4. 1
2
What is the value proposition of adopting an
integrated approach to ITSM, ITAM and Security?
What is the process involved in bringing these
domains together?
5. Where’s the greatest RISK?
Virtualization
CloudUsers
Mobile
Data
Center
ShadowIT
Regulations
Governance
8. Data Center Speed
Rapid Release Containers
Open Source
Process Automation
Request
Test
Validation
Cloud
Staging
Impact Analysis
License check
Virtual Machines
Demand
13. ”When compared to less advanced organizations,
advanced DevOps teams experienced 26% lower IT
costs, 37% greater business growth, 31 percent
better operational or process efficiency, 33%
higher-quality apps, 30% greater employee
productivity, 23% better customer experience and
a 31% improvement in employee recruitment and
retention.”
Enables DevOps, ITAMOps and SecOps
15. Integrated ITAM, ITSM Security Attainment Model
No process
No policies
No standardization
Centralized procur.
Data center visibility
Services focused
Business agility
Visibility controls
Incident mgmt
Request
Knowledge
Apply standards
Change
Problem
Business aligned
Innovative
Agile digital workforce
Patch + vulnerability
controls
Preventative
maintenance
Integrated endpoint
security
Threat awareness
GRC/oversight
Secure program
Business continuity
LEVEL 1:
Initial
LEVEL 2:
Managed
LEVEL 3:
Shared
LEVEL 4:
Optimized
SECITAMITSM
App + privilege control
White/blacklisting
Reduced outages
16. 1
2
What is the value proposition of adopting an
integrated approach to ITSM, ITAM and Security?
What is the process involved in bringing these
domains together?
17. Address Staffing Cultural Differences
Asset
Business
SecurityService
EA Asset BusinessSecurityServiceEA