SlideShare a Scribd company logo
1 of 13
How to Evaluate a Managed Services Firm By Chuck Vermillion CEO & Founder
Managed Service Solutions No “one size fits all” managed services solution will ever be ideal for every business.  When evaluating prospective providers, consider important services such as monitoring, reporting, backup, remote management and security.  Also consider key provider qualifications including location, third-party certifications, customer references, in-house staffing resources and contract items.  After outsourcing, you should see immediate results in cost controls and service delivery.  Each organization has different histories, experiences, goals and day-to-  day needs.  Before signing a long term contract or settling on a management solution that could turn out to be inadequate and overly expensive, you should carefully evaluate your company’s requirements realistically.
Managed Service Solutions As outsourcing managed services continues to grow significantly, businesses face a wide range of vendors and options.  A 2009 Gartner survey found that 42% of companies with a thousand employees or less had either fully or partially outsourced their data centers, while 28% are planning to do so within the next 12 months. As the trajectory continues upward for outsourcing managed services, selecting the right provider becomes the most critical exercise in any transition.  Once you have adequately assessed your organization’s strengths and weaknesses and defined your needs and success metrics, you are ready to begin the process of evaluating and selecting the managed services provider that’s the best fit for your business. To best realize your goals and long term efficiency benefits, your search process should focus on evaluating the following service and provider requirements.
Managed Services “Must Haves” Proactive and Constant Monitoring and Management.  Your IT partner should predict issues before they arise and affect your business. Basically, you want your provider to quickly address small problems before they become big ones.  A reputable managed services provider will not profit from problems, but from eliminating downtime. Availability of proactive 24/7/365 support is crucial for most businesses.    Comprehensive Reporting and Communication.  Your final choice for a managed services provider should be viewed as a collaborative extension of your IT organization.  You need your provider to submit monthly status reports and quarterly business reviews and continually reevaluate your IT network metrics and maintenance data.
Managed Services “Must Haves” E Your provider should regularly collect operational data and have a clear, established process in place for converting that information into better IT management decisions. The chain of communication between your team and the MSP team needs to be clear, direct and easy to navigate.   Reliable Backup and Restore Procedures.  With your provider, determine the timeframe you need for automatic backup and system restore functions.  Today’s always-on world requires some of the highest reliabilities the industry has had to deliver. And redundancy is key – of power, network, servers, storage and even entire data centers.  A SAS-70 audit ensures that claims of backup are in place and properly managed.  In addition, the SAS-70 audit assures any claim of preventative maintenance is backed up with proper documentation and service records.  The SAS70 audit will also substantiate any claims regarding change management.
Managed Services “Must Haves” Remote Management. In reality, most problems that arise in IT infrastructures can be quickly identified and fixed from a remote location. Does your managed services provider require a steady onsite presence? If so, find out why, and what benefits their presence will provide to your business. Your provider should provide comprehensive remote services management without having to spend time your locations.   Full Security Management. Determine whether your services include security management, such as firewall monitoring and patch applications. Do they offer remote data backup storage?  Make sure your solution fully addresses your organization’s IT security requirements.
Key Provider Qualifications Suitable Location.  Compare the location of prospective providers in terms of security (natural disasters, political unrest, etc.) and operational efficiencies to the costs.  According to a data center outsourcing survey by Enterprise Systems (esj.com) and SOURCINGmag.com, 80% of the survey respondents outsourced their data centers to service providers located in the United States. Most companies prefer to keep the business domestic, and in many cases, within the same time zone and close to their main business. Third-Party Certifications.  If you’re thinking of building your own data center, you must budget for SAS-70 auditing costs. These costs can easily run over $100,000 per year. Or, you can outsource your data center and select a vendor who has already made the SAS-70 investments.
Key Provider Qualifications A “SAS-70 audited” data center is a label used by many hosting companies to help show the value of their services.  The term “SAS-70″ or Statement on Auditing Standards No. 70, refers to a document that provides auditing standards for performing this specific type of audit on service organizations and is issued by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA).  SAS-70 consists of two types:  Type I – Evaluates the fairness of a service organization’s description of their internal controls. Typically, Type I auditing begins when a company first starts the SAS-70 process. Type II – Includes the Type I report and evaluates how the controls were operating over a set period of time, usually six months from when the Type I audit was first conducted.  It shows the managed services provider claims are accurate.
Key Provider Qualifications By reviewing a SAS-70 audit report, you can learn immediately what controls and capabilities are in place and if the data center has been audited by a CPA.  You can also confirm the provider’s processes – the riskiest portion of data center operations.  A SAS-70 audit will actually test all controls.   Excellent Customer References.  Check references thoroughly and make sure each provider supplies relevant and recent customer references. Ask references about their experience with escalations.  Also, have the provider disclose each partner it works with in delivering your services.  Finally, a vendor-agnostic provider should have established relationships with major equipment and software vendors.  Make sure your managed services provider represents your best interests and is able to negotiate advantageous pricing and maintenance contract terms on your behalf.
Key Provider Qualifications Qualified In-House Staff with Relevant Experience.  Ensure the provider you choose has experience working in your industry and with companies your size.  Also, ask prospective providers about retention, training and tenure of employees in key positions.  One reason many companies turn to managed services is the shortage of technical experts. You don’t want to select a provider who’s having the same staffing issue.   Finally, be careful of large, single-vendor solutions that lack the flexibility and customer support necessary to meet your organization’s unique needs. Instead, look for a provider who can become your trusted technology advisor and partner. .
Key Provider Qualifications Straight-Forward Contracts and Pricing. Carefully review your provider’s contract terms before signing. Analyze service levels.  For example, disaster recovery and business continuity are not interchangeable.  So compare the service level required for your business with what the provider contractually guarantees.    Take a careful look at how moves, adds and changes are managed in your agreement. Are you going to be invoiced for each one on a per-incident basis?  By evaluating contract terms early in the selection process, you can avoid unexpected costs that weaken the advantages you gain by deploying a managed services strategy.
  It’s All About Service Fulfillment ,[object Object],[object Object],[object Object]
About the Author Chuck Vermillion is CEO and founder of OneNeck IT Services, a leading provider of mid-market enterprise hosting and managed services since 1997. For more information about our Managed Services, visit http://www.oneneck.com/Solutions.aspx today.

