Are you an IT service management professional interested in developing your knowledge and improving your job performance? Join the IT service management community to access the latest updates from industry experts. Learn and share insights related to IT service management (ITSM) including topics such as the service desk, service catalog, problem and incident management, ITIL v4 and more. Engage with industry experts on current best practices and participate in active discussions that address the needs and challenges of the ITSM community.
Maintaining accountability across an ephemeral IaaS infrastructure can be a challenge for Finance and DevOps teams. With the proper tagging strategy and implementation, organizations can manage cloud costs around their EC2 instances and resources.
Join CloudCheckr March 22nd at 2 pm Eastern, 11 am Pacific for a live webinar discussing proactive tactics and tips to execute an AWS and Azure tagging strategy as your organization scales, including:
- Tagging rule guidelines to gain visibility and control over your asset inventory
- Cost allocation reports and tools to understand cloud expenses and recognize optimization opportunities
- How CloudCheckr can help enforce tagging policies and reduce cloud costs
Microsoft Power BI is an affordable, powerful data modeling and visualization tool, with widespread adoption and universal appeal for many reasons.
The main reason everyone loves Power BI is the rapid update schedule and all of the cool, new features regularly added to both the desktop and web versions. With these rapid updates, it can be hard to stay on top of what is available from one release to the next.
Join Rodney Landrum, Senior DBA/BI Consulting Services at Ntirety, a division of HOSTING, as he demos his top 5 favorite features of the latest Microsoft Power BI including:
• Anchor Dates for Slicers
• Drill Through
• Quick Measures
• Data Gateways
• Custom Visual (Power KPI)
In the wake of well-publicized breaches like those at Equifax and Uber, everyone from the EU Parliament to the U.S. Securities and Exchange Commission is taking a hard look at cybersecurity—and rethinking how and how quickly the word goes out that a breach occurred. Join Ivanti security experts as they:
- Perform their own incident postmortem on headline-making breaches and disclosures
- Provide guidance on getting incident response and breach management right
- Discuss security tools that will minimize the chances a breach happens at all
The best case scenario is it never happens to you. But since that’s also not very likely, learn the right way to respond when everything else goes wrong.
Una tendencia emergente es el uso de Bots y de la Inteligencia Artificial en el soporte e interacción con los Usuarios.
En este webinar se presentaran una solución de "empleado virtual" que permite disminuir de 40 a 50% los correos y llamadas hacia cualquier departamento que realice el soporte al usuario (soporte TI, soporte RRHH, soporte de gestión de provedores, etc.).
Ce séminaire Web sur le dépannage Wi-Fi vous explique comment résoudre rapidement et efficacement les problèmes de connexion ou, plus exactement, les problèmes de connexion au réseau Wi-Fi, à ne pas confondre avec les problèmes de connexion à un site Web ou à une adresse IP spécifiques. La plupart des utilisateurs ne connaissent pas la différence et remontent les problèmes suivants : « Le réseau sans fil ne fonctionne pas. Je n’arrive pas à me connecter à Internet. »
Nous commencerons par vous présenter la différence entre les problèmes de connexion au Wi-Fi et les problèmes d’accès aux ressources réseau. Ensuite, nous vous montrerons comment identifier les causes les plus courantes des problèmes de connexion au réseau Wi-Fi et nous vous donnerons des conseils sur la façon de résoudre ces problèmes.
As our industry transforms and matures, last century standards for cross-team communication become less and less efficient. And in today’s digital world, the tiniest technical glitch can have huge consequences—requiring swift and flawless communication. Whether it’s a datacenter outage, a cyber-attack, an application failure, or a manmade issue, they’re all critical events which support centers need to identify, categorize, and help coordinate cross-functional teams for timely restoration.
Today, there’s an area where the role of the service desk continues to become more and more strategic when it comes to communication: Critical event management. So when IT hits the fan, will you be prepared to manage critical events? Are you using the right tools? Are you meeting your SLAs and complying with regulations?
