Adapting ITIL To Small-And Mid-Sized Enterprises: Inside This Report
Adapting ITIL To Small-And Mid-Sized Enterprises: Inside This Report
Adapting ITIL To Small-And Mid-Sized Enterprises: Inside This Report
IT service management is a key weapon in the war to make IT more responsive to the business users it serves. Best practices frameworks such as IT Infrastructure Library (ITIL) provide the essential structure to moving forward with service management improvement initiatives. Learn how to adapt ITIL to a small- or mid-sized enterprise.
Info-Tech Research Group is a professional services rm dedicated to providing premium research and objective advice to IT managers of mid-sized enterprises, serving more than 25,000 clients worldwide. Our purpose is to provide practical and thorough solutions that enable IT managers to bridge the gap between technology and business. www.infotech.com 888-670-8889 (North America) 519-432-3550 (International) Info-Tech Research Group, 2006
INTRODUCTION
Information Technology Infrastructure Library (ITIL) has taken the IT world by storm. With the pool of ITIL-certied professionals growing at 30% per year, this is one of the fastest-growing phenomena in IT. Enterprises of all sizes are learning to reap the benets of this powerful approach. However, in the excitement, many individuals see ITIL as the answer for whatever IT problems they are experiencing. This bandwagon effect has led to failed efforts and wasted resources. At the most fundamental level, ITIL is a set of best practices that helps IT enterprises provide reliable and consistent service to end users at a cost that the enterprise can afford. As IT has evolved, a number of complementary frameworks have emerged, but the basic principles of quality improvement have remained constant, and they apply to enterprises of all sizes. These basic quality principles are the focus of this Info-Tech Research Report. Weve also made an effort to clarify the most frequently misunderstood aspects of ITIL, and to explain the relative role of other bodies of knowledge, such as the Microsoft Operations Framework (MOF) and the COBIT governance framework.
TOC
The measurement and continuous improvement of IT delivery from the end-user perspective. Improved alignment between IT and the business.
Success in this endeavor requires enterprises to get a solid handle on the diverse infrastructure upon which IT rests. Implementing a service delivery model is no small undertaking; however, the IT industry has been very active in addressing this problem since the early 1980s. This is what ITIL, and the community that supports it, is all about.
One of the classic hallmarks of quality methods is the Shewhart circle, illustrated below. Named after its inventor, the American statistician Walter Shewhart, this simple model has become the paradigm for continuous quality improvement.
TOC
3. Check. Determine whether desired results were achieved from customer perspective.
Figure 1. Quality standards are detailed and complex, but they are based on a simple model for continuously improving quality.
TOC
IT Users
The Business
Change Management
Service Delivery
Service Support
Incident Management
Configuration Management
Problem Management
Release Management
Availability Management
Service Desk
Figure 2: Basic ITIL Processes Two salient features of this management structure should be noted. 1. The Service Desk plays a central role. All feedback about the performance of the IT systems comes through this single point of contact. The services desk also owns the documentation process. As a result, the service desk serves as the hub for the information ow for all aspects of the service management process. 2. The services are divided into two categories. One is dedicated to improving the quality of service for end users. The other is dedicated to measuring and controlling the cost and quality of IT from a business perspective. The two are designed to work together in a balanced, complementary fashion.
TOC
Hosting and qualitycontrolled delivery of BlackBerry wireless network applications. Hosting and qualitycontrolled delivery of Navision ERP application.
ERP Application
Each service has many components, and each of them have much in common they all use the corporate network, a desktop device, a back-ofce infrastructure, and other IT amenities. There are also patches, plug-ins, and other elements that are unique. However, when it comes to delivering corporate email, the user shouldnt have to worry about any of this, just as the owner of a car doesnt have to be concerned with wheel bearings and engine parts. Similarly, the business stakeholder should have easy access to information such as what e-mail is costing per user, or what the cost might be of improving that service. Being able to continuously improve the service, and assess the cost of making the service more reliable, is where best practices come in.
