Management isto ensure that:
An agreed level of IT service is providedagreed level of IT service is provided forall current IT services
Future services are delivered to agreedachievable targets
Proactive measures are takenProactive measures are taken to seek and
implement improvements to the level ofservice delivered
-
8/12/2019 ITIL v3 Nov 2011
36/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Company Confidential
SLM - Process
Service CatalogueService Catalogue (Technical & Business)
SLRSLR - Service Level Requirements
SLASLA - Service Level Agreement OLAOLA - Operational Level Agreement
UCUC - Underpinning Contract
MeasurementMeasurement
Service ReportingService Reporting
SIPSIP - Service Improvement Program
Company Confidential
Designing SLA Structures
Separate SLA for each customercovering multiple services
One SLA for all the customersthat use that service
-
8/12/2019 ITIL v3 Nov 2011
37/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Company Confidential
Designing SLA Structures
Multilevel SLAs Reduces duplication of effort
while still providingcustomization
At corporate level
All generic issues are covered
At customer level Issues specific to the customer
are covered
At Service Level
All issues relevant to specificservice in relation to a specificcustomer are covered
Company Confidential
Service Provider & Types
Service Provider:An organizationsupplying services to one or more Internal orExternal Customers
Service Provider is often used in short for IT Service Provider
There are three archetypes of businessmodels for service provisioning:
Type I internalinternal service provider
Type II shared servicesshared services unit
Type III externalexternal service provider
-
8/12/2019 ITIL v3 Nov 2011
38/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Company Confidential
SLM Key Activities
Be aware of changing business needsEnsure all SLRs are identified, understood
and documented
Negotiating and agreeing service levels(internal or external)
Formally documenting these levels ofservice in SLAs / OLAs
Ensure an accurate Service Portfolio,
Service Catalogue and all SLM documentsReport through SLAM Chart
Company Confidential
SLM Challenges
Who do we negotiate with?
A lack of accurate input, involvement andcommitment from the business and customers
The tools and resources required to agree,document, monitor, report and reviewagreements and service levels
The process becomes a bureaucratic,
administrative process rather than an activeand proactive process delivering measurablebenefit to the business
-
8/12/2019 ITIL v3 Nov 2011
39/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 3
Company Confidential
SLM KPIs
Percentage reduction in SLA targets missed Percentage reduction in SLA targets
threatened
Percentage increase in customer perceptionand satisfaction of SLA achievements, viaservice reviews and Customer SatisfactionSurvey responses
Percentage reduction in SLA breachescaused because of third-party supportcontracts (underpinning contracts) & internalOLAs.
Company Confidential
Availability Mgt - Goals & Scope
Goal : to ensure that
level of service availability delivered in all services is
matched to or exceeds
the current and future agreed needs of the business
in a cost-effective manner
Scope :
Designing, implementation, measurement, management
and improvement of IT service and component availability
And Not the business process
-
8/12/2019 ITIL v3 Nov 2011
40/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Company Confidential
Availability Basic Concepts
Fault tolerance (Resilience) Availability (MTBF)
Reliability (MTBSI)
Maintainability (MTTR)
Serviceability (Third Party)
MTBSI = MTBF + MTTR
FARMSFARMS
Vital Business FunctionVital Business Function
Company Confidential
Definitions
Availability The ability of a service, component or CI to perform its agreed
function when required. It is often measured and reported as apercentage
Reliability A measure of how long a service, component or CI can perform its
agreed function without interruption.
Serviceability The ability of a third-party supplier to meet the terms of their
contract. Often this contract will include agreed levels ofavailability, reliability and/or maintainability for a supportingservice or component
Maintainability A measure of how quickly and effectively a service, component or
CI can be restored to normal working after a failure. Fault tolerance
The ability of an IT service, component or CI to continue tooperate correctly after failure of a component part.