More Related Content

What's hot

7 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 20157 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 2015Continuum
 
A Brief about IT Managed Services
A Brief about IT Managed ServicesA Brief about IT Managed Services
A Brief about IT Managed ServicesFlightcase1
 
Learn How to Create a Seamless Omni-Channel Retail Experience
Learn How to Create a Seamless Omni-Channel Retail ExperienceLearn How to Create a Seamless Omni-Channel Retail Experience
Learn How to Create a Seamless Omni-Channel Retail ExperiencePerficient, Inc.
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generationmuratc2a
 
Case study presentation
Case study presentationCase study presentation
Case study presentationachtched
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1nbcoenen
 
IBM Enterprise Contract Management ROI
IBM Enterprise Contract Management ROI IBM Enterprise Contract Management ROI
IBM Enterprise Contract Management ROI Perficient, Inc.
 
About graycon
About grayconAbout graycon
About grayconmartyrj
 
Buyers_Guide_eBook
Buyers_Guide_eBookBuyers_Guide_eBook
Buyers_Guide_eBookAbbey Peckis
 
6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to MarketContinuum
 
Need for Action (GDPR Risk Mgmt) Oct'16
Need for Action (GDPR Risk Mgmt)   Oct'16Need for Action (GDPR Risk Mgmt)   Oct'16
Need for Action (GDPR Risk Mgmt) Oct'16Dr. Sanjeev B Ahuja
 
Transform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision ManagementTransform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision ManagementIBM WebSphereIndia
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkKannan Subbiah
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecturenarenvivek
 

