SlideShare a Scribd company logo
1
SERVICE MANAGEMENT SOLUTIONS TO DELIVER IT EXCELLENCE
2
How to build and operate an
effective SIAM tooling solution
Steve Morgan
Service North 2018
November
2018
3
The Challenge
In moving to a SIAM operating model:
• How do you ensure continual and efficient transmission of transactions between you and your SIAM eco-
system?
• How do have a “single source of the truth” upon which to base business decisions?
• How do ensure that the quality and availability of data isn’t any worse under a SIAM model?
• How do you build accurate reporting without a large reporting team?
4
The Scenarios you’ll find yourself in
Scenario Benefits Watch out for….
You have an established toolset which
includes the main functionality. You’d like
all your vendors to use this
• You own the workflows, data
structures, etc.
• No dependency on service providers,
enables flexibility in future
• “Behind the curtain” integrations
• In-house or third party skills to
maintain the tool
• You’re on the hook for keeping data up
to date
You’re looking to establish a new toolset,
provided by one or more of your SIAM eco-
system providers
• They’ll bring established workflows
and processes
• They’ll maintain the tool and the data
• Other service providers may be
reluctant to use it, due to visibility of
performance and loss of IP and control
• “Behind the curtain” integrations
You’re looking to introduce a new toolset at
the same time as your new SIAM operating
model
• All stakeholders have the opportunity
to contribute to it
• Decision making may take time
• Suppliers may still be unwilling to use
it
5
What are the potential pain-points?
There’s more than we think….!
Incident / Request /
Problem / Change
workflow
Master data availability
and update
Transient data availability
and update
System health /
performance data and
dashboard
Service Performance / SLA
data collation Project / Programme
demand and delivery data
6
Your ITSM SIAM tooling scope
But don’t forget…..
• Finance
• Supplier / Contract Management
• Project and Portfolio Management
7
Four Key Elements of a good ITSM Tool
Integration CMDB
Workflow Common Data Dictionary
8
Discovery
• Discovery capability must be able to integrate with ITSM tool
and CMDB
• SIAM retains accountability for CMDB/Asset Mgt across the
SIAM eco-system, with service providers providing content
• Discovery is hard! – Don’t de-prioritise your Discovery
workstream
• Discovery of hardware assets is typically easiest
• Software discovery is easier for COTS software, but some
home-grown apps can be problematic
9
• Biggest issues in a SIAM environment are:
– Getting acceptance in the SIAM eco-system to use a single tool
– Service Provider’s existing tools and processes are often optimised for their organisations and therefore difficult
to integrate with or replace
– Keeping an accurate picture in a single reference tool
– Discovery of the relationships between assets
– Making the connection between discovered assets and non-discoverable CIs like Services, Business Processes,
etc
– Mapping what’s discovered back to the CMDB
– Unpredictability of Pricing
Issues with Discovery in a SIAM environment
10
Software Asset Management (SAM)
• Discovery software will identify software assets
• Level of license / software use data can be difficult to
manage
• In a SIAM model your Service Providers will each
manage and provide information on software
licensing in their tower
• The SIAM organisation will normally be responsible
for pulling this together in a single picture
• Who is accountable for compliance?
• Beware ITSM tools claiming SAM capability, this tends
to be fairly basic, and won’t cover all software types,
nor support sophisticated requirements like metering
11
Event correlation & Dashboarding
• This area is often overlooked but is critical
• Tower providers will each have their own systems
management tools and will monitor alerts for the
systems in their scope
• Integrating all of these alerts into Business Service
dashboards is the responsibility of an event correlation
tool
• Ideally, this is integrated into the CMDB to allow the
Service “overlay” to system events
• It is monitored by the SIAM layer
– to ensure issues are being addressed in a timely
manner
– to correlate alerts generated from different towers
to identify potential service impacting issues
12
Reporting
• Beware of creating a cottage-industry for reporting in
each service provider
• Categorise reports by type
– Commercial
– Service
– Service Provider
• Maintain under change control to prevent report
proliferation
• Attempt to standardise reports to avoid variations by
customer and catalogue reports by type
• Avoid reports which are purely volumetric
– Trends are interesting, but this is just data
– Turn it into information by measuring against
targets / KPIs
13
Capacity Management
Business
Capacity
Service
Capacity
Resource
Capacity
SIAM Towers provide capacity
data for their services
SIAM correlates into Service Views
using Service Catalogue / CMDB
integration
The business provides strategic
intent for translation into service and
technical impacts
Tower specific tools
Data analysis, trending,
forecasting tool
Integration with Service
Catalogue & CMDB
The same principle applies for Availability and Service Continuity
14
Key Takeaways
• Define a Tooling Strategy at the outset
• Baseline existing tooling
• Think Beyond the ITSM tool
• Interoperability is vital
• Involve the SIAM eco-system service providers to ensure
that their tools complement the SIAM toolset
• Assign ownership
• Seek to reduce duplication between tools
• Don’t be afraid to adapt as you progress
• Ensure alignment with processes
• Ensure commitment through ongoing involvement of
those who will use the tool
15
Thank You!
Steve Morgan, Syniad IT
www.SyniadITSolutions.co.uk
• All of our SIAM content, can be found for FREE, here http://bit.ly/ServiceNorth
• You can sign up for our newsletter on the website
• Follow us on Twitter:
- @SteveBMorgan
- @SyniadIT

