#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL

TFT presentations Tomorrow's IT Service Future Today
TFT presentations Tomorrow's IT Service Future TodayPresentations from TFT, 'Tomorrow's IT Service Future Today' à TFT is a 24hr virtual global ITSM conference
Rajesh'Gundurao'&'Firosh'
Poochaly'
Technology'Trends'and'
Impact'to'ITIL'
Technology Trend & Impact to ITIL
A strategy for Next Gen ITSM from SLK

Disclaimer: All logos used in this deck are property of respective owners
Copyright 2014 SLK Software Services. All rights reserved.
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 1
Contents
Top 10 Strategic Technology Trends 2014
Today’s Challenge - Sample Scenarios

Perceived ITSM Mobile Strategy
Mobile Enablement for ITSM
Enterprise ITSM Mobile Strategy
Strategy Benefits

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(2)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

2
2
Top 10 Strategic Technology Trends 2014

Converging
Forces

•
•
•
•

Mobile Device Diversity & Management
Mobile Apps & Applications
The Internet of Everything
Hybrid Cloud & IT as Service Broker

Derivative
Impact

•
•
•
•

Cloud / Client Architecture
The Era of Personal Cloud
Software Defined Anything
Web Scale IT

Future
Disruption

• Smart Machines
• 3-D Printing

Source: Gartner 2013
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(3)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

3
3
Mobile Device Diversity
Tactics are the new strategy

Wearable

Pocketable Grab & Go

Convertible

Portable

Desk

Shared Areas

Touch,  Voice…

Keyboard, Mouse

Gesture

Source: Gartner 2013
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(4)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

4
4
Today’s Challenge – Sample scenarios

Desktop / User based
Outlook is not connecting to
Exchange – Issue logged at 6pm

ITSM staff unable to resolve in
time till EOD

Issue was not resolved till next
business day

Monitoring tool opened a low
priority ticket to resolve within a
day

Server reached the threshold
unexpectedly and frozen

Backup failed due to bandwidth
choke and ITSM staff unable to
view bandwidth status

Scheduled Backup Failed
unexpectedly

Server based
A critical server approaching disk
full state

Network based
Monthly backup scheduled for
critical system

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(5)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

5
5
Perceived ITSM Mobile Strategy

ITSM Staff
Core Systems

Enterprise Mobile Applications
Tickets / SLA

Alerts

Web App/
Web Features

SM Tools

Monitoring Tools

Enterprises generally focus on enabling Web Apps on the Mobile Channel and most
enterprises perceive this as their Mobile Strategy
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(6)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

6
6
Points to Ponder – ITSM Mobile Strategy
Is your mobile strategy Future-ready?
- Device & Data Security
- Platform/Device Agnostic
- Hardware capabilities
- Bring Your Own Device (BYOD)

Does your mobile applications work on:
- iPhone (iOS), iPad
- Android Phones & Tablets
- Windows Phone, Tablets

Does your Mobile Strategy go beyond
Conventional Usage?
- Scan & Integrate with CMDB
- Access to KEDB from any location
- Capable to Intergrade multiple Applications

Does your mobile strategy support
multiple user interface?
- Voice Command
- Audio Output
- Keyboard & Visual Output

The next-gen mobile strategy should offer more service lines and should be
scalable to futuristic needs
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(7)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

7
7
Mobile Enablement for ITSM
•
•
•
•

Problem, Incidents, Change records
CMDB, KEDB access from anywhere
Critical incident , SLA monitoring
Management dashboards and Alerts

•
•
•
•

Monitoring the critical env- 24/7
Live Alerts for IT env
Accessibility to alert logs and issue resolution
Visibility on critical items for engineers / on call

SM Tools

Analytics

•
•
•
•

Generate reports / trends on tickets / alerts etc.
Intelligence in reporting the unexpected situations
Proactive reports on hardware performance to act
Capacity planning by collaborative method

•
•
•
•

Remote consoles for easy and faster troubleshooting
Visibility and accessibility enabling collaborative resolution
DC server / Network equipment access for faster resolution
LDAP Consoles

Remote Consoles

Monitoring Tools

ITSM

Management
•
•
•
•

BI – for IT
Proactive decisions on critical situations
Single stop live view of IMS environment
Approvals / authorization on the move

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(8)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

8
8
Enterprise ITSM Mobile Strategy
Customer

Enterprise

Partners

IMS

Mobile Application Management
(Enterprise AppStore / MAM)

