SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
The Impact of Disparate Tools
on the State of IT Service
Management in Mid-tier
Organizations
An Ogren Group Special Report
March 2009
Introduction

IT service management aligns information technology processes, controls, and priorities to
meet business demands while delivering greater cost savings, reducing risks of service
disruptions, and supporting business expansion. The concept of IT being run as a service, as
opposed to functional network, systems and application silos, has gained significant adoption in
many organizations. Leading IT standards such as ITIL, ISO and COBIT all embrace the concept
of IT service management to effectively integrate IT with the business. CIO’s, IT executives, and
data center directors within mid-tier organizations are seeking to take advantage of IT service
management to improve service responsiveness and drive down operational costs.

Unfortunately, real progress towards IT service management and its respective benefits often
eludes mid-tier IT organizations. The company’s infrastructure has grown, but the IT
organization has very limited means for integrated oversight or service-oriented control to
manage the growth in complexity. The common
approach is to develop departmental teams             More than 40% of mid-tier businesses
specializing in network, systems, and                 employ more than 6 tools to manage
applications management, but without                  their networks.
complete visibility of the business process to
optimize support of the organization. These organizations have solidified the functional silos by
amassing tools to assist in managing the infrastructure from a component rather than a service
perspective resulting in inefficiencies, increased license and operational costs, and business
risks.

The Ogren Group obtained feedback from 179 North American data center directors and IT
professionals within the mid-tier market regarding their level of confidence with the tools they
have in place to support IT service management. Only 17% of those surveyed felt very confident
in the tools they use to monitor and optimize network and application availability, performance,
compliance, and security, as shown in Exhibit 1. Mid-tier IT organizations, defined as having
between 250 and 5000 employees, are not confident they have adequate systems and network
management tools to address the reliability requirements, performance improvements and
cost-saving expectations of the business. For many, the situation is worsening as IT budgets
and headcounts are being trimmed while corporate systems, applications, access, security and
network complexity is increasing.




Copyright 2009, Ogren Group                                                                         Page 2
Very           Not very
                                       confident,      confident,
                                        17.20%          19.50%




                                              Somewhat
                                              confident,
                                                62.0%




                                               Exhibit 1
      Do you feel that you or your organization has adequate tools in place to monitor and optimize
                network/application availability, performance, compliance, and security?


This presents an underlying crisis as mid-tier organizations are facing challenging service
response expectations with management tools they have little confidence in and with flat or
shrinking budget allocations. While these organizations are adopting cost-saving technologies
such as virtualization in the data center, distributed and mobile access, outsourced services and
cloud-oriented application services, they are constrained by the lack of integrated
infrastructure and service management capacity. Mid-tier businesses require tools that focus
on correlating broad operational data, applying analytics, automating critical IT management
functions, and facilitating service level monitoring. A holistic service management approach
allows IT to move forward with new technologies and business initiatives while reducing
operations expenses, lowering risks and improving service performance.

More integrated management capability requires an optimized means to capture, correlate and
manage operational data, while at the same time consolidate core IT management functions
and streamline service definition. The result would allow IT to more effectively maintain real-
time and historic visibility of infrastructure performance, control over the infrastructure’s
technical elements, and deliver against service levels to better serve the business. A single
operational “pane of glass” solution, specifically architected for the requirements of mid-tier
organizations, permits IT to confidently automate valued functions including:

        Diagnose problems and security issues: IT delivers services with predictable response,
        availability, security, and user experience. Relying upon multiple system and network
        management tools makes it difficult to analyze and correct disruptions in network,
        system, application, or security performance in a timely manner. This is especially the


Copyright 2009, Ogren Group                                                                           Page 3
case when performing root-cause analysis on network, system and storage
        virtualization technologies.
        Control infrastructure configurations ensure reliability, consistency, and performance:
        the greatest causes of instability in the network, application performance, and security
        are configuration settings that are outdated, inadvertently changed, not following
        industry best practices, or are inconsistent across network devices and systems. A
        common configuration validation solution allows IT to more confidently control network
        resources and assure optimal business performance. Organizations need to both
        validate a change, as well as readily see the affect of a change.
        Streamline compliance and governance processes: audit requirements to demonstrate
        compliance with standards and regulations such as COBIT, GLBA, HIPAA, and PCI often
        require merging controls and consolidating reports from multiple sources - an
        expensive and time consuming effort. A broader and more automated approach reduces
        audit costs and enables IT resources to focus on more directly beneficial business
        activities.
        Monitor operational service levels: baseline and correlate their infrastructure
        components with associated applications in order to establish and monitor an IT service.
        Automating this process across both physical and virtual environments dramatically
        enables IT to prioritize incident response, reduce downtime business impact, and
        measure IT service improvement.
This Ogren Group Special Report, commissioned by AccelOps, illustrates the challenges faced
by mid-tier IT organizations and the problems with employing disparate IT management
solutions. The report also assesses a more integrated approach that expedites mid-tier
organizations’ ability to achieve and improve IT service management.