What's hot (19)

7 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 20157 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 2015
 
A Brief about IT Managed Services
A Brief about IT Managed ServicesA Brief about IT Managed Services
A Brief about IT Managed Services
 
CMS IT Services new ppt _j15
CMS IT Services new ppt _j15CMS IT Services new ppt _j15
CMS IT Services new ppt _j15
 
Learn How to Create a Seamless Omni-Channel Retail Experience
Learn How to Create a Seamless Omni-Channel Retail ExperienceLearn How to Create a Seamless Omni-Channel Retail Experience
Learn How to Create a Seamless Omni-Channel Retail Experience
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL Indonesia
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
 
Case study presentation
Case study presentationCase study presentation
Case study presentation
 
Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1
 
IBM Enterprise Contract Management ROI
IBM Enterprise Contract Management ROI IBM Enterprise Contract Management ROI
IBM Enterprise Contract Management ROI
 
About graycon
About grayconAbout graycon
About graycon
 
Real Time Risk Management
Real Time Risk ManagementReal Time Risk Management
Real Time Risk Management
 
Buyers_Guide_eBook
Buyers_Guide_eBookBuyers_Guide_eBook
Buyers_Guide_eBook
 
6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market
 
Need for Action (GDPR Risk Mgmt) Oct'16
Need for Action (GDPR Risk Mgmt)   Oct'16Need for Action (GDPR Risk Mgmt)   Oct'16
Need for Action (GDPR Risk Mgmt) Oct'16
 
Transform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision ManagementTransform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision Management
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance Framework
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecture
 

Viewers also liked

Managed it services
Managed it servicesManaged it services
Managed it servicesGss America
 
Managed Services Balanced Scorecard Presentation By Sourcing Gurus
Managed Services Balanced Scorecard Presentation By Sourcing GurusManaged Services Balanced Scorecard Presentation By Sourcing Gurus
Managed Services Balanced Scorecard Presentation By Sourcing GurusSystems Plus Solutions
 
Accelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise ApplicationsAccelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise ApplicationsSplunk
 
Hosting - The Future of Business Grade Communications
Hosting - The Future of Business Grade CommunicationsHosting - The Future of Business Grade Communications
Hosting - The Future of Business Grade CommunicationsPartner Talk
 
Dynamic Data Center for Hosters, by Stefan Simon
Dynamic Data Center for Hosters, by Stefan SimonDynamic Data Center for Hosters, by Stefan Simon
Dynamic Data Center for Hosters, by Stefan SimonAlexey Kovyazin
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
Deloitte Consulting Case Competition
Deloitte Consulting Case CompetitionDeloitte Consulting Case Competition
Deloitte Consulting Case CompetitionMarie Humphrey
 
Measuring the return from pharmaceutical innovation 2016
Measuring the return from pharmaceutical innovation 2016Measuring the return from pharmaceutical innovation 2016
Measuring the return from pharmaceutical innovation 2016Deloitte UK
 
Integrated Direct Procurement Made Easier with SAP and SAP Ariba Solutions
Integrated Direct Procurement Made Easier with SAP and SAP Ariba SolutionsIntegrated Direct Procurement Made Easier with SAP and SAP Ariba Solutions
Integrated Direct Procurement Made Easier with SAP and SAP Ariba SolutionsSAP Ariba
 
Notes On Managed Service And Outsourcing Implementation And Management
Notes On Managed Service And Outsourcing Implementation And ManagementNotes On Managed Service And Outsourcing Implementation And Management
Notes On Managed Service And Outsourcing Implementation And ManagementAlan McSweeney
 
Deloitte Case Competition 2013
Deloitte Case Competition 2013Deloitte Case Competition 2013
Deloitte Case Competition 2013ryanamenges
 

Viewers also liked (13)