Enterprise ITSM Mobile Applications
Tickets /
SLA

Live
Alerts

Remote
Consoles

Dashboards/
Reports

SM Tools

Mobile Application Frameworks
Mobile Operating System
Monitoring tools

Device Drivers & API
Mobile Devices & Accessories
Remote devices
Mobile Enterprise Application (MEAP)

Mobile Hardware Accessories
POS
NFC

Camera
Bar Code
RFID

Antenna
Audio

Mobile Device Management
(MDM)

Analytics

Vision:
Centralized platform to remote access ITSM tools to monitor, analyze, resolve the issues proactively & lively
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(9)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

9
9
Revised ITSM Maturity Model based on Trends

Ecosystem
Enterprise
Established

Enablers targeted
for entire IT group

Used in selected
divisions of IT
Established strategy
and roadmap

Enforced
Early Learning
Initial exploration in
ITSM

Used by selected
ITSM staff on need
basis
Apps enabled on
web/mobile – Tickets,
Environment Monitoring

Established Security
Standards

Centralized ITSM,
Mobile Policy

Improved SLAs based on
new process and mobile
enablement

All possible tools are
made available in
Mobile platform also

Limited innovative
applications

Validation of enabled
services (ex: 24/7 on call)
and impact

Limited integration with
different ITSM tools (SM,
Monitoring, Analytics)

• Pilot projects

No major impact in SLAs

• Proof of Concepts

VPN based

App Store based
distribution

Gain experience with
tools, technology

Integrated dashboard,
predictive analytics

Consistent within
the ecosystem

Majority of processes &
intelligence on mobile
Measured results feed
to strategy
Business Process
innovations &
automation
Collaborative outputs
lead to Productivity and
Future plan
Omni-channel user
experience

Learn, Innovate and
Continuously improve

Established ITSM +
Mobile Center of
Excellence

Support all major
mobile platform

Reduction in IT Service
investment

Source: SLK Research

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(10)
10
10

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Enterprise ITSM Mobile Strategy – Strategic direction
Establish Enterprise ITSM Mobile Strategy
Focus on building innovative solutions rather than just
applications
Devise a strategy for integrating mobile with enterprise
systems
Focus on building applications that cater to multiple
platforms/devices
Establish consistent user experience across the mobile
channel
Introduce new SLAs leveraging the power of mobile device
Build solutions that caters to customer, enterprise &
partner needs
Evaluate the Tablet space in all initiatives

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(11)
11
11

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Strategy Benefits
Benefit

Impact

Centralized platform to remote access ITSM tools
for Updating, Reassigning, Resolving Issues

Productivity
SLA

Enable mobility for ITSM staff to work on consoles
directly from anywhere

Flexibility

Improved ITSM Staff motivation

Employee Satisfaction

Faster resolution time for Incidents, Problems

SLA

Improved Change management

Productivity

Reduced escalations

Customer Satisfaction

Reduced ITSM staff

Cost

Better solution for 24/7 on call Business demands

Customer Satisfaction
Business Continuity

Proactive & Lively solution for ITSM

Innovation
Predictability

Increased Business revenue

Revenue
Customer Confidence

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(12)
12
12

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Sample Screenshot

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(13)
13
13

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Thank you !

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 14
With thanks to our slides
sponsor, CA Technologies
Try Nimsoft for free at
ca.com/NSD-trial
1 sur 16

Recommandé

ITSM Technology Trend par
ITSM Technology Trend ITSM Technology Trend
ITSM Technology Trend Firosh Poochaly
563 vues14 diapositives
Ivanti: Access the Power of Unified IT par
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti
6.9K vues11 diapositives
Building Your Business Continuity Plan par
Building Your Business Continuity PlanBuilding Your Business Continuity Plan
Building Your Business Continuity PlanIvanti
188 vues25 diapositives
soc par
socsoc
socDhirendra Thapa
3.2K vues22 diapositives
SplunkLive! Zürich - Splunk für Security par
SplunkLive! Zürich - Splunk für SecuritySplunkLive! Zürich - Splunk für Security
SplunkLive! Zürich - Splunk für SecuritySplunk
337 vues59 diapositives
INTRODUCTION TO IVANTI NEURONS par
INTRODUCTION TO IVANTI NEURONSINTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSIvanti
264 vues20 diapositives

