M Eliminating Today’s Costly Outsourcing Operations Challenges By Randy Brasche

advertisement
Copyright © 2004 Information Systems Audit and Control Association. All rights reserved. www.isaca.org.
Eliminating Today’s Costly
Outsourcing Operations Challenges
By Randy Brasche
M
ore companies are turning to outsourcing as a viable
means to achieve efficiencies and make vital
resources more available. By outsourcing key
portions of their infrastructure, including the mundane, day-today monitoring and maintenance of applications, networks and
hardware, companies can free people and budgets to focus on
core business initiatives. Since many outsourcers have
established economies of scale, they can provide services at a
much lower—and much more predictable—cost.
Through outsourcing, companies gain IT agility without the
expense or burden of maintaining and managing increasingly
complex systems and processes. For an outsourcing service
vendor, providing these benefits can come with a significant
risk. Divergent technologies, complex systems and elevated
customer requirements can amplify operational inefficiencies,
endanger service level agreements and ultimately increase
costs. As a result, service vendors must start focusing on the
two most costly and unpredictable components of their
infrastructure: people and process. By focusing on people and
process, outsourcers stand a better chance of maintaining high
service levels and increasing profit margins.
Increased Demand Increases
Operational Complexities
Market analyst firm International Data Corporation (IDC)
recently reported on the upward trend for outsourcing by
discussing the overall revenue success of the 30 largest IT
services vendors. According to IDC’s Worldwide Quarterly
Services Vendor Revenue Tracker, an index of the world’s
largest services companies, the outsourcing segment of those
vendors’ businesses grew 17.9 percent in 2003 compared to
2002. For outsourcing service vendors, this increased demand
is placing greater operational pressures upon their business.
While several factors contribute to rising operational
complexity and cost, service levels and the cost of human
capital are perhaps the two most critical components of the
equation. For example, inadvertent mistakes or failure to
adhere to policies or procedures can cause unexpected
downtime that affects service levels. Gartner reported that
approximately 40 percent of downtime is caused by
operational errors, another 40 percent is caused by application
errors, most often misconfigurations, and the remaining 20
percent is caused by actual platform problems, including the
network, operating system or hardware.1 Further complicating
the issue, since applications now support an extended network
of customers, partners and related applications, constant
discipline and precision are critical to maintaining systems and
uptime and sustaining crucial service levels.
The cost of people is also on the rise. According to market
estimates, most companies spend more than 50 percent of an IT
budget on people. Market research firm Meta Group estimates
that by 2006 and 2007, IT salaries will again escalate, putting
labor costs at 55 to 60 percent or more of the IT budget.2 IDC
estimates that acquiring and maintaining one IT staffer probably
costs about US $110,000-$120,000 annually.3
With this increased complexity, along with requirements for
consistent and reliable service levels, service providers are
fighting to maintain costs on two fronts. Any disruption in
service will require service level credits back to the customer.
At the same time, operational inefficiencies translate into
higher costs for the service vendor. To counter this financial
erosion, the service vendor needs to establish a strong
operational framework around its people infrastructure.
Focusing on the People and Processes
First
To combat the increased cost and operational complexity
associated with managing the IT infrastructure, service vendors
must integrate people and processes with the technology.
Managing multiple clients among a shared pool of resources
requires rigorous adherence to well-defined and comprehensive
processes and procedures. The service vendor must understand
and manage the intricate and overlapping use of resources by
one customer, to avoid impacting another. IT personnel must be
equipped to facilitate these operations while maintaining
consistent and agreed-upon service levels for all customers.
The people infrastructure is often the most overlooked
component within the data center, with IT staffers relying on
outdated or inadequate tools and processes to guide and
orchestrate ongoing activities. IT organizations have a plethora of
network and system management tools and technologies, such as
HP OpenView, BMC Patrol and CA Unicenter, that provide
visibility into the health and performance of systems,
applications and networks. Unfortunately, there’s little visibility
into everyday activity and insufficient focus on building people
and process into the technology. Gartner concurs with this view
and believes that future network and system management (NSM)
investments should manage the “process, not the technology.”4
Companies have also leveraged a variety of service
management solutions such as Remedy or Peregrine to manage
the people and process associated with problem, incident or
INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 5, 2004
change management. While these service management systems
are ideal solutions to assign and plan change activity, they fail
to deliver a comprehensive execution process extending to the
human IT level. As a result, the IT organization has little
insight or control over tracking the progress of an activity,
determining if the activity has been completed or ensuring that
the appropriate person is attending to the task. Additionally,
there is no method or process for tracking activities generated
outside the service management system. Ultimately, a gap
exists between service management systems and the service
delivery processes that support the underlying infrastructure,
leading to inefficiencies of people and technology.
With the right tools and processes in place, individuals can
better pinpoint problems and manage ongoing operations. For
a service vendor, the goal is to make the human element as
effective as the underlying technology.