Managed it services
Managed it servicesManaged it services
Managed it services
 
Managed Services Balanced Scorecard Presentation By Sourcing Gurus
Managed Services Balanced Scorecard Presentation By Sourcing GurusManaged Services Balanced Scorecard Presentation By Sourcing Gurus
Managed Services Balanced Scorecard Presentation By Sourcing Gurus
 
Third Party Hosting
Third Party HostingThird Party Hosting
Third Party Hosting
 
Accelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise ApplicationsAccelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise Applications
 
Hosting - The Future of Business Grade Communications
Hosting - The Future of Business Grade CommunicationsHosting - The Future of Business Grade Communications
Hosting - The Future of Business Grade Communications
 
Delivering UC Flexibility
Delivering UC FlexibilityDelivering UC Flexibility
Delivering UC Flexibility
 
Dynamic Data Center for Hosters, by Stefan Simon
Dynamic Data Center for Hosters, by Stefan SimonDynamic Data Center for Hosters, by Stefan Simon
Dynamic Data Center for Hosters, by Stefan Simon
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Deloitte Consulting Case Competition
Deloitte Consulting Case CompetitionDeloitte Consulting Case Competition
Deloitte Consulting Case Competition
 
Measuring the return from pharmaceutical innovation 2016
Measuring the return from pharmaceutical innovation 2016Measuring the return from pharmaceutical innovation 2016
Measuring the return from pharmaceutical innovation 2016
 
Integrated Direct Procurement Made Easier with SAP and SAP Ariba Solutions
Integrated Direct Procurement Made Easier with SAP and SAP Ariba SolutionsIntegrated Direct Procurement Made Easier with SAP and SAP Ariba Solutions
Integrated Direct Procurement Made Easier with SAP and SAP Ariba Solutions
 
Notes On Managed Service And Outsourcing Implementation And Management
Notes On Managed Service And Outsourcing Implementation And ManagementNotes On Managed Service And Outsourcing Implementation And Management
Notes On Managed Service And Outsourcing Implementation And Management
 
Deloitte Case Competition 2013
Deloitte Case Competition 2013Deloitte Case Competition 2013
Deloitte Case Competition 2013
 

Similar to How to Evaluate a Managed Services Firm

Choosing it managed service provider
Choosing it managed service providerChoosing it managed service provider
Choosing it managed service providerHEMinnovative
 
Measuring Quality of IT Services
Measuring Quality of IT ServicesMeasuring Quality of IT Services
Measuring Quality of IT ServicesiCore Limited
 
IT Outsourcing- Delivering Unmatched Value
IT Outsourcing- Delivering Unmatched ValueIT Outsourcing- Delivering Unmatched Value
IT Outsourcing- Delivering Unmatched Valueoneneckitservices
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITIONBhavanthSoni
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...31West Global Services
 
it outsourcing.pdf
it outsourcing.pdfit outsourcing.pdf
it outsourcing.pdfVograce
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guideMarie Peters
 
Multi-supplier governance
Multi-supplier governance Multi-supplier governance
Multi-supplier governance WGroup
 
Step-by-Step Guide to Eval NSPs 2016
Step-by-Step Guide to Eval NSPs 2016Step-by-Step Guide to Eval NSPs 2016
Step-by-Step Guide to Eval NSPs 2016Eric Hyman
 
3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedIn3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedInScott Leydin
 
Accounts Payable Outsourcing: Streamlining Financial Processes Introduction
Accounts Payable Outsourcing: Streamlining Financial Processes IntroductionAccounts Payable Outsourcing: Streamlining Financial Processes Introduction
Accounts Payable Outsourcing: Streamlining Financial Processes IntroductionMYND Solution
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessSafar Safarov
 
CRM Systems Start With A Philosophy
CRM Systems Start With A PhilosophyCRM Systems Start With A Philosophy
CRM Systems Start With A PhilosophyRichard Bowden
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2Frank Corris
 
Evaluating Hosted CRM
Evaluating Hosted CRMEvaluating Hosted CRM
Evaluating Hosted CRMDemand Metric
 

