Common IT Service Management Metrics, Critical Success Factors (CSFs) and Key Performance Indicators (KPIs)
|
|
- Sarah Lambert
- 7 years ago
- Views:
Transcription
1 Common IT Service Management Metrics, Critical Success Factors (CSFs) and Key Performance Indicators (KPIs) Manage quantity and quality of IT service needed: percentage reduction in SLA targets missed percentage reduction in SLA targets threatened percentage increase in Customer perception of SLA achievements via CSS responses percentage reduction in SLA breaches caused because of third party support contracts (Underpinning Contracts) percentage reduction in SLA breaches caused because of internal Operational Level Agreements (OLA s). Deliver service as previously agreed at affordable costs: total number and percentage increase in fully documented SLAs in place percentage increase of SLAs agreed against operational services being run percentage increase in completeness of Service Catalogue versus operational services percentage improvement in the Service Delivery costs percentage reduction in the cost of monitoring and reporting of SLAs percentage increase in the speed and accuracy of developing SLAs. Manage business interface: increased percentage of Services covered by SLAs documented and agreed processes and procedures are in place reduction in the time to respond to and implement SLA requests increased percentage of SLA reviews completed on time reduction in the percentage of outstanding SLAs for annual renegotiation reduction in the percentage of SLAs requiring s (for example targets not attainable; s in usage levels) percentage increase in the number of OLA s and third Party contracts in place documentary evidence that issues raised at service and SLA reviews are being followed up and resolved (e.g. via the CSIP)? reduction in the number and severity of SLA breaches effective review and follow-up of all SLA, OLA and underpinning contract breaches. Accurate business forecasts: production of workload forecasts on time percentage accuracy of forecasts of business trends timely incorporation of business plans into Plan reduction in the number of variances from the business plans and Plans. Knowledge of current and future technologies: increased ability to monitor performance and throughput of all services and components timely justification and implementation of new technology in line with business requirements (time, cost and functionality) reduction in the use of old technology causing breached SLAs due to problems with support or performance.
2 Ability to demonstrate cost-effectiveness: a reduction in panic buying reduction in the over-capacity of IT accurate forecasts of planned expenditure reduction in the business disruption caused by a lack of adequate IT capacity relative reduction in the cost of production of the Plan. Ability to plan and implement the appropriate IT capacity to match business needs: percentage reduction in the number of s due to poor performance percentage reduction in lost business due to inadequate capacity all new services are implemented which match Service Level Requirements (SLRs) increased percentage of recommendations made by Management are acted upon reduction in the number of SLA breaches due to either poor service performance or poor component performance. Manage availability and reliability of IT service: percentage reduction in the unavailability of services and components percentage increase in the reliability of services and components effective review and follow-up of all SLA, OLA and underpinning contract breaches percentage improvement in overall end-to-end availability of services percentage reduction in the number and impact of service breaks improvement in the MTBF (mean time between failures) improvement in the MTBSI (mean time between system incidents) reduction in the MTTR (mean time to repair). Satisfy business needs for access to IT services: percentage reduction in the unavailability of services percentage reduction of the cost of business overtime due to unavailable IT percentage reduction in critical time failures, e.g. specific business peak and priority availability needs are planned for percentage improvement in business and Users satisfied with service (by CSS results). of IT infrastructure achieved at optimum costs: percentage reduction in the cost of unavailability percentage improvement in the Service Delivery costs timely completion of regular risk analysis and system review timely completion of regular cost-benefit analysis established for infrastructure Component Failure Impact Analysis (CFIA) percentage reduction in failures of third party performance on MTTR/MTBF against contract targets reduced time taken to complete (or update) a risk analysis reduced time taken to review system resilience reduced time taken to complete an Plan timely production of management reports percentage reduction in the incidence of operational reviews uncovering security and reliability exposures in application designs. IT Security Management Controls (NIST ) Percentage of systems that had formal risk assessment performed and documented. (every 6
