SlideShare a Scribd company logo
Lec-2: ITIL
Mr. Islahuddin Jalal
MS (Cyber Security) – UKM Malaysia
Research Title – 3C-CSIRT Model for Afghanistan
BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
ITIL Service Lifecycle
Service Strategy
• It is just the guidance for serving the customers by setting objectives
and expectations of performance and to identify, select and prioritize
opportunities.
• Ensuring that organizations are in a position to handle the costs and
risks associated with their service portfolios, and are set up not just
for operational effectiveness but also for distinctive performance.
Purpose of Service Strategy
• It sets out guidance to all IT service providers and their customers, to
help them operate and thrive in the long term by building a clear
service strategy.
• A fundamental acknowledgement that customers do not buy products, they
buy the satisfaction of particular needs
• The services provided must be perceived by the customer to deliver sufficient
value in the form of outcomes that the customer wants to achieve.
Service Strategy Development
• Requires a precise understanding of:
• What service should be offered?
• Who the services should be offered to?
• How the internal and external market places for their services should be
developed?
• How the customers and stakeholders will perceive and measure value?
• How this value be created?
• How customers will make service sourcing decisions with respect to use of
different types of service providers
• How the allocation of available resources will be tuned to optimal effect
across the portfolio of services?
Four Ps of Strategy
• Perspective: the distinctive vision and direction
• Position: the basis on which the provider will compete
• Plan: How the provider will achieve their vision
• Pattern: the fundamental way of doing things – distinctive patterns in
decisions and actions over time
Service Strategy has four activities
Define the Market
Develop the Offerings
Develop Strategic Assets
Prepare for Execution
Service Assets
• Resources
• Things you buy or pay for
• IT Infrastructure, people, money
• Tangible Assets
• Capabilities
• Things you grow
• Ability to carry out an activity
• Intangible assets
• Transform resources into Services
Service Portfolio Management
• Prioritises and manages investments and resource
allocation
• Proposed services are properly assessed
• Business Case
• Existing Services Assessed.
• Outcomes:
• Replace
• Rationalise
• Renew
• Retire
Service Design
• How are we going to provide it?
• How are we going to build it?
• How are we going to test it?
• How are we going to deploy it?
Processes in Service Design
• Availability Management
• Capacity Management
• Disaster Recovery Management
• Supplier Management
• Service Level Management
• Information Security Management
• Service Catalogue Management
Service Level Management
• Service Level Agreement
• Operational Level Agreements
• Internal
• Underpinning Contracts
• External Organisation
• Supplier Management
• Can be an annexe to a contract
• Should be clear and fair and written in easy-to-understand,
unambiguous language
• Success of SLM
• How many services have SLAs?
• How does the number of breaches of SLA change over time
(we hope it reduces!)?
Things you might find in an SLA
Service
Description
Hours of
operation
User Response
times
Incident
Response
times
Resolution
times
Availability &
Continuity
targets
Customer
Responsibilities
Critical
operational
periods
Change
Response
Times
Types of SLA
• Service-based
• All customers get same deal for same services
• Customer-based
• Different customers get different deal (and different cost)
• Multi-level
• These involve corporate, customer and service levels and
avoid repetition
Capacity Management
• Process used to manage information technology (IT).
• Its primary goal is to ensure that IT resources are
• right-sized to meet current and future business requirements in a cost-
effective manner
• Capacity Management consists of three sub-process.
• Business capacity management
• Service capacity management
• Resource capacity management
•Configuration data
•SLAs
•Business plans / strategy
•IS/IT plans / strategy
•Business
requirements/volumes
•Operational schedules
•Deployment / development
plans
•Forward Schedule of
Changes
•Incident/Problem reports
•SLA breach reports
•Budgets/Financial
•BUSINESS CAPACITY
MANAGEMENT
Business requirement trends &
forecasts
•SERVICE CAPACITY
MANAGEMENT
•Monitor, analyze, tune &
report on service performance
•Establish baselines & profiles
of service usage
•Manage service demand
•RESOURCE CAPACITY
MANAGEMENT
•Component level utilization
baselines & profiles
•Capacity Plan
•Baselines & Profiles
•Thresholds & Alarms
•Capacity Reports
•SLA recommendations
•Costing & Charging
recommendations
•Proactive changes &
service improvements
•Revised operational
schedule
•Effectiveness reviews
•Audit reports
INPUTS SUB-PROCESS OUTPUTS
NIRVANA…
Right Capacity, Right Time, Right Cost!
• This is capacity management
• Balances Cost against Capacity so minimises costs
while maintaining quality of service
Thank You
For Your Patience