More Related Content

What's hot

Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
Desmond Devendran
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
Jerod Brennen
 
Architecting Next Generatio IT Operating Models Using IT4IT and SFIA
Architecting Next Generatio IT Operating Models Using IT4IT and SFIAArchitecting Next Generatio IT Operating Models Using IT4IT and SFIA
Architecting Next Generatio IT Operating Models Using IT4IT and SFIA
Sukumar Daniel
 
ITIL SIAM - Service Integration and Management Model
ITIL  SIAM - Service Integration and Management ModelITIL  SIAM - Service Integration and Management Model
ITIL SIAM - Service Integration and Management Model
PeteFeehan
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
Prime Infoserv
 
Enterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation StrategyEnterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation Strategy
Shiva Hullavarad
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Priyanka Aash
 
How To Drive A Successful ServiceNow Implementation
How To Drive A Successful ServiceNow ImplementationHow To Drive A Successful ServiceNow Implementation
How To Drive A Successful ServiceNow Implementation
Aspire Systems
 
IT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
IT Service Catalog: Build a Service Taxonomy in 4 Easy StepsIT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
IT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
Evergreen Systems
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
The Open Group SA
 
IT Governance Powerpoint Presentation Slides
IT Governance Powerpoint Presentation SlidesIT Governance Powerpoint Presentation Slides
IT Governance Powerpoint Presentation Slides
SlideTeam
 
ITIL4 and ServiceNow
ITIL4 and ServiceNowITIL4 and ServiceNow
ITIL4 and ServiceNow
ITSM Academy, Inc.
 
ITIL-4-Framework-2021.pptx
ITIL-4-Framework-2021.pptxITIL-4-Framework-2021.pptx
ITIL-4-Framework-2021.pptx
Exlit
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
CAST
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
Strategic Operating Model
Strategic Operating Model Strategic Operating Model
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
Adrian Dumitrescu
 

What's hot (20)

Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0
 
Architecting Next Generatio IT Operating Models Using IT4IT and SFIA
Architecting Next Generatio IT Operating Models Using IT4IT and SFIAArchitecting Next Generatio IT Operating Models Using IT4IT and SFIA
Architecting Next Generatio IT Operating Models Using IT4IT and SFIA
 
ITIL SIAM - Service Integration and Management Model
ITIL  SIAM - Service Integration and Management ModelITIL  SIAM - Service Integration and Management Model
ITIL SIAM - Service Integration and Management Model
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Enterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation StrategyEnterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation Strategy
 
SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0SABSA Implementation(Part III)_ver1-0
SABSA Implementation(Part III)_ver1-0
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
How To Drive A Successful ServiceNow Implementation
How To Drive A Successful ServiceNow ImplementationHow To Drive A Successful ServiceNow Implementation
How To Drive A Successful ServiceNow Implementation
 
IT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
IT Service Catalog: Build a Service Taxonomy in 4 Easy StepsIT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
IT Service Catalog: Build a Service Taxonomy in 4 Easy Steps
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
IT Governance Powerpoint Presentation Slides
IT Governance Powerpoint Presentation SlidesIT Governance Powerpoint Presentation Slides
IT Governance Powerpoint Presentation Slides
 
ITIL4 and ServiceNow
ITIL4 and ServiceNowITIL4 and ServiceNow
ITIL4 and ServiceNow
 
ITIL-4-Framework-2021.pptx
ITIL-4-Framework-2021.pptxITIL-4-Framework-2021.pptx
ITIL-4-Framework-2021.pptx
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Strategic Operating Model
Strategic Operating Model Strategic Operating Model
Strategic Operating Model
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 

Similar to How to build and operate an effective IT tooling strategy in a SIAM operating model

Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy
Steve Morgan
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & Tricks
AppDynamics
 
Siam for enterprize agility
Siam for enterprize agilitySiam for enterprize agility
Siam for enterprize agility
Francis Martens
 
Chap008
Chap008Chap008
What is BPM?
What is BPM?What is BPM?
What is BPM?
Atle Skjekkeland
 
Service-Flow SaaS solution for Service Integration
Service-Flow SaaS solution for Service IntegrationService-Flow SaaS solution for Service Integration
Service-Flow SaaS solution for Service Integration
Service-Flow Corp.
 
Maximo KPI Maintenance & Asset Reliability Support Workshop IMC 2013 presenta...
Maximo KPI Maintenance & Asset Reliability Support Workshop IMC 2013 presenta...Maximo KPI Maintenance & Asset Reliability Support Workshop IMC 2013 presenta...
Maximo KPI Maintenance & Asset Reliability Support Workshop IMC 2013 presenta...
Julie Rampello
 
what-is-bpm-1234452005226143-34862409.ppt
what-is-bpm-1234452005226143-34862409.pptwhat-is-bpm-1234452005226143-34862409.ppt
what-is-bpm-1234452005226143-34862409.ppt
Ganesh Shevade
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
Kaseya
 
Awesome CMS! Implementing Configuration Management to Maximise Value #LEADit
Awesome CMS! Implementing Configuration Management to Maximise Value #LEADitAwesome CMS! Implementing Configuration Management to Maximise Value #LEADit
Awesome CMS! Implementing Configuration Management to Maximise Value #LEADit
Awesome CMS
 
Julie Rampello Maximo workshop IMC 2013 presentation
Julie Rampello Maximo workshop IMC 2013 presentationJulie Rampello Maximo workshop IMC 2013 presentation
Julie Rampello Maximo workshop IMC 2013 presentationProjetech
 
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP ProfitsMSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
David Castro
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
IBM z Systems Software - IT Service Management
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1
miket60
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Lance Peterman
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
Precisely
 
Achieving operational excellence and customer intimacy enterprise applications
Achieving operational excellence and customer intimacy enterprise applicationsAchieving operational excellence and customer intimacy enterprise applications
Achieving operational excellence and customer intimacy enterprise applications
Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU
 
Pulse2012 Trm Battelle Final
Pulse2012 Trm Battelle FinalPulse2012 Trm Battelle Final
Pulse2012 Trm Battelle Final
brockj
 
From SIEM to Business processes
From SIEM to Business processesFrom SIEM to Business processes
From SIEM to Business processes
Olesya Shelestova
 
RowanDay3.pptx
RowanDay3.pptxRowanDay3.pptx
RowanDay3.pptx
MattMarino13
 

Similar to How to build and operate an effective IT tooling strategy in a SIAM operating model (20)

Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy
 
Top 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & TricksTop 5 Java Performance Metrics, Tips & Tricks
Top 5 Java Performance Metrics, Tips & Tricks
 
Siam for enterprize agility
Siam for enterprize agilitySiam for enterprize agility
Siam for enterprize agility
 
Chap008
Chap008Chap008
Chap008
 
What is BPM?
What is BPM?What is BPM?
What is BPM?
 