The term Vital Business Function (VBF) is used to reflect thebusiness critical elements of the business process supportedby an IT service
-
8/12/2019 ITIL v3 Nov 2011
41/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Company Confidential
Availability Management
Produce and maintain Availability Plan Provide advice and guidance on all availability-
related issues
Ensure availability achievements meet agreedtargets
Assist with the diagnosis and resolution ofavailability related incidents and problems
Ensure proactive and cost-effective measures to
improve the availability
Company Confidential
ISM (Information Security Mgmt)
Goal and scope The goal of the ISM process is to align IT
security with business security and ensure thatinformation security is effectively managed in allservice and Service Management activities
ISM must ensure that an Information Security Policy is produced,maintained and enforced
Scope -The ISM process should cover use and
misuse of all IT systems and services for all ITsecurity issues
Important: ISP should be available to All
-
8/12/2019 ITIL v3 Nov 2011
42/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Company Confidential
ISM
The objective of information securitymanagement is to
protect the interests of those relying on information,systems and communications from harm resultingfrom failures of
Availability
confidentiality and
integrity
An effective Information Security Policy available
to everybody internal or external to theorganization
Company Confidential
Supplier Management
To manage suppliers and relatedinformation, ensuring value for money.
Scope includes all suppliers and contractsneeded to support the IT services
-
8/12/2019 ITIL v3 Nov 2011
43/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Company Confidential
SM Basic Concepts
The Supplier and Contracts Database(SCD )
Supplier and Contract Management andperformance information and reports
Supplier categorization
Company Confidential
SM Responsibilities
Providing assistance in the developmentand review of SLAs, contracts,agreements or any other documents forthird-party suppliers
Maintaining and reviewing a Supplierand Contracts Database (SCD)
-
8/12/2019 ITIL v3 Nov 2011
44/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Company Confidential
Capacity Management
The goal of the Capacity Managementprocess is to ensure that
cost-justifiable IT capacity is matched to thecurrent and future agreed needs of the business ina timely manner
Scope :
IT Services
IT Components
Resources
Company Confidential
Capacity Management
Concepts Balancing costs against resources
needed
Balancing supply against demand
Business Capacity Management
Service Capacity Management
Component Capacity Management
-
8/12/2019 ITIL v3 Nov 2011
45/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Company Confidential
Capacity Management - Methods
Application Sizing To estimate the resource requirements to support a
proposed change to an existing service (throughextrapolation)
Modeling
To predict the behaviour of IT services under a givenvolume and variety of work.
Demand Management
To influence user and customer demand for IT
services and manage the impact on IT resources.
Company Confidential
Capacity Database
Logical Database not just one physical database
CMIS Capacity Management Information System
-
8/12/2019 ITIL v3 Nov 2011
46/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Company Confidential
Capacity Management Responsibilities
Ensuring adequate IT capacity to meet requiredlevels of service
Identifying capacity requirements of business
Understanding the current usage profile and themaximum capacity
Sizing all proposed new services and systems,to ascertain capacity requirements
(Above points apply to IT Services as well as IT Components)
Company Confidential
ITSCM Basic Concepts
Disaster - an event that affects a service orsystem such that significant effort is required torestore the original performance level
Business Impact Analysis
The purpose of a Business Impact Analysis(BIA) is to quantify the impact to the businessthat loss of service would have
-
8/12/2019 ITIL v3 Nov 2011
47/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Company Confidential
ITSCM - Goal & Scope
Goal Support the larger business continuity plan
Objective
To ensure that required IT technical and servicefacilities can be resumed within required, and agreed,business timescales following a major disruption
Scope
Services, computer systems, networks, applications,data repositories, telecommunications, environment,
technical support and Service Desk Also includes resources (People)
Company Confidential
ITSCM Stages
Cold Standby
More than 72 hours
Warm Standby
24 to 72 hours
Hot Standby
Less than 24 hours
-
8/12/2019 ITIL v3 Nov 2011
48/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Company Confidential
ITSCM Responsibilities
Performing Business Impact Analyses for allexisting and new services
Implementing and maintaining the ITSCMprocess, in accordance with the organizationsBCM process
Ensuring ITSCM plans, risks and activities arecapable of meeting the agreed targets underall circumstances
Performing risk assessment and risk
management to avert disasters wherepractical
Company Confidential
Service Design Processes
Service Catalogue Management
Service Level Management
Capacity Management
Availability Management
Service Continuity Management
Information Security Management
Supplier Management
-
8/12/2019 ITIL v3 Nov 2011
49/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 4
Service TransitionManaging Change, Risk & Quality
Assurance
Company Confidential
Service Lifecycle Mapping
-
8/12/2019 ITIL v3 Nov 2011
50/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 5
Company Confidential
Service Transition Helps
Set customer expectations on the performanceand use of the new or changed service
Ensure there is minimal unpredicted impactwhile introducing new services
Increase proper use of the services andunderlying applications and technologysolutions
Provide clear and comprehensive plans for
transition
Company Confidential
Change Management Objectives
The objective of the ChangeManagement Process is :
To ensure that changes are recordedand then evaluated, authorized,prioritized, planned, tested,implemented, documented andreviewed in a controlled manner.