In this conversational webinar, Pink Elephant’s Peter Hubbard and Everbridge’s Mike Beckett explore the challenges faced by modern team structures when it comes to interrupted or complex coordination during unexpected IT downtime events.
What you’ll learn:
* The challenges around communication, collaboration, and coordination
* Why not all incidents are equally important
* Why the “one size fits all” support model no longer works
* Solutions, ideas, and takeaways for critical event management
Who should attend:
* Support center managers and directors responsible for communications
* Telecom administrators looking for solutions for rapid communications
* Service management professionals responsible for business continuity and/or disaster recovery
* Incident managers
* Any organization contemplating the adoption of a #DevOps culture
* IT executives concerned about quality of IT services, response team performance, MTTR
* Performance managers and auditors
Markkina kasvaa ja muutosvoimat jyräävät – onhan myyntisi valmis!
Onko koskaan ollut näin mielenkiintoista työskennellä myynnin ja myynnin johtamisen parissa… Uusia tapoja myydä ja tehdä businestä syntyy jatkuvasti ja asiakkaiden odotukset pakottavat kehittämään toimintatapoja, joten nyt ei todellakaan pääse kalkkiutumaan.
Myyntistrategian kysymykset mitä, kenelle, miten, missä ja kenen toimesta myydään, ovat elintärkeitä jokaisen yrityksen menestymisen kannalta. Mutta onko nykyinen myyntistrategiasi sellainen, joka tuo kasvun tämänhetkisessä markkina- ja kilpailutilanteessa? Entä kuinka myyntistrategiasi toteutuu käytännössä, eikä vain paperilla? Ja ihan tosissaan kannattaisi kysyä myös, onko oma asiantuntija- ja myyntiorganisaatio sellaisessa iskussa, että se pystyy ottamaan kasvusta itselleen kuuluvan osan – ja mielellään vielä vähän kilpailijoiltakin.
Tämä maksuton webinaari on jokaiselle myynnin johtajalle ja myyntitiimin vetäjälle, jonka vastuulla on yrityksen kasvun aikaansaaminen ja myynti- ja asiantuntijaorganisaation suorituskyvyn tehostaminen.
Petri Maliranta haluaa haastaa jokaisen myynnin johtajan ja myyntitiimien vetäjän hakemaan oman osuutensa markkinan kasvusta! Maliranta on B2B-myyntitoimintojen sparraaja, kehittäjä, valmentaja ja konsultti Mercuri International Oy:ssä. Petri Malirannan erityisosaamista ovat mm. myyntiorganisaation toiminnan auditointi ja tuottavuuden kehittäminen, myynnin ja myynnin johtamisen prosessien ja mittaristojen määrittely sekä kasvun tuovan myyntistrategian konkretisointi ja johtaminen käytäntöön. Näitä asioita Maliranta on edistänyt kymmenissä ja kymmenissä erilaisissa asiakascaseissaan, ja tässä webinaarissa hän haluaa jakaa sinulle tämän eletyn, nähdyn ja koetun kokemuksensa kasvun johtamisesta. ”Kaikki asiat saadaan ratkaistua – se on tapani katsoa asioita, maailmaa ja yhteistyötä ihmisten kanssa."
How can ServiceNow transform your HR Service Delivery? Start simplifying HR processes, reducing time spent on routine tasks, and modernizing the employee service experience.
- The Big Picture: Why are we all investing in HR?
- Real World Examples: What's possible in HRSD
- Build your Business Case: Alignment, Impact, and your 4 steps to a killer pitch
- Questions to expect: New demands and changes we see with Acorio clients as ServiceNow HRSD expands
Docker comes bundled with some neat security safeguards by default: isolation, a smaller attack surface, and task specific workloads.
There are, however, some specific parts of Docker based architectures which are more prone to attacks. In this webinar we are going to cover 7 fundamental Docker security vulnerabilities and threats.
Each section will be divided into:
-Threat description: Attack vector and why it affects containers in particular.
