SlideShare a Scribd company logo
1 of 14
11
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Technology Trend & Impact to ITIL
A strategy for Next Gen ITSM from SLK
Disclaimer: All logos used in this deck are property of respective owners
Copyright 2014 SLK Software Services. All rights reserved.
2
(2)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
2SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Contents
 Top 10 Strategic Technology Trends 2014
 Today’s Challenge - Sample Scenarios
 Perceived ITSM Mobile Strategy
 Mobile Enablement for ITSM
 Enterprise ITSM Mobile Strategy
 Strategy Benefits
3
(3)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
3SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Top 10 Strategic Technology Trends 2014
Converging
Forces
Derivative
Impact
Future
Disruption
• Mobile Device Diversity & Management
• Mobile Apps & Applications
• The Internet of Everything
• Hybrid Cloud & IT as Service Broker
• Cloud / Client Architecture
• The Era of Personal Cloud
• Software Defined Anything
• Web Scale IT
• Smart Machines
• 3-D Printing
Source: Gartner 2013
4
(4)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
4SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Mobile Device Diversity
Wearable Pocketable Grab & Go Convertible Portable Desk Shared Areas
Touch, Voice…
Keyboard, Mouse
Gesture
Tactics are the new strategy
Source: Gartner 2013
5
(5)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
5SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Today’s Challenge – Sample scenarios
Outlook is not connecting to
Exchange – Issue logged at 6pm
Desktop / User based
Server based
Network based
A critical server approaching disk
full state
Monthly backup scheduled for
critical system
ITSM staff unable to resolve in
time till EOD
Issue was not resolved till next
business day
Monitoring tool opened a low
priority ticket to resolve within a
day
Server reached the threshold
unexpectedly and frozen
Backup failed due to bandwidth
choke and ITSM staff unable to
view bandwidth status
Scheduled Backup Failed
unexpectedly
6
(6)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
6SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Perceived ITSM Mobile Strategy
Enterprise Mobile Applications
ITSM Staff
Tickets / SLA Alerts
Enterprises generally focus on enabling Web Apps on the Mobile Channel and most
enterprises perceive this as their Mobile Strategy
Web App/
Web Features
Core Systems
SM Tools
Monitoring Tools
7
(7)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
7SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Is your mobile strategy Future-ready?
- Device & Data Security
- Platform/Device Agnostic
- Hardware capabilities
- Bring Your Own Device (BYOD)
Does your mobile strategy support
multiple user interface?
- Voice Command
- Audio Output
- Keyboard & Visual Output
Does your Mobile Strategy go beyond
Conventional Usage?
- Scan & Integrate with CMDB
- Access to KEDB from any location
- Capable to Intergrade multiple Applications
Does your mobile applications work on:
- iPhone (iOS), iPad
- Android Phones &Tablets
-Windows Phone,Tablets
The next-gen mobile strategy should offer more service lines and should be
scalable to futuristic needs
Points to Ponder – ITSM Mobile Strategy
8
(8)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
8SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Mobile Enablement for ITSM
• Generate reports / trends on tickets / alerts etc.
• Intelligence in reporting the unexpected situations
• Proactive reports on hardware performance to act
• Capacity planning by collaborative method
• Monitoring the critical env- 24/7
• Live Alerts for IT env
• Accessibility to alert logs and issue resolution
• Visibility on critical items for engineers / on call
Analytics
Monitoring Tools Remote Consoles
Management
• BI – for IT
• Proactive decisions on critical situations
• Single stop live view of IMS environment
• Approvals / authorization on the move
ITSM
SM Tools
• Problem, Incidents, Change records
• CMDB, KEDB access from anywhere
• Critical incident , SLA monitoring
• Management dashboards and Alerts
• Remote consoles for easy and faster troubleshooting
• Visibility and accessibility enabling collaborative resolution
• DC server / Network equipment access for faster resolution
• LDAP Consoles
9
(9)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
9SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Enterprise ITSM Mobile Strategy
Customer Enterprise Partners
Enterprise ITSM Mobile Applications
Mobile Application Frameworks
Tickets /
SLA
Live
Alerts
Remote
Consoles
Dashboards/
Reports
Mobile Application Management
(Enterprise AppStore / MAM)
Mobile Device Management
(MDM)
Mobile Operating System
Device Drivers & API
Mobile Devices & Accessories
POS
NFC
Camera
Bar Code
RFID
Antenna
Audio
Mobile Hardware Accessories
Vision:
Centralized platform to remote access ITSM tools to monitor, analyze, resolve the issues proactively & lively
IMS
SM Tools
Monitoring tools
Remote devices
Analytics
Mobile Enterprise Application (MEAP)
10
(10)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
10SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Revised ITSM Maturity Model based on Trends
Gain experience with
tools, technology
• Pilot projects
• Proof of Concepts
Established Security
Standards
Improved SLAs based on
new process and mobile
enablement
Limited innovative
applications
Limited integration with
different ITSM tools (SM,
Monitoring, Analytics)
App Store based
distribution
Established strategy
and roadmap
Centralized ITSM,
Mobile Policy
All possible tools are
made available in
Mobile platform also
Integrated dashboard,
predictive analytics
Learn, Innovate and
Continuously improve
Support all major
mobile platform
Majority of processes &
intelligence on mobile
Measured results feed
to strategy
Business Process
innovations &
automation
Collaborative outputs
lead to Productivity and
Future plan
Omni-channel user
experience
Established ITSM +
Mobile Center of
Excellence
Reduction in IT Service
investment
Apps enabled on
web/mobile – Tickets,
Environment Monitoring
Validation of enabled
services (ex: 24/7 on call)
and impact
No major impact in SLAs
VPN based
Early Learning
Initial exploration in
ITSM
Enforced
Used by selected
ITSM staff on need
basis
Established
Used in selected
divisions of IT
Enterprise
Enablers targeted
for entire IT group
Ecosystem
Consistent within
the ecosystem
Source: SLK Research
11
(11)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
11SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
 Establish Enterprise ITSM Mobile Strategy
 Focus on building innovative solutions rather than just
applications
 Devise a strategy for integrating mobile with enterprise
systems
 Focus on building applications that cater to multiple
platforms/devices
 Establish consistent user experience across the mobile
channel
 Introduce new SLAs leveraging the power of mobile device
 Build solutions that caters to customer, enterprise &
partner needs
 Evaluate the Tablet space in all initiatives
Enterprise ITSM Mobile Strategy – Strategic direction
12
(12)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
12SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Strategy Benefits
Benefit Impact
Centralized platform to remote access ITSM tools
for Updating, Reassigning, Resolving Issues
Productivity
SLA
Enable mobility for ITSM staff to work on consoles
directly from anywhere
Flexibility
Improved ITSM Staff motivation Employee Satisfaction
Faster resolution time for Incidents, Problems SLA
Improved Change management Productivity
Reduced escalations Customer Satisfaction
Reduced ITSM staff Cost
Better solution for 24/7 on call Business demands Customer Satisfaction
Business Continuity
Proactive & Lively solution for ITSM Innovation
Predictability
Increased Business revenue Revenue
Customer Confidence
13
(13)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
13SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Sample Screenshot
1414
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Thank you !