3 IT Security Percentage of systems that have had risk levels reviewed by management. (6 months) Percentage of total systems for which security controls have been tested and evaluated in the past IT Security year. (12 months) The average time elapsed between vulnerability or weakness discovery and implementation of IT Security corrective action. (3 months) Percentage of systems that have the costs of their security controls integrated into the life cycle of IT Security the system. (12 months) Percentage of system changes recertified if security controls are added or modified after the IT Security system was developed. (12 months) Percentage of total systems that have been authorized for processing following certification and IT Security accreditation. (3 months) Percentage of systems that are operating under an Interim Authority to Operate (IATO). (3 IT Security Percentage of systems with approved system Security plans. (12 months) IT Security Percentage of current security plans. (6 months) IT Security Operational Controls (NIST ) IT Security Percentage of systems compliant with the separation of duties requirement. (12 months) Percentage of users with special access to systems who have undergone background evaluations. IT Security (6 months) Percentage of information systems libraries that log the deposits and withdrawals of tapes. (6 Percentage of data transmission facilities in the organization that have restricted access to IT Security authorized individuals. (6 months) IT Security Percentage of laptops with encryption capability for sensitive files. (3 months) Percentage of security-related user issues resolved immediately following the initial call. (6 IT Security Percentage of used media sanitized before reuse or disposal. (12 months) Percentage of critical data files and operations with an established backup frequency. (12 months) IT Security IT Security Percentage of systems that have a contingency plan. (12 months) Percentage of systems for which contingency plans have been tested in the past year. (12 IT Security Percent of systems that impose restrictions on system maintenance personnel. (12 months) Percentage of software changes documented and approved through change request forms. (3 IT Security Percentage of systems with the latest approved patches installed. (1 month) Percentage of systems with automatic virus definition updates and automatic virus scanning. (6 IT Security Percentage of systems that perform password policy verification. (6 months) IT Security Percentage of in-house applications with documentation on file. (12 months) IT Security Percentage of systems with documented risk assessment reports. (12 months) IT Security Technical Controls (NIST ) Percentage of employees with significant security responsibilities who have received specialized IT Security training. (12 months) IT Security Percentage of agency components with incident handling and response capability. (6 months) IT Security Number of incidents reported to FedCIRC, NIPC and local law enforcement. (3 months) IT Security Percentage of systems without active vendor-supplied passwords. (6 months) IT Security Percentage of unique user IDs. (3 months) Percentage of users with access to security software that are not security administrators. (3 IT Security Percentage of systems running restricted protocols. (6 months) IT Security Percentage of websites with a posted privacy policy. (3 months)
4 IT Security Percentage of systems on which audit trails provide a trace of user actions. (12 months) Quickly resolve s: (applies to both and Request Fulfillment) percentage reduction in average time to respond to a call for assistance from first-line operatives percentage increase in the s resolved by first line operatives percentage increase in the s resolved by first line operatives on first response percentage reduction of s incorrectly assigned percentage reduction of s incorrectly categorized reduced mean elapsed time for resolution or circumvention of s, broken down by impact code increased percentage of s resolved within agreed (in SLAs) response times by impact code. Maintain IT service quality: (applies to both and Request Fulfillment) reduction in the service unavailability caused by s increased percentage of s resolved within target times by priority increased percentage of s resolved within target times by category percentage reduction in the average time for second line support to respond reduction of the backlog percentage increase in the s fixed before Users notice percentage reduction in the s reopened percentage reduction in the overall average time to resolve s reduction in the number of s requiring more than one second line support team. Improve business and IT productivity: (applies to both and Request Fulfillment) percentage reduction in average cost of handling incidents improve percentage of business incidents dealt with first line operatives percentage reduction number of times first line operatives bypassed percentage improvement in average number of incidents handled by each first line operatives no delays in the production of management reports improved scores on CSS responses. User satisfaction: (applies to both and Request Fulfillment) percentage improvement in CSS responses on the Management service percentage reduction in length of queue time waiting for response percentage reduction in the number of lost calls percentage reduction of the number of revised business instructions issued. Receiving Calls (Performance): (applies to both and Request Fulfillment) % First Call Resolution % First Call Resolutions without Passwords # Dropped Calls Average Call Hold Time Workload Volumes (Performance) Total # Calls / day / month / year Average # Calls per Day Average # Calls per Month Average # Calls Assigned / day. Average # Calls Assigned / month. Operational Level (Quality) (applies to both and Request Fulfillment)