Similar to How to Evaluate a Managed Services Firm (20)

Choosing it managed service provider
Choosing it managed service providerChoosing it managed service provider
Choosing it managed service provider
 
Measuring Quality of IT Services
Measuring Quality of IT ServicesMeasuring Quality of IT Services
Measuring Quality of IT Services
 
IT Outsourcing- Delivering Unmatched Value
IT Outsourcing- Delivering Unmatched ValueIT Outsourcing- Delivering Unmatched Value
IT Outsourcing- Delivering Unmatched Value
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
 
it outsourcing.pdf
it outsourcing.pdfit outsourcing.pdf
it outsourcing.pdf
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guide
 
The Complete Guide to Vendor Onboarding Process.pptx
The Complete Guide to Vendor Onboarding Process.pptxThe Complete Guide to Vendor Onboarding Process.pptx
The Complete Guide to Vendor Onboarding Process.pptx
 
Multi-supplier governance
Multi-supplier governance Multi-supplier governance
Multi-supplier governance
 
Step-by-Step Guide to Eval NSPs 2016
Step-by-Step Guide to Eval NSPs 2016Step-by-Step Guide to Eval NSPs 2016
Step-by-Step Guide to Eval NSPs 2016
 
3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedIn3PL Service Provider Management for LinkedIn
3PL Service Provider Management for LinkedIn
 
Accounts Payable Outsourcing: Streamlining Financial Processes Introduction
Accounts Payable Outsourcing: Streamlining Financial Processes IntroductionAccounts Payable Outsourcing: Streamlining Financial Processes Introduction
Accounts Payable Outsourcing: Streamlining Financial Processes Introduction
 
GRC tools
GRC toolsGRC tools
GRC tools
 
Vendor Management Buyers Guide
Vendor Management Buyers GuideVendor Management Buyers Guide
Vendor Management Buyers Guide
 
VPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP BusinessVPN as the Key for a Successful MSP Business
VPN as the Key for a Successful MSP Business
 
Logicas Pres (Eng)
Logicas Pres (Eng)Logicas Pres (Eng)
Logicas Pres (Eng)
 
CRM Systems Start With A Philosophy
CRM Systems Start With A PhilosophyCRM Systems Start With A Philosophy
CRM Systems Start With A Philosophy
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2
 
Outsourced NOC Support.pdf
Outsourced NOC Support.pdfOutsourced NOC Support.pdf
Outsourced NOC Support.pdf
 
Evaluating Hosted CRM
Evaluating Hosted CRMEvaluating Hosted CRM
Evaluating Hosted CRM
 

More from oneneckitservices

AX Management: Should an Outsourcer Complete a SSAE 16 Type II Audit?
AX Management:  Should an Outsourcer Complete a SSAE 16 Type II Audit?AX Management:  Should an Outsourcer Complete a SSAE 16 Type II Audit?
AX Management: Should an Outsourcer Complete a SSAE 16 Type II Audit?oneneckitservices
 
Why Outsource Application Management?
Why Outsource Application Management?Why Outsource Application Management?
Why Outsource Application Management?oneneckitservices
 
What is a Liquidation Auction?
What is a Liquidation Auction?What is a Liquidation Auction?
What is a Liquidation Auction?oneneckitservices
 
IT service provider, IT outsourcing, OneNeck IT Services
IT service provider, IT outsourcing, OneNeck IT ServicesIT service provider, IT outsourcing, OneNeck IT Services
IT service provider, IT outsourcing, OneNeck IT Servicesoneneckitservices
 
Virtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case studyVirtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case studyoneneckitservices
 
Disaster Recovery- A Case Study
Disaster Recovery- A Case StudyDisaster Recovery- A Case Study
Disaster Recovery- A Case Studyoneneckitservices
 
IT Hosting- AFundamental BusinessProcess
IT Hosting- AFundamental BusinessProcessIT Hosting- AFundamental BusinessProcess
IT Hosting- AFundamental BusinessProcessoneneckitservices
 
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT ServicesERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Servicesoneneckitservices
 
IT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT ServicesIT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT Servicesoneneckitservices
 

More from oneneckitservices (9)

AX Management: Should an Outsourcer Complete a SSAE 16 Type II Audit?
AX Management:  Should an Outsourcer Complete a SSAE 16 Type II Audit?AX Management:  Should an Outsourcer Complete a SSAE 16 Type II Audit?
AX Management: Should an Outsourcer Complete a SSAE 16 Type II Audit?
 