Copyright 2009, Ogren Group                                                                        Page 4
The problems with current IT management tool portfolios

Mid-tier companies are investing in managing components of the technical infrastructure – the
network, systems, applications, users, as well as access, changes and trends. Unfortunately,
the tools employed do not provide the situational awareness, baseline or oversight needed to
enhance service reliability, performance and security for the business.

Approximately 82 percent of respondents to the AccelOps survey issued by the Ogren Group,
reported that they are not very confident that they have adequate tools in place to monitor and
optimize network and application availability,
performance, compliance, and security. This        82% of those surveyed are not very
is a critical shortcoming in IT’s arsenal to       confident that they have adequate tools
deliver timely and cost-effective services to      in place for IT service management.
the business. Mid-tier companies do not have
extensive budgets and resources, yet the expectations for delivering IT services to the company
are perhaps more important to the success of the business than ever before.

According to Ogren Group research, none of the network and systems management functions
fared well in the surveys. A score of 3.0 is considered average on a scale from 1 to 5, and every
IT service rated only about average. Not a single IT service scored close to a high degree of
satisfaction, as shown in Exhibit 2. In fact, respondents consistently rated network monitoring,
security information management, and application performance/diagnostics as the least
satisfactory among the most critical services provided by IT. These traditionally functional areas
within IT are still managed with relatively independent tools, inhibiting the converged visibility
and control necessary for IT service management.



                    Directory services monitoring                         3.5

                          Compliance monitoring                            3.6

                                   IT service desk                        3.5

                     Network asset management                            3.4

                        Application performance                      3.2

                              Network monitoring                         3.4

               Security information management                        3.3

                                                     1           2   3           4     5



                                                     Exhibit 2
What is the degree of satisfaction with the current category of tools your organization employs to monitor
                  and maintain availability, performance, compliance and/or security?

Copyright 2009, Ogren Group                                                                                  Page 5
According to Ogren Group research, over forty percent of mid-tier survey respondents reported
that they are using more than 5 tools to manage the technical infrastructure, as shown in
Exhibit 3. This reflects the binding between management tools and the definition of IT functional
silos. An IT service management approach breaks these bindings while converging visibility and
control of the functional silos to focus on service to the business. IT teams in mid-tier
organizations are not satisfied that they presently have adequate network, system, application,
security and compliance management tools to efficiently satisfy business requirements.

.

                                    11-20 tools,          Too many tools,
                                       4.80%                  1.70%




                     6-10 tools,                                             1-5 tools,
                       32.90%                                                 59.20%




                                                   Exhibit 3
    Approximately how many tools does your company utilize to monitor, report and maintain availability,
                               performance, compliance and/or security?


The use of many functional management tools across the IT organization presents situations
where operational blind-spots and waste permeate, IT services cannot be efficiently sustained,
and hidden costs and business risk can grow. Key operational responsibilities for IT service
management that business constituents expect include:

         Monitor network and application performance: the organization relies on the predictable
         performance of networked applications where disruptions in application performance
         are instantly noticed by end-users. IT needs to have the tools to discover bottlenecks,
         anomalies and resource irregularities before end-users are affected.
         Maintain and improve service levels: identify and monitor components that support
         critical business services. IT should manage to service levels for operational response,
         infrastructure performance, cost controls, and enabling new business opportunities.



Copyright 2009, Ogren Group                                                                                Page 6
Assure appropriate infrastructure configurations: prevent drift in approved configuration
        settings, maintain a consistent enterprise-wide configuration management policy, and
        validate changes that are all essential in preventing performance degradation and
        service disruptions.
        Provide visibility into the IT infrastructure: reduce service downtime, degradation in
        system performance, security incidents, and service desk call volume by operating with
        increased visibility of the entire infrastructure. Heightened visibility into the IT
        infrastructure also allows IT to effectively demonstrate process improvements in
        reports to executives, lines of business, and team members.
        Enhance operational security: improve the means to identify, analyze, and resolve
        security incidents that adversely affect business performance. IT needs to efficiently
        filter operational noise, escalate pertinent security events, monitor compensating
        controls, and coordinate active responses.
        Enable user activity control: acceptable use policies are especially important in
        monitoring the activity of privileged users, administrators, outsourced consultants and
        service accounts. IT controls for enforcing acceptable use policies reduce the risk of
        abusive, inappropriate, unauthorized or accidental use of corporate resources.
        Report on governance and compliance processes: organizations of all sizes need to
        establish and monitor controls that align to standards and regulations, especially as
        defined by ITIL, ISO, and COBIT. Reporting against compliance posture for auditors and
        customers should be a comprehensive automated process to lower costs.




