IT performance management

Last updated

This entry describes performance management in an Information Technology context. See Performance Management for a description of performance management in a more general context.

Contents

IT performance management is a term used in the Information Technology (IT) field, and generally refers to the monitoring and measurement of relevant performance metrics to assess the performance of IT resources. It can be used in both a business or IT Management context, and an IT Operations context. Companies who offer IT performance management tools include Xangati, TeamQuest, IBM, CA, BMC, Sightline Systems, SevOne and HP Software Division. [1]

Some of the different types and categories of IT performance management include those related to networks, applications, self-learning, information security, and business transactions.

Business vs. operations context

In a business or IT Management context, IT performance management is concerned with measuring the expenditure of capital and human resources on Information Technology projects. This allows the business to determine how these expenditures improve strategic and operational capabilities of the firm in designing and developing products and services for maximum customer satisfaction, corporate productivity, profitability, and competitiveness. [2] This type of IT Performance Management is usually of interest to executive level IT personnel, all the way up to the Chief Information Officer (CIO), and is related to IT Portfolio Management.

In an IT operations context, IT performance management is the subset of tools and processes in IT Operations which deals with the collection, monitoring, and analysis of performance metrics. These metrics can indicate to IT staff whether a system component is up and running (available), or that the component is behaving in an abnormal way that would impact its ability to function correctly—much like how a doctor may measure pulse, respiration, and temperature to measure how the human body is "operating". This type of monitoring originated with computer network components, but has now expanded into monitoring other components such as servers and storage devices, as well as groups of components organized to deliver specific services and Business Service Management).

Types and categories

Types and categories of IT performance management include:

Benefits

The benefits of IT performance can be broken down into a business context as well as an operations context:

Business Context

Direct financial gains

Improved management control

Operations Context

Outage prevention or remediation
Service Level Management
Capacity planning

Information Security Context

Information security performance management is the process of designing, implementing, and managing the use of all data elements to determine the effectiveness of the overall security program. Performance measurements are data points or computed trends that may indicate the effectiveness of security countermeasures or controls as implemented by the organization. A critical task in this measurement process is to assess and quantify what will be measured. It is essential to obtain detailed measurements when assessing the effort spent to complete production tasks and the time spent on project tasks. This depends heavily on the number of systems and users of those systems. [6]

Benchmarking for many organizations can be difficult as many organizations do not share results. Successful cyber attacks are perceived as an organizational failure, and are kept secret if possible. No two organizations are alike, and may differ dramatically in size, composition, management philosophy, and infrastructure. [6] However, any information can provide insight for companies to leverage their own resources accordingly, and for internal audits allows them to be prepared for any contingencies that might arise.

See also

Related Research Articles

Enterprise resource planning corporate task of optimizing the existing resources in a company

Enterprise resource planning (ERP) is the integrated management of main business processes, often in real time and mediated by software and technology.

Business performance management is a set of performance management and analytic processes that enables the management of an organization's performance to achieve one or more pre-selected goals. Gartner retired the concept of "CPM" and reclassified it as "financial planning and analysis (FP&A)," and "financial close" to reflect two concepts: increased focus on planning and the emergence of a new category of solutions supporting the management of the financial close.

IT management is the discipline whereby all of the information technology resources of a firm are managed in accordance with its needs and priorities. These resources may include tangible investments like computer hardware, software, data, networks and data centre facilities, as well as the staff who are hired to maintain them.

Enterprise architecture (EA) is "a well-defined practice for conducting enterprise analysis, design, planning, and implementation, using a comprehensive approach at all times, for the successful development and execution of strategy. Enterprise architecture applies architecture principles and practices to guide organizations through the business, information, process, and technology changes necessary to execute their strategies. These practices utilize the various aspects of an enterprise to identify, motivate, and achieve these changes."

Enterprise content management (ECM) extends the concept of content management by adding a timeline for each content item and, possibly, enforcing processes for its creation, approval and distribution. Systems using ECM generally provide a secure repository for managed items, analog or digital. They also include one methods for importing content to bring manage new items, and several presentation methods to make items available for use. Although ECM content may be protected by digital rights management (DRM), it is not required. ECM is distinguished from general content management by its cognizance of the processes and procedures of the enterprise for which it is created.

Business activity monitoring (BAM) is software that aids in monitoring of business activities, as those activities are implemented in computer systems.

