SlideShare une entreprise Scribd logo
1  sur  25
Ridurre i costi operativi IT in 5 mosse grazie all'integrazione dei processi Marco Bianchi
Agenda Il Business Case per l’IT Process Automation Esempi di IT Process Automation per ridurre i costi I 5 passi da intraprendere per prepararsiall’IT Automation Customer Case Studies
IL BUSINESS CASE PERL’IT Process Automation
Walking up the Down EscalatorBecome an Efficient Business Enabler A B Expensive Business Enabler Efficient Business Enabler Goal: Cost Effective with Optimized Service Delivery Sub-Optimal: Aligned To Business Goals But Expensive Current State: Expensive and Tactical with Limited Perceived Value Business Enablement Sub-Optimal: Cost-Centric and Tactical with Marginal Services C D Low Cost Provider Low Value Provider Operational Efficiency
Management’s Dilemma:Operational Efficiency vs. Business Enablement “The Cost Cutter” “The BSM Paradox” Business Enablement Business Enablement Operational Efficiency Operational Efficiency Significant up-front investments and the need for profound changes jeopardizes or delays expected cost reductions. Outsourcing or an internal focus on cost-cutting consolidation, often forsake agility and business enablement.
New Approach:IT Process Automation Provides a Direct Route IT Process Automation  enables you to: 3 Reduce Inefficiencies from Current Management Tools 1 2 Business Enablement Integrate Tools within IT Operations and/or Security  2 1 Integrate the Business into IT Management Processes 3 Operational Efficiency 6
Why Automate?An Example of Process Gone Bad IT Management Service Desk 0: Poor service  quality detected 1: Admin notified Database Management Network Management Application Management Security Management IT  Functions 2: Ticket created 3: Service desk receives ticket 4: Establish bridge line 5: Notify other groups Best of BreedManagementTools 6: Commence finger-pointing 7: Isolate potential cause Managed Technologies 8: Notify change management 9: No requested change? 10: Guilty admin rolls back 11: Validate remediation 12: Close ticket 13: Review with management 7
Esempi di IT Process Automation per ridurre i costi 8
Archive Trash Recover from Common EventsSuch as Low Disk Space Conditions Management 8 1.	Available disk space falls below threshold ITPA 6 4 Administrator 2.	Systems Management generates an event, triggering a process in the ITPA tool   Total Time Saved: 48 Minutes 3.	ITPA tool requests disk usage analysis from Systems Management 5 Saved: 15 minutes 3 4.	ITPA tool sends email to admin requesting approval to clean up Saved: 5 minutes 5. 	If no response is received within a defined time, ITPA tool escalates to a higher level of management Systems Management Saved: 5 minutes 6.	Administrator approves partial cleanup through ITPA tool 7 Saved: 4 minutes 2 7.	ITPA tool commands Systems Management to perform cleanup Saved: 15 minutes 1 8.	ITPA tool sends confirmation email to the administrator Server with Local Storage Saved: 4 minutes
Perform Routine MaintenanceSuch as Rebooting Servers 1. ITPA tool initiates the server reboot process based on a schedule and suppresses reboot related events ITPA 8 2. ITPA tool commands the load balancer to block new sessions to the first server Saved: 1 minutes Administrator 9 3. ITPA tool commands Systems Management to monitor for the server to reach zero active sessions Total Time Saved: 410 Minutes 3 1 2 Saved: 15 minutes 6 4. ITPA tool commands Systems Management to reboot the server and wait for completion Systems Management Load Balancer Saved: 15 minutes 5. ITPA tool commands Systems Management to validate server health Systems Management ResponseTime Saved: 3 minutes 4 7 5 6. ITPA tool commands the load balancer to enable new sessions Saved: 5 minutes 7. ITPA tool commands Systems Management to verify service performance Active Sessions           Saved: 1 minute 8. ITPA tool sends a progress notification email to the administrator Saved: 1 minute Web Servers 9. ITPA tool repeats steps 2-8 for each additional server in the group  Saved: 10x minutes
Request, Approve and ProvisionA New Virtual Machine 1.	Requestor visits ITPA tool web console and initiates a request for new virtual machines 9 Billing System ITPA 2.	ITPA tool identifies clusters with sufficient spare capacity to house the requested virtual machines VM Requestors 4 Saved: 15 minutes 5 3.	ITPA tool triggers VMware vCenter to create a temporary placeholder virtual machine Ticketing System LOB Owner Saved: 10 minutes Total Time Saved: 145 Minutes CDB 1 4.	Create & submit a change request in a ticketing system and assign business owner 2 7 Saved: 20 minutes 6 6 3 VMware  vCenter 5.	When approved,  ITPA tool notifies requestor and commands VMware vCenter to delete temporary virtual machine and provision the production virtual machine from a template Saved: 30 minutes 6.	ITPA tool commands Systems Management to deploy agents and scans with Policy Management to confirm correct configuration Saved: 30 minutes Policy Management Systems Management 7.	Notify virtual machine requestor of provisioning completion and ticketing system to close ticket Saved: 20 minutes 8 8.	Virtual machine configuration report generated via Policy Management Saved: 10 minutes 9.	ITPA tool updates the billing system for the newly created virtual machine Saved: 10 minutes
Respond to Configuration Changes  And Ensure Protection of Critical Hosts ITPA tool 1. File integrity or security monitoring detects change, triggering a process in the ITPA tool 2. ITPA tool queries ticketing system to see if change       was planned and authorized Saved: 15 minutes 7 2 3. ITPA tool queries Policy Management for a list of user entitlements  Ticketing System Saved: 15 minutes 4 4. Business stakeholders and admin team notified 6 Security Monitoring Saved: 15 minutes Total Time Saved: 85 Minutes 5 3 5. Stakeholders choose remediation and ITPA tool creates a change ticket Saved: 20 minutes 6. ITPA tool has Policy Management perform a vulnerability scan Stakeholder Saved: 15 minutes Administration 7. Remedy ticket is closed and ITPA tool commands Policy Management to conduct a final scan to confirm  remediation Policy Management Saved: 5 minutes 1 12 12
I 5 passi da intraprendere per prepararsiall’IT Automation 13
Step 1Identify Automation Candidates  Prepare Your Staff Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates Questions to Ask Examples Too much time to complete a request logged in a ticket What processes do users or customers complain about? Rebooting servers to deal with application memory leaks What activities occupy too much staff time? What activities cause the biggest budget surprises? Increased demand for storage as disk space fills up What activities cause the most re-work? Recurring events without permanent resolution What processes are competitors automating? Case studies or articles written for your industry
Prepare Your Staff Step 2Evaluate Your Process Maturity Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates 0.  No formal process 1.  Ad hoc – individually tool dependent Consider a bottom-up micro-process first approach Consider a top-down macro-process first approach 2.  ITIL Service Support processes in place 3.  ITIL Service Delivery processes in place 4.  Process extends beyond IT operations to business management Maturity Level Source:   Gartner I&O Maturity Model, Oct. 2007
Prepare Your Staff Step 3Rank Candidates By Value Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates Criteria 2: Reduce cost through efficiency Criteria 1: Improve quality by reducing defects Reduces re-work Reduces time to provision new services Reduces repetitive work requiring little analytical skill Reduces manual review requirements Reduces unplanned downtime Improves communication (timeliness, accuracy, etc.) Better use of resources and inventory
ITPA Management Incident Stakeholders Ticketing Systems Management Other Sources (RFCs, CMDB, Change monitoring, etc.) Helpdesk Prepare Your Staff Step 4Identify Needed Tools  Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates Existing Management Tools Systems management Service Desk (ticketing) tools Provisioning tools IT Process Automation Tools General (any micro or macro process) Specific (single use case, single-vendor)
Prepare Your Staff Step 5 Prepare Your Staff Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates Solicit help in identifying new automation candidates Expected role in new processes Expected outcomes of automation Free to accomplish higher-value projects Gain career enhancing skills
Customer Case Studies 19
European MSP Solution Results Challenges ,[object Object]
Began by listing critical processes to automate
NetIQ services documented processes and built workflows for them
Integrated ITPA with their CMDB and ticketing systems
Staff growing linearly with customer servers
Customers upset when service is inconsistent

