Hi [[ session.user.profile.firstName ]]

IT Service Management

  • Analytics and Closed-Loop Automation for SD-WAN
    Analytics and Closed-Loop Automation for SD-WAN
    Chandu Guntakala Recorded: Feb 20 2019 12 mins
    Anuta Networks won the 2019 SD-WAN Implementation Award by TMC. In this presentation, Anuta Networks CEO, Chandu Guntakala shared the latest Anuta ATOM deployment details as well as key learnings from the multi-year IZO SD-WAN project roll-out at Tata Communications.
  • Scaling security at the Internet edge with stateless technology
    Scaling security at the Internet edge with stateless technology
    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing Recorded: Feb 20 2019 32 mins
    As the scale of all types of attacks continues to increase, traditional stateful perimeter security devices like firewalls often strain to keep up. Adding stateless technology between the firewall and the Internet router, armed with advanced reputation and threat intelligence data, can decrease the heavy load on your existing perimeter defenses, protect them from state exhaustion attacks, and even provide blocking of outbound threats (like bots communicating with C&C). This webinar will explore the realm of stateless technology and the Internet edge, with best practices, lessons learned, and key deployment strategies that will prepare attendees for a future of increasing and diverse attacks.

    During this webinar we will talk more about:

    - Understand the limitations of existing perimeter security solutions because of their stateful nature

    - See how stateless technology can protect you from inbound attacks (like DDOS), more efficiently block inbound IoCs and outbound threats (communications with suspicious destinations based on reputation)

    - Learn how stateful and stateless technologies can work together the make a more secure Internet edge

    - Arm yourself with protection against Internet-scale attacks

    - Answers to audience questions during live Q&A​

    Featured Speaker:

    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing

    Tom has been in the network and security field for over 20 yrs. During this time, he has worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at NETSCOUT he’s a Director of Product Marketing focusing on their industry leading Edge Defense and Threat Intelligence solutions. Tom routinely speaks at IT security events around the world providing insights into cyber threats and best practices in defense.
  • The Four Levels of Thinking as a Geek Leader
    The Four Levels of Thinking as a Geek Leader
    Tom Cooper, Principal Geek, Bright Hill Group Recorded: Feb 20 2019 53 mins
    As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
    What no one tells you is that you're only looking at one of the three factors that lead to career success.
    In this session, you will:
    - Learn the other two factors (and what you should do about them)
    - Learn the four levels of thinking needed to be an expert who leads
    - Assess where you are in each of the areas
    - Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Clarence Hill, David Kennedy Recorded: Feb 20 2019 84 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Clarence Hill, Senior Manager, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Device Overlays

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Making AI work for you
    Making AI work for you
    Wayne Speechly: Principal Director, Dimension Data and Richard Sutherland: Global Technical Account Manager, Intel Recorded: Feb 20 2019 56 mins
    Mainstream Artificial Intelligence (AI) may still be in its infancy, but it offers real business benefits today. Join Wayne Speechly and Richard Sutherland as they discuss how AI is penetrating the workplace and how it is causing business leaders to rethink how they run their organisations.
  • How AI and machine learning are supercharging cybersecurity
    How AI and machine learning are supercharging cybersecurity
    VentureBeat Recorded: Feb 19 2019 60 mins
    Cyber threats continually evolve, growing more sophisticated and aggressive, regularly overwhelming and bypassing traditional security solutions. With AI-powered software trained on large datasets of cybersecurity, network, and even physical information, cybersecurity solutions are increasingly able to detect and block abnormal behavior, even without a known signature or pattern.

    Adding AI into the mix is a major turning point for cybersecurity. It’s growing clear that artificial intelligence and machine learning is the safest, and perhaps the only, path for cybersecurity professionals to really lock down their data and protect the enterprise. These systems offer the fastest, smartest ways to identify and analyze threats in real time -- and find the quickest way to taking them down.

    To learn more about how to improve privacy and security, and how new AI-powered security can protect companies and their customers better, don’t miss this VB Live event!

    Registration is free.

    Attend this webinar and learn:

    * How AI is defeating and preventing cyberattacks
    * When AI analytics need to be deployed and for what reason
    * How to build AI-powered tools that can assure consumers their data is secure
    * Real-world AI applications and what they mean for cybersecurity

    Speakers:

    * Fernando Maymi, Cybersecurity Researcher & Consultant, Moderator
    * Jim Ducharme, VP, Identity Products, RSA.
    * Eduardo Delgado, AVP, ORM, Cybersecurity, TD
  • Jobs-as-Code : It’s Time to Accelerate
    Jobs-as-Code : It’s Time to Accelerate
    Alon Lebenthal, Senior Manager, Solutions Marketing, Workload Automation, BMC Recorded: Feb 19 2019 26 mins
    Everybody talks about Operations “Shifting Left” but Developers also need to “Shift Right” and start thinking about how applications are orchestrated in production. Taking a Jobs-as-Code approach means putting all the workflows and operational instrumentation in the CI/CD pipeline to ensure you get the acceleration and increased quality that comes from automated testing and deployment.
    Join this session and hear how you can orchestrate your workflows with a DevOps enabled approach.
  • Why Traditional ITSM Metrics Will Fail in 2020—And What to Do About It
    Why Traditional ITSM Metrics Will Fail in 2020—And What to Do About It
    Stephen Mann, ITSM Analyst and Matt Klassen, VP Product Marketing, Cherwell Recorded: Feb 19 2019 60 mins
    Industry best practices provide IT service desks a wealth of metrics to adopt, and benchmarking data offers guidance on the KPIs to employ. These have both remained virtually static for the last decade or longer. However, a growing reliance on IT services, a rapidly changing technology landscape, and demands that the service desk shift from a cost center to a value center, is forcing IT leaders to re-think and re-define traditional KPIs and metrics. Those who remain complacent in this respect will almost certainly fail to deliver the outcomes the business demands.