More Related Content

What's hot

Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Riverbed Technology
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck finalScalar Decisions
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionQOS Networks
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IPAvtec Inc.
 
Four Factors for Evaluating SD-WAN Solutions
Four Factors for Evaluating SD-WAN SolutionsFour Factors for Evaluating SD-WAN Solutions
Four Factors for Evaluating SD-WAN SolutionsRiverbed Technology
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
Building Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSIBuilding Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSISplunk
 
Best Practices For Cisco Wlan Management
Best Practices For Cisco Wlan ManagementBest Practices For Cisco Wlan Management
Best Practices For Cisco Wlan Managementhypknight
 
INTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSINTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSIvanti
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsRogue Wave Software
 
Webinar: Improving your FITARA Scorecard
Webinar: Improving your FITARA ScorecardWebinar: Improving your FITARA Scorecard
Webinar: Improving your FITARA ScorecardSolarWinds
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodaySolarWinds
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudSherWeb
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesRehanShrivastav
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15Mike Lemons
 
Riverbed Remote Office/Branch Office IT Survey
Riverbed Remote Office/Branch Office IT SurveyRiverbed Remote Office/Branch Office IT Survey
Riverbed Remote Office/Branch Office IT SurveyRiverbed Technology
 

What's hot (20)

Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
MBSE, RTI and FACE
MBSE, RTI and FACEMBSE, RTI and FACE
MBSE, RTI and FACE
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home Transition
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
 
Four Factors for Evaluating SD-WAN Solutions
Four Factors for Evaluating SD-WAN SolutionsFour Factors for Evaluating SD-WAN Solutions
Four Factors for Evaluating SD-WAN Solutions
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
Building Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSIBuilding Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSI
 
soc
socsoc
soc
 
Best Practices For Cisco Wlan Management
Best Practices For Cisco Wlan ManagementBest Practices For Cisco Wlan Management
Best Practices For Cisco Wlan Management
 
INTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSINTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONS
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the details
 
Webinar: Improving your FITARA Scorecard
Webinar: Improving your FITARA ScorecardWebinar: Improving your FITARA Scorecard
Webinar: Improving your FITARA Scorecard
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the Cloud
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan services
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
 
