IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises
Story image

Can you manage?

Thu 1 Jul 2010
FYI, this story is more than a year old

Put very simply, IT service management (ITSM) is about managing people, processes and technology to deliver services that satisfy business needs. Without suitable focus on each of these factors and a commitment to ongoing service improvement, any service management initiative is susceptible to failure.

Why should CIOs care?

CIOs need to care because, like any significant organisational change, an ITSM initiative needs senior-management support to succeed. It is not enough to throw a bucket of money at someone and say “service management us”. There needs to be ongoing support for the major cultural change that must occur, a realisation that time will be needed to design or redesign processes, and realistic allocation of time and money to investigate supporting toolsets.

This is a long-term project that requires ongoing commitment and support from the highest levels. The CIO controls the flow of resources and is actively impacted by the success or failure of the project, so should be actively involved.

Done well, ITSM will deliver rewards. There are many texts and articles that investigate these rewards in more detail, but they include:

  • Appropriate quality of services
  • Clearer view of IT capability
  • Improved definitions of and information on services
  • IT will be more agile in its response to changing business needs
  • Improved staff motivation
  • Clarifying the IT value proposition to the business
  • Resources will be used more efficiently and in areas where they can add most value
  • IT will be able to move away from keeping the lights on to providing innovative technologies and solutions to the business.
The endgame of any ITSM project is to get to the point where IT is delivering services that are fully aligned to business needs. When this is achieved IT will no longer be seen as a black hole that the business must pour resources into with seemingly little reward, but may be more aligned with the business and can instead become a key enabler to deliver business benefits.

What CIOs need to know

1 People: Without a doubt people are the most important part of the service management equation, and yet they are the part that is most often ignored or handled badly. Much is said about the importance of hiring the right people, keeping them engaged, providing the correct training and ensuring they are equipped to do their jobs. Yet when the purse strings tighten, training budgets are the first thing to go; people are asked to step into roles they are poorly prepared for, and then expected to provide results with limited resources.

It is imperative to get key staff involved early, get them speaking the same language, believing in what they are doing, and then use them to convert any naysayers by showing that there are real benefits to be had. Make use of the ‘what’s in it for me’ principle. Show staff early, positive and tangible effects on their workloads and they will soon become converts. This must absolutely be led from the top with an ongoing commitment to cultural change.

2 Process: On the process side the IT Infrastructure Library (ITIL) is probably the most widely recognised best practice framework for IT operations. ITIL is an integral part of any service management initiative, but ITSM is not just ITIL. There are many other frameworks and bodies of knowledge that are either directly related to, or inform, IT service management. These include COBIT, ISO 20000, MOF and a host of others. It is often said that we should pick and choose what is necessary or suitable for our businesses, but to do that effectively requires an understanding of the business.

CIOs must therefore be willing to invest the time needed to gain this understanding. Time taken at the start of a project to understand the business requirements and the processes required to satisfy them can save a lot of heartache.

It is also important to understand the maturity level of the IT department. Take the time to understand and map existing IT processes. Areas of concern can then be identified and addressed when designing new processes. This may seem to be an unnecessary delay, but in the long run will have big benefits in the cultural change required, as it allows IT staff at all levels to discover and understand where the existing bottlenecks are. It then lets them have a say in how to resolve them and therefore helps them feel invested in the new processes.

Don’t expect to do too much at once. Be realistic about what can be achieved with the allocated resources, and set realistic timeframes. Don’t expect to get it all right first time. Get it good enough to do the job and then improve processes using a continual service improvement programme.

3 Technology: Technology is the third piece of the puzzle. It is important to get this right, as a tool that is implemented and/or functioning poorly can create staff resistance and negatively impact the results. Take the time to fully investigate what is needed out of a toolset. Requirements will come about naturally as processes are designed, but time will need to be spent ratifying these and ensuring all requirements are covered. Be aware that a number of tools may be required for success, not necessarily simply a call management solution. There may also be the need to invest in separate tools for things such as a Configuration Management Database, monitoring, discovery and knowledge management. This will of course depend on the scale of the operation and implementation. Appropriate use of partners is also important in a service management project. This may simply involve a good tool vendor or it might be a service management partner that can provide expert support and assistance with service management theory, tools, training, process design, and staff engagement and organisational change management.