    In this webinar, hosted by ITSM analyst, Stephen Mann, and Cherwell’s Matt Klassen, you’ll learn:

    • How the evolving workplace and employee expectations are driving the need for new KPIs
    • Why the adoption of self-service, automation, and AI require further changes to your measurement philosophy
    • Metrics you are using today that will no longer be relevant in three to five years
    • Tips for developing a new portfolio of metrics that will position you for future success
  • Kuinka saat uuden teknologian myydyksi – neljä askelta
    Kuinka saat uuden teknologian myydyksi – neljä askelta
    Hannu Mattinen, Raimo Malila Recorded: Feb 19 2019 45 mins
    Uuden teknologian menestyvä lanseeraus edellyttää huippusuoritusta myyntityössä ja kaupallistamisessa. Innovaatiot uudistavat omaa ja asiakkaan organisaatiota. Ja aivan erityisesti myyntityötä, sillä uudet teknologiat eivät lyö läpi kilpailukentällä ilman myyntityön uudistumista. Myyntiprosessiin, myyjiin ja heidän sisältöosaamiseensa kohdistuu armottoman kovia vaatimuksia.

    Mikä myynnissä muuttuu, kun uusi teknologia tuodaan markkinoille? Ymmärrämmekö riittävästi asiakkaan näkökulmaa uutta teknologiaa harkittaessa? Kuinka oman tiimin on uudistuttava? Kuinka asiakkaan on muututtava? Tervetuloa mukaan maksuttomaan webinaariin, jossa otetaan neljä tärkeää askelta:

    Myyjän näkökulma: uuden teknologian myyminen
    Asiakkaan näkökulma: uuden teknologian ostaminen
    Oma näkökulma: haastetaan perinteiset ajattelumallimme
    Näkökulmien yhteensitominen: työpajassa 13.3. pureudutaan syvälle asiakkaan maailmaan.
    Lopussa mahdollisuus kysymyksille chatin kautta!


    Webinaarissa Raimo Malila ja Hannu Mattinen tuulettavat perinteisiä ajattelumalleja kaupallistamisesta B2B-caseissa. Sisältö perustuu tuoreeseen analyysiin loistavaan nousukiitoon lähteneiden innovaatioiden ja takkuavien liikkeellelähtöjen eroista. Menestystarinoiden rakentaminen edellyttää erityistä perehtymistä asiakkaan päätöksentekoon, ratkaisun kaupalliseen ilmiasuun, myynnin keskustelutaitoon ja taktisiin kykyihin.

    Webinaari on omiaan myynnin esimiehille, myyjille, tuotekehityksen johdolle, innovaatioiden kaupallistamisesta vastaaville tiimeille ja asiakaspalvelun esimiehille.



    Puhujat:

    Hannu Mattinen Hannu on kirjoittanut kolme kirjaa asiakkuusteemasta. Hän on toteuttanut yli 160 myynnin ja liiketoimintamallien kehittämiseen tuotettua simulointityöpajaa neljällä mantereella ja kymmenessä maassa.

    Raimo Malila omaa vahvan kokemuksen liiketoimintojen kehittämisestä ja johtamisesta kansainvälisessä toimintaympäristössä.
  • Asiantuntijan myyntitaidot - Koppiviisastelun aika on ohi
    Asiantuntijan myyntitaidot - Koppiviisastelun aika on ohi
    Jari Salminen Recorded: Feb 18 2019 32 mins
    Myynti on sana, joka herättää liian monissa asiantuntijoissa epävarmuutta ja jopa lievää kauhua. Ilman myyntitaitoja, asiantuntijan osaaminen jää kuitenkin usein hyödyntämättä. Myyntitaitoja tarvitaan sekä ulkoisten asiakkaiden palvelussa, että oman asiantuntijauran edistämisessä. Kahdesta saman tasoisesta osaajasta pärjää se, joka osaa selkeästi ja vakuuttavasti kertoa, miten hän voi olla avuksi. Kuitenkin myyntitaitojen koulutus on vielä lapsen kengissä asiantuntijoiden koulutuksessa, niin yliopistoissa kuin ammattikorkeakoulussakin. Oletetaan edelleen, että vahva osaaminen myy kyllä itsensä.

    Mitä myynti sitten tarkoittaa asiantuntijatyössä? Kiteytettynä on kyse asiantuntijan osaamisen ja asiakkaiden muuttuvien tarpeiden yhdistämisestä. Tarkemmin katsoen asiantuntijan ja myyjän työprosessit muistuttavat hämmästyttävällä tavalla toisiaan. Asiakkaiden löytäminen, luottamuksen rakentaminen, kuuntelu, sekä ratkaisun tuottaminen ja perustelu ovat samoja molemmissa. Moni asiantuntija tekeekin myyntityötä, vaikkei sitä aina myynniksi mielläkään.