Riverbed Remote Office/Branch Office IT Survey
Riverbed Remote Office/Branch Office IT SurveyRiverbed Remote Office/Branch Office IT Survey
Riverbed Remote Office/Branch Office IT Survey
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 

Similar to ITSM Technology Trend

SplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started SessionSplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started SessionSplunk
 
Challenges of Mobile HR framework and program
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and programJinen Dedhia
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015Georg Knon
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewGuatemala User Group
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingGeorg Knon
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...Dr. Wilfred Lin (Ph.D.)
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...Steven Davelaar
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...mfrancis
 
Software Developement Services in Mumbai
Software Developement Services in MumbaiSoftware Developement Services in Mumbai
Software Developement Services in Mumbaiolatechsolutionsltd
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
Splunk for IT Operations Breakout Session
Splunk for IT Operations Breakout SessionSplunk for IT Operations Breakout Session
Splunk for IT Operations Breakout SessionSplunk
 
Business Advantages of Oracle Software & Systems Running Together
Business Advantages of Oracle Software & Systems Running TogetherBusiness Advantages of Oracle Software & Systems Running Together
Business Advantages of Oracle Software & Systems Running TogetherMario Derba
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
IYF Sensors to Senses: Embedded Electronics are Shifting Gears for Product In...
IYF Sensors to Senses: Embedded Electronics are Shifting Gears for Product In...IYF Sensors to Senses: Embedded Electronics are Shifting Gears for Product In...
IYF Sensors to Senses: Embedded Electronics are Shifting Gears for Product In...Information Services Group (ISG)
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 

Similar to ITSM Technology Trend (20)

SplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started SessionSplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started Session
 
Challenges of Mobile HR framework and program
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and program
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
 
Software Developement Services in Mumbai
Software Developement Services in MumbaiSoftware Developement Services in Mumbai
Software Developement Services in Mumbai
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Splunk for IT Operations Breakout Session
Splunk for IT Operations Breakout SessionSplunk for IT Operations Breakout Session
Splunk for IT Operations Breakout Session
 
Business Advantages of Oracle Software & Systems Running Together
Business Advantages of Oracle Software & Systems Running TogetherBusiness Advantages of Oracle Software & Systems Running Together
Business Advantages of Oracle Software & Systems Running Together
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
IYF Sensors to Senses: Embedded Electronics are Shifting Gears for Product In...
IYF Sensors to Senses: Embedded Electronics are Shifting Gears for Product In...IYF Sensors to Senses: Embedded Electronics are Shifting Gears for Product In...
IYF Sensors to Senses: Embedded Electronics are Shifting Gears for Product In...
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

