Feeds

Best practices in virtualisation

A pitch for ITIL

SANS - Survey on application security programs

Getting IT aligned with the business's needs and strategies is probably one of the toughest elements of any IT manager's job - yet remains among the most essential, right up there with keeping the lights on.

It's about ensuring that IT delivers a return on investment, demonstrates its business value, provides continuous improvement, and gives the business a competitive advantage, all while demonstrating proper IT governance.

ITIL (IT Infrastructure Library) has become the industry's generally accepted way of going about this. According to the IT Service Management Forum, ITIL is a public framework that describes best practices in IT service management and IT governance. It focuses on the continual measurement and improvement of the quality of IT service delivered, from both a business and a customer perspective. Its scope includes service strategy, design, transition, operation and continual improvement.

Best practice makes (almost) perfect

Essentially, ITIL is a framework, not a set of rules. In the real world, it's about best practices - doing things in a way that have been shown to work and to be effective - along with information sharing, planning and accountability, which means that, if things do go wrong, there is an audit trail to be followed to ensure that the same mistakes don't recur.

Virtualisation in this context is not so much a technology as a means for providing service delivery outcomes, so it affects other ITIL-managed processes.

For example, virtualisation can support better continuity management, allowing for faster disaster recovery. Allied to that is availability management, where virtualisation improves fail-over processes, as it can remove the need for mirroring the entire hardware estate and enable the use of virtual machines instead.

It allows you to improve capacity management, with resources moving around the data centre according to need, not where the hardware happens to be installed. And it boosts the bottom line - service level management - because of its ability to provision new servers and applications quickly and cheaply.

That's not all though. The application of ITIL methodologies to virtualisation itself can help you achieve improved outcomes. ITIL is essentially a process of thinking problems through. It can affect how, for example, you measure and monitor the virtual infrastructure, and can help you decide, for example, whether installing new, more powerful virtualisation hardware will positively affect service delivery.

Layer cake

Opposition to ITIL often centres on the fact that it adds an additional layer of complexity to operations. However, many practitioners also see that as a benefit, because it allows IT managers to explain to themselves and then to stakeholders the risks and benefits of pursuing a particular strategy - whether it originated from business managers or from IT.

It's worth recognising that when a business manager wants a new virtual server now, delivering one in a handful of minutes may in fact not be the best thing for the business as a whole. But just because virtualisation technology allows you to provision a server near-instantly, doesn't always mean that's the right thing to do.

IT managers working in an ITIL-aware organisation are empowered - given a framework -- within which they can ask questions. So it legitimates questions such as whether the need has been fully thought through, and whether other resources are available that could meet this need.

In other words, adopting good practices can help the service provider - that's you - to create an effective service management system that adds value to the business as a whole.

Overall, the outcomes of managing an virtualisation infrastructure using ITIL-based practices should include increased user and customer satisfaction with IT services, better service availability, directly leading to increased business profits and revenue; financial savings from reduced rework, lost time; improved resource management and usage; improved time to market for new products and services; and improved decision making and optimised risk.

So what's not to like? ®

SANS - Survey on application security programs

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.