Onboarding Insights Lead to a More Efficient Support Organization 

In the last few years, the pace of staff turnovers has accelerated more than ever. Each onboarding process is a significant investment of time and resources, and successful onboardings are critical to having an efficient and effective support organization.

There are two ways to improve onboarding through onboarding insights. The first approach is to identify patterns of successful onboardings, to replicate what is working well – for example, effective trainers or useful onboarding guides. The second approach is to identify bottlenecks in the onboarding process to guide continual process improvements, focusing on the biggest delays that block new members of the organization from reaching peak productivity.

Learn from Onboarding Successes

The first step in understanding how the hiring process impacts your organization’s efficiency is to measure how quickly new members of the organization can get fully productive.

One measure is to examine how quickly members of the organization can take on a full workload. Whether your support organization works tickets, incidents, tasks, or cases, you can measure a member of the organization’s productivity by how many they are resolving.

The following report uses a calculation to see how quickly members can handle full loads of tasks and compares the outcome between different trainers. In this case, it uses IT Incidents, but the same report can be created for HR Cases, Facilities Incidents, or any other task your organization handles on a regular basis.

The report counts how many incidents assignees resolve within the first 12 weeks of their work. In order to measure the data, it requires a calculation: [Incident.Resolved] – [Incident.Assigned_To.Created]. The time duration between when the assignee resolved an incident and the assignee hire date.

By binning the results into three categories (less than one month, one to two months, and two to three months), we can see how many incidents are resolved by each member of the organization within their first three months.

By further grouping the data by trainer, we can identify which trainers’ methods are effectively enabling new team members to resolve more incidents quickly:

End Onboarding Bottlenecks

Another major pain point during the onboarding process is the time required to equip a new hire. After all, your organization’s members can’t be productive if they don’t have the proper tools at hand.

To reduce the delivery time, you need to identify and resolve process bottlenecks. Frequently, process issues leave new members of the organization waiting for their important devices to arrive. One of the most common issues is items being stuck in the approval process.

The next report shows how calculations can identify bottlenecks, by breaking up the end-to-end delivery time into stages. The calculation measures durations between different date-time fields that mark stages within the delivery process. Here, we also use a calculation to show what percent of the delivery time was spent waiting for approvals.

By identifying which stages in the process take up the most time, you can focus your attention on the process bottlenecks that, when resolved, will have the biggest impact on efficiently onboarding your team. In this example, we’re focused on approvals, but you can just as easily target other common steps in the fulfillment process (e.g. pulling from inventory, installation, etc.)

Focus on High-Impact Improvements to Onboarding

As we’ve seen, analytics provide the ability to focus your attention on improvements to the onboarding process that will yield high impact on your onboarding process.

By identifying onboarding successes and bottlenecks, you can build upon what’s working and improve what isn’t.

These are valuable lessons that can greatly improve the efficiency of your organization by ensuring that new members are quickly and easily brought to full productivity.

Why Mature IT Security Requires Analytics

Why Mature IT Security Requires Analytics

Pressure is mounting on IT organizations to swiftly adapt to rapidly evolving security threats. You need to use every tool in your toolbox—especially analytics—to rise to these new challenges.

Too often, we think about analytics in the background. Yet, powerful, responsive analytics are as important as vulnerability scanners, automated testing, or workflow management tools.

Not only can trends and ad-hoc reports answer questions and provide information, but real-time operational dashboards can drive behavior to support secure processes.

Use Real-Time Dashboards to Drive Rapid Response to Security Incidents

The first step to rapid response is the ability for users to quickly prioritize and respond to issues as they arise.

The following example is a quick report built with only a few clicks can show team members their work based on how long they’ve been open. This team leader’s report highlights security incidents that have been lingering for more than one day:

Logged-in users can drill through that report and act immediately. One global IT organization deployed aging reports and had a 30% reduction in stale incidents.

Here, analytics isn’t just a passive process of tracking success, it’s driving improved success.

Analyze Data On-The-Fly to Identify Security Threats

The ability to quickly build ad-hoc reports on-the-fly with a wealth of data is key to investigating issues. You need to have the capability to spot a problem, ask questions, get results, and propose solutions within just a few clicks.

This next report harnesses the power of the CMDB to walk the relationships between CI’s and identify which business services are experiencing the most security incidents:

Looking at that report, it’s easily apparent that two of the most targeted services are both experiencing a lot of incidents related to their web servers.

Another example combines data from two different tables – Security Incident and Assets – to identify which models of assets are experiencing the most security incidents:

Now you are getting past the question of how many security incidents and into the answer of why. Are there specific models experiencing disproportionate issues? Could we improve security by phasing those models out?

Also, are you surprised to see in that example that “Unknown” asset model has the most security incidents? Probably not – that brings us to the last area where analytics drives improved security:

Leverage Analytics to Empower Users to Maintain Critical Reference Data

Data quality analytics bring together driving user behavior and investigating problems.

Data quality is the bedrock of processes because you can’t secure what you can’t see.

By creating a dashboard that shows data owners the quality of the data they’re responsible for, you can both drive improve compliance and resolve underlying issues proactively.

In the following dashboard, part of our pre-built CMDB Quality Application, has two components: KPIs showing the overall success of the data quality process, and a dashboard for owners of business services to see what data issues their services have:

Again, the dashboard transforms behavior, rather than assigning audit tasks on an annual basis that creates a lot of work all at once.

Analytics: The Bedrock of Ongoing Activity to Support Security

Are you using analytics as part of your security toolkit?

Analytics is a road to getting the entire organization working towards the same objectives, shaping their day-to-day activity towards quickly and thoroughly resolving issues with the information they need at their fingertips.