Closed-loop Service Delivery
Strategies Address Key Challenges
Many companies and outsourcing service vendors are
implementing closed-loop service delivery strategies to extend
current tools and processes and close the gap between service
level management and service delivery (figure 1). Opsource, a
leading outsourced service provider that services many large
enterprises, has been one of several early service provider adopters
to create a closed-loop service delivery system. The operations
monitoring solution employed by Opsource tracks individual
activity by file changes, process activity and direct access. John
Rowell, Opsource’s vice president of operations, believes that “by
providing a consolidated view of individual activities across diverse
and complex infrastructures, operations monitoring allows more
precise assessments of operational effectiveness and ensures that
business objectives and agreed upon service levels are met.”
Figure 1—Closed-loop Service Delivery Strategy
Business objectives guide IT
objectives and processes
IS Service Delivery
IT Infrastructure
Reporting and Analytics
Operations
Policies and Procedures
IS Service Management
Improving Profitability Through
People and Technology
To capitalize on the revenue potential of a growing
outsourcing market, service vendors must first focus on the
people and policies that support IT. By addressing a long-ignored
area of how people’s actions affect service delivery and service
level management, service vendors replace “dusty binder”
procedures with consistent, closed-loop and accurate processes.
Empowering the IT organization with the proper mechanisms to
guide and manage their actions, service vendors create greater
accountability, boost morale and ensure improved reliability,
efficiency and security for the IT infrastructure. Ultimately,
service vendors will be able to maintain and grow profit margins
while creating tangible value for the customer and alignment
between business objectives and IT service delivery.
Business Objectives
IT Objectives
should include four additional capabilities:
• Track—Detect and collect all change activities. This includes
changes associated with an approved change request as well
as changes made without approval. All collected changes
should be available for real-time review.
• Enforce—Enforce the organization’s policies for how and
when changes can be made, and who can make them. For
example, if a change is approved for the specified time frame,
the change implementer should be prohibited from making
the change outside of the designated time frame.
• Validate—Validate that required change processes have been
followed. For example, if deleting a user account upon
employee termination is a six-step process, ensure that all six
steps have been completed successfully. Aggregate all of the
change activities and validate that the change took place.
• Report—Communicate the change results, time to completion
and any policy violations associated with the change.
By orchestrating, guiding and automating people’s actions in
support of IT, closed-loop service delivery extends service
management processes to the human IT level to provide
complete execution management while increasing efficiency,
reliability and security. Similarly, this strategy improves ongoing
operations by capturing a complete record of the activities of
users and applications across the IT infrastructure, providing a
comprehensive view of data center activity. This granular view
supports faster troubleshooting and more insightful forensics
when problems occur. Additionally, the same data can be used to
track overall availability and performance. The unique
procedures of each business process operation or IT function can
be used to manage and guide work in the data center. As a result,
the efforts of IT staff can be focused on the high-value tasks that
most benefit from human insight, while routine and low-value
activities become automated.
Define and manage service levels
specific to each business unit
IT service delivery targets the
human side of IT by tracking,
guiding and orchestrating actions
across the infrastructure
Servers, applications, databases,
networks, monitoring tools
Closed-loop service delivery strategies can also be
integrated with service management systems to enable IT
organizations to track and guide actions—from request through
execution to review and completion. These systems track
actual changes for comparison to approved changes, and the
specific policies for how and when changes can be made are
established based on skill sets, application, time, required
approvals and standard operations procedures. The goal is to
more accurately verify approved changes, detect or prevent
unapproved changes, and over time standardize how changes
are performed. Such an extended service delivery system
Endnotes
Lanowitz, Theresa; Tearing Down the Wall, Gartner Group, 2002
Passori, Al, Maria Schafer; Base Hit: IT Organization Field
of Dreams, Meta Group, 24 May 2004
3
According to Michael Boyd, Ph.D., International Data Corp.,
in Business Finance, May 2000.
4
Manage the Process, Not the Technology, Gartner Inc.,
September 2002
1
2
INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 5, 2004
Randy Brasche
is director of product marketing at Active Reasoning. He has
more than 10 years of data center operations and marketing
experience. During his career, Brasche has held various strategy,
product management and marketing positions at Cable and
Wireless, Exodus, Oracle, Informix and Liberate Technologies.
Information Systems Control Journal, formerly the IS Audit & Control Journal, is published by the Information Systems Audit and Control Association, Inc.. Membership in the association, a voluntary
organization of persons interested in information systems (IS) auditing, control and security, entitles one to receive an annual subscription to the Information Systems Control Journal.
Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of the Information Systems Audit
and Control Association and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors' employers, or the editors of this Journal. Information Systems Control Journal
does not attest to the originality of authors' content.
© Copyright 2004 by Information Systems Audit and Control Association Inc., formerly the EDP Auditors Association. All rights reserved. ISCATM Information Systems Control AssociationTM
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the
association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles
owned by the Information Systems Audit and Control Association Inc., for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume,
and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the
association or the copyright owner is expressly prohibited.
www.isaca.org
INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 5, 2004
Download