-Docker security best practices: What can you do to prevent this kind of security threats.
-Proof of Concept Example(s): A simple but easily reproducible exercise to get some firsthand practice.
Las posibilidades que nos ofrecen las soluciones ITSM, en nuestro caso BMC Remedy ITSM, a la hora de utilizar Servicios Cognitivos, en la gestión de los servicios de TI:
•Ayuda a los servicios de Service Desk en la categorización y asignación de las peticiones e incidencias de los usuarios
•Promueve la innovación y mejora del servicio prestado a los usuarios a través técnicas de Inteligencia Artificial y Machine Learning, mediante la recopilación y el análisis de datos
•Habilita un nuevo canal de entrada en la relación con los usuarios finales y clientes, que permite la auto-resolución mediante un asistente virtual.
En el Webinar, se mostrará, la operativa a seguir por un usuario de help desk y el cliente final, y cómo a través de “Innovation Studio” nos integramos con IBM Watson, describiendo el proceso de entrenamiento, evaluación y pruebas de las distintas fases de aprendizaje que habitualmente se sigue en modelos de Machine Learning.
Agenda del webinar:
1.Búsqueda inteligente en el soporte TI
2.Motores de recomendación
3.Análisis predictivo en las operaciones de TI
4.Bots para autoservicio y autoayuda
Plataforma sobre la que se basa:
2. BMC Digital Workplace
3. BMC Innovation Studio
4. IBM Watson
ITIL y la futura ISO 20000 describen, además de un proceso de gestión de capacidad de los servicios de TI, un proceso de gestión de la demanda. ¿Cuáles son las diferencias entre ambos? ¿Cómo se pueden implementar de forma eficaz en una organización? ¿Es posible automatizarlos? ¿Se pueden dotar de inteligencia?
A partir del caso real de Camper, se presentará cómo realizar el análisis de la capacidad de los servicios de TI, cómo hacer un plan de capacidad y cómo monitorizar la capacidad. También cómo analizar la demanda y aplicar técnicas de inteligencia artificial para estimar su evolución.
The future of work will look different than the current landscape, and it is approaching rapidly. To prepare, companies must “future-proof” their organizations through a re-evaluation of behaviors to embrace change.
One of these behaviors is how we think which has the capacity to handle the significant challenges (and opportunities!) that will come from IoT (Internet of Things), AI (Artificial Intelligence), Machine Learning and many other Industry 4.0 trends.
Simple tweaks to existing “thinking” will not be a match for what’s coming. We need a fresh and powerful perspective - a disruption - in the way we’ve approached thinking in the past.
Sign up for our free webinar to understand Disruptive Thinking to future-proof your organization.
Join Veena Rajkumar, Learning & Development Program Manager with Tegile, A Western Digital brand, in the first part of a webinar series about The Future of Thinking. Veena will discuss Disruptive Thinking – a method to alter the status quo, identify unique ways to solve real-world problems using simple ideas and existing resources and build effective results.
You will learn:
. The three parts of disruptive thinking: inquiry, discovery, and development
. Methods to leverage challenge as a vehicle for opportunity
“If you can’t change it, change the way you think about it.” ~ Maya Angelou
Fellow Cybersecurity Practitioner:
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
This month's theme: Protected Health Information
Application architectures have become more distributed, heterogeneous, and reliant on supporting infrastructure tiers. The new year will see customers beginning to realize they need to expand their APM monitoring capabilities to provide visibility of these supporting IT infrastructure components.
Application managers and IT teams are realizing that they need contextual visibility into how an infrastructure problem affects application performance, and seek APM solutions that can cross-correlate code-level and transaction-level performance with the health of the supporting physical, virtual, container and cloud infrastructures.
Join this webinar, as John Worthington, Director Product Marketing at eG innovations, discusses why this cross-correlation is so important and what's required to achieve it.
In this webinar, you will discover:
-Why monitoring applications in isolation will not be enough to monitor digital business service performance
-What's required for the enterprise to achieve total performance visibility
-How you can build an incremental plan for achieving transparency in digital service performance monitoring
How can IT help the entire business remain productive without breaking the bank?
