RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Familiar with Your SLAs

Why You Need to Be Familiar with Your SLAs

Normal. Usual. Typical. When your business is going well, it all feels “normal”. When you are faced with a major technology problem, however, it can trigger a series of catastrophic issues that interrupt, or in some cases destroy, the equilibrium reached when things are going as they should. This peace of mind is the main reason many businesses owners like you have chosen to sign a service level agreement (SLA) with an outsourced IT provider. Keeping everything “normal” can keep profit rolling in. Today we look behind the SLA to show you how it works to protect your business’ normal.

What Are We Agreeing To?
At RCS Professional Services, we understand just how much you depend on your technology. That’s why we’ve established our value-based managed IT service. Not all IT service providers do it this way. Many computer shops still just fix computers when they break, and while it’s okay to do it this way, we believe that our way, where we offer you several services designed to proactively protect your company’s technology, is simply more all-around valuable. In order to make it work, however, we make use of a carefully constructed service level agreement that works to establish the kind of service delivery you can expect, while giving our clients the peace of mind about how we handle our technical, personal, and financial processes, and what they mean for your business.

The typical SLA covers two major factors

  • Uptime/Downtime - Since any IT management service worth its salt will come with comprehensive remote monitoring as a standard part of the agreement, uptime is a crucial variable when thinking about an organization’s servers. This is an increasingly important metric since many IT service providers host infrastructure, applications, storage, or some other utility for their clients. Most SLAs will guarantee a certain degree of uptime.
  • Response Time - This measures how much time your IT services provider has before they need to respond to the problems you are having once you contact them. Generally, SLAs require the organization to go through the proper channel (usually a email-integrated ticketing system or chat interface), and hold short intervals of time to ensure that your IT system gets the attention it needs to be effective.

Scope
The first thing the SLA will establish is a description of the service that has been contracted. The SLA will outline the specifics of what technology is covered, and how it will be covered. Typically, service-based companies will have tiers of service that customers can choose from to keep the SLA process simpler. Some companies provide more or less flexibility depending on their clientele’s needs. In managed IT services, we like to think of ourselves as solutions providers, so we try not to limit the amount of good we can do for a company, but to protect our business, we have to explicitly outline what the agreement covers and what it doesn’t.

Penalties
The SLA will likely detail the kind of compensation that the organization would receive if the IT service provider fails to meet the promises outlined in the SLA. Typical responses to this are in the form of account credit. These serve to give an organization a certain percentage more service for the following month if a situation arises. There will also likely be a clause in the agreement that allows an organization to get out of their SLA if they aren’t delivered a certain level of service.

Cost
The agreement isn’t just in place to protect the service provider. Sure, without one there are no official boundaries put on a client to demand resolution of an issue, but it also serves to outline just how much the service costs, eliminating the risk of ambiguity on the buyer.

Why Your SLA Should Matter to You
The SLA provided by your IT company helps you determine where your monthly IT budget is going, what it protects you against, and how emergencies are handled. This sets an expectation for your company when issues occur. Granted, not all IT providers live and die by their SLA, which in our opinion, is a massive disservice to their clients. Have you ever felt like you weren’t getting what you paid for with your IT provider? We understand - and we can do better. Give us a call today at 212.532.9111 to talk about how we could raise your expectations for your IT.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 25 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Tip of the Week Software Business Management workplace tips Tip of the Week Small Business Email gadgets Backup Mobile Office Hackers Managed Service Provider Cloud Productivity hardware Saving Money Quick Tips Google Malware Data Business COmputing Social Media Business Smartphones Microsoft Office Android Users User Tips Mobile Devices Hosted Solutions Computer Innovation Efficiency IT Services Virtualization Passwords Miscellaneous IT Support Business Continuity Smartphone Upgrade Windows WiFi Operating System Network Security VoIP Communication Disaster Recovery Holiday Apple Server Mobile Computing Ransomware The Internet of Things Unified Threat Management Alert Marketing Mobile Device Management Remote Computing Network Antivirus Gmail Analytics Windows 8 Apps Windows 10 Facebook IT Consultant Outlook Cybersecurity History Tech Term Health Office Excel communications Vendor Management Collaboration IT Support Remote Monitoring Data Management Hacking Virus Data Recovery Phishing Search Maintenance Artificial Intelligence Big data Content Filtering Browser Going Green Printer Tutorials Lithium-ion Battery Firewall Current Events Mobile Device Money Humor Windows 10 Data Backup Bandwidth Cybercrime Productivity App Internet of Things Comparison Bluetooth Chrome Cost Management Wireless Technology Update Website Social Networking Best Practice Networking VPN eWaste Augmented Reality PowerPoint Spam Business Intelligence Avoiding Downtime Proactive IT Hard Drives Applications Office 365 iPhone Data Security BDR Downtime Laptop Automation Employer-Employee Relationship BYOD Word Managed IT Services Tech Support USB IT Management Lifestyle Cleaning Data storage Compliance Computer Accessories Vulnerability Tablet Presentation Running Cable Data loss Google Docs Encryption Mouse Business Technology Customer Relationship Management Company Culture Document Management Save Money Websites Scam Help Desk Retail Sports Education Experience Robot YouTube Managed IT Services Bring Your Own Device Tech Terms Data Breach Two-factor Authentication Hiring/Firing Disaster User User Error Access Control IBM Social Engineering Pain Points Social Computers Save Time Inbound Marketing Net Neutrality Safety Specifications Touchscreen SaaS Patch Management Information Technology DDoS Gaming Console Government Bitcoin Vulnerabilities Administration Computer Repair Unified Communications Blockchain Law Enforcement Phone System Saving Time Digital Payment Project Management Cryptocurrency Cortana Entrepreneur Virtual Assistant Nanotechnology Network Congestion Emergency Optimization Leadership Memory Business Cards Customer Service HIPAA Electronic Payment Mobility Computer Care HTML Processors Router Printer Server Hard Drive Disposal Time Management Screen Reader Recycling Piracy IP Address Twitter Google Calendar Training Society Wireless GPS Teamwork Unified Threat Management Conferencing Continuity Legal Software License Skype Storage Harddrive Get More Done Wearable Technology Television Google Maps Devices Office Tips 3D Keyboard Webinar Online Currency Backup and Disaster Recovery Solar Identity Theft Mobile Technology Domains Travel SharePoint Regulations Music Shortcut Manages Service Provider Software as a Service Value Knowledge Cables Virtual Reality Desktop Product Reviews Troubleshooting Environment Display Freedom of Information Programming Text Messaging Accountants Black Market Staffing Professional Services Deep Learning Streaming Media Competition Co-Managed IT Trending Wires Chromebook LiFi Fax Server Trojan News Read Ebay Equifax Business Growth Zero-Day Threat Monitors Windows XP Application Statistics Managed IT Point of Sale Voice over Internet Protocol Visible Light Communication External Harddrive Analytic Business Owner Fake News Pirating Information Start Menu Startup Google Wallet Recovery Dongle Displays Virtual Desktop Hackeres Media Streaming Budget Mobile Security Advertising Smart Phones Upselling intranet Microsoft Excel Hiring/Firing Data Protection Legislation Hosted Solution Documents Service Level Agreement End of Support email scam Public Speaking Audit Hard Drive Multi-factor Authentication Entertainment Securty Debate Emails Drones Smart Office Writing Heating/Cooling LinkedIn Redundancy Phone Systems Printing Distributed Denial of Service Device security Digital Wireless Headphones Work Computing Infrastructure Hacker Password File Sharing Downloads