TOC
Creation and maintenance of a database of all IT conguration items, their relationship with other items, and their proper state. Receiving, recording, and classifying user reports of malfunctions, primarily received through the help desk. Analysis of incidents to uncover patterns of repetition that might indicate a common root cause. Positive conclusion results in a Request for Change (RFC), and the cycle repeats. Response to and action upon requests for change. Process includes solution evaluation and design, risk analysis, prioritization, approvals, and feasibility testing. Sequence of events for rolling out a change to the user environment in order to minimize disruption, prevent errors and loss of data, and maintain proper documentation.
As an example, the ITIL processes shown above could be used to resolve a software version conict. Suppose that a number of users have reported through the Service Desk that they are occasionally unable to open .PDF (Adobe Acrobat) les downloaded from the Internet. Here are the steps that would be taken to resolve the issue: 1. The repeated incidents, as captured by Incident Management, are forwarded to Problem Management for further investigation. 2. Input from users is analyzed through the Problem Management process to determine the root cause, resulting in a proposal for a conguration change. 3. Change Management evaluates and tests possible changes, and comes up with the best solution. In this case, it might be the implementation of a software patch, or even an upgrade to a new version. 4. Release Management handles the rollout, ensuring that the change is made in the least disruptive fashion.
TOC
5. Incident Management keeps a close watch on the situation to ensure that the change has truly eliminated the problem, and that users are no longer having difculty. These processes ow in a cyclical fashion, following the classic Shewhart Circle paradigm, as illustrated in Figure 3 below.
Figure 3. Using ITIL processes to implement a software patch to resolve a version conict. As the diagram illustrates, the pattern applies to all service interactions. The goal is to continuously improve the quality of a recognizable service, such as Corporate E-mail. The engine for the process is continuous user feedback, which constantly drives improvement. The same process ow will take place for any defect in the service, regardless of whether the root cause is attributable to networks, hardware, software, an external service, or even user training.
Users enjoy consistent treatment from IT. Incidents are always handled the same way, regardless of the root cause of the problem. With all IT people reading off the same script, a user will not be given one version of the story from one person and another from a different person. There is broad agreement of what constitutes a legitimate problem. If a number of users are experiencing a difculty, this could be justication for a change. At the very least, it might be an indication that training is required, or a feature is impractical for use and should be disabled.
TOC
Capacity Management tracks and manages the resources being used to satisfy the needs of the enterprise. These include storage capacity, disk space, CPU capacity, and personnel. The process also includes the creation and maintenance of a Capacity Plan. Business Continuity Management protects the business against damage due to the temporary loss of IT systems. Commonly known as disaster recovery, BCM covers vulnerability and risk assessment, impact assessment, creation and testing of a recovery plan, staff education, and review of other processes that could impact on resiliency in case of a disaster. Security Management is a supplementary process that was recently added to ITIL. This process protects against the loss or compromise of corporate assets such as data. This includes categorization of assets, assignment of security levels, creation and maintenance of a security plan, and monitoring of security-related incidents.
ITIL Service Delivery processes provide the following benets: The establishment of an optimum level of service within specic cost constraints. The design and measurement of a service according to specic parameters that directly impact a business, such as Key Performance Indicators (KPIs). Alignment of service quality with corporate incentive programs. A clear picture of the IT risks to which an enterprise is exposed. ROI and TCO analysis of IT investments.
#1: ITIL Is Not Something You Can Implement Out of the Book
The relationship between the content of the ITIL books and the operation of an IT department is not simply a direct one. In fact, there is a three-layer structure, as illustrated below. ITIL denitions and guidelines actually become the basis of specic processes that are developed in an enterprise.
10
TOC
Operations Staff
Delivery of IT Services
Governed By
Process Designers
IT Processes
Based On
ITIL Books
Figure 4: How theory meets practice This distinction is important, because the middle layer the design of processes based on ITIL can be very costly and time-consuming. In fact, this middle layer is the biggest hurdle to implementing ITIL.
