The Future of ITSM: How Are Roles (and Rules) Changing? Part 2
July 08, 2015

Dennis Drogseth
EMA

Share this

Both the “rules” and the “roles” governing IT Service Management (ITSM) are evolving to support a far-broader need for inclusiveness across IT, and between IT and its service consumers. Recent EMA research, What Is the Future of IT Service Management? (March 2015), exposed a number of shifting trends that might surprise many in the industry.

Start with Part 1 of this blog

Research highlights show the following trends in rules and roles:

■ Cloud continues to be a game changer. ITSM teams are playing a more dynamic and service-aware role in managing cloud investments through a growing focus on such things as higher levels of automation and more attention to DevOps. ITSM teams are also integrating cloud services into their service catalogs — with SaaS (internal cloud) services, IaaS (internal cloud) services, and SaaS and IaaS services in public cloud tied for third.

■ The move to support enterprise services is also changing ITSM rules and roles. Only 89% of respondents had plans to consolidate IT and non-IT customer service — up from just two years ago when only 75% had plans to consolidate.

■ Mobility is seriously changing the ITSM game — in terms of both improved IT efficiencies and end-user outreach. 85% of our respondents had mobile support for end users, often across heterogeneous environments (tablets, iPhones, and Android phones, as examples). And 50% allowed end users to make ITSM-related service requests via these devices, making ITSM teams, and IT as a whole, considerably more consumer-friendly.

■ In parallel, the demand for more unified and effective endpoint management is expanding the requirements for role-based expertise. The leading requirements/skills here include capturing software usage, software license management, software distribution, operating system deployment, and patch management — across a fully heterogeneous set of endpoint options.

We also looked at success rates in an attempt to understand the chemistry of the most successful ITSM teams. To do this, we contrasted the 18% of respondents who viewed their ITSM initiative as “extremely successful” with the 12% who felt they were only “somewhat successful” or were “largely unsuccessful”. Those who were “extremely successful” were also:

■ Four times more likely to have integrated their IT and non-IT service desks

■ Twice as likely to have a CMDB/CMS-related technology deployed

■ Dramatically more likely to support cloud in service catalogs

■ Twice as likely to be leveraging mobile for ITSM professionals

■ Nearly four times more likely to offer service consumers mobile support for ITSM-related actions

■ Twice as likely to offer users access to corporate applications through mobile

■ More than twice as likely to be slated for growth

Overall, the news seems encouraging for ITSM teams willing to reach out and embrace a growing set of technologies and responsibilities. This means being ready to support new roles and expertise, while promoting more informed dialog, both between enterprise end-users and the service desk and between ITSM teams and the rest of IT — including operations and development. The news is probably not so good for the fainthearted seeking to cling to traditional ways of working in an “ITSM silo.” In other words, both the need and the opportunity for ITSM leadership awaits you — and our data suggests that the time to engage is now.

Dennis Drogseth is VP at Enterprise Management Associates (EMA)
Share this

The Latest

August 21, 2018

High availability's (HA) primary objective has historically been focused on ensuring continuous operations and performance. HA was built on a foundation of redundancy and failover technologies and methodologies to ensure business continuity in the event of workload spikes, planned maintenance, and unplanned downtime. Today, HA methodologies have been superseded by intelligent workload routing automation (i.e., intelligent availability), in that data and their processing are consistently directed to the proper place at the right time ...

August 20, 2018

You need insight to maximize performance — not inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Steps 5 through 10 will help you maximize the performance of your applications and underlying network infrastructure ...

August 17, 2018

As a Network Operations professional, you know how hard it is to ensure optimal network performance when you’re unsure of how end-user devices, application code, and infrastructure affect performance. Identifying your important applications and prioritizing their performance is more difficult than ever, especially when much of an organization’s web-based traffic appears the same to the network. You need insight to maximize performance — not inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. But you can stay ahead. Follow these 10 steps to maximize the performance of your applications and underlying network infrastructure ...

August 16, 2018

IT organizations are constantly trying to optimize operations and troubleshooting activities and for good reason. Let's look at one example for the medical industry. Networked applications, such as electronic medical records (EMR), are vital for hospitals to provide outstanding service to their patients and physicians. However, a networking team can often not be aware of slow response times on the remotely hosted EMR application until a physician or someone else calls in to complain ...

August 15, 2018

In 2014, AWS Lambda introduced serverless architecture. Since then, many other cloud providers have developed serverless options. What’s behind this rapid growth? ...

August 14, 2018

This question is really two questions. The first would be: What's really going on in terms of a confusion of terms? — as we wrestle with AIOps, IT Operational Analytics, big data, AI bots, machine learning, and more generically stated "AI platforms" (… and the list is far from complete). The second might be phrased as: What's really going on in terms of real-world advanced IT analytics deployments — where are they succeeding, and where are they not? This blog will look at both questions as a way of introducing EMA's newest research with data ...

August 13, 2018

Consumers will now trade app convenience for security, according to a study commissioned by F5 Networks, The Curve of Convenience – The Trade-Off between Security and Convenience ...

August 10, 2018

Gartner unveiled the CX Pyramid, a new methodology to test organizations’ customer journeys and forge more powerful experiences that deliver greater customer loyalty and brand advocacy ...

August 09, 2018

Nearly half (48 percent) of consumers report that they currently use, or have used in the past, services of organizations that were involved in a publicly disclosed data breach and, of those, 48 percent have stopped using the services of an organization because of a breach, according to Global State of Digital Trust Survey and Index 2018, a new report from CA Technologies ...

August 08, 2018

Here's the problem: IT teams are in the dark. The only information they have available to them is based on what users decide to tell them about through calls to the help desk ...