- ITM NEWS
- See >
IT Management Consulting Service
1. We want to reduce the failures of our IT services, and determine the counter-actions for the severe incidents as soon as possible.
●Our approach would be to identify the management processes of the services management, which should be enhanced, by referring to the standards and the framework, such as ITIL and COBIT.
●Next, we would develop the concrete counter-actions based upon the process analysis regarding the service management.
2. How to correspond to the changes of IT services?
1) No idea how to consolidate the systems in conjunction with the merger of the multiple companies.
⇒We will support the client to develop the system conversion/migration plan which would clarify the course of actions of the system consolidation.
2) We don’t know how we should do the move and/or consolidation of the IT centers in accordance with the merger or the building of the new center.
⇒The move or consolidation of the IT centers is not merely the transporting the goods and computers. We will support the client to develop the base plan for the move and/or consolidation of the centers, from the viewpoint of the move and/or consolidation of the IT services.
3) We want to re-establish the IT management operations in parallel with the implementation of the new IT systems which are aligning to the new business strategies.
⇒We will lead the tasks to develop the plan for the operations and management of the new IT systems, and define the functional requirements.
3. We want to enhance the IT services management.
1) The enhancement of the skills and power of IT services operations department.
⇒We will assess the IT service operations of the department and develop the skills enhancement plan.
2) We want to get the certification of ISO27000 (Information security) and ISO20000 (IT services management).
⇒We will support to perform the initial assessment, identify the solutions for the defects and put the solutions in place.
3) We want to reduce the rick in the area of information security, such as the information leakage.
⇒We will support to assess the information security processes, and develop the improved way of the risk-taking processes for the information security.