5 Average duration by Call Type Average duration by Call Group Counts of Call Type / Group / Customer Control of IT assets: percentage reduction in number of Item (CI) attribute errors found in Management Database (CMDB) percentage increase in the number of CI s successfully audited percentage improvements in the speed and accuracy of audit. Support the delivery of quality IT services: percentage reduction in service errors attributable to wrong CI information improved speed of component repair and recovery improved Customer satisfaction with services and terminal equipment. Economic service provision: reduction in the number of missing or duplicated CI s greater percentage of maintenance costs and license fees within budget percentage reduction in S/W costs due to better control percentage reduction in H/W costs due to better control of spares inventory and supplies percentage improvement in average cost of maintaining CI s in CMDB. Support, integration and interfacing to all other ITSM processes: reduced percentage of failures as a result of inaccurate configuration data improved resolution time due to the availability of complete and accurate configuration data more accurate results from Risk Analysis audits due to available and accurate asset information. Improve service quality: percentage reduction in repeat s/s percentage reduction in the s and s affecting service to Customers percentage reduction in the known s and s encountered no delays in production of management reports improved CSS responses on business disruption caused by s and s. Minimize impact of s: percentage reduction in average time to resolve s percentage reduction of the time to implement fixes to Known Errors percentage reduction of the time to diagnose s percentage reduction of the average number of undiagnosed s percentage reduction of the average backlog of open s and errors. Reduction cost of s to Users: percentage reduction of the impact of s on User reduction in the business disruption caused by s and s percentage reduction in the number of s escalated (missed target) percentage reduction in the IT Management budget increased percentage of proactive s raised by Management, particularly from Major and reviews.
6 Repeatable process: percentage fewer rejected RFCs percentage reduction in unauthorized s detected percentage of requests (business driven need) implemented on time percentage reduction in average time to make s percentage reduction in the backlog percentage fewer s backed out because of testing failures percentage reduction in s required by previous failures increase in the percentage of reports produced on schedule. Quick and accurate s: percentage reduction in the number of urgent s percentage reduction of urgent s causing s reduction in the percentage of s implemented without being tested percentage reduction of urgent s requiring back-out reduced percentage of urgent or high priority s submitted without business case to justify decision. Protect service: reduction in both the scheduled and unscheduled service unavailability caused by s percentage reduction in s backed out percentage reduction of unsuccessful s percentage reduction in s causing s percentage reduction in s impacting core service time and SLA service hours percentage increase in s activated outside core service time and SLA service hours reduction in the percentage of s not referred to a Advisory Board (CAB) or Advisory Board Emergency Committee (CAB/EC) improvement in Customer Satisfaction Survey (CSS) feedback on percentage reduction in failed s that do not have recorded back-out plan percentage reduction in time to implement a freeze. Show efficiency and effectiveness results: percentage efficiency improvement based on number of RFCs processed percentage increase in the accuracy of estimates percentage reduction in the average cost of handling a percentage reduction in overtime due to better planning reduction in the cost of failed s increased percentage of s implemented on time increased percentage of s implemented to budget reduction in the percentage of failed s reduction in the percentage of backed out s. Better quality software and hardware: percentage reduction in the use of software and hardware s that have not passed the required quality checks percentage reduction in installed software not taken from DSL percentage reduction in non-standard hardware all bought-in software complies with legal restrictions
7 percentage reduction in the use of unauthorized software and hardware. Repeatable process for rolling out software and hardware s: all new s planned and controlled by Management all installed software taken from the DSL all appropriate hardware stored in the DHS percentage reduction in the number of failed distributions of s to remote sites reduction in the percentage of urgent s increase in the percentage of normal units as opposed to ad hoc s. Implementation of s swiftly (business driven needs) and accurately: percentage reduction in build failures percentage implementation of releases at all sites, including remote ones, on time percentage reduction in the number of urgent s percentage reduction in the s causing s reduction in the percentage of s implemented without being tested reduced percentage of urgent or high priority s requested without the appropriate business case/justification. Cost-effective releases increased percentage of s built and implemented on schedule percentage s built and implemented within budget reduction in the service unavailability caused by s percentage reduction in s backed out percentage reduction of failed s percentage reduction in the average cost of handling a percentage reduction in overtime due to better planning reduction in the cost of failed s no evidence of payment of license fees or wasted maintenance effort, for software that is not in use no evidence of wasteful duplication in building (e.g. multiple builds of remote sites, when copies of a single build would suffice) percentage improvement of the planned composition of s matching the actual composition (which demonstrates good planning) percentage improvement in the resources required by Management percentage increase in the accuracy of estimates.