Finally, do not underestimate the value of communication. This is something that is almost always under-done. Get the message out to all stakeholders about what you are intending to achieve and why, then keep up the communication for the duration of the initiative.

This isn't rocket science and I’d be surprised if anything I have said is new. Reiteration of these simple principles is required as they are so often forgotten, resulting in failure or slow uptake of service management initiatives. A clear and consistent message from the top, coupled with an unwavering focus on the desired benefits of the project, will go a long way to ensuring a positive outcome.

Related stories
Top stories
Story image
IDC
High level of Customer Identity & Access Management adoption
The study from Okta revealed that the pandemic has either accelerated or highlighted the need for digital-first strategies.
Story image
Application Performance Monitoring / APM
New Relic integrates offering with Atlassian’s Jira Software
New Relic has integrated errors inbox with Jira Software to allow developers to easily access and set up complete stack error tracking and software performance monitoring from within the tool.
Story image
Privileged Access Management / PAM
The importance of stopping identity sprawl for cybersecurity
The 2021 Data Breach Investigations Report (DBIR) shows that 61% of all breaches involve malicious actors gaining unauthorised, privileged access to data by using a compromised credential. Unfortunately, it is often too late when the misuse of a credential is detected.
Story image
Ingram Micro
Ingram Micro NZ sees $74 million revenue growth in 2021
Ingram Micro New Zealand's latest financial report reveals that its revenue from contracts with customers increased by almost $74 million in 2021.
Story image
Data Protection
VMware introduces advanced workload protection for AWS
VMware Carbon Black Workload for AWS delivers comprehensive visibility and security across on-premises and cloud environments for AWS customers.
Story image
SaaS
AvePoint rebrands SaaS learning product to MaivenPoint
"Our mission with MaivenPoint is to make your learning experience limitless and inspire everyone to achieve their aspirations."
Story image
Storage
DCI Data Centers breaks ground on AKL02 center
DCI Data Centers has commenced construction on Auckland's largest data center.
Story image
Inde
Exclusive: Inde provides innovative solutions across the tech sector
Inde likes to call its approach the 'power of the collective', which essentially means that if a client approaches the company with a problem, they'll get the team's collective insight to help drive the best outcome.
AWS Marketplace
Learn how security orchestration, automation, and response (SOAR) enhances your security strategy.
Link image
Story image
Artificial Intelligence
Exclusive: NZ-based DEFEND offers global cyber protection
DEFEND supports customers in 66 countries across the globe with a relentless focus on ensuring that every dollar spent on security provides a meaningful return on investment and reduces cyber risk.
Story image
Enterprise Resource Planning / ERP
Why the right ERP (and partner) is crucial to an innovative and successful business
Enterprise Resource Planning (ERP) is a foundational step to ensuring a robust business model; here's why choosing the right one could be vital to ensuring long-term success and innovative results.
Story image
Digital Transformation
Adobe and FC Bayern collaborate on a multi-year partnership
Adobe is embarking on a multi-year partnership with FC Bayern, using its enterprise solutions to carry out the club’s digital transformation.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - An update from Heidrick & Struggles
Graham Kittle joins us today to discuss how the company is helping organisations bring about change within their business.
Story image
Sustainability
NZ program recovers and recycles more than 177 tonnes of e-waste
The TechCollect NZ pilot program says its milestone of recovering and recycling more than 177 tonnes of ICT e-waste recognises the efforts of many.
Story image
Cybersecurity
Datacom research explores reality of zero trust in A/NZ
Zero trust is fast emerging as global best practice in cybersecurity and local leaders are on board, with 83% considering it essential to security.
Story image
Data
Talend announces support for Amazon Redshift Serverless
Talend has announced its support for Amazon Redshift Serverless, with the company saying the integration reinforces its commitment and leadership in supporting businesses.
Story image
New Zealand
2degrees announces appointments to newly established board
2degrees has announced Liz Coutts as the board chair, while Russell Stanners and Kathy Meads join her as directors.
Story image
Data analytics
Data analytics a struggle for A/NZ healthcare organisations
A study by InterSystems has found that most Australian and New Zealand healthcare organisations struggle to use data analytics to support their business objectives.
AWS Marketplace