-
8/12/2019 ITIL v3 Nov 2011
51/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 5
Company Confidential
Service Change
The addition, modification or removal ofauthorized, planned or supported serviceor service component and its associateddocumentation.
The Service Portfolio provides a cleardefinition of all current, planned andretired services.
Company Confidential
Change types
NormalNormal Change
Regular Default change
StandardStandard Change
Pre authorized
EmergencyEmergency Change
Which must be introduced ASAP
ECAB
-
8/12/2019 ITIL v3 Nov 2011
52/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 5
Company Confidential
ChangeProcess
scheduled
closed
*Includes build andtest the change
CreateRFC
Changeproposal(optional)
AuthorizeChange proposal
Record theRFC
ReviewRFC
Assess andevaluate change
AuthorizeChange
Plan updates
Co-ordinate changeimplementation*
Initiatorrequested
ChangeManagement Ready for evaluation
Changeauthority
ChangeManagement
ChangeManagement
Evaluation report
implemented
Review and closechange record
Work orders
Work orders
authorized
Ready for decision
UpdatechangeandconfigurationinformationinCMS
Company Confidential
Seven Rs of Change Management
Who RAISEDRAISED the change?
What is the REASONREASON for the change?
What is the RETURNRETURN required from the change?
What are the RISKSRISKS involved in the change?
What RESOURCESRESOURCES are required to deliver thechange?
Who is RESPONSIBLERESPONSIBLE for the build, test and
implementation of the change? What is the RELATIONSHIPRELATIONSHIP between this change
and other changes?
-
8/12/2019 ITIL v3 Nov 2011
53/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 5
Company Confidential
Change Authorization Model
Communications,Decisions and
Actions
ChangeAuthority
Examples ofConfiguration Level
Impacted
IT ManagementBoard
CAB orEmergency CAB
Local Authorization
Change impacts multipleservices or Organizations
Divisions
Change which impactsonly local or service group
Level 1
Communications,Escalations for RFCs,
Risks, Issues
Level 2
Level 3
Level 4
Business ExecutiveBoard
Standard Change
High Cost / Risks Change Requires Decisions
from Executives
Company Confidential
Change Management KPIs
The top five risk indicators of poorChange Management are:
Unauthorized changes
Above zero is unacceptable
Unplanned outages
A low change success rate
A high number of emergency changes Delayed project implementations.
-
8/12/2019 ITIL v3 Nov 2011
54/88
-
8/12/2019 ITIL v3 Nov 2011
55/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 5
Company Confidential
SACM Objectives
To define and control the componentsof services and infrastructure andmaintain accurate configurationinformation on the historical, plannedand current state of the services andinfrastructure.
Company Confidential
Configuration Management System
A set of tools and databases that are used to managean IT Service Provider's Configuration data.
The CMS also includes information about Incidents,Problems, Known Errors, Changes and Releases; andmay contain data about employees, Suppliers,locations, Business Units, Customers and Users.
The CMS includes tools for collecting, storing,managing, updating, and presenting data about all
Configuration Items and their Relationships. The CMS is maintained by Configuration
Management and is used by all IT ServiceManagement Processes.
-
8/12/2019 ITIL v3 Nov 2011
56/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 5
Company Confidential
Configuration Item (CI)
CI: Any Component that is managed theformal control of Change Management
Information about each CI is recorded ina Configuration Record within theConfiguration Management System andis maintained throughout its Lifecycle byConfiguration Management.