Contenu connexe

Tendances

Cruatech Services Intro par
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
1.4K vues26 diapositives
Preparing Your Customer's Network for the Work from Home Transition par
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionQOS Networks
98 vues17 diapositives
Securing your IT infrastructure with SOC-NOC collaboration TWP par
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
738 vues7 diapositives
Simplify Security with Ivanti Security Controls par
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsIvanti
342 vues23 diapositives
Manpower group idm-platform par
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platformOracleIDM
783 vues18 diapositives
BMC - Response to the SolarWinds Breach/Malware par
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
58 vues4 diapositives

Tendances(20)

Cruatech Services Intro par Cruatech
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
Cruatech1.4K vues
Preparing Your Customer's Network for the Work from Home Transition par QOS Networks
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home Transition
QOS Networks98 vues
Securing your IT infrastructure with SOC-NOC collaboration TWP par Sridhar Karnam
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam738 vues
Simplify Security with Ivanti Security Controls par Ivanti
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security Controls
Ivanti342 vues
Manpower group idm-platform par OracleIDM
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
OracleIDM783 vues
BMC - Response to the SolarWinds Breach/Malware par Mike Rizzo
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
Mike Rizzo58 vues
ServicePilot NBA for z/OS Datasheet [EN] par ServicePilot
ServicePilot NBA for z/OS Datasheet [EN]ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot460 vues
Network Security Offering by GSS America par Gss America
Network  Security Offering by GSS AmericaNetwork  Security Offering by GSS America
Network Security Offering by GSS America
Gss America558 vues
IT - Enterprise Service Operation Center par Sameer Paradia
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation Center
Sameer Paradia 13.7K vues
Modernizing on IBM Z Made Easier With Open Source Software par DevOps.com
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com841 vues
Extending Jenkins to the Mainframe. A Simpler Approach. par DevOps.com
Extending Jenkins to the Mainframe.  A Simpler Approach.Extending Jenkins to the Mainframe.  A Simpler Approach.
Extending Jenkins to the Mainframe. A Simpler Approach.
DevOps.com996 vues
IPsoft Recruitment Brochure par dlongipsoft
IPsoft Recruitment BrochureIPsoft Recruitment Brochure
IPsoft Recruitment Brochure
dlongipsoft1.1K vues
Utilities: TDM to IP par Avtec Inc.
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
Avtec Inc.1.6K vues
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut... par CA Technologies
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
CA Technologies1.9K vues
Ivanti New Pricing Model par Ivanti
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing Model
Ivanti6.1K vues

Similaire à #TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL

Challenges of Mobile HR framework and program par
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and programJinen Dedhia
396 vues24 diapositives
Top 10 tech trends 2014 par
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
24K vues29 diapositives
SplunkLive! Tampa: Getting Started Session par
SplunkLive! Tampa: Getting Started SessionSplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started SessionSplunk
451 vues16 diapositives
Old Dogs, New Tricks: Big Data from and for Mainframe IT par
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
184 vues42 diapositives
Taking Control of SharePoint in the Cloud par
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudSherWeb
692 vues35 diapositives
Kaspars Petersons - BYOD - more like BYOP par
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
476 vues52 diapositives

Similaire à #TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL(20)

Challenges of Mobile HR framework and program par Jinen Dedhia
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and program
Jinen Dedhia396 vues
SplunkLive! Tampa: Getting Started Session par Splunk
SplunkLive! Tampa: Getting Started SessionSplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started Session
Splunk451 vues
Old Dogs, New Tricks: Big Data from and for Mainframe IT par Precisely
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Precisely184 vues
Taking Control of SharePoint in the Cloud par SherWeb
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the Cloud
SherWeb692 vues
Kaspars Petersons - BYOD - more like BYOP par DevConFu
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
DevConFu476 vues
Data Consult Managed Security Services par Jad Bejjani
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
Jad Bejjani778 vues
Embracing secure, scalable BYOD with Sencha and Centrify par Sumana Mehta
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta1.1K vues
Securing Your Digital Transformation: Cybersecurity and You par SAP Ariba
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
SAP Ariba800 vues
Con8819 context and risk aware access control any device any where - final par OracleIDM
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
OracleIDM1.1K vues
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding par Georg Knon
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Georg Knon536 vues
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ... par mfrancis
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
mfrancis2K vues
Splunk live! Italy 2015 par Georg Knon
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015
Georg Knon3.5K vues
Internet of Things Experts Share Perspectives on Monetizing the Internet of T... par Flexera
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Flexera1K vues
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud par Indus Khaitan
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Indus Khaitan212 vues
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the... par Indus Khaitan
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Indus Khaitan139 vues
Top learnings from evaluating and implementing a DLP Solution par Priyanka Aash
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
Priyanka Aash966 vues
Data Consult - Managed Security Services par Jad Bejjani
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
Jad Bejjani1.4K vues