    Webinaarin kuunneltuasi:

    Ymmärrät ammattitaitoisen myynnin merkityksen asiantuntijatyössä
    Tunnistat ja osaat analysoida omat asiakkaasi paremmin
    Opit tunnistamaan vahvuutesi ja kehittämiskohteesi asiantuntijamyyjänä
    Ymmärrät myyntityön merkityksen omassa työssäsi, ja osaat arvostaa myyntityötä osana ammattitaitoasi.
    Puhuja:

    KTT Jari Salminen

    Jari on tehnyt työtä yli 30 vuotta, asiantuntijana, myyjänä, myynnin johtajana, yrittäjänä ja myynnin kouluttajana. Jari toimii aktiivisesti esimiesten ja asiantuntijoiden kouluttajana perustamansa Impactin toimitusjohtajana. Jari on perehtynyt syvällisesti muun muassa, arvomyyntiin, asiakkaan ostoprosessin analysointiin ja luottamuksen rakentamiseen ihmisten välillä. Lue lisää Jarin viime vuonna julkaistusta kirjasta ASIANTUNTIJAN MYYNTITAIDOT.
  • The Cybersecurity Future Summit – Adapting to an ultra-connected world
    The Cybersecurity Future Summit – Adapting to an ultra-connected world
    Kaspersky Lab and guests Recorded: Feb 17 2019 56 mins
    The connected world needs a strong, resilient cyberspace, but the landscape is increasingly fragile and fragmented. At this summit, hosted by Kaspersky Lab, leaders from across the cybersecurity industry will debate the growing need for transparency, collaboration and trust in addressing these challenges and more.
  • Tilannetajun kehittäminen paineen alla
    Tilannetajun kehittäminen paineen alla
    Jaana Hautala Recorded: Feb 16 2019 31 mins
    Webinaarissa käsiteltäviä aiheita:
    - Henkisen suorituskyvyn elementit
    - Mielen johtamisen vaikutus henkiseen suorituskykyyn
    - Tilannetajua kehittämällä parempia päätöksiä ja resilienssiä

    Webinaarin sisältö:

    - Mitä tilannetaju on ja miten vaikutat mielen kuormaan?

    Mitä oivalluksia saat webinaarista:

    - Näkökulmia tilannetajuun
    - Fokuksen suuntaamisen merkitys
    - Stressin vaikutus tilannetajussa
    - Tasapainota oman energian johtaminen
    - Miten mielen kuormaa voi vähentää?
    - Miten lisää ajattelun joustavuutta?
    - Miten virittää aistit, mieli ja keho vaativiin tilanteisiin?

    Kouluttaja

    Jaana Hautala

    on erittäin kokenut yritys- ja mentaalivalmen­taja, NLP kouluttaja ja tietokirjailija. Jaanan intohimo on mentaalivalmennus – itsetuntemus, henkinen suorituskyky, mielentaidot sekä vuorovaikutus kiihtyvästi muuttuvassa ympäristössä. Hän tuo rohkeutta, innovaatisuutta ja uudenlaista näkökulmaan kokonaivaltaiseen hyvinvointiin. Työotteeltaan Jaana on vahvasti läsnäoleva, innostava ja oivalluttava. Hän haastaa osallistujia pysähtymään oman ajattelunsa ja toimintansa äärelle sekä antaa tilaa osallistujien ajattelulle ja kokemusten jakamiselle. Tietosisällön lisäksi toiminnallisuus sekä omakohtainen tekeminen ja harjoittelu ovat Jaanan koulutusten keskiössä.

    Coachina Jaanan ydinosaamista ovat: itsetuntemus, erilaisuuden ymmärtäminen, aito vuorovaikutus, mielentaidot, palautuminen, suorituskyvyn ylläpito, pysähtyminen sekä muutoksessa toimiminen.
  • Don’t know where to start with migrating to the cloud? Here’s one answer.
    Don’t know where to start with migrating to the cloud? Here’s one answer.
    Ensono Recorded: Feb 15 2019 3 mins
    Do you want the unlimited elastic scale, smart security and intelligence of the cloud but don’t know where to start? Does the cloud feel out of reach because of your legacy infrastructure, servers and storage devices? You could lift and shift everything but that means you don’t get the full benefits of the cloud.

    Or you could build from scratch in the cloud but that takes time and costs a lot of money. Another option is re-platforming. It combines the ease of lift-and-shift with the benefits of building directly in the cloud.

    Replace all your old hardware built to peak demand and get all the scalable, smart and secure benefits of the cloud. Re-platforming lifts-and-shifts just the app code and user data, leaving behind your outdated OS and physical disk volumes. This allows you to turn up and down your services based on real-time customer demand.
  • Tiedonhallintalaki tulossa, mitä tulossa?
    Tiedonhallintalaki tulossa, mitä tulossa?
    Jarkko Koivuniemi Recorded: Feb 15 2019 40 mins
    Hallituksen Digitalisoidaan julkiset palvelut -kärkihankkeen päätoimenpiteisiin kuuluu uuden tiedonhallintalain valmistelu. Tiedonhallinnan uudistamisen tavoitteena on varmistaa tietojen monipuolinen, sujuva ja turvallinen hyödyntäminen julkisissa palveluissa. Tulossa on siis uusi tiedonhallintaa koskeva yleislaki, julkisen hallinnon tiedonhallintalaki Laki tulisi voimaan vuoden 2019 aikana. Tule webinaariin kuuntelemaan ajatuksia, mihin pitää varautua.

    Julkisen hallinnon tiedonhallintaon muutosten edessä.

