itsm deep dive: prioritization, escalation, and alerting
TRANSCRIPT
![Page 1: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/1.jpg)
Pink Elephant and Everbridge | 14 February 2017
ITSM Deep Dive: Prioritization, Escalation, and Alerting
![Page 2: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/2.jpg)
Agenda• Housekeeping
• Introducing our Speakers
• Troy DuMoulin presents ITSM Deep Dive: Classification, Prioritization, Escalation, and Alerting
• Vincent Geffray presents Effective Alerting to Minimize Negative Impact on End Users and the IT Team
• Q&A
![Page 3: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/3.jpg)
Today’sSpeakers
•Troy DuMoulin•VP of Research & Development•Pink Elephant
•Vincent Geffray•Senior Director of Product, IT Alerting•Everbridge
![Page 4: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/4.jpg)
Troy DuMoulin, Pink Elephant
ITSM Deep Dive: Classification, Prioritization, Escalation, and Alerting
![Page 5: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/5.jpg)
![Page 6: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/6.jpg)
![Page 7: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/7.jpg)
![Page 8: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/8.jpg)
![Page 9: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/9.jpg)
![Page 10: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/10.jpg)
![Page 11: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/11.jpg)
![Page 12: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/12.jpg)
![Page 13: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/13.jpg)
![Page 14: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/14.jpg)
![Page 15: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/15.jpg)
![Page 16: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/16.jpg)
![Page 17: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/17.jpg)
![Page 18: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/18.jpg)
![Page 19: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/19.jpg)
![Page 20: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/20.jpg)
![Page 21: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/21.jpg)
![Page 22: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/22.jpg)
![Page 23: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/23.jpg)
Vincent Geffray, Everbridge
Effective Alerting to Minimize Negative Impact on End Users and the IT Team
![Page 24: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/24.jpg)
how it feels
Emaildown…Nowwhat?
![Page 25: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/25.jpg)
NotIf butWhen
Source:2017EverbridgeStateofIncidentManagement
![Page 26: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/26.jpg)
That’smorethanhalfamillionofUSDperhour
Source:2017EverbridgeStateofIncidentManagement
![Page 27: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/27.jpg)
Where Can We Save Time to Reduce The Resolution Time Even Further?
MajorIncidentIdentified
ResponseTeamAssembled
Investigation Remediation Validation1 2 43 5
![Page 28: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/28.jpg)
29% have no formal process in place to manage on-call personnel
24% use spreadsheets, notebooks, and company phone books
11% use a centralized on-call schedule mgt sol.
How do you know who to contact?
MajorIssueIdentified
Investigation Remediation ValidationResponseTeamAssembled
![Page 29: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/29.jpg)
MajorIssueIdentified
Investigation Remediation ValidationResponseTeamAssembled
![Page 30: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/30.jpg)
MajorIssueIdentified
ResponseTeamAssembled
Investigation Remediation Validation
![Page 31: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/31.jpg)
MajorIssueIdentified ResponseTeamAssembled
27 mins $8,662 xaveragetimeittakestoassembletheresponseteam.
averagecost(USD)ofunplanneddowntimeperminute
CostofMeanTimetoAssembletheteam
$233,874 for every major incident
![Page 32: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/32.jpg)
Locate Automate CommunicateAssess
Why an IT Service Alerting Solution?
![Page 33: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/33.jpg)
ThreeThingsYouShouldDoNow
1. Assess:AlertFatigue&“AverageTimeToFindSomeone”
2. IfMTFS>5minutesà Roomforimprovement
3. ReviewYour:On-callschedulemgt,EscalationprocessandNotificationSystem
![Page 35: ITSM Deep Dive: Prioritization, Escalation, and Alerting](https://reader033.vdocuments.us/reader033/viewer/2022052705/58ed581f1a28ab32178b465d/html5/thumbnails/35.jpg)
ITalerting.com
Automated IT Incident Response:Engage Your Response Team in 5 Minutes or Less
automated, multi-modal notifications • rules-based escalation • 1-click conferencing • on-call scheduling • auditing & reporting