Company Confidential
Configuration Item - CI
Scope:
CIs typically include
IT Services
Hardware
Software
Buildings
People Formal Documentation
e.g. Process documentation and SLAs
SKMS
CMS, CMDB,KEDB
&
other DBs
-
8/12/2019 ITIL v3 Nov 2011
57/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 5
Company Confidential
CMS Configuration Mgmt System
Structured
CMDBs
CMDB1
CMDB2
CMDB3
PresentationLayer
Portal
Change and ReleaseView Schedules/plans
Change Request
Status ChangeAdvisory Board
agenda and minutes
Asset ManagementView
Financial AssetAsset Status ReportsAsset Statements and
BillsLicence ManagementAsset Performance
ConfigurationLifecycle View
Projectconfigurations
Service, Strategy,Design, Transition,
Operationsconfigurationbaselines and
changes
TechnicalConfiguration
ViewService
ApplicationsApplicationEnvironment
Test EnvironmentInfrastructure
Quality ManagementView
Asset and
ConfigurationManagement
Policies, Processes,Procedures, forms,
templates, checklists
Service Desk ViewUser assets
User c onfiguration,
Changes, Releases,Asset and Configuration
item and relatedincidents, problems,
workarounds changes
KnowledgeProcessing
Layer
InformationIntegration
Layer
Data andInformation
Sourcesand Tools
Search, Browse, Store, Retrieve, Update, Publish, Subscribe, Collaborate
Query and Analysis ReportingPerformance Management
Forecasting, Planning, Budgeting ModellingMonitoring Scorecards,
Dashboards Alerting
Customer/ User Service Application Infrastructure mapping
ServicePortfolio Service
Package
ServiceRelease
ServiceChange
Integrated Asset and ConfigurationInformation
Common ProcessData and
Information
SchemaMapping
Meta DataManagement
DataReconciliation
Extract,Transform,
Load
DataSynchronization
Mining
Project DocumentFilestore
ProjectSoftware
Definitive MediaLibrary
Definitive
Document Library
DefinitiveMedia Library1
DefinitiveMedia Library2
Data Integration
Discovery,Asset
Managementand audit tools
SoftwareConfiguration
Management
PlatformConfiguration Tools
e.g. StorageDatabase
Middleware NetworkMainframe
Distributed Desktop
EnterpriseApplications
Access ManagementHuman Resources
Supply ChainManagement
Customer RelationshipManagement
Company Confidential
Generic Requirement of a CMS
Self Help capability
Workflow or Process Engine
Integrated CMS
Discovery/Deployment /Licensing Technology
Remote Control
Diagnostic Utilities
Reporting Dashboards
Integration with Business ServiceManagement
-
8/12/2019 ITIL v3 Nov 2011
58/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 5
Company Confidential
Definitive Media Library (DML)
One or more locations in which the definitive andapproved versions of all software Configuration Itemsare securely stored. The DML may also contain associated CIs such as licenses and
documentation.
The DML is a single logical storage area even if there aremultiple locations.
All SW in the DML is under the control of Change andRelease Management and is recorded in theConfiguration Management System.
SW from the DML only is acceptable for use in aRelease
Company Confidential
RDM - Goal
Release and Deployment ManagementRelease and Deployment Management
Aims to build, test and deliver the capability toprovide the services specified by ServiceDesign that will accomplish the stakeholdersrequirements and meet the intended objectives.
Its Goal
is to deploy releases into production andestablish effective use of the service in order todeliver value to the customer and be able tohandover to service operations.
-
8/12/2019 ITIL v3 Nov 2011
59/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 5
Company Confidential
RDM Scope
The scope of Release and DeploymentManagement includes:
the processes, systems and functions topackage, build, test and deploy a releaseinto production and establish the servicespecified in the Service Design packagebefore final handover to service operations.
Company Confidential
Release Unit
Components of an IT Service that arenormally Released together. (Package)
A Release Unit typically includes sufficientComponents to perform a useful Function.
For example one Release Unit could be aDesktop PC, including Hardware, Software,Licenses, Documentation etc.
A different Release Unit may be the completePayroll Application, including IT OperationsProcedures and User training.
-
8/12/2019 ITIL v3 Nov 2011
60/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Company Confidential
RDM Common Approaches
Three Approaches
Big bang vs phased
Push and pull
Automation vs manual
Four Types
Full, Package, Delta, Emergency
Company Confidential
ELS
End
SKMS/CMS
Yes
No
Start
Operate Service
Collect serviceperformance data
Plan and manageimprovements/riskmitigation/change
Report serviceperformanceachieved
Compare progressagainst ELS plan
Verify servicestability
Exit criteriamet?