Contenu connexe

Tendances

Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager CA Technologies
 
How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)Ayehu Software Technologies Ltd.
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting Systemengineer sood
 
Business Processes - Improvement - Reengineering - Analytics
Business Processes - Improvement - Reengineering - AnalyticsBusiness Processes - Improvement - Reengineering - Analytics
Business Processes - Improvement - Reengineering - AnalyticsLaurence Gartner
 
BlackLine-Benefits-Overview
BlackLine-Benefits-OverviewBlackLine-Benefits-Overview
BlackLine-Benefits-OverviewTrevor Sawyer
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programFlexera
 
U5 c49 c60 - accounting in computerized environment ver 7.0
U5 c49 c60 - accounting in computerized environment ver 7.0U5 c49 c60 - accounting in computerized environment ver 7.0
U5 c49 c60 - accounting in computerized environment ver 7.0prasannakmp05
 
Sap Solman Bpm Sales Presentation V2
Sap Solman Bpm Sales Presentation V2Sap Solman Bpm Sales Presentation V2
Sap Solman Bpm Sales Presentation V2caldnambi
 
NetSuite China Implementation Playbook
NetSuite China Implementation PlaybookNetSuite China Implementation Playbook
NetSuite China Implementation PlaybookJames Cowan
 
Software Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in ActionSoftware Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in ActionSoftwareONEPresents
 
Topic 3 Accounting System And Control
Topic 3 Accounting System And ControlTopic 3 Accounting System And Control
Topic 3 Accounting System And Controlguest441011
 
INTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTINGINTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTINGayanthimadhumali
 
Are Your End Users Doing Your ECM QA?
Are Your End Users Doing Your ECM QA?Are Your End Users Doing Your ECM QA?
Are Your End Users Doing Your ECM QA?Reveille Software
 
CTU June 2011 - Opalis: Orchestrating your Data Center
CTU June 2011 - Opalis: Orchestrating your Data CenterCTU June 2011 - Opalis: Orchestrating your Data Center
CTU June 2011 - Opalis: Orchestrating your Data CenterSpiffy
 
Strategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementStrategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementCA Technologies
 

Tendances (20)

Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager
 
How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting System
 
Business Processes - Improvement - Reengineering - Analytics
Business Processes - Improvement - Reengineering - AnalyticsBusiness Processes - Improvement - Reengineering - Analytics
Business Processes - Improvement - Reengineering - Analytics
 
Automation & robotics
Automation & roboticsAutomation & robotics
Automation & robotics
 
BlackLine-Benefits-Overview
BlackLine-Benefits-OverviewBlackLine-Benefits-Overview
BlackLine-Benefits-Overview
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management program
 
U5 c49 c60 - accounting in computerized environment ver 7.0
U5 c49 c60 - accounting in computerized environment ver 7.0U5 c49 c60 - accounting in computerized environment ver 7.0
U5 c49 c60 - accounting in computerized environment ver 7.0
 
Sap Solman Bpm Sales Presentation V2
Sap Solman Bpm Sales Presentation V2Sap Solman Bpm Sales Presentation V2
Sap Solman Bpm Sales Presentation V2
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
Ch07
Ch07Ch07
Ch07
 
NetSuite China Implementation Playbook
NetSuite China Implementation PlaybookNetSuite China Implementation Playbook
NetSuite China Implementation Playbook
 
Software Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in ActionSoftware Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in Action
 
162 erp605 process_overview_en_in
162 erp605 process_overview_en_in162 erp605 process_overview_en_in
162 erp605 process_overview_en_in
 
Topic 3 Accounting System And Control
Topic 3 Accounting System And ControlTopic 3 Accounting System And Control
Topic 3 Accounting System And Control
 
INTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTINGINTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTING
 
Are Your End Users Doing Your ECM QA?
Are Your End Users Doing Your ECM QA?Are Your End Users Doing Your ECM QA?
Are Your End Users Doing Your ECM QA?
 
CTU June 2011 - Opalis: Orchestrating your Data Center
CTU June 2011 - Opalis: Orchestrating your Data CenterCTU June 2011 - Opalis: Orchestrating your Data Center
CTU June 2011 - Opalis: Orchestrating your Data Center
 
Toyota way
Toyota wayToyota way
Toyota way
 
Strategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementStrategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset Management
 

Similaire à Security Automation From ITSMF Italia 2010

Presentation tritan erp service
Presentation tritan erp servicePresentation tritan erp service
Presentation tritan erp serviceTritan solution
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Software India
 
Run Book Automation: Why All Roads Lead to It
Run Book Automation: Why All Roads Lead to ItRun Book Automation: Why All Roads Lead to It
Run Book Automation: Why All Roads Lead to Itelliando dias
 
UiPath Meetup Service now + mainframe and legacy final
UiPath Meetup Service now + mainframe and legacy finalUiPath Meetup Service now + mainframe and legacy final
UiPath Meetup Service now + mainframe and legacy finalUiPath
 