    Sisältö

    - Sääntelykohteet
    - Tiedonhallinta ja tietoturvallisuus
    - Tietoturvallisuussäännöksiä
    - Tekniset rajapinnat
    - VAHTI suositusvaatimukset
    - Asianhallinta ja tietoaineistojen muodostaminen
    - Metatietoa ja rekistereitä
    - Tiedonhallinnan elinkaarikysymykset ja arkistointi
    - JHS-179 ja kokonaisarkkitehtuuri
    - Suomen Ammattipuhujat on yksi Oppia.fi kouluttajakumppaneista.
  • ITIL 4 - Uusimmat uutiset
    ITIL 4 - Uusimmat uutiset
    Lari Peltoniemi Recorded: Feb 15 2019 54 mins
    Maailman suosituin palvelunhallinan viitekehys ITIL® saa uuden version. Julkaisuaikataulu on marraskuun 2018 mukaan vuoden 2019 ensimmäisellä neljänneksellä. Axelos julkaisee asiasta koko ajan uutta tietoa. Tässä webinaarissa kerrotaan mitä ITIL 4:stä on jo julkaistu.

    Lari Peltoniemi on työskennellyt prosessien ja toiminnan kehittämisen ja arvioinnin alueella yli 10 vuotta. Päätoimisesti IT-palveluiden prosessien määrittelyn, kehittämisen ja johtamisen alueella hän on toiminut vuodesta 2005. Hän on konsultoinut ja valmentanut useita suomalaisia ja kansainvälisiä yrityksiä ja organisaatioita ITIL/ITSM prosessien määrittelyihin, käyttöönottoon ja kehittämiseen liittyen. Lari on sertifioitu ITIL Foundation, ITIL Intermediate, VeriSM, SIAM Foundation, CAPO, CASM ja CMDB Foundation valmentaja.
  • Mastering IT Metrics
    Mastering IT Metrics
    Quentin McPhee, Implementation Manager, Vivantio Recorded: Feb 14 2019 53 mins
    IT monitoring and metrics play a key role in measuring IT service management success. By properly analyzing, understanding and measuring where the true value lies in your organization, you can effectively analyze risk, add value, reduce the cost of service delivery and boost the overall performance of your service teams.

    But without knowing what to measure, how to interpret the results and how to leverage your organization’s tools and data to make this possible, you’re setting yourself up for frustration and a lack of clarity in your reporting output.

    On Thursday, May 17th, join BrightTALK and Vivantio’s Senior Implementation Manager Quentin McPhee to learn what you and your senior management need to inform IT decision-making and drive sustainable service improvement, in practical terms.

    Quentin McPhee has more than 20 years’ experience in service management delivery and brings significant knowledge in implementing solutions for all types of organizations.

    This session is not just a ‘back to basics’, but rather will set out what every ITSM organization should be measuring and how to interpret the results, plus how to sustain the measuring process to become a self-aware powerhouse. We’ll also discuss:

    •What value reporting on your ITSM processes can realise
    •Different types of reports and who needs them
    •Tips, tricks and best practices to build out, maintain and sustain your organisation’s reporting structure

    We’ll also cover real-life examples of organizations who have improved efficiency through effective data analysis.

    --

    Vivantio is a leader in help desk, IT service management and customer service software, empowering service teams to embrace automation and improve service levels at hundreds of organisations around the world.
  • Live Demo of OptiView XG
    Live Demo of OptiView XG
    Mike Pennacchi, Network Protocol Specialists Recorded: Feb 14 2019 61 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • Cloud-Native Security: Understanding the Why and How
    Cloud-Native Security: Understanding the Why and How
    David M. Zendzian, CTO, at Pivotal and Jeff Williams, Co-founder and CTO at Contrast Security Recorded: Feb 14 2019 63 mins
    The latest Verizon Data Breach Investigations Report continues to confirm that top sources of data breaches continue to be at the application layer. DevOps and security teams are adopting modern, fully automated software delivery platforms to release apps to production environments multiple times a week or even daily. This has forced security teams to rethink the traditional processes and practices to make security a key component of their cloud-native transformation.

    Join Jeff and David to learn how enterprises are addressing cloud native application security at speed and scale. This session will cover:

    - Common security anti-patterns
    - What is Cloud-Native Security?
    - People: How to align Dev, Security and Ops teams to achieve Cloud Native Security
    - Process: How does Cloud Native change security processes to support the modern agile business?
    - Technology: Introducing Cloud Native Security tools to achieve continuous application security
    - Q&A


    This is the first webinar in a series presented by Pivotal and Contrast Security on Cloud-native Security best practices
  • The ROI for VR/AR in the Enterprise
    The ROI for VR/AR in the Enterprise
    Intel, Atheer, Accenture, Nielsen Recorded: Feb 14 2019 79 mins
    The VR/AR Association Enterprise industry committee will present the latest case studies, best practices, and ROI
  • Introducing Anypoint Runtime Fabric: Deploy apps to the cloud easily
    Introducing Anypoint Runtime Fabric: Deploy apps to the cloud easily
    Ahyoung An, Sr. Product Marketing Manager at MuleSoft and Sundip Patel, Product Manager at MuleSoft Recorded: Feb 14 2019 45 mins
    This session covers how Anypoint Runtime Fabric provides greater flexibility and simplifies operations––enabling enterprises to transform their businesses faster using public, private, or hybrid clouds.