Plus de TFT presentations Tomorrow's IT Service Future Today

Christophe Capel, The 'Do It Yourself' Service Desk par
Christophe Capel, The 'Do It Yourself' Service DeskChristophe Capel, The 'Do It Yourself' Service Desk
Christophe Capel, The 'Do It Yourself' Service DeskTFT presentations Tomorrow's IT Service Future Today
892 vues54 diapositives
Mark Smalley & Dave van Herpen, ValOps par
Mark Smalley & Dave van Herpen, ValOpsMark Smalley & Dave van Herpen, ValOps
Mark Smalley & Dave van Herpen, ValOpsTFT presentations Tomorrow's IT Service Future Today
1.5K vues42 diapositives
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum... par
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...TFT presentations Tomorrow's IT Service Future Today
1.1K vues21 diapositives
Rob England, Dead Cat Syndrome by The IT Skeptic par
Rob England, Dead Cat Syndrome by The IT SkepticRob England, Dead Cat Syndrome by The IT Skeptic
Rob England, Dead Cat Syndrome by The IT SkepticTFT presentations Tomorrow's IT Service Future Today
965 vues24 diapositives
James Gander, The Service Desk Is Dead – Again! par
James Gander, The Service Desk Is Dead – Again!James Gander, The Service Desk Is Dead – Again!
James Gander, The Service Desk Is Dead – Again!TFT presentations Tomorrow's IT Service Future Today
946 vues33 diapositives
#TFT14 Amy Donahue - Technology for a culture of abundance par
#TFT14 Amy Donahue - Technology for a culture of abundance#TFT14 Amy Donahue - Technology for a culture of abundance
#TFT14 Amy Donahue - Technology for a culture of abundanceTFT presentations Tomorrow's IT Service Future Today
673 vues56 diapositives

Plus de TFT presentations Tomorrow's IT Service Future Today(20)

Dernier

Accel_Series_2023Autumn_En.pptx par
Accel_Series_2023Autumn_En.pptxAccel_Series_2023Autumn_En.pptx
Accel_Series_2023Autumn_En.pptxNTTDATA INTRAMART
77 vues75 diapositives
Top 10 IT Tasks Small Businesses Can Entrust to Offshore Professionals par
Top 10 IT Tasks Small Businesses Can Entrust to Offshore ProfessionalsTop 10 IT Tasks Small Businesses Can Entrust to Offshore Professionals
Top 10 IT Tasks Small Businesses Can Entrust to Offshore Professionalsaltafhsayyednimetler
12 vues14 diapositives
Group and Teams: Increasing Cooperation and Reducing Conflict par
Group and Teams: Increasing Cooperation and Reducing Conflict Group and Teams: Increasing Cooperation and Reducing Conflict
Group and Teams: Increasing Cooperation and Reducing Conflict Seta Wicaksana
13 vues14 diapositives
case study of Insertion Type Magnetic Flowmeter exports to Australia_ (1).docx par
case study of Insertion Type Magnetic Flowmeter exports to Australia_ (1).docxcase study of Insertion Type Magnetic Flowmeter exports to Australia_ (1).docx
case study of Insertion Type Magnetic Flowmeter exports to Australia_ (1).docxDalian Zero Instrument Technology Co., Ltd China
24 vues5 diapositives
Rangell Auto Detailing par
Rangell Auto Detailing Rangell Auto Detailing
Rangell Auto Detailing rangellautodetailing
7 vues8 diapositives
bookmyshow-1.pptx par
bookmyshow-1.pptxbookmyshow-1.pptx
bookmyshow-1.pptx125071035
8 vues11 diapositives

Dernier(20)

