SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Rajesh'Gundurao'&'Firosh'
Poochaly'
Technology'Trends'and'
Impact'to'ITIL'
Technology Trend & Impact to ITIL
A strategy for Next Gen ITSM from SLK

Disclaimer: All logos used in this deck are property of respective owners
Copyright 2014 SLK Software Services. All rights reserved.
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 1
Contents
Top 10 Strategic Technology Trends 2014
Today’s Challenge - Sample Scenarios

Perceived ITSM Mobile Strategy
Mobile Enablement for ITSM
Enterprise ITSM Mobile Strategy
Strategy Benefits

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(2)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

2
2
Top 10 Strategic Technology Trends 2014

Converging
Forces

•
•
•
•

Mobile Device Diversity & Management
Mobile Apps & Applications
The Internet of Everything
Hybrid Cloud & IT as Service Broker

Derivative
Impact

•
•
•
•

Cloud / Client Architecture
The Era of Personal Cloud
Software Defined Anything
Web Scale IT

Future
Disruption

• Smart Machines
• 3-D Printing

Source: Gartner 2013
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(3)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

3
3
Mobile Device Diversity
Tactics are the new strategy

Wearable

Pocketable Grab & Go

Convertible

Portable

Desk

Shared Areas

Touch,  Voice…

Keyboard, Mouse

Gesture

Source: Gartner 2013
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(4)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

4
4
Today’s Challenge – Sample scenarios

Desktop / User based
Outlook is not connecting to
Exchange – Issue logged at 6pm

ITSM staff unable to resolve in
time till EOD

Issue was not resolved till next
business day

Monitoring tool opened a low
priority ticket to resolve within a
day

Server reached the threshold
unexpectedly and frozen

Backup failed due to bandwidth
choke and ITSM staff unable to
view bandwidth status

Scheduled Backup Failed
unexpectedly

Server based
A critical server approaching disk
full state

Network based
Monthly backup scheduled for
critical system

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(5)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

5
5
Perceived ITSM Mobile Strategy

ITSM Staff
Core Systems

Enterprise Mobile Applications
Tickets / SLA

Alerts

Web App/
Web Features

SM Tools

Monitoring Tools

Enterprises generally focus on enabling Web Apps on the Mobile Channel and most
enterprises perceive this as their Mobile Strategy
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(6)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

6
6
Points to Ponder – ITSM Mobile Strategy
Is your mobile strategy Future-ready?
- Device & Data Security
- Platform/Device Agnostic
- Hardware capabilities
- Bring Your Own Device (BYOD)

Does your mobile applications work on:
- iPhone (iOS), iPad
- Android Phones & Tablets
- Windows Phone, Tablets

Does your Mobile Strategy go beyond
Conventional Usage?
- Scan & Integrate with CMDB
- Access to KEDB from any location
- Capable to Intergrade multiple Applications

Does your mobile strategy support
multiple user interface?
- Voice Command
- Audio Output
- Keyboard & Visual Output

The next-gen mobile strategy should offer more service lines and should be
scalable to futuristic needs
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(7)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

7
7
Mobile Enablement for ITSM
•
•
•
•

Problem, Incidents, Change records
CMDB, KEDB access from anywhere
Critical incident , SLA monitoring
Management dashboards and Alerts

•
•
•
•

Monitoring the critical env- 24/7
Live Alerts for IT env
Accessibility to alert logs and issue resolution
Visibility on critical items for engineers / on call

SM Tools

Analytics

•
•
•
•

Generate reports / trends on tickets / alerts etc.
Intelligence in reporting the unexpected situations
Proactive reports on hardware performance to act
Capacity planning by collaborative method

•
•
•
•

Remote consoles for easy and faster troubleshooting
Visibility and accessibility enabling collaborative resolution
DC server / Network equipment access for faster resolution
LDAP Consoles

Remote Consoles

Monitoring Tools

ITSM

Management
•
•
•
•

BI – for IT
Proactive decisions on critical situations
Single stop live view of IMS environment
Approvals / authorization on the move

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(8)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

8
8
Enterprise ITSM Mobile Strategy
Customer

Enterprise

Partners

IMS

Mobile Application Management
(Enterprise AppStore / MAM)

Enterprise ITSM Mobile Applications
Tickets /
SLA

Live
Alerts

Remote
Consoles

Dashboards/
Reports

SM Tools

Mobile Application Frameworks
Mobile Operating System
Monitoring tools

Device Drivers & API
Mobile Devices & Accessories
Remote devices
Mobile Enterprise Application (MEAP)