More Related Content

What's hot

Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
Jeff Stokes
 
ITIL Service Desk
ITIL Service DeskITIL Service Desk
Itil ppt
Itil pptItil ppt
Itil ppt
seetadevi
 
Managed solutions Solution
Managed solutions SolutionManaged solutions Solution
Managed solutions Solution
Len Moncrieffe
 
Presentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 EnvironmentPresentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 EnvironmentVyom Labs
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Training
jogemwind
 
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
ITIL Indonesia
 
Sinoptix faster business through application management outsourcing
Sinoptix   faster business through application management outsourcingSinoptix   faster business through application management outsourcing
Sinoptix faster business through application management outsourcing
Paul Costea
 
What Every Project Manager Should Know About Itil
What Every Project Manager Should Know About ItilWhat Every Project Manager Should Know About Itil
What Every Project Manager Should Know About Itil
Daniel Cayouette
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
Patricia NENZI
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaJisu Dasgupta
 
ITILv3 Service Design
ITILv3 Service DesignITILv3 Service Design
ITILv3 Service Design
Procept Associates
 
Clover Infotech Corporate PPT
Clover Infotech Corporate PPTClover Infotech Corporate PPT
Clover Infotech Corporate PPT
Swetha Elias
 
ACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem SolvingACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem Solving
Vinayak Hegde
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT Solutions
John Maguire
 
ITIL v3 overview from Kent State University
ITIL v3 overview from Kent State UniversityITIL v3 overview from Kent State University
ITIL v3 overview from Kent State University
gulciny07
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
Axios Systems
 
ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library) ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library)
Nghia Le
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
Happiest Minds Technologies
 

What's hot (20)

Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
ITIL Service Desk
ITIL Service DeskITIL Service Desk
ITIL Service Desk
 
Itil ppt
Itil pptItil ppt
Itil ppt
 
Managed solutions Solution
Managed solutions SolutionManaged solutions Solution
Managed solutions Solution
 
Presentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 EnvironmentPresentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 Environment
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Training
 
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
 
Sinoptix faster business through application management outsourcing
Sinoptix   faster business through application management outsourcingSinoptix   faster business through application management outsourcing
Sinoptix faster business through application management outsourcing
 
What Every Project Manager Should Know About Itil
What Every Project Manager Should Know About ItilWhat Every Project Manager Should Know About Itil
What Every Project Manager Should Know About Itil
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu Dasgupta
 
ITILv3 Service Design
ITILv3 Service DesignITILv3 Service Design
ITILv3 Service Design
 
Clover Infotech Corporate PPT
Clover Infotech Corporate PPTClover Infotech Corporate PPT
Clover Infotech Corporate PPT
 
ACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem SolvingACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem Solving
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT Solutions
 
ITIL v3 overview from Kent State University
ITIL v3 overview from Kent State UniversityITIL v3 overview from Kent State University
ITIL v3 overview from Kent State University
 
ITIL Ayman Hraghi
ITIL Ayman HraghiITIL Ayman Hraghi
ITIL Ayman Hraghi
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library) ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library)
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 

Similar to ITIL # Lecture 2

ITIL Service Management
ITIL Service ManagementITIL Service Management
ITIL Service Management
Marvin Sirait
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
Patricia NENZI
 
Itilv3
Itilv3Itilv3
Itilv3
Faraz Shah
 
The how, why and what of ITIL® certifications
The how, why and what of ITIL® certificationsThe how, why and what of ITIL® certifications
The how, why and what of ITIL® certifications
Lora Beros
 
ITIL Service Strategy
ITIL Service StrategyITIL Service Strategy
ITIL Service Strategy
Marvin Sirait
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationWajahat Rajab
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecyclesagaroceanic11
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecyclesagaroceanic11
 
ITIL Service Strategy 2011
ITIL Service Strategy 2011ITIL Service Strategy 2011
ITIL Service Strategy 2011
Marvin Sirait
 