    Watch this webinar to learn how to:
    - Manage deployments in multiple clouds––all from Anypoint Platform’s cloud-based control plane, hosted by MuleSoft
    - Isolate applications, deploy multiple runtime versions in the same Anypoint Runtime Fabric, scale horizontally, and re-deploy with zero downtime
    - Eliminate manual tasks and optimize processes with an easy-to-use container service that offers built-in support for Docker and Kubernetes
  • Teradici PCoIP Management Console Release 3.2.1
    Teradici PCoIP Management Console Release 3.2.1
    Edna Menon – Sr Product Mgr. & Paul Barrett – Systems Specialist - Teradici Recorded: Feb 13 2019 35 mins
    PCoIP Management Console Release 3.2.1 delivers powerful endpoint management capabilities with support for Active Directory and User Roles.
    Learn more about these much requested capabilities, and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Edna Menon, Senior Product Manager. This brief webinar will cover everything you need to learn about this important release through a live demonstration, including:
    •Support for Active Directory, including support for sub-domains
    •User Roles: System Administrator and Administrator roles
    •Web Interface performance improvements
    •…and more!

    Register now.
  • Gain Control of Your Software Licensing Universe with SAM Best Practices
    Gain Control of Your Software Licensing Universe with SAM Best Practices
    Jennah Michalik Recorded: Feb 13 2019 54 mins
    This Webinar session will consist of a brief walk through of Software Asset Management’s foundation. Diving deeper into answering the age-old IT question “What do we own and how do we own it?” Specifically, we will highlight various types of legal documentation, noting key verbiage and contractual elements Software Asset Managers encounter in their day to day responsibilities. The briefing will cover various aspects of reviewing, drafting and negotiating agreements to ensure adequate protection and overall license term understanding. Attendees will gain insight into defining drafting and assigning SAM policies, procedures and responsibilities.
  • NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market
    NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market
    Mark Kerrison and Mark Kedgley Recorded: Feb 13 2019 46 mins
    Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed, fast and accurate Enterprise-Class vulnerability scanning.

    NNT Vulnerability Tracker is based on the commercial-grade version of OpenVAS, the world’s most widely adopted vulnerability assessment tool. This forms a significant progression of NNT’s SecureOps Enterprise Security Strategy and complements NNT’s award-winning Change Tracker Gen7R2 to further efforts in solving IT Security through the definition and delivery of Integrity.

    NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack. Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against more than 66k Network Vulnerability Tests (NVTs) with new vulnerabilities are added daily.

    Join Mark Kerrison, Chief Executive Officer of New Net Technologies and Mark Kedgley, Chief Technology Officer of New Net Technologies, in an interactive webinar as they showcase the all-new Vulnerability Tracker. Key topics and highlights will include:

    • Understanding how vulnerability management aligns with the basic underlying principles required for every security strategy
    • Where and how vulnerability management corresponds with the CIS Top 20 Controls
    • Architectural, features, functionality and competitive differentiators
    • Familiarity with our hyper-fast scanning technology allowing you can assess over 50,000 endpoints per 24 hours

    With Vulnerability Tracker, you will be able to identify and reduce the attack surface giving you better control and assurance that your infrastructure is operating with the least amount of risk.

    Register now to learn more about Vulnerability Tracker’s unique ability to deliver a comprehensive security solution that aligns with your security strategy to mitigate your overall security risk.
  • Customer Success Stories - Brennercom
    Customer Success Stories - Brennercom
    Klemens Rauch, Development Operations Engineer & Team Leader of IT Development, Brennercom. Recorded: Feb 13 2019 4 mins
    Klemens Rauch talks about Brennercom's search for a single ITSM solution, rather than a silo of systems in each department, that could be implemented quickly and easily, without the need for development, using their current resources. Cherwell's software has enabled greater automation and far easier reporting.
  • February Patch Tuesdayd 2019
    February Patch Tuesdayd 2019
    Chris Goettl, Todd Schell, Brian Secrist Recorded: Feb 13 2019 64 mins
    The average spent on Valentine’s Day is a topic that’s been making the rounds on social media. It’s generated shock and awe—but it’s nothing compared to the damage one exploited vulnerability can unleash on your organization. So, let’s keep the money in February flowing into flower stores and candlelit dinners, rather than into the pockets of those we’d never choose to date. For February the men (and women) of Patch Tuesday recommend you lavish attention upon Microsoft. Patch the exploited zero day, public disclosures, and privilege escalation vulnerability. Also, make time for the ever-popular target, Adobe. Because nothing leaves a worse taste in your mouth than a breach you could have prevented—unless, perhaps, it’s those chalky conversation hearts.
  • CX Automation and AI: Achieving real world results
    CX Automation and AI: Achieving real world results
    Rob Allman - SVP Customer Experience, Dimension Data; Dr Harsh Vinayak - SVP of BPO and R&D, NTT Data Feb 21 2019 2:00 pm UTC 60 mins
    Robotic process automation is quickly becoming an integral part of the new CX delivery model. Technologies like predictive analytics, machine learning, and cognitive computing are becoming more powerful. But what does this mean for your customer and for your business?
    We will be discussing the application of these technologies in a real world CX automation context.
  • The Best Way to Assess Incident Response Preparedness
    The Best Way to Assess Incident Response Preparedness
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant Feb 21 2019 4:00 pm UTC 60 mins
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoft Feb 21 2019 5:00 pm UTC 50 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:

    - Measure application performance across APIs and integrations in production
    - How to query and retrieve log data across your network
    - End-to-end walkthrough of priority issue identification and resolution
    - Exciting new capabilities of Anypoint Monitoring
  • Enterprise service management transforms employee productivity
    Enterprise service management transforms employee productivity
    Troy DuMoulin, Bruce Randall Feb 21 2019 5:00 pm UTC 59 mins
    Organizations are recognizing that adopting a service-oriented operating model, underpinned by system-based automation, can address many of the core challenges of competing in a digital economy. At the same time, defining value-based outcomes in the form of products and services, and optimizing shared processes with automation, have been proven to increase productivity, foster collaboration, lower costs and improve speed, no matter the business department or function. The sum of these capabilities and outcomes are often referred to as Enterprise Service Management.