Copyright 2009, Ogren Group                                                                         Page 7
AccelOps All-in-One steps up IT service management

AccelOps All-in-One is a data center and IT service management solution for mid-tier
organizations that reduces the burden of juggling multiple management tools, while at the
same time breaks conventional IT management silos that hinder IT service reliability and
efficiency. AccelOps offers an integrated solution that correlates diverse operational data and
delivers out-of-the-box analytics making it easier for IT to perform critical functions such as
diagnosing application performance, improving response times from the IT service desk,
assessing systems assets, expediting root-cause analysis, baselining and mapping the
infrastructure, generating operational reports, fortifying governance and facilitating IT service
management. AccelOps All-in-One dovetails in the existing IT environment, rapidly improving
the ability to monitor, control, and manage the infrastructure from a service perspective
including rich functionality such as:

        Infrastructure discovery, baselining and mapping
        Change and configuration management (CMDB)
        Network behavior and virtualization analysis
        Availability and performance management
        Event log and security information management (SIM)
        Identity access and directory service monitoring
        Service definition and business service management (BSM)
        Extensible dashboards, reports, and rules aligned to best practices




                                                Exhibit 4
                              AccelOps Data Center and IT Service Management


Copyright 2009, Ogren Group                                                                         Page 8
AccelOps offers an automated data center and IT service management approach that enables
organizations to migrate from a component to a service-based management model, including
the critical functions highlighted in Exhibit 4. AccelOps All-in-One has focused its design
principles on those solution attributes that bring the most value to mid-tier IT:
        Reduces operating expenses: AccelOps IT service management solution saves time and
        energy for IT administration by centralizing operational data. IT easily finds the
        information it needs in one intuitive IT service management tool, effectively updates the
        network visibility and control situational analysis, and automatically performs repetitive
        monitoring and reporting tasks.
        Easily integrates into existing environments: The All-in-One system captures and
        manages configuration data, network flow data, as well as diverse application and user
        transaction data (including primary and secondary logins). The solution automatically
        understands the data coming from reporting sources and how to process and manage
        that data. AccelOps is deployed with support for the major system, network and
        application products, and the solution can be customized to support new data sources
        without requiring an entire AccelOps update.
        Improves response times: AccelOps’ user interface presents IT with an integrated view
        of the infrastructure, the most pertinent operational status, and the ability to drill-down
        to finer details. Administrators can readily drill down beneath service, business, and
        operational instrumentation to the details of who, what, when, where, and how for root
        cause analysis. The system ships with out-of-the-box reports, heuristics, rules, metrics,
        dashboards and reports that are easily extensible. The visibility and control provided by
        a common IT services management tool allow IT to rapidly respond to incidents and
        requests.
        Enables CMDB and IT service management: The AccelOps system discovers and
        baselines the infrastructure details from sources such as network flows, network
        devices, security, systems, applications, and directory services. The configurations and
        subsequent changes are all tracked within a complete change management database
        (CMDB). Since the system learns infrastructure to application relationships, the user is
        presented with an automated means to define a service. The user can easily set service
        levels on top of the monitored component attributes that are inherited by the defined
        service. The result jumpstarts IT service management, monitoring and measurement.

The AccelOps software product comes in two flavors – as a virtual appliance or as a Software as
a Service (SaaS) offering. This allows for immediate use and appliance-like integration, as well
as deployment flexibility and ability to scale throughout the mid-tier organization. The AccelOps
All-in-One solution for IT service management consolidates management tools and optimizes
the respective use of operational data. Companies may realize additional cost savings in
bandwidth, servers, power and storage by reducing duplication of operational data.




Copyright 2009, Ogren Group                                                                           Page 9
Conclusions

The plethora of IT management tools inhibits the ability of IT to move forward with IT service
management initiatives. Mid-tier businesses have been employing separate non-integrated
management tools for each function IT, including fault diagnosis, network and application
performance, asset management, security, and operational reporting. The perceived
satisfaction of these tools is illustrated in Exhibit 5, where respondents rated each of these
critical capabilities of an active IT team as average or worse. This inefficiency often results in
higher operating expenses, extended response times, on-going administrator training, and
costly service degradation and outages.



                     5

                     4

                     3                               3.1
                                  3.0                                   2.8
                     2

                     1
                            Monitor and         Modify IT     Produce details and
                         correlate a device,   component       reports satisfying
                             system or        availability to     operations
                          application fault improve business     requirements
                                                function


                                                 Exhibit 5
  Based on the tools currently utilized, rate on a scale of 1 (least) to 5 (best) how easy and quickly your
                      organization can satisfy these IT or business unit requests?