Mobile Hardware Accessories
POS
NFC

Camera
Bar Code
RFID

Antenna
Audio

Mobile Device Management
(MDM)

Analytics

Vision:
Centralized platform to remote access ITSM tools to monitor, analyze, resolve the issues proactively & lively
Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(9)

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

9
9
Revised ITSM Maturity Model based on Trends

Ecosystem
Enterprise
Established

Enablers targeted
for entire IT group

Used in selected
divisions of IT
Established strategy
and roadmap

Enforced
Early Learning
Initial exploration in
ITSM

Used by selected
ITSM staff on need
basis
Apps enabled on
web/mobile – Tickets,
Environment Monitoring

Established Security
Standards

Centralized ITSM,
Mobile Policy

Improved SLAs based on
new process and mobile
enablement

All possible tools are
made available in
Mobile platform also

Limited innovative
applications

Validation of enabled
services (ex: 24/7 on call)
and impact

Limited integration with
different ITSM tools (SM,
Monitoring, Analytics)

• Pilot projects

No major impact in SLAs

• Proof of Concepts

VPN based

App Store based
distribution

Gain experience with
tools, technology

Integrated dashboard,
predictive analytics

Consistent within
the ecosystem

Majority of processes &
intelligence on mobile
Measured results feed
to strategy
Business Process
innovations &
automation
Collaborative outputs
lead to Productivity and
Future plan
Omni-channel user
experience

Learn, Innovate and
Continuously improve

Established ITSM +
Mobile Center of
Excellence

Support all major
mobile platform

Reduction in IT Service
investment

Source: SLK Research

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(10)
10
10

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Enterprise ITSM Mobile Strategy – Strategic direction
Establish Enterprise ITSM Mobile Strategy
Focus on building innovative solutions rather than just
applications
Devise a strategy for integrating mobile with enterprise
systems
Focus on building applications that cater to multiple
platforms/devices
Establish consistent user experience across the mobile
channel
Introduce new SLAs leveraging the power of mobile device
Build solutions that caters to customer, enterprise &
partner needs
Evaluate the Tablet space in all initiatives

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(11)
11
11

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Strategy Benefits
Benefit

Impact

Centralized platform to remote access ITSM tools
for Updating, Reassigning, Resolving Issues

Productivity
SLA

Enable mobility for ITSM staff to work on consoles
directly from anywhere

Flexibility

Improved ITSM Staff motivation

Employee Satisfaction

Faster resolution time for Incidents, Problems

SLA

Improved Change management

Productivity

Reduced escalations

Customer Satisfaction

Reduced ITSM staff

Cost

Better solution for 24/7 on call Business demands

Customer Satisfaction
Business Continuity

Proactive & Lively solution for ITSM

Innovation
Predictability

Increased Business revenue

Revenue
Customer Confidence

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(12)
12
12

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Sample Screenshot

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

(13)
13
13

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
Thank you !

Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd

SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 14
With thanks to our slides
sponsor, CA Technologies
Try Nimsoft for free at
ca.com/NSD-trial

Mais conteúdo relacionado

Mais procurados

Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionQOS Networks
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsIvanti
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platformOracleIDM
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]ServicePilot
 
Network Security Offering by GSS America
Network  Security Offering by GSS AmericaNetwork  Security Offering by GSS America
Network Security Offering by GSS AmericaGss America
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterSameer Paradia
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
 
Extending Jenkins to the Mainframe. A Simpler Approach.
Extending Jenkins to the Mainframe.  A Simpler Approach.Extending Jenkins to the Mainframe.  A Simpler Approach.
Extending Jenkins to the Mainframe. A Simpler Approach.DevOps.com
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceStephen Tsuchiyama
 
IPsoft Recruitment Brochure
IPsoft Recruitment BrochureIPsoft Recruitment Brochure
IPsoft Recruitment Brochuredlongipsoft
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IPAvtec Inc.
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...CA Technologies
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing ModelIvanti
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 

Mais procurados (20)

Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
Preparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home TransitionPreparing Your Customer's Network for the Work from Home Transition
Preparing Your Customer's Network for the Work from Home Transition
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security Controls
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]
 
Network Security Offering by GSS America
Network  Security Offering by GSS AmericaNetwork  Security Offering by GSS America
Network Security Offering by GSS America
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation Center
 
