Implementing a CMDB. The Top 5 Lessons Learnt, 3 years after Implementation. Process Team. Configuration Management. Configuration CMDB CMDB
|
|
- Aleesha Simmons
- 5 years ago
- Views:
Transcription
1 Process Team Configuration Configuration Management Management CMDB CMDB Implementing a CMDB The Top 5 Lessons Learnt, 3 years after Implementation Author: Author: Date: Date: Harvey Davison Harvey Davison March 2008 March 2008
2 01. Configuration Different Data Sets & Interfaces View Cost View Workflow Events Events Incidents Problems Incidents Changes Problems Changes Cost Cost Owners Owners Vendors Vendors Budget Budget Availability Availability s s Hours Contacts Hours Approvers Contacts Approvers Contracts Contracts Maintenance Maintenance Support Licence Support Licence Common Common Data Data Server Cabinet Cabinet Plan Plan Specifications Specifications CPU Memory CPU Memory Disk Disk Settings Settings IP Address IP Domain Address Domain Locations Locations Cabinets Cabinets Environment Environment Air Conditioning Air Power Conditioning Power Floor Floor Plan Plan N View () View (Physical)
3 02. Lesson Learnt #1 1. Define your Objective vs. Cost
4 03. Requirements - ITIL Guidelines for Change Management ITIL Process Objectives Managing Managing co-ordinating co-ordinating Change Change implementation implementation impact, impact, cost, cost, benefit benefit risk risk of of proposed proposed s s Developing Developing business business justification justification obtaining obtaining Approval Approval
5 04. Requirements - Breakdown Discrete Activities ITIL Process Objectives Process Activity Managing Managing co-ordinating co-ordinating Change Change implementation implementation conflicts conflicts Hours Hours impact, impact, cost, cost, benefit benefit risk risk of of proposed proposed s s impact impact Technical Technical approach approach Developing Developing business business justification justification obtaining obtaining Approval Approval Approve Approve
6 05. Requirements - Define Required Capabilities ITIL Objectives Process Activity Required Capability Managing Managing co-ordinating co-ordinating Change Change implementation implementation conflicts conflicts Identify Change Conflicts 1 Hours Hours Identify Hours 1 impact, impact, cost, cost, benefit benefit risk risk of of proposed proposed s s impact impact Identify ors ½ Technical Technical approach approach Identify Technical ors ½ Developing Developing business business justification justification obtaining obtaining Approval Approval Approve Approve Identify Change Approvers 0
7 06. Lesson Learnt #2 2. Define your Cusmers & Requirements ITIL ITIL Reqs Reqs Cusmers Cusmers 1. Define your Objective vs. Cost
8 07. Prioritise Scope - Item Type Type Servers (Directly Aligned) Servers (Non-Directly Aligned) Simpler Infrastructure (e.g. Srage) Complex Infrastructure (e.g. Network)
9 08. Prioritise Scope - Item Role Type Servers (Directly Aligned) Servers (Non-Directly Aligned) Simpler Infrastructure (e.g. Srage) Complex Infrastructure (e.g. Network) Role In Scope Maybe in Scope? Maybe out of Scope Production Test Development
10 09. Prioritise Scope - Item Status Type Servers (Directly Aligned) Servers (Non-Directly Aligned) Simpler Infrastructure (e.g. Srage) Complex Infrastructure (e.g. Network) Role In Scope Maybe in Scope? Maybe out of Scope Production Test Development Status Maybe in Scope? In Scope Maybe in Scope? Maybe out of Scope? Proposed Proposed Implementation Implementation Active Active Inactive Inactive Redundant Redundant Decommissioned Decommissioned
11 10. Scope Start Simple & Add Complexity Later Cost Cost Management Management Scope Scope Production Management Management Scope Scope Role Test Post-Active Development Active Pre-Active Status Networks Srage Servers Type
12 11. Lesson Learnt #3 2. Define your Cusmers & Requirements 3. Manage your Scope ITIL ITIL Reqs Reqs Cusmers Cusmers 1. Define your Objective vs. Cost
13 12. Structure - Using Hierarchy show Risk Internet Internet Mortgage Mortgage? Internet Internet Website Website Cusmer Cusmer Mortgage Mortgage Administration Administration Virtual Virtual Server B Server B Physical Unix Server 1 Unix Server 1 Windows Windows Server 3 Server 3