    Join Troy DuMoulin from Pink Elephant and Bruce Randall from ServiceNow as they provide an overview of the many dimensions of Enterprise Service Management.

    In this webinar you’ll learn:

    How to increase employee productivity and creativity with ESM
    How to focus on service management capabilities like service definition, publishing, and knowledge management
    How to transform workflow automation related to incident and request fulfillment
  • Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Komal Bhardwaj & Ritesh Patel Feb 21 2019 6:00 pm UTC 60 mins
    When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.

    In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.

    Presenter:
    Ritesh Patel - VP Products at Nirmata
    Komal Bhardwaj - Principal Product Manager at Citrix
  • Two-Factor Authentication - You are not as protected as you think
    Two-Factor Authentication - You are not as protected as you think
    Damon Tepe & Jeff Hickman Feb 21 2019 6:00 pm UTC 60 mins
    Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.

    Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.

    Better breach protection starts with better identity trust!

    During this session you’ll learn how:
    • Attackers are getting around two-factor authentication
    • Risk and context checks can raise trust in identities and identify attackers
    • Adaptive authentication delivers better access security without slowing down your business


    Speakers:
    Damon Tepe - Director, Product Marketing, SecureAuth
    Jeff Hickman - Director of Sales Engineering, SecureAuth
  • Monitoring Modern Cloud-Native Workloads
    Monitoring Modern Cloud-Native Workloads
    Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM Cloud Feb 21 2019 6:00 pm UTC 45 mins
    If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
  • 1-Minute introduction to Closed Loop Automation from Anuta Networks
    1-Minute introduction to Closed Loop Automation from Anuta Networks
    Anuta Networks Feb 21 2019 7:30 pm UTC 1 min
    Closed-Loop Automation by Anuta ATOM combines Orchestration, Analytics, and Assurance to ensure the network matches the business intent. Closed-Loop Automation eliminates human errors, generates new business insights and avoids network downtime. For more information, visit https://www.anutanetworks.com/technologies/closed-loop-automation/
  • Can bigger security budgets save businesses from costly cloud breaches?
    Can bigger security budgets save businesses from costly cloud breaches?
    Maxim Frolov, Vice President of Global Sales, Kaspersky Lab and Jim Reavis, Co-founder and CEO, Cloud Security Alliance Feb 25 2019 10:00 am UTC 46 mins
    Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.

    Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…

    During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, presents key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.

    Webinar attendees gets the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.
  • Your Game Plan For A Quick, Peaceful and Successful Cloud Migration
    Your Game Plan For A Quick, Peaceful and Successful Cloud Migration
    Eveline Oehrlich Feb 26 2019 10:00 am UTC 48 mins
    Will your game plan make you a winner in your cloud migration project? Ensure your tactics and team are in the best position possible.

    With all the organisational decision-making required, companies can end up struggling—and spending way too much time and money—on their Cloud migration projects.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Feb 26 2019 12:00 pm UTC 37 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Ask a Cloud Access Software Expert…
    Ask a Cloud Access Software Expert…
    Jonathan Culver, Solutions Architect & Andrew Waite Brown, Regional Director - EMEA- Teradici Feb 26 2019 2:15 pm UTC 30 mins
    Join our monthly webinar for a quick review on Cloud Access Software followed by a Question and Answer session with our Cloud Access Software expert and Solutions Architect Jonathan Culver.

    1.What graphics adapters does Cloud Access Software support?
    2.What Windows versions does Cloud Access Software support?
    3.Can USB devices be used with Cloud Access Software?
    4.What are the supported hypervisors and cloud platforms for Cloud Access Software?
    5.Can I connect to my Cloud Access Software workstation on a tablet device?

    Submit a question when registering or during the webinar. Our goal is to ensure your deployment is a success!
    Register today.
  • How to Prepare Your Organization for SQL Server 2008 End of Life
    How to Prepare Your Organization for SQL Server 2008 End of Life
    Jim Haas, Vice President of Managed Services at Ntirety Feb 26 2019 6:00 pm UTC 77 mins
    On July 9th, 2019 Microsoft will end all support for SQL Server 2008. How can you prepare your organization? Start by understanding your options.

    Why should you attend?
    Doing nothing is not an option this time. Data security is a risk to your organization, as all critical patches and security updates for SQL Server 2008 will end. Your Lack of compliance with industry standards and applicable regulations may lead to security breaches, data loss, litigation, and reputational risk.

    Join Jim Haas, Vice President of Managed Services at Ntirety (a Division of Hostway|HOSTING), as he discusses how you can go about making a compelling case:

    • Upgrade Options: Migrate to Azure, Upgrade SQL Server, or Purchase Extended Security
    Updates.
    • The many advances since SQL 2008.
    • How to get started. What you can do yourself. Where you may need help and where to find
    help.