ITIL Essentials Study Guide
ITIL Essentials Study Guide Introduction Service Support Functions: Service Desk Incident Management Problem Management Change Management Configuration Management Release Management Service Delivery Functions:
More informationITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists
Incident ITSM Maturity Model 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident process exists Incident policies governing incident Incident urgency, impact and priority
More informationITIL Roles Descriptions
ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test
More informationCentral Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework IT Service Management How many times we felt that Business is looking to IT as Operations center not strategy enabler 1
More informationINTERVIEW QUESTIONS. Que: Which process is responsible for ensuring that the CMDB has been updated correctly?
http://www.tutorialspoint.com/itil/interview.htm INTERVIEW QUESTIONS Copyright tutorialspoint.com Que: Which process is responsible for ensuring that the CMDB has been updated correctly? Release Management
More informationFront Metrics Technologies Pvt. Ltd. Capacity Management Policy, Process & Procedures Document
Pvt. Ltd. Capacity Management Policy, Process & Procedures Document Client: Pvt. Ltd. Date : 03/04/2011 Version : 0.6 GENERAL Description Purpose Applicable to Supersedes This document establishes a Capacity
More informationExam : EX0-100. Title : ITIL Foundation Certificate in IT Service Management. Ver : 08.01.06
Exam : EX0-100 Title : ITIL Foundation Certificate in IT Service Management Ver : 08.01.06 QUESTION 1 The successful diagnosis of a problem results in a Known Error. On the basis of this Known Error a
More informationInformation Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Technology Service Manager Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
More informationFoundation. Summary. ITIL and Services. Services - Delivering value to customers in the form of goods and services - End-to-end Service
ITIL ITIL Foundation Summary ITIL and s Design s - Delivering value to customers in the form of goods and services - End-to-end ITIL Best Practice - Scalable and not prescriptive - Gathered from Users,
More informationWhich ITIL process or function deals with issues and questions about the use of services, raised by end users?
1 of 40 Which ITIL process or function deals with issues and questions about the use of services, raised by end users? A. Availability Management B. Service Level Management C. Problem Management D. Service
More informationPreparation Guide. IT Service Management Foundation Bridge based on ISO/IEC 20000
Preparation Guide IT Service Management Foundation Bridge based on ISO/IEC 20000 Edition April 2011 Copyright 2011 EXIN All rights reserved. No part of this publication may be published, reproduced, copied
More informationITIL v3 (Lecture III) Service Management as a Practice IT Operation
ITIL v3 (Lecture III) as a Practice IT Operation 1 Processes and Functions Application mgmt IT Operation mgmt Technical mgmt Functions Service Desk Availability mgmt Knowledge mgmt Service cont mgmt Evaluation
More informationITIL Introducing service transition
ITIL Introducing service transition The goals of service transition Aligning the new or changed service with the organisational requirements and organisational operations Plan and manage the capacity and
More informationOverview of Service Support & Service
Overview of Service Support & Service Delivery Functions ITIL Service Support / Delivery- 1 Service Delivery Functions Availability Management IT Services Continuity Management Capacity Management Financial
More informationA VIEW FROM THE TOP: DEVELOPING A QUALITY DRIVEN MEASUREMENT FRAMEWORK
A VIEW FROM THE TOP: DEVELOPING A QUALITY DRIVEN MEASUREMENT FRAMEWORK Author : Anil C. Dissanayake Version : 2.2 Date : July 2012 1 EXECUTIVE SUMMARY The purpose of this document is to describe an approach
More informationITSM Reporting Services. Enterprise Service Management. Monthly Metric Report
ITSM Reporting Services Monthly Metric Report October 2011 Contents Introduction 3 Background 3 Purpose 3 Scope 3 AI6 Manage Change 4 Number of Changes Logged 4 Number of Emergency Changes Logged 4 Percentage
More informationEXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q. Exam Code: EX0-001. Exam Name: ITIL Foundation (syllabus 2011) Exam
EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q Number: EX0-001 Passing Score: 800 Time Limit: 120 min File Version: 24.5 http://www.gratisexam.com/ Exam Code: EX0-001 Exam Name: ITIL Foundation (syllabus
More informationITIL v3 Incident Management Process
ITIL v3 Process...restoring normal service operation as soon as possible Content Key definitions Incident Lifecycle Purpose and Objectives Value to business Incident Priority Incident Priority and Target
More informationSERVICE MANAGEMENT OVERVIEW
SERVICE MANAGEMENT OVERVIEW Service Management Overview Page 1 of 40 Contents CONTENTS... 2 IT SERVICE MANAGEMENT... 3 SERVICE DESK... 6 PROBLEM MANAGEMENT... 10 CHANGE MANAGEMENT... 13 RELEASE MANAGEMENT...