14 13. Attributes Identify Change Approvers example ITIL Process Objectives Process Activity Required Capability Managing Managing co-ordinating co-ordinating Change Change implementation implementation conflicts conflicts Identify Change Conflicts Hours Hours Identify Hours impact, impact, cost, cost, benefit benefit risk risk of of proposed proposed s s impact impact Technical Technical approach approach Identify ors Identify Technical ors Developing Developing business business justification justification obtaining obtaining Approval Approval Approve Approve Identify Change Approvers
15 14. Attributes - Applying Input / Output Test Input - Known Data Data Output - Required Data CMDB Approval based on Item Approver { Manager} Approver {Application Support Mgr} Name Appserver123 Barcode Serial no. LTSB12345 XYZ45678 Physical Physical Approver {Infrastructure Support} Mgr Remote Control ID Endpoint15.c.31a Change Mgt Ref Data Approval based on Task Task Type Maintain Cryp-keys Change Task List Change Task List Approver {Task Owner}
16 15. Lesson Learnt #4 2. Define your Cusmers & Requirements 3. Manage your Scope ITIL ITIL Reqs Reqs Cusmers Cusmers 1. Define your Objective vs. Cost 4. Design your Data Model
17 16. Process Identifying Your Definitive Data Cusmer Cusmer Physical
18 17. Process Identifying Your Definitive Data Item Detail SLA SLA Design Design Cusmer Cusmer Invenry Invenry Scan Scan Tool Tool Data Data Centre Centre Invenry Invenry Physical
19 18. Process Identifying Your Definitive Data Item Detail Item Status SLA SLA Manager Design Design Manager Cusmer Cusmer Invenry Invenry Scan Scan Tool Tool Manager Data Data Centre Centre Invenry Invenry Data Centre Manager Physical
20 19. Process Identifying Your Definitive Data Item Detail Item Status Relationships SLA SLA Manager Manager Design Design Manager Cusmer Cusmer Invenry Invenry Scan Scan Tool Tool Manager Application Application Scan Scan Tool Tool Manager Data Data Centre Centre Invenry Invenry Data Centre Manager Design Design Support Tech Physical
21 20. Process Design Best Way from A B Item Detail Item Status Relationships Manager Manager Manager Manager Manager Manager Cusmer Cusmer s Mgt Scan Scan Manager Support Tech Hardware Release Invenry Invenry Manager Physical
22 21. Lessons Learnt 2. Define your Cusmers & Requirements 3. Manage your Scope ITIL ITIL Reqs Reqs Cusmers Cusmers 1. Define your Objective Process Dependency Source Source vs. Cost 5. Define your Process 4. Design your Data Model
Bringing Service Awareness To Data Centres
Bringing Service Awareness To Data Centres Contents: How can Service Asset, Configuration & Knowledge Management Help? November 2008 Who am I Who are my Customers & what do they want? What s important
More informationDetermining Best Fit for ITIL Implementation
Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationHARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL
HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL User Guide Name Amendment Version Reviewed by. Approved by. Lisa Whimperley Initial document Peter Kane Peter Kane creation. 31/10/2017 The Hartree Centre
More informationServiceNow Release Notes
ServiceNow Release Notes Release Number: RLSE0010066 - SN 1.1 Release Date: 2/20/14 Feature Category: Change FETR0010642 Improve integration between Change Management module and Configuration Management
More informationChapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC
Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post
More informationITIL Service Lifecycle Strategy
ITIL Service Lifecycle Strategy Course Details Course Code: Duration: Notes: ITILSL-Str 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity
More informationSaving the Project Brief document under its own name
HOW TO USE THIS TEMPLATE: Introduction The template reflects the steps set out in the PRINCE2 Method and is designed to prompt the Project Manager and help in the creation of the. The information for the
More informationAutomating for Agility in the Data Center. Purnima Padmanabhan Jeff Evans BMC Software
Automating for Agility in the Data Center Purnima Padmanabhan Jeff Evans BMC Software 9/5/2006 Agenda The Situation Challenges Objectives BMC Solution for Data Center Closed-Loop Change Data Center Optimization
More informationIT risks and controls
Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2018 Agenda I IT GOVERNANCE IT evolution, objectives, roles
More informationConfiguration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity?