Identify quick wins/improvements/riskmitigation/changes
Incident andProblem
Management
Change andConfiguration
Management
Service LevelManagement
Provides resourcesfor actual release
-
8/12/2019 ITIL v3 Nov 2011
61/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Company Confidential
Service V model - Example
Define Customer/Business Requirements
Define ServiceRequirements
Design ServiceSolution
Design ServiceRelease
Develop ServiceSolution
Componentand Assembly Test
ServiceAcceptance Test
1a
2a
3a
4a
5a 5b
4b
3b
2b
1b
ServiceComponentBuild and
Test
Internal andexternal suppliers
Level 1
Level 2
Level 5
Level 4
Level 3
Service Review Criteria/Plan
Service Acceptance Criteria/Plan
Service Operational Criteria/Plan
Service Release TestCriteria and Plan
BL
Levels ofconfiguration andtesting
Baseline point
Deliveries frominternal andexternal suppliers
Validate Service
Packages, Offeringsand contracts
Service OperationalReadiness Test
Service ReleasePackage Testleft-hand side
represents the
specification
of the service
requirements
The right-handsidefocusesonthevalidationactivities
that areperformed
Company Confidential
Service Knowledge Management System(SKMS)
A set of tools and databases that are usedto manage knowledge and information.
The SKMS includes the ConfigurationManagement System, as well as othertools and databases.
The SKMS stores, manages, updates, and
presents all information that an IT ServiceProvider needs to manage the fullLifecycle of IT Services.
-
8/12/2019 ITIL v3 Nov 2011
62/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Company Confidential
KM Hierarchy
DIKW Wisdom can not be stored in a tool
Company Confidential
Service Transition Processes
Change Management
Service Asset and Configuration Mgt
Release and Deployment Mgt
Service Validation and Testing
Service Knowledge Mgt System
-
8/12/2019 ITIL v3 Nov 2011
63/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Service OperationResponsive, Stable Services
Company Confidential
Service Lifecycle Mapping
-
8/12/2019 ITIL v3 Nov 2011
64/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Company Confidential
Goals & Objectives of SO
The purpose of Service Operation is to: Coordinate and carry out the activities
Work on processes required to deliver andmanage services at agreed levels
Manage the technology that is used todeliver and support services.
Company Confidential
Business Value of SO
Service value is modeled in ServiceStrategy
The cost of the service is designed,predicted and Validated in ServiceDesign and Service Transition
Measures for optimization are identified
in Continual Service Improvement Service Operations is where the value is
seen
-
8/12/2019 ITIL v3 Nov 2011
65/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Company Confidential
Communications in SO
Routine operational communication
Communication between shifts
Performance reporting
Communication in projects
Communication related to changes
Communication related to exceptions
Communication related to emergencies
Training on new or customized processes and servicedesign
Communication of strategy and design to ServiceOperation teams.
Functions in ITIL V3
ITIL v2 had only one function i.e. Service Desk, here we havefour categories
TMF, AMF, ITOMF, SDF
-
8/12/2019 ITIL v3 Nov 2011
66/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Company Confidential
Major SM Functions in ITIL V3
TMF Technical Management Function Custodian of technical knowledge and expertise related to
managing the IT
AMF Application Management Function Custodian of technical knowledge and expertise related to
managing applications Overlaps with Application Development
ITOMF IT Operations Management Function Responsible for the daily operational activities needed to
manage the IT Infrastructure Has IT Operations control & Facilit ies Management Overlaps with TMF & AMF
SDF Service Desk Function SPOC Focuses on service restoration
Company Confidential
TMF & AMF
TMF - Custodian of technical knowledge requiredto managing the IT infrastructure.
Provides actual resources to support the ITSMLifecycle.
AMF - Custodian of technical knowledgerequired to managing applications.
Application Management is to applications whatApplication Management is to applications what
Technical Management is to the IT InfrastructureTechnical Management is to the IT Infrastructure. Plays a role in all applications, whether purchased ordeveloped in-house.
One of the key decisions : Build or Buy
-
8/12/2019 ITIL v3 Nov 2011
67/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Company Confidential
ITOMF
Responsible for the daily operational activities neededto manage the IT Infrastructure
IT Operations Control Ensures that routine operational tasks are carried out
Provides centralized monitoring and control activities
Uses an Operations Bridge or Network Operations Centre
Facilities Management Management of the physical IT environment
(Data centers, computer rooms, etc)
Please note:
In large Data Centers Technical and Application Management are co-located with IT Operations
In some organizations many physical components of the ITInfrastructure are outsourced and Facilities Management may includethe management of the outsourcing contracts
Company Confidential
SDF Objectives
Restore the normal service to the usersas quickly as possible(In this context restoration of service is meant in the widest
possible sense)
It is SPOC Single point of contact
While this could involve fixing a technicalfault, it could equally involve fulfilling a
service request or answering a query oranything that is needed to allow the users toreturn to working satisfactorily
-
8/12/2019 ITIL v3 Nov 2011
68/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Company Confidential
Local Service Desk
For Local business
needs and onsite
support
Desktop support
Network support
Application support
Systems andoperations support
Third party support
ThirdParty
Support
Service Desk
Network &OperationSupport
ApplicationSupport
DesktopSupport
LocalUser
LocalUser
LocalUser
First line support
Company Confidential
Centralized Service Desk
In multi location environmentlocal SD becomes expensive
Central SD is establishedserving all locations
All service request are loggedat a central physical location
Key benefits
Reduced operational costs
Consolidated Mgmt reports.