More informationAn ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
More informationITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0
ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key
More informationProblem Management Fermilab Process and Procedure
Management Fermilab Process and Procedure Prepared for: Fermi National Laboratory June 12, 2009 Page 1 of 42 GENERAL Description Purpose Applicable to Supersedes This document establishes a Management
More informationService Integration &
This is a DRAFT document, being published for review & comment The content is therefore subject to change & revision This document is part of the XGOV Strategic SIAM reference set Service Integration &
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper B, version 4.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationISO 20000-1:2005 Requirements Summary
Contents 3. Requirements for a Management System... 3 3.1 Management Responsibility... 3 3.2 Documentation Requirements... 3 3.3 Competence, Awareness, and Training... 4 4. Planning and Implementing Service
More informationsample questions Practitioner module Release and Control (IPRC) ITIL Practitioner module Release and Control Sample questions IPRC edition June 2005
sample questions Practitioner module Release and Control (IPRC) ITIL Practitioner module Release and Control Sample questions IPRC edition June 2005 contents 3 introduction 4 sample questions 11 answer
More informationITIL IT Service Management Calendar Series
IL Calendar Series Operational Excellence via best practices stards Mountainview, Inc www..ca 866.867.5170 Contact us at: calendar@.ca for more information IL is registered trademark of the UK Office of
More informationThis page intentionally left blank.
This page intentionally left blank. Office of Information Technology Priority: R-6 IT Service Ecosystem FY 2014-15 Change Request Cost and FTE The Office of Information Technology requests $3,455,000 Reappropriated
More informationITIL v3. Service Management
ITIL v3 1 as a Practice ITIL = IT Infrastructure Library Set of books giving guidance on the provision of quality IT services Common language Best practices in delivery of IT services Not standards! Platform
More informationITIL A guide to service asset and configuration management
ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing
More informationSERV SER ICE OPERA OPERA ION
SERVICE OPERATION Service Operation Achieving i effectiveness and efficiency i in the delivery and support of services so as to ensure value for the customer and the service provider SOURCE: ITIL Service
More informationIT Service Management Practitioner: Plan & Improve (based on ITIL ) (IPPI.EN)
Exam requirements IT Service Management Practitioner: Plan & Improve (based on ITIL ) (IPPI.EN) Publication date 01-12-2009 Start date 01-03-2007 Summary Target group Context Prerequisites Practical assignment
More informationService Management in Electronic Commerce. Panos Fitsilis TEI Larissa, Greece
Service Management in Electronic Commerce Panos Fitsilis TEI Larissa, Greece 1 Contents Introduction to e-commerce Service level management Service Development Service Delivery Service Support 2 E-Business
More informationITSM Process Description
ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management
More informationWhite Paper August 2006. BMC Best Practice Process Flows for ITIL Change Management
White Paper August 2006 BMC Best Practice Process Flows for ITIL Change Management Copyright 1991 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
More information1. INCIDENT MANAGEMENT
1. INCIDENT MANAGEMENT Topic/Question 1.1 Incident Identification Can incident records be created manually? 1.2 Unique Reference Does the tool automatically allocate a unique reference to newly created
More informationFermilab Computing Division Service Level Management Process & Procedures Document
BMC Software Consulting Services Fermilab Computing Division Process & Procedures Document Client: Fermilab Date : 07/07/2009 Version : 1.0 1. GENERAL Description Purpose Applicable to Supersedes This
More informationsample exam IT Service Management Practitioner Support & Restore (based on ITIL ) edition July 2009
sample exam IPSR.EN IT Service Management Practitioner Support & Restore (based on ITIL ) edition July 2009 content 2 introduction 3 sample exam 18 answer key 40 evaluation EXIN International B.V. Examination
More informationCTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
More informationPage 1 of 8. Any change, which meets the following criteria, will be managed using IM/IT Change Management Process.