Automating process workflows and providing a high-quality service experience is a common theme across all business departments. Extending IT service management solutions and principles beyond IT can improve productivity, enhance collaboration, and cut costs.
Please join us as we discuss how Cherwell Service Management’s flexibility helps diverse lines of business:
- Manage and automate HR, facilities, and security processes.
- Build custom applications without writing code.
- Create inviting customer experiences.
- Collaborate to achieve business goals.
Today, modern, Customer Support teams use thoughtful, intuitive technology to solve customer issues at light speed. In some cases, they have even transformed from a cost center to a juiced up revenue producer.
In our March Lunch and Learn our Customer Service experts will show how to do just that, with real-world examples from companies winning Customer Service right now, and a live demo.
Because more of our world depends on technology, complexity, criticality, and risk are all increasing, and so is the cost of failures. As Charles Betz of Forrester recently wrote, “Complex systems continue to fail, and there’s no sign that this will change.”
When systems fail, the response needs to be swift, and services must be restored rapidly and accurately. This requires coordinated efforts across multiple functions, making planning, preparation, and communication mission-critical and business-critical. Recently, incident management has shown increased interest in learning from first responders, and in applying some of the methods they use for response coordination and communication.
In this webinar, we will discuss:
* How and why complexity is increasing
* What types of risk result from increased complexity
* How incident management can learn and improve by looking outside IT
This webinar is part of BrightTALK's Founders Spotlight series. In the seventh episode of this series, Harriet Jamieson interviews Jeff Rumburg, founder of MetricNet and recipient of the 2014 Ron Muns Lifetime Achievement Award for his contributions to the IT Service and Support industry.
Jeff’s education includes an M.B.A. from the Harvard Business School, an M.S. magna cum laude in Operations Research from Stanford University, and a B.S. magna cum laude in Mechanical Engineering. He is author of A Hands-On Guide to Competitive Benchmarking: The Path to Continuous Quality and Productivity Improvement, is a renowned ITSM speaker, and thought leader, and has taught graduate-level engineering and business courses. He was previously Vice President at Gartner.
Cloud promised a simple pay-as-you-go approach to technology, with cost-savings at the top of the agenda. But data from 451 Research finds that costs are a major issue for enterprises as new pricing models, services and features introduce waste and complexity into the procurement process. In this webinar, we examine the challenge facing enterprises and find a level of intricacy that can’t be solved using manual process – tools and expertise are needed.
This first webinar in our Welcome to Scheduling School series gets right to the core of scheduling, looking at its importance in any customer service team’s planning process. From there, Dave Hoekstra, Pre-Sales Consultant at Teleopti, will take attendees through the essential building blocks of scheduling.
No scheduling or WFM experience is required to join this webinar and it is relevant to contact centers that work with or without an automated planning system. Equally, even simple schedules today must most likely have to work with multiple channels, so Dave will look at the basic needs for multi-channel, multi-skill scheduling. There will be an open Q&A at the end for you to include any of your questions around workforce scheduling and what it’s all about.
The Welcome to Scheduling School series is designed to cover all aspects of the scheduling process, both in moving from simple to advanced scheduling processes to understanding the impact of scheduling on business needs and actions, and the questions that management need to be asking. You are welcome to any and all of the webinar-classes that you feel are relevant to you.
Mitä tapahtuisi liiketoiminnalle jos paljastuisi laajamittainen tietoturvahäiriö? Miten tilanteesta voisi toipua? Voiko koskaan olla täysin turvassa?
RESILIA™ lähtee siitä että on mahdotonta varautua kaikkeen. Sana resilience tarkoittaa sitkeyttä ja kestävyyttä, ja viittaa tässä yhteydessä siihen ominaisuuteen että jos tai oikeastaan kun jotain tapahtuu, pystytään heti tunnistamaan mitä on tapahtunut ja voidaan toipua siitä. Resilia on viitekehys ja hallintamalli joka pureutuu tietoturvaan, riskeihin, haavoittuvuuksiin ja uhkiin. Se tunnistaa saman palvelinhallinnan elinkaarimallin kuin ITIL ja samoja prosesseja. Näkökulma on kuitenkin koko ajan tietoturva.