AccelOps brings to market a uniquely integrated IT service management solution that replaces
a wide variety of individual management tools, harnesses the value from operational data,
allows IT to be more efficient, enhances service reliability, and makes service management for
the mid-tier market tangible and possible. IT has greater flexibility to manage IT services from a
strategic perspective rather than a tactical functional perspective defined by traditional tools
and processes. By delivering the solution in a virtual appliance or Software as a Service
offering, AccelOps provides a choice of deployment methods that best integrate with the IT
environment. A subscription pricing model lowers initial costs and enables the organization to
adjust capacity as needed.

Effective management of the technical infrastructure is a critical core competency for IT. The
Ogren Group recommends that organizations re-examine their IT management processes and
tool sets and explore new approaches that make it significantly easier and less expensive to
operate their business with IT service management.

Copyright 2009, Ogren Group                                                                                   Page 10
The Ogren Group Special Report has been commissioned by AccelOps and is published for the sole use of Ogren Group clients. It
   may not be duplicated, reproduced, or transmitted in whole or in part without the express permission of the Ogren Group, 92
   Robert Road, Stow, MA 01775. For more information, contact the Ogren Group: info@ogrengroup.com. All rights reserved. All
   opinions and estimate herein constitute our judgment as of this date and are subject to change without notice.




Copyright 2009, Ogren Group                                                                                                    Page 11

Más contenido relacionado

La actualidad más candente

IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeLightwell
 
McAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive ReviewsMcAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive ReviewsSholeh Gregory
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Managementicomply
 
Linda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Redspin, Inc.
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System AdministrationLisa Dowdell, MSISTM
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringShiv Koppad
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Mapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityMapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityRedspin, Inc.
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseNetwrix Corporation
 
Products new maestro brochure
Products new maestro brochureProducts new maestro brochure
Products new maestro brochureRama Subramanian
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 

La actualidad más candente (19)

Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
 
McAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive ReviewsMcAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive Reviews
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
Linda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT Security
 
Unit V
Unit VUnit V
Unit V
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
ERP
ERPERP
ERP
 
IT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software EngineeringIT Asset Management System for UL-Software Engineering
IT Asset Management System for UL-Software Engineering
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Mapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityMapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information Security
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the Enterprise
 
Products new maestro brochure
Products new maestro brochureProducts new maestro brochure
Products new maestro brochure
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 

Destacado (16)

Enabling Healthcare Reform Using IT
Enabling Healthcare Reform Using ITEnabling Healthcare Reform Using IT
Enabling Healthcare Reform Using IT
 
Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008
 
EMR Yes- No
EMR Yes- NoEMR Yes- No
EMR Yes- No
 
2009 Databreach Report
2009 Databreach Report2009 Databreach Report
2009 Databreach Report
 
Medappz Thisa Isuite Presentation
Medappz Thisa Isuite PresentationMedappz Thisa Isuite Presentation
Medappz Thisa Isuite Presentation
 
10844 5415 The Value Of Corporate Secrets
10844 5415 The Value Of Corporate Secrets10844 5415 The Value Of Corporate Secrets
10844 5415 The Value Of Corporate Secrets
 
Accel Ops Brochure0609
Accel Ops Brochure0609Accel Ops Brochure0609
Accel Ops Brochure0609
 
Deepwater Horizon
Deepwater HorizonDeepwater Horizon
Deepwater Horizon
 
Cloud Computing Payback
Cloud Computing PaybackCloud Computing Payback
Cloud Computing Payback
 
Healthcare Data Security Update
Healthcare Data Security UpdateHealthcare Data Security Update
Healthcare Data Security Update
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
SourceFire IPS Overview
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS Overview
 
Patrick Notley1
Patrick Notley1Patrick Notley1
Patrick Notley1
 
Forrester Healthcare
Forrester HealthcareForrester Healthcare
Forrester Healthcare
 
HITECH Modifications to HIPAA
HITECH Modifications to HIPAAHITECH Modifications to HIPAA
HITECH Modifications to HIPAA
 
HIPAA Regs
HIPAA RegsHIPAA Regs
HIPAA Regs
 

Similar a Og Disparate It Mgmt Tool Impact Report

Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docxcurwenmichaela
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefVisal Thach
 
It asset management_wp
It asset management_wpIt asset management_wp
It asset management_wpwardell henley
 
3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized FirmsReadyTalk
 
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEMAbuSyeedRaihan
 
Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfaotmp2600
 
Business Plan: ITfit
Business Plan: ITfitBusiness Plan: ITfit
Business Plan: ITfitTemi Vasco
 
Ipm executive-summary-vi-federal
Ipm executive-summary-vi-federalIpm executive-summary-vi-federal
Ipm executive-summary-vi-federalJohn McDonald
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersEMC
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 
Application Rationalization Paper 092308 Doc Version
Application Rationalization Paper 092308 Doc VersionApplication Rationalization Paper 092308 Doc Version
Application Rationalization Paper 092308 Doc VersionCarolyn Reid
 