ITIL Foundation mock exam 3 1. Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity? A) The Asset Register B) The Service Knowledge
More informationBest Practices for Managing Data Centres
Best Practices for Managing Data Centres David Cuthbertson Square Mile Systems david.cuthbertson@squaremilesystems.com www.squaremilesystems.com Tel 0870 950 4651 Mob 07717 883177 Best Practices? Guidelines?
More informationThe ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
More informationAnnexure 08 (Profile of the Project Team)
Annexure 08 (Profile of the Project Team) 1. Project Director (1) 2. Transition / Delivery Manager (1) 3. Project Manager Software (1) 4. Project Manager SLA (1) 5. Project Manager Information Security
More informationChange Management MANDATORY CRITERIA
MANDATORY CRITERIA 1. Does the tool facilitate the recording and storage of Request for Changes (RFC) in an easily accessible format? Comments: Yes. The recording tool provides easy input formats. Main
More informationServer Security Procedure
Server Security Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 11.7.1 Issue Date: January 23, 2012 Revision Date: January 23, 2012 Approved by: Title: Ted Harvey Director, Technology
More informationCASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC
CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION Alan Stuart, Managing Director National Science Foundation s New Headquarters in Alexandria, Virginia 1. Introduction to the National
More informationITIL Capacity Management Deep Dive
ITIL Capacity Management Deep Dive Chris Molloy IBM Distinguished Engineer International Business Machines Agenda IBM Global Services ITIL Business Model ITIL Architecture ITIL Capacity Management Introduction
More informationUC Health Managed Services Federated Process for Incidents, Requests & Changes
UC Health Managed Services Federated Process for Incidents, Requests & Changes UCSF IT Service Management Office http://itsm.ucsf.edu / v1.4 UCSF Service Management Office Content: Federated Model Key
More information6 Tips to Help You Improve Configuration Management. by Stuart Rance
6 Tips to Help You Improve Configuration Management by Stuart Rance Introduction Configuration management provides information about what assets you own, how they are configured, and how they are connected
More informationitsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors
itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors Dubai, June 11, 2007 Challenging Questions > Should we slow down
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More information1. You should attempt all 40 questions. Each question is worth one mark.