Enterprise software, also known as enterprise application software (EAS), is computer software used to satisfy the needs of an organization rather than individual users. Such organizations include businesses, schools, interest-based user groups, clubs, charities, and governments. Enterprise software is an integral part of a (computer-based) information system; a collection of such software is called an enterprise system. These systems handle a chunk of operations in an organization with the aim of enhancing the business and management reporting tasks. The systems must process the information at a relatively high speed and can be deployed across a variety of networks.

Systems management refers to enterprise-wide administration of distributed systems including computer systems. Systems management is strongly influenced by network management initiatives in telecommunications. The application performance management (APM) technologies are now a subset of Systems management. Maximum productivity can be achieved more efficiently through event correlation, system automation and predictive analysis which is now all part of APM.

Capacity management's primary goal is to ensure that information technology resources are right-sized to meet current and future business requirements in a cost-effective manner. One common interpretation of capacity management is described in the ITIL framework. ITIL version 3 views capacity management as comprising three sub-processes: business capacity management, service capacity management, and component capacity management.

In the fields of information technology and systems management, application performance management (APM) is the monitoring and management of performance and availability of software applications. APM strives to detect and diagnose complex application performance problems to maintain an expected level of service. APM is "the translation of IT metrics into business meaning ."

Process mining is a family of techniques in the field of process management that support the analysis of business processes based on event logs. During process mining, specialized data mining algorithms are applied to event log data in order to identify trends, patterns and details contained in event logs recorded by an information system. Process mining aims to improve process efficiency and understanding of processes.

Performance engineering encompasses the techniques applied during a systems development life cycle to ensure the non-functional requirements for performance will be met. It may be alternatively referred to as systems performance engineering within systems engineering, and software performance engineering or application performance engineering within software engineering.

Operational intelligence (OI) is a category of real-time dynamic, business analytics that delivers visibility and insight into data, streaming events and business operations. OI solutions run queries against streaming data feeds and event data to deliver analytic results as operational instructions. OI provides organizations the ability to make decisions and immediately act on these analytic insights, through manual or automated actions.

CNGrid is the Chinese national high performance computing network supported by 863 Program.

Dynamic Infrastructure is an information technology concept related to the design of data centers, whereby the underlying hardware and software can respond dynamically and more efficiently to changing levels of demand. In other words, data center assets such as storage and processing power can be provisioned to meet surges in user's needs. The concept has also been referred to as Infrastructure 2.0 and Next Generation Data Center.

Business process management (BPM) is the discipline in which people use various methods to discover, model, analyze, measure, improve, optimize, and automate business processes. Any combination of methods used to manage a company's business processes is BPM. Processes can be structured and repeatable or unstructured and variable. Though not required, enabling technologies are often used with BPM.

In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.

In the fields of information technology (IT) and systems management, IT operations analytics (ITOA) is an approach or method to retrieve, analyze, and report data for IT operations. ITOA may apply big data analytics to large datasets to produce business insights. In 2014, Gartner predicted its use might increase revenue or reduce costs. By 2017, it predicted that 15% of enterprises will use IT operations analytics technologies.

Data-centric security is an approach to security that emphasizes the security of the data itself rather than the security of networks, servers, or applications. Data-centric security is evolving rapidly as enterprises increasingly rely on digital information to run their business and big data projects become mainstream. Data-centric security also allows organizations to overcome the disconnect between IT security technology and the objectives of business strategy by relating security services directly to the data they implicitly protect; a relationship that is often obscured by the presentation of security as an end in itself.

DataOps is an automated, process-oriented methodology, used by analytic and data teams, to improve the quality and reduce the cycle time of data analytics. While DataOps began as a set of best practices, it has now matured to become a new and independent approach to data analytics. DataOps applies to the entire data lifecycle from data preparation to reporting, and recognizes the interconnected nature of the data analytics team and information technology operations.

References

  1. Network World. “HP redefines IT performance management. New software suite and other tools aimed at helping IT show its value to the business.” Beth Schultz. June 1, 2011.
  2. M.K. Badawy (1998), Technology Management Education: Alternative Models. California Management Review. 40 (4), pp. 94–115
  3. PD-icon.svg This article incorporates  public domain material from the General Services Administration document: "Federal Standard 1037C".(in support of MIL-STD-188)
  4. Amies A, Sanchez J, Vernier D, and Zheng X D, 2011. Monitor services in the cloud IBM developerWorks, February 15
  5. Williams, David - Gartner Analyst Research Profile; retrieved 7/15/09 online at http://www.gartner.com/AnalystBiography?authorId=14134
  6. 1 2 Whitman, Michael (2019). Management of Information Security, 6th Edition. Course Technology, Inc. ISBN   978-1337405713.