Better resource allocation
ThirdParty
Support
Centralized
Service Desk
Network &OperationSupport
ApplicationSupport
DesktopSupport
CustomerSite 1
CustomerSite 2
CustomerSite 3
Second Line Support
-
8/12/2019 ITIL v3 Nov 2011
69/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 6
Company Confidential
Virtual Service Desk
Virtual service desk can beaccessed from anywhere inthe world
If the organization is MNC itgives same benefits ofcentralized service desk
Maintains central databaseaccessible from alllocations
The only difficulty is theperson required at VirtualSD needs to be specialist
Follow The Sun Model
ServiceMgmt
Database (S)
User S it e 1 User S it e a
SydneyService Desk
AmsterdamService Desk
ParisService Desk
LondonService Desk
Modem
Modem
Wan
Virtual Service Desk
Internet
TorantoService Desk
Telephone
Fax
Lan
Lan New YorkService Desk
Local Users
Local Users Remote UsersThird Party Supplier
Service Desk
Company Confidential
SDF Staffing Options
Technically Unskilled
Technically Skilled
Technically Experts
Super User
-
8/12/2019 ITIL v3 Nov 2011
70/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
SDF Metrics
Customer / User satisfaction (CSAT / USAT) Average handling time (AHT) Timely escalations and resolutions First call resolution (FCR)
Time within which calls are answered. Call escalations as specified in SLA Restoration of service within acceptable time and in
accordance with the SLA Timely information to users about current and future
changes and errors.
Conduct customer surveys to determine Is the telephone answered courteously? Are users given good advice to prevent incidents?
Company Confidential
Service Lifecycle Mapping
-
8/12/2019 ITIL v3 Nov 2011
71/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
Service Operation Processes
Event Management
Incident Management
Request Fulfillment
Problem Management
Access Management
Company Confidential
EM - Scope, Goals & Objectives
Provides the entry point for theexecution of Service Operationprocesses and activities.
Provides a way of comparing actualperformance and behavior againstdesign standards and SLAs.
Provides a basis for Service Assuranceand Reporting; and ServiceImprovement.
-
8/12/2019 ITIL v3 Nov 2011
72/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
EM Basic Concepts
An event can be defined as any detectable ordiscernible occurrence
that has significance for the management of the ITInfrastructure or the delivery of IT service
Please Note:
Events are typically notifications created by an ITservice, Configuration Item (CI) or monitoring tool
Events that signify regular operation
Events that signify an exception
Events that signify unusual, but not exceptional,operation
Company Confidential
Alert
A warning that a threshold has beenreached, something has changed, or aFailure has occurred.
Alerts are often created and managedby System Management tools and aremanaged by the Event Management
Process.
-
8/12/2019 ITIL v3 Nov 2011
73/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
IM - Scope, Goals & Objectives
Objective: Restore normal service operation as quickly as possible and
minimize the adverse impact on business operations, thusensuring that the best possible levels of Service quality andavailability are maintained.
Scope: Any event which disrupts, or which could disrupt, a service.
Events communicated directly by users/technical staff
Incident Management is the process for dealing with allincidents; this can include failures, questions or queriesreported by the users (usually via a telephone call to theService Desk), by technical staff, or automatically detected and
reported by event monitoring tools.
Company Confidential
Incident
An unplanned interruption to an ITService or a reduction in the Quality ofan IT Service.
Failure of a Configuration Item that hasnot yet impacted Service is also anIncident.
For example Failure of one disk from a mirrorset.
-
8/12/2019 ITIL v3 Nov 2011
74/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
IM Basic Concepts
Normal service operation is defined here asservice operation within SLA limits.