Sample Paper D Question Booklet Multiple Choice Exam Duration: 60 minutes Instructions 1. You should attempt all 40 questions. Each question is worth one mark. 2. Mark your answers on the answer sheet
More informationLeveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009
Leveraging ITIL to improve Business Continuity and Availability Samuel Lo MBA, MSc, CDCP, PMP, CISSP, CISA Data Centre Services Manager COL Limited Strictly Business itsmf Conference 2009 25 February 2009
More informationITSM Configuration Coordinators
ITSM Configuration Coordinators Role and Responsibilities Revision Date February 8, 2018 Version Number 6.0 Page 1 Document Ownership Document Owner Maury Collins Revision History ITSM Role, Department
More informationISO/IEC overview
ISO/IEC 20000 overview Overview 1. What is ISO/IEC 20000? 2. ISO/IEC 20000 and ITIL 2 BS 15000 BS15000 started in UK and first launched on July 1, 2003. Which was replaced by ISO/IEC 20000 after formal
More informationProject Management Pre-Implementation Project status reporting Post Implementation Assessment Phase Solidify Project Scope
Project Management 321 days 10/22/01 01/30/03 Pre-Implementation 14 days 10/22/01 11/08/01 Detailed Scope / Deliverable definition 5 days 10/22/01 10/26/01 Complete Work Breakdown Structure 1 day 10/22/01
More informationITD SERVER MANAGEMENT PROCEDURE
ITD SERVER MANAGEMENT PROCEDURE PURPOSE This procedure ensures the operation and maintenance of all ITD servers in a safe and effective fashion. This is achieved by the routine monitoring and timely update
More informationWelcome. Closing The Gap Between The Service Desk And The Data Centre. Service Desk - The Techy View
Closing The Gap Between The Desk And The Data Centre Martyn Hobbs and Asset Management Specialist 9 th July 2008 Welcome This session will discuss how it is essential in today s customer service IT Support
More informationAutomating the Software-Defined Data Center with vcloud Automation Center
Automating the Software-Defined Data Center with vcloud Automation Center 10 June 2014 Chris Alleaume Senior Systems Engineer 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of
More informationOFFICIAL COMMISSIONING OF SECURITY SYSTEMS AND INFRASTRUCTURE
Title of document ONR GUIDE COMMISSIONING OF SECURITY SYSTEMS AND INFRASTRUCTURE Document Type: Unique Document ID and Revision No: Nuclear Security Technical Assessment Guide CNS-TAST-GD-4.4 Revision
More informationREPORT 2015/186 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective
More informationEX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101
EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationRejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009
Rejuvenating BCM - Infrastructure Business Continuity Awareness Week 23 27 March 2009 Brigitte Theuma MBCI, CBCMMA, CBCMP, CBCITP, MIAEM 23 March 2009 Total of 5 pages Table of Contents I. ICT Service
More informationUpdate on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework
Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework Texas Higher Education Coordinating Board Zhenzhen Sun Assistant Commissioner Information Solutions and
More informationWORKING WITH ESTATES AT BANGOR UNIVERSITY
IT and Estates - working together WORKING WITH ESTATES AT BANGOR UNIVERSITY IT and Estates - working together UCISA - Networking Group 29 February 2012 Austin Court, Birmingham Who am I? Simone Barbaresi
More informationISEB Practitioner Certificate in IT Service Management: Specialising in Release and Control
Syllabus and Qualification Framework This qualification covers the Service Management disciplines of Configuration Management, Change Management and Release Management that together comprise Release and
More information<Project Name> Scope Management Plan. <Author> <Date> Name Date Reason For Changes Version <author> initial draft 1.0 draft1
Scope Management Plan 1.0 Revision History Name Date Reason For Changes Version initial draft 1.0 draft1 2.0 Statement of Purpose The purpose of this document
More informationWelcome to your Complementary Download Report. This complementary download report accompanies the free online ITIL training course.
Welcome to your Complementary Download Report This complementary download report accompanies the free online ITIL training course. The report summarises all of the key information from the course, and
More informationIT Service Quality amidst a World Gone Cloud. June 2012 V: 2.0
IT Service Quality amidst a World Gone Cloud June 2012 V: 2.0 Agenda A World Gone Cloud (federal perspective) Impacts to IT Infrastructures Impacts to ITIL-based Service/Quality Retooling ITIL Quality
More informationPolicy. Business Resilience MB2010.P.119
MB.P.119 Business Resilience Policy This policy been prepared by the Bi-Cameral Business Risk and Resilience Group and endorsed by the Management Boards of both Houses. It is effective from December to
More informationSUMMIT Availability Management DATA SHEET
SUMMIT Availability Management DATA SHEET SUMMIT, Symphony SUMMIT, the Symphony SUMMIT logo, and all other Symphony SUMMIT product, brand or service names are registered trademarks or trademarks of Symphony
More informationAutomating the Software-Defined Data Center with vcloud Automation Center
Automating the Software-Defined Data Center with vcloud Automation Center Alex Tanner EM Specialist SE July 2014 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of Business The
More informationNetworks - Technical specifications of the current networks features used vs. those available in new networks.
APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description
More informationINFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare
INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore
More informationThe secret of the service catalogue. Panel discussion 9 th April 2014
The secret of the service catalogue Panel discussion 9 th April 2014 The panellists Colin Rudd: is a leading author of the ITIL guidance and is one of the most experienced service management professionals
More information2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,
2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered
More informationMANDATORY CRITERIA. Comments: Yes. The contract screen identifies SLA s and associated CI s.
MANDATORY CRITERIA *CMDB= Configuration Management Database *CI= Configuration Items *SLA= Service Level Agreement *RFC= Request For Change 1. Does the tool facilitate the registration and management of
More informationSupport and Management for AWS
Support and Management for AWS Free your valuable resource to focus on delivering new projects, letting Proact manage your cloud environment 24x7 02 Optimal performance from your AWS infrastructure Support
More informationPeopleSoft Finance Access and Security Audit
PeopleSoft Finance Access and Security Audit City of Minneapolis Internal Audit Department September 20, 2016 1 Contents Page Background... 3 Objective, Scope and Approach... 3 Audit Results and Recommendations...
More informationWhen the template is complete, the whole Project Initiation Document can be printed and approved.
HOW TO USE THIS TEMPLATE: Introduction The template reflects the steps set out in the PRINCE2 Method and is designed to prompt the Project Manager and help in the creation of the Project Initiation Document
More informationIT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I
Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program
More informationITIL overview Service Delivery. Jaroslav Procházka
ITIL overview Service Delivery Jaroslav Procházka Content Service Delivery processes Service Level Management IT Financial Management Capacity Management Availability Management IT Service Continuity Management
More informationCorporate Information Security Policy
Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed
More informationSERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION
SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SO? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation
More informationVirginia State University Policies Manual. Title: Change/Configuration Management Policy: 6810 A. Purpose
A. Purpose Virginia State University (VSU) management in an effort to preserve the integrity and stability of its systems and infrastructure has established a change management policy that will govern
More informationIT S TIME FOR DATA CENTRE SUPPORT
IT S TIME FOR DATA CENTRE SUPPORT Knowing that your Data Centre is functioning effectively is critical to IT availability. Design, maintenance, operations and speedy fault resolution are key requirements
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationRSA Data Loss Prevention: Policy to Remediation
RSA Data Loss Prevention: Policy to Remediation Christian Hewitt, CISSP 1 RSA Security Management & Compliance Vision Delivering Visibility, Intelligence and Governance 2 Problem Definition You have a
More informationPROFILE. Daniel Buchanan. Trilby Misso Lawyers since Dec Prince2 Practitioner. MSP Practitioner. Extensive experience in:
PROFILE Daniel Buchanan Trilby Misso Lawyers since Dec 2007 Prince2 Practitioner MSP Practitioner Extensive experience in: Microsoft desktop and server infrastructure Citrix XenDesktop Cisco Unified Communications
More informationTrack 4: Session 6 Cybersecurity Program Review
Track 4: Session 6 Cybersecurity Program Review Challenges in Implementing an Agency-wide Adv Metering System: IT Security & Support Needs Karen Curran GSA Office of Facilities Management Energy Division
More informationCyber Transformation at CNS Pantex & Y-12
Cyber Transformation at CNS Pantex & Y-12 v Craig D. Thomas Craig.D.Thomas@cns.doe.gov @CUCraigT Director, Chief Information Security Officer 1 Agenda About Me Goals & Approach Lessons Learned Q&A 2 About
More informationSUBJECT: REQUEST FOR PROPOSALS FOR HARBOR DEPARTMENT CLOUD COMPUTING SERVICES
DATE: May 30, 2017 SUBJECT: REQUEST FOR PROPOSALS FOR HARBOR DEPARTMENT CLOUD COMPUTING SERVICES Pursuant to the Harbor Department Cloud Computing Services Request for Proposals (RFP), all proposers were
More informationCompany X. Outsourced Information Technology Services for Desktop and LAN Services. Managed Services Monthly Management Report.
