Whose Problem is it Anyway?

Jon Ryman, VP ITSM Solutions, North America, EasyVista
Problem and incident management are fundamental processes within any service management organization. This session will cover aligning ITIL best practices with problem and incident management implementations to meet quality, cost and other critical service metrics. The real value however is in leveraging a holistic approach to IT service levels, integrating problem and incident management with other IT functions in the IT lifecycle, including IT Asset Management, IT Financial Management and IT Project Management. By tracking and managing problems and incidents across the IT lifecycle, organizations can truly track and measure the real benefits, costs and return on investment of their service management initiatives.
Mar 21 2012
46 mins
Whose Problem is it Anyway?
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2838)
  • Upcoming (87)
  • Date
  • Rating
  • Views
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • MDM implementations begin by solving the most pressing business problem in a single hub, mostly on-premise. They then expand to another use case, domain, or region, and might evolve to another MDM hub on cloud or in a different country. Whatever the journey might be, how do you tie the different hubs together in a hybrid or federated hub-of-hubs MDM architecture? Come to this session to learn how certain leading companies are solving this conundrum!

    In this webinar, you will learn:
    -What are the initial use cases that dictate MDM
    -How to determine if you should use the same MDM instance or a different one when expanding your use case
    -When to use on-premise versus cloud MDM

    In addition, we will explore examples of companies using hybrid MDM to manage multiple MDM hubs as well as evolving to the holy-grail of MDM architecture: Hub-of-hubs or federated MDM.
  • Cyberspace is typically the prime mechanism for conducting business. It also plays a key role in the socio-cultural lives of staff, customers and suppliers. By the end of 2013, revelations about how governments had been surrendering commercial and personal privacy in the name of national security left trust very badly shaken. And the timing couldn’t be much worse: many CEOs are ramping up their demands to take even greater advantage of cyberspace. So if this is where things are now, how will all of this look by 2016? How will new threats hurtling over the horizon complicate matters even further? Just what will organisations be able to rely on? And most importantly, are they powerless or can they do something now? This webcast spotlights the threats we'll be dealing with over the coming 24 months along with advice on the best ways of handling them.
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Anti-virus is not enough. McAfee Complete Endpoint Protection add defense in depth against the full threat spectrum from zero-day exploits to hacker attacks, as well as mobile devices such and tablets.
  • Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.

    Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
  • With the release of PCI-DSS version 3.0 many organizations that are already PCI compliant or are working towards becoming PCI compliant are wondering what these changes will mean to their organization. In this webinar we will take a look at what has changed (and what hasn’t) and the impact this will have on how organizations approach PCI compliance.
  • As we continue to explore the ERP implementation process, we’re going to dive deeper into one technology solution you might consider for a successful ERP implementation. Join us as we discuss Oracle eBusiness Suite Release 12. You’ll want to join us if you’re:
    • Thinking about upgrading to release 12
    • On R12.1 and considering moving to R12.2
    • Just looking for a little ‘positive sell’ to add to that budget request so you can fund your upgrade

    Oracle eBusiness Suite Release 12 was defined as “The Global Business Release”. This doesn’t encompass just its geographic reach…the Suite is a comprehensive tool whose breadth and depth across industries and business functions is compelling for customers around the world.

    During this session, participants will learn about:
    • The changes to R12.2 including the foundational architecture improvements and financial enhancements
    • How the strength of Financials Release 12 allows businesses to work globally - across applications, divisions and regions and the tools necessary to achieve that.
    • Integration, data management and reporting

    Oracle eBusiness Suite Release 12 makes it easier and less expensive for customers to implement, manage and scale global applications - ultimately improving the overall ownership experience.
  • Channel
  • Channel profile
Up Down
  • Blurred Boundaries - The Consumerization of IT Recorded: Mar 5 2013 41 mins
    The “consumerization of IT” is upon us. Technology has caused a natural paradigm shift that is blurring the boundaries between business and private lives. Fear about security breaches is no longer justification for enforcing rigid technology barriers. IT is being forced to implement policies in order to guide employees while still allowing them the freedom to be creative.