Page 1 of 8 1. Introduction This policy describes the Authority s Information Management/Information Technology (IM/IT) change management procedures. IM/IT manages changes to applications, infrastructure
More informationHP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper B, version 5.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationIncident Management Get Your Basics Right
Incident Management Get Your Basics Right Introduction Neil Thomas Industry experience in IT & IT support ITIL Vendor Product Management ITIL Consulting Specialised in Service Catalog & CMDB Introduction
More informationGuide. BMC Analytics for Business Service Management User. Supporting. BMC Analytics version 7.6.05 for Business Service Management. www.bmc.
BMC Analytics for Business Service Management User Guide Supporting BMC Analytics version 7.6.05 for Business Service Management January 2012 www.bmc.com Supplier Performance Percentage RMA The Percentage
More informationITIL: What is it? How does ITIL link to COBIT and ISO 17799?
ITIL: What is it? How does ITIL link to COBIT and ISO 17799? 1 What is ITIL? The IT Infrastructure Library A set of books comprising an IT service management Best Practices framework An industry of products,
More informationSERVICE DESK MANAGEMENT REPORTS
SERVICE DESK MANAGEMENT REPORTS 1.2.1 Incident Category Report The report shows the breakdown of closed incident requests by category and provides an indicator of volume and duration, for each category.
More informationBCIS 5520 IT Service Management. Service Design (Part 2)
BCIS 5520 IT Service Management Service Design (Part 2) Class 7.01 Spring 2015 Dr. Becker Announcements: Exam #1 Class #8 (3/11; click here) EXAM #1: Foundations of ITSM based on ITIL v3, Jan von Bon (JVB)
More informationBuild (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
More informationFree ITIL v.3. Foundation. Exam Sample Paper 4. You have 1 hour to complete all 40 Questions. You must get 26 or more correct to pass
Free ITIL v.3. Foundation Exam Sample Paper 4 You have 1 hour to complete all 40 Questions You must get 26 or more correct to pass Compliments of Advance ITSM www.advanceitsm.com 1 A Service is not very
More informationThe ITIL v.3 Foundation Examination
The ITIL v.3 Foundation Examination Sample Paper A, version 3.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions. 3. All answers are to be marked on
More informationService Improvement. Part 3 The Strategic View. Robert.Gormley@ed.ac.uk http://www.is.ed.ac.uk/itil
Service Improvement Part 3 The Strategic View Robert.Gormley@ed.ac.uk http://www.is.ed.ac.uk/itil Service Management House Customers Avail. Mgmt Capacity Mgmt Service Level Mgmt Continuity Mgmt Financial
More informationITIL V3 Service Lifecycle Key Inputs and Outputs
ITIL V3 Lifecycle & ITIL V3 Lifecycle Key 1 ITIL V3 Lifecycle & Use Material Complying with all applicable copyright laws is responsibility user No part this document may be reproduced, stored in or introduced
More informationITIL Terms and Definitions Terms in Bold are Foundation exam terms
s in Bold are Foundation exam terms Absorbed overhead Accounting Activity Based Costing Allocated cost Application Sizing Asset Asset Management Audit Authorization Availability Availability Management
More informationSample Exam. IT Service Management Foundation based on ISO/IEC 20000
Sample Exam IT Service Management Foundation based on ISO/IEC 20000 Edition April 2011 Copyright 2011 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
More informationCritical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
More informationCreating Service Desk Metrics
Creating Service Desk Metrics Table of Contents 1 ITIL, PINK ELEPHANT AND ZENDESK... 3 2 IMPORTANCE OF MONITORING, MEASURING AND REPORTING... 3 2.1 BALANCED MANAGEMENT INFORMATION CATEGORIES... 3 2.2 CSFS,
More informationThe ITIL v.3 Foundation Examination
The ITIL v.3 Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper B, version 3.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