ITSM Technology Trend

  • 1. 11 Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Technology Trend & Impact to ITIL A strategy for Next Gen ITSM from SLK Disclaimer: All logos used in this deck are property of respective owners Copyright 2014 SLK Software Services. All rights reserved.
  • 2. 2 (2)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 2SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Contents  Top 10 Strategic Technology Trends 2014  Today’s Challenge - Sample Scenarios  Perceived ITSM Mobile Strategy  Mobile Enablement for ITSM  Enterprise ITSM Mobile Strategy  Strategy Benefits
  • 3. 3 (3)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 3SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Top 10 Strategic Technology Trends 2014 Converging Forces Derivative Impact Future Disruption • Mobile Device Diversity & Management • Mobile Apps & Applications • The Internet of Everything • Hybrid Cloud & IT as Service Broker • Cloud / Client Architecture • The Era of Personal Cloud • Software Defined Anything • Web Scale IT • Smart Machines • 3-D Printing Source: Gartner 2013
  • 4. 4 (4)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 4SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Mobile Device Diversity Wearable Pocketable Grab & Go Convertible Portable Desk Shared Areas Touch, Voice… Keyboard, Mouse Gesture Tactics are the new strategy Source: Gartner 2013
  • 5. 5 (5)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 5SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Today’s Challenge – Sample scenarios Outlook is not connecting to Exchange – Issue logged at 6pm Desktop / User based Server based Network based A critical server approaching disk full state Monthly backup scheduled for critical system ITSM staff unable to resolve in time till EOD Issue was not resolved till next business day Monitoring tool opened a low priority ticket to resolve within a day Server reached the threshold unexpectedly and frozen Backup failed due to bandwidth choke and ITSM staff unable to view bandwidth status Scheduled Backup Failed unexpectedly
  • 6. 6 (6)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 6SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Perceived ITSM Mobile Strategy Enterprise Mobile Applications ITSM Staff Tickets / SLA Alerts Enterprises generally focus on enabling Web Apps on the Mobile Channel and most enterprises perceive this as their Mobile Strategy Web App/ Web Features Core Systems SM Tools Monitoring Tools
  • 7. 7 (7)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 7SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Is your mobile strategy Future-ready? - Device & Data Security - Platform/Device Agnostic - Hardware capabilities - Bring Your Own Device (BYOD) Does your mobile strategy support multiple user interface? - Voice Command - Audio Output - Keyboard & Visual Output Does your Mobile Strategy go beyond Conventional Usage? - Scan & Integrate with CMDB - Access to KEDB from any location - Capable to Intergrade multiple Applications Does your mobile applications work on: - iPhone (iOS), iPad - Android Phones &Tablets -Windows Phone,Tablets The next-gen mobile strategy should offer more service lines and should be scalable to futuristic needs Points to Ponder – ITSM Mobile Strategy
  • 8. 8 (8)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 8SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Mobile Enablement for ITSM • Generate reports / trends on tickets / alerts etc. • Intelligence in reporting the unexpected situations • Proactive reports on hardware performance to act • Capacity planning by collaborative method • Monitoring the critical env- 24/7 • Live Alerts for IT env • Accessibility to alert logs and issue resolution • Visibility on critical items for engineers / on call Analytics Monitoring Tools Remote Consoles Management • BI – for IT • Proactive decisions on critical situations • Single stop live view of IMS environment • Approvals / authorization on the move ITSM SM Tools • Problem, Incidents, Change records • CMDB, KEDB access from anywhere • Critical incident , SLA monitoring • Management dashboards and Alerts • Remote consoles for easy and faster troubleshooting • Visibility and accessibility enabling collaborative resolution • DC server / Network equipment access for faster resolution • LDAP Consoles
  • 9. 9 (9)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 9SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Enterprise ITSM Mobile Strategy Customer Enterprise Partners Enterprise ITSM Mobile Applications Mobile Application Frameworks Tickets / SLA Live Alerts Remote Consoles Dashboards/ Reports Mobile Application Management (Enterprise AppStore / MAM) Mobile Device Management (MDM) Mobile Operating System Device Drivers & API Mobile Devices & Accessories POS NFC Camera Bar Code RFID Antenna Audio Mobile Hardware Accessories Vision: Centralized platform to remote access ITSM tools to monitor, analyze, resolve the issues proactively & lively IMS SM Tools Monitoring tools Remote devices Analytics Mobile Enterprise Application (MEAP)
  • 10. 10 (10)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 10SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Revised ITSM Maturity Model based on Trends Gain experience with tools, technology • Pilot projects • Proof of Concepts Established Security Standards Improved SLAs based on new process and mobile enablement Limited innovative applications Limited integration with different ITSM tools (SM, Monitoring, Analytics) App Store based distribution Established strategy and roadmap Centralized ITSM, Mobile Policy All possible tools are made available in Mobile platform also Integrated dashboard, predictive analytics Learn, Innovate and Continuously improve Support all major mobile platform Majority of processes & intelligence on mobile Measured results feed to strategy Business Process innovations & automation Collaborative outputs lead to Productivity and Future plan Omni-channel user experience Established ITSM + Mobile Center of Excellence Reduction in IT Service investment Apps enabled on web/mobile – Tickets, Environment Monitoring Validation of enabled services (ex: 24/7 on call) and impact No major impact in SLAs VPN based Early Learning Initial exploration in ITSM Enforced Used by selected ITSM staff on need basis Established Used in selected divisions of IT Enterprise Enablers targeted for entire IT group Ecosystem Consistent within the ecosystem Source: SLK Research
  • 11. 11 (11)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 11SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd  Establish Enterprise ITSM Mobile Strategy  Focus on building innovative solutions rather than just applications  Devise a strategy for integrating mobile with enterprise systems  Focus on building applications that cater to multiple platforms/devices  Establish consistent user experience across the mobile channel  Introduce new SLAs leveraging the power of mobile device  Build solutions that caters to customer, enterprise & partner needs  Evaluate the Tablet space in all initiatives Enterprise ITSM Mobile Strategy – Strategic direction
  • 12. 12 (12)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 12SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Strategy Benefits Benefit Impact Centralized platform to remote access ITSM tools for Updating, Reassigning, Resolving Issues Productivity SLA Enable mobility for ITSM staff to work on consoles directly from anywhere Flexibility Improved ITSM Staff motivation Employee Satisfaction Faster resolution time for Incidents, Problems SLA Improved Change management Productivity Reduced escalations Customer Satisfaction Reduced ITSM staff Cost Better solution for 24/7 on call Business demands Customer Satisfaction Business Continuity Proactive & Lively solution for ITSM Innovation Predictability Increased Business revenue Revenue Customer Confidence
  • 13. 13 (13)Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 13SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Sample Screenshot
  • 14. 1414 Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd Thank you !