Why Outsource Application Management?
Why Outsource Application Management?Why Outsource Application Management?
Why Outsource Application Management?
 
What is a Liquidation Auction?
What is a Liquidation Auction?What is a Liquidation Auction?
What is a Liquidation Auction?
 
IT service provider, IT outsourcing, OneNeck IT Services
IT service provider, IT outsourcing, OneNeck IT ServicesIT service provider, IT outsourcing, OneNeck IT Services
IT service provider, IT outsourcing, OneNeck IT Services
 
Virtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case studyVirtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case study
 
Disaster Recovery- A Case Study
Disaster Recovery- A Case StudyDisaster Recovery- A Case Study
Disaster Recovery- A Case Study
 
IT Hosting- AFundamental BusinessProcess
IT Hosting- AFundamental BusinessProcessIT Hosting- AFundamental BusinessProcess
IT Hosting- AFundamental BusinessProcess
 
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT ServicesERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Services
 
IT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT ServicesIT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT Services
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

How to Evaluate a Managed Services Firm

  • 1. How to Evaluate a Managed Services Firm By Chuck Vermillion CEO & Founder
  • 2. Managed Service Solutions No “one size fits all” managed services solution will ever be ideal for every business. When evaluating prospective providers, consider important services such as monitoring, reporting, backup, remote management and security. Also consider key provider qualifications including location, third-party certifications, customer references, in-house staffing resources and contract items. After outsourcing, you should see immediate results in cost controls and service delivery. Each organization has different histories, experiences, goals and day-to- day needs. Before signing a long term contract or settling on a management solution that could turn out to be inadequate and overly expensive, you should carefully evaluate your company’s requirements realistically.
  • 3. Managed Service Solutions As outsourcing managed services continues to grow significantly, businesses face a wide range of vendors and options. A 2009 Gartner survey found that 42% of companies with a thousand employees or less had either fully or partially outsourced their data centers, while 28% are planning to do so within the next 12 months. As the trajectory continues upward for outsourcing managed services, selecting the right provider becomes the most critical exercise in any transition.  Once you have adequately assessed your organization’s strengths and weaknesses and defined your needs and success metrics, you are ready to begin the process of evaluating and selecting the managed services provider that’s the best fit for your business. To best realize your goals and long term efficiency benefits, your search process should focus on evaluating the following service and provider requirements.
  • 4. Managed Services “Must Haves” Proactive and Constant Monitoring and Management. Your IT partner should predict issues before they arise and affect your business. Basically, you want your provider to quickly address small problems before they become big ones. A reputable managed services provider will not profit from problems, but from eliminating downtime. Availability of proactive 24/7/365 support is crucial for most businesses.   Comprehensive Reporting and Communication. Your final choice for a managed services provider should be viewed as a collaborative extension of your IT organization. You need your provider to submit monthly status reports and quarterly business reviews and continually reevaluate your IT network metrics and maintenance data.
  • 5. Managed Services “Must Haves” E Your provider should regularly collect operational data and have a clear, established process in place for converting that information into better IT management decisions. The chain of communication between your team and the MSP team needs to be clear, direct and easy to navigate.   Reliable Backup and Restore Procedures. With your provider, determine the timeframe you need for automatic backup and system restore functions. Today’s always-on world requires some of the highest reliabilities the industry has had to deliver. And redundancy is key – of power, network, servers, storage and even entire data centers. A SAS-70 audit ensures that claims of backup are in place and properly managed. In addition, the SAS-70 audit assures any claim of preventative maintenance is backed up with proper documentation and service records. The SAS70 audit will also substantiate any claims regarding change management.