IT Infrastructure Management in Insurance: Get Better at IT Infrastructure Ma...
IT Infrastructure Management in Insurance: Get Better at IT Infrastructure Ma...IT Infrastructure Management in Insurance: Get Better at IT Infrastructure Ma...
IT Infrastructure Management in Insurance: Get Better at IT Infrastructure Ma...AutomationEdge Technologies
 
The need for it infrastructure management services
The need for it infrastructure management servicesThe need for it infrastructure management services
The need for it infrastructure management servicesnebula12_23
 
Discovery: The Backbone of Digital Enterprise Management
Discovery:  The Backbone of Digital Enterprise ManagementDiscovery:  The Backbone of Digital Enterprise Management
Discovery: The Backbone of Digital Enterprise ManagementMichelle Kerby
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudVISI
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsEnterprise Management Associates
 
IT Infrastructure Management | Defination, Objectives & Strategies
IT Infrastructure Management | Defination, Objectives & StrategiesIT Infrastructure Management | Defination, Objectives & Strategies
IT Infrastructure Management | Defination, Objectives & StrategiesGrapesTech Solutions
 

Similar a Og Disparate It Mgmt Tool Impact Report (20)

Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
It asset management_wp
It asset management_wpIt asset management_wp
It asset management_wp
 
3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms
 
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
 
Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdf
 
Business Plan: ITfit
Business Plan: ITfitBusiness Plan: ITfit
Business Plan: ITfit
 
Ipm executive-summary-vi-federal
Ipm executive-summary-vi-federalIpm executive-summary-vi-federal
Ipm executive-summary-vi-federal
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Application Rationalization Paper 092308 Doc Version
Application Rationalization Paper 092308 Doc VersionApplication Rationalization Paper 092308 Doc Version
Application Rationalization Paper 092308 Doc Version
 
IT Infrastructure Management in Insurance: Get Better at IT Infrastructure Ma...
IT Infrastructure Management in Insurance: Get Better at IT Infrastructure Ma...IT Infrastructure Management in Insurance: Get Better at IT Infrastructure Ma...
IT Infrastructure Management in Insurance: Get Better at IT Infrastructure Ma...
 
The need for it infrastructure management services
The need for it infrastructure management servicesThe need for it infrastructure management services
The need for it infrastructure management services
 
Discovery: The Backbone of Digital Enterprise Management
Discovery:  The Backbone of Digital Enterprise ManagementDiscovery:  The Backbone of Digital Enterprise Management
Discovery: The Backbone of Digital Enterprise Management
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the Cloud
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
 
IT Infrastructure Management | Defination, Objectives & Strategies
IT Infrastructure Management | Defination, Objectives & StrategiesIT Infrastructure Management | Defination, Objectives & Strategies
IT Infrastructure Management | Defination, Objectives & Strategies
 

Más de GuardEra Access Solutions, Inc. (14)

Awarenesstechnologies Intro Document
Awarenesstechnologies Intro DocumentAwarenesstechnologies Intro Document
Awarenesstechnologies Intro Document
 
Mx Pb En 100929
Mx Pb En 100929Mx Pb En 100929
Mx Pb En 100929
 
Rp 2010 data-breach-report-en_xg
Rp 2010 data-breach-report-en_xgRp 2010 data-breach-report-en_xg
Rp 2010 data-breach-report-en_xg
 
2010 New Guidelines Hipaa Checklist V1
2010 New Guidelines Hipaa Checklist V12010 New Guidelines Hipaa Checklist V1
2010 New Guidelines Hipaa Checklist V1
 
2010 Hipaa Rules 011310
2010 Hipaa Rules 0113102010 Hipaa Rules 011310
2010 Hipaa Rules 011310
 
HITECH Act
HITECH ActHITECH Act
HITECH Act
 
Closing the Clinical IT Chasm
Closing the Clinical IT ChasmClosing the Clinical IT Chasm
Closing the Clinical IT Chasm
 
Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
 
Mini IT Security Assessment
Mini IT Security AssessmentMini IT Security Assessment
Mini IT Security Assessment
 
Thisa Lite Message
Thisa Lite MessageThisa Lite Message
Thisa Lite Message
 
Thisa Customer Presentation Ga
Thisa Customer Presentation GaThisa Customer Presentation Ga
Thisa Customer Presentation Ga
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)
 
Odyssey EMR
Odyssey EMROdyssey EMR
Odyssey EMR
 
Computer Crime Costly
Computer Crime CostlyComputer Crime Costly
Computer Crime Costly
 