Webinaarissa luodaan katsaus Resilian lähtökohtiin ja lähestymistapaan.
Ben Kallandilla on yli 30 vuoden kokemus ICT -alalta. Hän on aiemmin toiminut Suomen IBM:ssä eri tehtävissä ja Tieturissa kouluttajana ja konsulttina. Hän on akkreditoitu ITIL, COBIT, TOGAF, Lean IT, DevOps ja Resilia -kouluttaja. Hänen vahvuutensa on isojen kokonaisuuksien hahmottaminen ja jäsentäminen ymmärrettävään muotoon.
Palvelunhallinnan ja hyvän ICT-hallintatavoille on olemassa erilaisia hyviä käytäntöjä, viitekehyksiä ja standardeja. Jokaiselle mallille löytyy oma käyttötarkoituksensa ja mallille on olemassa peruskoulutus, mutta voi olla vaikeaa valita mitä mallia kannattaa noudattaa, jos eri mallien erot ja käyttötarkoitukset eivät ole selvillä.
ITIL, COBIT, TOGAF, Lean IT, DevOps, Resilia, VeriSM, SIAM, OBASHI, IT4IT, FitSM, ISO 20000, ISO 38500.
Miten ne liittyvät toisiinsa? Miten ne erottuvat toisistaan? Webinaarissa asetetaan mallit samalle viivalle, vertaillaan niitä ja erotetaan jyvät akanoista.
Ben Kallandilla on yli 30 vuoden kokemus ICT -alalta. Hän on aiemmin toiminut Suomen IBM:ssä eri tehtävissä ja Tieturissa kouluttajana ja konsulttina. Hän on akkreditoitu ITIL, COBIT, TOGAF, Lean IT, DevOps ja Resilia -kouluttaja. Hänen vahvuutensa on isojen kokonaisuuksien hahmottaminen ja jäsentäminen ymmärrettävään muotoon.
Data Center operators are no strangers to dealing with the pressures of a changing environment. New technologies, applications and architectures will always arise to shake things up. It’s how they respond that will differentiate those that flourish and prosper from those whose ongoing viability will be jeopardized. Today’s changes are no exception. The explosive growth in network traffic - both within and between data centers - will reach unprecedented levels. Cloud-based services and distributed databases and functions will push networks to their limits. Applications and architectures are increasingly dependent on effective network design and performance to meet service level goals. Connectivity infrastructure will be tested, as will MTDC and hosting providers’ ability to innovate and invest. This trend is shining the spotlight on data center operators, especially colocation companies, who need good visibility, control and processes to deal with fast growing, complex and often dynamic networks.
Strategies exist that data centers and colocation providers can employ to thrive in this kinetic environment. These strategies revolve around connectivity. New connectivity products and services, such as Enterprise Connectivity, Disaster Recovery and Ecosystem Peering, are fast finding their way into providers’ service portfolios. While exciting, efficient network operation and quality service are required to successfully offer these new products. A central database is the key, as that is the cornerstone for enabling the planning, managing and integration of used resources in the data center and the network infrastructure. Learn how to use such a database to standardize infrastructures, ensure efficient change processes and secure maintenance and operation of your MTDC or colocation center.
As more and more containerized applications get moved into production environments security & compliance become greater concerns. In this webinar we'll review PCI compliance initiatives, talk about how containers change your compliance lifecycle, and how to stay compliant while maintaining the benefits of containers.
Specifically we'll cover
- Live examples of user activity auditing
- Managing dynamic network maps of your containerized infrastructure
- Container Intrusion detection
- Forensic analysis of unauthorized data access
Government agencies require precise planning and support when it comes to software implementation. Carefully navigating the intricacies of regulations and mandates, organization structure, lobby groups, and complex contracts is essential for success.