Top 10 IT Tasks Small Businesses Can Entrust to Offshore Professionals par altafhsayyednimetler
Top 10 IT Tasks Small Businesses Can Entrust to Offshore ProfessionalsTop 10 IT Tasks Small Businesses Can Entrust to Offshore Professionals
Top 10 IT Tasks Small Businesses Can Entrust to Offshore Professionals
Group and Teams: Increasing Cooperation and Reducing Conflict par Seta Wicaksana
Group and Teams: Increasing Cooperation and Reducing Conflict Group and Teams: Increasing Cooperation and Reducing Conflict
Group and Teams: Increasing Cooperation and Reducing Conflict
Seta Wicaksana13 vues
The 10 Most Iconic Leaders in Supply Chain 2023_compressed.pdf par ciolook1
The 10 Most Iconic Leaders in Supply Chain 2023_compressed.pdfThe 10 Most Iconic Leaders in Supply Chain 2023_compressed.pdf
The 10 Most Iconic Leaders in Supply Chain 2023_compressed.pdf
ciolook16 vues
Imports Next Level.pdf par Bloomerang
Imports Next Level.pdfImports Next Level.pdf
Imports Next Level.pdf
Bloomerang20 vues
Presentation on proposed acquisition of leading European asset manager Aermon... par KeppelCorporation
Presentation on proposed acquisition of leading European asset manager Aermon...Presentation on proposed acquisition of leading European asset manager Aermon...
Presentation on proposed acquisition of leading European asset manager Aermon...
India's Leading Cyber Security Companies to Watch.pdf par insightssuccess2
India's Leading Cyber Security Companies to Watch.pdfIndia's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdf
Episode 258 Snippets: Rob Gevertz of First Five Yards par Neil Horowitz
Episode 258 Snippets: Rob Gevertz of First Five YardsEpisode 258 Snippets: Rob Gevertz of First Five Yards
Episode 258 Snippets: Rob Gevertz of First Five Yards
Neil Horowitz45 vues
PMU Launch - Guaranteed Slides par pmulaunch
PMU Launch - Guaranteed SlidesPMU Launch - Guaranteed Slides
PMU Launch - Guaranteed Slides
pmulaunch11 vues
2023 Photo Contest.pptx par culhama
2023 Photo Contest.pptx2023 Photo Contest.pptx
2023 Photo Contest.pptx
culhama21 vues
Assignment 4: Reporting to Management.pptx par BethanyAline
Assignment 4: Reporting to Management.pptxAssignment 4: Reporting to Management.pptx
Assignment 4: Reporting to Management.pptx
BethanyAline16 vues