Achieving non-linear operational growth through Smart Technology
Achieving non-linear operational growth through Smart TechnologyAchieving non-linear operational growth through Smart Technology
Achieving non-linear operational growth through Smart TechnologySSFIndia1
 
ChristianSteven Thinkware Technology Summit
ChristianSteven Thinkware Technology SummitChristianSteven Thinkware Technology Summit
ChristianSteven Thinkware Technology SummitChristianSteven Software
 
ChristianSteven Thinkware Technology Summit Presentation
ChristianSteven Thinkware Technology Summit PresentationChristianSteven Thinkware Technology Summit Presentation
ChristianSteven Thinkware Technology Summit PresentationChristianSteven Software
 
5 key metrics to empower your accounts payable organization
5 key metrics  to empower your  accounts payable organization5 key metrics  to empower your  accounts payable organization
5 key metrics to empower your accounts payable organizationAavenir
 
Robotic process automation overview
Robotic process automation overviewRobotic process automation overview
Robotic process automation overviewPascal BORNET
 
Robotic process automation overview
Robotic process automation overviewRobotic process automation overview
Robotic process automation overviewPascal BORNET
 
Process wind tunnel - A novel capability for data-driven business process imp...
Process wind tunnel - A novel capability for data-driven business process imp...Process wind tunnel - A novel capability for data-driven business process imp...
Process wind tunnel - A novel capability for data-driven business process imp...Sudhendu Rai
 
Making IT Process Automation Work for You
Making IT Process Automation Work for YouMaking IT Process Automation Work for You
Making IT Process Automation Work for Youelliando dias
 
Document Management Options for Abila MIP
Document Management Options for Abila MIPDocument Management Options for Abila MIP
Document Management Options for Abila MIPNet at Work
 
itSMF Presentation March 2009
itSMF Presentation March 2009itSMF Presentation March 2009
itSMF Presentation March 2009jdmoore
 
Tying Automation to the Line of Business
Tying Automation to the Line of BusinessTying Automation to the Line of Business
Tying Automation to the Line of BusinessCA | Automic Software
 
Panel Review by Jeff Ho (Brief version: removing logo and all confidential info)
Panel Review by Jeff Ho (Brief version: removing logo and all confidential info)Panel Review by Jeff Ho (Brief version: removing logo and all confidential info)
Panel Review by Jeff Ho (Brief version: removing logo and all confidential info)Jeff Ho
 

Similaire à Security Automation From ITSMF Italia 2010 (20)

Presentation tritan erp service
Presentation tritan erp servicePresentation tritan erp service
Presentation tritan erp service
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Run Book Automation: Why All Roads Lead to It
Run Book Automation: Why All Roads Lead to ItRun Book Automation: Why All Roads Lead to It
Run Book Automation: Why All Roads Lead to It
 
UiPath Meetup Service now + mainframe and legacy final
UiPath Meetup Service now + mainframe and legacy finalUiPath Meetup Service now + mainframe and legacy final
UiPath Meetup Service now + mainframe and legacy final
 
Achieving non-linear operational growth through Smart Technology
Achieving non-linear operational growth through Smart TechnologyAchieving non-linear operational growth through Smart Technology
Achieving non-linear operational growth through Smart Technology
 
ChristianSteven Thinkware Technology Summit
ChristianSteven Thinkware Technology SummitChristianSteven Thinkware Technology Summit
ChristianSteven Thinkware Technology Summit
 
ChristianSteven Thinkware Technology Summit Presentation
ChristianSteven Thinkware Technology Summit PresentationChristianSteven Thinkware Technology Summit Presentation
ChristianSteven Thinkware Technology Summit Presentation
 
5 key metrics to empower your accounts payable organization
5 key metrics  to empower your  accounts payable organization5 key metrics  to empower your  accounts payable organization
5 key metrics to empower your accounts payable organization
 
Robotic process automation overview
Robotic process automation overviewRobotic process automation overview
Robotic process automation overview
 
Robotic process automation overview
Robotic process automation overviewRobotic process automation overview
Robotic process automation overview
 
Process wind tunnel - A novel capability for data-driven business process imp...
Process wind tunnel - A novel capability for data-driven business process imp...Process wind tunnel - A novel capability for data-driven business process imp...
Process wind tunnel - A novel capability for data-driven business process imp...
 