Og Disparate It Mgmt Tool Impact Report

  • 1. The Impact of Disparate Tools on the State of IT Service Management in Mid-tier Organizations An Ogren Group Special Report March 2009
  • 2. Introduction IT service management aligns information technology processes, controls, and priorities to meet business demands while delivering greater cost savings, reducing risks of service disruptions, and supporting business expansion. The concept of IT being run as a service, as opposed to functional network, systems and application silos, has gained significant adoption in many organizations. Leading IT standards such as ITIL, ISO and COBIT all embrace the concept of IT service management to effectively integrate IT with the business. CIO’s, IT executives, and data center directors within mid-tier organizations are seeking to take advantage of IT service management to improve service responsiveness and drive down operational costs. Unfortunately, real progress towards IT service management and its respective benefits often eludes mid-tier IT organizations. The company’s infrastructure has grown, but the IT organization has very limited means for integrated oversight or service-oriented control to manage the growth in complexity. The common approach is to develop departmental teams More than 40% of mid-tier businesses specializing in network, systems, and employ more than 6 tools to manage applications management, but without their networks. complete visibility of the business process to optimize support of the organization. These organizations have solidified the functional silos by amassing tools to assist in managing the infrastructure from a component rather than a service perspective resulting in inefficiencies, increased license and operational costs, and business risks. The Ogren Group obtained feedback from 179 North American data center directors and IT professionals within the mid-tier market regarding their level of confidence with the tools they have in place to support IT service management. Only 17% of those surveyed felt very confident in the tools they use to monitor and optimize network and application availability, performance, compliance, and security, as shown in Exhibit 1. Mid-tier IT organizations, defined as having between 250 and 5000 employees, are not confident they have adequate systems and network management tools to address the reliability requirements, performance improvements and cost-saving expectations of the business. For many, the situation is worsening as IT budgets and headcounts are being trimmed while corporate systems, applications, access, security and network complexity is increasing. Copyright 2009, Ogren Group Page 2
  • 3. Very Not very confident, confident, 17.20% 19.50% Somewhat confident, 62.0% Exhibit 1 Do you feel that you or your organization has adequate tools in place to monitor and optimize network/application availability, performance, compliance, and security? This presents an underlying crisis as mid-tier organizations are facing challenging service response expectations with management tools they have little confidence in and with flat or shrinking budget allocations. While these organizations are adopting cost-saving technologies such as virtualization in the data center, distributed and mobile access, outsourced services and cloud-oriented application services, they are constrained by the lack of integrated infrastructure and service management capacity. Mid-tier businesses require tools that focus on correlating broad operational data, applying analytics, automating critical IT management functions, and facilitating service level monitoring. A holistic service management approach allows IT to move forward with new technologies and business initiatives while reducing operations expenses, lowering risks and improving service performance. More integrated management capability requires an optimized means to capture, correlate and manage operational data, while at the same time consolidate core IT management functions and streamline service definition. The result would allow IT to more effectively maintain real- time and historic visibility of infrastructure performance, control over the infrastructure’s technical elements, and deliver against service levels to better serve the business. A single operational “pane of glass” solution, specifically architected for the requirements of mid-tier organizations, permits IT to confidently automate valued functions including: Diagnose problems and security issues: IT delivers services with predictable response, availability, security, and user experience. Relying upon multiple system and network management tools makes it difficult to analyze and correct disruptions in network, system, application, or security performance in a timely manner. This is especially the Copyright 2009, Ogren Group Page 3
  • 4. case when performing root-cause analysis on network, system and storage virtualization technologies. Control infrastructure configurations ensure reliability, consistency, and performance: the greatest causes of instability in the network, application performance, and security are configuration settings that are outdated, inadvertently changed, not following industry best practices, or are inconsistent across network devices and systems. A common configuration validation solution allows IT to more confidently control network resources and assure optimal business performance. Organizations need to both validate a change, as well as readily see the affect of a change. Streamline compliance and governance processes: audit requirements to demonstrate compliance with standards and regulations such as COBIT, GLBA, HIPAA, and PCI often require merging controls and consolidating reports from multiple sources - an expensive and time consuming effort. A broader and more automated approach reduces audit costs and enables IT resources to focus on more directly beneficial business activities. Monitor operational service levels: baseline and correlate their infrastructure components with associated applications in order to establish and monitor an IT service. Automating this process across both physical and virtual environments dramatically enables IT to prioritize incident response, reduce downtime business impact, and measure IT service improvement. This Ogren Group Special Report, commissioned by AccelOps, illustrates the challenges faced by mid-tier IT organizations and the problems with employing disparate IT management solutions. The report also assesses a more integrated approach that expedites mid-tier organizations’ ability to achieve and improve IT service management. Copyright 2009, Ogren Group Page 4