#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL

  • 2. Technology Trend & Impact to ITIL A strategy for Next Gen ITSM from SLK Disclaimer: All logos used in this deck are property of respective owners Copyright 2014 SLK Software Services. All rights reserved. Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 1
  • 3. Contents Top 10 Strategic Technology Trends 2014 Today’s Challenge - Sample Scenarios Perceived ITSM Mobile Strategy Mobile Enablement for ITSM Enterprise ITSM Mobile Strategy Strategy Benefits Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (2) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 2 2
  • 4. Top 10 Strategic Technology Trends 2014 Converging Forces • • • • Mobile Device Diversity & Management Mobile Apps & Applications The Internet of Everything Hybrid Cloud & IT as Service Broker Derivative Impact • • • • Cloud / Client Architecture The Era of Personal Cloud Software Defined Anything Web Scale IT Future Disruption • Smart Machines • 3-D Printing Source: Gartner 2013 Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (3) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 3 3
  • 5. Mobile Device Diversity Tactics are the new strategy Wearable Pocketable Grab & Go Convertible Portable Desk Shared Areas Touch,  Voice… Keyboard, Mouse Gesture Source: Gartner 2013 Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (4) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 4 4
  • 6. Today’s Challenge – Sample scenarios Desktop / User based Outlook is not connecting to Exchange – Issue logged at 6pm ITSM staff unable to resolve in time till EOD Issue was not resolved till next business day Monitoring tool opened a low priority ticket to resolve within a day Server reached the threshold unexpectedly and frozen Backup failed due to bandwidth choke and ITSM staff unable to view bandwidth status Scheduled Backup Failed unexpectedly Server based A critical server approaching disk full state Network based Monthly backup scheduled for critical system Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (5) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 5 5
  • 7. Perceived ITSM Mobile Strategy ITSM Staff Core Systems Enterprise Mobile Applications Tickets / SLA Alerts Web App/ Web Features SM Tools Monitoring Tools Enterprises generally focus on enabling Web Apps on the Mobile Channel and most enterprises perceive this as their Mobile Strategy Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (6) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 6 6
  • 8. Points to Ponder – ITSM Mobile Strategy Is your mobile strategy Future-ready? - Device & Data Security - Platform/Device Agnostic - Hardware capabilities - Bring Your Own Device (BYOD) Does your mobile applications work on: - iPhone (iOS), iPad - Android Phones & Tablets - Windows Phone, Tablets Does your Mobile Strategy go beyond Conventional Usage? - Scan & Integrate with CMDB - Access to KEDB from any location - Capable to Intergrade multiple Applications Does your mobile strategy support multiple user interface? - Voice Command - Audio Output - Keyboard & Visual Output The next-gen mobile strategy should offer more service lines and should be scalable to futuristic needs Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (7) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 7 7
  • 9. Mobile Enablement for ITSM • • • • Problem, Incidents, Change records CMDB, KEDB access from anywhere Critical incident , SLA monitoring Management dashboards and Alerts • • • • Monitoring the critical env- 24/7 Live Alerts for IT env Accessibility to alert logs and issue resolution Visibility on critical items for engineers / on call SM Tools Analytics • • • • Generate reports / trends on tickets / alerts etc. Intelligence in reporting the unexpected situations Proactive reports on hardware performance to act Capacity planning by collaborative method • • • • Remote consoles for easy and faster troubleshooting Visibility and accessibility enabling collaborative resolution DC server / Network equipment access for faster resolution LDAP Consoles Remote Consoles Monitoring Tools ITSM Management • • • • BI – for IT Proactive decisions on critical situations Single stop live view of IMS environment Approvals / authorization on the move Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (8) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 8 8
  • 10. Enterprise ITSM Mobile Strategy Customer Enterprise Partners IMS Mobile Application Management (Enterprise AppStore / MAM) Enterprise ITSM Mobile Applications Tickets / SLA Live Alerts Remote Consoles Dashboards/ Reports SM Tools Mobile Application Frameworks Mobile Operating System Monitoring tools Device Drivers & API Mobile Devices & Accessories Remote devices Mobile Enterprise Application (MEAP) Mobile Hardware Accessories POS NFC Camera Bar Code RFID Antenna Audio Mobile Device Management (MDM) Analytics Vision: Centralized platform to remote access ITSM tools to monitor, analyze, resolve the issues proactively & lively Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (9) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 9 9
  • 11. Revised ITSM Maturity Model based on Trends Ecosystem Enterprise Established Enablers targeted for entire IT group Used in selected divisions of IT Established strategy and roadmap Enforced Early Learning Initial exploration in ITSM Used by selected ITSM staff on need basis Apps enabled on web/mobile – Tickets, Environment Monitoring Established Security Standards Centralized ITSM, Mobile Policy Improved SLAs based on new process and mobile enablement All possible tools are made available in Mobile platform also Limited innovative applications Validation of enabled services (ex: 24/7 on call) and impact Limited integration with different ITSM tools (SM, Monitoring, Analytics) • Pilot projects No major impact in SLAs • Proof of Concepts VPN based App Store based distribution Gain experience with tools, technology Integrated dashboard, predictive analytics Consistent within the ecosystem Majority of processes & intelligence on mobile Measured results feed to strategy Business Process innovations & automation Collaborative outputs lead to Productivity and Future plan Omni-channel user experience Learn, Innovate and Continuously improve Established ITSM + Mobile Center of Excellence Support all major mobile platform Reduction in IT Service investment Source: SLK Research Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (10) 10 10 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 12. Enterprise ITSM Mobile Strategy – Strategic direction Establish Enterprise ITSM Mobile Strategy Focus on building innovative solutions rather than just applications Devise a strategy for integrating mobile with enterprise systems Focus on building applications that cater to multiple platforms/devices Establish consistent user experience across the mobile channel Introduce new SLAs leveraging the power of mobile device Build solutions that caters to customer, enterprise & partner needs Evaluate the Tablet space in all initiatives Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (11) 11 11 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 13. Strategy Benefits Benefit Impact Centralized platform to remote access ITSM tools for Updating, Reassigning, Resolving Issues Productivity SLA Enable mobility for ITSM staff to work on consoles directly from anywhere Flexibility Improved ITSM Staff motivation Employee Satisfaction Faster resolution time for Incidents, Problems SLA Improved Change management Productivity Reduced escalations Customer Satisfaction Reduced ITSM staff Cost Better solution for 24/7 on call Business demands Customer Satisfaction Business Continuity Proactive & Lively solution for ITSM Innovation Predictability Increased Business revenue Revenue Customer Confidence Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (12) 12 12 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 14. Sample Screenshot Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (13) 13 13 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 15. Thank you ! Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 14
  • 16. With thanks to our slides sponsor, CA Technologies Try Nimsoft for free at ca.com/NSD-trial