Motadata ITSM DCMS
Motadata ITSM DCMSMotadata ITSM DCMS
Motadata ITSM DCMS
 
Solusi Helpdesk ITSM dengan Motadata ITSM
Solusi Helpdesk ITSM dengan Motadata ITSMSolusi Helpdesk ITSM dengan Motadata ITSM
Solusi Helpdesk ITSM dengan Motadata ITSM
 
Making IT Process Automation Work for You
Making IT Process Automation Work for YouMaking IT Process Automation Work for You
Making IT Process Automation Work for You
 
Document Management Options for Abila MIP
Document Management Options for Abila MIPDocument Management Options for Abila MIP
Document Management Options for Abila MIP
 
itSMF Presentation March 2009
itSMF Presentation March 2009itSMF Presentation March 2009
itSMF Presentation March 2009
 
Tying Automation to the Line of Business
Tying Automation to the Line of BusinessTying Automation to the Line of Business
Tying Automation to the Line of Business
 
MOTADATA ITSM VERSI BAHASA INDONESIA
MOTADATA ITSM VERSI BAHASA INDONESIAMOTADATA ITSM VERSI BAHASA INDONESIA
MOTADATA ITSM VERSI BAHASA INDONESIA
 
Panel Review by Jeff Ho (Brief version: removing logo and all confidential info)
Panel Review by Jeff Ho (Brief version: removing logo and all confidential info)Panel Review by Jeff Ho (Brief version: removing logo and all confidential info)
Panel Review by Jeff Ho (Brief version: removing logo and all confidential info)
 
Auxis Webinar: Diving into RPA
Auxis Webinar: Diving into RPAAuxis Webinar: Diving into RPA
Auxis Webinar: Diving into RPA
 

Plus de NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your BusinessNetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014 NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerNetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQNetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQNetIQ
 

Plus de NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 

Dernier

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Dernier (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Security Automation From ITSMF Italia 2010