About itil v3
About itil v3About itil v3
About itil v3
Abdulfattah Awajah
 
ITIL Continual Service Improvement 2011
ITIL Continual Service Improvement 2011ITIL Continual Service Improvement 2011
ITIL Continual Service Improvement 2011
Marvin Sirait
 
ITIL
ITILITIL
ITIL Service Design 2011
ITIL Service Design 2011ITIL Service Design 2011
ITIL Service Design 2011
Marvin Sirait
 
ITIL Service Transition 2011
ITIL Service Transition 2011ITIL Service Transition 2011
ITIL Service Transition 2011
Marvin Sirait
 
ITIL Version 4 Presentation for self reading
ITIL Version 4 Presentation for self readingITIL Version 4 Presentation for self reading
ITIL Version 4 Presentation for self reading
gurunath29
 
ITS Goals and Metrics
ITS Goals and MetricsITS Goals and Metrics
ITS Goals and Metrics
Dr. Arturo Perez
 
Itil service strategy
Itil service strategyItil service strategy
Itil service strategy
Nikhil l
 
54 - How to Become an ITIL STAR
54 - How to Become an ITIL STAR54 - How to Become an ITIL STAR
54 - How to Become an ITIL STARCathy Kirch
 
Itil v3 service strategy
Itil v3 service strategyItil v3 service strategy
Itil v3 service strategy
yulhendri_asman
 

Similar to ITIL # Lecture 2 (20)

ITIL Service Management
ITIL Service ManagementITIL Service Management
ITIL Service Management
 
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
ITIL v3 at COMPUTERLAND : presentation to the team - Sept 2014
 
Itilv3
Itilv3Itilv3
Itilv3
 
The how, why and what of ITIL® certifications
The how, why and what of ITIL® certificationsThe how, why and what of ITIL® certifications
The how, why and what of ITIL® certifications
 
ITIL Service Strategy
ITIL Service StrategyITIL Service Strategy
ITIL Service Strategy
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecycle
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecycle
 
ITIL
ITILITIL
ITIL
 
ITIL Service Strategy 2011
ITIL Service Strategy 2011ITIL Service Strategy 2011
ITIL Service Strategy 2011
 
About itil v3
About itil v3About itil v3
About itil v3
 
ITIL Continual Service Improvement 2011
ITIL Continual Service Improvement 2011ITIL Continual Service Improvement 2011
ITIL Continual Service Improvement 2011
 
ITIL
ITILITIL
ITIL
 
ITIL Service Design 2011
ITIL Service Design 2011ITIL Service Design 2011
ITIL Service Design 2011
 
ITIL Service Transition 2011
ITIL Service Transition 2011ITIL Service Transition 2011
ITIL Service Transition 2011
 
ITIL Version 4 Presentation for self reading
ITIL Version 4 Presentation for self readingITIL Version 4 Presentation for self reading
ITIL Version 4 Presentation for self reading
 
ITS Goals and Metrics
ITS Goals and MetricsITS Goals and Metrics
ITS Goals and Metrics
 
Itil service strategy
Itil service strategyItil service strategy
Itil service strategy
 
54 - How to Become an ITIL STAR
54 - How to Become an ITIL STAR54 - How to Become an ITIL STAR
54 - How to Become an ITIL STAR
 
Itil v3 service strategy
Itil v3 service strategyItil v3 service strategy
Itil v3 service strategy
 

More from Kabul Education University

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
Kabul Education University
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
Kabul Education University
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
Kabul Education University
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
Kabul Education University
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
Kabul Education University
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
Kabul Education University
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
Kabul Education University
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
Kabul Education University
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
Kabul Education University
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
Kabul Education University
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
Kabul Education University
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
Kabul Education University
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
Kabul Education University
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
Kabul Education University
 
Network security # Lecture 2
Network security # Lecture 2Network security # Lecture 2
Network security # Lecture 2
Kabul Education University
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
Kabul Education University
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
Kabul Education University
 
Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan law
Kabul Education University
 

More from Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Network security # Lecture 2
Network security # Lecture 2Network security # Lecture 2
Network security # Lecture 2
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan law
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 