    Are you ready to shift into a new paradigm of IT? Join Benoit Tessier, the Leader of IT Service Management at Domtar, as he discusses their journey to create a collaborative, efficient and responsive environment to support the demands of their progressive and mobile community.
  • Are you Tired of Fighting Fires? Recorded: Mar 4 2013 12 mins
    Are you tired of reactive service management? Join this webinar to find out how to begin the journey toward proactive service management with process integration.
  • ITIL Simplified Recorded: Jan 15 2013 56 mins
    Senior IT executives are being held accountable to better manage the quality and reliability of IT under the pressures of increasing customer demands, technology expansion and regulatory requirements. Standards, such as ITIL, play a very useful role, but do you find yourself asking questions about how to make ITIL successful and sustainable for your organization?

    Join ITIL Expert and ISO/IEC 20000 Manager certified, Russell Stopek, as he shares his knowledge, insight and experience to help clarify the confusion behind the ITIL framework. Russell will help you understand the ITIL framework and guide you to the right ITIL approach to avoid wasted effort. Leave this webinar with an understanding of ITIL implementation best practices and how you can best apply ITIL processes to your organization, avoiding common pitfalls.
  • Improve Business Continuity with EasyVista Configuration Management Recorded: Dec 18 2012 45 mins
    Driven by technology advancements, industry best practices and customer demands, the ever-changing technology landscape make the IT infrastructure increasingly complex to manage. Configuration Management removes the guess work from IT decision making. Without a configuration management database the implication of change is unknown. If you don’t know what your information technology assets are and how they are related to one another, how can you manage, improve and support them? Attend this webinar to find out how EasyVista’s Configuration Management can help you make informed decisions regarding your IT infrastructure.
  • Remove the Guesswork with Streamlined ITSM Data Analysis Recorded: Nov 13 2012 51 mins
    Running your IT organization shouldn’t require guesswork. Informed IT decision-making begins with clean and accurate data. Usable data coupled with reporting, analytics and true business intelligence technology provides the flexibility to explore, manipulate, simulate and analyze trends and patterns, identifying potential risks and liabilities. Join EasyVista and explore how definitive decision-making based on intelligent data will help you streamline operations, improve efficiencies, increase profitability and continually improve your service delivery.
  • ITSM in the Cloud – What You Don’t Know Will Hurt You Recorded: Oct 17 2012 46 mins
    Cloud consumers are becoming savvier by the day, and it’s not just about cost savings anymore. SaaS is about so much more than the basics, it’s about rapid deployment, agility, data privacy, it’s about secure integrations, and it’s about the SERVICE. Whether you need out-of-the- box KPI dashboards and monitoring, true Business Intelligence for simulation and multi-dimension analysis, the ability to benchmark your efficiencies against industry standards or integration with ERP systems like SAP or other mission critical applications, this webinar will discuss the key considerations when evaluating ITSM cloud vendors.
  • Replacing your legacy helpdesk tool - What you need to know Recorded: Sep 18 2012 60 mins
    Are you facing support and maintenance challenges with your legacy helpdesk tool? The rapid evolution of technology coupled with poor service delivery from your current vendor, an expired maintenance contract, a retired solution, expensive and resource intensive upgrades or not seeing your current vendors vision for the future means that it might be time for a change. Stop worrying about your embarrassingly dated or complex solution and focus on your future IT success. Attend this webinar to learn about the latest IT Service Management trends and what you can do to offer more cost effective, reliable and focused service delivery.
  • Empowering End Users with a Modern Customer Experience Recorded: Aug 7 2012 59 mins
    The “impersonal” world of self-service has taken over. It has become the preferred method of interaction. At the very minimum an organization must provide equivalent service across all touch-points – telephone, email and web self-service. In fact, it has gone one step further to a demand for cross-touchpoint service. The IT organization must move from a multi-channel approach to an agile approach – regardless of where the request begins, it may finish in another channel.
  • Whose Problem is it Anyway? Recorded: Mar 21 2012 46 mins
    Problem and incident management are fundamental processes within any service management organization. This session will cover aligning ITIL best practices with problem and incident management implementations to meet quality, cost and other critical service metrics. The real value however is in leveraging a holistic approach to IT service levels, integrating problem and incident management with other IT functions in the IT lifecycle, including IT Asset Management, IT Financial Management and IT Project Management. By tracking and managing problems and incidents across the IT lifecycle, organizations can truly track and measure the real benefits, costs and return on investment of their service management initiatives.
EasyVista
Codeless ITSM and ITAM SaaS solutions for global enterprises.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Whose Problem is it Anyway?
  • Live at: Mar 21 2012 4:00 pm
  • Presented by: Jon Ryman, VP ITSM Solutions, North America, EasyVista
  • From:
Your email has been sent.
or close
You must be logged in to email this