Service-Flow SaaS solution for Service Integration
Service-Flow SaaS solution for Service IntegrationService-Flow SaaS solution for Service Integration
Service-Flow SaaS solution for Service Integration
 
Maximo KPI Maintenance & Asset Reliability Support Workshop IMC 2013 presenta...
Maximo KPI Maintenance & Asset Reliability Support Workshop IMC 2013 presenta...Maximo KPI Maintenance & Asset Reliability Support Workshop IMC 2013 presenta...
Maximo KPI Maintenance & Asset Reliability Support Workshop IMC 2013 presenta...
 
what-is-bpm-1234452005226143-34862409.ppt
what-is-bpm-1234452005226143-34862409.pptwhat-is-bpm-1234452005226143-34862409.ppt
what-is-bpm-1234452005226143-34862409.ppt
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Awesome CMS! Implementing Configuration Management to Maximise Value #LEADit
Awesome CMS! Implementing Configuration Management to Maximise Value #LEADitAwesome CMS! Implementing Configuration Management to Maximise Value #LEADit
Awesome CMS! Implementing Configuration Management to Maximise Value #LEADit
 
Julie Rampello Maximo workshop IMC 2013 presentation
Julie Rampello Maximo workshop IMC 2013 presentationJulie Rampello Maximo workshop IMC 2013 presentation
Julie Rampello Maximo workshop IMC 2013 presentation
 
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP ProfitsMSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Achieving operational excellence and customer intimacy enterprise applications
Achieving operational excellence and customer intimacy enterprise applicationsAchieving operational excellence and customer intimacy enterprise applications
Achieving operational excellence and customer intimacy enterprise applications
 
Pulse2012 Trm Battelle Final
Pulse2012 Trm Battelle FinalPulse2012 Trm Battelle Final
Pulse2012 Trm Battelle Final
 
From SIEM to Business processes
From SIEM to Business processesFrom SIEM to Business processes
From SIEM to Business processes
 
RowanDay3.pptx
RowanDay3.pptxRowanDay3.pptx
RowanDay3.pptx
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

How to build and operate an effective IT tooling strategy in a SIAM operating model

