Reference Hub2
Towards an Agile and Secure IT Service Management

Towards an Agile and Secure IT Service Management

Sahid Abdelkebir, Yassine Maleh, Mustapha Belaissaoui
ISBN13: 9781522553939|ISBN10: 1522553932|ISBN13 Softcover: 9781522588429|EISBN13: 9781522553946
DOI: 10.4018/978-1-5225-5393-9.ch005
Cite Chapter Cite Chapter

MLA

Abdelkebir, Sahid, et al. "Towards an Agile and Secure IT Service Management." Global Information Diffusion and Management in Contemporary Society, edited by Zuopeng (Justin) Zhang, IGI Global, 2019, pp. 125-152. https://doi.org/10.4018/978-1-5225-5393-9.ch005

APA

Abdelkebir, S., Maleh, Y., & Belaissaoui, M. (2019). Towards an Agile and Secure IT Service Management. In Z. Zhang (Ed.), Global Information Diffusion and Management in Contemporary Society (pp. 125-152). IGI Global. https://doi.org/10.4018/978-1-5225-5393-9.ch005

Chicago

Abdelkebir, Sahid, Yassine Maleh, and Mustapha Belaissaoui. "Towards an Agile and Secure IT Service Management." In Global Information Diffusion and Management in Contemporary Society, edited by Zuopeng (Justin) Zhang, 125-152. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-5393-9.ch005

Export Reference

Mendeley
Favorite

Abstract

To support transformational business changes, IT must streamline the top-down process of new IT processes. In the ever-changing business world of today, no one knows what is around the corner, and to improve agility is the best way to organize to the test of the future. By defining IT maturity in your organization, you can map a route to successive levels of maturity and improved agility to reach a point where IT contributes to the execution, growth, and rapid transformation of the business. A successful IT service and asset management need to be efficient and agile to help transform from a traditional into a digital enterprise. In this chapter, the authors propose a global and practical strategic framework to improve ITSM service management processes with the additions of two drivers: agility control based on DevOps and security management based on SecOps.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.