More informationQAD Mobile Field Service (MFS) Demonstration Guide. May 2015 EE2015 / MFS 3.7
QAD Mobile Field Service (MFS) Demonstration Guide May 2015 EE2015 / MFS 3.7 Overview This demonstration focuses on one aspect of QAD Service and Support Mobile Field Service and shows how this functionality
More informationChange Management Living with Change
Change Management Living with Change Introduction Neil Thomas Industry experience in IT & IT support ITIL Vendor Product Management ITIL Consulting Specialised in Service Catalog & CMDB Introduction Fully
More informationSoftware Asset Management (SAM) and ITIL Service Management - together driving efficiency
Software Asset Management (SAM) and ITIL Service Management - together driving efficiency Ian Preskett MIET C.Eng. MBCS CITP Software Asset Management Consultant ian.preskett@ipassociatesltd.co.uk Agenda
More informationTechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified
TechExcel ITIL Process Guide Sample Project for Incident Management, Management, and Problem Management. Certified Incident Management Red Arrows indicate that the transition is done automatically using
More informationService Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
More informationITIL Introducing service design
ITIL Introducing service design The objectives of service design The main objective of the service design stage can be defined as: The design of appropriate and innovative IT services, including their
More informationISEB Practitioner Certificate in IT Service Management: Specialising in Availability Management
Syllabus and Qualification Framework This qualification covers the Service Management discipline of Availability Management as described in the IT Infrastructure Library (ITIL) Service Delivery book. The
More informationTrainning Education Services Av. Paulista, 777-15º andar SP Tel/Fax: 55+ (11) 3323-1676 www.trainning.com.br comercial@trainning.com.
Simulados ITIL Question 1 Which of the following is a Service desk activity? A) functioning as the first point of contact for the customer B) investigating the cause of disruptions for the customer C)
More informationIdentifying & Implementing Quick Wins
Identifying & Implementing Quick Wins 1 Executive Summary........3 2 Introduction....... 5 3 Key Steps to Quick Wins....... 7 4 Sample Quick Wins...8 4.1 People Quick Wins... 8 4.2 Process Quick Wins......9
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 4.2 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationI.T. Service Management
I.T. Service Management The ITIL approach to service delivery Gerald O Sullivan Human Sciences Research Council egovernment challenges Measurable egovernment value Lowering service delivery costs Increased
More informationProblem Management: A CA Service Management Process Map
TECHNOLOGY BRIEF: PROBLEM MANAGEMENT Problem : A CA Service Process Map MARCH 2009 Randal Locke DIRECTOR, TECHNICAL SALES ITIL SERVICE MANAGER Table of Contents Executive Summary 1 SECTION 1: CHALLENGE
More informationITIL Example change management procedure
ITIL Example change management procedure An example change process diagram Change Intiators outside IT (users/customers/supplier/etc.) Change Initiators IT SERVICE DESK Filters change requests RFC REJECT
More informationExhibit E - Support & Service Definitions. v1.11 / 2015-07-03
Exhibit E - Support & Service Definitions v1.11 / 2015-07-03 Introduction - Support Services Table of Contents 1 Introduction... 4 2 General Definitions... 5 2.1 Support Services... 5 2.2 2.3 License or
More information1 Why should monitoring and measuring be used when trying to improve services?
1 Why should monitoring and measuring be used when trying to improve services? a) To validate, direct, justify and intervene b) To validate, measure, monitor and change c) To validate, plan, act and improve
More informationWhich statement about Emergency Change Advisory Board (ECAB) is CORRECT?