Major incidents
A separate procedure, with shorter timescalesand greater urgency, must be used for majorincidents.
A definition of what constitutes a majorincident must be agreed and ideally mappedon to the overall incident prioritization system
They will be dealt with through the majorincident process.
Company Confidential
IM Important Concepts
Timescales
Must be agreed for all incident-handling (IH)stages
Incident Model
Chronological order of the IH steps / Ownerof actions / Timescales and thresholds forcompletion of the Actions
Major incident Procedure to be kept separate
-
8/12/2019 ITIL v3 Nov 2011
75/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
Impact, Urgency and Priority
Priority = Impact X Urgency
Planning/
planned
low -4
< 48 hours
medium -3
< 24 hoursLow
low -4< 48 hours
medium -3< 24 hours
high -2< 8 hoursMedium
medium -3< 24 hours
high -2< 8 hours
critical -1< 1 hourHigh
LowMediumHigh
Impact
Urgency
Incident Model
Company Confidential
Incident Management - Process
No
No
End
No
No
From Event Mgmt From Web Interface User Phone Call Email TechnicalStaff
Incident Identification
Incident Logging
Incident Categorization
Service Request?Yes
Incident Prioritization
To Request Fulfilment
Major Incident ProcedureYes
Major Incident?
Initial Diagnosis
Yes Functional Escalation2/3 Level
Yes Functional EscalationNeeded?
Investigation& Diagnosis
Resolution andRecovery
Hierarchic EscalationNeeded?
YesManagementEscalation
Incident Closure
-
8/12/2019 ITIL v3 Nov 2011
76/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
IM Challenges
The ability to detect incidents as early aspossible.
Convincing all users that all incidents mustbe logged.
Availability of information about problemsand Known Errors.
Integration into the CMS.
Integration into the SLM process
Company Confidential
IM KPIs
Total numbers of Incidents
Breakdown of incidents at each stage
Size of current incident backlog
Number and percentage of major incidents
Mean elapsed time to achieve incidentresolution or circumvention, broken down by
impact code Percentage of incidents handled within
agreed response time.
-
8/12/2019 ITIL v3 Nov 2011
77/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
RF - Scope, Goals & Objectives
To provide a channel for users to request andreceive standard services for which a pre-defined approval and qualification process exists
To provide information to users and customersabout the availability of services and theprocedure for obtaining them
To source and deliver the components ofrequested standard services (e.g. licenses andsoftware media)
To assist with general information, complaints orcomments
Company Confidential
RF Basic Concepts
Service Requests will usually be satisfiedby implementing a Standard Change
The ownership of Service Requestsresides with the Service Desk, whichmonitors, escalates, dispatches and oftenfulfils the user request.
Pre-defined Request Models whichtypically include some form of pre-approval by Change Management
-
8/12/2019 ITIL v3 Nov 2011
78/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
Service Request
A request from a User for information,or advice, or for a Standard Change orfor Access to an IT Service.
For example to reset a password, or toprovide standard IT Services for a newUser.
Service Requests are usually handled
by a Service Desk, and do not requirean RFC to be submitted.
Company Confidential
PM - Scope, Goals & Objectives
Goal & Objective
To prevent problems and resulting incidentsfrom happening, to eliminate recurringincidents and to minimize the impact ofincidents that cannot be prevented
Scope:
Four Ps of service management
-
8/12/2019 ITIL v3 Nov 2011
79/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 7
Company Confidential
Problem
A cause of one or more Incidents.
The cause is not usually known at thetime a Problem Record is created,and the Problem ManagementProcess is responsible for furtherinvestigation.
Company Confidential
Workaround
Reducing or eliminating the Impact of anIncident or Problem for which a full Resolution isnot yet available.
For example by restarting a failed ConfigurationItem.
Workarounds for Problems are documented inKnown Error Records.
Workarounds for Incidents that do not haveassociated Problem Records are documented inthe Incident Record.
-
8/12/2019 ITIL v3 Nov 2011
80/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 8
Company Confidential
Known Error
A Problem that has a documented RootCause and a Workaround.
Known Errors are created and managedthroughout their Lifecycle by ProblemManagement.
Known Errors may also be identified byDevelopment or Suppliers.
Company Confidential
Known Error Data Base (KEDB)
A database containing all Known ErrorRecords.
This database is created by ProblemManagement and used by Incident andProblem Management.