Why ips slide share
Why ips slide shareWhy ips slide share
Why ips slide share
 
Intro to android (gdays)
Intro to android (gdays)Intro to android (gdays)
Intro to android (gdays)
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Extending Jenkins to the Mainframe. A Simpler Approach.
Extending Jenkins to the Mainframe.  A Simpler Approach.Extending Jenkins to the Mainframe.  A Simpler Approach.
Extending Jenkins to the Mainframe. A Simpler Approach.
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
IPsoft Recruitment Brochure
IPsoft Recruitment BrochureIPsoft Recruitment Brochure
IPsoft Recruitment Brochure
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing Model
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 

Semelhante a #TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL

Challenges of Mobile HR framework and program
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and programJinen Dedhia
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
SplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started SessionSplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started SessionSplunk
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudSherWeb
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security ServicesJad Bejjani
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingGeorg Knon
 
inSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & HistorianinSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & HistorianKondapi V Siva Rama Brahmam
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...mfrancis
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015Georg Knon
 
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Flexera
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Indus Khaitan
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Priyanka Aash
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security ServicesJad Bejjani
 

Semelhante a #TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL (20)

Challenges of Mobile HR framework and program
Challenges of Mobile HR framework and programChallenges of Mobile HR framework and program
Challenges of Mobile HR framework and program
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
SplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started SessionSplunkLive! Tampa: Getting Started Session
SplunkLive! Tampa: Getting Started Session
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the Cloud
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
 
inSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & HistorianinSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & Historian
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015
 
Motadata product itsm overview
Motadata product itsm overviewMotadata product itsm overview
Motadata product itsm overview
 
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 

Mais de TFT presentations Tomorrow's IT Service Future Today

Mais de TFT presentations Tomorrow's IT Service Future Today (20)

Christophe Capel, The 'Do It Yourself' Service Desk
Christophe Capel, The 'Do It Yourself' Service DeskChristophe Capel, The 'Do It Yourself' Service Desk
Christophe Capel, The 'Do It Yourself' Service Desk
 
Mark Smalley & Dave van Herpen, ValOps
Mark Smalley & Dave van Herpen, ValOpsMark Smalley & Dave van Herpen, ValOps
Mark Smalley & Dave van Herpen, ValOps
 
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
 
Rob England, Dead Cat Syndrome by The IT Skeptic
Rob England, Dead Cat Syndrome by The IT SkepticRob England, Dead Cat Syndrome by The IT Skeptic
Rob England, Dead Cat Syndrome by The IT Skeptic
 
James Gander, The Service Desk Is Dead – Again!
James Gander, The Service Desk Is Dead – Again!James Gander, The Service Desk Is Dead – Again!
James Gander, The Service Desk Is Dead – Again!
 
#TFT14 Amy Donahue - Technology for a culture of abundance
#TFT14 Amy Donahue - Technology for a culture of abundance#TFT14 Amy Donahue - Technology for a culture of abundance
#TFT14 Amy Donahue - Technology for a culture of abundance
 
#TFT14 Ryan Ogilvie - what the hell is IT doing?
#TFT14 Ryan Ogilvie - what the hell is IT doing?#TFT14 Ryan Ogilvie - what the hell is IT doing?
#TFT14 Ryan Ogilvie - what the hell is IT doing?
 
#TFT14 Dan Lee Customer Experiences
#TFT14 Dan Lee Customer Experiences#TFT14 Dan Lee Customer Experiences
#TFT14 Dan Lee Customer Experiences
 
#TFT14 Peter Lijnse Business Relationship Management Love
#TFT14 Peter Lijnse Business Relationship Management Love#TFT14 Peter Lijnse Business Relationship Management Love
#TFT14 Peter Lijnse Business Relationship Management Love
 
#TFT14 James Woodward ITIL v Reality
#TFT14 James Woodward ITIL v Reality#TFT14 James Woodward ITIL v Reality
#TFT14 James Woodward ITIL v Reality
 
#TFT14 Mark Smalley, My Favorite IT Paradigms
#TFT14 Mark Smalley, My Favorite IT Paradigms#TFT14 Mark Smalley, My Favorite IT Paradigms
#TFT14 Mark Smalley, My Favorite IT Paradigms
 
#TFT14 Mark Fitzgerald, Making sense out of information chaos
#TFT14 Mark Fitzgerald, Making sense out of information chaos#TFT14 Mark Fitzgerald, Making sense out of information chaos
#TFT14 Mark Fitzgerald, Making sense out of information chaos
 
#TFT14 Korrine Jones, Virtual Reality
#TFT14 Korrine Jones, Virtual Reality#TFT14 Korrine Jones, Virtual Reality
#TFT14 Korrine Jones, Virtual Reality
 