  • 1. Ridurre i costi operativi IT in 5 mosse grazie all'integrazione dei processi Marco Bianchi
  • 2. Agenda Il Business Case per l’IT Process Automation Esempi di IT Process Automation per ridurre i costi I 5 passi da intraprendere per prepararsiall’IT Automation Customer Case Studies
  • 3. IL BUSINESS CASE PERL’IT Process Automation
  • 4. Walking up the Down EscalatorBecome an Efficient Business Enabler A B Expensive Business Enabler Efficient Business Enabler Goal: Cost Effective with Optimized Service Delivery Sub-Optimal: Aligned To Business Goals But Expensive Current State: Expensive and Tactical with Limited Perceived Value Business Enablement Sub-Optimal: Cost-Centric and Tactical with Marginal Services C D Low Cost Provider Low Value Provider Operational Efficiency
  • 5. Management’s Dilemma:Operational Efficiency vs. Business Enablement “The Cost Cutter” “The BSM Paradox” Business Enablement Business Enablement Operational Efficiency Operational Efficiency Significant up-front investments and the need for profound changes jeopardizes or delays expected cost reductions. Outsourcing or an internal focus on cost-cutting consolidation, often forsake agility and business enablement.
  • 6. New Approach:IT Process Automation Provides a Direct Route IT Process Automation enables you to: 3 Reduce Inefficiencies from Current Management Tools 1 2 Business Enablement Integrate Tools within IT Operations and/or Security 2 1 Integrate the Business into IT Management Processes 3 Operational Efficiency 6
  • 7. Why Automate?An Example of Process Gone Bad IT Management Service Desk 0: Poor service quality detected 1: Admin notified Database Management Network Management Application Management Security Management IT Functions 2: Ticket created 3: Service desk receives ticket 4: Establish bridge line 5: Notify other groups Best of BreedManagementTools 6: Commence finger-pointing 7: Isolate potential cause Managed Technologies 8: Notify change management 9: No requested change? 10: Guilty admin rolls back 11: Validate remediation 12: Close ticket 13: Review with management 7
  • 8. Esempi di IT Process Automation per ridurre i costi 8
  • 9. Archive Trash Recover from Common EventsSuch as Low Disk Space Conditions Management 8 1. Available disk space falls below threshold ITPA 6 4 Administrator 2. Systems Management generates an event, triggering a process in the ITPA tool   Total Time Saved: 48 Minutes 3. ITPA tool requests disk usage analysis from Systems Management 5 Saved: 15 minutes 3 4. ITPA tool sends email to admin requesting approval to clean up Saved: 5 minutes 5. If no response is received within a defined time, ITPA tool escalates to a higher level of management Systems Management Saved: 5 minutes 6. Administrator approves partial cleanup through ITPA tool 7 Saved: 4 minutes 2 7. ITPA tool commands Systems Management to perform cleanup Saved: 15 minutes 1 8. ITPA tool sends confirmation email to the administrator Server with Local Storage Saved: 4 minutes
  • 10. Perform Routine MaintenanceSuch as Rebooting Servers 1. ITPA tool initiates the server reboot process based on a schedule and suppresses reboot related events ITPA 8 2. ITPA tool commands the load balancer to block new sessions to the first server Saved: 1 minutes Administrator 9 3. ITPA tool commands Systems Management to monitor for the server to reach zero active sessions Total Time Saved: 410 Minutes 3 1 2 Saved: 15 minutes 6 4. ITPA tool commands Systems Management to reboot the server and wait for completion Systems Management Load Balancer Saved: 15 minutes 5. ITPA tool commands Systems Management to validate server health Systems Management ResponseTime Saved: 3 minutes 4 7 5 6. ITPA tool commands the load balancer to enable new sessions Saved: 5 minutes 7. ITPA tool commands Systems Management to verify service performance Active Sessions           Saved: 1 minute 8. ITPA tool sends a progress notification email to the administrator Saved: 1 minute Web Servers 9. ITPA tool repeats steps 2-8 for each additional server in the group Saved: 10x minutes
  • 11. Request, Approve and ProvisionA New Virtual Machine 1. Requestor visits ITPA tool web console and initiates a request for new virtual machines 9 Billing System ITPA 2. ITPA tool identifies clusters with sufficient spare capacity to house the requested virtual machines VM Requestors 4 Saved: 15 minutes 5 3. ITPA tool triggers VMware vCenter to create a temporary placeholder virtual machine Ticketing System LOB Owner Saved: 10 minutes Total Time Saved: 145 Minutes CDB 1 4. Create & submit a change request in a ticketing system and assign business owner 2 7 Saved: 20 minutes 6 6 3 VMware vCenter 5. When approved, ITPA tool notifies requestor and commands VMware vCenter to delete temporary virtual machine and provision the production virtual machine from a template Saved: 30 minutes 6. ITPA tool commands Systems Management to deploy agents and scans with Policy Management to confirm correct configuration Saved: 30 minutes Policy Management Systems Management 7. Notify virtual machine requestor of provisioning completion and ticketing system to close ticket Saved: 20 minutes 8 8. Virtual machine configuration report generated via Policy Management Saved: 10 minutes 9. ITPA tool updates the billing system for the newly created virtual machine Saved: 10 minutes