  • 5. The problems with current IT management tool portfolios Mid-tier companies are investing in managing components of the technical infrastructure – the network, systems, applications, users, as well as access, changes and trends. Unfortunately, the tools employed do not provide the situational awareness, baseline or oversight needed to enhance service reliability, performance and security for the business. Approximately 82 percent of respondents to the AccelOps survey issued by the Ogren Group, reported that they are not very confident that they have adequate tools in place to monitor and optimize network and application availability, performance, compliance, and security. This 82% of those surveyed are not very is a critical shortcoming in IT’s arsenal to confident that they have adequate tools deliver timely and cost-effective services to in place for IT service management. the business. Mid-tier companies do not have extensive budgets and resources, yet the expectations for delivering IT services to the company are perhaps more important to the success of the business than ever before. According to Ogren Group research, none of the network and systems management functions fared well in the surveys. A score of 3.0 is considered average on a scale from 1 to 5, and every IT service rated only about average. Not a single IT service scored close to a high degree of satisfaction, as shown in Exhibit 2. In fact, respondents consistently rated network monitoring, security information management, and application performance/diagnostics as the least satisfactory among the most critical services provided by IT. These traditionally functional areas within IT are still managed with relatively independent tools, inhibiting the converged visibility and control necessary for IT service management. Directory services monitoring 3.5 Compliance monitoring 3.6 IT service desk 3.5 Network asset management 3.4 Application performance 3.2 Network monitoring 3.4 Security information management 3.3 1 2 3 4 5 Exhibit 2 What is the degree of satisfaction with the current category of tools your organization employs to monitor and maintain availability, performance, compliance and/or security? Copyright 2009, Ogren Group Page 5
  • 6. According to Ogren Group research, over forty percent of mid-tier survey respondents reported that they are using more than 5 tools to manage the technical infrastructure, as shown in Exhibit 3. This reflects the binding between management tools and the definition of IT functional silos. An IT service management approach breaks these bindings while converging visibility and control of the functional silos to focus on service to the business. IT teams in mid-tier organizations are not satisfied that they presently have adequate network, system, application, security and compliance management tools to efficiently satisfy business requirements. . 11-20 tools, Too many tools, 4.80% 1.70% 6-10 tools, 1-5 tools, 32.90% 59.20% Exhibit 3 Approximately how many tools does your company utilize to monitor, report and maintain availability, performance, compliance and/or security? The use of many functional management tools across the IT organization presents situations where operational blind-spots and waste permeate, IT services cannot be efficiently sustained, and hidden costs and business risk can grow. Key operational responsibilities for IT service management that business constituents expect include: Monitor network and application performance: the organization relies on the predictable performance of networked applications where disruptions in application performance are instantly noticed by end-users. IT needs to have the tools to discover bottlenecks, anomalies and resource irregularities before end-users are affected. Maintain and improve service levels: identify and monitor components that support critical business services. IT should manage to service levels for operational response, infrastructure performance, cost controls, and enabling new business opportunities. Copyright 2009, Ogren Group Page 6
  • 7. Assure appropriate infrastructure configurations: prevent drift in approved configuration settings, maintain a consistent enterprise-wide configuration management policy, and validate changes that are all essential in preventing performance degradation and service disruptions. Provide visibility into the IT infrastructure: reduce service downtime, degradation in system performance, security incidents, and service desk call volume by operating with increased visibility of the entire infrastructure. Heightened visibility into the IT infrastructure also allows IT to effectively demonstrate process improvements in reports to executives, lines of business, and team members. Enhance operational security: improve the means to identify, analyze, and resolve security incidents that adversely affect business performance. IT needs to efficiently filter operational noise, escalate pertinent security events, monitor compensating controls, and coordinate active responses. Enable user activity control: acceptable use policies are especially important in monitoring the activity of privileged users, administrators, outsourced consultants and service accounts. IT controls for enforcing acceptable use policies reduce the risk of abusive, inappropriate, unauthorized or accidental use of corporate resources. Report on governance and compliance processes: organizations of all sizes need to establish and monitor controls that align to standards and regulations, especially as defined by ITIL, ISO, and COBIT. Reporting against compliance posture for auditors and customers should be a comprehensive automated process to lower costs. Copyright 2009, Ogren Group Page 7
  • 8. AccelOps All-in-One steps up IT service management AccelOps All-in-One is a data center and IT service management solution for mid-tier organizations that reduces the burden of juggling multiple management tools, while at the same time breaks conventional IT management silos that hinder IT service reliability and efficiency. AccelOps offers an integrated solution that correlates diverse operational data and delivers out-of-the-box analytics making it easier for IT to perform critical functions such as diagnosing application performance, improving response times from the IT service desk, assessing systems assets, expediting root-cause analysis, baselining and mapping the infrastructure, generating operational reports, fortifying governance and facilitating IT service management. AccelOps All-in-One dovetails in the existing IT environment, rapidly improving the ability to monitor, control, and manage the infrastructure from a service perspective including rich functionality such as: Infrastructure discovery, baselining and mapping Change and configuration management (CMDB) Network behavior and virtualization analysis Availability and performance management Event log and security information management (SIM) Identity access and directory service monitoring Service definition and business service management (BSM) Extensible dashboards, reports, and rules aligned to best practices Exhibit 4 AccelOps Data Center and IT Service Management Copyright 2009, Ogren Group Page 8