#TFT14 Kiran Pabbathi, Top 5 issues in ITSM consulting
#TFT14 Kiran Pabbathi, Top 5 issues in ITSM consulting#TFT14 Kiran Pabbathi, Top 5 issues in ITSM consulting
#TFT14 Kiran Pabbathi, Top 5 issues in ITSM consulting
 
#TFT14 Simone Jo Moore, A novel way of leading
#TFT14 Simone Jo Moore, A novel way of leading#TFT14 Simone Jo Moore, A novel way of leading
#TFT14 Simone Jo Moore, A novel way of leading
 
TFT13 - Ian Aitchison, Approaching the Event Horizon
TFT13 - Ian Aitchison, Approaching the Event HorizonTFT13 - Ian Aitchison, Approaching the Event Horizon
TFT13 - Ian Aitchison, Approaching the Event Horizon
 
TFT13 - Claire Brereton, Eau de 20000 - The Essence of ITSM
TFT13 - Claire Brereton, Eau de 20000 - The Essence of ITSMTFT13 - Claire Brereton, Eau de 20000 - The Essence of ITSM
TFT13 - Claire Brereton, Eau de 20000 - The Essence of ITSM
 
TFT13 Saurabh Dubey, The Practical Side of Configuration Management (Addition...
TFT13 Saurabh Dubey, The Practical Side of Configuration Management (Addition...TFT13 Saurabh Dubey, The Practical Side of Configuration Management (Addition...
TFT13 Saurabh Dubey, The Practical Side of Configuration Management (Addition...
 
TFT13 - Simone Jo Moore, Communication Waves, A Very Human Business
TFT13 - Simone Jo Moore, Communication Waves, A Very Human BusinessTFT13 - Simone Jo Moore, Communication Waves, A Very Human Business
TFT13 - Simone Jo Moore, Communication Waves, A Very Human Business
 
TFT13 - Saurabh Dubey, Outside the Box of IT
TFT13 - Saurabh Dubey, Outside the Box of ITTFT13 - Saurabh Dubey, Outside the Box of IT
TFT13 - Saurabh Dubey, Outside the Box of IT
 

Último

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 

Último (20)