11
TOC
computing, networking, client/server computing, and the Internet. Microsoft Operations Framework (MOF), which is described below, is an example of a body of knowledge that builds on ITIL to address these changes.
WHAT ITIL IS
The success of ITIL is based on its applicability to a wide range of IT scenarios. The following observations are key: ITIL is scaleable. ITIL principles can be used to create processes for enterprises of all sizes. Even a one-person help desk can use ITIL to record congurations, track incidents, and manage escalations. ITIL is exible. One of the maxims of the ITIL community is adopt and adapt. This means take the ITIL principles and use them as required in the enterprise. ITIL is all about teamwork. Enterprises of any size that embrace ITIL need to break down barriers between different stakeholder groups. Finger pointing, for example, between the database people and the network people cannot be had when user productivity is on the line. ITIL, at the most fundamental level, gets everybody working towards the same goal. ITIL is evolving. ITIL is currently being re-written through the ITIL Refresh project. ITIL works well with other frameworks. In keeping with the adopt and adapt philosophy, ITIL maps well with other bodies of knowledge.
12
TOC
Application management, covering the increasingly complex nature of distributed environments. Software management, satisfying the need to manage software quality in a continuously changing environment. Security management, addressing the increased risks to IT systems resulting from distributed architectures and the Internet. Improved nancial management, spurred on by the vastly complex array of costs and business benets that have arisen from recent IT developments.
At least a dozen standards have emerged that support this expanded role of ITSM. These are complementary in nature, and are supported by the ITSM community through itSMF. It is beyond the scope of this document to look at all of them. Instead, we will focus on the three that are most likely to matter to the SME: COBIT, Six Sigma, and MOF.
13
TOC
SIX SIGMA
Six Sigma and ITIL have common roots. The beginnings of Six Sigma go back to 1920, when Walter Shewhart, the creator of the same Shewhart Circle used by ITIL, established a set of statistical principles about the dynamics of product variation. The big breakthrough for Six Sigma, however, occurred in the 1980s the same time ITIL was being created. Bill Smith, a Vice President at Motorola, created the actual Six Sigma body of knowledge for use with by his own enterprise. Six Sigma remains a Motorola registered trademark. However, much of the notoriety of Six Sigma was achieved through General Electrics high prole adoption of it in the 90s under the helm of Jack Welch. As a method, Six Sigma provides a set of tools that allow variations to be quantied, and for performance to be planned around quantiable goals. Six Sigma adheres to the following multi-layer structure: As a measurement tool, it provides means for calculating deviations in quality. The overriding law is that defects must be limited to 3.4 out of one million instances. As a method, it provides a toolset for quality improvements projects. As in ITIL, these projects involve teamwork and the elimination of functional silos. Six Sigma is also a philosophy in that it promotes a culture about quality.
Many vendors provide Six Sigma consulting as a complement to ITIL, and it can be used to help enterprises understand how successful they are at managing their IT infrastructure. In fact, many SMEs contemplating ITIL already have Six Sigma processes in place. The two methodologies often have a complementary relationship. If ITIL is the machine that monitors and regulates IT, Six Sigma is the precision measurement tool.
14
TOC
As a framework, MOF provides the following: Processes mapped specically to Microsoft products. These cover areas such as security administration, directory services administration, storage management, and print and output management. A lifecycle model that makes it easier to create, evolve, and track specic services over time. A teaming model that reects that fact that teams may be geographically distributed and from a variety of disciplines. A risk model that claries the day-to-day management of IT risk through a ve- step process. Correspondence with another Microsoft process framework Microsoft Solutions Framework (MSF). MSF in turn provides a methodology for the planning and rollout of enterprise applications in a Microsoft environment.
