Tuesday, January 21, 2020

6 Smart Steps for ITSM Tool Selection Success


6 Smart Steps for ITSM Tool Selection Success
Published 21 November 2019 - ID G00407777 - 34 min read

Identifying the right IT service management tool will be challenging if relying exclusively on the Magic Quadrant or ITIL-based RFP templates. I&O leaders should use this six-step buyer’s guide to better assess factors such as I&O maturity, ITOM integration, licensing and vendor viability.
Overview
Key Challenges
·         I&O leaders frequently overbuy ITSM tools beyond their needs. Choosing powerful yet more complicated tools slows down service improvements and requires increased overhead.
·         Add-ons to the core ITSM tool are often bought for future potential requirements on the assumption that I&O maturity improvements are successful. These sometimes go unused but add an average of 82% extra cost.
·         Because shortlists for ITSM tools are often based on a superficial review of industry analysis, I&O leaders often do not understand how products and vendors align with their requirements.
·         Standard ITIL process checklist-style RFP solicitations for ITSM tools do not enable I&O leaders to effectively evaluate how a vendor’s product would help the organization achieve its objectives.
Recommendations
I&O leaders focused on infrastructure, operations and cloud management must:
·         Ensure ITSM tool selection is aligned with current and planned ITSM and ITOM capabilities by using an assessment such as the Gartner IT Score for I&O to determine I&O maturity.
·         Avoid lock-in on subscriptions by choosing the appropriate license metrics and hosting platform for a budget covering the initial contract length plus time to switch to an alternative.
·         Align the scope of the ITSM tool selection to I&O maturity by using the ITSM tool Critical Capabilities research to evaluate popular tools’ capabilities, user experience and overhead.
·         Assess vendor suitability as a partner by using the ITSM tool Magic Quadrant research to determine if a vendor has the strategy and stability to compete in the long term.
·         Communicate your issues and goals in an outcome-focused RFP that will encourage vendors to explain how their offering meets the organization’s unique needs.
·         Leverage existing customer references such as end-user reviews on Peer Insights to quickly gauge satisfaction with shortlisted products and vendors.
Strategic Planning Assumption
Through 2023, I&O leaders will overspend by $750 million on buying unused features of ITSM tools, up from $600 million in 2019.
Introduction
The most critical mistake I&O leaders make in their selection of an IT service management (ITSM) tool is not ensuring that it is aligned to their desired state of I&O maturity before determining the appropriate ITSM tooling strategy. Often, buyers of ITSM tools begin vendor evaluations by determining which vendors are market share leaders or positioned well in industry research analyses. This can be useful provided that the unique needs of the organization are met; but when I&O leaders invest in solutions that reach far beyond their current maturity, they become locked in to a costly and resource-intensive solution that they soon regret purchasing. I&O leaders must match the needs of their specific organization with a tool that not only will support current initiatives (at a level that makes sense), but also will enable improvement and growth. This research describes six steps that I&O leaders should follow to select an ITSM tool that will deliver value, is suited to their current needs and enables I&O improvements (see Figure 1).
Figure 1. Six Steps for Selecting an ITSM Tool
Six Steps for Selecting an ITSM Tool
ITSM tools are components of the experience management minisuite of IT operations management (ITOM) tools (see “IT Operations Management 2025: Shift to Succeed”), which focuses on improving the overall level of quality and efficiency with which the I&O organization supports business consumers. ITSM tools may optionally integrate with other tools from the automation minisuite or the availability and performance minisuite for deeper overall ITOM capability.
Analysis
Step 1. Determine Your I&O Maturity Level
I&O leaders should start all ITSM tools acquisition projects with two questions:
·         What is our current level of I&O maturity?
·         Where do we want/need to go with ITSM in the next three to five years? (That is, where do our business leaders want us to go?)
ITSM tool vendors typically use the size of an organization (either number of employees or annual revenue) to determine which solutions they feel are best positioned to meet their customers’ needs. But an organization’s roadmap to I&O maturity would be a better indicator of whether a solution matches its customer’s requirements. Evaluating maturity over size or revenue takes into account the tool features that your organization will leverage. This prevents less mature organizations from acquiring solutions that provide more functionality than they can optimize, and prevents more mature organizations from acquiring solutions that do not provide enough functionality to meet their needs.
IT organizations should use Gartner’s “IT Score for Infrastructure & Operations” to better understand the current, future and desired state of I&O maturity, and use that understanding to assist in the scoping of an ITSM tool. IT organizations can then determine which tool vendors align to their roadmap. IT organizations that fail to align their level of IT maturity with their next ITSM tool purchase run the risk of acquiring tools they do not have the ability to optimally utilize. Generally speaking, IT organizations at lower levels of process maturity should optimize investments by acquiring and implementing basic or intermediate ITSM tools. IT organizations at higher levels of maturity can optimize investments with ITSM tools that are part of larger ITOM suites (see Figure 2 and Note 1).
Figure 2. I&O Maturity Guides ITSM and ITOM Requirements for ITSM Tool Selection
I&O Maturity Guides ITSM and ITOM Requirements for ITSM Tool Selection
ITSM tools are classified, based on ITSM capabilities and integration with ITOM solutions, as follows:
·         Basic ITSM tools have some ITSM capabilities and limited integration with ITOM solutions.
·         Intermediate ITSM tools have good ITSM capabilities and provide some basic ITOM functions or integrate with intermediate third-party ITOM solutions.
·         Advanced ITSM tools have a full range of ITSM capabilities and provide broad ITOM functionality natively or integrate with advanced third-party ITOM solutions.
For Organizations at Lower Levels of Maturity
The acquisition and implementation of an ITSM tool are often in the first phase of an I&O maturity roadmap. The organization can leverage the out-of-the-box best practices that the solution provides as a means to begin standardizing processes. Organizations often use this as a mechanism to generate excitement about the project while washing away any remnants of previous failed approaches to IT service management and support.
Purchasing ITSM tools for these reasons introduces risks that can have a broad, magnified impact on the I&O organization. Failing to achieve visible and tangible results can quickly stall progress toward I&O maturity. For I&O organizations at lower levels of maturity, advanced ITOM capabilities — such as managing IT service views (via the configuration management database [CMDB]), modeling, capacity planning, and baselining historical analysis and SLA reporting — cannot be effectively leveraged. Purchasing ITSM tools suited to maturity levels beyond that of the organization’s own I&O maturity would expose these organizations to high license, implementation and maintenance costs.
At lower levels of IT maturity, a basic ITSM tool is the first step to gaining visibility and managing the IT infrastructure environment. At these levels, reacting versus responding is standard, ad hoc processes are the norm and customer confidence is low. At higher levels of I&O maturity, an intermediate or advanced ITSM tool accelerates the path to, or enhances the service-aligned relationship with, the other business areas. At these levels, industry best practices and SLAs are in place, and I&O is seen as a trusted service provider on the path to business alignment.
For Organizations at Higher Levels of Maturity
At higher levels of maturity, organizations will increase the probability of deriving value from solutions that offer tight integration of functions across process modules (for example, incident, problem and change management) if those processes are well established. ITSM tools have functionality that has been available for decades, but I&O leaders haven’t taken advantage of that functionality due to cultural and process limitations. I&O maturity assessments will better position organizations to develop roadmaps to address resource gaps in leveraging these integrations. When evaluating ITSM tools, I&O leaders need to reference their I&O roadmap to know how and when functional modules will be implemented and integrated. Acquiring an ITSM solution to leverage only incident and change management modules will result in higher costs (for licenses, maintenance and professional services) for lower utilization. For example, the 11% most mature I&O organizations are gaining efficiencies and service quality through standardization, automation, policy development, governance structures and the implementation of proactive, cross-departmental processes. At this level, the mature I&O organization is able to optimize cross-level processes that the other 89% of organizations have yet to put in place.1
It is important to differentiate between an organization’s current level of I&O maturity and the desired end-state maturity. In most instances, the I&O roadmap involves multiyear planning and must be aligned to current and future business-side objectives and customer needs. I&O organizations at lower levels of maturity should realize the low probability of adopting, formalizing and integrating incident, problem, change, configuration, release, availability and knowledge management within 36 months. Few IT organizations that purchase an ITSM tool will implement all available functions during the first 18 months. Service improvement momentum slows after tool implementation projects, and features that are unused during the first half of the agreement usually remain untouched for the second half.
I&O leaders frequently overbuy ITSM tools beyond their needs. Choosing powerful yet more complicated tools slows down service improvements and requires increased overhead. Through 2023, I&O leaders will overspend by $750 million on buying unused features of ITSM tools, up from $600 million in 2019.2
I&O leaders in organizations not already at, or imminently at, an advanced I&O maturity should select an intermediate ITSM tool to set a solid foundation for service improvements that may later justify the additional cost for an advanced tool.
Step 2. Compare Licensing and Hosting Platforms
There are more than 400 ITSM tools on the market,3 and prices vary from free or ad-supported basic tools to multimillion dollar, advanced ITOM suites. The core ticketing functions of ITSM tools are similar, so the major difference between many of the basic offerings is price.
To keep the market insensitive to this, vendors want it to be difficult to compare solutions. Although we don’t recommend choosing an ITSM tool based on price alone, you must understand the common pricing structures when beginning a procurement exercise.
ITSM tool vendors have their own models for named (or “fixed”) and concurrent (or “floating”) licensing for both perpetual and SaaS/subscription purchases (see “Improve Deal Value and Optimize Costs Through Better Analysis of Software and SaaS Pricing Metrics”). I&O leaders must determine the correct balance of named and concurrent seats by analyzing patterns of use, as well as the numbers and types of users.
More detail on these tool license metrics is provided in Table 1.
Table 1: ITSM Tool License Metrics
Enlarge Table
·          
License Type
Description
Named User (Fixed)
Called “fixed-user pricing” by some ITSM tool providers, named-user pricing for ITSM tools enables a specific person to access the functionality of the software. These licenses are usually nontransferable other than on a one-time, permanent basis. Used alone, this model requires every user who needs to access ITSM application functionality to have a named-user license. When users leave the company or no longer require access to the ITSM system, their licenses should be released and reallocated to new staff members (see “How to Recycle Licenses to Optimize Software Costs”). Not all vendors permit license transfers, so confirm the possibility and conditions for this at an early stage of negotiations.
Concurrent User (Floating)
Concurrent, or “floating,” user licenses are shared across a pool of users. This works well for shift systems, in which users access application functionality across different time zones. When the number of concurrent users reaches the maximum number of licenses, each additional user may be denied access to the system. Concurrent user definitions almost always relate to maximum simultaneous access, rather than average, so calculate your requirements carefully.
Ratios of users per concurrent license typically range anywhere from 1-to-2.5 to 1-to-5, depending on the size of the organization, the types of users and the operating hours. ITSM tool vendors tend to calculate the license ratio of one concurrent license to three identified users (1-to-3) when they establish pricing. Your own ratios may differ from this, so use your estimated ratios when selecting the optimal license metric. If you have usage data from an incumbent ITSM system (see “Five Ways to Save Money and Reduce Risk With Your IT Asset Management Tools”), software asset management (SAM) tools can aid in identifying a suitable ratio.
Source: Gartner (November 2019)
Most (but not all) ITSM tool vendors allow different mixes of user metrics, and that offers the most efficient mix for the majority of organizations. Frequent and important users should have named licenses. The remaining users should share the pool of concurrent licenses. For example, suppose an organization has 250 users: 100 are frequent users (for example, the IT service desk) and 30 are important but infrequent users. This organization, therefore, will require 130 named licenses. The 120 remaining users can share 40 concurrent licenses, using the rule-of-thumb ratio of 1-to-3 (see Figure 4).
Figure 3. Example of ITSM Tool License Distribution
Example of ITSM Tool License Distribution
License Terms
Table 2 describes the three ITSM tool license terms: perpetual, subscription and enterprise license. Calculate the long-term costs before choosing between these models. Consider enterprise license agreements (ELAs) only if the volumes are high and significant flexibility is required.
Table 2: ITSM Tool License Terms
Enlarge Table
·          
Type
Description
Perpetual
Perpetual licensing gives the licensee the right to deploy and access the functionality provided by the specific version of ITSM software forever (that is, without any time restriction). For some ITSM tool vendors, this will be a right to deploy and access just the version purchased. For others (often if maintenance is continuously purchased), it may mean the right to deploy and access the latest version of the functionality. Even if maintenance is terminated, customers retain the right to deploy and access the latest version available during the support and maintenance contract period.
Subscription
Subscription fees are usually provided on a per-user, per-month basis, even though, typically, they are payable annually in advance. Basic maintenance and support is included in the user fee. Higher support service levels (that is, premium support) may be purchased at an additional cost. Many ITSM tool vendors offer discounts when subscriptions are purchased for a minimum of three years.
No permanent rights to the software are acquired. You would be renting the temporary right to access certain services for a certain number of people. Distribution/use rights for your own managed service providers and contractors needing access should be included in the subscription provision and, therefore, would need to be removed if those partnerships are terminated.
Subscription models carry the risk of “lock in” when organizations fail to prepare an exit strategy that allows for a migration to another tool before the agreement lapses. Access to the application is removed immediately after the subscription ends (unlike perpetual licenses, which permit access even if support and maintenance is no longer provided). I&O leaders who leave ITSM tool subscription renewal negotiations to the last minute find they are forced to renew subscriptions at uncompetitive prices. One-year extensions at higher prices are a commonly forced necessity when the tool is no longer desired because it is almost impossible to completely transition to a replacement ITSM tool from another vendor before the incumbent subscription lapses. This makes the option of staying with the incumbent, yet unsuitable, tool for a further three years appear more favorable. An ITSM tool that is used beyond IT (i.e., for enterprise service management) needs an even longer exit plan, and the lock-in effect is exacerbated.
Enterprise License Agreement
ELAs are designed to cover the entire licensing requirement of an organization, regardless of size and changes in usage over time. This model can conceal costs and is more suitable for organizations that need at least 4,000 user licenses for ITSM, and for whom the volume and distribution of licenses is expected to vary considerably. Watch out for bundling of add-ons and non-ITSM components inflating the final cost.
Few I&O organizations need more than 3,000 ITSM tool licenses, but many are enticed by seemingly low pricing per license. Although the cost of a single seat may appear to be low, vendors set a high-volume requirement to secure this pricing. This improves vendors’ profit margins if customers overbuy and underuse. The I&O leader will bear that risk, which offsets any savings for most organizations.
Source: Gartner (November 2019)
Hosting Platforms
Of the three common hosting platforms for ITSM tools (see Table 3), SaaS is currently the most popular choice for I&O leaders (although many have no preference). Some organizations with regulatory or security considerations will opt for on-premises, but such cases are becoming less common as more industries that previously were restricted from using cloud-based services are now buying ITSM tools via SaaS.4
Table 3: ITSM Tool Hosting Options
Enlarge Table
·          
Hosting
Description
On-Premises
The ITSM tool is hosted, funded and managed by the customer at its own location.
This option typically involves perpetual licensing, but some ITSM tool vendors are now offering subscription pricing for on-premises implementations. Where on-premises subscriptions are a factor, IT organizations must build and fund the hosting platform as per perpetual licensing. But there is no large upfront fee or separate ongoing support and maintenance charge. Like SaaS, the right to access and use the software is revoked if subscription payments are not made. At present, too few products use this license model to build a long-term generic pricing model.
SaaS
The ITSM tool is hosted by the vendor and access is provided through subscription. There should be a single SaaS contract, with the vendor taking ultimate responsibility for the deliverable — not a license agreement stapled to a hosting agreement.
Classic SaaS subscription metrics are named seats, but many ITSM tool vendors also offer concurrent seats. Although the application is provided “as a service,” the vendor is responsible for the hosting platform and operating system. Management and configuration of the tool itself (such as workflow or portal design) fall to the customer.
Outsourced Hosting
The ITSM tool is hosted by a third-party service provider, and the tool is managed by you not by the tool vendor or a managed service provider (as part of ITSM or service desk outsourcing).
This type of platform is increasingly rare for ITSM tools, although some vendors, such as Broadcom (formerly CA Technologies) and Micro Focus (formerly Hewlett Packard Enterprise), offer this via partners in lieu of a SaaS solution.
Source: Gartner (November 2019)
Pricing
Table 4 shows typical pricing for advanced ITSM tools, including capabilities for CMDB, discovery and reporting. Note that concurrent licenses are more expensive per unit, but are comparable in price to named licenses when shared by multiple users at a ratio of 1-to-3.5
Table 4: Trimmed Mean Average Pricing for Advanced ITSM Tools
Enlarge Table
·          
License Type for 300 Users
Average List Price (USD)
Typical Discounted Price (USD)
Named SaaS
$88 per user per month
$72 per user per month
Concurrent SaaS
$246 per license per month
$177 per license per month
Named perpetual
$2,026 per named user
$1,660 per named user
Concurrent perpetual
$4,439 per concurrent license
$3,640 per concurrent license
Source: Gartner (November 2019)
Basic and intermediate ITSM tools will be less expensive. Some basic tools are very low cost, with some vendors providing free or ad-supported access for small businesses that need fewer than 10 licenses.
There is insufficient data to determine a typical price for an enterprise licensing agreement, as those are relatively rare and highly variable for ITSM tools. We recommend that you divide the total cost of any ELA proposal by the actual number of expected users (not the total potential number provided by the vendor) to determine the cost per user per month. Gartner analysts can provide further guidance on an inquiry call.
Subscription pricing (such as SaaS) seems less expensive initially. Because SaaS models include hosting and maintenance in the price, it can seem more predictable and simpler to budget for them. In reality, the ongoing nature of the fees, combined with price increases at renewal and a number of hidden costs, eventually overtakes the ongoing costs of on-premises models (see “Toolkit: Minimize SaaS Risk and Cost Using This Toolkit to Efficiently Negotiate Optimal SaaS Contract Terms and Conditions”). Figure 4 shows how, on average, SaaS pricing becomes more expensive than perpetual on-premises license pricing within five years and, in many cases, within two years. This timeline is shortening as more deals are done on SaaS subscriptions and fewer are done on on-premises perpetual licenses. Prior to 2019, the crossover point between these two common pricing models was just before Year 3.
Figure 4. Cost Comparison of SaaS ITSM Subscriptions vs. Perpetual ITSM Licenses
Cost Comparison of SaaS ITSM Subscriptions vs. Perpetual ITSM Licenses
The data above considers net present value with a 10% cost of capital or discount rate (provided as an example). This should benefit the subscription model because capital needed to pay for Year 2 and Year 3 of the agreement can be invested elsewhere until payment is due. Further discounts can be achieved by paying for the whole term upfront. However, this means those funds cannot be leveraged for investment for other business activities, and the organization loses the benefit of treating the ITSM tool as an operational expense versus a capital expenditure.
Add-Ons
Some vendors do not include all of the possible extended functionality as part of the base cost. Those that quote only for the base tool appear cheaper in the short term but will probably cost more in the long run if you end up purchasing add-ons later. Add-ons required to meet an advanced ITSM use case increase the total ITSM tool cost by an average of 82%.5,6
Common ITSM tool add-ons include:
·         Live chat
·         Remote control
·         Chatbot or virtual support agent
·         Analytics and extended reporting (business intelligence)
·         Premium integrations and orchestration packs
·         Discovery tools for configuration management database (CDMB)
·         PC and mobile endpoint management
When evaluating ITSM tool pricing, I&O leaders must obtain the prices of all included features, as well as any add-on features needed to meet their needs for the next three years, even when not buying/using immediately. Obtain quotes for desired future purchases to include in your vendor evaluation. This is not an excuse to buy add-ons that you don’t need! Paying for features that are not utilized produces no return. The same applies to buying add-ons now in hopes of using them later. This is especially true in subscription deals where the value is only realized at the point the feature is consumed. There is zero advantage to getting a cheaper deal for an add-on that won’t be used until months or years later — if ever.
Step 3. Use a Critical Capabilities Approach to Evaluate Popular ITSM Tools
The Gartner Critical Capabilities research is a companion to the Magic Quadrant research. The ITSM tool Critical Capabilities research analyzes product functionality based on a set of use cases that match client deployment scenarios and maturity, while the Magic Quadrant positions vendors in the ITSM market. Critical Capabilities research enables organizations to get the most value from Gartner’s analysis based on their unique business and technology needs.
Gartner Critical Capabilities research evaluates popular tools that have proved to be of interest to Gartner clients; but do not limit your search to these products.
Many local and smaller vendors could be a good fit for your organization but may not yet have created enough awareness and momentum to meet the inclusion criteria for this research. And it’s possible that a highly rated vendor in a Magic Quadrant could have a low-ranked product or service in a Critical Capabilities use case, as even leading vendors can produce products or services that miss the critical needs of the market. Conversely, it’s possible that lower-rated vendors in Magic Quadrants could struggle to make their businesses thrive, yet they produce a tightly focused and highly targeted product or service that outranks all other vendor offerings. The purpose of Critical Capabilities research is to provide an assessment framework for rating vendor offerings.
Critical Capabilities research evaluates ITSM tools on incident, request, change and configuration management, as well as other capabilities shown in Figure 6, plus AITSM facets (see “2019 Strategic Roadmap for IT Service Management” and Note 2), overhead, and user experience and flexibility.
Figure 5. Classification of ITSM Tools
Classification of ITSM Tools
Choose a Critical Capabilities use case based on your I&O maturity and digital workplace needs from the following options:
·         Basic maturity I&O
·         Intermediate maturity I&O
·         Advanced maturity I&O
·         Basic digital workplace ITSM
·         Advanced digital workplace ITSM
These five use cases best align with market requirements by balancing the weighting of Gartner’s evaluation of capabilities critical to ITSM tools. These can be customized to better suit your own requirements (for example, by increasing the weight of knowledge management and decreasing the weight of total cost of ownership). Note that the option to create client-customized Critical Capabilities content is intended to give you relevant insight into a market, product or service, but does not represent Gartner’s view.
This research is produced annually and covers ITSM tools that are in production as of March of each year (subject to change); but many leading vendors produce one or two major updates each year. Check the version reviewed, and seek updates from the vendors and Gartner analysts as new product updates are made available.
To gain further insight on how best to use this research for your particular scenario, see “How Products and Services Are Evaluated in Gartner Critical Capabilities” and schedule an inquiry with a Gartner analyst.
Step 4. Evaluate Vendors’ Strategies and Stability
Magic Quadrant research analyzes a market and can help focus your search on important criteria. However, it does not provide the details needed during the vendor selection process to align your requirements to a particular vendor. Nearly two-thirds of Gartner clients who use Magic Quadrant research have not read the companion Critical Capabilities research. Additionally, client interactions have revealed that many I&O leaders do not realize that the Magic Quadrant research is about ITSM vendors’ positions in the market, not their tools.
Do not start an ITSM tool selection with the Magic Quadrant. Begin by focusing on your own use case, and use the Critical Capabilities to learn how tool features align with your specific requirements.
Magic Quadrant inclusion and evaluation criteria are based on global market position over tool features. Factors such as global strategy may not be key for I&O leaders operating in a single country or region. Sales and marketing performance help to understand the vendor’s momentum, but do not guarantee a good fit for a single I&O organization. Use the Magic Quadrant research to learn about a vendor’s competitiveness and focus to gain assurance that it has a solid ITSM strategy and the stability to compete beyond the short term.
To gain further insight on how best to use Magic Quadrant research for your particular scenario, refer to “How Markets and Vendors Are Evaluated in Gartner Magic Quadrants” and schedule an inquiry with a Gartner analyst.
Step 5. Redesign Your ITSM Tool RFP
I&O leaders preparing to select ITSM tools typically compile a large list of requirements from multiple IT stakeholders and then add generic ITIL process references. They use this approach because they are unable to specify which features and capabilities are vital to their business. This RFP approach results in a long list of technical questions that solicit similar answers from each bidding vendor and does very little to distinguish among offerings.7 Requirements that loosely reference common ITIL processes are often added, even if the organization is not ready to implement them. This approach frequently results in the selection of a vendor and product based on criteria that are not important to the organization. In addition, it may result in the organization paying for features that won’t be used.
Gartner analysts have also encountered prospective buyers reusing templates or the RFP from a previous selection process. This almost certainly means that the I&O leader has not examined the organization’s current needs or growth requirements. ITSM tool purchasing behavior trends indicate that, through 2023, I&O leaders will overspend $750 million on buying unused features of ITSM tools, up from $600 million in 2019.
Ensure that your RFP fits your use case, focuses on outcomes and emphasizes value. Share your vision with vendors by identifying the issues and goals that you need an ITSM tool to address and achieve, and by being candid about your current capabilities. This approach will help you identify a solution that suits both the organization’s current needs and the processes you plan to implement in the near future.
Perform a MoSCoW Analysis to Distinguish Crucial Requirements
Because many vendors respond to lengthy checklist-style RFPs with almost identical, boilerplate answers, slight differences in replies tend to have a disproportionally large impact on the final scores. Ensure that your technology selection isn’t based on unimportant requirements by asking vendors to complete a prequalification questionnaire containing only your “must haves.” Also, distinguish crucial requirements from nice-to-have features by performing a “must have, should have, could have, won’t have yet” (MoSCoW) analysis during the definition phase (see Figure 6).
Figure 6. Categories of a MoSCoW Analysis for ITSM Tool Features
Categories of a MoSCoW Analysis for ITSM Tool Features
Treat must-have requirements as pass-fail criteria. If a vendor cannot meet these requirements, you should remove that vendor from consideration, regardless of how successful it may be in other categories. The vendor should confirm if these requirements can be met “out of the box” without add-ons or customization. If a vendor claims it can satisfy your must haves without customization, acquire proof before letting that vendor pass to the next stage.
After you have determined your must haves, limit your should haves to less common functions and important, but not crucial, capabilities. I&O leaders typically place too much attention on commoditized ITSM tool features such as:
·         Tool generates a unique ticket number for each incident
·         Tool can create a problem ticket from an incident
Such less common functions are more likely to be unique to your organization or industry. Consider the following examples:
·         Mobile business user location can be determined dynamically so that the tool can automatically assign the closest on-site engineer at the time of the issue.
·         The tool should provide a dashboard that enables support staff to prioritize incidents from a mixture of phone calls from standard users and appointment requests from doctors so the appointments take priority.
Concentrating on specific, noncommoditized functions will separate vendors further.
Share Your Vision, Issues and Goals With Vendors
ITSM tool vendors won’t understand how to tailor their offerings to your IT organization’s needs unless you:
·         Communicate your organization’s progress through the various phases of IT maturity
·         Inform vendors of your issues and goals
For example, if you are using Gartner’s “IT Score for Infrastructure & Operations” as a model for improving maturity, communicate your current level to vendors. Then explain your goal for moving to the next level. To flesh out your story:
·         Focus on specific strengths associated with organizations at higher levels of maturity (for example, effective problem management processes or strong release management programs).
·         Provide a few examples of use cases to give vendors more context and a better chance to test their solution’s suitability.
Identify the goals that you want a new ITSM tool to help you achieve. Ask vendors to explain how their product will help you reach your goals. Be candid about your current capabilities and maturity.
Most ITSM tool contracts and subscriptions are for 36 months, so ask for a solution that suits both your current needs and your proposed changes — that is, the processes you plan to implement during the next 18 months. This approach can prevent overinvesting in features that may not be used before the next renewal.
Consider your reasons for switching from your existing service desk tool, and ask vendors to explain how their product won’t result in similar limitations and complaints. For example, if you are seeking to reduce problem recurrence, the vendor could show how its solution would capture trending information and identify potential root causes more effectively than alternative offerings.
This approach helps foster a longer-term relationship with the vendor, in which the vendor takes some responsibility for the solution. It also creates an opportunity to tie renewal conditions and exit clauses to meaningful system performance. Vendors that are not prepared to do this are identified quickly, giving you early insight into how they would behave after a deal is done.
Step 6. Leverage Existing Customer References
The experiences of existing customers using ITSM tools on your shortlist are an essential information source. ITSM tool vendors typically will provide references primarily from satisfied customers, but even happy customers are able to provide useful feedback. Ask vendors for references with circumstances similar to your own (such as country/region, industry and I&O maturity level). Ask about the experiences with the vendor as well as the software itself.
Gartner analysts can share aggregate and anonymized commentary on particular ITSM tools and vendors based on feedback from clients during inquiry.
Gartner’s  Peer Insights currently includes more than 9,000 verified end-user reviews of ITSM tools from 43 vendors.8 These reviews do not represent Gartner’s opinion, but they are primarily useful for:
·         Sourcing additional customer references beyond those nominated by ITSM tool vendors
·         Discovering additional ITSM tools and vendors that, for various reasons (such as smaller market share, operating in just one geographic region or less often sought after by Gartner clients on their shortlists), are not featured in the Magic Quadrant or Critical Capabilities research
When using Peer Insights as a customer reference tool, note that the volume of reviews is indicative of the evidence base not the level of customer satisfaction. Some vendors have multiple products, and the vendor score is affected by all of those combined, so dig deeper. Look at Peer Insights from a critical perspective rather than an appreciative perspective. This means, rather than focusing on the great things said about a particular vendor, you should try to look for challenges with the product, implementation and support. Look for reviews by companies of a similar profile to yours (such as size or vertical industry sector) and reviews by people in roles similar to yours. Also consider how long they have been using the product to understand how mature the implementation of that tool is likely to have been in that organization. The review source will also show how the review was left and if a gift was provided in exchange for the review. These gifts are of nominal value — similar to those distributed for free at events. We have observed that the review source and offer of a gift has not affected the likelihood of a positive or negative review.
Gartner clients also can ask other I&O leaders for references via Peer Connect. Examples include this  Peer Connect discussion or this  Peer Connect discussion.
Acronym Key and Glossary Terms
MoSCoW
MoSCoW is a mnemonic that stands for “must have, should have, could have, won’t have yet” (the lowercase o’s have no representative significance). It is a business analysis technique used to categorize the priority of requirements in a project. The technique was developed by Dai Clegg of Oracle U.K. Consulting for rapid application development (RAD) projects in 1994, and is now officially part of the dynamic systems development method (DSDM).