ITIL # Lecture 2

  • 1. Lec-2: ITIL Mr. Islahuddin Jalal MS (Cyber Security) – UKM Malaysia Research Title – 3C-CSIRT Model for Afghanistan BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
  • 3. Service Strategy • It is just the guidance for serving the customers by setting objectives and expectations of performance and to identify, select and prioritize opportunities. • Ensuring that organizations are in a position to handle the costs and risks associated with their service portfolios, and are set up not just for operational effectiveness but also for distinctive performance.
  • 4. Purpose of Service Strategy • It sets out guidance to all IT service providers and their customers, to help them operate and thrive in the long term by building a clear service strategy. • A fundamental acknowledgement that customers do not buy products, they buy the satisfaction of particular needs • The services provided must be perceived by the customer to deliver sufficient value in the form of outcomes that the customer wants to achieve.
  • 5. Service Strategy Development • Requires a precise understanding of: • What service should be offered? • Who the services should be offered to? • How the internal and external market places for their services should be developed? • How the customers and stakeholders will perceive and measure value? • How this value be created? • How customers will make service sourcing decisions with respect to use of different types of service providers • How the allocation of available resources will be tuned to optimal effect across the portfolio of services?
  • 6. Four Ps of Strategy • Perspective: the distinctive vision and direction • Position: the basis on which the provider will compete • Plan: How the provider will achieve their vision • Pattern: the fundamental way of doing things – distinctive patterns in decisions and actions over time
  • 7. Service Strategy has four activities Define the Market Develop the Offerings Develop Strategic Assets Prepare for Execution
  • 8. Service Assets • Resources • Things you buy or pay for • IT Infrastructure, people, money • Tangible Assets • Capabilities • Things you grow • Ability to carry out an activity • Intangible assets • Transform resources into Services
  • 9. Service Portfolio Management • Prioritises and manages investments and resource allocation • Proposed services are properly assessed • Business Case • Existing Services Assessed. • Outcomes: • Replace • Rationalise • Renew • Retire
  • 10. Service Design • How are we going to provide it? • How are we going to build it? • How are we going to test it? • How are we going to deploy it?
  • 11. Processes in Service Design • Availability Management • Capacity Management • Disaster Recovery Management • Supplier Management • Service Level Management • Information Security Management • Service Catalogue Management
  • 12. Service Level Management • Service Level Agreement • Operational Level Agreements • Internal • Underpinning Contracts • External Organisation • Supplier Management • Can be an annexe to a contract • Should be clear and fair and written in easy-to-understand, unambiguous language • Success of SLM • How many services have SLAs? • How does the number of breaches of SLA change over time (we hope it reduces!)?
  • 13. Things you might find in an SLA Service Description Hours of operation User Response times Incident Response times Resolution times Availability & Continuity targets Customer Responsibilities Critical operational periods Change Response Times
  • 14. Types of SLA • Service-based • All customers get same deal for same services • Customer-based • Different customers get different deal (and different cost) • Multi-level • These involve corporate, customer and service levels and avoid repetition
  • 15. Capacity Management • Process used to manage information technology (IT). • Its primary goal is to ensure that IT resources are • right-sized to meet current and future business requirements in a cost- effective manner • Capacity Management consists of three sub-process. • Business capacity management • Service capacity management • Resource capacity management
  • 16. •Configuration data •SLAs •Business plans / strategy •IS/IT plans / strategy •Business requirements/volumes •Operational schedules •Deployment / development plans •Forward Schedule of Changes •Incident/Problem reports •SLA breach reports •Budgets/Financial •BUSINESS CAPACITY MANAGEMENT Business requirement trends & forecasts •SERVICE CAPACITY MANAGEMENT •Monitor, analyze, tune & report on service performance •Establish baselines & profiles of service usage •Manage service demand •RESOURCE CAPACITY MANAGEMENT •Component level utilization baselines & profiles •Capacity Plan •Baselines & Profiles •Thresholds & Alarms •Capacity Reports •SLA recommendations •Costing & Charging recommendations •Proactive changes & service improvements •Revised operational schedule •Effectiveness reviews •Audit reports INPUTS SUB-PROCESS OUTPUTS NIRVANA…
  • 17. Right Capacity, Right Time, Right Cost! • This is capacity management • Balances Cost against Capacity so minimises costs while maintaining quality of service
  • 18. Thank You For Your Patience