ITIL Service Operations

November 1, 2017 | Views: 3296

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

ITIL: Information Technology Infrastructure Library

  • ITIL is a public framework that describes best
    practices in the IT service management.
  • The concept emerged in 80’s by the British
    government OGC (office of government
    commerce).
  • In 2007 version 3 is published.
  • 5 Life cycles phases with 26 processes and 4
    functions.

SERVICE MANAGEMENT, SERVICE, AND VALUE

  • Service management:- A set of specialized organizational
    capabilities for providing value to customers in the form of
    services.
  • Service: -A means of delivering value to customers by
    facilitating outcomes the customers want to achieve without
    the ownership of specific costs or risks.
  • Value:- Value is the core of the service concept.
    Value= Utility + Warranty
    Utility= Fit for purpose
    Warranty= Fit for Use

SERVICE OPERATION

  • The Service Operation lifecycle phase is primarily focused on the
    management of IT Services that ensure effectiveness and efficiency in
    delivery and support.
  • It is subjected to Continual Service Improvement and ultimately the
    delivery of service excellence.

SERVICE OPERATION: PRINCIPLES

  • The internal IT View versus the external business view.
  • Ongoing stability versus responsiveness.
  • Quality Improvement versus cost to deliver the services
  • Reactive working versus proactive working
  • The themes of Reactivity, Proactivity, and control are all important.

SERVICE OPERATION: AGENDA

  1. Key Principles of Operation
  2. Operational activities
  3. Processes
  4. Incident Management
  5. Problem Management
  6. Request Fulfillment
  7. Event Management
  8. Access Management
  9. Functions
  10. Service Desk
  11. Technical Management
  12. Application Management
  13. Operations Management

INCIDENT MANAGEMENT

  • Deals with Unplanned interruptions to IT services or Reduction in their quality.
  • Failure of a configuration item that has not impacted services is also an incident (E.g. Disk in RAID failure)
  • Reported by: -Users -Technical Staff -Monitoring Tools
  • An Incident is something that is broken that need to fixed.
  • Less number of Incidents is equal to Good Quality of service.

Examples:

1. The user is not able to connect to the mail server.

2.Not Able to Login to the system.

3.Not able to login to the Citrix.

4.Hardware Problem

5.Not able to access the internet.

6.VoIP is not working.

PROBLEM MANAGEMENT

  • Aims to prevent problems and resulting incidents.
  • Minimizes and Eliminates recurring incidents.
  • Identifies the root cause of incidents and determining resolutions.
  • It helps to resolve any problem that are caused by faults during the Release and Deployment process.
  • Fixing it so it cannot happen.
  • It enables the organization to provide better Quality of services to its customers.

REQUEST FULFILLMENT

  • Request Fulfillment is dealing with the requests which are raised from the end users
  • The handling of service request that can and should be planned.
  • Requests are not incidents in that incidents are not generally planned where the requests can and should be planned for.

EVENT MANAGEMENT

  • An event is that any change in state that has significance for the management of a configuration item or service.
  • Effective Service Operation is dependent upon knowing the status of the infrastructure and detecting any deviation from Expected or normal Operations.

SUMMARY

  • From a customer viewpoint, Service Operation is where the value is seen
  • Effective operations will increase returns of investment
  • It enables the business and customers to add value from the service they are receiving by reducing downtime
  • Enable users to improve their productivity or the quality of business services and product by providing quick and effective access to standard services
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
1 Comment
  1. Nice piece

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel