The acronym SIAM stands for Service Integration And Management, and it is a hot topic in the world of IT Service Management…..but why? Service integration models have been around awhile, but are evolving from the challenges of managing a small number of large service partners to a model of managing a larger number of smaller partners. As the services and businesses become more critical or complex, the level of service integration becomes deeper. SIAM builds on the ITIL framework, and expands it.
What is SIAM?
- According to Wikipedia: “Service integration and management (SIAM) is a framework for managing multiple suppliers of information technology services and integrating them to provide a single business-facing IT organization.”
- The UK Government defines it as “Service integration and management lets an organization manage it’s service providers in a consistent and efficient way, making sure that performance across a portfolio of multi-sourced goods and services meets user needs.”
- Kevin Holland, ITIL expert is a bit more specific “Service Integration and Management(SIAM) is both a model and a function which provides a single point of accountability for the service management and delivery of all services provided by internal and external service providers, by taking responsibility for and assuring suppliers performance , coordinating delivery, integration , and interoperability across multiple providers, and providing the necessary governance on behalf of the users.”
Essentially, it is about keeping (or recovering) control – IT organizations use more and more external support providers today, and managing these relationships is getting more complex. SIAM might be the answer to this challenge, because it is all about how IT will deliver the capability to achieve end-to-end service excellence in an increasingly complicated environment by actively managing all aspects of service performance. Basically, it supports businesses by helping them get the most out of their outsourced and externally managed services.
Why is SIAM important now?
SIAM is in the spotlight of the key analyst groups, Forrester and Gartner. Spending on external and internal IT services is higher than ever; However, according to Gartner’s 2014 key metrics survey, only 11% of respondents say that they have mastered their approach to sourcing, and 89% need to improve competencies and significantly raise their maturity levels in order to manage multi-sourcing successfully. (Source) These metrics show large future potential for SIAM.
If you decide to research SIAM further, keep in mind that SIAM is sometimes referred to as MSI (Multi-sourcing Service Integration)
Are you using or considering a SIAM framework? I would love to hear your thoughts.
Tags: ITIL, ITSM, MSI, multi-party support, Multi-sourcing, service integration, service management, SIAM
Recently I was speaking to someone (Mike from New Jersey) at Cisco Live and they were raving about their journey to the Flexpod. They were seeking the best compute, networking and storage yet didn’t want to be boggled down with details when it came to the purchasing process. Converged systems like this are relatively new, and honestly Read More »
Tags: FlexPod, UCS
Do any web search on the inhibitors of moving to cloud and you’ll find a primary challenge rises to the top—business risk. The benefits of cloud often outweigh risks, which is why more and more business information is being shared in the cloud. In fact, 50% of Global 1,000 companies will have customer data stored in the public cloud by 2016 according to Gartner.
The rapid transition of critical data into the cloud and the use of SaaS for business processes mean that organizations need to have a solid approach to manage the business risks of cloud. We have worked closely with customers and Cisco’s own IT department to identify some initial steps that organizations can put in place to mitigate the risks of cloud services with IT governance.
Revise how your company data classification system applies to cloud services.
Businesses typically have already established a tiered classification system including private, confidential, public, etc. This system needs to be revised to detail what and how information should be shared in the cloud. These policies also need to take into account any regulatory or compliance requirements.
Communicate an employee policy specific to cloud service usage.
Recently, I was speaking with a large healthcare provider about what policies they had that outlined what employees could share in the cloud. The customer’s IT group believed that a general company code of conduct safeguarded them. However, as the conversation progressed they realized that their current policies were not explicit as to how this applied to cloud.
Employee policies need to clearly outline what can and cannot be shared with approved corporate cloud vendors. For example, even though a vendor like Salesforce.com or Box.com might be approved, an organization may not want certain confidential information to be shared with an outside vendor. Additionally, these policies also need to address personal use of cloud services (file sharing services, for-free email accounts, etc.). These policies need to be periodically communicated to employees as well as how their actions might be monitored to ensure compliance.
Discover and determine the risk profile of shadow IT.
According to a recent Forrester study, 43 percent of respondents believed shadow IT practices were major threats to their respective organizations. It is critical to discover and classify the services being used that have not been approved by IT. Once identified, there are typically three approaches to handling the risks of shadow IT.
1) Assess and onboard critical cloud applications.
2) Block risky cloud applications with secure web gateways or data loss prevention solutions.
3) Monitor applications and as-a-service usage with alerts for unusual activity.
Establish a data security assessment process for new cloud services.
A vital way to ensure that business data is kept safe is to have a thorough risk assessment process as cloud vendors and services are brought on-board. This process should take into account the following five elements:
- Initiation – Establish what elements of your business a vendor will be involved in and what data will be shared with the vendor. Will they handle confidential/private information or only public data?
- Data encryption and integration – Test the encryption of data as it passes from the organization to the vendor as well as how the data will be stored at the vendor’s data center. Understand how a vendor would integrate with your systems (creating single sign-on, pull corporate data, etc.).
- Vendor data security policies – Can the vendor uphold the policies for protecting your corporate data based on the classification system defined above, and do so the same way or better than your IT department would? Evaluate the vendor’s disaster recovery plan, compliance and regulatory processes, and identity and access controls.
- Vendor stability and proprietary policies – According to Gartner, 1 out of 4 cloud service providers will be out of business in two years. This is largely due to financial instability or acquisitions. Businesses need to ensure that vendors they choose to work with are financially stable. Find out how the vendor would handle your data in the event of a business closure or acquisition. Additionally, do they use a proprietary technology approach that might lock you into using them? Insist that vendors use an open source approach that would help you transition to a new vendor if an SLA was not met or if the vendor was acquired or went out of business.
- Ongoing vendor monitoring – Establish a process to regularly review vendors (annually for those dealing with business critical processes, less regularly for those with less impact).
These are some initial steps to managing the business risks of cloud. However, businesses that are looking to reap the benefits of cloud and avoid risk must put in place a lifecycle approach to manage cloud services.
We recently introduced Cloud Consumption Optimization, an annual subscription service that helps customers govern their cloud adoption from end-to-end and continually monitor cloud use. Learn more about how we can help you govern cloud and manage cloud risks at http://www.cisco.com/go/cloudconsumption
Tags: Cisco Cloud Services, cloud, services
Cisco has a broad base of data center customers with a diverse set of requirements and we meet their needs with Nexus -- the most comprehensive switching portfolio in the industry. This week, we are making announcements for both the Nexus 9000 series and the Nexus 3000 series that provide design and deployment flexibility for our commercial, enterprise, service provider, as well as cloud customers. Key points of the announcement include:
- ACI (Application Centric Infrastructure) is shipping this month;
- Additional linecard and chassis options provide customer choice and flexibility;
- 100G linecards for the Nexus 9500 will be available in Q4CY14 and will offer the highest density in the industry; and
- New starter kits and bundles help customers ease transitions.
The Nexus 9000 Series
ACI is shipping this month
The Nexus 9000 series can operate in standard NX-OS mode or in ACI mode. In either case the Nexus 9000 portfolio delivers the value of the “5 P’s” of Power efficiency, Price, Port density, Performance, and Programmability. NX-OS mode provides customers with the value of the NX-OS operating system used by tens of thousands of customers in data centers around the world. ACI mode adds to NX-OS capabilities by providing an application driven policy model, integration of hardware and software, and centralized visibility, among other things. ACI requires a controller and switch software. Both are shipping this month. It is important to note that the pricing for this solution is simple and predictable. There is a perpetual license for each leaf switch. Other pricing approaches in the industry are monthly and are based on varying elements like number of VM’s. Comparing the two approaches is somewhat like comparing a cell phone bill that is either flat rate or usage based. Personally, I like the simplicity and predictability of flat rate. See The Future of Networking, as well as SDN and Beyond for additional details on new ACI announcements and how they can take you beyond SDN.
Additional linecard and chassis options underscore flexibility
We’ll consider how flexibility is delivered for both modular and fixed platforms. For modular switching, the Nexus 9500 modular chassis family offers different line card options that can be mixed in the same chassis and allow customers to “dial up” or “dial down” their design based upon the price, performance, feature set, and scale they want to achieve. There are basically 3 different ‘flavors’, all of which are now shipping:
- The Nexus 9500 X9400 set of 1/10G and 40G line cards are based on merchant silicon and provide industry-leading price and performance compared to other merchant silicon switches. These provide a very cost effective solution ideal for traditional modular data center designs.
- The Nexus 9500 X9500 set of 1/10G and 40G line cards are sometimes referred to as “merchant plus” because they have custom Cisco ASICs, in addition to merchant silicon, and are ideal for customers that need performance together with additional buffering and VXLAN routing capabilities. The X9500 line cards can be used in future ACI designs as well.
- The Nexus 9500 X9600 set of 40G line cards provide performance without compromise even for small packet sizes.
The Nexus 9300 series offers ACI capabilities (ala the X9500 linecards in item 2 above) in a fixed form factor. For customers interested in a merchant only fixed form factor, we offer the Nexus 3000 family. This week, we announced the new Nexus 3164, which provides 64 ports of 40G and is a great solution for 40G access or space constrained aggregation.
We are also announcing 100G linecards that we believe will deliver industry leading port density of up to 128 ports of 100G in a single chassis. 100G for both the X9400 and X9600 series will be available for the Nexus 9500 in Q4CY14. Cisco will offer an 8 port 100G X9400 line card and a 12 port 100G X9600 line card.
New starter kits and bundles ease transitions
There are numerous packages available to ease transitions -- from 1G to 10G, 10G to 40G, or from traditional networks to ACI. There are 2 bundles I want to quickly call out. The first provides a smooth transition for customers with older End of Row Catalyst 6500’s in their data centers. It occupies the same rack space and uses the same cabling as they currently have, but provides 10X the performance. The second is basically an ACI starter kit, providing the APIC, spine switches and leaf switches, even optical cables – everything required to set up and get started with an ACI pod.
In summary, Cisco is continuing its rapid pace of innovation and execution around ACI and data center switching overall. Ultimately, this means customers gain choice, flexibility and true innovation to support their business needs.
Tags: ACI, application centric infrastructure, Cisco, cloud, data center, data center switch, network, networking, nexus, Nexus 3000, Nexus 9000, SDN, switch
In part one of this series we covered the internals of HDDs, in part two we went over the internals of SSD, In part three we continue reviewing storage concepts to refresh or learn the right lingo.
Lets start by understanding “Redundant Array of Independent Disks” (RAID). There are RAID levels like RAID0 and RAID1 that are easily to understand and others like RAID5 and RAID6, which many sysadmins misunderstand.
Redundant Array of Independent Disks (RAID)
In the past RAID was also referred as a “Redundant Array of Inexpensive Disks”. At the end of the day Read More »
Tags: RAID, UCS