Company X Outsourced Information Technology Services for Desktop and LAN Services Version Status Editor Creation Date Release Date Managed Services Monthly Management Report May 20xx 1 EXECUTIVE SUMMARY...
More informationNIC- Computer Emergency Response Team (CERT) Information Security Incident Management Policy
NIC- Computer Emergency Response Team (CERT) Information Security Incident Management Policy Document Control Document Title Information Security Incident Management Policy Document Type Policy Draft Document
More informationOnce your Project Plan Document is completed check the document against the following Quality Criteria:
HOW TO USE THIS TEMPLATE: Introduction The template reflects the steps set out in the PRINCE2 Method and is designed to prompt the Project Manager and help in the creation of the. The information for the
More informationDavid Jenkins (QSA CISA) Director of PCI and Payment Services
David Jenkins (QSA CISA) Director of PCI and Payment Services PCI and the Cloud, where is my Atlas Agenda About Cognosec PCI DSS 3.0 and CSPs SLA Considerations Technical considerations Auditing About
More informationCommunications Room Policy
Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents
More informationAutomating the Software-Defined Data Center with vcloud Automation Center
Automating the Software-Defined Data Center with vcloud Automation Center Aviv Waiss, lead Cloud management Specialist 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of Business
More informationepldt Web Builder Security March 2017
epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication
More informationIT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization
IT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization IT Under Attack IT costs are now more than 50% of the average Fortune 500 company s capital costs
More informationDCIM Software and IT Service Management - Perfect Together
DCIM Software and IT Service Management - Perfect Together A White Paper from Raritan 2015 Raritan Inc Overview Information Technology is so fundamental to every business today that every organization
More informationProblem Management MANDATORY CRITERIA
MANDATORY CRITERIA 1. Does the tool facilitate the creation, modification, and closure of Problem records? Comments: Yes. The tool provides two (2) methods in which to create a problem record. The record
More informationCyberSecurity Situational Awareness Monitoring & Reporting Platform Pharos. Cyber Security Showcase Wednesday, 29 February 2012 Brussels, Belgium
CyberSecurity Situational Awareness Monitoring & Reporting Platform Pharos Cyber Security Showcase Wednesday, 29 February 2012 Brussels, Belgium The Cyber Security Problem Domain Attack Profiling The Fast
More informationThe ITIL Process Map for Microsoft Visio. Examples and Overview of Contents
The ITIL Process Map for Microsoft Visio Examples and Overview of Contents Contents Structure of the ITIL Process Map Page 3 ITIL Process Diagrams Examples Page 4 Index of Process Diagrams contained in
More informationCustomer s journey into the private cloud with Cisco Enterprise Cloud Suite
Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Peter Charpentier, Senior Solution Architect, Cisco AS Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationDon t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL
Don t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL ITSM Executive Overview PMI Southwest Ohio Mega Keith D. Sutherland April, 2016 Acknowledgements Service Management Dynamix,
More information10 Reasons Why Your DR Plan Won t Work
10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies
More informationPurchasing Activities Suggesting a New Vendor
Purchasing Activities Suggesting a New Vendor Overview: Understanding the Suggesting a New Vendor Process This tutorial shows the step-by-step processes for suggesting a new vendor while creating a Requisition
More informationSystem Center 2012 R2 Lab 4: IT Service Management
