The consumerization of IT, digital business model disruption, and the need for greater speed in technology development are combining to dramatically change the role of IT service management. According to Dennis Drogseth of Enterprise Management Associates (EMA), “Both the ‘rules’ and the ‘roles’ governing IT Service Management (ITSM) are evolving” as the relationship changes “between IT and its service consumers.”
But while automation technologies broadly speaking (robots, “smart” machines, and software) may not destroy many jobs (if any) on net, they will certainly change the nature of the future of work.
The work of the future will be technology-assisted, data-driven, and collaborative. Simple, autonomous tasks (e.g., scanning a barcode) are easy to automate. Complex tasks requiring a mix of expertise (e.g., designing and developing a business software application) are far more difficult, and not candidates for automation any time soon.
Reporting on those study results, Shelly Kramer notes that the traditional enterprise IT model is under pressure as rapidly evolving business needs and increasing tech-savvy employees demand faster, more flexible technology approaches.
As she observes, “it’s not unusual for the IT function to be viewed as something of an obstruction to be worked around rather than an asset to the business. This leads to the rise of alternative, external cloud solutions being adopted directly by other business unit leaders and a hodgepodge of unconnected ‘solutions’ being used by various factions within the company.” Working around IT rather than with it leads to risks enterprises need to acknowledge and address.
The increasing sophistication of data thieves, proliferating number of potential breach points, and growing value of stolen data combined to drive the number and cost of data breaches to new highs last year. And the risks to enterprises continue to expand.
But despite the growing threats, many enterprises remain woefully unprepared—even after investing in IT security solutions. According to recent research from Lieberman Software reported in Infosecurity magazine, “69 percent of (IT professionals) do not feel they are using their IT security products to their full potential. As a result, a staggering 71 percent…believe this is putting their company, and possibly customers, at risk.”
If your organization is struggling to balance the need to support mobile devices with security and compliance concerns, you’re not alone. According to recent research from TechTarget, ” Growing demand for mobile computing will continue generating major new challenges for companies in many industries for at least the next year.”
Author Anne Stuart reports that two-thirds of survey respondents (3,300 business and IT professionals worldwide) “ranked mobile-device management as a ‘medium’ or ‘high’ priority for this year,” and 85% placed the same importance on security–yet “only 29% reported having a mobile device management (MDM) tools or policies in place.”
Among the report’s other findings, corporate IT support for mobile access varies considerably by device type, with 54% of respondents willing to allow employees to self-provision smartphones, but just 29% will permit them to connect their own laptop or desktop to the company network.
Three key challenges organizations face in this shift to mobile support are:
redesigning business processes for mobile workers;
ensuring connection, data and device security; and
prioritizing the business processes to “mobilize” first.
Mobile Process Redesign
According to TechTarget, “Forrester (Research) studies indicate that companies will spend nearly $8 billion on reinventing processes for mobility this year.” While mobile process design presents some unique challenges, the fundamental approach should be the same as for any process redesign: start with the goal of a delighted customer.
Work backward from the user goal and experience to the required tasks on the business side, keeping the overall process as simple as possible (though not simpler, as Albert Einstein instructed), and always looking for automation opportunities.
Ensuring Mobile Security
While this topic could fill a book (and has–several books actually), one helpful approach where feasible is to use portal software (such as Kinetic Request) as a mobile, Web-based front-end (a system of engagement) between the mobile device and the back-end enterprise application (system of record).
The portal application utilizes existing security protocols and passwords while enabling specific device-level security that protects corporate systems and information without undue complexity for the user.
Prioritizing Mobile Processes
Not every process needs be mobilized, and not every process that does has equal importance. The TechTarget article advises looking “at the employee path of activity, what they’re trying to get done on mobile, and make sure that’s enabled. Let’s also make sure we are delivering what customers want…Don’t mobile for mobile’s sake. Instead, find proof that mobility will improve productivity or help the company better serve customers or reach some other business goal.”
This is where an agile approach to service management is valuable. It enables tackling the “low-hanging fruit” (i.e., processes that are very common, or very painful, or both, for mobile users) first–testing, tweaking and optimizing them. Often, these processes can then be cloned and modified to create new processes. This enables a gradual approach to process mobility, enabling IT to meet mobile users’ most pressing needs while minimizing business disruption.
The “seismic shift” as TechTarget describes it, from desktop to mobile computing, presents significant challenges for IT infrastructure, app dev, and support services. But taking an agile approach to mobility helps to balance user demands with cost and resource constraints.