SlideShare a Scribd company logo
1
報告人:叡揚資訊 李志強 經理 ITIL Expert,PMP
日 期:2015/4/21
如何做好IT治理 –
先從人員管理開始
AP 
People 
Infrastructure
 Information
2	
  
IT Governance by IT
1)  帳密管理 
2)  側錄軟體 
3)  權限管理
4)  服務管理
5)  資產/合約/
廠商
1)  專案管理平台
2)  軟體開發平台
3)  軟體品質管理
4)  端對端行為分析 
1)  操作自動化
2)  批次自動化
3)  資料/檔案交換平台
4)  平台監控軟體
5)  資料庫管理工具
6)  網路軟體與管理
1)  防資料洩露
2)  APT
3)  虛擬機安全
4)  資料庫監控防護
5)  資料 加密/變造
6)  加密/金鑰管理
People 
Management
Infrastructure
Management
Information 
Management
AP 
Management
歷史紀錄/報表/稽核
SFG
SI
z Platform
BYOD/APP. 
SaaS/Cloud

健檢/訓練
1)  資安檢測
2)  教育訓練
3)  E-Learning課程
1)  顧問
2)  健檢
3)  訓練
4)  專案
文管/SOP/KM
服務
3	
  
簡報大綱
n  IT Service Management function
n  IT Service Management process
n  Service asset and configuration
management
n  Access management
n  Supplier and Contract
4
IT Service
Management
function
5	
  
IT	
  Opera)ons	
  management
IT Service Management function
Service	
  
desk
Technical	
  
management
Mainframe
Server
Network
Storage
Database
Desktop
Middleware
Internet/web
IT	
  Opera)ons	
  
control	
  
Console	
  
management	
  
Job	
  schedule	
  
Backup	
  and	
  restore	
  
…	
  
Facili)es	
  
management	
  
Data	
  Centre	
  
Recovery	
  sites	
  
ConsolidaFon	
  
Contract
Applica)on	
  
management
ITSM(Heart-­‐ITSM)	
  
apps
HR(Radar)	
  
apps
KM(Vitals	
  ESP)	
  
apps
DOC(SPEED)	
  
apps
工作與會議
(teamKube)
apps
….
6
IT Service
Management
process
7	
  
Problem mgmt.
問題管理
IT Service Management Process
Users
Service desk
Exception
/Alert logs
Incident/
Service Request
線上服務台
Incident mgmt.
事故管理
Event mgmt.
事件管理
Monitoring tools
CMDB
服務知識庫
FAQ
KEDB
Change mgmt.
變更管理
Configuration
mgmt.
組態管理
RFC
Update CIs
CI 盤點
CTI
Self-Service
Capacity
mgmt.
容量管理
Dashboard 
Service Report
Service
catalogue 
服務目錄
Availability
mgmt.
可用性管理
Unsolved 
problems
Related CIs
Managers
Supplier mgmt. 
供應商管理
Technical
management
IT Operations
management
Application
management
8	
  
服務台 - 服務單建立
8
輸入申請人員後自
動帶出申請人相關
欄位
選擇影響CI
9	
  
服務單辦理 –我的待辦(處理人員)
Technical
management
Application
management
E-mail
Default
SMS
Option
Notifications
10	
  
問題單管理
10
Incident 轉
Problem
輸入主要事故
單編號
1.找出解決方案或
替代方案
2.回饋至服務知識庫
紀錄跟此問題
相關事故、變更
11	
  
變更管理
12
Service asset and
configuration
management
13	
  
Service asset and configuration
management
n  Ensure that the assets required to deliver services
are properly controlled, and that accurate and
reliable information about those assets is available
n  Identify, control, record, report, audit and verify CIs,
including versions, baselines, constituent
components, their attributes and relationships
14	
  