  • 6. Managed Services “Must Haves” Remote Management. In reality, most problems that arise in IT infrastructures can be quickly identified and fixed from a remote location. Does your managed services provider require a steady onsite presence? If so, find out why, and what benefits their presence will provide to your business. Your provider should provide comprehensive remote services management without having to spend time your locations.   Full Security Management. Determine whether your services include security management, such as firewall monitoring and patch applications. Do they offer remote data backup storage? Make sure your solution fully addresses your organization’s IT security requirements.
  • 7. Key Provider Qualifications Suitable Location. Compare the location of prospective providers in terms of security (natural disasters, political unrest, etc.) and operational efficiencies to the costs. According to a data center outsourcing survey by Enterprise Systems (esj.com) and SOURCINGmag.com, 80% of the survey respondents outsourced their data centers to service providers located in the United States. Most companies prefer to keep the business domestic, and in many cases, within the same time zone and close to their main business. Third-Party Certifications. If you’re thinking of building your own data center, you must budget for SAS-70 auditing costs. These costs can easily run over $100,000 per year. Or, you can outsource your data center and select a vendor who has already made the SAS-70 investments.
  • 8. Key Provider Qualifications A “SAS-70 audited” data center is a label used by many hosting companies to help show the value of their services. The term “SAS-70″ or Statement on Auditing Standards No. 70, refers to a document that provides auditing standards for performing this specific type of audit on service organizations and is issued by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA).  SAS-70 consists of two types:  Type I – Evaluates the fairness of a service organization’s description of their internal controls. Typically, Type I auditing begins when a company first starts the SAS-70 process. Type II – Includes the Type I report and evaluates how the controls were operating over a set period of time, usually six months from when the Type I audit was first conducted. It shows the managed services provider claims are accurate.
  • 9. Key Provider Qualifications By reviewing a SAS-70 audit report, you can learn immediately what controls and capabilities are in place and if the data center has been audited by a CPA. You can also confirm the provider’s processes – the riskiest portion of data center operations. A SAS-70 audit will actually test all controls.   Excellent Customer References. Check references thoroughly and make sure each provider supplies relevant and recent customer references. Ask references about their experience with escalations. Also, have the provider disclose each partner it works with in delivering your services. Finally, a vendor-agnostic provider should have established relationships with major equipment and software vendors. Make sure your managed services provider represents your best interests and is able to negotiate advantageous pricing and maintenance contract terms on your behalf.
  • 10. Key Provider Qualifications Qualified In-House Staff with Relevant Experience. Ensure the provider you choose has experience working in your industry and with companies your size. Also, ask prospective providers about retention, training and tenure of employees in key positions. One reason many companies turn to managed services is the shortage of technical experts. You don’t want to select a provider who’s having the same staffing issue.   Finally, be careful of large, single-vendor solutions that lack the flexibility and customer support necessary to meet your organization’s unique needs. Instead, look for a provider who can become your trusted technology advisor and partner. .
  • 11. Key Provider Qualifications Straight-Forward Contracts and Pricing. Carefully review your provider’s contract terms before signing. Analyze service levels. For example, disaster recovery and business continuity are not interchangeable. So compare the service level required for your business with what the provider contractually guarantees.   Take a careful look at how moves, adds and changes are managed in your agreement. Are you going to be invoiced for each one on a per-incident basis? By evaluating contract terms early in the selection process, you can avoid unexpected costs that weaken the advantages you gain by deploying a managed services strategy.
  • 12.
  • 13. About the Author Chuck Vermillion is CEO and founder of OneNeck IT Services, a leading provider of mid-market enterprise hosting and managed services since 1997. For more information about our Managed Services, visit http://www.oneneck.com/Solutions.aspx today.