MOF is particularly suitable for SMEs because it reduces the workload of implementing service management as well as outside consulting costs. The costreducing elements are as follows: Microsoft has released software plug-ins that make it easy to manage applications such as Microsoft Exchange using MOF principles. These greatly speed up the implementation process, and set up plug and play workow processes that ensure that service management is executed thoroughly and accurately. The MOF documents also include many of the practical middle layer processes that are not included in ITIL. As opposed to the broad denitional approach of ITIL, these processes are actionable and ready to implement. The completeness of MOF helps enterprises avoid the complexity of incorporating other standards and methods with ITIL.
Microsoft made the wise choice to not re-invent the wheel, and to keep the ITIL principles intact. This means that a MOF environment will easily accommodate ITIL-compliant software such as HP OpenView, which may play a prominent role in the IT management of an enterprise. But more importantly it means that an enterprise that works with MOF can use ITIL-trained staff, and can work easily with partners that have implemented ITIL-compliant processes in their enterprises. However, the adopt and adapt motto should be kept in mind. Like ITIL, MOF is not a religion, and should never be seen as an automatic x for all IT problems. Furthermore, MOF is optimized for Microsoft environments. Enterprises with signicant investments in other platforms such as Linux, HP-UX, or AIX may nd that the exceptions outweigh the benets.
15
TOC
Although the exam structure for certication will change, past ITIL certications will remain valid.
EDUCATION
ITIL training is provided by a number of service providers on a global level. Trainers range from single independent consultants to large multinationals such as HP and IBM. Often, training is delivered as part of a consulting engagement.
16
TOC
Certication and testing is managed by an enterprise called EXIN (Examination Institute for Information Science). EXIN oversees the administration of exams, and the certication of trainers and examiners. Other IT frameworks are covered in EXINs mandate, including MOF. There are three levels of ITIL certication: Foundation Level: This involves 2-5 days of classroom training, and provides an introduction to ITIL processes and principles. General in scope, this training is suitable for managers as well as eld personnel. Practitioner Level: This involves in-depth training in a specialized process. The exam is case-study oriented, requiring the candidate to demonstrate mastery on a practical level. Service Manager Level: This is reserved for a practitioner who has practiced ITIL for three or more years. This demonstrates mastery at a practical and theoretical level of the skills necessary to build and manage an ITIL-based service enterprise.
CONSULTING SERVICES
As is the case with training, service providers who cater to the ITIL community range from independent consultant to large multinational. In fact, most ITIL service providers offer both training and consulting. Because of the strong central role that itSMF plays in the ITSM community, ITIL experts are not hard to nd. However, a number of enterprises are reporting a shortage of ITIL-trained individuals, in spite of a steady increase in certications. Many larger enterprises offer comprehensive approaches. These include specic architectures and pre-established methodologies that speed the implementation process. While appealing, many of these approaches are too expensive for the average SME. It should also be pointed out that large IT vendors use ITIL services as a lead-in to sell hardware infrastructure. In general, smaller enterprises tend to work with independent or smaller service providers in order to nd solutions that meet their budget. Many consultants also combine other frameworks to support a more up-to-date approach. It wouldnt be uncommon for an ITIL consultant to utilize MOF in order to set up support for a Microsoft Exchange server, or to add some Six Sigma processes to help make some structural improvements.
17
TOC
Fortunately, vendors have put together a variety of customizable documents to signicantly reduce the implementation effort. These are available standalone, or are brought in by hired consultants.
SOFTWARE
A variety of software products are used extensively in ITIL implementations. First of all, most NSM (Network and System Management) software packages incorporate ITIL principles. For example, most help desk software packages include an ITIL-compliant conguration management database, and are structured based on ITIL patterns and denitions. These products also often incorporate a workow component, where tasks are routed from one group to another according to the designated process ow. Finally, they greatly facilitate the kind of reporting that is required for Service Delivery processes such as Availability Management and Financial Management. A number of vendors also offer standalone products such as conguration databases and development tools for workow processes.