  • 12. Respond to Configuration Changes And Ensure Protection of Critical Hosts ITPA tool 1. File integrity or security monitoring detects change, triggering a process in the ITPA tool 2. ITPA tool queries ticketing system to see if change was planned and authorized Saved: 15 minutes 7 2 3. ITPA tool queries Policy Management for a list of user entitlements Ticketing System Saved: 15 minutes 4 4. Business stakeholders and admin team notified 6 Security Monitoring Saved: 15 minutes Total Time Saved: 85 Minutes 5 3 5. Stakeholders choose remediation and ITPA tool creates a change ticket Saved: 20 minutes 6. ITPA tool has Policy Management perform a vulnerability scan Stakeholder Saved: 15 minutes Administration 7. Remedy ticket is closed and ITPA tool commands Policy Management to conduct a final scan to confirm remediation Policy Management Saved: 5 minutes 1 12 12
  • 13. I 5 passi da intraprendere per prepararsiall’IT Automation 13
  • 14. Step 1Identify Automation Candidates Prepare Your Staff Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates Questions to Ask Examples Too much time to complete a request logged in a ticket What processes do users or customers complain about? Rebooting servers to deal with application memory leaks What activities occupy too much staff time? What activities cause the biggest budget surprises? Increased demand for storage as disk space fills up What activities cause the most re-work? Recurring events without permanent resolution What processes are competitors automating? Case studies or articles written for your industry
  • 15. Prepare Your Staff Step 2Evaluate Your Process Maturity Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates 0. No formal process 1. Ad hoc – individually tool dependent Consider a bottom-up micro-process first approach Consider a top-down macro-process first approach 2. ITIL Service Support processes in place 3. ITIL Service Delivery processes in place 4. Process extends beyond IT operations to business management Maturity Level Source: Gartner I&O Maturity Model, Oct. 2007
  • 16. Prepare Your Staff Step 3Rank Candidates By Value Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates Criteria 2: Reduce cost through efficiency Criteria 1: Improve quality by reducing defects Reduces re-work Reduces time to provision new services Reduces repetitive work requiring little analytical skill Reduces manual review requirements Reduces unplanned downtime Improves communication (timeliness, accuracy, etc.) Better use of resources and inventory
  • 17. ITPA Management Incident Stakeholders Ticketing Systems Management Other Sources (RFCs, CMDB, Change monitoring, etc.) Helpdesk Prepare Your Staff Step 4Identify Needed Tools Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates Existing Management Tools Systems management Service Desk (ticketing) tools Provisioning tools IT Process Automation Tools General (any micro or macro process) Specific (single use case, single-vendor)
  • 18. Prepare Your Staff Step 5 Prepare Your Staff Identify Needed Tools Rank Candidates by Value Evaluate Your Process Maturity Identify Automation Candidates Solicit help in identifying new automation candidates Expected role in new processes Expected outcomes of automation Free to accomplish higher-value projects Gain career enhancing skills
  • 20.
  • 21. Began by listing critical processes to automate
  • 22. NetIQ services documented processes and built workflows for them
  • 23. Integrated ITPA with their CMDB and ticketing systems
  • 24. Staff growing linearly with customer servers
  • 25. Customers upset when service is inconsistent
  • 26. No way to report on process compliance
  • 27. Virtual Machines can be provisioned by customers, but remain unmanaged
  • 28. Cost savings of $1M + (10,000 hours annually)
  • 29. Offering improved SLAs to customers for event resolution timeframes
  • 30. Able to demonstrate process compliance to customers in support of “Operational Certainty”
  • 31.
  • 32. ITPA is now integrated with a ticketing and IVR system
  • 33. Processes are focused on user self-service to reduce help desk calls
  • 38. Message to the marketplace is “Technology and self-service automation is a differentiator”
  • 39. 6% reduction in help desk calls achieved
  • 40. Improved end-user satisfaction with more immediate resolution for automated process
  • 41.
  • 42. Extend the automation to included automated forensic gathering when necessary
  • 46. First response to security events are outsourced
  • 47. Concern about the risks and costs of outsourcing
  • 48. Requirements are growing to expand security monitoring from 700 servers to 5000
  • 50. Expected cost savings exceed $1M per year
  • 51. Faster response to security alerts with fewer false positives
  • 52. Reduced cost for forensic gathering
  • 53.
  • 54.
  • 55. Improve service quality by reducing human error
  • 56. Prevent knowledge flight through documentation
  • 57. Accelerate ITIL adoption by reducing resistance
  • 58. Embed policy in process to ensure compliance
  • 59. Improved ROI of existing tool investments as they are utilized moreIT Process Automation Benefits Service Desk Database Management Network Management Application Management Security Management

