NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

How to Best Measure Your ITSM Tool Success: 5 Tips

September 5, 2019

  • Blog
  • Archive

Perhaps you’ve recently implemented a new IT support, or IT service management (ITSM), tool, or you’re simply wanting to assess the suitability of your current ITSM tool before changing it. What’s the best way to go about evaluating its success within your organization?

To help you address that question, here are five pieces of advice:

1. Seek user input

Of course, you can – and should – first ask the people who use it. This includes the service desk analysts that “live in it” as well as the people they support, your organization’s employees. It will certainly offer a lot of qualitative information as to how well the ITSM tool is faring – especially in terms of intuitiveness, ease-of-use, and, generally, how it makes people’s lives easier. But you’ll also need to quantify how much of what you needed it for is being met, and how well.

2. Dig out your old ITSM tool selection RFP

This is, of course, unless you have the time and resources to define your ITSM tool requirements from scratch again. It’s probably not the case, unless you’re actively seeking to change the ITSM tool when measuring your current tool’s level of success.

So, an obvious approach is to assess how well it currently delivers against your documented business requirements. But how is it best to do this? This can be particularly challenging if your business requirements were a very long list of functions and features.

Plus, what the tool vendor says its tool can do might be different from what the tool actually achieves for your organization. For instance, your ITSM tool might have a wealth of incident management capabilities, but your end users are still unhappy with the quality of service and support they receive for IT issues.

3. Move your focus to outcomes

Hence, your real focus should be elevated from the tool itself to consider your service and support success – ideally with the measurement of results and business outcomes rather than the mechanics of tool use.

Rather than the 50+ feature-point requirements that were originally documented in the RFP, such as:

  • Are change records created via a formalized request for change (RFC) process?
  • Can RFCs be classified based on change category and prioritization?
  • Can pre-defined change models be used for pre-authorized, low-risk changes?

You might find this easiest if you transform your RFP into desired-outcome statements. For instance, change management would be something like:

  • Protecting business operations from the adverse impact of uncontrolled changes
  • Reducing risks and meeting governance requirements when making changes
  • Speeding up the delivery of IT and business change

Plus, there’ll likely be newer requirements, and maybe things that were somehow missed from the original RFP.

4. Ignore the background noise

Focus on what’s really important to your key stakeholders (when determining the level of ITSM tool success). So, for instance, using the above change management example, consistently achieving the three desired outcomes will be far more important than traditional change metrics, such as the number of requests for change (RFCs) handled.

For modern IT support teams that are focused on doing what’s right for their parent organization, there are two perspectives that are important to include – value creation and employee experience.

5. Consider whether ITSM tool success can and should be measured in isolation

If you think about the old ITIL mantra of “people, process, and technology” and the newer ITIL 4 change from processes to practices, your IT support success relies on more than the technology. And to claim technology success while your other ITSM-enabling capabilities are subpar is not in the best interest of your organization. Your success will ultimately come from a combination of people, process, and technology.

How do you measure the success of your ITSM tool? Is it radically different from what I’ve outlined above? Please let me know in the social media comments for this blog. And, check out the on-demand webinar: The 5 Key Factors Redefining ITSM Tools and Why it Matters for You.

Photograph of Stephen Mann

Stephen Mann, ​IT Service Management Expert and Principal Analyst and Content Director at ITSM.tools

Principal and Content Director at the ITSM-focused industry analyst firm ITSM.tools. Also an independent IT and IT service management marketing content creator, and a frequent blogger, writer, and presenter on the challenges and opportunities for IT service management professionals.

Previously held positions in IT research and analysis (at IT industry analyst firms Ovum and Forrester and the UK Post Office), IT service management consultancy, enterprise IT service desk and IT service management, IT asset management, innovation and creativity facilitation, project management, finance consultancy, internal audit, and product marketing for a SaaS IT service management technology vendor.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Azure PIM vs. BeyondTrust PAM

Whitepapers

The Guide to Just-In-Time Privileged Access Management

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.