Join Tracy Barnes, of STRITCO, as he discusses his experience implementing Cherwell service management within the public sector. Tracy will share the specific challenges experienced during public sector ITSM implementation and provide practical, actionable solutions that have proven to improve performance within IT, HR, Purchasing, and Finance departments.
About Tracy: Tracy was the project manager for the successful ISO/IEC 20000-1:2005 certification at the Florida Department of Revenue. The first state government agency to be certified in the United States. Tracy has achieved the following certifications: ITIL Expert, PMP, Executive Consultant/Manager in ITSM according to ISO/IEC 20000, Six Sigma Green Belt, Internal Audit Certificate in ITSM according to ISO/IEC 20000-1:2011, and is a Certified Public Manager.
Moving to the Cloud can be daunting, but it doesn't have to be. With the right team of experts, who have been through countless migrations, you can make the move and not the mistakes.
In this webinar, attendees will hear from JHC Technologies, a leading Managed Services Provider that specializes in migrating enterprises and public sector organizations' data centers to the public cloud. Additionally, CloudCheckr will discuss tools to automate security and optimize cost once in the cloud.
Part 2 – Understanding Compliance and Support Costs
Open source security software has made it easy for developers to get started with securing IoT devices. In this webinar (Part 2 in a 3-part series), you’ll hear from industry experts on the hidden compliance challenges and support costs of using open source security.
More and more financial institutions are partnering with FinTechs and leveraging Application Program Interfaces (APIs) to attract new prospects and to delight current consumers through unprecedented Customer Experience (CX). APIs offer a bridge between systems while paving a digital path to a connected financial ecosystem.
The institutions that are able to drive this digital transformation successfully, do not think of these capabilities as additional channels and services. Rather, these institutions understand that they must move from a vision of banking as a physical network of branches and ATMs, to a digital platform, comprising core capabilities such as account servicing and the provision of financial products that can be accessed wherever, and whenever, customers wish.
Join this webinar and learn how these institutions are building a digital banking platform with APIs.
One of the largest retailers in the world, top 5 medical insurance firm, largest electrical utilities provider - these are just some of the industry leaders that leverage Brinqa Vulnerability Risk Management solution to secure their critical assets. Join us as we talk to Brinqa solution experts to learn how these leading cybersecurity organizations tackle the most pressing vulnerability management problems of today.
Join us as we share lessons learned from down in the trenches of vulnerability risk management :
How top risk leaders and organizations approach remediation prioritization
How you can future-proof your vulnerability risk management program
How to improve your security without actively scanning your assets
You just got “done” with the transformation of your organization (or parts of it) to leverage more DevOps practices, and now the next hot thing is taking over the industry: containers, Cloud Native, SRE, GitOps, Kubernetes, etc. What’s a DevOps Manager to do? Throw away the last few years and rebrand the team as Cloud Native SREs?
Technological advancement not only provides advancement in “what” a modern technology architecture looks like, it can also provide advancement in the processes and the day to day of an organization’s technology teams. We’ve seen this before in the move from mainframe to client-server, and client-server to Cloud.
In this presentation I’ll talk about the relationship of DevOps to Cloud Native technologies, and help make sense of all the jargon - containers, microservices, orchestration (and Kubernetes), SRE, GitOps, etc. I’ll also talk about how some processes & practices in the world of DevOps change when leveraging these technologies. Attendees will leave from this webinar with a base understanding of what a DevOps operating model looks like when leveraging modern Cloud Native technologies.
We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.
In this webinar we will present how to:
•Protect against application-based DDoS attacks such as HTTP request flooding
•Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
•Implement an advanced threat response policy with Antibot and Google reCAPTCHA
•Implement cluster wide threat protection with a Stick Table Aggregator
•Enhance bot threat protection with WAF and Fingerprint modules
•Dynamically maintain cluster wide whitelists and blacklists
•Monitor threat protection status
Artificial intelligence, once confined to the big screen, is readily available to consumers, in basic form, with Alexa, siri, and self-driving Tesla cars. But, what does this mean for business? We may not have Ex Machina-like robots just yet, but dedicated ‘Futurists’ are joining the C-suite in many organizations to future-proof decision making and prepare for future technology innovations.