See how managed security services (MSS) have evolved to Managed Detection and Response (MDR) and Extended Detection and Response (XDR). Learn how these new holistic solutions can simplify security management and improve your threat detection and response.
Link image
Story image
Red Hat
Red Hat announces 2022 awards winners for A/NZ region
Red Hat recently acknowledged Australia and New Zealand partners with its annual awards, highlighting partners across various categories.
Story image
LG Electronics
LG Electronics’ revenue in NZ grows by 57% in FY 2021
The New Zealand branch of LG Electronics Australia's total revenue shot up by nearly NZD $45 million reaching a total of $123.7 million for FY 2021.
Story image
Healthcare
Why the Metaverse could be the key to enhancing the healthcare sector
The experts at Accenture understand that the programmable world is about building the next version of the physical world in healthcare, understanding complex layers in order to fully utilise technology to its maximum effect.
Story image
Charity
SnapLogic teams up with meetmagic for charity and children
SnapLogic has announced its partnership with meetmagic, an online Australian platform that combines business and philanthropy.
Story image
Gigabit
Keysight Technologies and Nokia’s public test of 800GE success
Keysight and Nokia have successfully demonstrated the first public 800GE test, validating the readiness of next-generation optics for service providers and network operators.
Story image
Open source
Flashpoint acquires Echosec Systems, elevates OSINT capabilities
Flashpoint has acquired Echosec Systems, a provider of open-source intelligence and publicly available information.
Story image
Financial results
Jade Software’s plan to get back to surplus in 2022
Jade Software has released its latest financial report, revealing that the company has kept its loss low from $567,000 in FY 2020 to just $153,000 in FY 2021.
Story image
APAC
Automation to take over 63 million jobs in APAC by 2040 - report
Forrester forecasts that working populations in the five largest economies in APAC are more at risk of physical robot automation than in Europe and North America.
Story image
Dark web
Beware the darkverse and its cyber-physical threats
A darkverse of criminality hidden from law enforcement could quickly evolve to fuel a new industry of metaverse-related cybercrime.
Story image
SaaS
Claroty launches new cloud-based industrial cybersecurity platform
The company says Claroty xDome is the industry's first solution to deliver the ease and scalability of SaaS without compromising on visibility, protection, and monitoring controls.
Story image
Neat
Workplace design a crucial factor for better employee experience - report
The key to a successful workplace could be its design, according to research from Ecosystm and Neat.
Story image
Document Management
TrustRadius gives M-Files two document management awards
TrustRadius has recognised M-Files with both a 2022 Best Feature Set and a 2022 Best Relationship award in document management.
Story image
Malware
Avast One extends protection with Online Safety Score
Avast One has extended its cross-platform support by adding its Online Safety Score feature to both the Mac and iOS platforms of Avast One.
Story image
Pure Storage
Pure Storage named leader in GigaOm report for Kubernetes storage
Pure Storage named the leader for the third consecutive year by GigaOm Radar Report for enterprise Kubernetes storage.
Story image
Gartner Magic Quadrant
Gartner positions Commvault as Leader in 2022 Magic Quadrant
Gartner has named Commvault a Leader in its 2022 Gartner Magic Quadrant for Enterprise Backup and Recovery Software Solutions report.
Story image
Google Cloud
Google Cloud to open first cloud region in NZ - among others
Google Cloud has announced plans to bring three new cloud regions, one each in New Zealand, Malaysia and Thailand.
Story image
Tech job moves
Tech job moves - Cohesity, Equinix, IDC, Proofpoint & Xero
We round up all job appointments from July 29 - August 5, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Compliance
Why security needs to shape your journey to the cloud
It's estimated that 80% of workloads could be in the cloud in the next few years. How can you make all that data secure?
Story image
Microsoft
Spectralink DECT devices now integrated with Microsoft Teams SIP Gateway
Spectralink DECT devices are now integrated with Microsoft Teams SIP Gateway to help create better results for business-critical frontline workers.
Story image
Indusface
Why enhancing bot protection for web and API endpoints matters
The trouble with bots is that they aren’t all bad. Unfortunately, this can make it challenging to detect malicious bots that find their way into your system and threaten your business.
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
Cybersecurity
Palo Alto Networks responds to rise in threats with MDR service
Unit 42 Managed Detection and Response is a new service that can offer continuous 24/7 threat detection, investigation and response.