System Center 2012 R2 Lab 4: IT Service Management Hands-On Lab Step-by-Step Guide For the VMs use the following credentials: Username: Contoso\Administrator Password: Passw0rd! Version: 1.5.5 Last updated:
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationAdministration and Data Retention. Best Practices for Systems Management
Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices
More informationManagement s Response to the Auditor General s Review of Management and Oversight of the Integrated Business Management System (IBMS)
APPENDI 2 ommendation () () 1. The City Manager in consultation with the Chief Information Officer give consideration to the establishment of an IBMS governance model which provides for senior management
More informationCMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE
CMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE Gerard Blokdijk Notice of Rights: Copyright The Art of Service. All rights
More informationICT DISASTER RECOVERY PLAN. FIRST DRAFT: ET 2015#11 (21 October 2015) None to Date
POLICY: ICT DISASTER RECOVERY PLAN FIRST DRAFT: ET 2015#11 (21 October 2015) ADOPTED: BR 2016#01 (16 March 2016) AMENDMENTS: None to Date REVIEW: March 2021 Contents 1.0 Review... 3 2.0 Goal of Disaster
More informationITIL Foundation Exam Study Guide
ITIL Foundation Exam Study Guide Gallacher, L ISBN-13: 9781119942757 Table of Contents Introduction xvii Assessment Test xxvii Chapter 1 Service Management as a Practice 1 Best-Practice Approaches and
More informationBootstrapping Enterprise Standards A Real World Approach
Bootstrapping Enterprise Standards A Real World Approach The Open Group Enterprise Architecture Practitioners Conference July 22 th 2008 Dan Hughes, Principal Consultant, Systems Flow, Inc Graham Williams,
More informationSecurity Camp 2016 Cloud Security. August 18, 2016
Security Camp 2016 Cloud Security What I ll be discussing Cloud Security Topics Cloud overview The VPC and structures Cloud Access Methods Who owns your data? Cover your Cloud trail? Protection approaches
More informationAdvanced Aspects of IT-Infrastructures in Healthcare
Advanced Aspects of IT-Infrastructures in Healthcare Einführung Vorlesung WS 2012 29.11.2012 Dr. Andreas Ehringfeld INSO - Industrial Software Institut für Rechnergestützte Automation Fakultät für Informatik
More informationInformation Systems Analysis and Design CSC340. XXV. Other Phases
XXV. Other Phases Implementation Phase Testing and Installation Phase Post-Installation Tasks Course Summary 2002 John Mylopoulos Other Phases -- 1 The Software Lifecycle Revisited Survey project scope
More information"Charting the Course to Your Success!" MOC Planning, Deploying and Managing Microsoft System Center Service Manager 2010.
Description Course Summary This course provides students with knowledge and skills to install and configure System Center. The course focuses on implementing, configuring and integrating with other System
More informationHow to measure your SOC efficiency: the Devil is in details
How to measure your SOC efficiency: the Devil is in details SOC Forum 2017 22.11.2017 wayray.com 2 #whoami Mona Arkhipova CSO/CIO at WayRay Past: Unit manager of infrastructure security and monitoring
More informationThe Evolution of IT Service Management
The Evolution of IT Service Management IT Service Management And Convergence of ITIL, ASL, ISO, and COBIT BCS Rideau Presentation March 21 st 2007 Phil Mustaphi Discussion Topics Introduction ITIL why,
More informationVisualising Your CMDB With Visio
Visualising Your CMDB With Visio David Cuthbertson Square Mile Systems Square Mile Overview Develop AssetGen toolsets, training and techniques for operational management of complex IT infrastructure Focus
More informationSymantec ServiceDesk 7.1 SP1 Implementation Guide
Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationTechnology Services. FY Budget Presentation
FY 2018-19 Budget Presentation Goals and Accomplishments Overall, completed 74 projects, fulfilled 8,676 service/incident requests, and held uptime of 99.96% Application Consolidation/Reduction initiative-
More information