Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

How to Best Measure Your ITSM Tool Success: 5 Tips

September 5, 2019

  • Blog
  • Archive

Perhaps you’ve recently implemented a new IT support, or IT service management (ITSM), tool, or you’re simply wanting to assess the suitability of your current ITSM tool before changing it. What’s the best way to go about evaluating its success within your organization?

To help you address that question, here are five pieces of advice:

1. Seek user input

Of course, you can – and should – first ask the people who use it. This includes the service desk analysts that “live in it” as well as the people they support, your organization’s employees. It will certainly offer a lot of qualitative information as to how well the ITSM tool is faring – especially in terms of intuitiveness, ease-of-use, and, generally, how it makes people’s lives easier. But you’ll also need to quantify how much of what you needed it for is being met, and how well.

2. Dig out your old ITSM tool selection RFP

This is, of course, unless you have the time and resources to define your ITSM tool requirements from scratch again. It’s probably not the case, unless you’re actively seeking to change the ITSM tool when measuring your current tool’s level of success.

So, an obvious approach is to assess how well it currently delivers against your documented business requirements. But how is it best to do this? This can be particularly challenging if your business requirements were a very long list of functions and features.

Plus, what the tool vendor says its tool can do might be different from what the tool actually achieves for your organization. For instance, your ITSM tool might have a wealth of incident management capabilities, but your end users are still unhappy with the quality of service and support they receive for IT issues.

3. Move your focus to outcomes

Hence, your real focus should be elevated from the tool itself to consider your service and support success – ideally with the measurement of results and business outcomes rather than the mechanics of tool use.

Rather than the 50+ feature-point requirements that were originally documented in the RFP, such as:

  • Are change records created via a formalized request for change (RFC) process?
  • Can RFCs be classified based on change category and prioritization?
  • Can pre-defined change models be used for pre-authorized, low-risk changes?

You might find this easiest if you transform your RFP into desired-outcome statements. For instance, change management would be something like:

  • Protecting business operations from the adverse impact of uncontrolled changes
  • Reducing risks and meeting governance requirements when making changes
  • Speeding up the delivery of IT and business change

Plus, there’ll likely be newer requirements, and maybe things that were somehow missed from the original RFP.

4. Ignore the background noise

Focus on what’s really important to your key stakeholders (when determining the level of ITSM tool success). So, for instance, using the above change management example, consistently achieving the three desired outcomes will be far more important than traditional change metrics, such as the number of requests for change (RFCs) handled.

For modern IT support teams that are focused on doing what’s right for their parent organization, there are two perspectives that are important to include – value creation and employee experience.

5. Consider whether ITSM tool success can and should be measured in isolation

If you think about the old ITIL mantra of “people, process, and technology” and the newer ITIL 4 change from processes to practices, your IT support success relies on more than the technology. And to claim technology success while your other ITSM-enabling capabilities are subpar is not in the best interest of your organization. Your success will ultimately come from a combination of people, process, and technology.

How do you measure the success of your ITSM tool? Is it radically different from what I’ve outlined above? Please let me know in the social media comments for this blog. And, check out the on-demand webinar: The 5 Key Factors Redefining ITSM Tools and Why it Matters for You.

Stephen Mann

​IT Service Management Expert and Principal Analyst and Content Director at ITSM.tools

Principal and Content Director at the ITSM-focused industry analyst firm ITSM.tools. Also an independent IT and IT service management marketing content creator, and a frequent blogger, writer, and presenter on the challenges and opportunities for IT service management professionals.

Previously held positions in IT research and analysis (at IT industry analyst firms Ovum and Forrester and the UK Post Office), IT service management consultancy, enterprise IT service desk and IT service management, IT asset management, innovation and creativity facilitation, project management, finance consultancy, internal audit, and product marketing for a SaaS IT service management technology vendor.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

Webcasts

Welcome to 2021: A BeyondTrust Global Partner Update

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.