組態管理-定期盤點作業
15
Access
management
16	
  
Access management
Information
Security
management 
•  Define and document
all access control
policies
Facilities
management
•  Power management
•  Environmental
conditioning and alert
system
•  Safety
•  Physical access
control
•  shipping and receiving
Access
management
•  granting authorized
users the right to use a
service, while
preventing access to
non-authorized users
•  Request access
•  Verification
•  Provide rights
•  Check and monitor
identity status
•  Log and track access
•  Remove or restrict
rights
17
Supplier and
Contract
18	
  
Supplier and Contract
n  Supplier and contract management
information system
n  Recording all supplier and contract details
n  Details of the type of service(s) or product(s) provide by
each supplier
n  All other information and relationships with other
associated CIs
n  Evaluation and set up of new suppliers and contracts
n  Management of supplier`s performance
n  Contract renewal or termination
19	
  
1張
18張
5張
1張
ITSM產品顧問服務能量
20
QA
21
Thanks

More Related Content

What's hot

Managed Services Support
Managed Services SupportManaged Services Support
Managed Services Support
jdivalerio
 
Transforming compliance and audit management with ServiceNow
Transforming compliance and audit management with ServiceNowTransforming compliance and audit management with ServiceNow
Transforming compliance and audit management with ServiceNow
Iceberg Networks Corporation
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT Mapping
Rob Akershoek
 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
Lars Neupart
 
IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).
Rob Akershoek
 
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID Inc
 
Information security management system
Information security management systemInformation security management system
Information security management system
Arani Srinivasan
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
Mark Conway
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
Denim Group
 
ISO 27001
ISO 27001ISO 27001
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
Richard Willis
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference Architecture
Alan McSweeney
 
What is Cobit
What is CobitWhat is Cobit
What is Cobit
Ben Kalland
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
ISMS Awareness IT Staff
ISMS Awareness IT StaffISMS Awareness IT Staff
ISMS Awareness IT StaffTooba Khaliq
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?
Alvin Integrated Services [AIS]
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
Saumya Vishnoi
 
Professional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxProfessional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptx
ssusercc05cf
 

What's hot (20)

Managed Services Support
Managed Services SupportManaged Services Support
Managed Services Support
 
Transforming compliance and audit management with ServiceNow
Transforming compliance and audit management with ServiceNowTransforming compliance and audit management with ServiceNow
Transforming compliance and audit management with ServiceNow
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT Mapping
 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
 
IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).
 
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
IT Governance Vs IT Management Presentation V0.1
IT Governance Vs IT Management   Presentation V0.1IT Governance Vs IT Management   Presentation V0.1
IT Governance Vs IT Management Presentation V0.1
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference Architecture
 
What is Cobit
What is CobitWhat is Cobit
What is Cobit
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
ISMS Awareness IT Staff
ISMS Awareness IT StaffISMS Awareness IT Staff
ISMS Awareness IT Staff
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 
Professional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxProfessional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptx
 

Similar to 如何有效運用ITSM工具做好IT治理

IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
ssuser65fa31
 
Information Security
Information SecurityInformation Security
Information Security
chenpingling
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire
 
Btpro-Penetration Testing Service
Btpro-Penetration Testing ServiceBtpro-Penetration Testing Service
Btpro-Penetration Testing Service
Btpro BilgiTeknolojileri
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
Tarun Gupta,CRISC CISSP CISM CISA BCCE
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
Jeffrey Paulette
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
Health IT Conference – iHT2
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
High-flying Cloud Testing Techniques
High-flying Cloud Testing TechniquesHigh-flying Cloud Testing Techniques
High-flying Cloud Testing Techniques
TechWell
 
Meeting the NIS Directive with Distributed Ledgers
Meeting the NIS Directive with Distributed LedgersMeeting the NIS Directive with Distributed Ledgers
Meeting the NIS Directive with Distributed Ledgers
Duncan Purves
 
Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and Security
CynergisTek, Inc.
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
learfield
 
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
kashifmajeedjanjua
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
pramod_kmr73
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
Imperva
 
Information Governance for Registration Authorities
Information Governance for Registration AuthoritiesInformation Governance for Registration Authorities
Information Governance for Registration Authorities
Alex Beisser MBCS
 