  • 1. 1 SERVICE MANAGEMENT SOLUTIONS TO DELIVER IT EXCELLENCE
  • 2. 2 How to build and operate an effective SIAM tooling solution Steve Morgan Service North 2018 November 2018
  • 3. 3 The Challenge In moving to a SIAM operating model: • How do you ensure continual and efficient transmission of transactions between you and your SIAM eco- system? • How do have a “single source of the truth” upon which to base business decisions? • How do ensure that the quality and availability of data isn’t any worse under a SIAM model? • How do you build accurate reporting without a large reporting team?
  • 4. 4 The Scenarios you’ll find yourself in Scenario Benefits Watch out for…. You have an established toolset which includes the main functionality. You’d like all your vendors to use this • You own the workflows, data structures, etc. • No dependency on service providers, enables flexibility in future • “Behind the curtain” integrations • In-house or third party skills to maintain the tool • You’re on the hook for keeping data up to date You’re looking to establish a new toolset, provided by one or more of your SIAM eco- system providers • They’ll bring established workflows and processes • They’ll maintain the tool and the data • Other service providers may be reluctant to use it, due to visibility of performance and loss of IP and control • “Behind the curtain” integrations You’re looking to introduce a new toolset at the same time as your new SIAM operating model • All stakeholders have the opportunity to contribute to it • Decision making may take time • Suppliers may still be unwilling to use it
  • 5. 5 What are the potential pain-points? There’s more than we think….! Incident / Request / Problem / Change workflow Master data availability and update Transient data availability and update System health / performance data and dashboard Service Performance / SLA data collation Project / Programme demand and delivery data
  • 6. 6 Your ITSM SIAM tooling scope But don’t forget….. • Finance • Supplier / Contract Management • Project and Portfolio Management
  • 7. 7 Four Key Elements of a good ITSM Tool Integration CMDB Workflow Common Data Dictionary
  • 8. 8 Discovery • Discovery capability must be able to integrate with ITSM tool and CMDB • SIAM retains accountability for CMDB/Asset Mgt across the SIAM eco-system, with service providers providing content • Discovery is hard! – Don’t de-prioritise your Discovery workstream • Discovery of hardware assets is typically easiest • Software discovery is easier for COTS software, but some home-grown apps can be problematic
  • 9. 9 • Biggest issues in a SIAM environment are: – Getting acceptance in the SIAM eco-system to use a single tool – Service Provider’s existing tools and processes are often optimised for their organisations and therefore difficult to integrate with or replace – Keeping an accurate picture in a single reference tool – Discovery of the relationships between assets – Making the connection between discovered assets and non-discoverable CIs like Services, Business Processes, etc – Mapping what’s discovered back to the CMDB – Unpredictability of Pricing Issues with Discovery in a SIAM environment
  • 10. 10 Software Asset Management (SAM) • Discovery software will identify software assets • Level of license / software use data can be difficult to manage • In a SIAM model your Service Providers will each manage and provide information on software licensing in their tower • The SIAM organisation will normally be responsible for pulling this together in a single picture • Who is accountable for compliance? • Beware ITSM tools claiming SAM capability, this tends to be fairly basic, and won’t cover all software types, nor support sophisticated requirements like metering
  • 11. 11 Event correlation & Dashboarding • This area is often overlooked but is critical • Tower providers will each have their own systems management tools and will monitor alerts for the systems in their scope • Integrating all of these alerts into Business Service dashboards is the responsibility of an event correlation tool • Ideally, this is integrated into the CMDB to allow the Service “overlay” to system events • It is monitored by the SIAM layer – to ensure issues are being addressed in a timely manner – to correlate alerts generated from different towers to identify potential service impacting issues
  • 12. 12 Reporting • Beware of creating a cottage-industry for reporting in each service provider • Categorise reports by type – Commercial – Service – Service Provider • Maintain under change control to prevent report proliferation • Attempt to standardise reports to avoid variations by customer and catalogue reports by type • Avoid reports which are purely volumetric – Trends are interesting, but this is just data – Turn it into information by measuring against targets / KPIs
  • 13. 13 Capacity Management Business Capacity Service Capacity Resource Capacity SIAM Towers provide capacity data for their services SIAM correlates into Service Views using Service Catalogue / CMDB integration The business provides strategic intent for translation into service and technical impacts Tower specific tools Data analysis, trending, forecasting tool Integration with Service Catalogue & CMDB The same principle applies for Availability and Service Continuity
  • 14. 14 Key Takeaways • Define a Tooling Strategy at the outset • Baseline existing tooling • Think Beyond the ITSM tool • Interoperability is vital • Involve the SIAM eco-system service providers to ensure that their tools complement the SIAM toolset • Assign ownership • Seek to reduce duplication between tools • Don’t be afraid to adapt as you progress • Ensure alignment with processes • Ensure commitment through ongoing involvement of those who will use the tool
  • 15. 15 Thank You! Steve Morgan, Syniad IT www.SyniadITSolutions.co.uk • All of our SIAM content, can be found for FREE, here http://bit.ly/ServiceNorth • You can sign up for our newsletter on the website • Follow us on Twitter: - @SteveBMorgan - @SyniadIT