The Known Error Database is part of the
Service Knowledge Management System.
-
8/12/2019 ITIL v3 Nov 2011
81/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 8
Company Confidential
Access Management - Goal
To provide authorized users the necessaryrights to use a service or group of services
Actual execution of policies and actionsdefined in Security and AvailabilityManagement
Company Confidential
Access Management Basic Concepts
Access : level and extent of a services functionality ordata that a user is entitled to use
Identity : distinguishing information about an individualwhich verifies their rank or status on the org-chart
(Every user MUST have a unique identity)
Rights or privileges: set of services a user is permittedto use
(actual settings permitting access to a service or service group)
Services or service groups: Services clubbed togetherinto a group to facilitate access management according tofunctional relevance
Directory Services: a tool or technology used to manageaccess and privileges
-
8/12/2019 ITIL v3 Nov 2011
82/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 8
Company Confidential
Balances in Service Operation
Internal versus external focus (ITServices versus Technologycomponents)
Stability versus Responsiveness
Quality of Service versus Cost ofService
Reactive versus Proactive
Company Confidential
Cost versus Quality
Costofservice
Quality of Service(Performance, Availability, Recovery)
Range of optimalbalance betweenCost and Quality
Service
-
8/12/2019 ITIL v3 Nov 2011
83/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 8
CSI7 Step Improvement Process
Measures that Mean Something
and Improvements that Work
Company Confidential
Service Lifecycle Mapping
-
8/12/2019 ITIL v3 Nov 2011
84/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 8
Company Confidential
Goal & Objectives of CSI
The primary purpose of CSI is to continuallyalign and realign IT services to the changingbusiness needs by identifying and implementingimprovements to IT services that supportbusiness processes
Objectives: Review, analyze and make recommendations on
improvement opportunities
Service levels
Improve effectiveness and efficiency in delivering servicesby ensuring applicable quality practices are used
Company Confidential
Business Value of CSI
Increased organizational competency
Integration between people and processes
Reduction of redundancy increasesbusiness throughput
Minimized lost opportunities
Assured regulatory compliance that willminimize costs and reduce risk
Ability to react to change rapidly.
-
8/12/2019 ITIL v3 Nov 2011
85/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 8
Company Confidential
PDCA Model
Businessrequirements
Externalrequirements
Securityrequirements
Request fornew service
Service and processmeasurements
Improved employeemorale
New changedservices
More effective andefficient processes
Customersatisfaction
Businessresults
Managementresponsibilities
DOImplement
CSI
ACTModify
CSI
Continual Service Improvement
PLANCSI
CHECKMonitor, measureand review CSI
Company Confidential
CSI Model Based on SM Discipline
What is the vision?
Where do we want
to be?
How do we get there?
Did we get there?
Where are we now?
How do we keepthe momentum going?
Service & processimprovement
Measurabletargets
Baselineassessments
Measurements &metrics
Business vision,mission, goals and
objectives
-
8/12/2019 ITIL v3 Nov 2011
86/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 8
Company Confidential
Measurement Business value
To Validate To Direct
To InterveneTo Justify
Your Measurement Framework
Why Measure ? Purpose of reports
Company Confidential
Performance Baselines
Purpose:
Markers Marking start point
For later comparison (Important)
Decision making Does it needimprovement ?
Where to establish:
Strategic goals and objectives Tactical process maturity
Operational metrics and KPIs
-
8/12/2019 ITIL v3 Nov 2011
87/88
Created by: Dr. Pratul Sharma ITIL v3.0 Foundation Note
[email protected] +91 98994 26283 8
Company Confidential
Types of Metrics
Technology metrics Component & application performance , availability
etc
Process metrics
CSFs, KPIs and activity metrics for the servicemanagement processes
Service metrics
These metrics are the results of the end-to-endservice.
Component metrics are used to compute the servicemetrics.
Company Confidential
The 7 Step Improvement
Process
Identify Vision Strategy Tactical Goals Operational Goals
1. Define what youshould measure
7. Implementcorrective action
6. Present and use theinformation, assessment
summary, action plans, etc.
2. Define what youcan measure
3. Gather the dataWho? How? When?Integrity of data?
4. Process the dataFrequency? Format?System? Accuracy?
5. Analyze the dataRelations? Trends?According to plan?Targets met?Corrective action?
Goals
-
8/12/2019 ITIL v3 Nov 2011
88/88