AI tools rely on database driven, predictive technology that will enhance the cognitive performance of humans. Join us to learn how you can create a solid foundation for AI initiatives with good knowledge management practices.
Consumers today are actively looking for an emotional connection with a brand, and, are no longer staying loyal to a single retailer. However, one thing that has not changed is that shopping remains a social activity. To capitalise on this trend, retailers must change their sales strategies to take the brand experience directly to consumers in bite-sized formats or face risking their place in today’s retail world.
This is where pop-up, or experience stores come into the mix. Global brands such as Nike, Louis Vuitton, and Marie Claire, are actively increasing their investments to support these pop-up shops; and in this webinar, we are going to investigate how even the smallest business can open pop-up stores by focusing on what retailers would need to consider and put in place to ensure stores are successful.
Digital transformation, the Internet of Things, the application economy, the modern software factory, and so on… are all major Business trends impacting the IT service desk and service level management (SLM). Some would contend the service desk is focusing on service operations – not only IT - and SLM is becoming a real business discipline/function. In this webcast, SLM expert fusionPOINT and service desk vendor CA Technologies will look at the impacts of these trends on each and where it is all headed. Learn about the important part proactive and predictive SLM play to enable Digital Transformation and the service desk becoming more predictive, proactive, and business outcome focused.
Government agencies are embracing Cloud technologies to modernize their infrastructure to deliver digital services at scale, more rapidly and more cost effectively. Yet, many agencies are lacking a cloud first architecture, an achievable enterprise-wide cloud strategy, documented standards and advance analytics to proactively identify risk and compliance.
Agencies need application visibility and control over both wire data and machine data to reap the benefits of Cloud technology. In this Cloud webinar, attendees will learn:
•Software strategies that provide application visibility for public, private and hybrid Cloud environments that give control and visibility back to IT for efficient and effective management
•Best practices for application migration to the Cloud including things to do before, during and after migration
•New options for converged infrastructure health monitoring, SLA monitoring and Cloud/SaaS availability and performance monitoring
The industrial Internet Consortium (IIC) has released the Endpoint Security Best Practices (ESBP) document that provides recommendations on the type of security industrial equipment manufacturers and operators should implement on endpoint devices. In this webinar, industry experts will provide an overview of the recommendations and demonstrate how to approach implementing the guidance.
Microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to adopt microservices architecture due to its popularity. Along with this feeling, also comes the belief that microservices architecture can only be implemented in a certain way; this simply isn’t so.
This webinar will take a pragmatic look at helping customers select an architecture pattern that aligns with their business and goals. By leveraging the 6 different microservices patterns, a company can assess which one will work best for their organization.
Attendees will learn:
- The top six microservices patterns
- The advantages and disadvantages of each microservices pattern
- Best practices to make sure an organization’s microservices implementation is successful
This part 3 of the webinar series, “4 Dimensions of DevOps” focuses on applying a templated approach to continuous testing and brings out the importance of continuous testing in an agile paced DevOps environment.
Key takeaways from the webinar:
• Importance of continuous testing in DevOps
• Test Automation Vs Continuous Testing
• Applying templated approach to continuous testing
• Sample use case scenarios
Of all the Agile practices, none is more foundational than the inspect & adapt cycle of the retrospective. Even if you struggle with every other aspect of Agile, if you consistently engage in productive retrospectives, you will get better.
Industry surveys and studies suggest that 80% or more of Agile organizations have at least some distributed teams. Most of the traditional retrospective methods assume that all team members are co-located.