Similar to 如何有效運用ITSM工具做好IT治理 (20)

IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
Information Security
Information SecurityInformation Security
Information Security
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Btpro-Penetration Testing Service
Btpro-Penetration Testing ServiceBtpro-Penetration Testing Service
Btpro-Penetration Testing Service
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
High-flying Cloud Testing Techniques
High-flying Cloud Testing TechniquesHigh-flying Cloud Testing Techniques
High-flying Cloud Testing Techniques
 
Meeting the NIS Directive with Distributed Ledgers
Meeting the NIS Directive with Distributed LedgersMeeting the NIS Directive with Distributed Ledgers
Meeting the NIS Directive with Distributed Ledgers
 
Increasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and SecurityIncreasing Challenges in Healthcare Privacy and Security
Increasing Challenges in Healthcare Privacy and Security
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Information Governance for Registration Authorities
Information Governance for Registration AuthoritiesInformation Governance for Registration Authorities
Information Governance for Registration Authorities
 

More from Galaxy Software Services

2_人見人愛的control-m作業請求流程
2_人見人愛的control-m作業請求流程2_人見人愛的control-m作業請求流程
2_人見人愛的control-m作業請求流程
Galaxy Software Services
 
1_overall
1_overall1_overall
GSSDLC - Bruce (20170817)
GSSDLC - Bruce (20170817)GSSDLC - Bruce (20170817)
GSSDLC - Bruce (20170817)
Galaxy Software Services
 
行動應用App管理 (MAM)
行動應用App管理 (MAM) 行動應用App管理 (MAM)
行動應用App管理 (MAM)
Galaxy Software Services
 
全面控管檔案傳輸 揭開成功秘辛
全面控管檔案傳輸 揭開成功秘辛全面控管檔案傳輸 揭開成功秘辛
全面控管檔案傳輸 揭開成功秘辛
Galaxy Software Services
 
MFT sharing
MFT sharingMFT sharing
洞悉檔案傳輸困境 掌握解決方案
洞悉檔案傳輸困境 掌握解決方案洞悉檔案傳輸困境 掌握解決方案
洞悉檔案傳輸困境 掌握解決方案
Galaxy Software Services
 
Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青
Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青
Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青
Galaxy Software Services
 
系統05_從持續整合結合安全開發與變更管理 郭俐佳
系統05_從持續整合結合安全開發與變更管理 郭俐佳系統05_從持續整合結合安全開發與變更管理 郭俐佳
系統05_從持續整合結合安全開發與變更管理 郭俐佳
Galaxy Software Services
 
系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰
系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰
系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰
Galaxy Software Services
 
雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝
雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝
雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝
Galaxy Software Services
 
雲端04_會計服務未來式整合雲端新趨勢 張宏尉
雲端04_會計服務未來式整合雲端新趨勢 張宏尉雲端04_會計服務未來式整合雲端新趨勢 張宏尉
雲端04_會計服務未來式整合雲端新趨勢 張宏尉
Galaxy Software Services
 
雲端06_兩岸三地的雲服務就選mail cloud-闕伊材
雲端06_兩岸三地的雲服務就選mail cloud-闕伊材雲端06_兩岸三地的雲服務就選mail cloud-闕伊材
雲端06_兩岸三地的雲服務就選mail cloud-闕伊材
Galaxy Software Services
 
雲端02_「阿米計畫」一起揪團做公益吧 杜明翰
雲端02_「阿米計畫」一起揪團做公益吧 杜明翰雲端02_「阿米計畫」一起揪團做公益吧 杜明翰
雲端02_「阿米計畫」一起揪團做公益吧 杜明翰
Galaxy Software Services
 
雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹
Galaxy Software Services
 
安心上雲端 商務創新無極限 劉念臻
安心上雲端 商務創新無極限 劉念臻安心上雲端 商務創新無極限 劉念臻
安心上雲端 商務創新無極限 劉念臻
Galaxy Software Services
 