18
TOC
Configuration Management
Customer-owned Process
Outsourcer-owned Process
Figure 5: The sharing of ITIL processes While the interaction seems complex, this kind of collaboration is exactly what ITIL was designed for. Outsourcers who work with ITIL will be familiar with this approach, as outsourcing in the current marketplace is rarely an all or nothing proposition.
19
TOC
to manage IT assets more carefully. Or it could involve a multi-year project with a number of processes, and the complementary use of ITIL and other frameworks. 2. Train key people at the ITIL Foundation level. Because ITSM involves both a new way of thinking about IT and a signicant investment, it pays to train key people early on at the ITIL Foundation level. This will make it easier to assess vendor offerings, and take a sober look at what lies ahead. Since ITIL shares the same basic principles as other frameworks, Foundationlevel training will also help determine a role for complementary processes such as COBIT or MOF. Trainees should also join itSMF, and become active members of the ITSM community. 3. Create a tactical plan. Sketch out a sequential plan for rolling out service management processes. Vendor alignments should be worked out at this stage, including consulting, training, use of software tools, and outsourcing. The plan should also determine the role of complementary frameworks such as COBIT or MOF. 4. Create a conguration management database. No ITSM effort can succeed unless this preliminary step has been taken. Vendor products make this step easier, but the commitment to maintain documentation should not be underestimated. 5. Get Incident Management under control. With the content management database in place, the next step is to implement policies where incidents are recorded and tracked according to ITIL Incident Management. This will keep the content management database maintained, and will begin the all important data collection process upon which all quality improvement will be based. 6. Implement Problem and Change Management. With Conguration and Incident Management in place, the escalation processes can be formalized according to Problem and Change Management. In larger enterprises, particularly with multiple locations, Release Management should also be implemented. 7. Implement processes to address specic business requirements. Implement Service Delivery processes based on business priorities. Much of this can occur in parallel with rollout of the Service Support processes, but having the latter in place will make the enterprise much more effective at measuring costs and risks, and detecting potentially dangerous conditions. For example, an efcient Change Management process will help enterprises recover quickly according to the Business Continuity Management process. As the environment-specic aspects begin to be rolled out, the role of other bodies of knowledge, such as COBIT or MOF, will become more prevalent.
20
TOC
CONCLUSION
ITSM is a key weapon in the war to make IT more responsive to the users and businesses it serves. Since the early 1980s ITIL has evolved from a set of best practices for improving IT in the U.K. government to a de facto global standard for IT management. As IT has evolved, other bodies of knowledge have evolved to ll in the resultant gaps. However, these documents are not competitive, but complementary, and are supported by a common community. Today, enterprises have a wide variety of choice when it comes to service management methodologies, and a large pool of vendors from which to choose. For the SME, ITSM in general is a large undertaking, but the adopt and adapt nature of the discipline means that there is an approach for everybody. As the eld continues to grow, new vendor offerings will continue to lower the entry bar.
21
TOC
Disclaimer
This material is for the general information of clients of Info-Tech Research Group. It does not constitute a personal recommendation or take into account the particular objectives, situations, or needs of individual clients. Before acting on any advice or recommendation in this material, clients should consider whether it is suitable for their particular circumstances and, if necessary, seek professional advice. The information contained herein has been obtained from sources believed to be reliable. Info-Tech disclaims all warranties and conditions as to the accuracy, completeness or adequacy of such information. Info-Tech is not liable for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection and use of these materials to achieve its intended results. Opinions expressed are our current opinions as of the date appearing on this material only. The opinions expressed herein are subject to change without notice. We endeavor to update on a reasonable basis the information discussed in this material, but for certain reasons we may be prevented from doing so. 2006 3409945 Canada Limited, operating as the Info-Tech Research Group (Info-Tech). All rights reserved. Reproduction in any form without prior written permission is forbidden. Note: All Web links in this document were checked for accuracy and functionality at the time of publication. We cannot, however, guarantee that referenced Web sites will not change the location or contents of linked materials, and will not be held responsible for such changes.
22
TOC