Running effective retrospectives for distributed teams presents unique challenges, but also, potentially, some great advantages. In this webinar, Agile coach and Instant Agenda co-founder Michael Ball-Marian will discuss the three greatest challenges to running distributed Agile retrospectives and how to solve them. Michael will share a variety of tips and techniques that you can use in any retrospective, co-located or distributed. Finally, he’ll present a few ways in which a distributed retrospective can actually be better than a co-located one.
If you are struggling to keep up with selecting, testing and deploying new security tools, you won’t want to miss this webinar.
You’ll learn how to:
- Address the unique challenges of securing your unique network.
- Implement smart network segmentation and intelligent tool routing.
- Facilitate testing and deploying tools through a security delivery platform.
- Handle the challenges of setting up realistic tests.
Learn how the GigaSECURE security delivery platform strengthens new security tool testing and streamlines deployment.
Macs are no longer foreign to the enterprise world. Marketing requests them, executives demand them and, of course, sales reps don’t want to be left out. How’s an IT admin to securely manage the growing number of Apple devices that will soon be joining the network?
In our webinar, One to Eleven: How to "Turn Up" macOS Security, we’ll show you how to tap into native Mac security controls so you can securely rock your Mac deployment.
•macOS security features
•How to manage macOS security controls with device management
•Common security frameworks and how to apply them
Enterprises today are looking to optimize their IT infrastructure to take advantage of new digital technologies and services.
One of the most popular ways to achieve this is by moving server workloads and applications to the cloud. Since this often happens in large numbers, a cloud transformation project can be a complex effort.
Join us on this webcast and learn how to easily execute even the largest and most complex cloud and data center migration projects, on time and within budget.
Im Zusammenhang mit der ab 25. Mai 2018 gültigen EU Datenschutzgrundverordnung (DSVGO) ergeben sich für Unternehmen neue Compliance-Verpflichtungen. So müssen sie u.a. die Sicherheit personenbezogener Daten durch ein Informationssicherheitskonzept garantieren.
Patrick Schweichler, Implementation Specialist bei DextraData, zeigt Ihnen in unserem exklusiven Webcast, wie Unternehmen von Cherwell mergeable Apps und einem kostengünstigen, effizienten und gesetzeskonformen Informationssicherheitsmanagement profitieren. Mit mApps von Cherwell können Sie der Wirksamkeit der EU-Datenschutzgrundverordnung (DSGVO) gelassen entgegensehen.
Der Webcast richtet sich insbesondere an IT-Service Verantwortliche, Service Manager, Operations-Verantwortliche und Datenschutzbeauftragte, die sich mit dem Thema Informationssicherheitsmanagement beschäftigen.
Lernen Sie die Vorteile der Cherwell mergeable Applications kennen
Übersichtlich und komfortabel: Die ISMS mApp im Detail
Q & A
Part 3 – How to Migrate Safely off of Open Source Security and SSL Libraries
Open source security software has made it easy for developers to get started with securing IoT devices. In this webinar (Part 3 in a 3-part series), you’ll hear from industry experts on how to migrate off of open source security and SSL libraries with Mocana.
In 2007, the IT department of AutoTrader was at the lowest of the low, untrusted and not seen as a true partner to the business. As the organisation transitioned from a brick and mortar printing organisation to an online digital organisation, they needed their IT department to step up and deliver more reliable and better-aligned IT services, while the rate of change would double and then double again. During this session, Dave will translate theory into practice and show how the IT department moved from a traditional ITSM implementation based on traditional ITIL to one that blends DevOps, Lean IT and ITIL together. He will discuss the bumps encountered along the way and how they were overcome. The IT department is now seen as a trusted business partner and has been invited to assist in major business improvement initiatives as the organisation hopes to replicate their internal successes for the business as a whole.
Join Dave as he discusses:
- The importance of a solid foundation and how ITIL gave them that foundation to accelerate improvement
- How to handle Change and Release Management in a DevOps environment
- Why shared monitoring with Operational and Development teams is critical to the success of DevOps
- How they have embedded ITSM within the culture of the organisation itself