應用03_未來辦公室的創新工作圈 李政權
應用03_未來辦公室的創新工作圈 李政權應用03_未來辦公室的創新工作圈 李政權
應用03_未來辦公室的創新工作圈 李政權
Galaxy Software Services
 
由根紮起的深研發成果報告 張培鏞
由根紮起的深研發成果報告 張培鏞由根紮起的深研發成果報告 張培鏞
由根紮起的深研發成果報告 張培鏞
Galaxy Software Services
 
The power of digital minds 張瑞雄
The power of digital minds 張瑞雄The power of digital minds 張瑞雄
The power of digital minds 張瑞雄
Galaxy Software Services
 
軟體安全防護大作戰
軟體安全防護大作戰軟體安全防護大作戰
軟體安全防護大作戰
Galaxy Software Services
 

More from Galaxy Software Services (20)

2_人見人愛的control-m作業請求流程
2_人見人愛的control-m作業請求流程2_人見人愛的control-m作業請求流程
2_人見人愛的control-m作業請求流程
 
1_overall
1_overall1_overall
1_overall
 
GSSDLC - Bruce (20170817)
GSSDLC - Bruce (20170817)GSSDLC - Bruce (20170817)
GSSDLC - Bruce (20170817)
 
行動應用App管理 (MAM)
行動應用App管理 (MAM) 行動應用App管理 (MAM)
行動應用App管理 (MAM)
 
全面控管檔案傳輸 揭開成功秘辛
全面控管檔案傳輸 揭開成功秘辛全面控管檔案傳輸 揭開成功秘辛
全面控管檔案傳輸 揭開成功秘辛
 
MFT sharing
MFT sharingMFT sharing
MFT sharing
 
洞悉檔案傳輸困境 掌握解決方案
洞悉檔案傳輸困境 掌握解決方案洞悉檔案傳輸困境 掌握解決方案
洞悉檔案傳輸困境 掌握解決方案
 
Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青
Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青
Line with the UI DESIGN TREND 符合時代的介面設計潮流-李宗青
 
系統05_從持續整合結合安全開發與變更管理 郭俐佳
系統05_從持續整合結合安全開發與變更管理 郭俐佳系統05_從持續整合結合安全開發與變更管理 郭俐佳
系統05_從持續整合結合安全開發與變更管理 郭俐佳
 
系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰
系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰
系統02_關鍵的「特權+資料安全」最後一哩防線 解忠翰
 
雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝
雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝
雲端05_如何在雲端管理研發知識以廣義智控為例 曾廣輝
 
雲端04_會計服務未來式整合雲端新趨勢 張宏尉
雲端04_會計服務未來式整合雲端新趨勢 張宏尉雲端04_會計服務未來式整合雲端新趨勢 張宏尉
雲端04_會計服務未來式整合雲端新趨勢 張宏尉
 
雲端06_兩岸三地的雲服務就選mail cloud-闕伊材
雲端06_兩岸三地的雲服務就選mail cloud-闕伊材雲端06_兩岸三地的雲服務就選mail cloud-闕伊材
雲端06_兩岸三地的雲服務就選mail cloud-闕伊材
 
雲端02_「阿米計畫」一起揪團做公益吧 杜明翰
雲端02_「阿米計畫」一起揪團做公益吧 杜明翰雲端02_「阿米計畫」一起揪團做公益吧 杜明翰
雲端02_「阿米計畫」一起揪團做公益吧 杜明翰
 
雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹
 
安心上雲端 商務創新無極限 劉念臻
安心上雲端 商務創新無極限 劉念臻安心上雲端 商務創新無極限 劉念臻
安心上雲端 商務創新無極限 劉念臻
 
應用03_未來辦公室的創新工作圈 李政權
應用03_未來辦公室的創新工作圈 李政權應用03_未來辦公室的創新工作圈 李政權
應用03_未來辦公室的創新工作圈 李政權
 
由根紮起的深研發成果報告 張培鏞
由根紮起的深研發成果報告 張培鏞由根紮起的深研發成果報告 張培鏞
由根紮起的深研發成果報告 張培鏞
 
The power of digital minds 張瑞雄
The power of digital minds 張瑞雄The power of digital minds 張瑞雄
The power of digital minds 張瑞雄
 