    Register Today!
  • Inside HR Trends in 2019: Transform Your HR Service Delivery with ServiceNow
    Inside HR Trends in 2019: Transform Your HR Service Delivery with ServiceNow
    John Huckle, Josh Scott, Stacey Prezel, Bradford Shelley, Meghan Lockwood Feb 26 2019 6:00 pm UTC 60 mins
    Learn what trends HR leaders are talking about in 2019 with results from Business Forward's Annual HR Leadership Survey - then be a pioneer of those strategic initiative trends.

    Business Forward and Acorio executives will walk you through going beyond the "imagination" and show you how to make real changes with the power of ServiceNow's HR Service Delivery platform.
  • Digital Transformation in 2019: 5 Ways to Drive Growth and Customer Experience
    Digital Transformation in 2019: 5 Ways to Drive Growth and Customer Experience
    Terence Fogarty, Contact Center Consultant, Carousel Industries; Robin Gareiss, President and Founder, Nemertes Research Feb 26 2019 6:00 pm UTC 60 mins
    With the ability to increase sales, reduce costs, and improve customer satisfaction, it’s no surprise that more than 75% of companies have, or plan to have, a Digital Customer Experience (DCX) strategy. Leveraging collaboration technology can transform how you’re engaging customers and driving organizational innovation.

    In this interactive webinar Carousel Industries and Nemertes Research explore the top five digital customer experience projects that drive business growth.

    What you will learn:

    • Which digital customer experience projects deliver measurable success
    • How to realize the business value of upgrading or replacing existing communications platforms
    • Why aligning your approach with your financial model can boost business impact
    • How to identify the right approach for your business: on-premises, cloud, or hybrid
    • Why you need to take a closer look at your internal unified communications and collaboration
    • How to determine if now is the time to upgrade or replace existing communications platforms
  • How to Achieve High Availability for SAP Deployments on AWS
    How to Achieve High Availability for SAP Deployments on AWS
    Ricardo Casanovas, CTO Linke / Guillermo Torres & Maurici Galofré, AWS Solution Architect and SAP experts at Linke Feb 27 2019 3:00 pm UTC 60 mins
    Traditionally, setting up High Availability for SAP systems has been achieved through the implementation of third-party software tools, often expensive and complex to deploy. Today, customers can leverage AWS highly available cloud services to achieve High Availability for their SAP systems at a fraction of their cost.

    Learn how you can configure High Availability for SAP systems on Amazon Web Services using their own AWS tools and services such as Amazon Cloudwatch, AWS Lambda, and AWS Systems Manager.

    Join us to learn:
    •How to plan and define your SAP landscape in High Availability
    •Setup SAP in High Availability using AWS Services
    •Operate with SAP in High Availability on AWS
  • What Service and Support Managers Should Know About AI
    What Service and Support Managers Should Know About AI
    Stephen Mann, ITSM.tools; Roy Atkinson, HDI; Dr. Akhil Sahai, Symphony SummitAI Feb 27 2019 6:00 pm UTC 60 mins
    Articles, headlines, blogs, and presentations about AI are everywhere, most being either apocalyptic (we’ll all lose our jobs) or utopian (we won’t have to work) about how AI will affect the near future. In this webinar, industry analysts Stephen Mann and Roy Atkinson and AI expert Dr. Akhil Sahai will speak directly to service and support managers about how AI is being integrated into service management software, and how that integration has a direct bearing on how service management and support can and will be done in the near future.

    The webinar will feature a panel discussion followed by time for attendee Q&A.

    What You Will Learn:

    In this webinar, we will discuss:
    - What AI is and is not
    - How AI is being built into service management tools
    - How next-generation tools will affect the day-to-day operations of service and support

    Who Should Attend:
    - Service desk/support center directors, managers, supervisors, and team leads
    - ITSM professionals responsible for workflows and processes
    - Support organization leaders
  • How to Increase Employee Productivity by Automating Service Management
    How to Increase Employee Productivity by Automating Service Management
    Liz Beckner Feb 27 2019 7:00 pm UTC 30 mins
    The primary goal of service management is deliver value to the customer, or internally, your employees. As advanced technology reshapes the service desk, there are more and more ways to enhance service delivery. In this webinar, ITIL-certified Samanage Solutions Consultant Liz Beckner will discuss:

    - How she has helped organizations integrate technology within the service desk
    - How automated workflows and self-service provide maximum value
    - How to create a single platform for services in multiple departments
    - New research on how the experience with the service desk impacts employee productivity

    Join us to start transforming the service experience for your employees!
  • 451 Research & Citrix: Accelerating Productivity without Compromise
    451 Research & Citrix: Accelerating Productivity without Compromise
    Chris Marsh of 451 Research & Matt Crawford of Citrix Feb 28 2019 12:00 pm UTC 54 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Driving ROI and Innovation with the Cloud & Hybrid Data Center Consolidation
    Driving ROI and Innovation with the Cloud & Hybrid Data Center Consolidation
    Bruce Kelly, VP ProServ., Curvature, Etienne Gadient, Mng. Partner, CloudLogic; Fred Latala, Mng. Partner, CloudLogic Feb 28 2019 5:00 pm UTC 60 mins
    Cloud Providers love to highlight how easy driving new business innovation, creating new market opportunities and driving rapid experimentation using the cloud is-- all at a fraction of today’s cost. Yet, the reality of today’s enterprise is much more complicated: expensive applications, capital infrastructure and a growing need to adapt and accelerate without compromising business performance. Curvature, powered by CloudLogic, focuses on ways IT leaders can evolve their portfolio of applications and services to not only survive, but embrace the opportunity.

