 |
IT Management can improve control over critical IT
issues such as cost reduction, regulatory compliance, and system security
while generating massive efficiency and quality gains to achieve operational
agility, improved productivity, standardization, and higher levels of
server uptime.
IT Management Solutions
Management:
Configuration Management
consists of controlling an enterprise's intellectual property—data,
processes, people, and the relationships between them. Incident Management
and Problem Management are components of configuration management.
Incident Management aims to minimize disruption to the business
by restoring service operation to agreed levels as quickly as possible.
Problem Management investigates the underlying cause of incidents, and
aims to prevent incidents of a similar nature from recurring.
Top of Page
Change Management
allows IT managers to enforce policies, standards, security settings
and best practices. By defining server baselines, IT managers remove
the inconsistencies between server configurations that cause downtime
and security holes.
Top of Page
Patch Management—whether
it is an emergency patch, a configuration change, or an application
update, system downtime can be prevented by taking a systematic approach
to patch management.
Top of Page
Availability management—delivering
required user experience to an IT system that enables the business to meet
its objectives, in a cost effective manner.
Top of Page
Service Level management—maintains and improves
the agreed quality of service by implementing a cycle of
continuously agreeing, monitoring, reporting, and improving the existing service. The focus of
this effort must be on meeting the current, and known future business needs.
Top of Page
IT Service Continuity management—supports the organization's overall Business Continuity Management process, by ensuring that all IT services critical
to the function of the business can be recovered
within a previously agreed time frame.
Top of Page
Asset Management—control
and track IT assets and equipment inventory including lease, maintenance,
cost, and ownership information for individual IT assets.
Top of Page
Audit and Compliance is a comprehensive
assessment of the management, operational, and technical security controls
in an information system, made in support of security accreditation,
to determine the extent to which the controls are implemented correctly,
operating as intended, and producing the desired outcome with respect
to meeting the security requirements for the system. The results of
a security certification are used to reassess the risks and update the
system security plan, thus providing the factual basis for an authorizing
official to render a security accreditation decision.
Top of Page

|