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 

#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL

  • 2. Technology Trend & Impact to ITIL A strategy for Next Gen ITSM from SLK Disclaimer: All logos used in this deck are property of respective owners Copyright 2014 SLK Software Services. All rights reserved. Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 1
  • 3. Contents Top 10 Strategic Technology Trends 2014 Today’s Challenge - Sample Scenarios Perceived ITSM Mobile Strategy Mobile Enablement for ITSM Enterprise ITSM Mobile Strategy Strategy Benefits Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (2) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 2 2
  • 4. Top 10 Strategic Technology Trends 2014 Converging Forces • • • • Mobile Device Diversity & Management Mobile Apps & Applications The Internet of Everything Hybrid Cloud & IT as Service Broker Derivative Impact • • • • Cloud / Client Architecture The Era of Personal Cloud Software Defined Anything Web Scale IT Future Disruption • Smart Machines • 3-D Printing Source: Gartner 2013 Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (3) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 3 3
  • 5. Mobile Device Diversity Tactics are the new strategy Wearable Pocketable Grab & Go Convertible Portable Desk Shared Areas Touch,  Voice… Keyboard, Mouse Gesture Source: Gartner 2013 Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (4) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 4 4
  • 6. Today’s Challenge – Sample scenarios Desktop / User based Outlook is not connecting to Exchange – Issue logged at 6pm ITSM staff unable to resolve in time till EOD Issue was not resolved till next business day Monitoring tool opened a low priority ticket to resolve within a day Server reached the threshold unexpectedly and frozen Backup failed due to bandwidth choke and ITSM staff unable to view bandwidth status Scheduled Backup Failed unexpectedly Server based A critical server approaching disk full state Network based Monthly backup scheduled for critical system Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (5) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 5 5
  • 7. Perceived ITSM Mobile Strategy ITSM Staff Core Systems Enterprise Mobile Applications Tickets / SLA Alerts Web App/ Web Features SM Tools Monitoring Tools Enterprises generally focus on enabling Web Apps on the Mobile Channel and most enterprises perceive this as their Mobile Strategy Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (6) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 6 6
  • 8. Points to Ponder – ITSM Mobile Strategy Is your mobile strategy Future-ready? - Device & Data Security - Platform/Device Agnostic - Hardware capabilities - Bring Your Own Device (BYOD) Does your mobile applications work on: - iPhone (iOS), iPad - Android Phones & Tablets - Windows Phone, Tablets Does your Mobile Strategy go beyond Conventional Usage? - Scan & Integrate with CMDB - Access to KEDB from any location - Capable to Intergrade multiple Applications Does your mobile strategy support multiple user interface? - Voice Command - Audio Output - Keyboard & Visual Output The next-gen mobile strategy should offer more service lines and should be scalable to futuristic needs Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (7) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 7 7
  • 9. Mobile Enablement for ITSM • • • • Problem, Incidents, Change records CMDB, KEDB access from anywhere Critical incident , SLA monitoring Management dashboards and Alerts • • • • Monitoring the critical env- 24/7 Live Alerts for IT env Accessibility to alert logs and issue resolution Visibility on critical items for engineers / on call SM Tools Analytics • • • • Generate reports / trends on tickets / alerts etc. Intelligence in reporting the unexpected situations Proactive reports on hardware performance to act Capacity planning by collaborative method • • • • Remote consoles for easy and faster troubleshooting Visibility and accessibility enabling collaborative resolution DC server / Network equipment access for faster resolution LDAP Consoles Remote Consoles Monitoring Tools ITSM Management • • • • BI – for IT Proactive decisions on critical situations Single stop live view of IMS environment Approvals / authorization on the move Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (8) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 8 8
  • 10. Enterprise ITSM Mobile Strategy Customer Enterprise Partners IMS Mobile Application Management (Enterprise AppStore / MAM) Enterprise ITSM Mobile Applications Tickets / SLA Live Alerts Remote Consoles Dashboards/ Reports SM Tools Mobile Application Frameworks Mobile Operating System Monitoring tools Device Drivers & API Mobile Devices & Accessories Remote devices Mobile Enterprise Application (MEAP) Mobile Hardware Accessories POS NFC Camera Bar Code RFID Antenna Audio Mobile Device Management (MDM) Analytics Vision: Centralized platform to remote access ITSM tools to monitor, analyze, resolve the issues proactively & lively Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (9) SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 9 9
  • 11. Revised ITSM Maturity Model based on Trends Ecosystem Enterprise Established Enablers targeted for entire IT group Used in selected divisions of IT Established strategy and roadmap Enforced Early Learning Initial exploration in ITSM Used by selected ITSM staff on need basis Apps enabled on web/mobile – Tickets, Environment Monitoring Established Security Standards Centralized ITSM, Mobile Policy Improved SLAs based on new process and mobile enablement All possible tools are made available in Mobile platform also Limited innovative applications Validation of enabled services (ex: 24/7 on call) and impact Limited integration with different ITSM tools (SM, Monitoring, Analytics) • Pilot projects No major impact in SLAs • Proof of Concepts VPN based App Store based distribution Gain experience with tools, technology Integrated dashboard, predictive analytics Consistent within the ecosystem Majority of processes & intelligence on mobile Measured results feed to strategy Business Process innovations & automation Collaborative outputs lead to Productivity and Future plan Omni-channel user experience Learn, Innovate and Continuously improve Established ITSM + Mobile Center of Excellence Support all major mobile platform Reduction in IT Service investment Source: SLK Research Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (10) 10 10 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 12. Enterprise ITSM Mobile Strategy – Strategic direction Establish Enterprise ITSM Mobile Strategy Focus on building innovative solutions rather than just applications Devise a strategy for integrating mobile with enterprise systems Focus on building applications that cater to multiple platforms/devices Establish consistent user experience across the mobile channel Introduce new SLAs leveraging the power of mobile device Build solutions that caters to customer, enterprise & partner needs Evaluate the Tablet space in all initiatives Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (11) 11 11 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 13. Strategy Benefits Benefit Impact Centralized platform to remote access ITSM tools for Updating, Reassigning, Resolving Issues Productivity SLA Enable mobility for ITSM staff to work on consoles directly from anywhere Flexibility Improved ITSM Staff motivation Employee Satisfaction Faster resolution time for Incidents, Problems SLA Improved Change management Productivity Reduced escalations Customer Satisfaction Reduced ITSM staff Cost Better solution for 24/7 on call Business demands Customer Satisfaction Business Continuity Proactive & Lively solution for ITSM Innovation Predictability Increased Business revenue Revenue Customer Confidence Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (12) 12 12 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 14. Sample Screenshot Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd (13) 13 13 SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd
  • 15. Thank you ! Copyright 2014 SLK Software Services. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd SLK Software Company Confidential Information. All rights reserved. This document cannot be Copied, Re-distributed, Transmitted or Printed without the written permission of SLK Software Services Pvt. Ltd 14
  • 16. With thanks to our slides sponsor, CA Technologies Try Nimsoft for free at ca.com/NSD-trial