Hi [[ session.user.profile.firstName ]]

The 6 Service Management Tools

CIO’s must also keep the lights on. Many CIOs dream of being the reference person for Business Processes, Information Management and Innovation. Fine, but beforehand they must deliver consistent daily service. Reality check: this means, using charge-back fees that actually reflect IT usage, outsourc
CIO’s must also keep the lights on. Many CIOs dream of being the reference person for Business Processes, Information Management and Innovation. Fine, but beforehand they must deliver consistent daily service. Reality check: this means, using charge-back fees that actually reflect IT usage, outsourcing in a non-biased way, managing suppliers with precise and aligned Service Level Agreements and communicating with the board with understandable IT Policies.

Only 6 documents are needed, the trick is to define them with sufficient detail and do it in a specific order. Join David Royston to hear how this is can be achieved.

After obtaining an MSc in Computer Science from Geneva University in 1987, David Royston joined Switzerland’s largest IT service company: Fides Informatique. In 1993 Mr Royston was hired by Swiss TV in Geneva as their first CIO. For 7 years he led the digital revolution, delivering innovative and reliable solutions such as a new digital newsroom, a computer aided broadcast facility and the first European ATM video network. After obtaining an MBA in 1999, David Royston was hired as a Director at Unicible, one of Switzerland’s major IT service companies.

While working in the latter position, Mr Royston realized how difficult it was for clients to negotiate with experienced suppliers. As a result, in 2002, David Royston founded his own consulting firm with a sole aim: to help companies to deal with their IT service suppliers. David also writes regularly in Business papers such as AGEFI and Banque & Finance.
Recorded Apr 15 2010 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Royston, CEO, Royston Consulting
Presentation preview: The 6 Service Management Tools
Recommended for you:
  • Date
  • Rating
  • Views
  • It's a new year, and time for a change. Are you on the right technology? Legacy CRM systems inevitably hit limitations and you need a path to modernize your technology to stay ahead in this omni-channel and fast-paced world.

    Join Mike Milburn, GM & SVP, Service Cloud, Salesforce and David Schmaier, CEO & Founder, Vlocity for an insider’s guide on making the move from legacy on-premise CRM applications to industry-specific cloud solutions using two transformation approaches.

    This webinar will dive into how your business can successfully:

    - Adopt one of two best-practices in your transition from on-premise to industry cloud
    - Focus on industry innovation with 63% faster deployment time
    - Increase customer satisfaction by 45%
    - Reduce costs by 52% and ensure the stability of back-end systems
  • It's a new year, and time for a change. Are you on the right technology? Legacy CRM systems inevitably hit limitations and you need a path to modernize your technology to stay ahead in this omni-channel and fast-paced world.

    Join Mike Milburn, GM & SVP, Service Cloud, Salesforce and David Schmaier, CEO & Founder, Vlocity for an insider’s guide on making the move from legacy on-premise CRM applications to industry-specific cloud solutions using two transformation approaches.

    This webinar will dive into how your business can successfully:

    - Adopt one of two best-practices in your transition from on-premise to industry cloud
    - Focus on industry innovation with 63% faster deployment time
    - Increase customer satisfaction by 45%
    - Reduce costs by 52% and ensure the stability of back-end systems
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • Instant network service… just add SD-WAN.

    New services for telcos typically take a long time to roll out. Each new service is subjected to deep integration, complex interoperability and challenging deployments which delay service offerings, revenue and competitive differentiation.

    SD-WAN is the first new networking service which can be deployed nearly instantly by Service Providers. This webinar will explain how leading edge SD-WAN solutions allow Service Providers to quickly deliver competitive differentiation, new revenue and increased profitability.
  • Train like you fight. Fight like you train. We could do well to heed this old military axiom and regularly drill for a variety of incident scenarios in the most realistic means as possible. During this (ISC)2 roundtable, we will explore the role of incident management simulation and testing from the world of critical infrastructure and provide some concrete and immediately actionable methods you begin incorporating into your own preparedness program. As the saying goes, “No plan survives first contact with the enemy,” so please join us On February 11, 2016 at 1:00PM Eastern in learning how to become a more resilient organization in the face of disaster.
  • Until now, email messages were frozen in time the moment the "send" button was pressed. Now, a new wave of technology enables marketers to adjust messages post-send to best match the personal context of each and every opener - all in real-time.

    In this webinar, Liveclicker Co-Founder and VP Market Development, Justin Foster and AAA Senior Manager eBusiness, Nancy Weaver will discuss how AAA has leveraged moment-of-open data to amp relevance and connect with customers in new and powerful ways. Attendees will learn how to turn RealTime Email into RealTime Engagement.

    The goal and purpose of the Partner Webinar series is to demonstrate the breadth of the partner ecosystem with Salesforce Marketing Cloud. We will highlight partners that have invested in the partnership with Salesforce Marketing Cloud, demonstrating use cases and customer success stories that have leveraged their solutions and services to build amazing marketing stories. The Salesforce Marketing Cloud has always been an open platform and we continue to invest in the platform to make it easy for partners to build on and implement to extend and augment the Marketing Cloud and the entire Salesforce Customer Success Platform.
  • With as much as 30% of total IT budgets being spent outside of IT departments, technical workarounds by the business, also known as "shadow IT", can no longer be ignored.

    In order to strike a necessary balance between IT control and business-driven efforts, many IT leaders are turning to aPaaS solutions for Citizen Development. Successful implementation of aPaaS hinges on effective change management around people, processes, and technology.

    Join Francois Tricot, CIO of Ceva as he and QuickBase Manager Angela Maglione explore:

    -Factors contributing to the rise of shadow IT
    -Rules of engagement for IT leaders and business users who both want to benefit from aPaaS
    -Real-world examples of effective IT leaders who are currently managing shadow IT
    -Actionable next steps and key questions to consider before embarking on your own Citizen Development journey
  • Join us for a live webinar featuring Dr. Jim Metzler, Distinguished Research Fellow at Ashton Metzler & Associates, as he discusses the future of the WAN and why now is the time to rethink the architecture in order to evolve/accelerate your business.

    Why take the traditional approach to branch office expansion by relying on providers that can’t meet the urgency of your business needs? A new era has come where complexity, cost, flexibility and time-to-market are no longer a hurdle. Welcome to the world of the Software-Defined WAN.

    Join this webinar featuring Jim Metzler, industry specialist to discover:
    •Why it’s time to re-architect your WAN
    •How today’s WAN infrastructure is failing IT
    •New market dynamics that the traditional WAN cannot support
    •A step-by-step approach to evolving your WAN with minimal disruption

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The 6 Service Management Tools
  • Live at: Apr 15 2010 8:00 am
  • Presented by: David Royston, CEO, Royston Consulting
  • From:
Your email has been sent.
or close
You must be logged in to email this