Evidence
1 ITSIO 2019: 89% of Gartner clients that completed an IT Score for I&O assessment up to June 2019 scored an overall maturity level of less than 3.
2 Gartner has tracked ITSM tool pricing from leading and popular ITSM tool vendors, including the percentage charged for add-ons in addition to the base ITSM tool, since 2017. The data used for this analysis was acquired from 18 leading ITSM tool vendors, including all of the providers that participated in the “Critical Capabilities for IT Service Management Tools” and “Magic Quadrant for IT Service Management Tools.”
Gartner has also observed that 89% of I&O organizations have not reached a state of I&O maturity advanced enough to fully utilize all the add-ons and extensions that they are purchasing or subscribing to. Even though many organizations do get value from some add-ons (such as discovery for CMDB), Gartner estimates that more than half of additional features purchased by basic and intermediate maturity organizations fail to be fully deployed. By tracking these factors alongside rising annual revenue from the ITSM tools part of the experience management market, Gartner has identified that this waste translates to an overspend in 2019 of $600 million rising to $750 million in 2023.
Note: This analysis is based on ITSM tools and features only and does not cover any investment in tools and products outside of ITSM and ITOM (such as so-called enterprise service management aspects like HR, facilities and application platforms). Additional overspend on those areas is likely and probably extensive.
3 Listly’s  “Helpdesk Tools for ITIL & Service Management,” as of August 2019, shows 446 products. Although some are duplicates, Gartner has encountered products that are missing from that list.
4 Less than 2% of Gartner clients have restricted their shortlist to on-premises ITSM tools in over 1,400 client inquiries on the topic of ITSM tools since July 2017.
5 The data used for this analysis was acquired from 18 leading ITSM tool vendors, including all of the providers that participated in the “Critical Capabilities for IT Service Management Tools” and “Magic Quadrant for IT Service Management Tools.”
Pricing information provided to Gartner by these ITSM vendors is at list pricing of ITSM tools for 300 concurrent licenses or 100 fixed licenses on both SaaS and perpetual terms, where available. These offerings include CMDB and reporting features. Actual prices offered by vendors will vary according to the size of the deal, market conditions, and other optional add-ons or complementary products included in the deal. Schedule an inquiry with a Gartner analyst to discuss specific pricing deals.
Pricing information from smaller vendors with lower-capability ITSM tools was not included. This includes products that have basic ITSM capabilities only, such as incident ticketing.
6 To demonstrate the requirements of the advanced ITSM use case in the ITSM tool Critical Capabilities research, the average cost increase of all the add-ons offered by vendors (over the base license or subscription cost of the ITSM tool) ranged from 36% to 113%. The average across six modes of license was 82%.
7 When Gartner analysts have provided advice on the subject of ITSM tool RFPs in the past 18 months, requirement lists have ranged from 60 to 600 line items. At least half of these RFPs contained more than 300 line items.
8 9,355 reviews as of 28 October 2019.
Note 1Levels of ITOM Minisuite Integration
Manual import/export: Data is shared by exporting to files such as comma-separated values (CSV) files.
Custom connectors: Data is shared through connectors that are built by the vendor by request, usually for a fee.
API: Data is shared through generic API interfaces as long as the other tools and sources also support the same protocol.
Prefab connectors: The vendor supplies a prebuilt and prepared connector to specific external sources.
Native to the platform: The ITOM functionality is provided by the ITSM tool vendor, either within the ITSM tool itself or via partner products and add-ons.
Note 2AITSM
AITSM is the optimization of ITSM practices to enable the application of context, assistance, actions and interfaces of AI, automation and analytics on ITSM tools to improve the overall effectiveness, efficiency and error reduction for I&O staff.
The four domains are:
·         Context: Structured and unstructured data that can help both humans and “robots” better understand a situation and make informed decisions on how to respond.
·         Assistance: Analysis of the context and further information to provide recommendations that speed response of the human operating the process.
·         Action: Automation of the ITSM process in the ITSM tool or virtual support agent/chatbot. This includes updating of data sources so that context and assistance are subsequently improved.
·         Interface: The outcomes of these domains will often enable automation, deployment and healing activities delivered by external tools, most typically from AIOps solutions (for ITOM tasks such as event management, monitoring or orchestration), but sometimes by the ITSM tools themselves.



No comments:

Post a Comment

Describe BIOS and UEFI

  BIOS (Basic Input/Output System) and UEFI (Unified Extensible Firmware Interface) are firmware interfaces responsible for initializing har...