ITIL Foundation mock exam 4 1. Which of the following is NOT a purpose of Service Transition? A) To ensure that a service can be managed, operated and supported B) To provide training and certification
More informationITIL Foundations. IT Infrastructure Library
ITIL Foundations IT Infrastructure Library What is ITIL? Information Technology Infrastructure Library Result of years of analysis and research Currently consists of 7 core books providing guidance on
More informationThe Official ITIL v3 Foundation Study Aid Glossary of Terms and Definitions
The Official ITIL v3 Foundation Study Aid Glossary of Terms and s V1.0, November 2007 Acknowledgements We would like to express our gratitude and acknowledge the contribution of Stuart Rance and Ashley
More informationAttachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
More informationITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon Executive Summary: This document is seven pages. Page one is informational/background only. What follows over the next six pages are
More informationGeneral IT Controls Audit Program
Contributed February 5, 2002 by Paul P Shotter General IT Controls Audit Program Purpose / Scope Perform a General Controls review of Information Technology (IT). The reviews
More informationDigital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
More informationITIL - QUICK REFERENCE GUIDE
http://www.tutorialspoint.com/itil/itil_quick_guide.htm ITIL - QUICK REFERENCE GUIDE Copyright tutorialspoint.com ITIL Overview ITIL is a framework providing best practice guidelines on all aspects of
More informationDevelopment of Information Technology Service Management System in Academy on International Standard
Development of Information Technology Service Management System in Academy on International Standard 1 Pallop Piriyasurawong, 2 Sarun Nakthanom 1 Department of Technological Education Faculty of Technical
More informationIT Security Standard: Computing Devices
IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:
More informationNIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
More informationInformation Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
More informationCOUNTY OF ORANGE, CA Schedule 2D Service Desk Services SOW SCHEDULE 2D SERVICE DESK SERVICES SOW. for. Date TBD
SCHEDULE 2D SERVICE DESK SERVICES SOW for COUNTY OF ORANGE, CA Date TBD Schedule 2D Service Desk Services SOW Table of Contents 1.0 Service Desk Services Overview and Service Objectives... 1 1.1 Service
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 4.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationRelease Management PinkVerify v2.1. Mandatory Criteria
Mandatory Criteria *CMDB= Configuration Management Database *CI= Configuration Item *DSL= Definitive Software Library *RFC= Request for Change *SLA= Service Level Agreement 1. Does the tool facilitate
More informationThe SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution
BEST PRACTICES WHITE PAPER The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution Nine Things to Look For in Your Next SaaS Service Desk Table of Contents Introduction...................................................
More informationHP Service Manager. Process Designer Content Pack 9.30.1. Processes and Best Practices Guide
HP Service Manager Process Designer Content Pack 9.30.1 Processes and Best Practices Guide Document Release Date: June, 2012 Software Release Date: June, 2012 1 Legal Notices Warranty The only warranties
More informationUnited Service Technology (Shanghai) Limited Outsource Management Methodology. Copyright 2008@ United Service Technology(SH)
United Service Technology (Shanghai) Limited Outsource Management Methodology IT/BPO Outsourcing---Benefits 1. More profitable use of valuable in-house IT talent 2. Reduced IT overhead 3. Reduced capital
More informationSample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
More informationEXIN IT Service Management Foundation based on ISO/IEC 20000
Sample Exam EXIN IT Service Management Foundation Edition October 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
More informationYale University Incident Management Process Guide
Yale University Management Process Guide Yale University Management Process 1 of 17 Introduction Purpose This document will serve as the official process of Management for Yale University. This document
More informationRisk profile table for deployment of releases to the main web site. High Acceptable Unacceptable Unacceptable
ITIL V3 Intermediate Capability Stream: RELEASE, CONTROL AND VALIDATION (RC&V) CERTIFICATE SCENARIO BOOKLET Scenario One A global company develops their own applications to support the business. The Service
More informationHP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal
More informationHow To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
More informationDELL BACKUP ADMINISTRATION & MANAGEMENT SERVICES
DELL BACKUP ADMINISTRATION & MANAGEMENT SERVICES SIMPLIFY DATA BACKUP MANAGEMENT BACKUP ADMINISTRATION & MANAGEMENT SERVICES DELL S APPROACH Dell brings predictability and manageability into backup environments
More informationEVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
More informationKentucky IT Infrastructure Library (ITIL) Program
2006 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Infrastructure Library (ITIL) Program Commonwealth Office of Technology. KentuckyUnbridledSpirit.com
More information