軟體安全防護大作戰
軟體安全防護大作戰軟體安全防護大作戰
軟體安全防護大作戰
 

Recently uploaded

Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 

Recently uploaded (20)

Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 

如何有效運用ITSM工具做好IT治理

  • 1. 1 報告人:叡揚資訊 李志強 經理 ITIL Expert,PMP 日 期:2015/4/21 如何做好IT治理 – 先從人員管理開始 AP People Infrastructure Information
  • 2. 2   IT Governance by IT 1)  帳密管理 2)  側錄軟體 3)  權限管理 4)  服務管理 5)  資產/合約/ 廠商 1)  專案管理平台 2)  軟體開發平台 3)  軟體品質管理 4)  端對端行為分析 1)  操作自動化 2)  批次自動化 3)  資料/檔案交換平台 4)  平台監控軟體 5)  資料庫管理工具 6)  網路軟體與管理 1)  防資料洩露 2)  APT 3)  虛擬機安全 4)  資料庫監控防護 5)  資料 加密/變造 6)  加密/金鑰管理 People Management Infrastructure Management Information Management AP Management 歷史紀錄/報表/稽核 SFG SI z Platform BYOD/APP. SaaS/Cloud 健檢/訓練 1)  資安檢測 2)  教育訓練 3)  E-Learning課程 1)  顧問 2)  健檢 3)  訓練 4)  專案 文管/SOP/KM 服務
  • 3. 3   簡報大綱 n  IT Service Management function n  IT Service Management process n  Service asset and configuration management n  Access management n  Supplier and Contract
  • 5. 5   IT  Opera)ons  management IT Service Management function Service   desk Technical   management Mainframe Server Network Storage Database Desktop Middleware Internet/web IT  Opera)ons   control   Console   management   Job  schedule   Backup  and  restore   …   Facili)es   management   Data  Centre   Recovery  sites   ConsolidaFon   Contract Applica)on   management ITSM(Heart-­‐ITSM)   apps HR(Radar)   apps KM(Vitals  ESP)   apps DOC(SPEED)   apps 工作與會議 (teamKube) apps ….
  • 7. 7   Problem mgmt. 問題管理 IT Service Management Process Users Service desk Exception /Alert logs Incident/ Service Request 線上服務台 Incident mgmt. 事故管理 Event mgmt. 事件管理 Monitoring tools CMDB 服務知識庫 FAQ KEDB Change mgmt. 變更管理 Configuration mgmt. 組態管理 RFC Update CIs CI 盤點 CTI Self-Service Capacity mgmt. 容量管理 Dashboard Service Report Service catalogue 服務目錄 Availability mgmt. 可用性管理 Unsolved problems Related CIs Managers Supplier mgmt. 供應商管理 Technical management IT Operations management Application management
  • 8. 8   服務台 - 服務單建立 8 輸入申請人員後自 動帶出申請人相關 欄位 選擇影響CI
  • 13. 13   Service asset and configuration management n  Ensure that the assets required to deliver services are properly controlled, and that accurate and reliable information about those assets is available n  Identify, control, record, report, audit and verify CIs, including versions, baselines, constituent components, their attributes and relationships
  • 16. 16   Access management Information Security management •  Define and document all access control policies Facilities management •  Power management •  Environmental conditioning and alert system •  Safety •  Physical access control •  shipping and receiving Access management •  granting authorized users the right to use a service, while preventing access to non-authorized users •  Request access •  Verification •  Provide rights •  Check and monitor identity status •  Log and track access •  Remove or restrict rights
  • 18. 18   Supplier and Contract n  Supplier and contract management information system n  Recording all supplier and contract details n  Details of the type of service(s) or product(s) provide by each supplier n  All other information and relationships with other associated CIs n  Evaluation and set up of new suppliers and contracts n  Management of supplier`s performance n  Contract renewal or termination
  • 20. 20 QA