    Join Curvature and Cloud Logic experts for an informative discussion, where you’ll learn more about:

    •How the cloud can change the “infrastructure game”
    •Why Infrastructure and Platform as a Service in the public cloud isn’t
    always the best answer
    •Use cases for public cloud, private cloud and hybrid models to create
    business value
    •How to prioritize and measure whether the cloud actually drives ROI for
    specific teams
    •How data is the new currency for today’s enterprise and how the cloud
    flattens the field
  • Top 5 Cloud Security Myths Debunked
    Top 5 Cloud Security Myths Debunked
    Martin Holste, CTO, FireEye Feb 28 2019 5:00 pm UTC 60 mins
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar on Thursday, February 28, helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • What’s New in ITIL 4? Key Changes, Implications, and Practical Guidance
    What’s New in ITIL 4? Key Changes, Implications, and Practical Guidance
    George Spalding, EVP, Pink Elephant and Matt Klassen, VP, Product Marketing, Cherwell Feb 28 2019 6:00 pm UTC 60 mins
    ITIL 4, the latest version of the most widely adopted ITSM framework, has been released! This version integrates DevOps, Agile, and Lean IT principles for a holistic end-to-end systems approach.

    Pink Elephant, well-known for ITIL training and certification, has played an integral role in ITIL and IT service management over the past 30 years. The ITIL experts from Pink Elephant have been at the forefront of ITIL’s evolution since its inception, and are now playing a significant role in the development of the latest version, ITIL 4.

    Join George Spalding, EVP, Pink Elephant, 20-year ITIL veteran, who has been working with ITIL 4 since early last fall and who co-authored the ITIL V3 Continual Service Improvement volume and Matt Klassen, VP, Product Marketing, Cherwell for an inside look at this most recent ITIL release.
  • SaltStack SecOps for Automated IT Systems Compliance and Security Remediation
    SaltStack SecOps for Automated IT Systems Compliance and Security Remediation
    Mehul Revankar, SaltStack Sr. Product Manager, Kendall Lovett, SaltStack Sr. Product Marketing Manager Feb 28 2019 6:00 pm UTC 45 mins
    Security and IT operations teams must work together to keep modern data centers compliant and secure, but their efforts are often crippled by disparate toolsets, misaligned workflows, and competing priorities. It’s time for that to change

    Join Mehul Revankar, SaltStack Sr. Product Manager, and Kendall Lovett, SaltStack Sr. Product Marketing Manager, as they discuss SaltStack SecOps, a powerful solution that harnesses SaltStack’s event-driven automation technology to deliver full-service, closed-loop automation for IT system compliance and security.

    With SaltStack SecOps, security professionals and IT operations teams can work together to define a compliance policy, scan all systems against it, detect issues, and actively remediate them—all from a single platform.
  • NETSCOUT Threat Intelligence Report 2H 2018: Dawn of the Terrorbit Era
    NETSCOUT Threat Intelligence Report 2H 2018: Dawn of the Terrorbit Era
    Hardik Modi, Sr Director - Threat Intelligence, NETSCOUT and Richard Hummel, Threat Intelligence Manager, NETSCOUT Feb 28 2019 6:30 pm UTC 45 mins
    When it comes to the global threat landscape, the second half of 2018 revealed the equivalent of attacks on steroids, as attackers bulked up existing tactics, rapidly evolved new ones, and applied smart business techniques to vastly accelerate their growth rate. IoT devices were attacked within five minutes of being plugged into the internet. Nation-state APT group activity ratcheted up in volume and targets while existing actors continued to innovate, including the first observed use of Chrome extensions to enable persistence in the STOLEN PENCIL campaign. Finally, the use of business practices such as the affiliate model empowered crimeware such as Danabot to achieve rapid global targeting.

    Attend this webcast to learn about:

    Nation State Innovation in APT: new groups discovered and new TTPs combining custom tools and crimeware

    Crimeware goes to B School: We saw a robust marketplace driven by well-stocked innovation pipelines from rapidly growing organizations

    Understanding the ever-changing DDoS landscape – key vertical targeting and techniques

    Register today, space is limited.
  • Cultivating a DevOps Culture in a ServiceNow World
    Cultivating a DevOps Culture in a ServiceNow World
    Robert Peerenboom, Tameem Hourani Feb 28 2019 7:00 pm UTC 55 mins
    Wayfair has an extremely mature and well-defined DevOps culture in which the company was built on; and this introduced challenges on how to enable ServiceNow as the core platform for their production operations.

    Learning how to integrate multiple ServiceNow modules into the CI/CD pipeline and aggregate operations with deployments was key to getting a holistic view of how business services are performing. Having a single hub for all of the data allowed Wayfair to build KPI’s that are much more relevant to a DevOps world—focused around agility and failing fast.

    Join Tameem Hourani, Head of Production Operations at Wayfair, as he showcases how to:

    Maximize your DevOps journey by moving fast, iterating faster, and bypassing gatekeepers
    Accelerate your digital adoption by integrating ServiceNow with existing open source toolsets and frameworks
    Leverage existing tools to be able to extend and create applications onto the ServiceNow platform
    Participate in this session to learn how you can get support for all phases of your DevOps process lifecycle.