Value delivery from it to the business is most effectively achieved by:

Value delivery from it to the business is most effectively achieved by:

Organizations maximize co-creation of value with their customers by facilitating the outcomes they want to achieve. The four dimensions of service management have shown that a holistic approach is the best way for an organization to:

  • Achieve its goals in delivering quality and cost effective services
  • Meet the needs of its customers
  • Satisfy the requirements of its stakeholders

(This article is part of our ITIL 4 Guide. Use the right-hand menu to navigate.)

Download Now: ITIL 4 Best Practice e-Books

These all-new for 2020 ITIL e-books highlight important elements of ITIL 4 best practices. Quickly understand key changes and actionable concepts, written by ITIL 4 contributors.

Value delivery from it to the business is most effectively achieved by:

In order to function properly, an organization’s service management elements need to work together as a system. ITIL® 4 has introduced the Service Value System (SVS), to ensure that the organization constantly co-creates value with all stakeholders through the use and management of products and services.

The ITIL SVS describes how all the components and activities of the organization work together as a system to enable value creation.

The SVS is made up of specific inputs, elements, and outputs relevant to service management. The key inputs to the SVS are opportunity and demand. The output of the SVS is value delivered by products and services.

  • Opportunity refers to options or possibilities to add value for stakeholders or otherwise improve the organization.
  • Demand refers to need or desire for products and services among internal and external consumers.

Opportunity and demand trigger activities within the ITIL SVS, and these activities lead to the creation of value. Opportunity and demand are always entering into the system, but the organization does not automatically accept all opportunities or satisfy all demand.

The structure of the SVS is shown in the diagram below.

Value delivery from it to the business is most effectively achieved by:

The 5 elements which support the transformation of demand into valuable outcomes are defined as follows:

SVS Element Definition
Guiding Principles Recommendations that can guide an organization in all circumstances, regardless of changes in its goals, strategies, type of work, or management structure
Governance The means by which an organization is directed and controlled
Service Value Chain A set of interconnected activities that an organization performs to deliver a valuable product or service to its consumers and to facilitate value realization
Practices Sets of organizational resources designed for performing work or accomplishing an objective
Continual Improvement A recurring organizational activity performed at all levels to ensure that an organization’s performance continually meets stakeholders’ expectations

In the next series of articles, we will look at each SVS element in detail.

Note that the architecture of the ITIL SVS specifically enables flexibility and discourages siloed working. This is because the service value chain and practices do not form a fixed, rigid structure, but rather they can be combined in multiple value streams to address the needs of the organization in a variety of scenarios, with open flow of communication across the many interfaces.

This is contrary to siloed working where organizational hierarchies and constrained communication flow have serious drawbacks like:

  • Limiting collaboration
  • Reducing efficiency
  • Increasing both cost and risk

Through its flexible value-oriented operating model, the ITIL SVS supports many work approaches, from traditional processes and project management practices (waterfall methodology) to more modern practices such as Agile, DevOps, and Lean. The SVS is not limited by size of the organization whether it be a department, startup, small business or multinational.

However, to attain full value and limit the negative impacts of silos, it is recommended that the SVS is applied across the entire organization rather than a subset.

In service management, the success of an organization can be determined by two key capabilities:

  • Organizational agility: The ability of an organization to move and adapt quickly, flexibly, and decisively to support internal changes e.g. organizational structure changes, technology changes, skill changes etc.
  • Organizational resilience: The ability of an organization to anticipate, prepare for, respond to, and adapt to both incremental changes and sudden disruptions from an external perspective, i.e. PESTEL factors.

The ITIL SVS provides the means to achieve organizational agility and resilience and to facilitate the adoption of a strong unified direction, focused on value, and understood by everyone in the organization, while also enabling continual improvement throughout the organization.

ITIL® is a registered trade mark of AXELOS Limited. IT Infrastructure Library® is a registered trade mark of AXELOS Limited.

ITIL 4 Best Practice e-books

These all-new ITIL e-books highlight important elements of ITIL 4 best practices so that you can quickly understand key changes and actionable concepts. Download now for free!


Value delivery from it to the business is most effectively achieved by:

These postings are my own and do not necessarily represent BMC's position, strategies, or opinion.

See an error or have a suggestion? Please let us know by emailing .

BMC Brings the A-Game

BMC works with 86% of the Forbes Global 50 and customers and partners around the world to create their future. With our history of innovation, industry-leading automation, operations, and service management solutions, combined with unmatched flexibility, we help organizations free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead.
Learn more about BMC ›

You may also like

About the author

Value delivery from it to the business is most effectively achieved by:

Joseph Mathenge

Joseph is a global best practice trainer and consultant with over 14 years corporate experience. His passion is partnering with organizations around the world through training, development, adaptation, streamlining and benchmarking their strategic and operational policies and processes in line with best practice frameworks and international standards. His specialties are IT Service Management, Business Process Reengineering, Cyber Resilience and Project Management.

About the author

Value delivery from it to the business is most effectively achieved by:

Jon Stevens-Hall

Jon Stevens-Hall is a Principal Product Manager for BMC Helix ITSM. He was a contributing author on several of the ITIL 4 Managing Professional books (“Create Deliver and Support”, and “High Velocity IT”). His work focuses on innovative new tooling for Service Management, and the evolution of ITSM in the DevOps era.

Which of these is the most effective control over a guest wireless ID given to the vendor staff?

The correct answer is A. A. A renewable user ID which expires daily would be a good control because it would ensure that wireless access will automatically terminate daily and cannot be used without authorization.

Which of the following best ensures the confidentiality of sensitive data during transmission?

Encryption is the most effective way to protect your data from unauthorized access. Encryption can be defined as transforming the data into an alternative format that can only be read by a person with access to a decryption key.

Which provides the greatest assurance for password encryption of database?

The use of advanced encryption standard (AES) is a secure encryption algorithm that is appropriate for encrypting passwords.

Which of the following findings would be of greatest concern to an IS auditor during a review of logical access to an application?

During a logical access controls review, an IS auditor observes that user accounts are shared. The GREATEST risk resulting from this situation is that: user accountability is not established.