  • 9. AccelOps offers an automated data center and IT service management approach that enables organizations to migrate from a component to a service-based management model, including the critical functions highlighted in Exhibit 4. AccelOps All-in-One has focused its design principles on those solution attributes that bring the most value to mid-tier IT: Reduces operating expenses: AccelOps IT service management solution saves time and energy for IT administration by centralizing operational data. IT easily finds the information it needs in one intuitive IT service management tool, effectively updates the network visibility and control situational analysis, and automatically performs repetitive monitoring and reporting tasks. Easily integrates into existing environments: The All-in-One system captures and manages configuration data, network flow data, as well as diverse application and user transaction data (including primary and secondary logins). The solution automatically understands the data coming from reporting sources and how to process and manage that data. AccelOps is deployed with support for the major system, network and application products, and the solution can be customized to support new data sources without requiring an entire AccelOps update. Improves response times: AccelOps’ user interface presents IT with an integrated view of the infrastructure, the most pertinent operational status, and the ability to drill-down to finer details. Administrators can readily drill down beneath service, business, and operational instrumentation to the details of who, what, when, where, and how for root cause analysis. The system ships with out-of-the-box reports, heuristics, rules, metrics, dashboards and reports that are easily extensible. The visibility and control provided by a common IT services management tool allow IT to rapidly respond to incidents and requests. Enables CMDB and IT service management: The AccelOps system discovers and baselines the infrastructure details from sources such as network flows, network devices, security, systems, applications, and directory services. The configurations and subsequent changes are all tracked within a complete change management database (CMDB). Since the system learns infrastructure to application relationships, the user is presented with an automated means to define a service. The user can easily set service levels on top of the monitored component attributes that are inherited by the defined service. The result jumpstarts IT service management, monitoring and measurement. The AccelOps software product comes in two flavors – as a virtual appliance or as a Software as a Service (SaaS) offering. This allows for immediate use and appliance-like integration, as well as deployment flexibility and ability to scale throughout the mid-tier organization. The AccelOps All-in-One solution for IT service management consolidates management tools and optimizes the respective use of operational data. Companies may realize additional cost savings in bandwidth, servers, power and storage by reducing duplication of operational data. Copyright 2009, Ogren Group Page 9
  • 10. Conclusions The plethora of IT management tools inhibits the ability of IT to move forward with IT service management initiatives. Mid-tier businesses have been employing separate non-integrated management tools for each function IT, including fault diagnosis, network and application performance, asset management, security, and operational reporting. The perceived satisfaction of these tools is illustrated in Exhibit 5, where respondents rated each of these critical capabilities of an active IT team as average or worse. This inefficiency often results in higher operating expenses, extended response times, on-going administrator training, and costly service degradation and outages. 5 4 3 3.1 3.0 2.8 2 1 Monitor and Modify IT Produce details and correlate a device, component reports satisfying system or availability to operations application fault improve business requirements function Exhibit 5 Based on the tools currently utilized, rate on a scale of 1 (least) to 5 (best) how easy and quickly your organization can satisfy these IT or business unit requests? AccelOps brings to market a uniquely integrated IT service management solution that replaces a wide variety of individual management tools, harnesses the value from operational data, allows IT to be more efficient, enhances service reliability, and makes service management for the mid-tier market tangible and possible. IT has greater flexibility to manage IT services from a strategic perspective rather than a tactical functional perspective defined by traditional tools and processes. By delivering the solution in a virtual appliance or Software as a Service offering, AccelOps provides a choice of deployment methods that best integrate with the IT environment. A subscription pricing model lowers initial costs and enables the organization to adjust capacity as needed. Effective management of the technical infrastructure is a critical core competency for IT. The Ogren Group recommends that organizations re-examine their IT management processes and tool sets and explore new approaches that make it significantly easier and less expensive to operate their business with IT service management. Copyright 2009, Ogren Group Page 10
  • 11. The Ogren Group Special Report has been commissioned by AccelOps and is published for the sole use of Ogren Group clients. It may not be duplicated, reproduced, or transmitted in whole or in part without the express permission of the Ogren Group, 92 Robert Road, Stow, MA 01775. For more information, contact the Ogren Group: info@ogrengroup.com. All rights reserved. All opinions and estimate herein constitute our judgment as of this date and are subject to change without notice. Copyright 2009, Ogren Group Page 11