Notes de l'éditeur

  1. Eliminate manual intervention caused by routine, highly mundane tasksFree administrators to focus on more critical problems to the businessCombine management data with contextual information to further streamline IT run booksAllow IT managers to reallocate resources to deliver strategic business projectsBridge IT and business users by formalizing roles & responsibilities within the context of IT processesImprove business alignment and reduce IT costs by involving the business in IT processes
  2. Step 1 to preparing for an ITPA deployment begins by asking critical questions to identify processes that should be automated.
  3. The next step is to evaluate how mature your organization really is as it relates to process. The following scale is from Gartner’s most recent Infrastructure and Operations maturity model released last October. (build slide) If you have not yet deployed the ITIL service support and service delivery processes (those are ITIL v2 terms) then you may want to consider a micro-process first approach.
  4. Once you’ve decided what type of processes you want to automate first (micro or macro), you’ll want to rank those processes by there ability to improve quality or reduce costs, and each business may place a different premium on each category, but you should establish a subjective way of grading each. Some suggested measures are listed here under each category.
  5. Next, you’ll want to evaluate what tools you have in place or are needed for an ITPA implementation
  6. Finally, make sure your staff is ready for implementing ITPA. They can be threatened by it and fear for their jobs – leading to resistance and subversion of the program. Make sure they understand that they are going to be redeployed to work on core as the context management gets automated.